The document discusses cross-system user modeling and personalization on social media networks. It proposes the Friend Relationship-Based User Identification (FRUI) algorithm to identify identical users across different social media platforms based on their friendship networks. FRUI calculates a matching score for candidate user pairs and only high scoring pairs are considered matches. Two proposals are introduced to improve the efficiency of the algorithm. Experimental results show FRUI performs better than existing network structure-based methods. The real-world friendship network is highly individual, so using friendship structure to analyze cross-platform social media is more accurate.
A Survey on Trust Inference Network for Personalized Use from Online Data RatingIRJET Journal
This document discusses a proposed new trust model called the "Web of Credit" (WoC) model for inferring personalized trust measures from online rating data in social networks. The WoC model constructs a trust network by tracking the flow of "credit" assigned from one user to another based on their ratings. It combines the objectiveness of reputation-based models which use rating histories, with the individualism of "Web of Trust" models which allow personalized trust measures. The document also presents the Core-Trust algorithm for inferring trust in this WoC-based network by considering factors like credit, risk, bias, and impedance derived from rating data. Experiments on real datasets showed the WoC model can infer trust more accurately than
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSNIJERDJOURNAL
ABSTRACT: In multi-hop ad hoc networks there exists a problem of identifying and isolating misbehaving nodes which refuses to forward packets. Audit-based Misbehavior Detection (AMD) is a comprehensive system that effectively and efficiently isolates both continuous and selective packet droppers. The AMD system integrates reputation management, trustworthy route discovery, and identification of misbehaving nodes based on behavioral audits. Compared to previous methods, AMD evaluates node behavior on a per-packet basis, without employing energy-expensive overhearing techniques or intensive acknowledgment schemes. Moreover, AMD can detect selective dropping attacks even if end-to-end traffic is encrypted and can be applied to multichannel networks or networks consisting of nodes with directional antennas. This work implements the AMD approach by considering the rushing attack. The analysis of the results confirms that AMD based method with rushing attack performs better as compared to the non rushing attack.
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysisijceronline
This document summarizes a research paper that proposes a new method for identifying denial of service (DoS) attacks using multivariate correlation analysis (MCA). The method involves three main steps: 1) generating basic features from network traffic, 2) using MCA to extract correlations between features and generate triangle area maps, and 3) using an anomaly-based detection mechanism to distinguish attacks from normal traffic based on differences from pre-generated normal profiles. The researchers evaluate their method on the KDD Cup 99 dataset and achieve moderate detection performance. However, they identify issues related to differences in feature scales that reduce detection of some attacks. They propose using statistical normalization to address this.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
CoCoWa is a collaborative approach to detecting selfish nodes in mobile ad-hoc networks (MANETs) and delay tolerant networks (DTNs) that improves upon local watchdog approaches. It combines local watchdog detections with the dissemination of information about detected selfish nodes between nodes during contacts. This reduces the time and increases the precision of detecting selfish nodes by reducing the effects of false positives and negatives generated by local watchdogs. The paper presents an analytical model and experimental evaluation using mobility traces showing CoCoWa provides significantly faster and more accurate detection of selfish nodes with reduced overhead compared to traditional watchdog approaches.
ATC full paper format-2014 Social Networks in Telecommunications Asoka Korale...Asoka Korale
This summarizes a document describing a novel approach to analyzing social networks in mobile telecommunications by modeling call patterns between subscribers. It identifies leaders and communities by processing call initiation and termination data. Communities are detected using influence diffusion algorithms. Results are presented from a corporate network analyzed, identifying leaders and communities formed around them. The identified leaders are validated using existing centrality measures. The approach allows estimating the degree to which individuals belong to multiple overlapping communities.
SelCSP: A Framework to Facilitate Selection of Cloud Service Providers1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CR...IJNSA Journal
The latest trend in the field of computing is the migration of organizations and offloading the tasks to
cloud. The security concerns hinder the widespread acceptance of cloud. Of various, the DDoS in cloud is
found to be the most dangerous. Various approaches are there to defend DDoS in cloud, but have lots of
pitfalls. This paper proposes a new reputation-based framework for mitigating the DDoS in cloud by
classifying the users into three categories as well-reputed, reputed and ill-reputed based on credits. The
fact that attack is fired by malicious programs installed by the attackers in the compromised systems and
they exhibit similar characteristics used for discriminating the DDoS traffic from flash crowds. Credits of
clients who show signs of similarity are decremented. This reduces the computational and storage
overhead. This proposed method is expected to take the edge off DDoS in a cloud environment and ensures
full security to cloud resources. CloudSim simulation results also proved that the deployment of this
approach improved the resource utilization with reduced cost.
A Survey on Trust Inference Network for Personalized Use from Online Data RatingIRJET Journal
This document discusses a proposed new trust model called the "Web of Credit" (WoC) model for inferring personalized trust measures from online rating data in social networks. The WoC model constructs a trust network by tracking the flow of "credit" assigned from one user to another based on their ratings. It combines the objectiveness of reputation-based models which use rating histories, with the individualism of "Web of Trust" models which allow personalized trust measures. The document also presents the Core-Trust algorithm for inferring trust in this WoC-based network by considering factors like credit, risk, bias, and impedance derived from rating data. Experiments on real datasets showed the WoC model can infer trust more accurately than
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSNIJERDJOURNAL
ABSTRACT: In multi-hop ad hoc networks there exists a problem of identifying and isolating misbehaving nodes which refuses to forward packets. Audit-based Misbehavior Detection (AMD) is a comprehensive system that effectively and efficiently isolates both continuous and selective packet droppers. The AMD system integrates reputation management, trustworthy route discovery, and identification of misbehaving nodes based on behavioral audits. Compared to previous methods, AMD evaluates node behavior on a per-packet basis, without employing energy-expensive overhearing techniques or intensive acknowledgment schemes. Moreover, AMD can detect selective dropping attacks even if end-to-end traffic is encrypted and can be applied to multichannel networks or networks consisting of nodes with directional antennas. This work implements the AMD approach by considering the rushing attack. The analysis of the results confirms that AMD based method with rushing attack performs better as compared to the non rushing attack.
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysisijceronline
This document summarizes a research paper that proposes a new method for identifying denial of service (DoS) attacks using multivariate correlation analysis (MCA). The method involves three main steps: 1) generating basic features from network traffic, 2) using MCA to extract correlations between features and generate triangle area maps, and 3) using an anomaly-based detection mechanism to distinguish attacks from normal traffic based on differences from pre-generated normal profiles. The researchers evaluate their method on the KDD Cup 99 dataset and achieve moderate detection performance. However, they identify issues related to differences in feature scales that reduce detection of some attacks. They propose using statistical normalization to address this.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
CoCoWa is a collaborative approach to detecting selfish nodes in mobile ad-hoc networks (MANETs) and delay tolerant networks (DTNs) that improves upon local watchdog approaches. It combines local watchdog detections with the dissemination of information about detected selfish nodes between nodes during contacts. This reduces the time and increases the precision of detecting selfish nodes by reducing the effects of false positives and negatives generated by local watchdogs. The paper presents an analytical model and experimental evaluation using mobility traces showing CoCoWa provides significantly faster and more accurate detection of selfish nodes with reduced overhead compared to traditional watchdog approaches.
