IJAIR- Volume 7 Issue 11 (November2018)

 


Sr/No/ Title Pdf
1 A VM Aware and Energy Resource Request Utilization (VMERRU) Cloud Scheduling Algorithm Over Cloud Computing
1 Mukesh Rawat, 2 Prof. Angad Singh

Abstract: Cloud computing and its components make use of their combine efforts to process input request to any cloud architecture. Cloud components such as virtual machine Vm, Cloud Data center DC, Broker request Br and their configuration cominely configure a cloud scenario. Cloud computing component make use of request , resource and its utilization analysis to process any of the algorithm. It make usage of resource in proper optimization manner. In order to provide better quality of services and proper cloud component scheduling many algorithms were proposed. Algorithm such as round robin, throuttle, Genetic algorithm etc were proposed by the existing research work. Limitations with such algorithms are of monitoring single level of utilization. They are either concentrating on resource utilization or in energy consumption by their resources for that request process. Further the internal process doesnot comply with parallel process of monitoring such utilization. In this research, An Advance Algorithm named VMERRU (Virtual machine energy resource request utilization) is proposed. The approach also make use of utilizing monitoring of energy , resource usage count, input request requirement and matching requirement of assigning DC, VM to it. Thus an optimal request handling algorithm with parallel computation is proposed. An implementation is performed using CloudSim API cloudanalyst simulator and further computation shows the efficiency of proposed algorithm.



Download
2 PHYSICO-CHEMICAL ANALYSIS OF WATER NEAR ANAKAPALLI HIGH WAY IN VISAKHA DISTRICT, ANDHRAPRADESH
Ch. Nageswara Rao1, A.Vasudeva Rao2 and B.B.V.Sailaja3

Abstract:Water is essential to life. Water analysis is carried out to quantify the physical and chemical components of water samples. The type and sensitivity of the analysis depends on the purpose of the analysis and the anticipated use of the water. In ordered to assess the quality of water in moon soon we have determined physico-chemical analysis in some areas near to national highway of Anakapalli city, Visakhapatnam District of Andhrapradesh State, India in 2018. In this analysis, various quality parameters are measured including pH, Specific Conductivity, Dissolved Oxygen, Total hardness, Alkalinity, Calcium, Magnesium, Chlorides, Sulphates, Nitrites, Phosphates and Nitrates compared with Indian standards 10500: 2012 of water quality. The assessment of these parameters is essential to identify magnitude and source of any pollution load. These characteristics can identify certain condition for the ecology of living organisms and suggest appropriate conservation and management strategies.



Download
3 The Financial Analysis of State Bank of India Pre and Post-Mega Merger: A Comparative Study
Pushpitha S*1, Nikitha V Bharadwaj#2, Dr.Aruna P#3

Abstract: Financial performance refers to measuring the results of the firm’s overall operations and policies in monetary terms. In other words, it refers to the evaluation of financial health of the firm for a stipulated time period. This study mainly focuses on the reasons for the mega-merger which took place on 1st April 2017 and the State Bank of India’s financial performance pre and post-merger. For this purpose, CAMEL model and paired t- test (IBM SPSS Statistics 22) has been used. The result clearly shows that there is no significant effect on the financial performance post-merger. This result can be used by decision makers to focus and make the merger a successful one.



Download
4 EQUITY IN THE ACCESS TO SCHOOL EDUCATION: A MICRO STUDY FROM DHENKANAL TOWN, ODISHA
1Subhalaxmi Barik, 2Dr. Sanjukta Das

Abstract: The objective of the paper is to identify the gender difference for the access to education based on a primary study of Dhenkanal town. Considering both the demand and supply situation, the present paper analyse the facilities available for boys and girls children. Here an attempt is made to assess the level of achievements of the children taking into account the enrolment, attendance and learning achievement and to analyse the household factors influencing these outcomes. It is found that with increase the level of education girl’s dropout rate is more whereas boy’s education is considering as an investment to education. Lack of facilities and lack of expenditure are found as a basic reason for the poor quality education. To measure the difference between the performance of boys and girls dummy analysis is used. Also to find out the determinants of educational expenditure, correlation and regression analysis has been done.



Download
5 Performance Evaluation of AODV Routing Protocol in Wireless Sensor Network under the Influence of Fault Nodes
Jyotsna Rathee1, HarkeshSehrawat2, Chitra Saini3

Abstract: There is a remarkable growth in the field of Information Communication Technology (ICT) in Developing Countries (DCs).Wireless Sensor Network is one of the areas where ICT is recording an ongoing rapid change. Typically, a wireless sensor node (or simply sensor node) consists of sensing, computing, communication, actuation, and power components. We apply our scheme to the Ad-hoc On-Demand Distance Vector (AODV) protocol and evaluate the performance by simulation. We have used Qualnet tool to analyze the performance of AODV protocol in WSN under the influence of various faults.



