SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 446
E-learning system using cryptography and data mining techniques
VijayaPatil1,AditiVedpathak2,PratikshaShinde3,VishakhaVatandar4,Prof.Surekha Janrao5
1,2,3,4 Student, Dept. of computer Engineering, Terna Engineering College, Maharashtra, India
5Professor, Dept. of computer Engineering, Terna Engineering College, Maharashtra, India
-----------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - E-learning is one amongst the foremost wide
used technique for the education. In this paper, we have
introduce e-learning platform in which system provides
security to learning material and for candidate as well. We
are aiming to implement the application of data mining in
e-learning system that has specific needs, mainly the need
to take into consideration learner’s specific behaviour.
Security is provided by Elliptic curve cryptography
algorithm and content is filtered using Decision tree
algorithm.
Key words - Cryptography, data mining techniques, e-
learning.
I. INTRODUCTION
Many companies, institutions and organizations have
adopted e-learning as a promising solution to provide on-
demand learning for their employees and students. They
applied several technologies to deliver text, audio,
streaming video used in learning and teaching. There are
several benefits of e-learning, such as reducing costs, time
and improving performance of learning.
E-learning systems facilitate a spread of tasks
associated with learning like self-study, guided learning,
tutoring, communication etc. Privacy may be a natural
concern at an equivalent time that trust is a crucial think
about associate e-learning surroundings. Cryptography
algorithm is used for authorizing the users into the E-
Learning system. It generates key for each users when
they are entering their information in the registration
page. E-Learning system allows only authorized person to
enter into the website to access the services. Data mining
can be used to classify the learners’ information and to
find out the more useful courses for that learners which
could be more beneficial to them. Classification technique
is used for prediction of learner’s behaviour.
II. LITERATURE SURVEY
In [1] R. Krishnaveni, V. Pandiyaraju published paper A
Secure E-Learning System and its Services which has
introduced a system which use elliptic curve cryptography
algorithm for securing the system and they sugested
support vector machine algorithm for filtered web search
engine.
In [2] Aski and Torshizi proposed The use of classification
Techniques to enrich e-learning environments. This paper
discuss about four classification method which were used
to classify the student’s information and found out which
method gives accurate result.
In [3] Gaurav Yadav and Apana Majare published paper A
comparative study of performance analysis of various
encryption algorithms. This paper proposed some recent
existing cryptography techniques and their performance
according to different parameters used in algorithm. This
comparison analysis shows which algorithm is best suited
in which environment.
In [4] Yong Chen We He published paper Security risk and
protection in online learning. This paper will offer
necessary insights and tips so that online learning
providers can become proactive and knowledgeable as
they mitigate the security risks found e-learning
environments.
As more and more people are studying online more
attention and efforts are needed from e-learning providers
to prevent possible security breaches in online learning.
There are lots of issue comes with e-learning like, the
attackers steal the user’s authentication or the
information are eavesdropped in the insecure
communication, unauthorized users alter or modify the
content of the information by executing malicious codes.
Unstructured inform-ation chokes the educational system
without providing any articulate knowledge to its actors.
Hence there is a need for secure e-learning which uses
data mining techniques which would help to avoid the
above problems.
III. PROPOSED SYSTEM
A. Proposed Framework
The proposed system has three main entities Admin,
Student and teacher. Student can enter into the system by
doing registration process and select specific course. In
next step student recommended for study material as well
as related courses. Student can access the e-learning
platform any where and learn the course. Student can ask
query to the teacher in the discussion forum. Teachers can