ATC full paper format-2014 Social Networks in Telecommunications Asoka Korale...Asoka Korale
This summarizes a document describing a novel approach to analyzing social networks in mobile telecommunications by modeling call patterns between subscribers. It identifies leaders and communities by processing call initiation and termination data. Communities are detected using influence diffusion algorithms. Results are presented from a corporate network analyzed, identifying leaders and communities formed around them. The identified leaders are validated using existing centrality measures. The approach allows estimating the degree to which individuals belong to multiple overlapping communities.
SelCSP: A Framework to Facilitate Selection of Cloud Service Providers1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CR...IJNSA Journal
The latest trend in the field of computing is the migration of organizations and offloading the tasks to
cloud. The security concerns hinder the widespread acceptance of cloud. Of various, the DDoS in cloud is
found to be the most dangerous. Various approaches are there to defend DDoS in cloud, but have lots of
pitfalls. This paper proposes a new reputation-based framework for mitigating the DDoS in cloud by
classifying the users into three categories as well-reputed, reputed and ill-reputed based on credits. The
fact that attack is fired by malicious programs installed by the attackers in the compromised systems and
they exhibit similar characteristics used for discriminating the DDoS traffic from flash crowds. Credits of
clients who show signs of similarity are decremented. This reduces the computational and storage
overhead. This proposed method is expected to take the edge off DDoS in a cloud environment and ensures
full security to cloud resources. CloudSim simulation results also proved that the deployment of this
approach improved the resource utilization with reduced cost.
Secure and Trustable Routing in WSN for End to End CommunicationIJMTST Journal
In WSNs, end-to-end data communication security is required to combine data from source to destination. Combined data are transmitted in a path exist of connected links. All previous end to end routing protocols propose solutions in which each n every link uses a pair wise shared key to protect data. In this paper, we propose a novel design of secure end to end data communication. We give a newly published group key pre distribution scheme in this design, such that there is a unique group key, called path key, to protect data transmitted in the whole routing path. Specifically, instead of using several pair wise shared keys to repeatedly perform encryption and decryption over every link, our proposed scheme uses a unique source to destination path key to protect data transmitted over the path. Our proposed protocol can authenticate sensors to establish the path and to establish the path key. The main advantage using our protocol is to reduce the time needed to process data by middle sensors. Moreover, our proposed authentication scheme has complexity O(n), where n is the number of sensors in a communication path, which is several from all authentication schemes till now, which are one-to-one authentications with complexity O(n2). The security of the protocol is computationally secure. Active Trust can importantly improve the data route success probability and ability opposite black hole attacks and can optimize network lifetime.
Prediction of User Rare Sequential Topic Patterns of Internet UsersIRJET Journal
This document discusses predicting rare sequential topic patterns of internet users based on analyzing their activities on Gmail and Twitter. It proposes extracting sequential topic patterns (STPs) from users' document streams on these platforms to characterize their behaviors. An algorithm is presented for mining user-aware rare sequential topic patterns (URSTPs) that are globally rare but locally frequent for specific users, which could reveal personalized or abnormal behaviors. The architecture involves preprocessing users' content with natural language processing, generating STPs, and applying a rare pattern analysis algorithm to the extracted phrases to identify matches and analyze individual user behaviors.
IRJET- Social Network Mental Disorders Detection Via Online Social Media MiningIRJET Journal
This document summarizes a research paper about detecting social network mental disorders via online social media mining. The paper proposes a system to analyze user posts and interactions on social media like Facebook to detect signs of mental disorders like information overload or cyber-relationship addiction. The system uses techniques like sentiment analysis of posts using CNNs and classification of user stress levels using TSVM. If a user is detected as having a mental disorder, the system can recommend nearby hospitals on a map and send the user precautionary information to avoid disorders and promote well-being. The goal is to help detect mental disorders earlier through social media analysis to enable timely clinical intervention.
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...IRJET Journal
This document discusses techniques for detecting malicious packet dropping in wireless ad hoc networks. It begins with an introduction to wireless ad hoc networks and the security issues they face, such as packet dropping attacks. It then reviews existing literature on detecting such attacks using techniques like reputation systems. The document proposes a new detection mechanism that calculates the auto-correlation function of packet loss bitmaps to identify correlations between lost packets and determine if packet dropping is intentional. It describes the key phases of this approach, including key generation, auditing suspected nodes, and detecting malicious nodes. Finally, it discusses using randomized routing to mitigate the effects of detected packet dropping attacks.
Quality of Service in Publish/Subscribe MiddlewareAngelo Corsaro
During the last decade the publish/subscribe communication paradigm gained a central role in the design and development of a large class of applications ranging from stock exchange systems to news tickers, from air traffic control to defense systems. This success is mainly due to the capacity of publish/subscribe to completely decouple communication participants, thus allowing the development of applications that are more tolerant to communications asynchrony. This chapter introduces the publish/subscribe communication paradigm, stressing those charac- teristics that have a stronger impact on the quality of service provided to partic- ipants. The chapter also introduce the reader to two widely recognized industrial standards for publish/subscribe systems: the Java Message Service (JMS) and the Data Distribution Service (DDS).
An Efficient Secured And Inspection of Malicious Node Using Double Encryption...IRJET Journal
This document proposes a method called Statistical-based Detection of Black hole and Grey hole attackers (SDBG) to detect both individual and colluding attacks in delay tolerant networks (DTNs). SDBG works by having a trusted authority monitor nodes' behavior based on their encounter records, message records, and forwarding histories. It aims to improve detection accuracy and reduce the impact of false positives compared to existing detection methods. The methodology involves network and authority creation, route finding and data forwarding, and detecting colluding attacks based on monitoring nodes' interactions and messages. Simulation results show SDBG can effectively detect attacks with varying drop rates even under collusion with high accuracy and low false positives.
Content Sharing over Smartphone-Based Delay-Tolerant NetworksIJERA Editor
With the growing number of smartphone end users, peer-to-peer ad hoc content giving is likely to occur often. Thus, new articles sharing mechanisms must be developed since traditional information delivery schemes will not be efficient with regard to content sharing due to the sporadic connectivity between smartphones on the market. To obtain data delivery such challenging environments, researchers include proposed the employment of store-carry-forward methodologies, in which a node stores a communication and holds it until a forwarding prospect arises through an encounter together with other nodes. Most past works in this field have dedicated to the conjecture of whether two nodes could encounter the other, without thinking about the place and also time from the encounter. In this particular paper, we propose to her discover-predict-deliver as a possible efficient articles sharing scheme for delay-tolerant touch screen phone networks. In this proposed scheme, contents are usually shared while using the mobility information of people. Specifically, our strategy employs the mobility understanding algorithm to spot places inside your own home and outdoor.
