Submit Search
Upload
IRJET-Impact of Manual VS Automatic Transfer Switching on Reliability of Power System
•
0 likes
•
27 views
IRJET Journal
Follow
https://irjet.net/archives/V5/i2/IRJET-V5I295.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 4
Download now
Download to read offline
Recommended
IRJET- Semantics based Document Clustering
IRJET- Semantics based Document Clustering
IRJET Journal
IRJET - Encoded Polymorphic Aspect of Clustering
IRJET - Encoded Polymorphic Aspect of Clustering
IRJET Journal
Paper id 28201425
Paper id 28201425
IJRAT
H017445260
H017445260
IOSR Journals
B017441015
B017441015
IOSR Journals
Enabling efficient multi keyword ranked
Enabling efficient multi keyword ranked
Sakthi Sundaram
AN EMPIRICAL ANALYSIS OF EMAIL FORENSICS TOOLS
AN EMPIRICAL ANALYSIS OF EMAIL FORENSICS TOOLS
IJNSA Journal
A Heuristic Approach for Network Data Clustering
A Heuristic Approach for Network Data Clustering
idescitation
Recommended
IRJET- Semantics based Document Clustering
IRJET- Semantics based Document Clustering
IRJET Journal
IRJET - Encoded Polymorphic Aspect of Clustering
IRJET - Encoded Polymorphic Aspect of Clustering
IRJET Journal
Paper id 28201425
Paper id 28201425
IJRAT
H017445260
H017445260
IOSR Journals
B017441015
B017441015
IOSR Journals
Enabling efficient multi keyword ranked
Enabling efficient multi keyword ranked
Sakthi Sundaram
AN EMPIRICAL ANALYSIS OF EMAIL FORENSICS TOOLS
AN EMPIRICAL ANALYSIS OF EMAIL FORENSICS TOOLS
IJNSA Journal
A Heuristic Approach for Network Data Clustering
A Heuristic Approach for Network Data Clustering
idescitation
A multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detection
eSAT Journals
A multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detection
eSAT Publishing House
IRJET- Suspicious Email Detection System
IRJET- Suspicious Email Detection System
IRJET Journal
03 fauzi indonesian 9456 11nov17 edit septian
03 fauzi indonesian 9456 11nov17 edit septian
IAESIJEECS
Indonesian language email spam detection using N-gram and Naïve Bayes algorithm
Indonesian language email spam detection using N-gram and Naïve Bayes algorithm
journalBEEI
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
1crore projects
Fakebuster fake news detection system using logistic regression technique i...
Fakebuster fake news detection system using logistic regression technique i...
Conference Papers
A Robust Cybersecurity Topic Classification Tool
A Robust Cybersecurity Topic Classification Tool
IJNSA Journal
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
hemanthbbc
Retrieving Secure Data from Cloud Using OTP
Retrieving Secure Data from Cloud Using OTP
AM Publications
IRJET- Analysis and Detection of E-Mail Phishing using Pyspark
IRJET- Analysis and Detection of E-Mail Phishing using Pyspark
IRJET Journal
Classifying confidential data using SVM for efficient cloud query processing
Classifying confidential data using SVM for efficient cloud query processing
TELKOMNIKA JOURNAL
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)
ElavarasaN GanesaN
Implementation of New Modified MD5-512 bit Algorithm for Cryptography
Implementation of New Modified MD5-512 bit Algorithm for Cryptography
AM Publications
IRJET- Efficient Auto Annotation for Tag and Image based Searching Over Large...
IRJET- Efficient Auto Annotation for Tag and Image based Searching Over Large...
IRJET Journal
IRJET - Event Notifier on Scraped Mails using NLP
IRJET - Event Notifier on Scraped Mails using NLP
IRJET Journal
A4 elanjceziyan
A4 elanjceziyan
Jasline Presilda
MEMORY EFFICIENT FREQUENT PATTERN MINING USING TRANSPOSITION OF DATABASE
MEMORY EFFICIENT FREQUENT PATTERN MINING USING TRANSPOSITION OF DATABASE
IAEME Publication
Dp31547550
Dp31547550
IJMER
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET Journal
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
IRJET Journal
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
IRJET Journal
More Related Content
What's hot
A multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detection
eSAT Journals
A multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detection
eSAT Publishing House
IRJET- Suspicious Email Detection System
IRJET- Suspicious Email Detection System
IRJET Journal
03 fauzi indonesian 9456 11nov17 edit septian
03 fauzi indonesian 9456 11nov17 edit septian
IAESIJEECS
Indonesian language email spam detection using N-gram and Naïve Bayes algorithm
Indonesian language email spam detection using N-gram and Naïve Bayes algorithm
journalBEEI
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
1crore projects
Fakebuster fake news detection system using logistic regression technique i...
