No |
|
Title |
Page |
1 |
|
Clustering of Indian States Based on Crime Incidences and Predicting Crimes Therein |
1 - 9 |
|
|
Agrim Chatterjee, Atul Sohoni, Dhruv Chhawchhria, Harsh Antani,M. Sekar |
|
|
|
|
2 |
|
Impact of Optimization Algorithms in Detection of Tuberculosis Using Transfer Learning |
10 - 14 |
|
|
Anu Priya P, Reshma Thomas, Midhun Rajiv |
|
|
|
|
3 |
|
A Review of the Advantages of Knowledge Based System Over the Conventional Computer Based Information Systems |
15 - 17 |
|
|
Binumon Joseph, Rini Kurian, Meera Rose Mathew |
|
|
|
|
4 |
|
An Implementation and Evaluation of PDF Password Cracking Using John the Ripper and Crunch |
18 - 21 |
|
|
Anurag A and Sr. Mercy Joseph |
|
|
|
|
5 |
|
Vision and Language Navigation using Minimal Voice Instructions |
22 - 26 |
|
|
Parth Kansara, Ansh Shah , Prof. Prachi Tawde, Parth Meswani |
|
|
|
|
6 |
|
Vulnerability Testing on Rooted Android Phones Using Msf Venom Payloads |
27 - 32 |
|
|
Sabin Thomas and Dr. Bijimol T K |
|
|
|
|
7 |
|
Testdisk and Photorec –Analysis and Comparison |
33 - 37 |
|
|
Deepu V S, Ms. Nimmy Francis |
|
|
|
|
8 |
|
Asp. Net Framework in Model View Controller Implementation |
38 - 41 |
|
|
Yedhukrishnan B K, Dr. Juby Mathew |
|
|
|
|
9 |
|
A Study on Password Breaking Tools |
42 - 45 |
|
|
Sachin S Kumar, Dr. Bijimol T K |
|
|
|
|
10 |
|
Analysis of Student Performance Using Data Mining Algorithm in Weka |
46 - 49 |
|
|
Divine Zacharias, Merin Manoj |
|
|
|
|
11 |
|
An Implementation And It’s Evaluation of Password Cracking Tools Fcrackzip And Crunch |
50 - 53 |
|
|
Stella M Thomas, Jinson Devis |
|
|
|
|
12 |
|
An Awareness on SET in Kali Linux |
54 - 58 |
|
|
Rositta Joy, Ms. Lisha Varghese |
|
|
|
|
13 |
|
Diabetes Prediction Using Machine Learning Algorithms |
59 - 63 |
|
|
Melbin Varghese, Mrs. Nimmy Francis |
|
|
|
|
14 |
|
Securely Storing Searchable String in Database |
64 - 65 |
|
|
Jithin KG, Jobin T J |
|
|
|
|
15 |
|
Hooking the Network with Bettercap and BeEF-XSS |
66 - 69 |
|
|
Shreyas S, Meera Rose Mathew |
|
|
|
|
16 |
|
A Survey on File Carving Process Using Foremost and Scalpel |
70 - 72 |
|
|
Rintu Aleyamma Thomas, Manju Mathai |
|
|
|
|
17 |
|
Analyzing and Adding Accident Prone Area’s in Kerala into Google Map |
73 - 76 |
|
|
Adhin Babu, Dr. Juby Mathew |
|
|
|
|
18 |
|
Accurately Locate Smartphones Using Seeker |
77 - 80 |
|
|
Ben Thomas, Rony Tom |
|
|
|
|
19 |
|
Argon2: The Secure Password Hashing Function |
81 - 84 |
|
|
Aleena Theresa George, Dr. Juby Mathew |
|
|
|
|
20 |
|
Analysis and Prediction of Soybean Plant Disease |
85 - 89 |
|
|
Priya Prakash, Jetty Benjamin |
|
|
|
|
21 |
|
Data Analysis of Mark Using SPSS |
90 - 91 |
|
|
Dr. Manju K Mathai, Meera Mariya Thomas |
|
|
|
|
22 |
|
Estimating Number of HIV Patients (Country Wise) Using Data Mining Tool |
92 - 95 |
|
|
Kevin Moncy, Ankitha Philip |
|
|
|
|
23 |
|
File Carving Techniques Using Scalpel |
96 - 98 |
|
|
Nibi Mariya Sunny, Jetty Benjamin |
|
|
|
|
24 |