An exaustive survey of trust models in p2 p networkijwscjournal
Most of the peers accessing the services are under the assumption that the service accessed in a P2P
network is utmost secured. By means of prevailing hard security mechanisms, security goals like
authentication, authorization, privacy, non repudiation of services and other hard security issues are
resolved. But these mechanisms fail to provide soft security. An exhaustive survey of existing trust and
reputation models in P2P network regarding service provisioning is presented and challenges are listed.
Trust issues like trust bootstrapping, trust evidence procurement, trust assessment, trust interaction
outcome evaluation and other trust based classification of peer’s behavior into trusted,, inconsistent, un
trusted, malicious, betraying, redemptive are discussed,
The document proposes an Efficient Distributed Trust Model (EDTM) for wireless sensor networks. EDTM calculates direct trust based on communication, energy, and data factors, and calculates recommendation trust based on reliability and familiarity. This provides a more precise evaluation of sensor node trustworthiness than models only using communication behavior. EDTM also considers trust for non-neighbor nodes, addresses uncertainty, and models trust as dynamic over time and environment conditions. Simulation results show EDTM outperforms other models like NBBTE in preventing security breaches.
APPLICATION OF CLUSTERING TO ANALYZE ACADEMIC SOCIAL NETWORKSIJwest
This document discusses clustering academic social networks to analyze relationships between researchers. It proposes measuring similarity between researcher profiles based on attributes like research interests, publications, and co-authors. The profiles are represented using FOAF and RDF, with attributes like name, email, affiliation, interests, publications and coauthors. Similarities are calculated using measures like Euclidean distance, cosine similarity and Jaccard coefficient. Clustering profiles based on these similarities can simplify analysis of the large, dense social networks by identifying groups of related researchers.
Comprehensive Analysis on the Vulnerability and Efficiency of P2P Networks un...ijp2p
Peer-to-peer systems are the networks consisting of a group of nodes possible to be as wide as the Internet.
These networks are required of evaluation mechanisms and distributed control and configurations, so each
peer (node) will be able to communicate with other peers. P2P networks actually act as the specific
transportation systems created to provide some services such as searching, large-scale storage, context
sharing, and supervisioning. Changes in configuration, possibly the resultant effects of faults and failures
or of the natural nodes behavior, are one of the most important features in P2P networks. Resilience to
faults and failures, and also an appropriate dealing with threats and attacks, are the main requirements of
today’s most communication systems and networks. Thus, since P2P networks can be individually used as
an infrastructure and an alternative for many other communication networks, they have to be more
reliable, accessible, and resilient to the faults, failures and attacks compared to the client/server approach.
In this work on progress, we present a detailed study on the behavior of various P2P networks toward
faults and failures, and focus on fault-tolerance subject. We consider two different static failure scenarios:
a) a random strategy in which nodes or edges of the network will be removed with an equal probability and
without any knowledge of the network’s infrastructure, b) a targeted strategy that uses some information
about the nodes, and in which the nodes with the highest degree have the most priority to be attacked. By
static faults, we mean a situation where the nodes or components encounter some faults before the network
starts to work or through its operation, and will remain faulty to the end of the work session. Our goal is to
introduce various measures to analyzing P2P networks evaluating their vulnerability rate. The presented
criteria can be used for evaluating the reliability and vulnerability of P2P networks toward both random
and targeted failures. There is no limit to the number and types of failures, the presented measures are able
to be used for different types of failures and even a wide range of networks.
The document discusses a framework for agent communication and trust in multi-agent systems, where agents interact flexibly using logical rules called dialogue games. It proposes classifying agents based on trustworthiness to determine how reliable they are when transmitting information. The goal is to examine all available data to determine an agent's trustworthiness as an information transmitter in highly dynamic multi-agent environments.
Discovering Influential User by Coupling Multiplex Heterogeneous OSN’SIRJET Journal
This document proposes a framework for modeling and analyzing influence diffusion in multiplex online social networks (OSNs). It introduces coupling plans to represent how data spreads across overlapping users in multiple OSNs. Specifically, it proposes both lossless and lossy coupling plans to map multiple networks into a single network. Extensive tests on real and synthetic datasets show the coupling plans can effectively identify influential users by considering their roles across multiple OSNs. The framework provides insights into influence propagation in multiplex networks and can solve the minimum cost influence problem by exploiting algorithms for single networks.
Identical Users in Different Social Media Provides Uniform Network Structure ...IJMTST Journal
The primary point of this venture is secure the client login and information sharing among the interpersonal organizations like Gmail, Face book and furthermore find unknown client utilizing this systems. On the off chance that the first client not accessible in the systems, but rather their companions or mysterious client knows their login points of interest implies conceivable to abuse their talks. In this venture we need to defeat the mysterious client utilizing the system without unique client information. Unapproved client utilizing the login to talk, share pictures or recordings and so on. This is the issue to be overcome in this venture .That implies client initially enlist their subtle elements with one secured question and reply. Since the unknown client can erase their talk or information. In this by utilizing the secured questions we need to recuperate the unapproved client talk history or imparting subtle elements to their IP address or MAC address. So in this venture they have discovered an approach to keep the mysterious clients abuse the first client login points.
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)paperpublications3
Abstract: The main aim of this project is secure the user login and data sharing among the social networks like Gmail, Facebook and also find anonymous user using this networks. If the original user not available in the networks, but their friends or anonymous user knows their login details means possible to misuse their chats. In this project we have to overcome the anonymous user using the network without original user knowledge. Unauthorized user using the login to chat, share images or videos etc This is the problem to be overcome in this project .That means user first register their details with one secured question and answer. Because the anonymous user can delete their chat or data In this by using the secured questions we have to recover the unauthorized user chat history or sharing details with their IP address or MAC address. So in this project they have found out a way to prevent the anonymous users misuse the original user login details.
IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )SBGC
ieee projects 2013 for me cse trichy, ieee projects 2013 for me cse Karur, ieee projects 2013 for me cse chennai, ieee projects 2013 for me cse, ieee projects, ieee projects for cse, ieee projects 2013, ieee projects 2013 for me cse Thanjavur, ieee projects 2013 for me cse Perambalur,
This document provides information about IEEE projects provided by SEABIRDS. It lists the domains and technologies that projects are available in, including Java, J2ME, J2EE, .NET, MATLAB, and NS2. It describes the two categories of project assistance provided - for students with their own project ideas or selecting from their list. It lists the types of students they provide projects for, including various engineering and technology degrees as well as business and management degrees. It also lists the deliverables and support provided for projects.
Ieee projects-2013-2014-title-list-for-me-be-mphil-final-year-studentsPruthivi Rajan
This document provides information about IEEE projects provided by SEABIRDS. It lists the domains and technologies that projects are available in, including Java, J2ME, J2EE, .NET, MATLAB, and NS2. It describes the two categories of project assistance provided - for students with their own project ideas or selecting from their project list. Details are provided about the project deliverables and support provided. A list is then given of the engineering and technology degrees and programs that projects are available for.
