SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1583
E-Commerce Website with Enhanced Security
Dr.S.Brindha1, Ms.K.Sudha2, A. Anu shree3, A. Jai jansi4, G. Nandhini5
1 HOD, Dept. of computer networking, psg polytechnic college, Tamil nadu, India
2 Professor, Dept. of computer networking, psg polytechnic college, Tamil nadu, India
3,4,5Student, Dept. of computer networking, psg polytechnic college, Tamil nadu, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - E-commerce websites enable the distribution,
selling, buying, marketingandservicingofproductsorservices
over the internet. It helps to reduce costs while reaching a
wider market. The primary goal of an e-commerce site is to
sell goods and services in online. People can buy goods or
products in online just by visiting website and ordering the
items in online by making payments on online. In existing
systems, there is always a threat to digital wallet due to
hackers. E-commerce digital marketing with enhanced
security is provided to prevent the websitefromhackers. Inthe
proposed system, security at the transaction time is provided.
Both OTP and e-mail messages to verify the user to secure the
user account. But, in existing system they either sendOTPore-
mail messages to verify the user account. In this way it makes
e-commerce system more secure and preventthewebsitefrom
unauthentic operations. Further, the product reachability by
advertising and digital marketing strategies are provided.
Search Engine Optimization (SEO) techniques are also added
to make the website easily reachable by the people.
Key Words: E-Commerce market, one time password,
Security, Search engine optimization, Payment gateway.
1. INTRODUCTION
E-commerce enhances efficiencyandflexibilityofthetrading
activities. It minimizes the distance issues of trade. It allows
user to view catalogues remotely. This system is beneficial
for online e-commerce application as well as application for
financial institutions. It is also required by several web
applications. The demand of online buying is increasing day
by day. The identification and authentication of a personal
using cryptography, provides high assurance in its security
model. We have a tendency to plan associatedegreeformula
for enhancing the safety of OTP. SEO (Search Engine
Optimization) is the development of subsequent the
principle of the search engine such as site structure,
webpage language and interaction diplomatic strategies for
the balanced planning to improve the site search
performance in the search engine and increasing the
opportunity of customerdiscoveryandaccesstothewebsite.
Fig-1.1 process of ecommerce
2. EXISTING SYSTEM
In existing systems, there is always a threat to digital wallet
due to hackers. E- Commerce digital marketing with
enhanced security is provided to prevent the website from
hackers. They either send OTP or e-mail messages to verify
the user account. The existing system only provides text-
based interface, which is not as user-friendly as Graphical
user Interface.
2.1Disadvantages in Existing System
a) The existing system can reach large numbers of users and
their friends to spread spam,
b) The existing system can obtain users’ personal
information such as email address, home town, and gender,
and etc.
c) The existing system can “re-produce" by making other
malicious apps popular.
3. PROPOSED SYSTEM
In the proposed system, security at the transaction time is
provided. In this we introduce a method to send both OTP
and e-mail messages to verify the user to secure the user
account. But, in existing system they either send OTP or e-
mail messages to verify the user account. In this way we
make e-commerce system more secure and prevent the
website from unauthentic operations. Further, the product
reachability by advertising and digital marketing strategies
are provided. Search Engine Optimization (SEO) techniques
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1584
are also added to make the website easily reachable by the
people.
3.1 Language(s) or Software tools used
 MySQL (My Structured Query Language)
 Java script and
 PHP (Hypertext pre-processor)
 HTML (Hypertext Markup Language)
 CSS (cascading style sheet)
The above are the required software tools tobuilda website.
Product details will be entered to the database using MySQL
software. Further security features include OTP, email
verification.
3.2 Authentication Method
In authentication we used OTP method. Static passwords
have been in use which is vulnerable to attacks such asreply
attack. One Time Password (OTP) is a particular kind of
password that is valid only for only one login session or
transaction. OTP provides a secure way for user
authentication as it becomes invalid when used beyond the
prescribed time frame. High level of randomness is the
significant propertyrequiredforOTPs.Truerandomness can
