Notice Board :

Call for Paper
Vol. 5 Issue 5

Submission Start Date:
May 01, 2018

Acceptence Notification Start:
May 10, 2018

Submission End:
May 15, 2018

Final MenuScript Due:
May 30, 2018

Publication Date:
June 04, 2018
                         Notice Board: Call for PaperVol. 5 Issue 5      Submission Start Date: May 01, 2018      Acceptence Notification Start: May 10, 2018      Submission End: May 15, 2018      Final MenuScript Due: May 30, 2018      Publication Date: June 04, 2018




Volume IV Issue VIII

Author Name
Rifky Fachry Muchamad, Erick Paulus, S.Si., M.Kom, Dr. Juli Rejito, M.Kom
Year Of Publication
2017
Volume and Issue
Volume 4 Issue 8
Abstract
Browser game is a game that can be accessed using internet connection and web browser as a platform, one of which is Kantai Collection, Unfortunately, Kantai Collection has a restriction that the game can only be accessed within Japan only. IP spoofing is a method that can be used to change user’s location, hopefully, by using this method, user can access Kantai Collection even if the user cannot access Kantai Collection directly from Japan. In this research, we developed a Chrome Extension that can be installed in Google Chrome web browser. The result from this research is that IP spoofing can be used to access Kantai Collection.
PaperID
2017/IJTRM/8/2017/9121

Author Name
Juhi Khan, Rajesh Kumar Chakrawarti
Year Of Publication
2017
Volume and Issue
Volume 4 Issue 8
Abstract
A Honey pot is an exciting new technology with enormous potential for the security community. It is resource which is intended to be attacked and compromised to gain more information about the attacker and his attack techniques. The most of the attacks by a hacker would like to attack on the database concerning the username, the password and their respective account numbers. After acquisition of the same the hackers would very conveniently trespass the security walls of authentication and authorization and thereby making the transaction official. Honey Pots are spurious computer systems, structure as a "decoy", that are used to assemble data on intruders. A Honey Pot, loaded with spurious information, views to the hacker to be a legitimate machine. While it arises defenseless to attack, it actually anticipates access to esteemed data, administrative controls and other computers.
PaperID
2017/IJTRM/8/2017/9124

Author Name
Subham Sadhu, Suraj Kumar Singh, Shruti Kanga
Year Of Publication
2017
Volume and Issue
Volume 4 Issue 8
Abstract
Transport openness is an imperative driver of urban development and key to the reasonable improvement of urban areas. This paper shows a straightforward GIS-based apparatus created to permit the quick examination of availability by various transport modes. Intended to be adaptable and utilize freely accessible information, this device (worked in ArcGIS) utilizes summed up cost to gauge transport costs crosswise over systems including fiscal and separate segments. ArcGIS based Network Analysis give different arrangement viewpoints to an assortment of issues relating to spatial systems incorporate finding the most effective travel course, creating travel bearings, finding the nearest office, and characterizing administration regions in light of travel time and separation secured.
PaperID
2017/IJTRM/8/2017/9126

Author Name
Hemant Rajoriy, Sachin Bandewar
Year Of Publication
2017
Volume and Issue
Volume 4 Issue 8
Abstract
Power utilization has turned out to be significant plan limitation for incorporated circuits(IC's). In the Nanometer innovation administration, spillage control has turned into a noteworthy part of aggregate power. Full snake is the fundamental practical unit of an ALU. The power utilization of a processor is brought down by bringing down the power utilization of an ALU, and the power utilization of an ALU can be brought down by bringing down the power utilization of Full snake. The low power systems are winding up more essential because of quick improvement of compact computerized applications; interest for rapid and low power consumption.GDI (Gate Diffusion Input) is one of the low power and territory effective procedure. GDI requires less number of transistors contrasted with CMOS innovation. The fundamental cell of GDI comprises of two transistors where three terminals i.e Gate, Source and Drain considered as data sources. Along these lines, it is useful for low power, postponement
PaperID
2017/IJTRM/8/2017/9128