Distributed Denial of Service attacks are significant dangers these days over web applications and web administrations. These assaults pushing ahead towards application layer to procure furthermore, squander most extreme CPU cycles. By asking for assets from web benefits in gigantic sum utilizing quick fire of solicitations, assailant robotized programs use all the capacity of handling of single server application or circulated environment application. The periods of the plan execution is client conduct checking and identification. In to beginning with stage by social affair the data of client conduct and computing individual user’s trust score will happen and Entropy of a similar client will be ascertained. HTTP Unbearable Load King (HULK) attacks are also evaluated. In light of first stage, in recognition stage, variety in entropy will be watched and malevolent clients will be recognized. Rate limiter is additionally acquainted with stop or downsize serving the noxious clients. This paper introduces the FAÇADE layer for discovery also, hindering the unapproved client from assaulting the framework.
{"title":"HULK and DDoS Attacks in Web Applications with Detection Mechanism","authors":"A. Sharma","doi":"10.23956/IJERMT.V6I6.268","DOIUrl":"https://doi.org/10.23956/IJERMT.V6I6.268","url":null,"abstract":"Distributed Denial of Service attacks are significant dangers these days over web applications and web administrations. These assaults pushing ahead towards application layer to procure furthermore, squander most extreme CPU cycles. By asking for assets from web benefits in gigantic sum utilizing quick fire of solicitations, assailant robotized programs use all the capacity of handling of single server application or circulated environment application. The periods of the plan execution is client conduct checking and identification. In to beginning with stage by social affair the data of client conduct and computing individual user’s trust score will happen and Entropy of a similar client will be ascertained. HTTP Unbearable Load King (HULK) attacks are also evaluated. In light of first stage, in recognition stage, variety in entropy will be watched and malevolent clients will be recognized. Rate limiter is additionally acquainted with stop or downsize serving the noxious clients. This paper introduces the FAÇADE layer for discovery also, hindering the unapproved client from assaulting the framework.","PeriodicalId":416512,"journal":{"name":"International Journal of Emerging Research in Management and Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124376897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The paper focuses on the key issues lies with accessibility of website, Websites is checked through Acheker to get the problems with the institutional websites.
本文重点研究了高校网站的可访问性问题,并通过Acheker软件对高校网站的可访问性问题进行了分析。
{"title":"Educational Institutes Website Accessibility","authors":"Hardikkumar V. Desai","doi":"10.23956/IJERMT.V6I7.233","DOIUrl":"https://doi.org/10.23956/IJERMT.V6I7.233","url":null,"abstract":"The paper focuses on the key issues lies with accessibility of website, Websites is checked through Acheker to get the problems with the institutional websites.","PeriodicalId":416512,"journal":{"name":"International Journal of Emerging Research in Management and Technology","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116913346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Customer experience maturity of any organization is important for its business results. This paper describes two kinds of maturity models, one based on competency evaluation of the employees on customer’s best applied practices, and the second on maturity of using digital tools to increase the customer good experience when working with the company. These approaches are useful when discuss the performance of enterprises providing products or services in the age of customer. The included case studies show the applicability of the procedures and open a way to be extended for proficiency testing workshops (for similar business) or in ranking the enterprises from the viewpoint of customer experience maturity.
{"title":"Customer Experience Maturity Models – Improving the Business Results","authors":"Maria Enescu, Maria Enescu","doi":"10.23956/IJERMT.V6I7.216","DOIUrl":"https://doi.org/10.23956/IJERMT.V6I7.216","url":null,"abstract":"Customer experience maturity of any organization is important for its business results. This paper describes two kinds of maturity models, one based on competency evaluation of the employees on customer’s best applied practices, and the second on maturity of using digital tools to increase the customer good experience when working with the company. These approaches are useful when discuss the performance of enterprises providing products or services in the age of customer. The included case studies show the applicability of the procedures and open a way to be extended for proficiency testing workshops (for similar business) or in ranking the enterprises from the viewpoint of customer experience maturity.","PeriodicalId":416512,"journal":{"name":"International Journal of Emerging Research in Management and Technology","volume":"615 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122696195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
There are many applications of Remote sensing Satellite images like (astronomy, military, forecasting, and geographical information). Using satellite remote sensing data sets we developed the mapping forest area cover change. This kind of multiple improvement and identifying methods have a Training Data Automation algorithm which is used for advanced vector machines procedure. This TDM technique capable of automatically generating exact image enhanced patches. The obtained high resolute training data allow in producing the dependable forest cover change products with the help of SVM. This process was tested in study areas selected from major forest areas across the globe. In each area, a forest cover change map was produced using a pair of real time Land sat images acquired around 1999 and 2015.