Fakebuster fake news detection system using logistic regression technique i...
Conference Papers
A Robust Cybersecurity Topic Classification Tool
A Robust Cybersecurity Topic Classification Tool
IJNSA Journal
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
hemanthbbc
Retrieving Secure Data from Cloud Using OTP
Retrieving Secure Data from Cloud Using OTP
AM Publications
IRJET- Analysis and Detection of E-Mail Phishing using Pyspark
IRJET- Analysis and Detection of E-Mail Phishing using Pyspark
IRJET Journal
Classifying confidential data using SVM for efficient cloud query processing
Classifying confidential data using SVM for efficient cloud query processing
TELKOMNIKA JOURNAL
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)
ElavarasaN GanesaN
Implementation of New Modified MD5-512 bit Algorithm for Cryptography
Implementation of New Modified MD5-512 bit Algorithm for Cryptography
AM Publications
IRJET- Efficient Auto Annotation for Tag and Image based Searching Over Large...
IRJET- Efficient Auto Annotation for Tag and Image based Searching Over Large...
IRJET Journal
IRJET - Event Notifier on Scraped Mails using NLP
IRJET - Event Notifier on Scraped Mails using NLP
IRJET Journal
A4 elanjceziyan
A4 elanjceziyan
Jasline Presilda
MEMORY EFFICIENT FREQUENT PATTERN MINING USING TRANSPOSITION OF DATABASE
MEMORY EFFICIENT FREQUENT PATTERN MINING USING TRANSPOSITION OF DATABASE
IAEME Publication
Dp31547550
Dp31547550
IJMER
What's hot
(19)
A multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detection
IRJET- Suspicious Email Detection System
IRJET- Suspicious Email Detection System
03 fauzi indonesian 9456 11nov17 edit septian
03 fauzi indonesian 9456 11nov17 edit septian
Indonesian language email spam detection using N-gram and Naïve Bayes algorithm
Indonesian language email spam detection using N-gram and Naïve Bayes algorithm
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Fakebuster fake news detection system using logistic regression technique i...
Fakebuster fake news detection system using logistic regression technique i...
A Robust Cybersecurity Topic Classification Tool
A Robust Cybersecurity Topic Classification Tool
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
Retrieving Secure Data from Cloud Using OTP
Retrieving Secure Data from Cloud Using OTP
IRJET- Analysis and Detection of E-Mail Phishing using Pyspark
IRJET- Analysis and Detection of E-Mail Phishing using Pyspark
Classifying confidential data using SVM for efficient cloud query processing
Classifying confidential data using SVM for efficient cloud query processing
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)
Implementation of New Modified MD5-512 bit Algorithm for Cryptography
Implementation of New Modified MD5-512 bit Algorithm for Cryptography
IRJET- Efficient Auto Annotation for Tag and Image based Searching Over Large...
IRJET- Efficient Auto Annotation for Tag and Image based Searching Over Large...
IRJET - Event Notifier on Scraped Mails using NLP
IRJET - Event Notifier on Scraped Mails using NLP
A4 elanjceziyan
A4 elanjceziyan
MEMORY EFFICIENT FREQUENT PATTERN MINING USING TRANSPOSITION OF DATABASE
MEMORY EFFICIENT FREQUENT PATTERN MINING USING TRANSPOSITION OF DATABASE
Dp31547550
Dp31547550
Similar to IRJET-Impact of Manual VS Automatic Transfer Switching on Reliability of Power System
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET Journal
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
IRJET Journal
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
IRJET Journal
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET Journal
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET Journal
dbms ppt .pptx
dbms ppt .pptx
SagarGhosh48
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
IRJET Journal
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
IRJET Journal
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...