Download
6 Enhancement of Energy-Efficiency in Wireless Sensor Network
Chitra Saini1, Jyotsna Rathee2, Harkesh Sehrawat3

Abstract: A Wireless Sensor Network (WSN) is made up of hundreds or thousands, spatially disseminated self-organizing interconnected sensors, to surveil physical and environment conditions like Humidity, Movement, Temperature, etc. and to interactively pass collected data to a main location using the network. Energy-Efficiency is an important topic in sensor nodes as they are powered by batteries with limited capacity and it is difficult to replace and recharge them. Energy-Efficiency is a noteworthy issue as the lifetime of the whole WSN depends on the sensors with limited energy resource. In this dissertation such a scheme is presented to have a WSN with little long life time by using energy of sensor nodes efficiently working different parameters of AODV (Ad hoc On Demand Distance Vector) Routing protocol. All the work is done to reduce the number of RREQs packets over the network to reduce overall load on network. For this purpose, work is done on parameters of AODV and a better Modified AODV M (AODV) is introduced.



Download
7 AN INFLUENCE OF ONLINE SHOPPING HABITS AMONG THE COLLEGE STUDENTS WITH SPECIAL REFERENCE TO THRISSUR DISTRICT
Asst. Prof. Vipin Benny

Abstract: Online shopping is the process of buying goods and services from merchants over internet. Since the emergence of the World Wide Web, merchants have sought to sell their products to people who spend time online. Consumers can buy a huge variety of items from online stores, and just about anything can be purchased from companies that provide their products online. Books, clothing, toys, hardware, software and health insurance are just some of the hundreds of products consumer can buy from online stores. Many people choose to shop online because of the convenience. Online stores almost never close. The internet has generated a tremendous level of excitement through its involvement with all kind of electronic business and procedures ranging from e-Commerce, e-Business, e-CRM, e-Supply chain, e-Marketing, Payment and e-Governance. There are so many people purchase goods through internet, among these people the major role is played by our young generation. So this study aims to analyze the online shopping habits among college students.



Download
8 PERSONALITY, SOCIAL NETWORKING ADDICTION AND HAPPINESS OF ADOLESCENTS: A CORRELATIONAL STUDY
Lt. Comdr. Latika Bhalla1, Dr. Sangeeta Bhamidipati2, Dr. K V Mohan Rao3

Abstract: The world has taken a huge leap in terms of technological progression and has tied down a sizeable population to smart devices that show the entire world with the click of a few buttons. The adolescents are more vulnerable to such advancements and are the ones who are more prone to addiction. Addiction to anything shows a lack of the ability to control impulses, so the excessive usage of anything, such as social media, is considered an impulse control disorder. Social media addiction is an overwhelming and destructive use of the internet, and those who use social media to this degree have been reported to have negative effects on their professional, academic, and social lives. The technology has changed today’s relationships and, as a result, face-to-face interpersonal skills are disappearing among people. Happiness is deriving the pleasure and satisfaction out of something, spending time with one another. In the social media context, people are delighted when they see increased number of likes/comments on a post. This utopian world starts controlling the gear of happiness. Whether one gets influenced or addicted to social media networking or not depends only on the kind of personality that he or she is bestowed with. The five traits that, in varying amounts, make up most human personalities are extraversion, conscientiousness, agreeableness, openness to experience, and neuroticism. This research study is intended to find out what kind of a relation exists between personality traits, happiness perceived and social media addiction in adolescents aged between 15 to18. In order to arrive at the same, 200 school going adolescents were administered the Social Media Addiction scale, Happiness Scale and the Big Five Personality Inventory Scale. As hypothesized, some personality traits had a positive correlation with social media addiction.



Download
9 ECO ANATOMICAL ADAPTATION OF LEAF IN SELECTED TRUE MANGROVE SPECIES IN KERALA
1S. Surya, 2Asst. Prof. N. Hari

Abstract: This investigation was carried out with the objectives of studying the anatomical features of leaves of selected true mangrove species seen in Kerala. Based on the results, it is observed that all the selected species have some peculiar features which facilitate their growth in salty aquatic environment. Aegiceras corniculatum, Acanthus ilicifolius, Acanthus ebracteatus have numerous glandular trichomes in adaxial and abaxial epidermis. However, in Sonneratia alba and Sonneratia caseolaris including numerous large mucilage cells. Avicennia marina and Avicennia officinalis consists of glandular and non-glandular trichomes. In Exoecaria agallocha length of palisade layer was very extensive due to its xeromorphic nature. In rhizophoraceae, members have homogeneity in anatomical features such as presence of thick cuticle, branched sclereids, crystalliferous cells, and colorless non- assimilatory water storage tissue in hypodermis, tannin cells and terminal trachieds. In Kandelia candel and Lumintzera recemosa have isobilateral leaf but rest of them comprise dorsi-ventral leaf.



