



ISSN Approved Journal No: E-ISSN 2348-1269, P- ISSN 2349-5138
Journal ESTD Year: 2014
Read all new guidelines related publication before submission or publication. Scholarly open access , Peer-reviewed, and Refereed, Impact Factor: 7.17, AI-Powered Research Tool , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI), UGC Approved Journal No: 43602(19)
Paper Title: EFFECTIVE SUPPLY CHAIN MANAGEMENT AND ROLE OF DEMAND PLANNING
Publisher Journal Name: IJ Publication
Published Paper ID: - IJRAR190D035
Register Paper ID - 191533
Title: EFFECTIVE SUPPLY CHAIN MANAGEMENT AND ROLE OF DEMAND PLANNING
Author Name(s): M.Kamatchi
Publisher Journal name: IJ Publication
Volume: 5
Issue: 3
Pages: 223-226
Year: September-2018
Downloads: 925
Licence: creative commons attribution 4.0
Demand Planning,Supply Chain Management,Demand Volatility, Supply Chain Agility.
Paper Title: A STUDY OF IMPART OF INTERNET ON SAVING AND INVESTMENT APPROACH OF MIDDLE CLASS HOUSEHOLDS WITH SPECIAL REFERENCE TO BANGALORE
Publisher Journal Name: IJ Publication
Published Paper ID: - IJRAR190D034
Register Paper ID - 191532
Title: A STUDY OF IMPART OF INTERNET ON SAVING AND INVESTMENT APPROACH OF MIDDLE CLASS HOUSEHOLDS WITH SPECIAL REFERENCE TO BANGALORE
Author Name(s): Nasreen Sayyed, Dr.G.Indhumathi
Publisher Journal name: IJ Publication
Volume: 5
Issue: 3
Pages: 206-222
Year: September-2018
Downloads: 966
Investment is one of the major issues of middleclass families as their small savings of today are to meet the expenses of tomorrow. This study examines the investment pattern and awareness of the middle class families in Bengaluru about different investment instruments such as Bank deposits, real estate, small savings, life insurance schemes, bullion, commercial deposits, mutual funds and equity. The rationale behind choosing this research topic is the premise that the middle class in India has gained considerable attention of economists, policy makers and market participants, as still there remains a considerable untapped potential in this income class in India. The Study was based on the micro economic approach of estimating the responses of the respondents belonging to the middle class families in Bengaluru. The study analyses the savings and investment pattern among the middle class people of Bengaluru city. The data was collected by distributing a structured questionnaire to a hundred people belonging to middle class families in Bengaluru city.
Licence: creative commons attribution 4.0
Savings, Investment, Middle Class,
Paper Title: FACTORS DEFINING IMPORT AND EXPORT SUPPLY CHAIN MANAGEMENT IN TEXTILES IN TIRUPUR CITY
Publisher Journal Name: IJ Publication
Published Paper ID: - IJRAR190D033
Register Paper ID - 191519
Title: FACTORS DEFINING IMPORT AND EXPORT SUPPLY CHAIN MANAGEMENT IN TEXTILES IN TIRUPUR CITY
Author Name(s): Dr. P. Suresh , Dr. E. Nixon Amirtharaj
Publisher Journal name: IJ Publication
Volume: 5
Issue: 3
Pages: 197-205
Year: September-2018
Downloads: 935
: The Textile industry is a long chain including raw materials production, complement production, clothing production and so on. SCM concept is made possible as a conventional management tool for all manufactures are to strive to improve their product quality, to reduce their product and service cost and to shorten their product delivery and response time in a highly competitive market.. Modern SCM concept comprises of a variety of activities, namely inbound and outbound transportation management, warehousing, materials handling, order fulfillment, network design, inventory management, supply/demand planning, customer service, sourcing and procurement, packaging, and management of IT support towards diverse functional areas. India is becoming a global manufacturing hub in textiles. Increasing demand in domestic and international markets is opening a new world of opportunities for the Indian Industry especially from Tirupur region of Tamilnadu.
Licence: creative commons attribution 4.0
Textile industry Supply Chain Management, Global manufacturing, Indian manufacturers.
Paper Title: A STUDY ON THE APPLICATION AREAS OF IOT TO IMPROVE THE LIFE OF DIFFERENTLY ABLED WITH SPECIAL REFERENCE TO PHYSICALLY, HEARING AND VISUALLY IMPAIRED INDIVIDUALS.
Publisher Journal Name: IJ Publication
Published Paper ID: - IJRAR190D032
Register Paper ID - 191518
Title: A STUDY ON THE APPLICATION AREAS OF IOT TO IMPROVE THE LIFE OF DIFFERENTLY ABLED WITH SPECIAL REFERENCE TO PHYSICALLY, HEARING AND VISUALLY IMPAIRED INDIVIDUALS.
