Past issues

Welcome to IJLERA! International Journal of Latest Engineering Research and Applications

Volume 02 - Issue 03 (Version I) (March 2017)


Version I

Version II


Title:
Database Security Using Intrusion Detection System
Authors:
Yashashree Dawle, Manasi Naik,Sumedha Vande,Nikita Zarkar
Source:
International Journal of Latest Engineering Research and Applications, pp 01 - 06, Vol 02 - No. 03, 2017
Abstract:
We propose a project named "Database Security Using IDS".SQL injection attack is the most common attack in websites now-a-days. SQL Injection refers to an injection attack wherein an attacker can execute malicious SQL statements that control a web application's database server. In this project we propose database intrusion detection mechanism to enhance the security of database through a Website. We will make a system which will log all the activities of an Intruder using SQL Injection in a website. Some malicious codes gets injected to the database by unauthorized users and because of this attack, the actual database can be stolen or destroyed or modified by the hacker. Administrator will be shown the details of the user and can block him if needed. User details are secured using AES encryption algorithm which makes this system more secure.
Keywords:
SQL injection, AES symmetric key algorithm, Intrusion Detection System, Database Malicious Transaction Detector, Log-based approach
Download Full Article

Title:
Fast and Dynamic Detection of Transformed data Leaks on Mail Server
Authors:
A. Rohitha Alka Mary, P. Sindhiya, S. Sindhu, Dr. K. Valarmathi
Source:
International Journal of Latest Engineering Research and Applications, pp 07 - 13, Vol 02 - No. 03, 2017
Abstract:
Sensitive data leaks are a serious threat to the organizations and companies. Sensitive Data of companies includes Intellectual Properties, Patient or Financial Information, Credit Card Data, and Other Information. Sensitive data leaks can be perceived only through the aid of some tools (i.e. to find the sensitive data being transmitted). This project provides security against Sensitive data, using data leak detection technique on the transformed data. Mail Server of an organization examines contents of outsourced email messages for sensitive data. This paper utilises Levenshtein distance algorithm or Edit distance algorithm for detecting the transformed data leaks pattern. It returns the results of computation of the extent between two strings (i.e. edits that transform the word from one to another (Insertion deletion or substitution)). Shuffling algorithm is for detecting n-grams sampling in mail content. It also uses Lucene search framework for fast indexing of sensitive documents of the organization. Matching of sensitive data and contents outsourced provides sensitivity percentage . Threshold assigned is used for allowing the contents to be outsourced. The system achieves accurate sensitivity measure in the documents being transmitted.
Keywords:
Data leak detection, levenshtein distance, lucene, Quote request.
Download Full Article

Title:
FRP COMPOSITES APPLICATION IN RC STRUCTURES
Authors:
Dr. M. Mageshwari, Abishek P.V.S.S.S, Ramkumar. V
Source:
International Journal of Latest Engineering Research and Applications, pp 14 - 34, Vol 02 - No. 03, 2017
Abstract:
The paper discusses the development of the advanced polymer composite material applications in the building and civil/structural infrastructure over the past three to four decades. Considering the advantages of steel reinforcing bar, replacement of rebar is not the best methods. It has been long felt need of construction industry to apply some protective coating on construction steels to protect from corrosion. Corrosion loss consumes considerable portion of the budget of the country by way of either restoration measures or reconstruction. The paper suggest that FRP coated application are of great interest for the building industry. This still quite new and needs to be researched further. The paper concludes that the usage of Epoxy primer and Zinc primer coated rebar sounds to be an effective method of preventing corrosion and to increase the service life..
Download Full Article