Download
10 DIVERSITY OF POLYGONACEAE MEMBERS IN IDUKKI DISTRICT, KERALA
Mahesh Mohanan P1, Neena A1, Antony, VT 2& * Binu Thomas1

Abstract: The explosive growth of human population, uncontrolled exploitation of natural resources, habitat loss and pollution are rapidly degrading the quality of environment and cause the loss of species diversity at an alarming rate. Idukki is a biodiversity rich area and includes so many rare, endangered and endemic species. Western Ghats, the boundary of Idukki district is considered as one of the 18 centres in the world were megadiversity exists.In this context we have undertook a study of diversity and distribution of the family polygonaceae in idukki district and documents the members of the family.



Download
11 Plants Used In the Treatment of Skin Diseases in Harapanahalli Taluk, Karnataka, India
Siddalinga Murthy SM

Abstract: An ethno-botanical survey was conducted to unveil the knowledge treasure of folk medicine in Harapanahalli taluk of Davanagere district, Karnataka state, India. The indigenous knowledge of local traditional healers and the native plants used for the treatment of skin diseases were collected through questionnaire and personal interviews. A total of twenty one plant species were found to be used in the treatment of various skin diseases by the rural and folk people in Davanagere district. Out of these, plant species like Aloe vera (L.) N. Burm., Aristolochia indica L., Azadirachta indica A. Juss., Curcuma longa L., Thespesia populnea (L.) Soland and Erythrina indica Lam. were found to be most effective against skin diseases. The scientific, local and family names of all these medicinal plants along with the habit, part used and mode of their administrations were recorded. Importance was also given in creating awareness among the rural people for the protection and conservation of these valuable medicinal plants.



Download
12 Assessment of Post-Tensioned Slab along with Seismic Effect
Ankush Kumar Jain1 , Nafisul Hasan2 , Abdulla Arashad3

Abstract: Construction industry is being revolutionized with growing technology and innovation. Man started to reach sky not in any aero plane but with the height of building. Tall structures have considerably reduced the problem of shelter but are considered highly susceptible to seismic loads and uneconomical. Both the problems are aroused due to high weight of the building. Of all the structural members in a building slabs are considered to be occupying high area and the load of the building is mostly contributed due to slab. In general for commercial areas normal slabs are not been considered, as the spans between the supports are more which leads to increasing in deflection and ultimately provision of huge depth and percentage of steel is increased beyond the codal provision ,once such solution to reduce the slab depth and provide economical design is flat slabs technology.



Download
13 Impact of Behavioural Biases on Investment Performance
Ms. Aradhana Bhopte*

Abstract: The present study examines the impact of behavioral biases on investment performance. The study was conducted in Gwalior region. The respondents are investors of Gwalior region. Sample size was 300. Factors analysis and regression analysis was conducted to explore the factors and also to check the impact of behavioral biases on investment performance. The study concluded that there is a significant impact of behavioral biases on investment performance.



Download
14 Ethical Talent Management and organizational health- A pluralistic approach
1Dr.M.Dhanabhakyam, 2 Sowmya G

Abstract:Talent management interventions being a major human resource trend of the present business era, the talent philosophy itself cripples the ethical management systems of the companies. The operationalization of the word talent in different contexts, the existence of talent incongruence between the employees and the employers, the exclusive talent identification policies become double edged swords and shadow negative impact on the organizational health. Management is moreover unaware of their skewed talent identification and management policies and its possible impact on the employee performance and the organizational health. This study identifies the ethical talent development practices and assesses the impact of ethical talent management interventions on organizational health. Talent management is not a singular approach, it must be judged on ethical dimension of management which take care the prevailing organizational health.



Download
15 Significance of Inheritance and Cohesion on Ambiguity
1Dr. Brijesh Kumar Bhardwaj, 2Dr. R. M. L.

Abstract: Lately, the ambiguity of the software is increasing because of automation of each section of application. Software is no place remained as one-time development item since its architectural measurement is increasing with addition of new prerequisites over a brief duration. Object Oriented Development procedure is a popular development approach for such frameworks which sees and models the necessities as real world substances. Classes and Objects logically speak to the substances in the arrangement space and quality of the software is specifically relying upon the design quality of these logical elements. Cohesion and Inheritance (Cohesion and Inheritance) are two major design unequivocal factors in Object Oriented Design which impacts the design of a class and dependency between them in complex software. It is also most significant to measure Cohesion &Inheritance for software to control the ambiguity level as prerequisites increases. Several measurements are in practice to quantify Cohesion and Inheritance which plays a major part in measuring the design quality. The software enterprises are concentrating on increasing and measuring the quality of the item through quality design to proceed with their market image in the aggressive world. As a part of our research, this paper features on the impact of Cohesion and Inheritance on design quality of an unpredictable framework and its measures to quantify the overall quality of software.