Author Name(s): Dr.Rajdeep K Manwani , Ms. Nasreen Sayyed
Publisher Journal name: IJ Publication
Volume: 5
Issue: 3
Pages: 190-196
Year: September-2018
Downloads: 983
Licence: creative commons attribution 4.0
: IoT, Disability, Sensory disability, Physical disability,RFID
Paper Title: A STUDY ON CONSUMER PREFERENCE TOWARDS MOBILE WALLET
Publisher Journal Name: IJ Publication
Published Paper ID: - IJRAR190D031
Register Paper ID - 191516
Title: A STUDY ON CONSUMER PREFERENCE TOWARDS MOBILE WALLET
Author Name(s): T. Praiseye, 2Dr. Florence John
Publisher Journal name: IJ Publication
Volume: 5
Issue: 3
Pages: 185-189
Year: September-2018
Downloads: 1365
Mobile phones are used everywhere in this modern world. The technological advancement has made everything possible under one touch. By using the applications installed in the mobile phones the users can pay any bills and transact their money to anyone at their convenience. Increase in use of mobile phones and internet is the main reason for mobile wallet penetration. This study was carried out to find out the factors that affects consumers preference towards mobile wallet. Using a structured questionnaire primary data was collected from 100 respondents. ANOVA and frequency analysis were used to find out the factor that affects consumer preference and Impact of demographic factors on consumer preference towards mobile wallet were also analyzed.
Licence: creative commons attribution 4.0
Keywords: Mobile wallet, Digital Payment, Consumer preference
Paper Title: EFFECTIVENESS OF CROSS CULTURAL TRAINING PROGRAMME AND EXPATRIATE ADJUSTMENT
Publisher Journal Name: IJ Publication
Published Paper ID: - IJRAR190D030
Register Paper ID - 191515
Title: EFFECTIVENESS OF CROSS CULTURAL TRAINING PROGRAMME AND EXPATRIATE ADJUSTMENT
Author Name(s): N. Kalaivani , 2Dr. S.A. Senthilkumar
Publisher Journal name: IJ Publication
Volume: 5
Issue: 3
Pages: 181-184
Year: September-2018
Downloads: 1273
The purpose of the study reported here was to explore cross-cultural training programs and expatriate adjustment effectiveness that increase effective cross-cultural interaction. Effective cross-cultural training increases trainees' knowledge, encourages them to see the personal and organizational benefits of cultural diversity and cross-cultural competence, and increases their skill and capacity to work with cultural diversity. Cross-cultural training is an effective strategy in the achievement of organizational performance targets and multicultural policy objectives. Addressing the identified limitations of current practice in CCT will increase its contribution to the development and enhancement of organizational and individual cultural competence. Moreover, developing cross-cultural training programs could add value to the firm and its people. Following the discussed about cultural competence, models and implementing training programme steps and finally discussed about conclusion of effectiveness of training programme.
Licence: creative commons attribution 4.0
Paper Title: BECOMING EVEN SMARTER ABOUT EMERGING SMART CITIES AND INTERNET OF THINGS(IOT)
Publisher Journal Name: IJ Publication
Published Paper ID: - IJRAR190D029
Register Paper ID - 191514
Title: BECOMING EVEN SMARTER ABOUT EMERGING SMART CITIES AND INTERNET OF THINGS(IOT)
Author Name(s): S. Belina, V.J Sara,
Publisher Journal name: IJ Publication
Volume: 5
Issue: 3
Pages: 178-180
Year: September-2018
Downloads: 857
: Cities are emerging and evolving at the very time that technologies are growing in our life they are connecting us with urban infrastructure management. The task of our Government is novel, daring and inventiveness. Although concept of smart cities emerged from various sectors, Internet of Things, it is a central feature of smart city models. Smart cities include not only economical business but also academics and charitable (philanthropic) organizations. Academics attracted by technological applications and they are able to sense and track the human use. Philanthropic witness solutions to the urban evils with humanity, justice, value-added quality of life and empowerment of citizen. An important view of the list of smart cities is personalized nature of their methodology. This paper implicates about more interesting features and evolving of smart city concept along with the use of IOT in smart cities.
Licence: creative commons attribution 4.0
Empowerment, infrastructure, inventiveness, IOT, novel, philanthropic, personalized, smart city, urban
Paper Title: DISEASE PREDICTION USING DECISION TREE BASED WEIGHED VOTING SYSTEM IN DATA MINING
Publisher Journal Name: IJ Publication
Published Paper ID: - IJRAR190D028
Register Paper ID - 191513
Title: DISEASE PREDICTION USING DECISION TREE BASED WEIGHED VOTING SYSTEM IN DATA MINING
Author Name(s): S. Ramasamy, Dr.K.Nirmala
Publisher Journal name: IJ Publication
Volume: 5
Issue: 3
Pages: 170-177
Year: September-2018
Downloads: 903
Licence: creative commons attribution 4.0
classification, disease prediction, voting system, accuracy.