Automated Feature Selection and Churn Prediction using Deep Learning ModelsIRJET Journal
This document discusses using deep learning models for churn prediction in the telecommunications industry. It begins with an introduction to churn prediction and feature selection challenges. It then provides an overview of deep learning techniques, including artificial neural networks, convolutional neural networks, and their applications. The document proposes three deep learning architectures for churn prediction and experiments with them on two telecom datasets. The results show deep learning models can achieve performance comparable to traditional models without manual feature engineering.
Secure and Trustable Routing in WSN for End to End CommunicationIJMTST Journal
In WSNs, end-to-end data communication security is required to combine data from source to destination. Combined data are transmitted in a path exist of connected links. All previous end to end routing protocols propose solutions in which each n every link uses a pair wise shared key to protect data. In this paper, we propose a novel design of secure end to end data communication. We give a newly published group key pre distribution scheme in this design, such that there is a unique group key, called path key, to protect data transmitted in the whole routing path. Specifically, instead of using several pair wise shared keys to repeatedly perform encryption and decryption over every link, our proposed scheme uses a unique source to destination path key to protect data transmitted over the path. Our proposed protocol can authenticate sensors to establish the path and to establish the path key. The main advantage using our protocol is to reduce the time needed to process data by middle sensors. Moreover, our proposed authentication scheme has complexity O(n), where n is the number of sensors in a communication path, which is several from all authentication schemes till now, which are one-to-one authentications with complexity O(n2). The security of the protocol is computationally secure. Active Trust can importantly improve the data route success probability and ability opposite black hole attacks and can optimize network lifetime.
Prediction of User Rare Sequential Topic Patterns of Internet UsersIRJET Journal
This document discusses predicting rare sequential topic patterns of internet users based on analyzing their activities on Gmail and Twitter. It proposes extracting sequential topic patterns (STPs) from users' document streams on these platforms to characterize their behaviors. An algorithm is presented for mining user-aware rare sequential topic patterns (URSTPs) that are globally rare but locally frequent for specific users, which could reveal personalized or abnormal behaviors. The architecture involves preprocessing users' content with natural language processing, generating STPs, and applying a rare pattern analysis algorithm to the extracted phrases to identify matches and analyze individual user behaviors.
IRJET- Social Network Mental Disorders Detection Via Online Social Media MiningIRJET Journal
This document summarizes a research paper about detecting social network mental disorders via online social media mining. The paper proposes a system to analyze user posts and interactions on social media like Facebook to detect signs of mental disorders like information overload or cyber-relationship addiction. The system uses techniques like sentiment analysis of posts using CNNs and classification of user stress levels using TSVM. If a user is detected as having a mental disorder, the system can recommend nearby hospitals on a map and send the user precautionary information to avoid disorders and promote well-being. The goal is to help detect mental disorders earlier through social media analysis to enable timely clinical intervention.
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...IRJET Journal
This document discusses techniques for detecting malicious packet dropping in wireless ad hoc networks. It begins with an introduction to wireless ad hoc networks and the security issues they face, such as packet dropping attacks. It then reviews existing literature on detecting such attacks using techniques like reputation systems. The document proposes a new detection mechanism that calculates the auto-correlation function of packet loss bitmaps to identify correlations between lost packets and determine if packet dropping is intentional. It describes the key phases of this approach, including key generation, auditing suspected nodes, and detecting malicious nodes. Finally, it discusses using randomized routing to mitigate the effects of detected packet dropping attacks.
Quality of Service in Publish/Subscribe MiddlewareAngelo Corsaro
During the last decade the publish/subscribe communication paradigm gained a central role in the design and development of a large class of applications ranging from stock exchange systems to news tickers, from air traffic control to defense systems. This success is mainly due to the capacity of publish/subscribe to completely decouple communication participants, thus allowing the development of applications that are more tolerant to communications asynchrony. This chapter introduces the publish/subscribe communication paradigm, stressing those charac- teristics that have a stronger impact on the quality of service provided to partic- ipants. The chapter also introduce the reader to two widely recognized industrial standards for publish/subscribe systems: the Java Message Service (JMS) and the Data Distribution Service (DDS).
An Efficient Secured And Inspection of Malicious Node Using Double Encryption...IRJET Journal
This document proposes a method called Statistical-based Detection of Black hole and Grey hole attackers (SDBG) to detect both individual and colluding attacks in delay tolerant networks (DTNs). SDBG works by having a trusted authority monitor nodes' behavior based on their encounter records, message records, and forwarding histories. It aims to improve detection accuracy and reduce the impact of false positives compared to existing detection methods. The methodology involves network and authority creation, route finding and data forwarding, and detecting colluding attacks based on monitoring nodes' interactions and messages. Simulation results show SDBG can effectively detect attacks with varying drop rates even under collusion with high accuracy and low false positives.
Content Sharing over Smartphone-Based Delay-Tolerant NetworksIJERA Editor
With the growing number of smartphone end users, peer-to-peer ad hoc content giving is likely to occur often. Thus, new articles sharing mechanisms must be developed since traditional information delivery schemes will not be efficient with regard to content sharing due to the sporadic connectivity between smartphones on the market. To obtain data delivery such challenging environments, researchers include proposed the employment of store-carry-forward methodologies, in which a node stores a communication and holds it until a forwarding prospect arises through an encounter together with other nodes. Most past works in this field have dedicated to the conjecture of whether two nodes could encounter the other, without thinking about the place and also time from the encounter. In this particular paper, we propose to her discover-predict-deliver as a possible efficient articles sharing scheme for delay-tolerant touch screen phone networks. In this proposed scheme, contents are usually shared while using the mobility information of people. Specifically, our strategy employs the mobility understanding algorithm to spot places inside your own home and outdoor.
An exaustive survey of trust models in p2 p networkijwscjournal
Most of the peers accessing the services are under the assumption that the service accessed in a P2P
network is utmost secured. By means of prevailing hard security mechanisms, security goals like
authentication, authorization, privacy, non repudiation of services and other hard security issues are
resolved. But these mechanisms fail to provide soft security. An exhaustive survey of existing trust and
reputation models in P2P network regarding service provisioning is presented and challenges are listed.
Trust issues like trust bootstrapping, trust evidence procurement, trust assessment, trust interaction
outcome evaluation and other trust based classification of peer’s behavior into trusted,, inconsistent, un
trusted, malicious, betraying, redemptive are discussed,
The document proposes an Efficient Distributed Trust Model (EDTM) for wireless sensor networks. EDTM calculates direct trust based on communication, energy, and data factors, and calculates recommendation trust based on reliability and familiarity. This provides a more precise evaluation of sensor node trustworthiness than models only using communication behavior. EDTM also considers trust for non-neighbor nodes, addresses uncertainty, and models trust as dynamic over time and environment conditions. Simulation results show EDTM outperforms other models like NBBTE in preventing security breaches.
APPLICATION OF CLUSTERING TO ANALYZE ACADEMIC SOCIAL NETWORKSIJwest
This document discusses clustering academic social networks to analyze relationships between researchers. It proposes measuring similarity between researcher profiles based on attributes like research interests, publications, and co-authors. The profiles are represented using FOAF and RDF, with attributes like name, email, affiliation, interests, publications and coauthors. Similarities are calculated using measures like Euclidean distance, cosine similarity and Jaccard coefficient. Clustering profiles based on these similarities can simplify analysis of the large, dense social networks by identifying groups of related researchers.