be generated from real-world parameters that can produce
unpredictable variations in its output. This paper presents
an embedded hardware OTP generation system based on
remote request via DTMF signals. The proposed hardware
uses a confluence of real-world parameters and software-
based chaotic function on an embedded platform for OTP
generation. The proposed system also facilitates change in
the generation of OTPs via discretionary external inputs
from users.
Fig -3.1 OTP process
In OTP process is our cloud server generates 12 bit OTP in
that we programed for separating 6 bit OTP number for
SMS and another 6 bit OTP number for email verification.
3.3 Search Engine Optimization
SEO (Search Engine Optimization) is the development of
subsequent the principle of the search engine such as site
structure, webpage language and interaction diplomatic
strategies for the balanced planning to improve the site
search performance in the search engine and increasing the
opportunity of customerdiscoveryandaccesstothewebsite.
SEO is a scientific developmentidea andmethodology,which
develops beside with the development of search engine,and
promotes the development of search engines at the same
time. The major factors for good ranking positions in all the
main search engines are:
3.3.1On-page optimization
Matching web page content and key phrases or keywords
searched. The main factors to optimize web pages are
keyword and key phrases density, keyword formatting,
putting keywords in anchor text and the document meta-
data (page title tags, Meta description tags, Meta keyword
tags etc.). Each web page on some website should have
different title tag, Meta tag description and Meta tag
keywords. The number of timesthekeyphraseisrepeatedin
the text of the web page is a key factor in determining the
position for a key phrase.
3.3.2 External links (back links, backward links)
and inbound links
Google and other search engine counts link to a page from
another website as vote for this page. In other words, web
pages and websites with more external links from other
websites will be ranked more highly. The quality of external
links is also very important factor, so if links from other web
pages are from a website with a good reputation and with
relevant content and key phrases, then this ismorevaluable.
Many of web focused companies should improve this aspect
of search engine optimization in process called external link
building and internal link architecture. Web centered
companies should always try to get links from web pages
with the higher Page Rank (PR) or from web pages witha PR
rating at least four. Page Rank is a scale between 0 and 10
used by Google to determine the importance of websites
according to the number and quality of inbound links and
external links (back links). Incoming or external links to
website should always come in natural textual form, rather
than in graphic form (Banner adds images etc.). Google and
other search engines does index or evaluate image links, but
without textual links web companies won’tincreasewebsite
rank or popularity. The Domain name maturity,Internal link
structure, URL structure, Bounce rate etc. factors are very
important for good ranking position in the search engine.
3.3.3 Off Page optimization
This is the technique for making back links. Back links are
normally termed as link back from other website to our
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1585
website. Back links are important for SEO because search
engine algorithms give credit, if any website has large
number of back links. As well as back links increase, website
popularity will increase.
Fig-3.2 Search Engine Optimization Process
4. RESULT
4.1 User Process
Fig -4.1 product listing in user site
Fig -4.2 payment process
4.2 Authentication Process
Fig 4.3 OTP SMS
Fig 4.4 E-Mail OTP
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1586
Fig-4.5 verification process in user site
4.3 Admin Process
Fig 4.6 Order Status
Fig -4.7 Order Accepted Status
Fig -4.8 User Information
5. CONCLUSION
Here we have proposed a security ass transaction time. We
know that during e-commerce transaction, the security
threat get increased. In this we make e-commerce system
more secure and prevent the website from unauthentic
operations. Thus we have implemented successfully with
OTP verification using SMS and Email messages.
REFERENCES
[1] Purva Goyal “ImplementationonEnhancingSecurityofE-
commerce Site for Digital Marketing “, Volume 3,2018.
[2] Vinitha Stephie. V and M. Lakshmi,” Design and
implementation of e-commerce web application”,vol.12, no.
16, august 2017.
[3] Shashank Narayan Srivastava1, Suhani Kshatriya2,
Rajkumar Singh Rathore3 “Search Engine Optimizationin E-
Commerce Sites”, Volume: 04 Issue: 05 ,May -2017.
[4] V.Srikanth "Ecommerce online securityandtrustmarks".
IJCET ISSN 0976 – 6375, Volume 3, Issue 2, July- September
(2012).