Paper Title: STUDY ON SECURITY ISSUES IN INTERNET OF THINGS
Publisher Journal Name: IJ Publication
Published Paper ID: - IJRAR190D027
Register Paper ID - 191512
Title: STUDY ON SECURITY ISSUES IN INTERNET OF THINGS
Author Name(s): R.NANDHINI, , P.SRILAKSHMI,, APARNA R
Publisher Journal name: IJ Publication
Volume: 5
Issue: 3
Pages: 165-169
Year: September-2018
Downloads: 942
Licence: creative commons attribution 4.0
IoT, Security Algorithms, IoT Applications, RFID, Encryption
Paper Title: MULTIMODAL BIOMETRIC IDENTIFICATION FOR ACCESSING PERSONAL VAULT BASED ON IOT SECURITY SYSTEM
Publisher Journal Name: IJ Publication
Published Paper ID: - IJRAR190D026
Register Paper ID - 191511
Title: MULTIMODAL BIOMETRIC IDENTIFICATION FOR ACCESSING PERSONAL VAULT BASED ON IOT SECURITY SYSTEM
Author Name(s): Mrs.S.Arunarani , 2Dr.Gobinath Ramar
Publisher Journal name: IJ Publication
Volume: 5
Issue: 3
Pages: 159-164
Year: September-2018
Downloads: 916
Licence: creative commons attribution 4.0
Paper Title: ITERATIVE SUPERVISED LEARNING METHOD FOR THE CATEGORIZATION OF LUNG CARCINOMA
Publisher Journal Name: IJ Publication
Published Paper ID: - IJRAR190D025
Register Paper ID - 191362
Title: ITERATIVE SUPERVISED LEARNING METHOD FOR THE CATEGORIZATION OF LUNG CARCINOMA
Author Name(s): S.Karthigai, Dr.K.Meenakshi Sundaram
Publisher Journal name: IJ Publication
Volume: 5
Issue: 3
Pages: 149-158
Year: September 2018
Downloads: 895
Licence: creative commons attribution 4.0
Data Mining Lung Carcinoma, Iterative optimizer , MLP, IMLP.
Paper Title: IOT SECURITY AND PRIVACY CHALLENGES: A STUDY ON ENHANCED PRIVACY IDENTIFICATION (EPID) - STANDARD BASED END TO END IOT SOLUTION
Publisher Journal Name: IJ Publication
Published Paper ID: - IJRAR190D024
Register Paper ID - 191361
Title: IOT SECURITY AND PRIVACY CHALLENGES: A STUDY ON ENHANCED PRIVACY IDENTIFICATION (EPID) - STANDARD BASED END TO END IOT SOLUTION
Author Name(s): S.Jaya Prasanna, G. Sri Pradha, Dr. J. Vanathi
Publisher Journal name: IJ Publication
Volume: 5
Issue: 3
Pages: 142-148
Year: September 2018
Downloads: 1033
Licence: creative commons attribution 4.0
Paper Title: SECURE SENSITIVE DATA TRANSMISSION ON BIGDATA PLATFORM
Publisher Journal Name: IJ Publication
Published Paper ID: - IJRAR190D023
Register Paper ID - 191360
Title: SECURE SENSITIVE DATA TRANSMISSION ON BIGDATA PLATFORM
Author Name(s): J.Vimala Roselin, G.M.Nasira
Publisher Journal name: IJ Publication
Volume: 5
Issue: 3
Pages: 137-141
Year: September 2018
Downloads: 896
: Big data is huge volumes of structured and unstructured data that is very difficult to process this data using traditional databases . The organisation contains huge data storage, data delivery on semi-trusted big data platform. It increases the expenditure. An enterprise can acquire enormous amount of sensitive data by storing , analysing , processing these data. Logging, vulnerability and encryption are essential to keep sensitive secure in computerized world. It decreases the costs of enterprises for users to provide value added data and personalized services. It becomes essential to give the security in big data platform. Customers are looking at the field level of encryption, tokenization, and anonymization technologies to secure the information. This conceptual presents a system to share the sensitive data on a big data platform utilizing effective encryption algorithm. We process identity-based conditional proxy encryption (IBCPRE) based on heterogeneous ciper text transformation technique to guarantee the security of big data in cloud. However, the concept updating has always been a challenging problem when (IBCPRE) is used to establish the access control strategy. It also gives security to share the sensitive data.