Download
16 A SURVEY ON: MODULAR APPROACH FOR CUSTOMIZABLE UART
1Pratibha Vishwakarma, 2Mr.Sanjeev Shrivastava

Abstract: This paper propose a technique for software-implementation of an UART (Universal-Asynchronous-Receive-Transmit) with the goal of getting a customizable UART-core which can be used as a module in implementing a bigger system irrespective of one’s choice of implementation platform. This paper is implementing the design through Verilog HDL using Xilinx 14.2 design suite and it is tested on Spartan-6 FPGA after interfacing the circuit under test using PC with the help of RS-232 cable. The simulation results and the test results are supporting our proposal.



Download
17 Growth Centers in Developing Countries "Factors and Requirements for Success" – Lessons from the Indian Case
Muhammad AbdulRahman Seddeek *1, T.V.KRISHNA2.

Abstract: After the Second World War, many countries seek to achieve fast growth and remedy the development problems through using growth centres policy. India one of the developing countries which tried to get the policy benefits due to suffering from regional inequalities and unbalance in the implementation of plans and policy towards few privileged sectors of communities and neglect the other areas and sectors. The implementation of the policy happened on two distinguished stages and both of them have strong points like encourage the small and medium cities to develop them and help the poor rural and excess labor to find substitutional employment in their areas. The weak points appear in the difficulties of urban control in the growth centres and the disabilities of equipped the proposed growth centres with the proper infrastructures. To avoid the weak points and increase the success probabilities of policy implementation some recommendation are given such as providing adequate resources in the growth centres with the preparation to meet the urbanization requirements, should establish Periodic follow-up of economic changes and Create the multi integration between growth centres in the region.



Download
18 MULTIPLE CONSTANT MULTIPLICATION TECHNIQUE FOR CONFIGURABLE FINITE IMPULSE RESPONSE FILTER DESIGN
Trapti Chodoker, Rajeev Thakur and Puran Gour

Abstract:This paper highlights the design of finite impulse response(FIR) filter with the help of an evolutionary optimization technique, particularly multiple constant multiplication. The Finite Impulse Response (FIR) Filter is that the necessary part for comingupwith associate economical digital signal process system. Transpose kind finite impulse response (FIR) filter is of course a pipelined structure that supports the multiple constant multiplications (MCM) technique however direct form FIR filter structure doesn’t support MCM technique. The MCM is more practical in Transpose form once the common operand is multiple with the set of constant coefficient that cut back the procedure delay. The implementation of MCM technique is simpler in fixed coefficient Transpose form FIR filter however complicated in configurable coefficient. For this purpose, the coefficient of the filter are encoded by Canonical Signed Digit (CSD). FIR filter supported canonical signed digits illustration of coefficient so as to attenuate the power consumption and quick implementation of the filter Performance of the proposed filter has been analyzed in terms of its area, power and speed. The look of FIR filter is planned to implement using Xilinx tool.



Download
19 OPTIMIZATION OF MILLING PARAMETERS IN VERTICAL MILLING MACHINE USING EN24 STEEL AS SPECIMEN
1Gaurav Tamrakar, 2Mr. Anoop Kumar, 3Dr. Pravin Borkar

Abstract: The surface roughness and Material Removal Rate analysis are dependent on various parameters, specific to input parameters are feed, speed, and percentage of water in Coolant. The combination of these parameters is designed by MINITAB using L9 orthogonal array. On the basis of Design of Experiment, the milling operations are performed in order to evaluate surface roughness and material removal rate. The authors performed the experiment on Vertical Milling Machine using for cutting Alloy material with end mill tools. Experiment wise investigation of the EN24 plates is fixed as work-piece specimen milling operation is carried out. The experiment is performs on different sets of EN24 plates as per design of experiment by MINITAB. The best setting among the feed, speed, and percentage of water in Coolant for low surface roughness and high MRR has been evaluated. Moreover, Grey Relation Method is used to convert Surface roughness and Material Removal into single responses. In each case, the best setting among the feed, speed, and percentage of water in Coolant for low surface roughness and high MRR and both is found by S/N ratio curve. The results are shown in conclusion section.