More Related Content

What's hot

CTI Tokenization Concepts 160408B
CTI Tokenization Concepts 160408BCTI Tokenization Concepts 160408B
CTI Tokenization Concepts 160408BPatrick Maroney
 
IRJET- Identification of Clone Attacks in Social Networking Sites
IRJET-  	  Identification of Clone Attacks in Social Networking SitesIRJET-  	  Identification of Clone Attacks in Social Networking Sites
IRJET- Identification of Clone Attacks in Social Networking SitesIRJET Journal
 
An Anti-Phishing Framework Based on Visual Cryptography
An Anti-Phishing Framework Based on Visual CryptographyAn Anti-Phishing Framework Based on Visual Cryptography
An Anti-Phishing Framework Based on Visual CryptographyIRJET Journal
 
RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014EMC
 
Analyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - ChinaAnalyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - ChinaEMC
 
IRJET- Customer Feedback Analysis using Machine Learning
IRJET-  	  Customer Feedback Analysis using Machine LearningIRJET-  	  Customer Feedback Analysis using Machine Learning
IRJET- Customer Feedback Analysis using Machine LearningIRJET Journal
 
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usenProtecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usenCMR WORLD TECH
 
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...IRJET Journal
 
Top gdpr assessment tools
Top  gdpr assessment toolsTop  gdpr assessment tools
Top gdpr assessment toolsRajivarnan R
 

What's hot (12)

CTI Tokenization Concepts 160408B
CTI Tokenization Concepts 160408BCTI Tokenization Concepts 160408B
CTI Tokenization Concepts 160408B
 
50120130405019
5012013040501950120130405019
50120130405019
 
IRJET- Identification of Clone Attacks in Social Networking Sites
IRJET-  	  Identification of Clone Attacks in Social Networking SitesIRJET-  	  Identification of Clone Attacks in Social Networking Sites
IRJET- Identification of Clone Attacks in Social Networking Sites
 
EFFECTIVE IN-HOUSE VOTING AND VERIFICATION USING BLOCK CHAIN IMPLEMENTATION
EFFECTIVE IN-HOUSE VOTING AND VERIFICATION USING BLOCK CHAIN IMPLEMENTATIONEFFECTIVE IN-HOUSE VOTING AND VERIFICATION USING BLOCK CHAIN IMPLEMENTATION
EFFECTIVE IN-HOUSE VOTING AND VERIFICATION USING BLOCK CHAIN IMPLEMENTATION
 
An Anti-Phishing Framework Based on Visual Cryptography
An Anti-Phishing Framework Based on Visual CryptographyAn Anti-Phishing Framework Based on Visual Cryptography
An Anti-Phishing Framework Based on Visual Cryptography
 
RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014
 
Analyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - ChinaAnalyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - China
 
IRJET- Customer Feedback Analysis using Machine Learning
IRJET-  	  Customer Feedback Analysis using Machine LearningIRJET-  	  Customer Feedback Analysis using Machine Learning
IRJET- Customer Feedback Analysis using Machine Learning
 
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usenProtecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
 
50120130406020
5012013040602050120130406020
50120130406020
 
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
 
Top gdpr assessment tools
Top  gdpr assessment toolsTop  gdpr assessment tools
Top gdpr assessment tools
 

Similar to IRJET - E-Commerce Website With Enhanced Security

IRJET- Multi Design - Pattern React Application with Django Backend
IRJET- Multi Design - Pattern React Application with Django BackendIRJET- Multi Design - Pattern React Application with Django Backend
IRJET- Multi Design - Pattern React Application with Django BackendIRJET Journal
 
IRJET- Website Health Checker
IRJET- Website Health CheckerIRJET- Website Health Checker
IRJET- Website Health CheckerIRJET Journal
 
Phishing Website Detection Paradigm using XGBoost
Phishing Website Detection Paradigm using XGBoostPhishing Website Detection Paradigm using XGBoost
Phishing Website Detection Paradigm using XGBoostIRJET Journal
 
IRJET- Virtual Business Analyst using a Progressive Web Application
IRJET- Virtual Business Analyst using a Progressive Web ApplicationIRJET- Virtual Business Analyst using a Progressive Web Application
IRJET- Virtual Business Analyst using a Progressive Web ApplicationIRJET Journal
 