Licence: creative commons attribution 4.0
Sensitive data, Secure sharing, big data, identity-based conditional proxy re-encryption
Paper Title: PERFORMANCE OF DATA AGGREGATION USING ANONYMOUS AGGREGATOR ELECTION IN WIRELESS SENSOR NETWORKS
Publisher Journal Name: IJ Publication
Published Paper ID: - IJRAR190D022
Register Paper ID - 191359
Title: PERFORMANCE OF DATA AGGREGATION USING ANONYMOUS AGGREGATOR ELECTION IN WIRELESS SENSOR NETWORKS
Author Name(s): Dr. A.Manikandan, Dr. V.Ganeshbabu, P.Sakthivel
Publisher Journal name: IJ Publication
Volume: 5
Issue: 3
Pages: 130-136
Year: September 2018
Downloads: 944
Wireless sensor and actuator networks are potentially useful building blocks for cyber-physical systems. It must typically guarantee high-confidence operation and makes strong requirements of building blocks. Here, the requirement of dependability means resistance against both accidental failures and intentional attacks. It should be addressed at all layers of the network architecture, including the networking protocols and the distributed services built on top of them, as well as the hardware and software architecture of the sensor and actuator nodes themselves. In this paper, we focus on the security aspects of aggregator node election and data aggregation protocols in wireless sensor networks (WSN).
Licence: creative commons attribution 4.0
vehicular networks, communication, announFirst, aggregator, cluster and protocols.
Paper Title: SECURITY AND PRIVACY CHALLENGES IN BIG DATA HEALTHCARE
Publisher Journal Name: IJ Publication
Published Paper ID: - IJRAR190D021
Register Paper ID - 191358
Title: SECURITY AND PRIVACY CHALLENGES IN BIG DATA HEALTHCARE
Author Name(s): Papitha Christobel, Dr.A. Sasi Kumar
Publisher Journal name: IJ Publication
Volume: 5
Issue: 3
Pages: 123-129
Year: September 2018
Downloads: 904
Licence: creative commons attribution 4.0
Big data, Security, Privacy, Public key infrastructure (PKI), Electronic Medical Record (EMR), Electronic Healthcare Record (EHR), Medical Big Data (MBD), Decoy Medical Big Data (DMBD), Original Medical Big Data (OMBD
Paper Title: TYPES, USES AND REGULATIONS OF CRYPTOCURRENCY: A STUDY
Publisher Journal Name: IJ Publication
Published Paper ID: - IJRAR190D020
Register Paper ID - 191356
Title: TYPES, USES AND REGULATIONS OF CRYPTOCURRENCY: A STUDY
Author Name(s): Fanny Grace S, , Dr. Florence John
Publisher Journal name: IJ Publication
Volume: 5
Issue: 3
Pages: 119-122
Year: September 2018
Downloads: 928
Cryptocurrency is a virtual form of currency which is used as a medium to exchange. Cryptocurrency is not accepted in all the countries. The rules and regulations of using it varies from country to country. Few countries even consider it illegal. Cryptocurrency are not only used for transaction but they can also be used as an investment. Since it is done through the internet there is a high risk. This research paper would give a brief knowledge of what is Cryptocurrency, its uses and its Types. It also clearly states the legal aspects of Cryptocurrency India.
Licence: creative commons attribution 4.0
Cryptocurrency, Investment, Bitcoin
Paper Title: APPLICATION OF INTERNET OF THINGS (IOT) IN LOGISTICS INDUSTRY
Publisher Journal Name: IJ Publication
Published Paper ID: - IJRAR190D019
Register Paper ID - 191355
Title: APPLICATION OF INTERNET OF THINGS (IOT) IN LOGISTICS INDUSTRY
Author Name(s): C.Kalaivani, Dr.G.Indhumathi
Publisher Journal name: IJ Publication
Volume: 5
Issue: 3
Pages: 114-118
Year: September 2018
Downloads: 1340
Internet of Things (IoT) has become popular in all industries. Uses of IoT and its benefits have been eye-appealing in industry and commerce. Along with many other sectors of the economy, the revolutionary effect of IoT is having an intense effect on logistic industry as well. IoT application will introduce different promising concept and design for innovation in supply chain and logistics. The IoT in Logistics with greater accuracy of execution can be achieved with minimal efforts and new possible roles will be opened for logistics operators to produces the goods with less cost. The IoT will have greater impact on various areas such as operational efficiency, safety and security, customer experience, and new business models in logistics. This paper mainly focused on the topic application and benefits of IoT on logistics industry. Moreover, this paper will describe the application and efficiency gains in the IoT applications. Finally, we will conclude this paper with next steps and future works planned for IoT to become a reality.