IRJET Journal
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud Data
IRJET Journal
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
IRJET Journal
Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...
IRJET Journal
Enhancing Security in Dynamic Public Cloud Data Using Encryption
Enhancing Security in Dynamic Public Cloud Data Using Encryption
Association of Scientists, Developers and Faculties
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET Journal
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
IRJET Journal
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET Journal
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET Journal
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET Journal
Efficient Privacy Preserving Clustering Based Multi Keyword Search
Efficient Privacy Preserving Clustering Based Multi Keyword Search
IRJET Journal
Secured E-Learning Content on Handheld Device
Secured E-Learning Content on Handheld Device
IOSR Journals
Similar to IRJET-Impact of Manual VS Automatic Transfer Switching on Reliability of Power System
(20)
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
dbms ppt .pptx
dbms ppt .pptx
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...
Enhancing Security in Dynamic Public Cloud Data Using Encryption
Enhancing Security in Dynamic Public Cloud Data Using Encryption
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
Efficient Privacy Preserving Clustering Based Multi Keyword Search
Efficient Privacy Preserving Clustering Based Multi Keyword Search
Secured E-Learning Content on Handheld Device
Secured E-Learning Content on Handheld Device
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
VICTOR MAESTRE RAMIREZ
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
959SahilShah
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZTE
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Anamika Sarkar
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
microprocessor 8085 and its interfacing
microprocessor 8085 and its interfacing
jaychoudhary37
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
DeepakSakkari2
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Asst.prof M.Gokilavani
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Suhani Kapoor
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ranjana rawat
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Internship report on mechanical engineering
Internship report on mechanical engineering
malavadedarshan25
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Suhani Kapoor
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
ssuser7cb4ff
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
srsj9000
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
vipinkmenon1
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
hassan khalil
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Recently uploaded
(20)
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
microprocessor 8085 and its interfacing
microprocessor 8085 and its interfacing
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
Internship report on mechanical engineering
Internship report on mechanical engineering
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
IRJET-Impact of Manual VS Automatic Transfer Switching on Reliability of Power System
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 446 E-learning system using cryptography and data mining techniques VijayaPatil1,AditiVedpathak2,PratikshaShinde3,VishakhaVatandar4,Prof.Surekha Janrao5 1,2,3,4 Student, Dept. of computer Engineering, Terna Engineering College, Maharashtra, India 5Professor, Dept. of computer Engineering, Terna Engineering College, Maharashtra, India -----------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - E-learning is one amongst the foremost wide used technique for the education. In this paper, we have introduce e-learning platform in which system provides security to learning material and for candidate as well. We are aiming to implement the application of data mining in e-learning system that has specific needs, mainly the need to take into consideration learner’s specific behaviour. Security is provided by Elliptic curve cryptography algorithm and content is filtered using Decision tree algorithm. Key words - Cryptography, data mining techniques, e- learning. I. INTRODUCTION Many companies, institutions and organizations have adopted e-learning as a promising solution to provide on- demand learning for their employees and students. They applied several technologies to deliver text, audio, streaming video used in learning and teaching. There are several benefits of e-learning, such as reducing costs, time and improving performance of learning. E-learning systems facilitate a spread of tasks associated with learning like self-study, guided learning, tutoring, communication etc. Privacy may be a natural concern at an equivalent time that trust is a crucial think about associate e-learning surroundings. Cryptography algorithm is used for authorizing the users into the E- Learning system. It generates key for each users when they are entering their information in the registration page. E-Learning system allows only authorized person to enter into the website to access the services. Data mining can be used to classify the learners’ information and to find out the more useful courses for that learners which could be more beneficial to them. Classification technique is used for prediction of learner’s behaviour. II. LITERATURE SURVEY In [1] R. Krishnaveni, V. Pandiyaraju published paper A