Title:
Sentimental Analysis On Twitter
Authors:
Prof. Amit Narote, Sohail Shaikh, Saville Periera, Nitin Jadhav, Platini Rodrigues
Source:
International Journal of Latest Engineering Research and Applications, pp 35 - 40, Vol 02 - No. 03, 2017
Abstract:
In today's world with the rise of social networking approach, there has been a surge of user generated content. There are a large number of social media websites that enable users to contribute, modify and grade the content. Users have an opportunity to express their personal opinions about specific topics. The example of such websites include blogs, forums, product reviews sites, and social networks. In this case, social media data is used. Sites like twitter contain prevalently short comments, like status messages called as "tweets" on social networks like twitter. Additionally many web sites allow rating the popularity of the messages which can be related to the opinion expressed by the author. The focus of project is to analyze the polarity to tweet's or post i.e. what is trends going on now days. Micro blogging sites have millions of people sharing their thoughts daily because of its characteristic short and simple manner of expression. We propose and investigate a paradigm to mine the sentiment from a popular real-time micro blogging service, Twitter, where users post real time reactions to and opinions about "everything". In this project, we expound a hybrid approach using both corpus based and dictionary based methods to determine the semantic orientation of the opinion words in tweets. A case study is presented to illustrate the use and effectiveness of the proposed system.
Keywords:
Big Data; data mining; public opinion; Hadoop; Mahout
Download Full Article

Title:
AN EXPERIMENTAL STUDY ON BIO-DEGRADATION OF ORGANIC WASTE BY USING COMPOSTING
Authors:
Vighnesh kumar.M, Vijay.G, Vijaya bharathi.M, and Ramesh.D
Source:
International Journal of Latest Engineering Research and Applications, pp 41 - 48, Vol 02 - No. 03, 2017
Abstract:
Biodegradation is the disintegration of material by bacteria, fungi or other biological mean. The term is often used in relation of ecology waste management and the natural environmental and bioremediation and is now commonly associated with environmental friendly product that is capable of composting back in to natural element organic material that can be degraded aerobically with oxygen or anaerobically without oxygen. Biodegradable matter is generally organic material that serves as a nutrient for micro-organisms. The micro-organism are so numerous and diverse that a huge range of compounds are biodegraded including hydrocarbons. Eg: oil artificial used biphenyls (pcbs) poly aromatic artificial (pahs). The artificial fertilizer is more harmful, so it will affect the human being and gives side effect also. So in this study, we replace fertilizer in our biodegradation fertilizer. It is a fertilizer and its cost is also low. The cow dung, fruit and artificial and coir pith are collected easily so it can be prepared artificial. It gives high nutrient when compared to the artificial fertilizer. The source of organic materials are from sugar industries and other waste, which in turns reduces the dumping of waste which forms the leachate and pollute the soil and ground water. Cow dung which provides considerable percent to increase the nutrient value in terms of Carbon, Nitrogen ratio and other nutrient values. And it is used as the bio-fertilizer in agricultural industry.
Keywords:
Bio composting, Coir pith, Distillery effluent, Litter waste and press mud
Download Full Article

Title:
Stream Analysis Using Online Aptitude Test
Authors:
Jaychand Upadhyay, Kevin D'cruz2, Vianny D'souza, Chinmay Timande, Vivekkumar, Radhelal
Source:
International Journal of Latest Engineering Research and Applications, pp 49 - 53, Vol 02 - No. 03, 2017
Abstract:
This paper proposes a project named Stream Analysis using Online Aptitude test to help students who are pursuing their educational degrees, to choose a stream best suited for them, according to their proficiency. Due to misguidance or peer pressure students generally seem to choose the course which their friends have chosen, and therefore we are often left with students who end up choosing an academic major which is incompatible with their interests and passion. To avoid this dilemma, we have proposed this website wherein, students of will have a platform to test their skills in different streams to see where exactly they excel. Depending on their scores in the aptitude tests containing questions from different streams, the system suggests the student which stream is best suited for him/her, as their scores indicate their level of interest, skill and knowledge in that particular stream. This website is developed particularly to cater to the needs of the students of SSC and HSC and consists of tests containing questions from the pertinent subjects and streams.
Keywords:
Stream Analysis, Apriori Algorithm, Decision Making, Major Selection, Rule Based Reasoning, Aptitude, SSC, HSC.
Download Full Article