Licence: creative commons attribution 4.0
IoT, Fleet Management, Warehouse Management, Asset Tracking
Paper Title: Technical Implications And Growth Of Online Trading With Special Reference To Madurai District – A Study
Publisher Journal Name: IJ Publication
Published Paper ID: - IJRAR190D018
Register Paper ID - 191354
Title: TECHNICAL IMPLICATIONS AND GROWTH OF ONLINE TRADING WITH SPECIAL REFERENCE TO MADURAI DISTRICT – A STUDY
Author Name(s): K.Alamelu, Dr.G.Indhumathi
Publisher Journal name: IJ Publication
Volume: 5
Issue: 3
Pages: 109-113
Year: September 2018
Downloads: 978
Modern Technological World environment surrounded by growth of Telecommunications broadband connections or LAN connections called Internet connects billions of people. The internet has made financial products and services available to more customers and eliminated geographical barriers. Earlier investors were dependent on their brokers or financial consultants but nowadays they are participating more in buying and selling of shares with the help of internet. E-trading is the alternative solution for Traditional trading policies in India where scams had happened like Harshad Mehta case. Thus now Online Trading in India is one of the reasons for biggest Market Trading boom in financial services sector where Technical Implications are indicated by SEBI on time basis as it helps to access the market from anywhere at any time during Trading hours of 9.30 a.m till 3.30 pm of Weekdays. The primary objective of this research paper is to study about the technical implications and growth online Trading in India.
Licence: creative commons attribution 4.0
Internet, Technical Implications, SEBI, Online Trading, Stock Brokers
Paper Title: AN ANALYTICAL STUDY ON ORGANIC FOOD PRODUCTS PURCHASING BEHAVIOR IN E-COMMERCE
Publisher Journal Name: IJ Publication
Published Paper ID: - IJRAR190D017
Register Paper ID - 191353
Title: AN ANALYTICAL STUDY ON ORGANIC FOOD PRODUCTS PURCHASING BEHAVIOR IN E-COMMERCE
Author Name(s): J.Solomon Thangadurai
Publisher Journal name: IJ Publication
Volume: 5
Issue: 3
Pages: 103-108
Year: September 2018
Downloads: 977
Organic products are considered as healthy by most of the buyers as these are made up of natural substances. Organic products are grownup without the harmful substance and grown natural quality. The Indian organic food market although in its infant stage, has started growing faster. Consumers choose organic food in the interest of safety, human health, and environmental concern. The result also presented the factors that benefits organic food consumption and the barriers that limit the growth of organic profit. To achieve the research objectives, primary and secondary data collection methods used. The main sources of secondary data were collected from different online sources such as reports, surveys, and websites of Research Institutes, published books, online journals and papers. The primary data was gained by utilizing structured questionnaire that was collected from consumers.
Licence: creative commons attribution 4.0
Substance, Infant, Harmful, barriers
Paper Title: A STUDY ON IMPACT OF WEB PORTALS ON CUSTOMERS WITH REFERENCE TO COIMBATORE CITY
Publisher Journal Name: IJ Publication
Published Paper ID: - IJRAR190D016
Register Paper ID - 191352
Title: A STUDY ON IMPACT OF WEB PORTALS ON CUSTOMERS WITH REFERENCE TO COIMBATORE CITY
Author Name(s): B.Shirly,
Publisher Journal name: IJ Publication
Volume: 5
Issue: 3
Pages: 96-102
Year: September 2018
Downloads: 863
Licence: creative commons attribution 4.0
E-Commerce, Online Shopping, Web Portals, Consumer Behavior, Intention to Purchase, Internet.
Paper Title: PREDICTABLE AND PRECAUTIONARY MEASURES OF RISK IN RELATION WITH SUPPLY CHAIN MANAGEMENT (SCM)
Publisher Journal Name: IJ Publication
Published Paper ID: - IJRAR190D015
Register Paper ID - 191350
Title: PREDICTABLE AND PRECAUTIONARY MEASURES OF RISK IN RELATION WITH SUPPLY CHAIN MANAGEMENT (SCM)
Author Name(s): Finley Abraham.R ,, Dr. Florence John
Publisher Journal name: IJ Publication
Volume: 5
Issue: 3
Pages: 92-95
Year: September 2018
Downloads: 904
Licence: creative commons attribution 4.0
Supply Chain Management (SCM), Supply Chain Risk Management (SCRM), Threats, Control, Risks, Uncertainty, Monitor
Paper Title: STUDY ON CONSUMER BEHAVIOUR WITH RESPECT TO BRANDS IN ONLINE SHOPPING OF DURABLE AND NON-DURABLE PRODUCTS
Publisher Journal Name: IJ Publication
Published Paper ID: - IJRAR190D014
Register Paper ID - 191348
Title: STUDY ON CONSUMER BEHAVIOUR WITH RESPECT TO BRANDS IN ONLINE SHOPPING OF DURABLE AND NON-DURABLE PRODUCTS
Author Name(s): K. Banulatha, Dr. M.Sharmila2
Publisher Journal name: IJ Publication
Volume: 5
Issue: 3
Pages: 85-91
Year: September 2018
Downloads: 913
Licence: creative commons attribution 4.0
Paper Title: AN OVERVIEW OF IOT IN EMPLOYEE WELLNESS IN INDIA
Publisher Journal Name: IJ Publication
Published Paper ID: - IJRAR190D013
Register Paper ID - 191347
Title: AN OVERVIEW OF IOT IN EMPLOYEE WELLNESS IN INDIA
Author Name(s): Esther Hepziba , Dr. Florence John
Publisher Journal name: IJ Publication
Volume: 5
Issue: 3
Pages: 78-84
Year: September 2018
Downloads: 930
Licence: creative commons attribution 4.0
Internet of things , Employee wellness , IOT in India, safe workplace.