{"title":"Hybrid Algorithm for Deforestation Detection Using Satellite Data by Using Support Vector Machine (SVM) Algorithm","authors":"J. S. Babu, T. Sudha","doi":"10.23956/IJERMT.V6I6.238","DOIUrl":"https://doi.org/10.23956/IJERMT.V6I6.238","url":null,"abstract":"There are many applications of Remote sensing Satellite images like (astronomy, military, forecasting, and geographical information). Using satellite remote sensing data sets we developed the mapping forest area cover change. This kind of multiple improvement and identifying methods have a Training Data Automation algorithm which is used for advanced vector machines procedure. This TDM technique capable of automatically generating exact image enhanced patches. The obtained high resolute training data allow in producing the dependable forest cover change products with the help of SVM. This process was tested in study areas selected from major forest areas across the globe. In each area, a forest cover change map was produced using a pair of real time Land sat images acquired around 1999 and 2015.","PeriodicalId":416512,"journal":{"name":"International Journal of Emerging Research in Management and Technology","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129860787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We are in the era of digital revolution and the benefits are remarkable. People are much dependent on digital technology and can’t survive without it. With the advancement of Internet and its applications, we share a wide range of data including texts, images, audios and videos in a more extensive space and time scope that we never had before. This increases the need for security day by day. Cryptography is an art of Science that uses complex logic in order to design powerful encryption techniques. Both symmetric and asymmetric key encryptions have their own advantages. Time Dependant Multiple Random Cipher(TDMRC) code is one of the best symmetric encryption schemes. Elliptic curve cryptography(ECC) is widely used because of its less key size and faster key generation. This paper proposes a new method of hybrid encryption method using ECC and TDMRC.
{"title":"A Novel Hybrid Encryption Method for Multimedia Encryption Using Elliptic Curve Cryptography and TDMRC","authors":"M. Sreekala, V. Paul","doi":"10.23956/IJERMT.V6I7.178","DOIUrl":"https://doi.org/10.23956/IJERMT.V6I7.178","url":null,"abstract":"We are in the era of digital revolution and the benefits are remarkable. People are much dependent on digital technology and can’t survive without it. With the advancement of Internet and its applications, we share a wide range of data including texts, images, audios and videos in a more extensive space and time scope that we never had before. This increases the need for security day by day. Cryptography is an art of Science that uses complex logic in order to design powerful encryption techniques. Both symmetric and asymmetric key encryptions have their own advantages. Time Dependant Multiple Random Cipher(TDMRC) code is one of the best symmetric encryption schemes. Elliptic curve cryptography(ECC) is widely used because of its less key size and faster key generation. This paper proposes a new method of hybrid encryption method using ECC and TDMRC.","PeriodicalId":416512,"journal":{"name":"International Journal of Emerging Research in Management and Technology","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129336160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aluminium Metal Matrix Composites (AMMCs) are the new class of materials substituting many industrial materials. It is due to its superior qualities compared to conventional materials. AMMCs has found a versatile application because it has aluminium in matrix phase hence light in weight and also it can acquire different properties as per reinforcements used. Sintering is one of the prominent methods used to manufacture AMMCs. Sintering process is used in Powder Metallurgy in which small powdered particles are heated to bond together. The process enhances the strength as well as other mechanical and tribological properties. The technology enables us to shape materials difficult to machine, parts with complex geometries, materials having high melting point, parts with close dimensional tolerances, or to combine different materials which is not possible with any other process. The most important part is that the density of the product can be controlled according to the requirements and thus self-lubricating and wear-resistant parts are possible. The present study has attempted to see if TiB2 can be used as reinforcement in AMMCs produced through powder metallurgy route and the changes in the properties of AMMCs by the different sintering methods adopted. The compacted preforms of varying compositions of reinforcement were prepared and sintered through three different methods i.e. Microwave sintering, Conventional sintering and Hot-pressing to study the changes in the properties. A comparative study has been done between the three sintering methods to see the limitations and scope for improvement.