Title:
AUTONOMOUS PATIENT MONITORING AND BLOOD FLOW CONTROL USING IOT METHOD
Authors:
R.Priyadharshini, C.Sathya, S.Sandhiya, Mrs.M.Maheswari
Source:
International Journal of Latest Engineering Research and Applications, pp 54 - 63, Vol 02 - No. 03, 2017
Abstract:
This paper describes the implementation of detection and control system using colour sensors instead of using Laser Diodes in drop measurement system. The realization and design of a sensor capable of measuring the volume of a drop in free fall. The sensor realized is made of a simple low-cost red laser and a photodiode and optics to focus the beam on the light sensor. This system may be very useful together with a drip chamber to have accurate and low-cost volume and flow rate measurements of the infused substances. it is designed to be added on the typical intravenous infusion systems already present in the market, to constantly monitor the solution volumes with good accuracy and reliability.
Keywords:
Biomedical monitoring, colour sensor, pulse oximetry, respiration sensor, blood flow measurement, analog to digital converter (ADC), IOT.
Download Full Article

Title:
Optimization of Boiler Operation In Thermal Power Station
Authors:
U. Sundaravinayaka ,T.Jayapaul
Source:
International Journal of Latest Engineering Research and Applications, pp 64- 68, Vol 02 - No. 03, 2017
Abstract:
This project work deals with the "Optimization of Boiler Operation "in THERMAL POWER STATION. We have studied in detail about various existing system in boiler and process of power generation and analysed possibilities of optimization. Accordingly, we propose few points of optimization to improve boiler efficiency .In this regard we propose and suggest optimization three systems, one related to operational area and other two related to maintenance aspects. Various parameters can be optimized like air flow ,coal flow usage of coal with less ash content , air fuel ratio ,proper evaluations ,ensuring minimum reduction of co, increase in insulation parameter and other. We devised a method to increase the boiler efficiency and this can be brought to effect by increasing heat absorption by increasing the economizer area. Based on this area the boiler efficiency at the existing condition is determined and the anticipated improvements after optimization are discussed in this project.
Keywords
Boiler Losses, Efficiency.Rankine Cycle, Optimization.
Download Full Article

Title:
Secure Key Pairing Transmission using Secret Agreement in Multi-hop Wireless Sensor Network
Authors:
G. Roshini, S. Saravana Priya, C. G. Shrinidhi, Dr. K. Valarmathi
Source:
International Journal of Latest Engineering Research and Applications, pp 69 - 74, Vol 02 - No. 03, 2017
Abstract:
With latest means for data transmission there arises a need to revise the security measure every often. Creating secrets from packet erasures again depends on information loss of legitimate nodes involved in the network. In order to avoid future loophole of security breach, we use secure key pairing transmission method using Secret Agreement Protocol and DSA (Digital signature algorithm) to bring effective advancements in multi-hop networks. This is done by signing and verifying (encryption and decryption) of data at sender and receiver side. Neighbourhood forwarding algorithm is used for establishing the communication path among mobile sensor nodes. DSA helps in creating a network such that passive adversary can‟t even access the related information associated to transmitted data (original data), hence data becomes more reliable. Also it‟s exclusive for active adversary as it can‟t breach the security. Question & answer method is used between server and receiver to foster the security against active adversary and proxy mobile nodes if present. Thereby security measure of this paper will overcome the maximum threats in future as it involves a strong security process and it is feasible for wide range of network.
Keywords:
neighbourhood forwarding algorithm, secure key pairing, active adversary, DSA, question & answer method.
Download Full Article

Title:
Bidding for Service Provisioning in Cloud
Authors:
K.R.Rasikah, G.Santhana, M.Sagarika, Mrs.M.Sangeetha
Source:
International Journal of Latest Engineering Research and Applications, pp 75 - 78, Vol 02 - No. 03, 2017
Abstract:
Cloud computing is an internet based computing whose services can be accessed via on demand invocation. It is a model for enabling ubiquitous, on-demand access to a shared pool of configurable computing resources (e.g., computer networks, servers, storage, applications and services),), which can be rapidly provisioned and released with minimal management effort. Distributed computing and capacity arrangements give clients and venturer different abilities to store and process their information in either exclusive,or outsider information centers that might be situated a long way from the user–ranging in separation from over a city to over the world. In the present service provisioning mechanism both the ends doesn't meet their monetary benefitswhich lead to dissatisfaction of both the parties. We present a mechanism for service provisioning in distributed clouds where users compete for resources and it is based on sealed bid auction coupled with cloud resourceallocation algorithm and map reduce algorithm.For analysis purpose we have used HIVE and SQOOP in Hadoopframework. It provides feasibility, end to end satisfaction, efficiency, QoE.
Keywords:
Cloud resource allocation algorithm , Hadoop, map reduce algorithm, QoE, sealed bid auction.
Download Full Article