add or delete study material. Teachers design the course
and gives solutions to the students query in discussion
forum. The most crucial task of course management and
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 447
content management done by admin. Admin can add
students/Teachers or delete students/Teachers. In this
way all this entities interact with proposed system. The
overall system architecture is represented in the figure 1.
By studying literature survey in proposed system we
have observed following points:
 Proposed system contains huge bulk of database
as course details, learner information, and study
materials.
 For classifying these database data mining
concepts gives better idea. Like decision tree
algorithm helps for proper recommendation.
 System has smart interaction between student
and teacher.
 System provides security to learning material and
candidate similarly.
 System reaches up to some extends to produce
higher data, higher expertise victimization digital
learning.
B. Methodology
Proposed system has two phases 1) Security 2) Data
Mining
1) Security:
Cryptography:
Cryptography is the practice and study of techniques for
secure communication in the presence of third parties
called adversaries. More generally, cryptography is about
constructing and analysing protocols that prevent third
parties or the public from reading private messages. There
are many cryptography algorithms which can be led to the
security. One of them is Elliptic curve cryptography
algorithm.
Elliptic Curve Cryptography:
In this system user security provided by Elliptic Curve
Cryptography algorithm. Elliptic-curve cryptography
(ECC) is an approach to public-key cryptography based on
the algebraic structure of elliptic curves over finite fields.
ECC requires smaller keys compared to non-ECC
cryptography to provide equivalent security. ECC is the
best suited in constrained environments. The advantages
like speed and smaller Keys are especially important in
environments where at least one of the following
resources is limited: processing
Fig. 1: System framework
power, storage space, band width, or power consumption.
This advantage is because its inverse operation gets
harder, faster, against increasing key length than do the
inverse operations in Diffie Hellman and RSA.
Table 1 is referred from R. Krishnaveni and V.
Pandiyaraju[1]. This table shows a comparison of the RSA
and ECC cryptographic operations performed by an SSL
server. These micro benchmarks highlight ECC’s
performance advantage over RSA for different security
levels. ECC’s performance advantage increases even faster
than its key-size advantage as security needs increase.
Encryption
1. Define a Curve.
2. Generate public private Key pair using that curve,
for both sender and receiver.
3. Generate a Shared secret key from the key pair.
4. From that shared secret key, generate an encryption
key.
5. Using that encryption key and symmetric encryption
algorithm, encrypt the data to send.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072
Table 1: Measured Performance of public-key algorithm
Decryption
The sender can either share the curve with receiver or
sender and receiver can have the same use for the same
curve type. Also, sender can share its public key with
receiver.
Generate public private Key pair using the same curve for
that curve. For receiver.
1. Regenerate a shared secret key using private key of
receiver and public key of sender.
2. From that shared secret key, generate an encryption
key.
3. Using that encryption key and symmetric encryption
algorithm, decrypt the data.
ECC is an asymmetric cryptography algorithm. The
algorithm for ECC is given as:
• Suppose Alice wants to send to Bob an encrypted
message. Both agree on a base point, B.
• Alice
Private Key = a
Public Key = PA = a * B
• Bob
Private Key = b
Public Key = PB = b * B
• Alice takes plaintext message, M, and encodes it
onto a point, PM, from the elliptic group
• Alice chooses another random integer, k from the
interval [1, p-1]
The cipher text is a pair of points
PC = [ (kB), (PM+ kPB) ]
 To decrypt, Bob computes the product of the first
point from PC and his private key, b b * (kB)
• Bob then takes this product and subtracts it from
the second point from PC
• (PM + kPB) – [b(kB)] = PM + k(bB) – b(kB) =
PM
• Bob then decodes PM to get the message, M.
2) Data Mining
The amount of saved data in data warehouses has
been rapidly increased. So one needs a useful method for
automatic and intelligent organization of large data