Comprehensive Analysis on the Vulnerability and Efficiency of P2P Networks un...ijp2p
Peer-to-peer systems are the networks consisting of a group of nodes possible to be as wide as the Internet.
These networks are required of evaluation mechanisms and distributed control and configurations, so each
peer (node) will be able to communicate with other peers. P2P networks actually act as the specific
transportation systems created to provide some services such as searching, large-scale storage, context
sharing, and supervisioning. Changes in configuration, possibly the resultant effects of faults and failures
or of the natural nodes behavior, are one of the most important features in P2P networks. Resilience to
faults and failures, and also an appropriate dealing with threats and attacks, are the main requirements of
today’s most communication systems and networks. Thus, since P2P networks can be individually used as
an infrastructure and an alternative for many other communication networks, they have to be more
reliable, accessible, and resilient to the faults, failures and attacks compared to the client/server approach.
In this work on progress, we present a detailed study on the behavior of various P2P networks toward
faults and failures, and focus on fault-tolerance subject. We consider two different static failure scenarios:
a) a random strategy in which nodes or edges of the network will be removed with an equal probability and
without any knowledge of the network’s infrastructure, b) a targeted strategy that uses some information
about the nodes, and in which the nodes with the highest degree have the most priority to be attacked. By
static faults, we mean a situation where the nodes or components encounter some faults before the network
starts to work or through its operation, and will remain faulty to the end of the work session. Our goal is to
introduce various measures to analyzing P2P networks evaluating their vulnerability rate. The presented
criteria can be used for evaluating the reliability and vulnerability of P2P networks toward both random
and targeted failures. There is no limit to the number and types of failures, the presented measures are able
to be used for different types of failures and even a wide range of networks.
The document discusses a framework for agent communication and trust in multi-agent systems, where agents interact flexibly using logical rules called dialogue games. It proposes classifying agents based on trustworthiness to determine how reliable they are when transmitting information. The goal is to examine all available data to determine an agent's trustworthiness as an information transmitter in highly dynamic multi-agent environments.
Discovering Influential User by Coupling Multiplex Heterogeneous OSN’SIRJET Journal
This document proposes a framework for modeling and analyzing influence diffusion in multiplex online social networks (OSNs). It introduces coupling plans to represent how data spreads across overlapping users in multiple OSNs. Specifically, it proposes both lossless and lossy coupling plans to map multiple networks into a single network. Extensive tests on real and synthetic datasets show the coupling plans can effectively identify influential users by considering their roles across multiple OSNs. The framework provides insights into influence propagation in multiplex networks and can solve the minimum cost influence problem by exploiting algorithms for single networks.
Identical Users in Different Social Media Provides Uniform Network Structure ...IJMTST Journal
The primary point of this venture is secure the client login and information sharing among the interpersonal organizations like Gmail, Face book and furthermore find unknown client utilizing this systems. On the off chance that the first client not accessible in the systems, but rather their companions or mysterious client knows their login points of interest implies conceivable to abuse their talks. In this venture we need to defeat the mysterious client utilizing the system without unique client information. Unapproved client utilizing the login to talk, share pictures or recordings and so on. This is the issue to be overcome in this venture .That implies client initially enlist their subtle elements with one secured question and reply. Since the unknown client can erase their talk or information. In this by utilizing the secured questions we need to recuperate the unapproved client talk history or imparting subtle elements to their IP address or MAC address. So in this venture they have discovered an approach to keep the mysterious clients abuse the first client login points.
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)paperpublications3
Abstract: The main aim of this project is secure the user login and data sharing among the social networks like Gmail, Facebook and also find anonymous user using this networks. If the original user not available in the networks, but their friends or anonymous user knows their login details means possible to misuse their chats. In this project we have to overcome the anonymous user using the network without original user knowledge. Unauthorized user using the login to chat, share images or videos etc This is the problem to be overcome in this project .That means user first register their details with one secured question and answer. Because the anonymous user can delete their chat or data In this by using the secured questions we have to recover the unauthorized user chat history or sharing details with their IP address or MAC address. So in this project they have found out a way to prevent the anonymous users misuse the original user login details.
IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )SBGC
ieee projects 2013 for me cse trichy, ieee projects 2013 for me cse Karur, ieee projects 2013 for me cse chennai, ieee projects 2013 for me cse, ieee projects, ieee projects for cse, ieee projects 2013, ieee projects 2013 for me cse Thanjavur, ieee projects 2013 for me cse Perambalur,
This document provides information about IEEE projects provided by SEABIRDS. It lists the domains and technologies that projects are available in, including Java, J2ME, J2EE, .NET, MATLAB, and NS2. It describes the two categories of project assistance provided - for students with their own project ideas or selecting from their list. It lists the types of students they provide projects for, including various engineering and technology degrees as well as business and management degrees. It also lists the deliverables and support provided for projects.
Ieee projects-2013-2014-title-list-for-me-be-mphil-final-year-studentsPruthivi Rajan
This document provides information about IEEE projects provided by SEABIRDS. It lists the domains and technologies that projects are available in, including Java, J2ME, J2EE, .NET, MATLAB, and NS2. It describes the two categories of project assistance provided - for students with their own project ideas or selecting from their project list. Details are provided about the project deliverables and support provided. A list is then given of the engineering and technology degrees and programs that projects are available for.
Automated Feature Selection and Churn Prediction using Deep Learning ModelsIRJET Journal
This document discusses using deep learning models for churn prediction in the telecommunications industry. It begins with an introduction to churn prediction and feature selection challenges. It then provides an overview of deep learning techniques, including artificial neural networks, convolutional neural networks, and their applications. The document proposes three deep learning architectures for churn prediction and experiments with them on two telecom datasets. The results show deep learning models can achieve performance comparable to traditional models without manual feature engineering.
Social Friend Overlying Communities Based on Social Network ContextIRJET Journal
This document discusses algorithms for detecting overlapping communities in social networks. It begins with an introduction to social networks and community detection. It then reviews various algorithms that have been proposed for detecting overlapping communities, including clique percolation methods, fuzzy detection algorithms, agent-based and dynamic algorithms, and more. It also discusses using these algorithms to recommend friends and locations to users based on their behaviors and communities within social networks. The document presents results from applying these algorithms and concludes by discussing opportunities for future work improving recommendation performance.
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMSIJCI JOURNAL
Recommender systems have become an important tool for personalization of online services. Generating
recommendations in online services depends on privacy-sensitive data collected from the users. Traditional
data protection mechanisms focus on access control and secure transmission, which provide security only
against malicious third parties, but not the service provider. This creates a serious privacy risk for the
users. This paper aims to protect the private data against the service provider while preserving the
functionality of the system. This paper provides a general framework that, with the help of a preprocessing
phase that is independent of the inputs of the users, allows an arbitrary number of users to securely
outsource a computation to two non-colluding external servers. This paper use these techniques to
implement a secure recommender system based on collaborative filtering that becomes more secure, and
significantly more efficient than previously known implementations of such systems.