Download
20 Bacterial Nucleotide Immunogen Enhances the efficacy of vaccine
M.Muruganandam

Abstract: Bacterial nucleotide especially plasmid DNA and their fragments act as Good Immunogen during vaccine development and its efficacy in inducing immune response is good. The plasmid DNA has short sequence DNA. In induce both cellular and humoral immune responses. It has lot of advantages, it is stored in room temperature . Transport is very easy, preparation method is also easy. So it is highly suitable for vaccine development for most of the bacterial infectious diseases. Nowadays, Multidrug resistant pathogens appear in many places in our global threat , WHO advise to produce new vaccines against these MDR-pathogens, these short sequence nucleotide open new window to develop new vaccine.



Download
21 Ultrasonic vibration shock treatment effects on biomass production of yeast
M.Muruganandam

Abstract: Ultrasonic vibration is one of the physical stress factor. Here stress treatment was provided to yeast cells, after that growth performance was studied. The ultrasonic vibration was given (2 MHZ) to yeast cells with different timings such as 0,2,4,6,8,10 and 12 minutes. After the treatment, Yeast were incubated to 72 hours at 37oC.At the end of the experiment,optical density and biomass production of yeast were calculated. The highest OD (0.72) was observed in 2 minutes treatment .The highest biomass production also observed in 2 minutes treatment (1.044gm).The two minutes treatment produce highest growth rate compared to other treatment. If the stress time increases, the biomass production and OD value also decreased. So stress always suppress growth rate, However initially it induce growth then slowly suppress growth rate of yeast cells.



Download
22 VENDOR CLIENT MANAGEMENT (VCM)
*Dr.Benita.S.Monica#1 & Ms.Subhasini.J#2

Abstract: Vendor plays an important role in any company’s success or failure, and it refers to all the ways and methods of handling arrangements with vendors and its works. Vendor hold wealth of knowledge relating to their product or services and utilization within industry. Vendor client management will be focusing on providing trust commitment and quality towards the client and create positive response to the business. Vendor manager has the responsibility to select the right vendor to yield the desired performance characteristics. The manager has to focus massive amount of details to manage vendor effectively. An important objective of purchase management is to maintain good relationship with vendors. Vendor management will facilitate the process of performance monitoring, reporting and profit risk assessment. Hence the study is timely and vital to understand the perception towards vendor client management.



Download
23 THE IMPACT OF JOB SATISFACTION ON TEACHERS’ORGANIZATIONAL COMMITMENT
Musa Shu’aibu, Dr. Nimisha Beri

Abstract: Job satisfaction is of great importance in all organizations, be it public or private, it makes description on how well an individual or employee is happy in or with his/her job, many factors do contribute towards job satisfaction among employees in any given organization which is different from individual to another or from employee to employee. Satisfaction of job determines teachers’ commitment to their organization and employees are more committed to their organization when they are satisfied with their job. This paper makes summary and analysis of the literature which is available for the topic under discussion. The finding reveals that when teachers are satisfied with their job, it leads to the significant increase in organizational commitment of teachers. It was discussed that teachers exhibit very good organizational commitment when satisfied with aspects of their job. It was concluded that, job satisfaction makes significant impact in the commitment of teachers towards their job.



Download Download
24 An Exploratory Frame work on the Applications of E-Commerce
ArdraJ.#1

Abstract: Today E-commerce have become a part of our everyday life. It is no longer a technology that only technically advanced and wealthy people use. Electronic commerce predominantly comprises of the marketing, buying, advertising, selling distribution as well as the examining of products by means of internet. E-commerce has given a free rein to another revolution in Kerala that changed the commercial way of business. The companies like Amazon and eBay actually began using E- commerce and now it plays a major role in Indian economy. This paper talks about the recent trends in the business in the state of Kerala that employs e-commerce and its impact on Indian economy by exploring the benefits and limitations of e-commerce. The benefits in general are wider reach, savings in time, low cost, all time accessibility, well synchronisation and large assortment. However, there are certain limitations, one among many being trust, financial security, human less transaction and delivery.



Download
25 LeveragingDataDE-duplicationtoImprove thePerformanceofPrimaryStorageSystemin theCloud
1BhargaviLankera,2P.Sravanthi

Abstract: Cloud computing is a distributed system which works with the multiple component to provide a processing of users input request. The input request can be of data storage, data access and utilizing the data in real time with different available model. Cloud computing consist of multiple layers and model of performing the processing of large amount of data. Different areas of research are available which includes the data security, authentication, accessibility and identity based data utilization. Data usage over the cloud helps in fast and scalable usage of data. Cloud data is accessible with various platform includes web and mobile units. Thus the availability of data and its accessibility increase the vulnerability over the data. This topic is required in further research to enhance the security over the cloud data and accessing them on secure channel. This research discuss about the algorithm which enhance the security with hybrid level of security model. An end to end communication protocol with enhances cryptography and data auditing approach is presented. Thus the algorithm shows the efficiency over the traditional security mechanism. The proposed algorithm works experimented over the java platform using Apache server. The Computation parameter which is taken for comparison is computation time, computation cost, and bandwidth and Energy consumption in data packet transmission. The experiment performed over the proposed security and reliable model shows the efficiency of proposed approach over the traditional solution of data processing in cloud computing distributed environment.