|
Applying Data Visualization Techniques for Online Tailoring Sales Analysis Using WEKA |
99 - 102 |
|
|
Joe Tom Thomas, Dr. Manju K Mathai |
|
|
|
|
25 |
|
A Study into the Use of Artificial Intelligence in E-Commerce Stock Management and Product Suggestion Generation for End Users |
103 -105 |
|
|
Jobin Mathew, Binumon Joseph |
|
|
|
|
26 |
|
Owasp Zed Attack Proxy |
106 -111 |
|
|
Jobin T.J, Karthika Suresh Babu |
|
|
|
|
27 |
|
Foresee the Likelihood of Covid-19 Using Chest X-Ray Images with Image Preprocessing |
112 -117 |
|
|
Aneeta Thomas,Mr. T.J Jobin |
|
|
|
|
28 |
|
A Research Work on Information Gathering Tools |
118 - 120 |
|
|
Arun S, Dr. Bijimol T K |
|
|
|
|
29 |
|
SPYNOTE – Dangerous and Powerful Remote Controller for Android |
121 - 124 |
|
|
Honey K Kuriakose, Ms. Anit James |
|
|
|
|
30 |
|
Implementing an Undetectable Backdoor by Applying Veil Framework |
125 - 128 |
|
|
Alan S Mathew, Jobin T. J |
|
|
|
|
31 |
|
Evolution of Captchas – Deep Captcha |
129 – 130 |
|
|
Jeswin Antony, Shelly Shiju George |
|
|
|
|
32 |
|
Authentication by Encrypted Negative Password |
131 - 133 |
|
|
Jobin Thomas Alummoottil, Rony Tom |
|
|
|
|
33 |
|
WPscan – Discovering the Vulnerabilities and Enumerating Users of WordPress Sites with Autotor for IP Spoofing |
134 - 136 |
|
|
Tebin Jose, Rini Kurian |
|
|
|
|
34 |
|
Forecasting the Chances of Having Cardio Vascular Disease in Patients Using Data Mining Tool |
137 - 140 |
|
|
Harikrishnan R, Jetty Benjamin |
|
|
|
|
35 |
|
Prediction of Different Learning Habit among Students using Data Mining Algorithms |
141 - 144 |
|
|
Jincy Mathew, Gloriya Mathew |
|
|
|
|
36 |
|
Theoretical Framework of MD5 Algorithm for Password Encryption |
145 - 147 |
|
|
Ashley Shaji and Jinson Devis |
|
|
|
|
37 |
|
Comparative Study of Machine Learning Techniques to Predict Diabetic Retinopathy Using WEKA Tool |
148 - 152 |
|
|
Ahil Sandes, Merin Manoj |
|
|
|
|
38 |
|
Student Placement Prediction Using Weka |
153 - 155 |
|
|
Jaimi Santhosh, Navyamol K.T |
|
|
|
|
39 |
|
Disease Prediction Using Machine Learning Approach |
156 - 159 |
|
|
Tintu Jose, Rini Kurian |
|
|
|
|
40 |
|
Resemblance Study of Machine Learning Techniques to Predict Heart Disease Using WEKA Tool |
160 - 164 |
|
|
Fathima Rafi, Gloriya Mathew |
|
|
|
|
41 |
|
Analyzing Performance of Classifiers for Fake News Detection |
165 - 168 |
|
|
Fathima Shafeek and Gloriya Mathew |
|
|
|
|
42 |
|
Image Steganography with Open SSL Base64 Encryption for Enhanced Password Security |
169 - 172 |
|
|
Akhil Tom Sebastian, Juby Mathew |
|
|
|
|
43 |
|
Encryption and Decryption Using Hash and Verify |
173 - 177 |
|
|
Alfiya Abdulsalam, Ankitha Philip |
|
|
|
|
44 |
|
Twitter Sentimental Analysis Using Ml |
178 - 180 |
|
|
Nimisha Siby, Grace Joseph |
|
|
|
|
45 |
|
Campus Recruitment: Academic and Employability Factors influencing placement using Data Mining |
181 - 184 |
|
|
Sherin Thomas, Nimmy Francis |
|
|
|
|
46 |
|
Kidney Disease Analysis Using WEKA |