IRJET- Search Engine Optimization (Seo)
IRJET-  	  Search Engine Optimization (Seo)IRJET-  	  Search Engine Optimization (Seo)
IRJET- Search Engine Optimization (Seo)IRJET Journal
 
Retrospect of Search Engine Optimization Techniques
Retrospect of Search Engine Optimization TechniquesRetrospect of Search Engine Optimization Techniques
Retrospect of Search Engine Optimization TechniquesIRJET Journal
 
Calculating Rank of Web Documents Using Its Content and Link Analysis
Calculating Rank of Web Documents Using Its Content and Link AnalysisCalculating Rank of Web Documents Using Its Content and Link Analysis
Calculating Rank of Web Documents Using Its Content and Link AnalysisIRJET Journal
 
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET- Detecting the Phishing Websites using Enhance Secure AlgorithmIRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET- Detecting the Phishing Websites using Enhance Secure AlgorithmIRJET Journal
 
IRJET - Monitoring Best Product using Data Mining Technique
IRJET -  	  Monitoring Best Product using Data Mining TechniqueIRJET -  	  Monitoring Best Product using Data Mining Technique
IRJET - Monitoring Best Product using Data Mining TechniqueIRJET Journal
 
11.0001www.iiste.org call for paper. quality control solutions for niche mark...
11.0001www.iiste.org call for paper. quality control solutions for niche mark...11.0001www.iiste.org call for paper. quality control solutions for niche mark...
11.0001www.iiste.org call for paper. quality control solutions for niche mark...Alexander Decker
 
Phishing Website Detection Using Machine Learning
Phishing Website Detection Using Machine LearningPhishing Website Detection Using Machine Learning
Phishing Website Detection Using Machine LearningIRJET Journal
 
IRJET- Opinion Summarization using Soft Computing and Information Retrieval
IRJET- Opinion Summarization using Soft Computing and Information RetrievalIRJET- Opinion Summarization using Soft Computing and Information Retrieval
IRJET- Opinion Summarization using Soft Computing and Information RetrievalIRJET Journal
 
IRJET- Sentimental Prediction of Users Perspective through Live Streaming : T...
IRJET- Sentimental Prediction of Users Perspective through Live Streaming : T...IRJET- Sentimental Prediction of Users Perspective through Live Streaming : T...
IRJET- Sentimental Prediction of Users Perspective through Live Streaming : T...IRJET Journal
 
IRJET- Advanced Phishing Identification Technique using Machine Learning
IRJET-  	  Advanced Phishing Identification Technique using Machine LearningIRJET-  	  Advanced Phishing Identification Technique using Machine Learning
IRJET- Advanced Phishing Identification Technique using Machine LearningIRJET Journal
 
IRJET- Phishing Website Detection based on Machine Learning
IRJET- Phishing Website Detection based on Machine LearningIRJET- Phishing Website Detection based on Machine Learning
IRJET- Phishing Website Detection based on Machine LearningIRJET Journal
 
IRJET - Digital Advertisement using Artificial Intelligence for Data Anal...
IRJET -  	  Digital Advertisement using Artificial Intelligence for Data Anal...IRJET -  	  Digital Advertisement using Artificial Intelligence for Data Anal...
IRJET - Digital Advertisement using Artificial Intelligence for Data Anal...IRJET Journal
 
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET Journal
 
DEVELOPMENT OF A RANKING ALGORITHM FOR SEARCH ENGINE OPTIMIZATION
DEVELOPMENT OF A RANKING ALGORITHM FOR SEARCH ENGINE OPTIMIZATIONDEVELOPMENT OF A RANKING ALGORITHM FOR SEARCH ENGINE OPTIMIZATION
DEVELOPMENT OF A RANKING ALGORITHM FOR SEARCH ENGINE OPTIMIZATIONIJCSIT Journal
 
Product Comparison Website using Web scraping and Machine learning.
Product Comparison Website using Web scraping and Machine learning.Product Comparison Website using Web scraping and Machine learning.
Product Comparison Website using Web scraping and Machine learning.IRJET Journal
 

Similar to IRJET - E-Commerce Website With Enhanced Security (20)