Download
26 Understand Short Texts by Harvesting and Analysis Semantic Knowledge
1Raheema Sheik, 2K. Laxmaiah

Abstract: Semantic web mining and Synaptic web entropy mining is an important and recent research area today where number of technique presented in order to mine the web crawl efficiently and to find the web page rank of various data available in the web, in the present paper which is taken by us for the further research is the hybrid approach where the entropy is calculated based on the semantic-synaptic based approach and the important role of the entropy required today to monitor the todays web fluctuation and various stages of multiple portals and web data available today , here as the authors of the paper mentioned about the scope of the semantic monitoring ,we assume it to be a great way to make it better to experience and query search for the extracted data and opinion monitoring, we have monitored a paper which works with the short text analysis, challenges associated with it and finding data relevance in available knowledge base. Using the spatial data and related information with the input dataset. It can able to find more specific data about the user input. We here mentioning and further trying to make user experience better to utilize the data extracted from the user and visualize them efficiently as per the user requirement. ANN approach can further be utilized for efficient parameter computation.



Download
27 IF SECURE SESSION KEY BASED CLOUD ACCESS AND DISTRIBUTION SYSTEM
1Sumanjali Billi, 2I Surya Sekhar

Abstract: Cloud computing is a new approach in the field of information technology based on the World Wide Web. It is new approach in the field information technology and also it satisfies a end users requirement for computing resources like services and applications etc. Security is one of the most challenging issue in the cloud computing. In cloud computing, services need to address the security during the transmission of sensitive information. Many organization, companies or banks have confidential information, this information is very essential. The cloud does not provide a fully guaranteed of data and it is compromised by the attackers. In this paper by providing a new method, we improve the security of data access in the cloud computing for a bank or any other particular location by using location-based encryption.



Download
28 Secure Data Sharing In Cloud Computing Using Revocable-Storage IBE
1Sunita Palleti, 2CH. Suresh Kumar

Abstract: Cloud computing is a distributed system which works with the multiple component to provide a processing of users input request. The input request can be of data storage, data access and utilizing the data in real time with different available model. Cloud computing consist of multiple layers and model of performing the processing of large amount of data. Different areas of research are available which includes the data security, authentication, accessibility and identity based data utilization. Data usage over the cloud helps in fast and scalable usage of data. Cloud data is accessible with various platform includes web and mobile units. Thus the availability of data and its accessibility increase the vulnerability over the data. This topic is required in further research to enhance the security over the cloud data and accessing them on secure channel. This research discuss about the algorithm which enhance the security with hybrid level of security model. An end to end communication protocol with enhances cryptography and data auditing approach is presented. Thus the algorithm shows the efficiency over the traditional security mechanism. The proposed algorithm works experimented over the java platform using Apache server. The Computation parameter which is taken for comparison is computation time, computation cost, and bandwidth and Energy consumption in data packet transmission. The experiment performed over the proposed security and reliable model shows the efficiency of proposed approach over the traditional solution of data processing in cloud computing distributed environment.



Download
29 Core End To End Traffic Retandary Elimination for Reducing Cloud Bandwidth Cost
1Vamsi Priya Challa, 2M Vijetha

Abstract: In today’s era, End to End TRE (Traffic redundancy) over the cloud computing is a recent technology and recent research topic under cloud computing environment. The Cloud computing and its mechanism to transfer the data, managing its component is an important process for complete process. Where the component such as third party auditor, data centre and virtual machine take participate. There are process involve in the middle such as Packet forwarding, data storage, transmission over the different channel takes process in user activity. In this area of research recent technique PACK takes an advantage of chunking scheme with execution of SHA-1 as security signature approach. According to understanding algorithm PACK face little problem formulation such as in finding high level prediction with efficient signature scheme. The algorithm exhibit reliable prediction over the data. In this dissertation work, our work presented as EPACK, which is the extension version of PACK to identify redundancy prediction over the transmitted data. Algorithm used of similarity measure algorithm, which take use of similarity score measure value from the available data and storage. The algorithm makes use of Meta information, topical relation in between the file parameters, SHA-2 for signing information and outperforms the high level prediction as compare to existing technique. The proposed algorithms also take use of security concern in between any transmission of data in different components. A highly security enhancement of ECC algorithm named HECC (Hyper Elliptic curve cryptography) is used to perform security level in this approach. This can performs over the PACK & EPACK algorithm with comparison parameter by performing data transmission using JDK framework. The proposed scheme and result comparison analysis shows the efficiency of our approach while comparing with PACK algorithm. The further approach over the simulation parameter and environment outperform its best while comparing with the existing PACK technique.