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...IRJET Journal
1) The document proposes a new encryption scheme called Order-Retrievable Encryption (ORE) to protect user location privacy in location-based social networks.
2) ORE allows users to share their exact locations with friends without leaking location information to outside parties. It also enables efficient location queries with low computational and communication costs.
3) An experimental evaluation shows that the proposed privacy-preserving location sharing system using ORE has much lower computational and communication overhead compared to existing solutions.
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...Editor IJAIEM
Dr.G.Anandharaj1, Dr.P.Srimanchari2
1Associate Professor and Head, Department of Computer Science
Adhiparasakthi College of Arts and Science (Autonomous), Kalavai, Vellore (Dt) -632506
2 Assistant Professor and Head, Department of Computer Applications
Erode Arts and Science College (Autonomous), Erode (Dt) - 638001
ABSTRACT
In unpredictable increase in mobile apps, more and more threats migrate from outmoded PC client to mobile device. Compared
with traditional windows Intel alliance in PC, Android alliance dominates in Mobile Internet, the apps replace the PC client
software as the foremost target of hateful usage. In this paper, to improve the confidence status of recent mobile apps, we
propose a methodology to estimate mobile apps based on cloud computing platform and data mining. Compared with
traditional method, such as permission pattern based method, combines the dynamic and static analysis methods to
comprehensively evaluate an Android applications The Internet of Things (IoT) indicates a worldwide network of
interconnected items uniquely addressable, via standard communication protocols. Accordingly, preparing us for the
forthcoming invasion of things, a tool called data fusion can be used to manipulate and manage such data in order to improve
progression efficiency and provide advanced intelligence. In this paper, we propose an efficient multidimensional fusion
algorithm for IoT data based on partitioning. Finally, the attribute reduction and rule extraction methods are used to obtain the
synthesis results. By means of proving a few theorems and simulation, the correctness and effectiveness of this algorithm is
illustrated. This paper introduces and investigates large iterative multitier ensemble (LIME) classifiers specifically tailored for
big data. These classifiers are very hefty, but are quite easy to generate and use. They can be so large that it makes sense to use
them only for big data. Our experiments compare LIME classifiers with various vile classifiers and standard ordinary ensemble
Meta classifiers. The results obtained demonstrate that LIME classifiers can significantly increase the accuracy of
classifications. LIME classifiers made better than the base classifiers and standard ensemble Meta classifiers.
Keywords: LIME classifiers, ensemble Meta classifiers, Internet of Things, Big data
IRJET - Social Network Message Credibility: An Agent-based ApproachIRJET Journal
This document discusses an agent-based approach to maintaining message credibility and long-term influence on social networks. It proposes the Timeliness Increase Heuristic (TIH) algorithm to select influential nodes over multiple time periods, aiming to have a more consistent impact than one-shot selection approaches. The document outlines the architecture of agent-based models and influence diffusion models. It also discusses the advantages of the proposed multiple-time selection approach for maintaining influence in social networks better than traditional one-shot selection algorithms.
IRJET- Social Network Message Credibility: An Agent-based ApproachIRJET Journal
This document discusses an agent-based approach to maintaining message credibility and long-term influence on social networks. It proposes the Agent-based Timeliness Influence Diffusion (ATID) model which models users as autonomous agents that maintain local information like friend lists and messages. It also introduces the Timeliness Increase Heuristic algorithm to solve the influence maintenance problem by selecting influential nodes over multiple time periods, aiming to achieve more consistent long-term impact than one-time selection approaches. Experimental results showed that the multiple-time selection approach maintained influence in social networks better than one-shot selection methods.
An Extensible Web Mining Framework for Real KnowledgeIJEACS
With the emergence of Web 2.0 applications that bestow rich user experience and convenience without time and geographical restrictions, web usage logs became a goldmine to researchers across the globe. User behavior analysis in different domains based on web logs has its utility for enterprises to have strategic decision making. Business growth of enterprises depends on customer-centric approaches that need to know the knowledge of customer behavior to succeed. The rationale behind this is that customers have alternatives and there is intense competition. Therefore business community needs business intelligence to have expert decisions besides focusing customer relationship management. Many researchers contributed towards this end. However, the need for a comprehensive framework that caters to the needs of businesses to ascertain real needs of web users. This paper presents a framework named eXtensible Web Usage Mining Framework (XWUMF) for discovering actionable knowledge from web log data. The framework employs a hybrid approach that exploits fuzzy clustering methods and methods for user behavior analysis. Moreover the framework is extensible as it can accommodate new algorithms for fuzzy clustering and user behavior analysis. We proposed an algorithm known as Sequential Web Usage Miner (SWUM) for efficient mining of web usage patterns from different data sets. We built a prototype application to validate our framework. Our empirical results revealed that the framework helps in discovering actionable knowledge.
Projection Multi Scale Hashing Keyword Search in Multidimensional DatasetsIRJET Journal
The document discusses a novel method called ProMiSH (Projection and Multi Scale Hashing) for keyword search in multi-dimensional datasets. ProMiSH uses random projection and hash-based index structures to achieve high scalability and speedup of more than four orders over state-of-the-art tree-based techniques. Empirical studies on real and synthetic datasets of sizes up to 10 million objects and 100 dimensions show ProMiSH scales linearly with dataset size, dimension, query size, and result size. The method groups objects embedded in a vector space that are tagged with keywords matching a given query.
A recommender system-using novel deep network collaborative filteringIAESIJAI
The recommendation model aims to predict the user’s preferred items among million through analyzing the user-item relations; furthermore, Collaborative Filtering has been utilized as one of the successful recommendation approaches in last few years; however, it has the issue of sparsity. This research work develops a deep network collaborative filtering (DeepNCF), which incorporates graph neural network (GNN), and novel network collaborative filtering (NCF) for performance enhancement. At first user-item dual network is constructed, thereafter-custom weighted dual mode modularity is developed for edge clustering. Furthermore, GNN is utilized for capturing the complex relation between user and item. DeepNCF is evaluated considering the two distinctive. The experimental analysis is carried out on two datasets for Amazon and movielens dataset for recall@20 and recall@50 and the normalized discounted cumulative gain (NDCG) metric is evaluated for Amazon Dataset for NDCG@20 and NDCG@50. The proposed method outperforms the most relevant research and is accurate enough to give personalized recommendations and diversity.
A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING IAEME Publication
1. The document discusses a study on developing a distributed trust mechanism for peer-to-peer (P2P) networks. It aims to ensure reliability in P2P networks as traditional centralized trust models cannot adapt to their demands.
2. The proposed model divides the P2P network into overlapping communities with unique features. Within each community, trust evaluations are made between peers based on their transaction histories and feedback from other peers.
3. The model also establishes trust relationships between communities using a global trust evaluation approach. This allows calculating the final trust value of a peer based on evaluations within its community and across the entire network.