{"title":"Comparative Study of Al-TiB2 Composite Fabricated by Different Powder Metallurgical Methods","authors":"Purushottam Kumar, S. Parhi, S. Datta","doi":"10.23956/IJERMT.V6I7.209","DOIUrl":"https://doi.org/10.23956/IJERMT.V6I7.209","url":null,"abstract":"Aluminium Metal Matrix Composites (AMMCs) are the new class of materials substituting many industrial materials. It is due to its superior qualities compared to conventional materials. AMMCs has found a versatile application because it has aluminium in matrix phase hence light in weight and also it can acquire different properties as per reinforcements used. Sintering is one of the prominent methods used to manufacture AMMCs. Sintering process is used in Powder Metallurgy in which small powdered particles are heated to bond together. The process enhances the strength as well as other mechanical and tribological properties. The technology enables us to shape materials difficult to machine, parts with complex geometries, materials having high melting point, parts with close dimensional tolerances, or to combine different materials which is not possible with any other process. The most important part is that the density of the product can be controlled according to the requirements and thus self-lubricating and wear-resistant parts are possible. The present study has attempted to see if TiB2 can be used as reinforcement in AMMCs produced through powder metallurgy route and the changes in the properties of AMMCs by the different sintering methods adopted. The compacted preforms of varying compositions of reinforcement were prepared and sintered through three different methods i.e. Microwave sintering, Conventional sintering and Hot-pressing to study the changes in the properties. A comparative study has been done between the three sintering methods to see the limitations and scope for improvement.","PeriodicalId":416512,"journal":{"name":"International Journal of Emerging Research in Management and Technology","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122263367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
e- HRM is a wide term which integrates Information Technology (IT) with Human Resource Management (HRM). It mainly focuses on the goals of the managers and employees of a company. e- HRM is the process of transmission of digitalized Human Resource information. e- HRM is a technique of executing Human Resource (HR) plans, policies, and practices in an organization. In the present times, a number of organizations have replaced Human Resource Management activities with e- HRM in their business. The process of e- HRM has played an efficient role in increasing the overall Human Resource capabilities of management. This research paper elaborates on e-HRM in detail on the following aspects: Introduction of e-HRM, Scope of e-HRM, functions of e-HRM, objectives of e- HRM, outcomes of e- HRM. This paper is an attempt to study the e-HRM and its various aspects.
{"title":"e- Human Resource Management (e-HRM)","authors":"Raashidah Gani, D. Anjum","doi":"10.23956/IJERMT.V6I6.266","DOIUrl":"https://doi.org/10.23956/IJERMT.V6I6.266","url":null,"abstract":"e- HRM is a wide term which integrates Information Technology (IT) with Human Resource Management (HRM). It mainly focuses on the goals of the managers and employees of a company. e- HRM is the process of transmission of digitalized Human Resource information. e- HRM is a technique of executing Human Resource (HR) plans, policies, and practices in an organization. In the present times, a number of organizations have replaced Human Resource Management activities with e- HRM in their business. The process of e- HRM has played an efficient role in increasing the overall Human Resource capabilities of management. This research paper elaborates on e-HRM in detail on the following aspects: Introduction of e-HRM, Scope of e-HRM, functions of e-HRM, objectives of e- HRM, outcomes of e- HRM. This paper is an attempt to study the e-HRM and its various aspects.","PeriodicalId":416512,"journal":{"name":"International Journal of Emerging Research in Management and Technology","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131462410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Deep Drawing (DD) process is the one in which a punch forces a flat sheet metal blank into a die cavity. DD can also be described as the process which involves conversion of flat thin sheet metal blanks into parts of desired shape. Little work is available in the applications of DD processes at elevated temperatures which is going to be a very important manufacturing application in the coming decades. Deep Drawing (DD) is one of the sheet metal forming processes widely used in automobile, aerospace, electronics and allied industries to produce the hollow parts. The improvement in the deep drawing manufacturing process with latest methodologies leads to developments in the automobile and other sheet metal industries. Still today, this process of analysis and design is an art than science. Presently, the conventional deep drawing (CDD) operation is carried out at room temperature in industries. Although the deep drawing process of high strength / low formability metals has an extensive industrial application area, deep drawing at room temperature has serious difficulties because of the large amount of deformations revealed and high flow stresses of the materials. The present paper gives an overview of deep drawing process, its classification along with advantages, limitations and applications.