Title:
Mining and Visualisation of Social Data for Retail Analytics
Authors:
Abinandan Arulprakash, Senthil Kumar G, Ashwanth A, Dharma Raju S, Gnanasambandan G.P
Source:
International Journal of Latest Engineering Research and Applications, pp 79 - 83, Vol 02 - No. 03, 2017
Abstract:
In the recent years, the term "Social Media Analytics" has clout an exponential trend in the modern world. Analytics is transforming finance, healthcare, engineering, science, business and ultimately our society. Social media has taken a giant leap in concurrent world, where it is not only considered as an expediter of human interactions, but rather as a multi-dimensional tool which attracts business models, target of researchers etc. For analysing real time business trends "data" is considered as a lifeblood. Facebook provides us a colossal platform to look for data. This data can then be sliced and diced in several dimensions to shape our insights. To sustain in the competitive market, understanding the needs of the customers and demands of the market holds the key. This paper integrates the idea to bring business needs, social media and technology in deriving the business benefit out of it with least cost per information. The proposal in this paper is extended in supplementing customized analysis which will notch business benefits in social platform.
Keywords:
Social data, text analytics, comparison wordcloud, commonality wordcloud.
Download Full Article

Title:
IMPROVEMENT OF CONCRETE DURABILITY BY BACTERIAL MINERAL PRECIPITATION
Authors:
DR. M. MAGESWARI, R.PRAVIN KUMAR, V.RAGHUNANDHAN
Source:
International Journal of Latest Engineering Research and Applications, pp 84 - 97, Vol 02 - No. 03, 2017
Abstract:
This project work mainly deals with the study of improving the durability of concrete by bacterial actions. The durability of concrete is mainly lost due to chemical and environmental factors. So let's discuss about durability and different type of durability attacks on concrete.
Download Full Article

Title:
Feedback analysis using Sentiment Analysis for E-commerce
Authors:
Dr.S.Murugavalli, U.Bagirathan, R.Saiprassanth, S.Arvindkumar
Source:
International Journal of Latest Engineering Research and Applications, pp 98 - 104, Vol 02 - No. 03, 2017
Abstract:
In the current scenario existing systems typically use the star ratings of products to determine its quality, but ignore the tangible feedback. It is problematic because the star ratings may differ from the tangible feedback .We propose exploiting sentiment analysis algorithm (Sentiment analysis refers to the employment of linguistic communication processing, text analysis and computational linguistics to spot and extract subjective data in supply material) to judge product feedback. This issue is addressed by encoding sentiment data of feedbacks in conjunction with contexts of words in sentiment embeddings .Bycombining context and sentiment level evidences, we can identify the sentiment polarity of the product feedback provided by the customer.
Keywords:
Sentiment Analysis, Feedback, Data mining
Download Full Article

Title:
WIND RESOURCE ASSESSMENT USING WRF MODEL IN COMPLEX TERRAIN
Authors:
Victor S Indasi, Lynch M, McGann B and Sutton J
Source:
International Journal of Latest Engineering Research and Applications, pp 105 - 112, Vol 02 - No. 03, 2017
Abstract:
AbstractWeather Research and Forecasting model (WRF) was used to simulate near-surface winds in a complex terrain using six different boundary layer parameterizations. The model runs are for 2009 and are compared tomeasurements from 3 meteorological masts: Kalkumpei, Nyiru and Sirima. WRF run using Yonsei University PBL scheme produced the best annual results at Kalkumpei with a mean difference of 0.01 m/s and Index of Agreement (IOA) of 0.66. WRF run using Yonsei University PBL scheme produced the best annual results at Nyiru with a mean difference of 0.15 m/s and IOA of 0.61. The predominant wind direction is correctly captured by the model at these locations.WRF run using Mellor-Yamada-Janjic scheme produced the best annual results at Sirima with a mean difference of 0.56 m/s and IOA of 0.61. Possible explanations for the poor model performance at Sirima can be linked to its location. Sirima meteorological tower is atop a very exposed ridgeline that can be subject to sporadic wind gusts and rapidly changing wind directions which can be difficult to model. Based on the analysis and results presented in this work, it can be concluded that WRF model can be used to generate wind data that can be in wind resource assessment.
Keywords:
WRF model, complex terrain, wind resource assessment, wind modeling, wind energy.
Download Full Article