Paper Title: Digital Entrepreneurship in Rural Development of Tamil Nadu – A Study
Publisher Journal Name: IJ Publication
Published Paper ID: - IJRAR190D012
Register Paper ID - 191346
Title: DIGITAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF TAMIL NADU – A STUDY
Author Name(s): Ms. Lavanya.V
Publisher Journal name: IJ Publication
Volume: 5
Issue: 3
Pages: 73-77
Year: September 2018
Downloads: 921
: Indian economy is focusing on transforming traditional economy to digitalized economy. The Government of India encourages the entrepreneurs to take use of technology for the growth of business and to build the society at large. Digital entrepreneurs make use of this initiative in developing rural economy. This research paper aims at revealing the problems and prospects of digital entrepreneurs in making rural development. The research work is empirical in nature and primary data is collected through structured questionnaire by using random sampling techniques. The outcome of the study will help the society and entrepreneurs for making rural economy to go in digitalized.
Licence: creative commons attribution 4.0
Digital Entrepreneurs, Rural, Development, Problems, Prospects.
Paper Title: A CONCEPTUAL FRAMEWORK ON BLOCK CHAIN
Publisher Journal Name: IJ Publication
Published Paper ID: - IJRAR190D011
Register Paper ID - 191345
Title: A CONCEPTUAL FRAMEWORK ON BLOCK CHAIN
Author Name(s): M.SHALINI,
Publisher Journal name: IJ Publication
Volume: 5
Issue: 3
Pages: 68-72
Year: September 2018
Downloads: 962
The block chain is recently introduced and revolutionizing the digital world bringing a new perspective to security, resiliency, and efficiency of system. The focus of the study is to understand how the blocks are created in the block chain and how the decentralized shared economy applications that allow the people to secure their things that was previously unattainable to create more wealth.
Licence: creative commons attribution 4.0
Paper Title: BUILDING GREATER IOT SECURITY AND TRUST
Publisher Journal Name: IJ Publication
Published Paper ID: - IJRAR190D010
Register Paper ID - 191342
Title: BUILDING GREATER IOT SECURITY AND TRUST
Author Name(s): S.Blessy Deva Priya,
Publisher Journal name: IJ Publication
Volume: 5
Issue: 3
Pages: 62-67
Year: September 2018
Downloads: 1019
Internet of Things (IoT) is playing a more and more important role after its showing up, it covers from traditional equipment to general household objects such as WSNs and RFID. With the great potential of IoT, there come all kinds of challenges. This paper focuses on the security problems among all other challenges. As IoT is built on the basis of the Internet, security problems of the Internet will also show up in IoT. And as IoT contains three layers: perception layer, transportation layer and application layer, this paper will analyze the security problems of each layer separately and try to find new problems and solutions. This paper also analyzes the cross-layer heterogeneous integration issues and security issues in detail and discusses the security issues of IoT as a whole and tries to find solutions to them. In the end, this paper compares security issues between IoT and traditional network, and discusses opening security issues of IoT.
Licence: creative commons attribution 4.0
discusses opening, security issues ,IoT.