collection. Data mining is used to discover and show some
knowledge in an understandable form. The aim of data
mining is description and prediction. There are many
strategies in data mining which can be led to the
prediction. One of them is classification.
Classification
Classification is based on available features that leads to
new data description and causes a better understanding of
each class in a Database, so classification can prepare a
model to describe the proper class for any given data. In
other words by using classification, we can predict that
which given data would belong to which predefined class.
Different statistical techniques are used for classification
functions like; Bayesian, Neural Network, Decision Tree
and Support Vector Machine.
Decision Tree
Decision tree algorithm adopts a super incumbent model
to create a tree structure from the given data set where
each node represents attributes test or conditions and
final leaf node represents the test results or classes. The
construction of decision tree is done by divide and
conquer strategy. The attribute used here should be of cat-
egorical and if it is of continuous values then it had to be
converted to discrete values before starting the process.
Initially all samples are on the single root node and then
the remaining nodes are created based on the attribute
partitioning condition. This is a recursive process and the
stopping condition for this are:
 If all the samples in each node belongs to same
class
 If there are no more samples to be portioned
 If there is no further division to be made in the
given sample
The algorithm for decision tree is given as:
Decision tree method:
1. Initially create a new node N.
2. If all the data samples are in same category C,
then return N and mark it as class C.
3. If attribute list of node is empty, the return N and
label with class C whichever is major in that set of
samples in the node.
4. Using attribute selection method find out the best
Splitting criteria.
5. Use Splitting criteria to mark N.
ECC
160
RSA
1024
ECC
192
RSA
1536
ECC
224
RSA
2048
Ops/
Sec
271.
3
114 268.5 36.4 195.5 17.8
Perfor
mance
2.4:1 7.4:1 11.4:1
Key
Size
Ratio
1:6.4 1:8 1:9.1
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 448
6. In attribute list remove the splitting attributes.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 449
butes and continue the process.
8. Return N
In this method all the attributes should be classified hence
the continuous values have to be discretized before
starting the process. This method is easy to understand,
execute and validate. Validation of the algorithm can be
done using simple statistical tests.
Statistical technique of
the Classification
Prediction Precision
Decision Tree 80.113%
Simple Bayesian 80.113%
Support Vector Machine 78.409%
K Nearest Neighbour 72.443%
Table 2: Comparison Result different algorithms
Table 2 is referred from Aski and Torshizi[2]. We can see
that when we use the Decision Tree or Simple Bayesian
techniques for our classifications, we would acquire more
precision in our learners’ studying result predictions.
CONCLUSION
In this paper, Efficient E-Learning system is provided to
the learners. Elliptic curve cryptography algorithm
provides secured authentication. Recommendation of
courses is obtained by Decision Tree algorithm to classify
the content based on category and subcategories which
are mentioned by learners.
REFERENCES
[1] R. Krishnaveni, V. Pandiyaraju “A Secure E-
Learning System and its Services”, International
Journal of Advanced Computational Engineering
and Networking, ISSN: 2320-2106 Volume- 1,
Issue- 4, June-2013.
[2] Aski, B. A. and Torshizi, H. A. Islamic Azad
University, Iran. “The Use of Classification
Techniques to Enrich e-Learning Environments”,
Online proceedings of the university of Salford
Fifth Education in a Changing Environment
conference, September-2009.
[3] Gaurav Yadav and Aparna Majare “A comparative
Study of Performance Analysis of Varipous
Encryption Algorithms”, International Conference
on Emanations in Modern Technology and
Engineering 2017.
[4] Yong Chen We He “Security Risks and protection in
Online Learning: A Survey”, The international
Review of Research in Open and Distributed
Learning, December-2013.
[5] Priyanka Pradhan, R.B.Kulkarni International
conference on Electrical, Electronics, and
Optimization Techniques-2016 “Secure e-learning
using data mining techniques and concepts”.
7. Create new node N with the resultant set of attri-