Download
30 A Consideration Independent Score Based Benchmark for Distributed Database
1MD. Zaheda Parveen, 2P Sravanthi

Abstract: Big data and hadoop plays an important role in dealing with the large number of process and big data processing in different scenario. There are multiple nodes participate in the Distribution and different type of data movement scenario. The existing algorithm which is taken for the further improvement work is distributed dataset algorithm, which is phase based Distribution algorithm to process the large number of data and data packets. Our enhance distributed dataset algorithm technique outperform as compare with the existing distributed dataset algorithm and other scheduler so far. Thus the requirement leads us to perform further improvement to the distributed dataset algorithm Distribution technique. In this dissertation our work perform to create a new heuristic based Distribution algorithm which make use of existing scenario and improve it with balanced distribution technique. The proposed technique is based on enhance model which is heuristic & priority based Distribution and load balancing Distribution based scenario which make use of all the resources properly and outperform the complete distribution using the provided Distribution algorithm. The proposed work implemented and tested in java technology and upon processing data range from 1 gb to 5 gb there are performance monitored in terms of computation processing time, throughput with hardware configuration as 4 gb ram, 750 gb hard disk and the competitive results were monitored. Thus the result as compare to existing technique were monitored which are 1.1 x improved while comparing with existing algorithm.



Download
31 Trust Enhanced Cryptographic Role Based Access Control if Secure Cloud Data Storage
1Sushma Uopanaboina, 2B Anand Kumar

Abstract: Cloud data storage has provided significant benefits by allowing users to store massive amount of data on demand in a cost-effective manner. To protect the privacy of data stored in the cloud, cryptographic role-based access control (RBAC) schemes have been developed to ensure that the data can only be accessed by those who are allowed by access policies. However, these cryptographic approaches do not address the issues of trust. In this paper, we propose trust models to reason about and to improve the security for stored data in cloud storage systems that use cryptographic RBAC schemes. The trust models provide an approach for the owners and roles to determine the trustworthiness of individual roles and users, respectively, in the RBAC system. The proposed trust models consider role inheritance and hierarchy in the evaluation of trustworthiness of roles. We present a design of a trust-based cloud storage system, which shows how the trust models can be integrated into a system that uses cryptographic RBAC schemes. We have also considered practical application scenarios and illustrated how the trust evaluations can be used to reduce the risks and to enhance the quality of decision making by data owners and roles of cloud storage service.



Download
32 Unified intelligent water management using Cyber infrastructure based on cloud computing and IoT
1Indira Derangula, 2G Sudheer

Abstract: In this project, we are focusing on continuous and real time monitoring of water supply in IOT platform. Water supply with continuous monitoring makes a proper distribution so that, we can have a record of available amount of water in tanks, flow rate, abnormality in distribution line. Internet of things is nothing but the network of physical objects embedded with electronics, sensors, software, and network connectivity. Monitoring can be done from anywhere as central office. Using thing speak as free server data continuously pushed on cloud so we can see data in real time operation. Using different sensors with controller and raspberry pi as Minicomputer can monitor data and also control operation from cloud with efficient client server communication.



Download
33 Vampire attacks: Drainin life from wireless AD-HOC sensor Network
1Lekhya Meka, 2M. Manikanta Rao

Abstract: Ad hoc low-power wireless networks are an exciting research direction in sensing and pervasive computing. Prior security work in this area has focused primarily on denial of communication at the routing or medium access control levels. This paper explores resource depletion attacks at the routing protocol layer, which permanently disable networks by quickly draining nodes’ battery power. These “Vampire” attacks are not specific to any specific protocol, but rather rely on the properties of many popular classes of routing protocols. We find that all examined protocols are susceptible to Vampire attacks, which are devastating, difficult to detect, and are easy to carry out using as few as one malicious insider sending only protocol-compliant messages. In the worst case, a single Vampire can increase network-wide energy usage by a factor of ODNÞ, where N in the number of network nodes. We discuss methods to mitigate these types of attacks, including a new proof-of-concept protocol that provably bounds the damage caused by Vampires during the packet forwarding phase.