Paper Title: ARTIFICIAL INTELLIGENCE AND INTERNET OF THINGS IN HEALTHCARE (BLOOD DONOR & PATIENTS)
Publisher Journal Name: IJ Publication
Published Paper ID: - IJRAR190D009
Register Paper ID - 191341
Title: ARTIFICIAL INTELLIGENCE AND INTERNET OF THINGS IN HEALTHCARE (BLOOD DONOR & PATIENTS)
Author Name(s): MahalakshmiSubramaniaDiwakaran
Publisher Journal name: IJ Publication
Volume: 5
Issue: 3
Pages: 57-61
Year: September 2018
Downloads: 914
Healthcare is important for all living beings and the increased demand for quality healthcare is growing day by day. The key challenge is to provide healthcare for everyone in this world will take time,and it is a difficult task as well. It is time for us to change our approach to prevent disease by diagnosing it very early and provide appropriate treatment to save a life. We would like to approach it in reverse starting from a blood donor, reaching out to a Doctor/hospitals/providers and accessing the way they treat patients and their diagnosing methods and how the treatment is received by the patient and then finally based on demographic, treatment patterns, diagnose methods, we can identify disease in advance so that we can treat. On the other hand, we can also reach out to the quality blood donor constantly checking their blood pressure and diabetes level to choose the right donor at the right time in extreme circumstances.We are using IoT, Machine Learning, Artificial Intelligence and Cloud are the technical tools for our research.
Licence: creative commons attribution 4.0
:- Health care, Artificial Intelligence, Machine Learning, IoT
Paper Title: AN IMPROVED MAP REDUCED FRAMEWORK TO HANDLE THE DISTRIBUTED DATA AND THEIR EDITIONS
Publisher Journal Name: IJ Publication
Published Paper ID: - IJRAR190D008
Register Paper ID - 191340
Title: AN IMPROVED MAP REDUCED FRAMEWORK TO HANDLE THE DISTRIBUTED DATA AND THEIR EDITIONS
Author Name(s): S.G.Raja
Publisher Journal name: IJ Publication
Volume: 5
Issue: 3
Pages: 52-56
Year: September 2018
Downloads: 845
This paper deals with find the improved map reduced framework to handle the large amount of grouped data. When we are deals with large amount of unorganized data we are end with cluster approach to organize them to serve its clusters. Version Control System (VCS) is the most commonly used approach to find the editions of the data. However before pushing the data into Data Lake, if we used improved map reduce framework easily retrieve the history of the data. A history always used to avoid the future mistakes and helps to improve or predict the upcoming business needs. The experiments performed on different types of data with different delimiters.
Licence: creative commons attribution 4.0
Distributed Data Clustering, Big Data, MapReduce, Hadoop, HDFS, Version Control Systems, Data lake loader
Paper Title: MOUNTING EMINENCE OF SERVICES IN WIRELESS MESH NETWORKS
Publisher Journal Name: IJ Publication
Published Paper ID: - IJRAR190D007
Register Paper ID - 191339
Title: MOUNTING EMINENCE OF SERVICES IN WIRELESS MESH NETWORKS
Author Name(s): Dr. G.Revathy
Publisher Journal name: IJ Publication
Volume: 5
Issue: 3
Pages: 43-51
Year: September 2018
Downloads: 813
Wireless networks evolve into next generation to provide faster and better services, a key technology Wireless mesh networks has emerged recently. A wireless mesh network comprised of radio nodes which a form of wireless ad hoc network. In wireless mesh network nodes are combination of mesh routers and mesh clients. Wireless mesh networking is a promising wireless technology for numerous applications and hence throughput drops significantly as number of nodes or hops increases. Hence we propose a novel method to increase throughput using tabu search optimization followed by centralized and distributed algorithms. Simulation results shows that using this approach number of hop by hop per packet transmission is reduced and so the throughput is increased by 40 percent inducing increase in all quality of services.
Licence: creative commons attribution 4.0
Wireless mesh networks, tabu , greedy algorithm, distributed algorithm
Paper Title: BLACK HOLE ATTACK IN AODV ROUTING PROTOCOL
Publisher Journal Name: IJ Publication
Published Paper ID: - IJRAR190D006
Register Paper ID - 191338
Title: BLACK HOLE ATTACK IN AODV ROUTING PROTOCOL
Author Name(s): Miss. Divya, Dr. R.Gobinath
Publisher Journal name: IJ Publication
Volume: 5
Issue: 3
Pages: 38-42
Year: September 2018
Downloads: 862
MANET is the mobile ad hoc network used for connecting the mobile devices (nodes) and transferring the packets from source to destination node without connecting the nodes with the transmission medium. It is otherwise called as wirelessad hoc network or ad hoc wireless network. MANET is the self-configuring with less infrastructure network. MANETs undergoes different types of securities issues that disturb the actual performance and behaviour of the networks. One of the most dangerous attacks in MANET is the black hole attack, which results in dropping the data packets from network without transmitting the packet to the destination node. Ad hoc On-Demand Distance Vector (AODV) routing is a protocol used for mobile ad hoc networks (MANET). This paper implements the solution to the black hole attack in MANET using cache based IDS on AODV routing. This technique prevents the duplicate or unauthorised replies send by the attackers in the network.