More Related Content

What's hot

A multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detectionA multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detectioneSAT Journals
 
A multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detectionA multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detectioneSAT Publishing House
 
IRJET- Suspicious Email Detection System
IRJET- Suspicious Email Detection SystemIRJET- Suspicious Email Detection System
IRJET- Suspicious Email Detection SystemIRJET Journal
 
03 fauzi indonesian 9456 11nov17 edit septian
03 fauzi indonesian 9456 11nov17 edit septian03 fauzi indonesian 9456 11nov17 edit septian
03 fauzi indonesian 9456 11nov17 edit septianIAESIJEECS
 
Indonesian language email spam detection using N-gram and Naïve Bayes algorithm
Indonesian language email spam detection using N-gram and Naïve Bayes algorithmIndonesian language email spam detection using N-gram and Naïve Bayes algorithm
Indonesian language email spam detection using N-gram and Naïve Bayes algorithmjournalBEEI
 
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...1crore projects
 
Fakebuster fake news detection system using logistic regression technique i...
Fakebuster   fake news detection system using logistic regression technique i...Fakebuster   fake news detection system using logistic regression technique i...
Fakebuster fake news detection system using logistic regression technique i...Conference Papers
 
A Robust Cybersecurity Topic Classification Tool
A Robust Cybersecurity Topic Classification ToolA Robust Cybersecurity Topic Classification Tool
A Robust Cybersecurity Topic Classification ToolIJNSA Journal
 
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
Ieeepro techno solutions   2014 ieee java project - query services in cost ef...Ieeepro techno solutions   2014 ieee java project - query services in cost ef...
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...hemanthbbc
 
Retrieving Secure Data from Cloud Using OTP
Retrieving Secure Data from Cloud Using OTPRetrieving Secure Data from Cloud Using OTP
Retrieving Secure Data from Cloud Using OTPAM Publications
 
IRJET- Analysis and Detection of E-Mail Phishing using Pyspark
IRJET- Analysis and Detection of E-Mail Phishing using PysparkIRJET- Analysis and Detection of E-Mail Phishing using Pyspark
IRJET- Analysis and Detection of E-Mail Phishing using PysparkIRJET Journal
 
Classifying confidential data using SVM for efficient cloud query processing
Classifying confidential data using SVM for efficient cloud query processingClassifying confidential data using SVM for efficient cloud query processing
Classifying confidential data using SVM for efficient cloud query processingTELKOMNIKA JOURNAL
 
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)ElavarasaN GanesaN
 
Implementation of New Modified MD5-512 bit Algorithm for Cryptography
Implementation of New Modified MD5-512 bit Algorithm for CryptographyImplementation of New Modified MD5-512 bit Algorithm for Cryptography
Implementation of New Modified MD5-512 bit Algorithm for CryptographyAM Publications
 
IRJET- Efficient Auto Annotation for Tag and Image based Searching Over Large...
IRJET- Efficient Auto Annotation for Tag and Image based Searching Over Large...IRJET- Efficient Auto Annotation for Tag and Image based Searching Over Large...
IRJET- Efficient Auto Annotation for Tag and Image based Searching Over Large...IRJET Journal
 
IRJET - Event Notifier on Scraped Mails using NLP
IRJET - Event Notifier on Scraped Mails using NLPIRJET - Event Notifier on Scraped Mails using NLP
IRJET - Event Notifier on Scraped Mails using NLPIRJET Journal
 
MEMORY EFFICIENT FREQUENT PATTERN MINING USING TRANSPOSITION OF DATABASE
MEMORY EFFICIENT FREQUENT PATTERN MINING USING TRANSPOSITION OF DATABASEMEMORY EFFICIENT FREQUENT PATTERN MINING USING TRANSPOSITION OF DATABASE
MEMORY EFFICIENT FREQUENT PATTERN MINING USING TRANSPOSITION OF DATABASEIAEME Publication
 
Dp31547550
Dp31547550Dp31547550
Dp31547550IJMER
 

What's hot (19)

A multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detectionA multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detection
 
A multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detectionA multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detection
 
IRJET- Suspicious Email Detection System
IRJET- Suspicious Email Detection SystemIRJET- Suspicious Email Detection System
IRJET- Suspicious Email Detection System
 
03 fauzi indonesian 9456 11nov17 edit septian
03 fauzi indonesian 9456 11nov17 edit septian03 fauzi indonesian 9456 11nov17 edit septian
03 fauzi indonesian 9456 11nov17 edit septian
 
Indonesian language email spam detection using N-gram and Naïve Bayes algorithm
Indonesian language email spam detection using N-gram and Naïve Bayes algorithmIndonesian language email spam detection using N-gram and Naïve Bayes algorithm
Indonesian language email spam detection using N-gram and Naïve Bayes algorithm
 
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
 
Fakebuster fake news detection system using logistic regression technique i...
Fakebuster   fake news detection system using logistic regression technique i...Fakebuster   fake news detection system using logistic regression technique i...
Fakebuster fake news detection system using logistic regression technique i...
 