Download
34 Human IRIS as a Biometric for Identity Verification
1Niziya Mohammad, 2M. Narsimha Rao

Abstract: —The use of human biometrics for automatic identity verification has become widespread. Mostly used human biometrics are face, fingerprint, iris, gait, retina, voice, hand geometry etc. Among them iris is an externally visible, yet protected organ whose unique epigenetic pattern remains stable throughout one’s whole life. These characteristics make it very attractive to use as a biometric for identifying individuals. This paper presents a detailed study of iris recognition technique. It encompasses an analysis of the reliability and the accuracy of iris as a biometric of person identification. The main phases of iris recognition are segmentation, normalization, feature encoding and matching. In this work automatic segmentation is performed using circular Hough transform method. Daugman’s rubber sheet model is used in normalization process. Four level phase quantization based 1D Log-Gabor filters are used to encode the unique features of iris into binary template. And finally the Hamming distance is considered to examine the affinity of two templates in matching stage. We have experimented a better recognition result for CASIA-iris-v4 database.



Download
35 Image Steganography based on complemented message and Inverted bit LSB substitution
1Radha Rukmini Sheelam, 2K. Rainu

Abstract: Steganography is the art of encoding embedding secret information in cover media in such a way so as not to provoke an eavesdropper’s suspicion. The primary purpose of this paper is to provide three levels of security, first is provided by complementing the secret message, second by hiding complemented secret message in cover image pixels that are selected randomly by using pseudo random number generator, third by using inverted bit LSB method2 as stenographic technique rather than simple LSB, thus, reduces the chance of the hidden message being detected. MSE (Mean Square Error) and PSNR (Peak Signal to Noise Ratio) are two common quality measurements to measure the difference between the cover-image and the stego-image. Results showed that the proposed method gives better results than simple LSB and inverted LSB with higher PSNR and lower MSE.



Download
36 Internet of Things: Securing data using image steganography
1Soujanya Kesavarapu, 2M. Manikanta Rao

Abstract: Steganography is the art of encoding embedding secret information in cover media in such a way so as not to provoke an eavesdropper’s suspicion. The primary purpose of this paper is to provide three levels of security, first is provided by complementing the secret message, second by hiding complemented secret message in cover image pixels that are selected randomly by using pseudo random number generator, third by using inverted bit LSB method2 as stenographic technique rather than simple LSB, thus, reduces the chance of the hidden message being detected. MSE (Mean Square Error) and PSNR (Peak Signal to Noise Ratio) are two common quality measurements to measure the difference between the cover-image and the stego-image. Results showed that the proposed method gives better results than simple LSB and inverted LSB with higher PSNR and lower MSE.



Download
37 Efficient detection of Brain Tumor from MRI's using KMean Segmentation and Normalized Histogram
1Soujanya Maddi, 2G. Sudheer

Abstract: In this project, we are focusing on continuous and real time monitoring of water supply in IOT platform. Water supply with continuous monitoring makes a proper distribution so that, we can have a record of available amount of water in tanks, flow rate, abnormality in distribution line. Internet of things is nothing but the network of physical objects embedded with electronics, sensors, software, and network connectivity. Monitoring can be done from anywhere as central office. Using thing speak as free server data continuously pushed on cloud so we can see data in real time operation. Using different sensors with controller and raspberry pi as Minicomputer can monitor data and also control operation from cloud with efficient client server communication.



Download
38 Wireless Sensor Network based Pollution Monitoring System in Metropolitan Cities
1Venkata Usha Bollam, 2M. Narsimha Rao

Abstract: In this project, we are monitoring air pollution and vehicle traffic congestion which leads to air pollution, driver frustration, and costs billions of dollars annually in fuel consumption. Finding a proper solution to vehicle congestion is a considerable challenge due to the dynamic and unpredictable nature of the network topology of vehicular environments, especially in urban areas. Recent advances in sensing, communication and computing technologies enable us to gather real-time data about traffic condition of the roads and mitigate the traffic congestion via various ways such as Vehicle Traffic Routing Systems (VTR), electronic toll collection system (ETCS), and intelligent traffic light signals (TLSs). Regarding this issue, an innovative technology, called Intelligent Guardrails (IGs), is presented in this project. IGs take advantages of the Internet of Things (IOT) and vehicular networks to provide a solution for vehicle traffic congestion in large cities. IG senses the roads' traffic condition and uses this information to set the capacity of the roads dynamically.



Download
39 HOME AUTOMATION BASED ON IOT
1Sumanjali Bandi, 2B. Naresh Reddy

Abstract: In this era of science internet is one of a fast growing factor which affiliates many facilities just like: Home Automation which is based on IOT is one of the most useful technologies for the safety purpose of home. It plays a very important role from industrial machines to the neither consumer home appliances which will be working even if you are nor active for some time. In this modern generation, peoples used automatic devices rather than using the manual devices. Since, internet is influencing people at high rate of population, inventing new technologies daily. In all the technologies IOT is the most useful technology. Home Automation System utilizes the innovation of Internet of Things for checking and controlling of the electrical and electronic machines at home from any remote area by just utilizing a Smartphone. Execution of a minimal effort, adaptable home mechanization framework is exhibited.



Download