This document summarizes a research study on implementing trust mechanisms for peer-to-peer (P2P) networks. It proposes dividing the P2P network into overlapping organizations with unique features to establish trust relationships. Within each organization, trust evaluations between peers are determined through peer ratings and reviews, which are adjusted based on peers' evaluation abilities. Across organizations, a global trust evaluation approach is used. The proposed model aims to strongly protect against malicious peers while minimizing costs during network changes. Simulations demonstrated the model makes fewer errors during searches and has strong protection capabilities at low re-convergence costs.
Similar to IRJET- Cross System User Modeling and Personalization on the Social Web (20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
This study compares the use of Stark Steel and TMT Steel as reinforcement materials in a two-way reinforced concrete slab. Mechanical testing is conducted to determine the tensile strength, yield strength, and other properties of each material. A two-way slab design adhering to codes and standards is executed with both materials. The performance is analyzed in terms of deflection, stability under loads, and displacement. Cost analyses accounting for material, durability, maintenance, and life cycle costs are also conducted. The findings provide insights into the economic and structural implications of each material for reinforcement selection and recommendations on the most suitable material based on the analysis.
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
This document discusses a study analyzing the effect of camber, position of camber, and angle of attack on the aerodynamic characteristics of airfoils. Sixteen modified asymmetric NACA airfoils were analyzed using computational fluid dynamics (CFD) by varying the camber, camber position, and angle of attack. The results showed the relationship between these parameters and the lift coefficient, drag coefficient, and lift to drag ratio. This provides insight into how changes in airfoil geometry impact aerodynamic performance.
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
This document reviews the progress and challenges of aluminum-based metal matrix composites (MMCs), focusing on their fabrication processes and applications. It discusses how various aluminum MMCs have been developed using reinforcements like borides, carbides, oxides, and nitrides to improve mechanical and wear properties. These composites have gained prominence for their lightweight, high-strength and corrosion resistance properties. The document also examines recent advancements in fabrication techniques for aluminum MMCs and their growing applications in industries such as aerospace and automotive. However, it notes that challenges remain around issues like improper mixing of reinforcements and reducing reinforcement agglomeration.
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
This document discusses research on using graph neural networks (GNNs) for dynamic optimization of public transportation networks in real-time. GNNs represent transit networks as graphs with nodes as stops and edges as connections. The GNN model aims to optimize networks using real-time data on vehicle locations, arrival times, and passenger loads. This helps increase mobility, decrease traffic, and improve efficiency. The system continuously trains and infers to adapt to changing transit conditions, providing decision support tools. While research has focused on performance, more work is needed on security, socio-economic impacts, contextual generalization of models, continuous learning approaches, and effective real-time visualization.
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
This document summarizes a research project that aims to compare the structural performance of conventional slab and grid slab systems in multi-story buildings using ETABS software. The study will analyze both symmetric and asymmetric building models under various loading conditions. Parameters like deflections, moments, shears, and stresses will be examined to evaluate the structural effectiveness of each slab type. The results will provide insights into the comparative behavior of conventional and grid slabs to help engineers and architects select appropriate slab systems based on building layouts and design requirements.
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
This document summarizes and reviews a research paper on the seismic response of reinforced concrete (RC) structures with plan and vertical irregularities, with and without infill walls. It discusses how infill walls can improve or reduce the seismic performance of RC buildings, depending on factors like wall layout, height distribution, connection to the frame, and relative stiffness of walls and frames. The reviewed research paper analyzes the behavior of infill walls, effects of vertical irregularities, and seismic performance of high-rise structures under linear static and dynamic analysis. It studies response characteristics like story drift, deflection and shear. The document also provides literature on similar research investigating the effects of infill walls, soft stories, plan irregularities, and different
This document provides a review of machine learning techniques used in Advanced Driver Assistance Systems (ADAS). It begins with an abstract that summarizes key applications of machine learning in ADAS, including object detection, recognition, and decision-making. The introduction discusses the integration of machine learning in ADAS and how it is transforming vehicle safety. The literature review then examines several research papers on topics like lightweight deep learning models for object detection and lane detection models using image processing. It concludes by discussing challenges and opportunities in the field, such as improving algorithm robustness and adaptability.
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
The document analyzes temperature and precipitation trends in Asosa District, Benishangul Gumuz Region, Ethiopia from 1993 to 2022 based on data from the local meteorological station. The results show:
1) The average maximum and minimum annual temperatures have generally decreased over time, with maximum temperatures decreasing by a factor of -0.0341 and minimum by -0.0152.
2) Mann-Kendall tests found the decreasing temperature trends to be statistically significant for annual maximum temperatures but not for annual minimum temperatures.
3) Annual precipitation in Asosa District showed a statistically significant increasing trend.
The conclusions recommend development planners account for rising summer precipitation and declining temperatures in
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
This document discusses the design and analysis of pre-engineered building (PEB) framed structures using STAAD Pro software. It provides an overview of PEBs, including that they are designed off-site with building trusses and beams produced in a factory. STAAD Pro is identified as a key tool for modeling, analyzing, and designing PEBs to ensure their performance and safety under various load scenarios. The document outlines modeling structural parts in STAAD Pro, evaluating structural reactions, assigning loads, and following international design codes and standards. In summary, STAAD Pro is used to design and analyze PEB framed structures to ensure safety and code compliance.
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
This document provides a review of research on innovative fiber integration methods for reinforcing concrete structures. It discusses studies that have explored using carbon fiber reinforced polymer (CFRP) composites with recycled plastic aggregates to develop more sustainable strengthening techniques. It also examines using ultra-high performance fiber reinforced concrete to improve shear strength in beams. Additional topics covered include the dynamic responses of FRP-strengthened beams under static and impact loads, and the performance of preloaded CFRP-strengthened fiber reinforced concrete beams. The review highlights the potential of fiber composites to enable more sustainable and resilient construction practices.
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
This document summarizes a survey on securing patient healthcare data in cloud-based systems. It discusses using technologies like facial recognition, smart cards, and cloud computing combined with strong encryption to securely store patient data. The survey found that healthcare professionals believe digitizing patient records and storing them in a centralized cloud system would improve access during emergencies and enable more efficient care compared to paper-based systems. However, ensuring privacy and security of patient data is paramount as healthcare incorporates these digital technologies.
Review on studies and research on widening of existing concrete bridgesIRJET Journal
This document summarizes several studies that have been conducted on widening existing concrete bridges. It describes a study from China that examined load distribution factors for a bridge widened with composite steel-concrete girders. It also outlines challenges and solutions for widening a bridge in the UAE, including replacing bearings and stitching the new and existing structures. Additionally, it discusses two bridge widening projects in New Zealand that involved adding precast beams and stitching to connect structures. Finally, safety measures and challenges for strengthening a historic bridge in Switzerland under live traffic are presented.
React based fullstack edtech web applicationIRJET Journal
The document describes the architecture of an educational technology web application built using the MERN stack. It discusses the frontend developed with ReactJS, backend with NodeJS and ExpressJS, and MongoDB database. The frontend provides dynamic user interfaces, while the backend offers APIs for authentication, course management, and other functions. MongoDB enables flexible data storage. The architecture aims to provide a scalable, responsive platform for online learning.