IRJET- Multi Design - Pattern React Application with Django Backend
IRJET- Multi Design - Pattern React Application with Django BackendIRJET- Multi Design - Pattern React Application with Django Backend
IRJET- Multi Design - Pattern React Application with Django Backend
 
IRJET- Website Health Checker
IRJET- Website Health CheckerIRJET- Website Health Checker
IRJET- Website Health Checker
 
Phishing Website Detection Paradigm using XGBoost
Phishing Website Detection Paradigm using XGBoostPhishing Website Detection Paradigm using XGBoost
Phishing Website Detection Paradigm using XGBoost
 
IRJET- Virtual Business Analyst using a Progressive Web Application
IRJET- Virtual Business Analyst using a Progressive Web ApplicationIRJET- Virtual Business Analyst using a Progressive Web Application
IRJET- Virtual Business Analyst using a Progressive Web Application
 
IRJET- Search Engine Optimization (Seo)
IRJET-  	  Search Engine Optimization (Seo)IRJET-  	  Search Engine Optimization (Seo)
IRJET- Search Engine Optimization (Seo)
 
Retrospect of Search Engine Optimization Techniques
Retrospect of Search Engine Optimization TechniquesRetrospect of Search Engine Optimization Techniques
Retrospect of Search Engine Optimization Techniques
 
Calculating Rank of Web Documents Using Its Content and Link Analysis
Calculating Rank of Web Documents Using Its Content and Link AnalysisCalculating Rank of Web Documents Using Its Content and Link Analysis
Calculating Rank of Web Documents Using Its Content and Link Analysis
 
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET- Detecting the Phishing Websites using Enhance Secure AlgorithmIRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
 
IRJET - Monitoring Best Product using Data Mining Technique
IRJET -  	  Monitoring Best Product using Data Mining TechniqueIRJET -  	  Monitoring Best Product using Data Mining Technique
IRJET - Monitoring Best Product using Data Mining Technique
 
11.0001www.iiste.org call for paper. quality control solutions for niche mark...
11.0001www.iiste.org call for paper. quality control solutions for niche mark...11.0001www.iiste.org call for paper. quality control solutions for niche mark...
11.0001www.iiste.org call for paper. quality control solutions for niche mark...
 
Phishing Website Detection Using Machine Learning
Phishing Website Detection Using Machine LearningPhishing Website Detection Using Machine Learning
Phishing Website Detection Using Machine Learning
 
IRJET- Opinion Summarization using Soft Computing and Information Retrieval
IRJET- Opinion Summarization using Soft Computing and Information RetrievalIRJET- Opinion Summarization using Soft Computing and Information Retrieval
IRJET- Opinion Summarization using Soft Computing and Information Retrieval
 
IRJET- Sentimental Prediction of Users Perspective through Live Streaming : T...
IRJET- Sentimental Prediction of Users Perspective through Live Streaming : T...IRJET- Sentimental Prediction of Users Perspective through Live Streaming : T...
IRJET- Sentimental Prediction of Users Perspective through Live Streaming : T...
 
IRJET- Advanced Phishing Identification Technique using Machine Learning
IRJET-  	  Advanced Phishing Identification Technique using Machine LearningIRJET-  	  Advanced Phishing Identification Technique using Machine Learning
IRJET- Advanced Phishing Identification Technique using Machine Learning
 
IRJET- Phishing Website Detection based on Machine Learning
IRJET- Phishing Website Detection based on Machine LearningIRJET- Phishing Website Detection based on Machine Learning
IRJET- Phishing Website Detection based on Machine Learning
 
IRJET - Digital Advertisement using Artificial Intelligence for Data Anal...
IRJET -  	  Digital Advertisement using Artificial Intelligence for Data Anal...IRJET -  	  Digital Advertisement using Artificial Intelligence for Data Anal...
IRJET - Digital Advertisement using Artificial Intelligence for Data Anal...
 