Secure E-Learning System and its Services which has introduced a system which use elliptic curve cryptography algorithm for securing the system and they sugested support vector machine algorithm for filtered web search engine. In [2] Aski and Torshizi proposed The use of classification Techniques to enrich e-learning environments. This paper discuss about four classification method which were used to classify the student’s information and found out which method gives accurate result. In [3] Gaurav Yadav and Apana Majare published paper A comparative study of performance analysis of various encryption algorithms. This paper proposed some recent existing cryptography techniques and their performance according to different parameters used in algorithm. This comparison analysis shows which algorithm is best suited in which environment. In [4] Yong Chen We He published paper Security risk and protection in online learning. This paper will offer necessary insights and tips so that online learning providers can become proactive and knowledgeable as they mitigate the security risks found e-learning environments. As more and more people are studying online more attention and efforts are needed from e-learning providers to prevent possible security breaches in online learning. There are lots of issue comes with e-learning like, the attackers steal the user’s authentication or the information are eavesdropped in the insecure communication, unauthorized users alter or modify the content of the information by executing malicious codes. Unstructured inform-ation chokes the educational system without providing any articulate knowledge to its actors. Hence there is a need for secure e-learning which uses data mining techniques which would help to avoid the above problems. III. PROPOSED SYSTEM A. Proposed Framework The proposed system has three main entities Admin, Student and teacher. Student can enter into the system by doing registration process and select specific course. In next step student recommended for study material as well as related courses. Student can access the e-learning platform any where and learn the course. Student can ask query to the teacher in the discussion forum. Teachers can add or delete study material. Teachers design the course and gives solutions to the students query in discussion forum. The most crucial task of course management and
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 447 content management done by admin. Admin can add students/Teachers or delete students/Teachers. In this way all this entities interact with proposed system. The overall system architecture is represented in the figure 1. By studying literature survey in proposed system we have observed following points: Proposed system contains huge bulk of database as course details, learner information, and study materials. For classifying these database data mining concepts gives better idea. Like decision tree algorithm helps for proper recommendation. System has smart interaction between student and teacher. System provides security to learning material and candidate similarly. System reaches up to some extends to produce higher data, higher expertise victimization digital learning. B. Methodology Proposed system has two phases 1) Security 2) Data Mining 1) Security: Cryptography: Cryptography is the practice and study of techniques for secure communication in the presence of third parties called adversaries. More generally, cryptography is about constructing and analysing protocols that prevent third parties or the public from reading private messages. There are many cryptography algorithms which can be led to the security. One of them is Elliptic curve cryptography algorithm. Elliptic Curve Cryptography: In this system user security provided by Elliptic Curve Cryptography algorithm. Elliptic-curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC requires smaller keys compared to non-ECC cryptography to provide equivalent security. ECC is the best suited in constrained environments. The advantages like speed and smaller Keys are especially important in environments where at least one of the following resources is limited: processing Fig. 1: System framework power, storage space, band width, or power consumption. This advantage is because its inverse operation gets harder, faster, against increasing key length than do the inverse operations in Diffie Hellman and RSA. Table 1 is referred from R. Krishnaveni and V. Pandiyaraju[1]. This table shows a comparison of the RSA and ECC cryptographic operations performed by an SSL server. These micro benchmarks highlight ECC’s performance advantage over RSA for different security levels. ECC’s performance advantage increases even faster than its key-size advantage as security needs increase. Encryption 1. Define a Curve. 2. Generate public private Key pair using that curve, for both sender and receiver. 3. Generate a Shared secret key from the key pair. 4. From that shared secret key, generate an encryption key. 5. Using that encryption key and symmetric encryption algorithm, encrypt the data to send.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072 Table 1: Measured Performance of public-key algorithm Decryption The sender can either share the curve with receiver or sender and receiver can have the same use for the same curve type. Also, sender can share its public key with receiver. Generate public private Key pair using the same curve for that curve. For receiver. 1. Regenerate a shared secret key using private key of receiver and public key of sender. 