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
This paper proposes integrating Internet of Things (IoT) and blockchain technologies to help implement objectives of India's National Education Policy (NEP) in the education sector. The paper discusses how blockchain could be used for secure student data management, credential verification, and decentralized learning platforms. IoT devices could create smart classrooms, automate attendance tracking, and enable real-time monitoring. Blockchain would ensure integrity of exam processes and resource allocation, while smart contracts automate agreements. The paper argues this integration has potential to revolutionize education by making it more secure, transparent and efficient, in alignment with NEP goals. However, challenges like infrastructure needs, data privacy, and collaborative efforts are also discussed.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
This document provides a review of research on the performance of coconut fibre reinforced concrete. It summarizes several studies that tested different volume fractions and lengths of coconut fibres in concrete mixtures with varying compressive strengths. The studies found that coconut fibre improved properties like tensile strength, toughness, crack resistance, and spalling resistance compared to plain concrete. Volume fractions of 2-5% and fibre lengths of 20-50mm produced the best results. The document concludes that using a 4-5% volume fraction of coconut fibres 30-40mm in length with M30-M60 grade concrete would provide benefits based on previous research.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
The document discusses optimizing business management processes through automation using Microsoft Power Automate and artificial intelligence. It provides an overview of Power Automate's key components and features for automating workflows across various apps and services. The document then presents several scenarios applying automation solutions to common business processes like data entry, monitoring, HR, finance, customer support, and more. It estimates the potential time and cost savings from implementing automation for each scenario. Finally, the conclusion emphasizes the transformative impact of AI and automation tools on business processes and the need for ongoing optimization.
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
The document describes the seismic design of a G+5 steel building frame located in Roorkee, India according to Indian codes IS 1893-2002 and IS 800. The frame was analyzed using the equivalent static load method and response spectrum method, and its response in terms of displacements and shear forces were compared. Based on the analysis, the frame was designed as a seismic-resistant steel structure according to IS 800:2007. The software STAAD Pro was used for the analysis and design.
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
This research paper explores using plastic waste as a sustainable and cost-effective construction material. The study focuses on manufacturing pavers and bricks using recycled plastic and partially replacing concrete with plastic alternatives. Initial results found that pavers and bricks made from recycled plastic demonstrate comparable strength and durability to traditional materials while providing environmental and cost benefits. Additionally, preliminary research indicates incorporating plastic waste as a partial concrete replacement significantly reduces construction costs without compromising structural integrity. The outcomes suggest adopting plastic waste in construction can address plastic pollution while optimizing costs, promoting more sustainable building practices.
Mechatronics is a multidisciplinary field that refers to the skill sets needed in the contemporary, advanced automated manufacturing industry. At the intersection of mechanics, electronics, and computing, mechatronics specialists create simpler, smarter systems. Mechatronics is an essential foundation for the expected growth in automation and manufacturing.
Mechatronics deals with robotics, control systems, and electro-mechanical systems.
Software Engineering and Project Management - Introduction, Modeling Concepts...Prakhyath Rai
Introduction, Modeling Concepts and Class Modeling: What is Object orientation? What is OO development? OO Themes; Evidence for usefulness of OO development; OO modeling history. Modeling
as Design technique: Modeling, abstraction, The Three models. Class Modeling: Object and Class Concept, Link and associations concepts, Generalization and Inheritance, A sample class model, Navigation of class models, and UML diagrams
Building the Analysis Models: Requirement Analysis, Analysis Model Approaches, Data modeling Concepts, Object Oriented Analysis, Scenario-Based Modeling, Flow-Oriented Modeling, class Based Modeling, Creating a Behavioral Model.
Supermarket Management System Project Report.pdfKamal Acharya
Supermarket management is a stand-alone J2EE using Eclipse Juno program.
This project contains all the necessary required information about maintaining
the supermarket billing system.
The core idea of this project to minimize the paper work and centralize the
data. Here all the communication is taken in secure manner. That is, in this
application the information will be stored in client itself. For further security the
data base is stored in the back-end oracle and so no intruders can access it.
Home security is of paramount importance in today's world, where we rely more on technology, home
security is crucial. Using technology to make homes safer and easier to control from anywhere is
important. Home security is important for the occupant’s safety. In this paper, we came up with a low cost,
AI based model home security system. The system has a user-friendly interface, allowing users to start
model training and face detection with simple keyboard commands. Our goal is to introduce an innovative
home security system using facial recognition technology. Unlike traditional systems, this system trains
and saves images of friends and family members. The system scans this folder to recognize familiar faces
and provides real-time monitoring. If an unfamiliar face is detected, it promptly sends an email alert,
ensuring a proactive response to potential security threats.
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...PriyankaKilaniya
Energy efficiency has been important since the latter part of the last century. The main object of this survey is to determine the energy efficiency knowledge among consumers. Two separate districts in Bangladesh are selected to conduct the survey on households and showrooms about the energy and seller also. The survey uses the data to find some regression equations from which it is easy to predict energy efficiency knowledge. The data is analyzed and calculated based on five important criteria. The initial target was to find some factors that help predict a person's energy efficiency knowledge. From the survey, it is found that the energy efficiency awareness among the people of our country is very low. Relationships between household energy use behaviors are estimated using a unique dataset of about 40 households and 20 showrooms in Bangladesh's Chapainawabganj and Bagerhat districts. Knowledge of energy consumption and energy efficiency technology options is found to be associated with household use of energy conservation practices. Household characteristics also influence household energy use behavior. Younger household cohorts are more likely to adopt energy-efficient technologies and energy conservation practices and place primary importance on energy saving for environmental reasons. Education also influences attitudes toward energy conservation in Bangladesh. Low-education households indicate they primarily save electricity for the environment while high-education households indicate they are motivated by environmental concerns.
Applications of artificial Intelligence in Mechanical Engineering.pdfAtif Razi
Historically, mechanical engineering has relied heavily on human expertise and empirical methods to solve complex problems. With the introduction of computer-aided design (CAD) and finite element analysis (FEA), the field took its first steps towards digitization. These tools allowed engineers to simulate and analyze mechanical systems with greater accuracy and efficiency. However, the sheer volume of data generated by modern engineering systems and the increasing complexity of these systems have necessitated more advanced analytical tools, paving the way for AI.
AI offers the capability to process vast amounts of data, identify patterns, and make predictions with a level of speed and accuracy unattainable by traditional methods. This has profound implications for mechanical engineering, enabling more efficient design processes, predictive maintenance strategies, and optimized manufacturing operations. AI-driven tools can learn from historical data, adapt to new information, and continuously improve their performance, making them invaluable in tackling the multifaceted challenges of modern mechanical engineering.
Build the Next Generation of Apps with the Einstein 1 Platform.
Rejoignez Philippe Ozil pour une session de workshops qui vous guidera à travers les détails de la plateforme Einstein 1, l'importance des données pour la création d'applications d'intelligence artificielle et les différents outils et technologies que Salesforce propose pour vous apporter tous les bénéfices de l'IA.