{"title":"A Review on Deep Drawing Process","authors":"D. Swapna, S. Ch., S. Radhika","doi":"10.23956/IJERMT.V6I6.260","DOIUrl":"https://doi.org/10.23956/IJERMT.V6I6.260","url":null,"abstract":"Deep Drawing (DD) process is the one in which a punch forces a flat sheet metal blank into a die cavity. DD can also be described as the process which involves conversion of flat thin sheet metal blanks into parts of desired shape. Little work is available in the applications of DD processes at elevated temperatures which is going to be a very important manufacturing application in the coming decades. Deep Drawing (DD) is one of the sheet metal forming processes widely used in automobile, aerospace, electronics and allied industries to produce the hollow parts. The improvement in the deep drawing manufacturing process with latest methodologies leads to developments in the automobile and other sheet metal industries. Still today, this process of analysis and design is an art than science. Presently, the conventional deep drawing (CDD) operation is carried out at room temperature in industries. Although the deep drawing process of high strength / low formability metals has an extensive industrial application area, deep drawing at room temperature has serious difficulties because of the large amount of deformations revealed and high flow stresses of the materials. The present paper gives an overview of deep drawing process, its classification along with advantages, limitations and applications.","PeriodicalId":416512,"journal":{"name":"International Journal of Emerging Research in Management and Technology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127818526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Software engineering is comparatively a new addition in the vocabulary of traditional engineering discipline. Being a late joiner, software engineering obtained many of its process foundation from traditional engineering domains. But the ever-changing business needs and the growing complexity that are required to be addressed in a software application, have kept software engineers on their toes to continuously improve the development process to meet and to manage the challenges in it. Agile project management has been the most significant development in IT industry to manage software development process that could deliver quality software product at an extremely high speed compared to any of the predecessor methods. The key abstraction of all the flavors of agile methods is adaptability towards change. This adaptability is achieved by the use of quality practices and practitioners in a closely integrated working environment that also involves the customers in the development process more than ever before. IT industry has acknowledged the significant success of the agile process and has been a buzz-word for a decade in the IT industry. The paper is built upon a comparative study of the application of Agile project management in both IT and non-IT industries. It further discusses the adaptability of agile methods and its potential to benefit the Non-IT industry in managing the quality of deliverables while maintaining high delivery speed. The discussion extends its boundaries to cover the reason for less acceptance of Agile process in non-IT industry and put forth an argument against the suitability of some of the success-factors in the case of non-IT industries, while they enabled a high acceptance of the Agile process in IT-industry.
{"title":"Agile Movement from IT Industry to Non-IT Industry: A Review and Analysis","authors":"S. Alam, Syed Shahabuddin Ashraf, Faria Iqbal","doi":"10.23956/IJERMT.V6I6.283","DOIUrl":"https://doi.org/10.23956/IJERMT.V6I6.283","url":null,"abstract":"Software engineering is comparatively a new addition in the vocabulary of traditional engineering discipline. Being a late joiner, software engineering obtained many of its process foundation from traditional engineering domains. But the ever-changing business needs and the growing complexity that are required to be addressed in a software application, have kept software engineers on their toes to continuously improve the development process to meet and to manage the challenges in it. Agile project management has been the most significant development in IT industry to manage software development process that could deliver quality software product at an extremely high speed compared to any of the predecessor methods. The key abstraction of all the flavors of agile methods is adaptability towards change. This adaptability is achieved by the use of quality practices and practitioners in a closely integrated working environment that also involves the customers in the development process more than ever before. IT industry has acknowledged the significant success of the agile process and has been a buzz-word for a decade in the IT industry. The paper is built upon a comparative study of the application of Agile project management in both IT and non-IT industries. It further discusses the adaptability of agile methods and its potential to benefit the Non-IT industry in managing the quality of deliverables while maintaining high delivery speed. The discussion extends its boundaries to cover the reason for less acceptance of Agile process in non-IT industry and put forth an argument against the suitability of some of the success-factors in the case of non-IT industries, while they enabled a high acceptance of the Agile process in IT-industry.","PeriodicalId":416512,"journal":{"name":"International Journal of Emerging Research in Management and Technology","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115671802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper we discussed about A bitopological space X is called an gT (1,2)*-space if every (1,2)*-g-closed set in it is (1,2)*-closed. And A bitopological space X is called a T (1,2)*-space if every (1,2)*-closed subset of X is τ1,2-closed in X. and we are also going to prove that Every (1,2)*-αTb-space is T (1,2)*-space but not conversely
{"title":"T (1,2)*-SPACES","authors":"A. Thamilisai, S. Brindha","doi":"10.23956/IJERMT.V6I6.259","DOIUrl":"https://doi.org/10.23956/IJERMT.V6I6.259","url":null,"abstract":"In this paper we discussed about A bitopological space X is called an gT (1,2)*-space if every (1,2)*-g-closed set in it is (1,2)*-closed. And A bitopological space X is called a T (1,2)*-space if every (1,2)*-closed subset of X is τ1,2-closed in X. and we are also going to prove that Every (1,2)*-αTb-space is T (1,2)*-space but not conversely","PeriodicalId":416512,"journal":{"name":"International Journal of Emerging Research in Management and Technology","volume":"181 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124558483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}