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
 
Touch With Industry
Touch With IndustryTouch With Industry
Touch With Industry
 
DEVELOPMENT OF A RANKING ALGORITHM FOR SEARCH ENGINE OPTIMIZATION
DEVELOPMENT OF A RANKING ALGORITHM FOR SEARCH ENGINE OPTIMIZATIONDEVELOPMENT OF A RANKING ALGORITHM FOR SEARCH ENGINE OPTIMIZATION
DEVELOPMENT OF A RANKING ALGORITHM FOR SEARCH ENGINE OPTIMIZATION
 
Product Comparison Website using Web scraping and Machine learning.
Product Comparison Website using Web scraping and Machine learning.Product Comparison Website using Web scraping and Machine learning.
Product Comparison Website using Web scraping and Machine learning.
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 

Recently uploaded (20)

High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 

IRJET - E-Commerce Website With Enhanced Security

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1583 E-Commerce Website with Enhanced Security Dr.S.Brindha1, Ms.K.Sudha2, A. Anu shree3, A. Jai jansi4, G. Nandhini5 1 HOD, Dept. of computer networking, psg polytechnic college, Tamil nadu, India 2 Professor, Dept. of computer networking, psg polytechnic college, Tamil nadu, India 3,4,5Student, Dept. of computer networking, psg polytechnic college, Tamil nadu, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - E-commerce websites enable the distribution, selling, buying, marketingandservicingofproductsorservices over the internet. It helps to reduce costs while reaching a wider market. The primary goal of an e-commerce site is to sell goods and services in online. People can buy goods or products in online just by visiting website and ordering the items in online by making payments on online. In existing systems, there is always a threat to digital wallet due to hackers. E-commerce digital marketing with enhanced security is provided to prevent the websitefromhackers. Inthe proposed system, security at the transaction time is provided. Both OTP and e-mail messages to verify the user to secure the user account. But, in existing system they either sendOTPore- mail messages to verify the user account. In this way it makes e-commerce system more secure and preventthewebsitefrom unauthentic operations. Further, the product reachability by advertising and digital marketing strategies are provided. Search Engine Optimization (SEO) techniques are also added to make the website easily reachable by the people. Key Words: E-Commerce market, one time password, Security, Search engine optimization, Payment gateway. 1. INTRODUCTION E-commerce enhances efficiencyandflexibilityofthetrading activities. It minimizes the distance issues of trade. It allows user to view catalogues remotely. This system is beneficial for online e-commerce application as well as application for financial institutions. It is also required by several web applications. The demand of online buying is increasing day by day. The identification and authentication of a personal using cryptography, provides high assurance in its security model. We have a tendency to plan associatedegreeformula for enhancing the safety of OTP. SEO (Search Engine Optimization) is the development of subsequent the principle of the search engine such as site structure, webpage language and interaction diplomatic strategies for the balanced planning to improve the site search performance in the search engine and increasing the opportunity of customerdiscoveryandaccesstothewebsite. Fig-1.1 process of ecommerce 2. EXISTING SYSTEM In existing systems, there is always a threat to digital wallet due to hackers. E- Commerce digital marketing with enhanced security is provided to prevent the website from hackers. They either send OTP or e-mail messages to verify the user account. The existing system only provides text- based interface, which is not as user-friendly as Graphical user Interface. 2.1Disadvantages in Existing System a) The existing system can reach large numbers of users and their friends to spread spam, b) The existing system can obtain users’ personal information such as email address, home town, and gender, and etc. c) The existing system can “re-produce" by making other malicious apps popular. 3. PROPOSED SYSTEM In the proposed system, security at the transaction time is provided. In this we introduce a method to send both OTP and e-mail messages to verify the user to secure the user account. But, in existing system they either send OTP or e- mail messages to verify the user account. In this way we make e-commerce system more secure and prevent the website from unauthentic operations. Further, the product reachability by advertising and digital marketing strategies are provided. Search Engine Optimization (SEO) techniques