A Robust Cybersecurity Topic Classification Tool
A Robust Cybersecurity Topic Classification ToolA Robust Cybersecurity Topic Classification Tool
A Robust Cybersecurity Topic Classification Tool
 
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
Ieeepro techno solutions   2014 ieee java project - query services in cost ef...Ieeepro techno solutions   2014 ieee java project - query services in cost ef...
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
 
Retrieving Secure Data from Cloud Using OTP
Retrieving Secure Data from Cloud Using OTPRetrieving Secure Data from Cloud Using OTP
Retrieving Secure Data from Cloud Using OTP
 
IRJET- Analysis and Detection of E-Mail Phishing using Pyspark
IRJET- Analysis and Detection of E-Mail Phishing using PysparkIRJET- Analysis and Detection of E-Mail Phishing using Pyspark
IRJET- Analysis and Detection of E-Mail Phishing using Pyspark
 
Classifying confidential data using SVM for efficient cloud query processing
Classifying confidential data using SVM for efficient cloud query processingClassifying confidential data using SVM for efficient cloud query processing
Classifying confidential data using SVM for efficient cloud query processing
 
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)
 
Implementation of New Modified MD5-512 bit Algorithm for Cryptography
Implementation of New Modified MD5-512 bit Algorithm for CryptographyImplementation of New Modified MD5-512 bit Algorithm for Cryptography
Implementation of New Modified MD5-512 bit Algorithm for Cryptography
 
IRJET- Efficient Auto Annotation for Tag and Image based Searching Over Large...
IRJET- Efficient Auto Annotation for Tag and Image based Searching Over Large...IRJET- Efficient Auto Annotation for Tag and Image based Searching Over Large...
IRJET- Efficient Auto Annotation for Tag and Image based Searching Over Large...
 
IRJET - Event Notifier on Scraped Mails using NLP
IRJET - Event Notifier on Scraped Mails using NLPIRJET - Event Notifier on Scraped Mails using NLP
IRJET - Event Notifier on Scraped Mails using NLP
 
A4 elanjceziyan
A4 elanjceziyanA4 elanjceziyan
A4 elanjceziyan
 
MEMORY EFFICIENT FREQUENT PATTERN MINING USING TRANSPOSITION OF DATABASE
MEMORY EFFICIENT FREQUENT PATTERN MINING USING TRANSPOSITION OF DATABASEMEMORY EFFICIENT FREQUENT PATTERN MINING USING TRANSPOSITION OF DATABASE
MEMORY EFFICIENT FREQUENT PATTERN MINING USING TRANSPOSITION OF DATABASE
 
Dp31547550
Dp31547550Dp31547550
Dp31547550
 

Similar to IRJET-Impact of Manual VS Automatic Transfer Switching on Reliability of Power System

IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET Journal
 
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search SchemeEnabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search SchemeIRJET Journal
 
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...IRJET Journal
 
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET-  	  A Survey on Searching of Keyword on Encrypted Data in Cloud using ...IRJET-  	  A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...IRJET Journal
 
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET-  	  Privacy Preserving Encrypted Keyword Search SchemesIRJET-  	  Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search SchemesIRJET Journal
 
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersAn Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersIRJET Journal
 
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”IRJET Journal
 
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...IRJET Journal
 
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET Journal
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET Journal
 
Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...IRJET Journal
 
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...IRJET Journal
 
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...IRJET Journal
 
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)IRJET Journal
 
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search TechniqueIRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search TechniqueIRJET Journal
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET Journal
 
Efficient Privacy Preserving Clustering Based Multi Keyword Search
Efficient Privacy Preserving Clustering Based Multi Keyword Search        Efficient Privacy Preserving Clustering Based Multi Keyword Search
Efficient Privacy Preserving Clustering Based Multi Keyword Search IRJET Journal
 
