2020

20-Feb-2021    |    Emerging Trends in Engineering Research    | Volume III


No Title Page
1 Clustering of Indian States Based on Crime Incidences and Predicting Crimes Therein 1 - 9
Agrim Chatterjee, Atul Sohoni, Dhruv Chhawchhria, Harsh Antani,M. Sekar
2 Impact of Optimization Algorithms in Detection of Tuberculosis Using Transfer Learning 10 - 14
Anu Priya P, Reshma Thomas, Midhun Rajiv
3 A Review of the Advantages of Knowledge Based System Over the Conventional Computer Based Information Systems 15 - 17
Binumon Joseph, Rini Kurian, Meera Rose Mathew
4 An Implementation and Evaluation of PDF Password Cracking Using John the Ripper and Crunch 18 - 21
Anurag A and Sr. Mercy Joseph
5 Vision and Language Navigation using Minimal Voice Instructions 22 - 26
Parth Kansara, Ansh Shah , Prof. Prachi Tawde, Parth Meswani
6 Vulnerability Testing on Rooted Android Phones Using Msf Venom Payloads 27 - 32
Sabin Thomas and Dr. Bijimol T K
7 Testdisk and Photorec –Analysis and Comparison 33 - 37
Deepu V S, Ms. Nimmy Francis
8 Asp. Net Framework in Model View Controller Implementation 38 - 41
Yedhukrishnan B K, Dr. Juby Mathew
9 A Study on Password Breaking Tools 42 - 45
Sachin S Kumar, Dr. Bijimol T K
10 Analysis of Student Performance Using Data Mining Algorithm in Weka 46 - 49
Divine Zacharias, Merin Manoj
11 An Implementation And It’s Evaluation of Password Cracking Tools Fcrackzip And Crunch 50 - 53
Stella M Thomas, Jinson Devis
12 An Awareness on SET in Kali Linux 54 - 58
Rositta Joy, Ms. Lisha Varghese
13 Diabetes Prediction Using Machine Learning Algorithms 59 - 63
Melbin Varghese, Mrs. Nimmy Francis
14 Securely Storing Searchable String in Database 64 - 65
Jithin KG, Jobin T J
15 Hooking the Network with Bettercap and BeEF-XSS 66 - 69
Shreyas S, Meera Rose Mathew
16 A Survey on File Carving Process Using Foremost and Scalpel 70 - 72
Rintu Aleyamma Thomas, Manju Mathai
17 Analyzing and Adding Accident Prone Area’s in Kerala into Google Map 73 - 76
Adhin Babu, Dr. Juby Mathew
18 Accurately Locate Smartphones Using Seeker 77 - 80
Ben Thomas, Rony Tom
19 Argon2: The Secure Password Hashing Function 81 - 84
Aleena Theresa George, Dr. Juby Mathew
20 Analysis and Prediction of Soybean Plant Disease 85 - 89
Priya Prakash, Jetty Benjamin
21 Data Analysis of Mark Using SPSS 90 - 91
Dr. Manju K Mathai, Meera Mariya Thomas
22 Estimating Number of HIV Patients (Country Wise) Using Data Mining Tool 92 - 95
Kevin Moncy, Ankitha Philip
23 File Carving Techniques Using Scalpel 96 - 98
Nibi Mariya Sunny, Jetty Benjamin
24 Applying Data Visualization Techniques for Online Tailoring Sales Analysis Using WEKA 99 - 102
Joe Tom Thomas, Dr. Manju K Mathai
25 A Study into the Use of Artificial Intelligence in E-Commerce Stock Management and Product Suggestion Generation for End Users 103 -105
Jobin Mathew, Binumon Joseph
26 Owasp Zed Attack Proxy 106 -111
Jobin T.J, Karthika Suresh Babu
27 Foresee the Likelihood of Covid-19 Using Chest X-Ray Images with Image Preprocessing 112 -117
Aneeta Thomas,Mr. T.J Jobin
28 A Research Work on Information Gathering Tools 118 - 120
Arun S, Dr. Bijimol T K
29 SPYNOTE – Dangerous and Powerful Remote Controller for Android 121 - 124
Honey K Kuriakose, Ms. Anit James
30 Implementing an Undetectable Backdoor by Applying Veil Framework 125 - 128
Alan S Mathew, Jobin T. J
31 Evolution of Captchas – Deep Captcha 129 – 130
Jeswin Antony, Shelly Shiju George
32 Authentication by Encrypted Negative Password 131 - 133
Jobin Thomas Alummoottil, Rony Tom
33 WPscan – Discovering the Vulnerabilities and Enumerating Users of WordPress Sites with Autotor for IP Spoofing 134 - 136
Tebin Jose, Rini Kurian
34 Forecasting the Chances of Having Cardio Vascular Disease in Patients Using Data Mining Tool 137 - 140