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1584 are also added to make the website easily reachable by the people. 3.1 Language(s) or Software tools used  MySQL (My Structured Query Language)  Java script and  PHP (Hypertext pre-processor)  HTML (Hypertext Markup Language)  CSS (cascading style sheet) The above are the required software tools tobuilda website. Product details will be entered to the database using MySQL software. Further security features include OTP, email verification. 3.2 Authentication Method In authentication we used OTP method. Static passwords have been in use which is vulnerable to attacks such asreply attack. One Time Password (OTP) is a particular kind of password that is valid only for only one login session or transaction. OTP provides a secure way for user authentication as it becomes invalid when used beyond the prescribed time frame. High level of randomness is the significant propertyrequiredforOTPs.Truerandomness can be generated from real-world parameters that can produce unpredictable variations in its output. This paper presents an embedded hardware OTP generation system based on remote request via DTMF signals. The proposed hardware uses a confluence of real-world parameters and software- based chaotic function on an embedded platform for OTP generation. The proposed system also facilitates change in the generation of OTPs via discretionary external inputs from users. Fig -3.1 OTP process In OTP process is our cloud server generates 12 bit OTP in that we programed for separating 6 bit OTP number for SMS and another 6 bit OTP number for email verification. 3.3 Search Engine Optimization SEO (Search Engine Optimization) is the development of subsequent the principle of the search engine such as site structure, webpage language and interaction diplomatic strategies for the balanced planning to improve the site search performance in the search engine and increasing the opportunity of customerdiscoveryandaccesstothewebsite. SEO is a scientific developmentidea andmethodology,which develops beside with the development of search engine,and promotes the development of search engines at the same time. The major factors for good ranking positions in all the main search engines are: 3.3.1On-page optimization Matching web page content and key phrases or keywords searched. The main factors to optimize web pages are keyword and key phrases density, keyword formatting, putting keywords in anchor text and the document meta- data (page title tags, Meta description tags, Meta keyword tags etc.). Each web page on some website should have different title tag, Meta tag description and Meta tag keywords. The number of timesthekeyphraseisrepeatedin the text of the web page is a key factor in determining the position for a key phrase. 3.3.2 External links (back links, backward links) and inbound links Google and other search engine counts link to a page from another website as vote for this page. In other words, web pages and websites with more external links from other websites will be ranked more highly. The quality of external links is also very important factor, so if links from other web pages are from a website with a good reputation and with relevant content and key phrases, then this ismorevaluable. Many of web focused companies should improve this aspect of search engine optimization in process called external link building and internal link architecture. Web centered companies should always try to get links from web pages with the higher Page Rank (PR) or from web pages witha PR rating at least four. Page Rank is a scale between 0 and 10 used by Google to determine the importance of websites according to the number and quality of inbound links and external links (back links). Incoming or external links to website should always come in natural textual form, rather than in graphic form (Banner adds images etc.). Google and other search engines does index or evaluate image links, but without textual links web companies won’tincreasewebsite rank or popularity. The Domain name maturity,Internal link structure, URL structure, Bounce rate etc. factors are very important for good ranking position in the search engine. 3.3.3 Off Page optimization This is the technique for making back links. Back links are normally termed as link back from other website to our
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1585 website. Back links are important for SEO because search engine algorithms give credit, if any website has large number of back links. As well as back links increase, website popularity will increase. Fig-3.2 Search Engine Optimization Process 4. RESULT 4.1 User Process Fig -4.1 product listing in user site Fig -4.2 payment process 4.2 Authentication Process Fig 4.3 OTP SMS Fig 4.4 E-Mail OTP
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1586 Fig-4.5 verification process in user site 4.3 Admin Process Fig 4.6 Order Status Fig -4.7 Order Accepted Status Fig -4.8 User Information 5. CONCLUSION Here we have proposed a security ass transaction time. We know that during e-commerce transaction, the security threat get increased. In this we make e-commerce system more secure and prevent the website from unauthentic operations. Thus we have implemented successfully with OTP verification using SMS and Email messages. REFERENCES [1] Purva Goyal “ImplementationonEnhancingSecurityofE- commerce Site for Digital Marketing “, Volume 3,2018. [2] Vinitha Stephie. V and M. Lakshmi,” Design and implementation of e-commerce web application”,vol.12, no. 16, august 2017. [3] Shashank Narayan Srivastava1, Suhani Kshatriya2, Rajkumar Singh Rathore3 “Search Engine Optimizationin E- Commerce Sites”, Volume: 04 Issue: 05 ,May -2017. [4] V.Srikanth "Ecommerce online securityandtrustmarks". IJCET ISSN 0976 – 6375, Volume 3, Issue 2, July- September (2012).