2. From that shared secret key, generate an encryption key. 3. Using that encryption key and symmetric encryption algorithm, decrypt the data. ECC is an asymmetric cryptography algorithm. The algorithm for ECC is given as: • Suppose Alice wants to send to Bob an encrypted message. Both agree on a base point, B. • Alice Private Key = a Public Key = PA = a * B • Bob Private Key = b Public Key = PB = b * B • Alice takes plaintext message, M, and encodes it onto a point, PM, from the elliptic group • Alice chooses another random integer, k from the interval [1, p-1] The cipher text is a pair of points PC = [ (kB), (PM+ kPB) ] To decrypt, Bob computes the product of the first point from PC and his private key, b b * (kB) • Bob then takes this product and subtracts it from the second point from PC • (PM + kPB) – [b(kB)] = PM + k(bB) – b(kB) = PM • Bob then decodes PM to get the message, M. 2) Data Mining The amount of saved data in data warehouses has been rapidly increased. So one needs a useful method for automatic and intelligent organization of large data collection. Data mining is used to discover and show some knowledge in an understandable form. The aim of data mining is description and prediction. There are many strategies in data mining which can be led to the prediction. One of them is classification. Classification Classification is based on available features that leads to new data description and causes a better understanding of each class in a Database, so classification can prepare a model to describe the proper class for any given data. In other words by using classification, we can predict that which given data would belong to which predefined class. Different statistical techniques are used for classification functions like; Bayesian, Neural Network, Decision Tree and Support Vector Machine. Decision Tree Decision tree algorithm adopts a super incumbent model to create a tree structure from the given data set where each node represents attributes test or conditions and final leaf node represents the test results or classes. The construction of decision tree is done by divide and conquer strategy. The attribute used here should be of cat- egorical and if it is of continuous values then it had to be converted to discrete values before starting the process. Initially all samples are on the single root node and then the remaining nodes are created based on the attribute partitioning condition. This is a recursive process and the stopping condition for this are: If all the samples in each node belongs to same class If there are no more samples to be portioned If there is no further division to be made in the given sample The algorithm for decision tree is given as: Decision tree method: 1. Initially create a new node N. 2. If all the data samples are in same category C, then return N and mark it as class C. 3. If attribute list of node is empty, the return N and label with class C whichever is major in that set of samples in the node. 4. Using attribute selection method find out the best Splitting criteria. 5. Use Splitting criteria to mark N. ECC 160 RSA 1024 ECC 192 RSA 1536 ECC 224 RSA 2048 Ops/ Sec 271. 3 114 268.5 36.4 195.5 17.8 Perfor mance 2.4:1 7.4:1 11.4:1 Key Size Ratio 1:6.4 1:8 1:9.1 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 448 6. In attribute list remove the splitting attributes.
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 449 butes and continue the process. 8. Return N In this method all the attributes should be classified hence the continuous values have to be discretized before starting the process. This method is easy to understand, execute and validate. Validation of the algorithm can be done using simple statistical tests. Statistical technique of the Classification Prediction Precision Decision Tree 80.113% Simple Bayesian 80.113% Support Vector Machine 78.409% K Nearest Neighbour 72.443% Table 2: Comparison Result different algorithms Table 2 is referred from Aski and Torshizi[2]. We can see that when we use the Decision Tree or Simple Bayesian techniques for our classifications, we would acquire more precision in our learners’ studying result predictions. CONCLUSION In this paper, Efficient E-Learning system is provided to the learners. Elliptic curve cryptography algorithm provides secured authentication. Recommendation of courses is obtained by Decision Tree algorithm to classify the content based on category and subcategories which are mentioned by learners. REFERENCES [1] R. Krishnaveni, V. Pandiyaraju “A Secure E- Learning System and its Services”, International Journal of Advanced Computational Engineering and Networking, ISSN: 2320-2106 Volume- 1, Issue- 4, June-2013. [2] Aski, B. A. and Torshizi, H. A. Islamic Azad University, Iran. “The Use of Classification Techniques to Enrich e-Learning Environments”, Online proceedings of the university of Salford Fifth Education in a Changing Environment conference, September-2009. [3] Gaurav Yadav and Aparna Majare “A comparative Study of Performance Analysis of Varipous Encryption Algorithms”, International Conference on Emanations in Modern Technology and Engineering 2017. [4] Yong Chen We He “Security Risks and protection in Online Learning: A Survey”, The international Review of Research in Open and Distributed Learning, December-2013. [5] Priyanka Pradhan, R.B.Kulkarni International conference on Electrical, Electronics, and Optimization Techniques-2016 “Secure e-learning using data mining techniques and concepts”. 7. Create new node N with the resultant set of attri-
Download now