Title:
Musical Instruments Encyclopedia Application Using Wolfram Alpha
Authors:
S. Saranya, Dr. K.Valarmathi
Source:
International Journal of Latest Engineering Research and Applications, pp 113 - 116, Vol 02 - No. 03, 2017
Abstract:
This paper shows the mechanism of android application where musical instrument informations to be displayed in the hand held device in which it will raise intents to Wolfram Alpha and Hornbostel – Sachs classification apps; therefore their availability is assumed on the target device. The application will be targeted for Android devices only. MI also assumes Internet connectivity .Wolfram Alpha will generate details like complete technical description of the ―queried‖ instruments using Hornbostel-Sachs classification, image, and sample sound.
Keywords:
clustering, Instrument Detection, Music information Retrieval.
Download Full Article

Title:
PITTING RUST REMOVAL BY USING UNCONVENTIONAL MACHINING PROCESS
Authors:
N. RAJESH, K. SOLAIRAJAN
Source:
International Journal of Latest Engineering Research and Applications, pp 117 - 119, Vol 02 - No. 03, 2017
Abstract:
The boiler tubes are exposed to environment lead to corrosion .inter granular corrosion trans granular corrosion and ultra granular corrosion. the corrosion which is defined as an metal surface is affected by an chemical reaction due to exposed in the environment the localized corrosion are mainly affect the steel pipe this corrosion is also called as pitting the metals is eaten away and performed in place in the manner of holes the rest of surface being affected only .the pitting produce an deep hole on the surface. This rust on the surface is removed by sand blasting process generic term for the process of smoothing shaping and cleaning a hard surface forcing a solid particles . Across that surface at high speed 2-3 microns it removes the surface. But the pitting corrosion are deep up to 0.1 mm .so we have to make the removal rate up to 0.1 mm so we introduce an machine named as auxiliary abrasive belt for rust removing this remove metal up to 0.1 mm so that the pitting corrosion are encountered. This method is used because it reduce the transportation time for surface removal and increase the production rate it give good result compare to conventional method This process is called as unconventional machining process there are different types of abrasive machining process this is one of that method we use this by keeping the abrasive particle in the belt which removed and the surface finish also ate place in the same process so no need for special surface finishing operation
Keywords:
corrosion, pitting corrosion, unconventional machining process
Download Full Article

Title:
Detecting Phishing Websites, a Heuristic Approach
Authors:
Suman Bhattacharyya, Chetan kumar Pal, Praveen kumar Pandey
Source:
International Journal of Latest Engineering Research and Applications, pp 120 - 129, Vol 02 - No. 03, 2017
Abstract:
Phishing is a website forgery technique with an intention to track and steal the sensitive information of online users. The hacker fools the user with social engineering techniques such as SMS, voice, email, website and malware. Various approaches have been proposed and implemented to detect a variety of phishing attacks such as use of blacklists and whitelists to name a few. In this paper, we propose a desktop application called PhishSaver, which focuses on URL and website content of the phishing webpage. We aim at detecting phishing websites with the help of a desktop application named PhishSaver. PhishSaver uses a combination of blacklist and a number of heuristic features to detect a number of phishing attacks. For blacklist, we have used GOOGLE API SERVICES that is Google safe browsing blacklist as this list is constantly updated and maintained by Google. It is also possible to run PhishSaver as a daemon process that means it is able to detect phishing attacks in real time as a user browses the internet. PhishSaver takes URL as input and outputs the status of URL as phishing or legitimate website. The heuristics used to detect phishing are footer links with null value, zero links in the body of the html, copyright content, title content and website identity. PhishSaver is able to detect zero hour phishing attacks which may have not been blacklisted and is faster than visual based assessment techniques that are used in detecting phishing. We observe that PhishSaver has obtained a higher accuracy rateand covers a wider range of phishing attacks that results in less false negative and false positive rate.
Keywords:
Anti-phishing; Copyright; Footer Html; Google Safe Browsing; Phishing; Website Identity.
Download Full Article