Secured E-Learning Content on Handheld Device
Secured E-Learning Content on Handheld DeviceSecured E-Learning Content on Handheld Device
Secured E-Learning Content on Handheld DeviceIOSR Journals
 

Similar to IRJET-Impact of Manual VS Automatic Transfer Switching on Reliability of Power System (20)

IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
 
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search SchemeEnabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
 
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
 
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET-  	  A Survey on Searching of Keyword on Encrypted Data in Cloud using ...IRJET-  	  A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
 
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET-  	  Privacy Preserving Encrypted Keyword Search SchemesIRJET-  	  Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
 
dbms ppt .pptx
dbms ppt .pptxdbms ppt .pptx
dbms ppt .pptx
 
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersAn Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
 
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
 
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...
 
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud Data
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
 
Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...
 
Enhancing Security in Dynamic Public Cloud Data Using Encryption
Enhancing Security in Dynamic Public Cloud Data Using EncryptionEnhancing Security in Dynamic Public Cloud Data Using Encryption
Enhancing Security in Dynamic Public Cloud Data Using Encryption
 
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
 
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
 
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
 
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search TechniqueIRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
 
Efficient Privacy Preserving Clustering Based Multi Keyword Search
Efficient Privacy Preserving Clustering Based Multi Keyword Search        Efficient Privacy Preserving Clustering Based Multi Keyword Search
Efficient Privacy Preserving Clustering Based Multi Keyword Search
 
Secured E-Learning Content on Handheld Device
Secured E-Learning Content on Handheld DeviceSecured E-Learning Content on Handheld Device
Secured E-Learning Content on Handheld Device
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 

Recently uploaded (20)

Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 

IRJET-Impact of Manual VS Automatic Transfer Switching on Reliability of Power System