Licence: creative commons attribution 4.0
MANET, AODV routing, black hole attack, CBIDS
Paper Title: AN ANALYSIS OF NOISE FILTERING ALGORITHMS FOR MAGNETIC RESONANCE IMAGES
Publisher Journal Name: IJ Publication
Published Paper ID: - IJRAR190D005
Register Paper ID - 191337
Title: AN ANALYSIS OF NOISE FILTERING ALGORITHMS FOR MAGNETIC RESONANCE IMAGES
Author Name(s): S.Chithra, Shubhi Srivastava
Publisher Journal name: IJ Publication
Volume: 5
Issue: 3
Pages: 29-37
Year: September 2018
Downloads: 797
Medical images are analyzed for diagnosis of various diseases. In medical image processing, removing noise plays a very important role in the preprocessing modules of the virtual endoscope system. The medical imaging devices particularly X-ray, CT/MRI, and ultrasound are manufacturing overabundant pictures that are utilized by medical practitioners within the method of designation. All medical images contain some visual noise. They are mottled, grainy, textured, or snowy appearance. It is very important to obtain precise images to facilitate accurate observations for the given application. Magnetic Resonance Imaging (MRI) is identified to be conceited by several sources of quality descent, due to limitations in the hardware, scanning times, movement of patients, or even the motion of molecules in the scanning subject. Among them, noise is one source of deprivation that affects acquisitions. The occurrences of noise over the acquired MR signal is a trouble which affects not only the visual quality of the images but also may interfere with further processing techniques such as registration or tensor estimation in Diffusion Tensor MRI. The paper aims to illustrate noise models and investigate noise suppression methods based on image processing techniques in MR images.
Licence: creative commons attribution 4.0
Bilateral, Mean, Median, Magnetic Resonance Image, Noise Models, Wiener
Paper Title: A REVIEW ON APPLICATIONS, SYSTEMS AND METHODS USED IN CONNECTED HOME BASED ON COMPONENT TECHNOLOGIES AND INTERNET OF THINGS
Publisher Journal Name: IJ Publication
Published Paper ID: - IJRAR190D004
Register Paper ID - 191336
Title: A REVIEW ON APPLICATIONS, SYSTEMS AND METHODS USED IN CONNECTED HOME BASED ON COMPONENT TECHNOLOGIES AND INTERNET OF THINGS
Author Name(s): Dr. S.Prasanna, K. Vaishnavi
Publisher Journal name: IJ Publication
Volume: 5
Issue: 3
Pages: 22-28
Year: September 2018
Downloads: 827
Licence: creative commons attribution 4.0
RFID, IP,Zigbee, Z-waves, software, OpenHAB, OpenMotics,Smart Phone Centric, Cloud Centric, Hub-Centric, Perceptive Layer, CES 2018
Paper Title: SECURE IOT IN WSN NETWORK
Publisher Journal Name: IJ Publication
Published Paper ID: - IJRAR190D003
Register Paper ID - 191335
Title: SECURE IOT IN WSN NETWORK
Author Name(s): Dr.S.Gayathri, D.Radha2
Publisher Journal name: IJ Publication
Volume: 5
Issue: 3
Pages: 17-21
Year: September 2018
Downloads: 809
Licence: creative commons attribution 4.0
SIT, WSN, RFID,c-Function, Encryption.
Paper Title: INVESTIGATING PRIVACY AND SECURITY IN HEALTHCARE BASED CLOUDLET ENVIRONMENT USING MULTI-LEVEL AGENTS
Publisher Journal Name: IJ Publication
Published Paper ID: - IJRAR190D002
Register Paper ID - 191334
Title: INVESTIGATING PRIVACY AND SECURITY IN HEALTHCARE BASED CLOUDLET ENVIRONMENT USING MULTI-LEVEL AGENTS
Author Name(s): 1Ms.Mary Jacob, Ms.Kalaiselvi K2
Publisher Journal name: IJ Publication
Volume: 5
Issue: 3
Pages: 11-16
Year: September 2018
Downloads: 824
Licence: creative commons attribution 4.0
IoT, offloading, cloud, authenticity, integrity.
Paper Title: INTERNET OF NANO THINGS (IONT): NEXT ORGANIC PROCESS STEP IN TECHNOLOGY
Publisher Journal Name: IJ Publication
Published Paper ID: - IJRAR190D001
Register Paper ID - 191333
Title: INTERNET OF NANO THINGS (IONT): NEXT ORGANIC PROCESS STEP IN TECHNOLOGY
Author Name(s): Dr.I.Lakshmi
Publisher Journal name: IJ Publication
Volume: 5
Issue: 3
Pages: 1-10
Year: September 2018
Downloads: 810
Licence: creative commons attribution 4.0
Nanotechnology, Internet of Things (IoT), Internet of Nano Things (IoNT), Nanosensors, Nano-machines, Sensors, Body Sensor Networks, Nano Communication, Wireless Networks