185 - 188 |
|
|
Neethu S Babu, Binumon Joseph |
|
|
|
|
47 |
|
Role of Big Data Analysis and Machine Learning in Ecommerce - Customer Segmentation |
189 - 197 |
|
|
Alphy Mathew, Jobin T J |
|
|
|
|
48 |
|
Analysis and Prediction of Diabetes Diseases |
198 - 202 |
|
|
Vijayalakshmi P B, Paulin Paul |
|
|
|
|
49 |
|
Base64 End of File and Steganography to Improve Security in Websites |
203 - 207 |
|
|
Geena George, Ankitha Philip |
|
|
|
|
50 |
|
ARP Poisoning Using ETTERCAP and WIRESHARK |
208 - 210 |
|
|
Justin Joseph, Sona Sebastian |
|
|
|
|
51 |
|
Encoding and Hiding Data Within an Image and Conversion of Numbers |
211 - 214 |
|
|
Josmy Joseph, Gloriya Mathew |
|
|
|
|
52 |
|
FERNET System |
215 - 217 |
|
|
Neethu John, Ankitha Philip |
|
|
|
|
53 |
|
Efficient Brute Force Attack Handling: Server Virtualization |
218 -221 |
|
|
Lovely Anna John, Dr. Juby Mathew |
|
|
|
|
54 |
|
Implementing Password Hash on Login |
222 - 224 |
|
|
Anitta maria joseph, Lisha Varghese |
|
|
|
|
55 |
|
Identifying Vulnerabilities in a Website Using Uniscan and Comparing Uniscan, Grabber, Nikto |
225 - 229 |
|
|
Sneha Varghese, Rini Kurian |
|
|
|
|
56 |
|
Identifying Subdomains of the Website Using SUBLIST3R and Comparing SUBLIST3R AMASS, KNOCKPY |
230 - 234 |
|
|
Arunima Santhosh, Rini Kurian |
|
|
|
|
57 |
|
A Comparison Study of Remote Administration Tools |
235 - 237 |
|
|
Alen James, Paulin Paul |
|
|
|
|
58 |
|
Penetration Testing on Websites Using jSQL Injection |
238 - 241 |
|
|
Vineeth M V, Pauline Paul |
|
|
|
|
59 |
|
Comparative Study of Machine Learning Techniques to Classify Edible and Poisonous Mushrooms |
242 - 246 |
|
|
Sijimol Cyriac, Meera Rose Mathew |
|
|
|
|
60 |
|
Comparative Study on Password Cracking Tools |
247 - 250 |
|
|
Shejina Nazar, Rini Kurian |
|
|
|
|
61 |
|
Placement Prediction of Students Using the Data Mining Tool Weka |
251 - 253 |
|
|
Tessa Joseph, Dr. Bijimol T K |
|
|
|
|
62 |
|
Prediction of Breast Cancer, Comparative Study of Machine Learning Techniques Using WEKA Tool |
254 - 258 |
|
|
Teena Thomas, Meera Rose Mathew |
|
|
|
|
63 |
|
Predicting Alcohol Consumption in Students Using Data Mining Tool |
259 - 263 |
|
|
Tincymol M T, Grace Joseph |
|
|
|
|
64 |
|
FERNET :Symmetric Key Encryption for Password Security |
264 - 267 |
|
|
Reshma S Ramesh, Meera Rose Mathew |
|
|
|
|
65 |
|
Server Load Balancing Through Quantum Radial Basis Function Neural Network Algorithm |
268 - 270 |
|
|
Mrs. Ankitha Philip, Jocely Joseph |
|
|
|
|
66 |
|
Penetration Testing and Vulnerability Scanning of Web Application using Burp Suite |
271 - 277 |
|
|
Dona Rose Mathew, Jetty Benjamin |
|
|
|
|
67 |
|
Phishing |
278 - 280 |
|
|
Joe Joseph, Jisnon Devis |
|
|
|
|
68 |
|
Password Security using BCrypt |
281 - 282 |
|
|
Sreehari C A, Nimmy Francis |
|
|
|
|
69 |
|
Study on Phishing Attacks |
283 - 287 |
|
|
Josmy Joseph, Merin Manoj |
|
|
|
|
70 |
|
Mobile Edge Computing |
288 - 290 |
|
|
Anu V Jacob |
|
|
|
|