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 446 E-learning system using cryptography and data mining techniques VijayaPatil1,AditiVedpathak2,PratikshaShinde3,VishakhaVatandar4,Prof.Surekha Janrao5 1,2,3,4 Student, Dept. of computer Engineering, Terna Engineering College, Maharashtra, India 5Professor, Dept. of computer Engineering, Terna Engineering College, Maharashtra, India -----------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - E-learning is one amongst the foremost wide used technique for the education. In this paper, we have introduce e-learning platform in which system provides security to learning material and for candidate as well. We are aiming to implement the application of data mining in e-learning system that has specific needs, mainly the need to take into consideration learner’s specific behaviour. Security is provided by Elliptic curve cryptography algorithm and content is filtered using Decision tree algorithm. Key words - Cryptography, data mining techniques, e- learning. I. INTRODUCTION Many companies, institutions and organizations have adopted e-learning as a promising solution to provide on- demand learning for their employees and students. They applied several technologies to deliver text, audio, streaming video used in learning and teaching. There are several benefits of e-learning, such as reducing costs, time and improving performance of learning. E-learning systems facilitate a spread of tasks associated with learning like self-study, guided learning, tutoring, communication etc. Privacy may be a natural concern at an equivalent time that trust is a crucial think about associate e-learning surroundings. Cryptography algorithm is used for authorizing the users into the E- Learning system. It generates key for each users when they are entering their information in the registration page. E-Learning system allows only authorized person to enter into the website to access the services. Data mining can be used to classify the learners’ information and to find out the more useful courses for that learners which could be more beneficial to them. Classification technique is used for prediction of learner’s behaviour. II. LITERATURE SURVEY In [1] R. Krishnaveni, V. Pandiyaraju published paper A Secure E-Learning System and its Services which has introduced a system which use elliptic curve cryptography algorithm for securing the system and they sugested support vector machine algorithm for filtered web search engine. In [2] Aski and Torshizi proposed The use of classification Techniques to enrich e-learning environments. This paper discuss about four classification method which were used to classify the student’s information and found out which method gives accurate result. In [3] Gaurav Yadav and Apana Majare published paper A comparative study of performance analysis of various encryption algorithms. This paper proposed some recent existing cryptography techniques and their performance according to different parameters used in algorithm. This comparison analysis shows which algorithm is best suited in which environment. In [4] Yong Chen We He published paper Security risk and protection in online learning. This paper will offer necessary insights and tips so that online learning providers can become proactive and knowledgeable as they mitigate the security risks found e-learning environments. As more and more people are studying online more attention and efforts are needed from e-learning providers to prevent possible security breaches in online learning. There are lots of issue comes with e-learning like, the attackers steal the user’s authentication or the information are eavesdropped in the insecure communication, unauthorized users alter or modify the content of the information by executing malicious codes. Unstructured inform-ation chokes the educational system without providing any articulate knowledge to its actors. Hence there is a need for secure e-learning which uses data mining techniques which would help to avoid the above problems. III. PROPOSED SYSTEM A. Proposed Framework The proposed system has three main entities Admin, Student and teacher. Student can enter into the system by doing registration process and select specific course. In next step student recommended for study material as well as related courses. Student can access the e-learning platform any where and learn the course. Student can ask query to the teacher in the discussion forum. Teachers can add or delete study material. Teachers design the course and gives solutions to the students query in discussion forum. The most crucial task of course management and
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 447 content management done by admin. Admin can add students/Teachers or delete students/Teachers. In this way all this entities interact with proposed system. The overall system architecture is represented in the figure 1. By studying literature survey in proposed system we have observed following points:  Proposed system contains huge bulk of database as course details, learner information, and study materials.  For classifying these database data mining concepts gives better idea. Like decision tree algorithm helps for proper recommendation.  System has smart interaction between student and teacher.  System provides security to learning material and candidate similarly.  System reaches up to some extends to produce higher data, higher expertise victimization digital learning. B. Methodology Proposed system has two phases 1) Security 2) Data Mining 1) Security: Cryptography: Cryptography is the practice and study of techniques for secure communication in the presence of third parties called adversaries. More generally, cryptography is about constructing and analysing protocols that prevent third parties or the public from reading private messages. There are many cryptography algorithms which can be led to the security. One of them is Elliptic curve cryptography algorithm. Elliptic Curve Cryptography: In this system user security provided by Elliptic Curve Cryptography algorithm. Elliptic-curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC requires smaller keys compared to non-ECC cryptography to provide equivalent security. ECC is the best suited in constrained environments. The advantages like speed and smaller Keys are especially important in environments where at least one of the following resources is limited: processing Fig. 1: System framework power, storage space, band width, or power consumption. This advantage is because its inverse operation gets harder, faster, against increasing key length than do the inverse operations in Diffie Hellman and RSA. Table 1 is referred from R. Krishnaveni and V. Pandiyaraju[1]. This table shows a comparison of the RSA and ECC cryptographic operations performed by an SSL server. These micro benchmarks highlight ECC’s performance advantage over RSA for different security levels. ECC’s performance advantage increases even faster than its key-size advantage as security needs increase. Encryption 1. Define a Curve. 