Articles

  1. AN EXPERIMENTAL STUDY ON TERNARY BLENDED HIGH STRENGTH HYBRID FRCDownload Article

    Bugga Bhanu Kumar, G.Janardhan Reddy

    Abstract

    close

    Recently, research on investigating alternative material as cement substitute becomes a massive issue in construction industry. Previous research proved that utilizing cement contribute bad environment effect due to high CO2 emitted during its production Hence, reducing cement use by replacing or substituting it with other eco green material will be an enable solution for a better future. Over the past several decades, extensive research work is in progress throughout the globe in concrete technology in finding alternative materials which can partially or fully replace ordinary Portland cement (OPC) and which can also meet the requirements of strength and durability aspects.

  2. Cloud computing in learning zoneDownload Article

    E. Samatha Sree Chaturvedi

    Abstract

    close

    Learning is highly important in today's civilization. It helps to motivate the minds and shape it into intellectuals. Many Educational Institutes are exploring new technologies for effective teaching and learning Methodology. One of the emerging technologies Cloud Computing can be very useful in teaching learning process. As Cloud provides a variety of services, an institute can offer quality Learning by providing latest infrastructure in terms of hardware and software. This paper focuses on basic introduction of cloud Computing and how cloud computing can be introduced in the Learning to improve teaching and learning methodology which can bring a revolution in the field of Learning.

  3. BRAVISSIMO -M Tablets: A Scientifically Formulated Male Libido Enhancer for overall sexual pleasure & satisfactionDownload Article

    Govind Shukla, D. Sruthi Rao, C.J. Sampath Kumar

    Abstract

    close

    Erectile dysfunction (ED) or male impotence is defined as the inability to have or sustain an erection long enough to have a meaningful sexual intercourse. ED tends to occur gradually until the night time or early morning erections cease altogether or are so flaccid that successful intercourse does not occur. Sexual health is an important determinant of quality of life. Today, millions of men, young and old, suffer from ED due to high levels of synthetic hormones (known as Xenoestrogens) in our diet/environment. Nutritionally imbalanced diet resulting poor quality of extremely low levels of testosterone. To overcome the problem of sexual (or) ED various natural aphrodisiac potentials are helpful for researchers of R&D cell of LACTONOVA NUTRIPHARM to develop new aphrodisiac formulation. The present paper Reviews the Role of BRAVISSIMO-M Tablets, Scientifically Formulated Male Libido Enhancer developed by researchers of R&D cell of LACTONOVA NUTRIPHARM Pvt Ltd. Hyderabad in maintaining overall sexual pleasure & Satisfaction.

  4. PPHOP survey for manage the inside threat attack detection in cloud storageDownload Article

    A.Shenbagam, Jothilakshmi

    Abstract

    close

    Privacy-preserving High-order PPHOP c-Means Scheme that allows support for all users to conveniently access data over the cloud and control and detect the inside threat attack. Data owner is not able to control all over their data and security issues. The new security issues of Insider Threat Attack Various techniques are available to support user privacy and secure data sharing and detect of control the Insider Threat attack. An insider threat was the misuse of information through malicious intent, accidents or malware. The study also examined four best practices companies could follow to implement a secure strategy, such as business partnerships, prioritizing initiatives, controlling access, and implementing technology. This paper focus on various schemes to deal with secure data sharing such as Data sharing with forward security, secure data sharing for dynamic groups, Attribute based data sharing, encrypted data sharing and Shared Authority Based Privacy-preserving High-order PPHOP c-Means Scheme for access control of outsourced data. In this paper improve the could security issuses and inside threat attack.

  5. Discovering based on text mining techniquesDownload Article

    P.Vidhya, S.Anitha

    Abstract

    close

    Identifying the authorship either of an anonymous or a doubtful document constitutes a cornerstone for automatic forensic applications. Moreover, it is a challenging task for both humans and computers. Clustering documents ac-cording to the linguistic style of the authors who wrote them has been a task little studied by the research community. In order to address this problem, PAN Evaluation Framework has become the first effort to promote the development of the author clustering. This article proposes a graph-based method, specifically β-compact clustering, for discovering the groups of documents written by the same author. The β-compact algorithm is based on the analysis of the similarity between documents and they belong to the same group as long as the similarity between them exceeds the threshold β and it is the maximum similarity with respect to other documents. In our proposal we evaluated different linguistic features and similarity measures presented in previous works of authorship analysis task. The training dataset was used to determine the best value of β parameter for each language. The result of the experiments was encouraging.

  6. A machine learning approach to android malware detectionDownload Article

    N.Sathya, Dr.P.Sumitra

    Abstract

    close

    The commercial success of Android app markets such as Google Play and the incentive model they offer to popular apps, make them appealing targets for false and malicious behaviors. Some fraudulent developers deceptively boost the search rank and popularity of their apps (e.g., through fake reviews and bogus installation counts), while malicious developers use app markets as a launch pad for their malware. Proliferation. To identify malware, previous work has focused on app executable and permission analysis. In this paper, we introduce FairPlay, a novel system that discovers and leverages traces left behind by fraudsters, to detect both malware and apps subjected to search rank fraud. FairPlay correlates review activities and uniquely combines detected review relations with linguistic and behavioral signals gleaned from Google Play app data (87K apps, 2.9M reviews, and 2.4M reviewers, collected over half a year), in order to identify suspicious apps. FairPlay achieves over 95% accuracy in classifying gold standard datasets of malware, fraudulent and legitimate apps. We show that 75% of the identified malware apps engage in search rank fraud. FairPlay discovers hundreds of fraudulent apps that currently evade Google Bouncer’s detection technology. FairPlay also helped the discovery of more than 1,000 reviews, reported for 193 apps that reveal a new type of “coercive” review campaign: users are harassed into writing positive reviews, and install and review other apps.

  7. Effective keyword to aware illustrative of travel route frame workDownload Article

    N.Malathi, S.Sabitha

    Abstract

    close

    The fame of online networking, clients can undoubtedly share their registration records and photographs amid their outings. In perspective of the colossal number of client chronicled portability records in online networking, we mean to find make a trip encounters to encourage trip arranging. When arranging an excursion, clients dependably have particular inclinations with respect to their outings. Rather than confining clients to constrained inquiry choices, for example, areas, exercises, or eras, we consider discretionary content depictions as catchphrases about customized prerequisites. Also, a differing and delegate set of suggested travel courses is required. Earlier works have explained on mining and positioning existing courses from registration information. To address the issue for the programmed trip association, we guarantee that more highlights of Places of Interest (POIs) ought to be extricated. Along these lines, in this paper, we propose a proficient Keyword-mindful Representative Travel Route structure that utilization information extraction from clients’ verifiable portability records and social connections. Expressly, we have composed a catchphrase extraction module to characterize the POI-related labels, for viable coordinating with question watchwords.

Sign in

Registered and Approved by National Science Library (NSL),National Institute of Science Communication And Information Resources(NISCAIR),
Council of Scientific and Industrial Research,New Delhi, India"