Harikrishnan R, Jetty Benjamin
35 Prediction of Different Learning Habit among Students using Data Mining Algorithms 141 - 144
Jincy Mathew, Gloriya Mathew
36 Theoretical Framework of MD5 Algorithm for Password Encryption 145 - 147
Ashley Shaji and Jinson Devis
37 Comparative Study of Machine Learning Techniques to Predict Diabetic Retinopathy Using WEKA Tool 148 - 152
Ahil Sandes, Merin Manoj
38 Student Placement Prediction Using Weka 153 - 155
Jaimi Santhosh, Navyamol K.T
39 Disease Prediction Using Machine Learning Approach 156 - 159
Tintu Jose, Rini Kurian
40 Resemblance Study of Machine Learning Techniques to Predict Heart Disease Using WEKA Tool 160 - 164
Fathima Rafi, Gloriya Mathew
41 Analyzing Performance of Classifiers for Fake News Detection 165 - 168
Fathima Shafeek and Gloriya Mathew
42 Image Steganography with Open SSL Base64 Encryption for Enhanced Password Security 169 - 172
Akhil Tom Sebastian, Juby Mathew
43 Encryption and Decryption Using Hash and Verify 173 - 177
Alfiya Abdulsalam, Ankitha Philip
44 Twitter Sentimental Analysis Using Ml 178 - 180
Nimisha Siby, Grace Joseph
45 Campus Recruitment: Academic and Employability Factors influencing placement using Data Mining 181 - 184
Sherin Thomas, Nimmy Francis
46 Kidney Disease Analysis Using WEKA 185 - 188
Neethu S Babu, Binumon Joseph
47 Role of Big Data Analysis and Machine Learning in Ecommerce - Customer Segmentation 189 - 197
Alphy Mathew, Jobin T J
48 Analysis and Prediction of Diabetes Diseases 198 - 202
Vijayalakshmi P B, Paulin Paul
49 Base64 End of File and Steganography to Improve Security in Websites 203 - 207
Geena George, Ankitha Philip
50 ARP Poisoning Using ETTERCAP and WIRESHARK 208 - 210
Justin Joseph, Sona Sebastian
51 Encoding and Hiding Data Within an Image and Conversion of Numbers 211 - 214
Josmy Joseph, Gloriya Mathew
52 FERNET System 215 - 217
Neethu John, Ankitha Philip
53 Efficient Brute Force Attack Handling: Server Virtualization 218 -221
Lovely Anna John, Dr. Juby Mathew
54 Implementing Password Hash on Login 222 - 224
Anitta maria joseph, Lisha Varghese
55 Identifying Vulnerabilities in a Website Using Uniscan and Comparing Uniscan, Grabber, Nikto 225 - 229
Sneha Varghese, Rini Kurian
56 Identifying Subdomains of the Website Using SUBLIST3R and Comparing SUBLIST3R AMASS, KNOCKPY 230 - 234
Arunima Santhosh, Rini Kurian
57 A Comparison Study of Remote Administration Tools 235 - 237
Alen James, Paulin Paul
58 Penetration Testing on Websites Using jSQL Injection 238 - 241
Vineeth M V, Pauline Paul
59 Comparative Study of Machine Learning Techniques to Classify Edible and Poisonous Mushrooms 242 - 246
Sijimol Cyriac, Meera Rose Mathew
60 Comparative Study on Password Cracking Tools 247 - 250
Shejina Nazar, Rini Kurian
61 Placement Prediction of Students Using the Data Mining Tool Weka 251 - 253
Tessa Joseph, Dr. Bijimol T K
62 Prediction of Breast Cancer, Comparative Study of Machine Learning Techniques Using WEKA Tool 254 - 258
Teena Thomas, Meera Rose Mathew
63 Predicting Alcohol Consumption in Students Using Data Mining Tool 259 - 263
Tincymol M T, Grace Joseph
64 FERNET :Symmetric Key Encryption for Password Security 264 - 267
Reshma S Ramesh, Meera Rose Mathew
65 Server Load Balancing Through Quantum Radial Basis Function Neural Network Algorithm 268 - 270
Mrs. Ankitha Philip, Jocely Joseph
66 Penetration Testing and Vulnerability Scanning of Web Application using Burp Suite 271 - 277
Dona Rose Mathew, Jetty Benjamin
67 Phishing 278 - 280
Joe Joseph, Jisnon Devis
68 Password Security using BCrypt 281 - 282
Sreehari C A, Nimmy Francis
69 Study on Phishing Attacks 283 - 287
Josmy Joseph, Merin Manoj
70 Mobile Edge Computing 288 - 290
Anu V Jacob

Copyright © MCA Amal Jyothi College of Engineering