2. Generate public private Key pair using that curve, for both sender and receiver. 3. Generate a Shared secret key from the key pair. 4. From that shared secret key, generate an encryption key. 5. Using that encryption key and symmetric encryption algorithm, encrypt the data to send.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072 Table 1: Measured Performance of public-key algorithm Decryption The sender can either share the curve with receiver or sender and receiver can have the same use for the same curve type. Also, sender can share its public key with receiver. Generate public private Key pair using the same curve for that curve. For receiver. 1. Regenerate a shared secret key using private key of receiver and public key of sender. 2. From that shared secret key, generate an encryption key. 3. Using that encryption key and symmetric encryption algorithm, decrypt the data. ECC is an asymmetric cryptography algorithm. The algorithm for ECC is given as: • Suppose Alice wants to send to Bob an encrypted message. Both agree on a base point, B. • Alice Private Key = a Public Key = PA = a * B • Bob Private Key = b Public Key = PB = b * B • Alice takes plaintext message, M, and encodes it onto a point, PM, from the elliptic group • Alice chooses another random integer, k from the interval [1, p-1] The cipher text is a pair of points PC = [ (kB), (PM+ kPB) ]  To decrypt, Bob computes the product of the first point from PC and his private key, b b * (kB) • Bob then takes this product and subtracts it from the second point from PC • (PM + kPB) – [b(kB)] = PM + k(bB) – b(kB) = PM • Bob then decodes PM to get the message, M. 2) Data Mining The amount of saved data in data warehouses has been rapidly increased. So one needs a useful method for automatic and intelligent organization of large data collection. Data mining is used to discover and show some knowledge in an understandable form. The aim of data mining is description and prediction. There are many strategies in data mining which can be led to the prediction. One of them is classification. Classification Classification is based on available features that leads to new data description and causes a better understanding of each class in a Database, so classification can prepare a model to describe the proper class for any given data. In other words by using classification, we can predict that which given data would belong to which predefined class. Different statistical techniques are used for classification functions like; Bayesian, Neural Network, Decision Tree and Support Vector Machine. Decision Tree Decision tree algorithm adopts a super incumbent model to create a tree structure from the given data set where each node represents attributes test or conditions and final leaf node represents the test results or classes. The construction of decision tree is done by divide and conquer strategy. The attribute used here should be of cat- egorical and if it is of continuous values then it had to be converted to discrete values before starting the process. Initially all samples are on the single root node and then the remaining nodes are created based on the attribute partitioning condition. This is a recursive process and the stopping condition for this are:  If all the samples in each node belongs to same class  If there are no more samples to be portioned  If there is no further division to be made in the given sample The algorithm for decision tree is given as: Decision tree method: 1. Initially create a new node N. 2. If all the data samples are in same category C, then return N and mark it as class C. 3. If attribute list of node is empty, the return N and label with class C whichever is major in that set of samples in the node. 4. Using attribute selection method find out the best Splitting criteria. 5. Use Splitting criteria to mark N. ECC 160 RSA 1024 ECC 192 RSA 1536 ECC 224 RSA 2048 Ops/ Sec 271. 3 114 268.5 36.4 195.5 17.8 Perfor mance 2.4:1 7.4:1 11.4:1 Key Size Ratio 1:6.4 1:8 1:9.1 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 448 6. In attribute list remove the splitting attributes.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 449 butes and continue the process. 8. Return N In this method all the attributes should be classified hence the continuous values have to be discretized before starting the process. This method is easy to understand, execute and validate. Validation of the algorithm can be done using simple statistical tests. Statistical technique of the Classification Prediction Precision Decision Tree 80.113% Simple Bayesian 80.113% Support Vector Machine 78.409% K Nearest Neighbour 72.443% Table 2: Comparison Result different algorithms Table 2 is referred from Aski and Torshizi[2]. We can see that when we use the Decision Tree or Simple Bayesian techniques for our classifications, we would acquire more precision in our learners’ studying result predictions. CONCLUSION In this paper, Efficient E-Learning system is provided to the learners. Elliptic curve cryptography algorithm provides secured authentication. Recommendation of courses is obtained by Decision Tree algorithm to classify the content based on category and subcategories which are mentioned by learners. REFERENCES [1] R. Krishnaveni, V. Pandiyaraju “A Secure E- Learning System and its Services”, International Journal of Advanced Computational Engineering and Networking, ISSN: 2320-2106 Volume- 1, Issue- 4, June-2013. [2] Aski, B. A. and Torshizi, H. A. Islamic Azad University, Iran. “The Use of Classification Techniques to Enrich e-Learning Environments”, Online proceedings of the university of Salford Fifth Education in a Changing Environment conference, September-2009. [3] Gaurav Yadav and Aparna Majare “A comparative Study of Performance Analysis of Varipous Encryption Algorithms”, International Conference on Emanations in Modern Technology and Engineering 2017. [4] Yong Chen We He “Security Risks and protection in Online Learning: A Survey”, The international Review of Research in Open and Distributed Learning, December-2013. [5] Priyanka Pradhan, R.B.Kulkarni International conference on Electrical, Electronics, and Optimization Techniques-2016 “Secure e-learning using data mining techniques and concepts”. 7. Create new node N with the resultant set of attri-