Sr/No/ |
Title |
Pdf |
1 |
A VM Aware and Energy Resource Request Utilization (VMERRU) Cloud Scheduling Algorithm Over Cloud Computing
1 Mukesh Rawat, 2 Prof. Angad Singh
Abstract: Cloud computing and its components make use of their combine efforts to process input request to any cloud architecture. Cloud components such as virtual machine Vm, Cloud Data center DC, Broker request Br and their configuration cominely configure a cloud scenario. Cloud computing component make use of request , resource and its utilization analysis to process any of the algorithm. It make usage of resource in proper optimization manner. In order to provide better quality of services and proper cloud component scheduling many algorithms were proposed. Algorithm such as round robin, throuttle, Genetic algorithm etc were proposed by the existing research work. Limitations with such algorithms are of monitoring single level of utilization. They are either concentrating on resource utilization or in energy consumption by their resources for that request process. Further the internal process doesnot comply with parallel process of monitoring such utilization. In this research, An Advance Algorithm named VMERRU (Virtual machine energy resource request utilization) is proposed. The approach also make use of utilizing monitoring of energy , resource usage count, input request requirement and matching requirement of assigning DC, VM to it. Thus an optimal request handling algorithm with parallel computation is proposed. An implementation is performed using CloudSim API cloudanalyst simulator and further computation shows the efficiency of proposed algorithm.
|
Download
|
2 |
PHYSICO-CHEMICAL ANALYSIS OF WATER NEAR ANAKAPALLI HIGH WAY IN VISAKHA DISTRICT, ANDHRAPRADESH
Ch. Nageswara Rao1, A.Vasudeva Rao2 and B.B.V.Sailaja3
Abstract:Water is essential to life. Water analysis is carried
out to quantify the physical and chemical components of
water samples. The type and sensitivity of the analysis
depends on the purpose of the analysis and the anticipated
use of the water. In ordered to assess the quality of water in
moon soon we have determined physico-chemical analysis in
some areas near to national highway of Anakapalli city,
Visakhapatnam District of Andhrapradesh State, India in
2018. In this analysis, various quality parameters are
measured including pH, Specific Conductivity, Dissolved
Oxygen, Total hardness, Alkalinity, Calcium, Magnesium,
Chlorides, Sulphates, Nitrites, Phosphates and Nitrates
compared with Indian standards 10500: 2012 of water
quality. The assessment of these parameters is essential to
identify magnitude and source of any pollution load. These
characteristics can identify certain condition for the ecology
of living organisms and suggest appropriate conservation
and management strategies.
|
Download
|
3 |
The Financial Analysis of State Bank of India Pre and Post-Mega Merger: A Comparative Study
Pushpitha S*1, Nikitha V Bharadwaj#2, Dr.Aruna P#3
Abstract: Financial performance refers to measuring the results of the firm’s overall operations and policies in
monetary terms. In other words, it refers to the evaluation of financial health of the firm for a stipulated time period.
This study mainly focuses on the reasons for the mega-merger which took place on 1st April 2017 and the State Bank
of India’s financial performance pre and post-merger. For this purpose, CAMEL model and paired t- test (IBM SPSS
Statistics 22) has been used. The result clearly shows that there is no significant effect on the financial performance
post-merger. This result can be used by decision makers to focus and make the merger a successful one.
|
Download
|
4 |
EQUITY IN THE ACCESS TO SCHOOL EDUCATION: A MICRO STUDY FROM DHENKANAL TOWN, ODISHA
1Subhalaxmi Barik, 2Dr. Sanjukta Das
Abstract: The objective of the paper is to identify the
gender difference for the access to education based on a
primary study of Dhenkanal town. Considering both the
demand and supply situation, the present paper analyse
the facilities available for boys and girls children. Here
an attempt is made to assess the level of achievements
of the children taking into account the enrolment,
attendance and learning achievement and to analyse
the household factors influencing these outcomes. It is
found that with increase the level of education girl’s
dropout rate is more whereas boy’s education is
considering as an investment to education. Lack of
facilities and lack of expenditure are found as a basic
reason for the poor quality education. To measure the
difference between the performance of boys and girls
dummy analysis is used. Also to find out the
determinants of educational expenditure, correlation
and regression analysis has been done.
|
Download
|
5 |
Performance Evaluation of AODV Routing Protocol in Wireless Sensor Network under the Influence of Fault Nodes
Jyotsna Rathee1, HarkeshSehrawat2, Chitra Saini3
Abstract: There is a remarkable growth in the field of
Information Communication Technology (ICT) in Developing
Countries (DCs).Wireless Sensor Network is one of the areas
where ICT is recording an ongoing rapid change. Typically, a
wireless sensor node (or simply sensor node) consists of sensing,
computing, communication, actuation, and power components.
We apply our scheme to the Ad-hoc On-Demand Distance Vector
(AODV) protocol and evaluate the performance by simulation.
We have used Qualnet tool to analyze the performance of AODV
protocol in WSN under the influence of various faults.
|
Download
|
6 |
Enhancement of Energy-Efficiency in Wireless Sensor Network
Chitra Saini1, Jyotsna Rathee2, Harkesh Sehrawat3
Abstract: A Wireless Sensor Network (WSN) is made up of
hundreds or thousands, spatially disseminated self-organizing
interconnected sensors, to surveil physical and environment
conditions like Humidity, Movement, Temperature, etc. and to
interactively pass collected data to a main location using the
network. Energy-Efficiency is an important topic in sensor nodes
as they are powered by batteries with limited capacity and it is
difficult to replace and recharge them. Energy-Efficiency is a
noteworthy issue as the lifetime of the whole WSN depends on
the sensors with limited energy resource. In this dissertation such
a scheme is presented to have a WSN with little long life time by
using energy of sensor nodes efficiently working different
parameters of AODV (Ad hoc On Demand Distance Vector)
Routing protocol. All the work is done to reduce the number of
RREQs packets over the network to reduce overall load on
network. For this purpose, work is done on parameters of AODV
and a better Modified AODV M (AODV) is introduced.
|
Download
|
7 |
AN INFLUENCE OF ONLINE SHOPPING HABITS AMONG THE COLLEGE STUDENTS WITH SPECIAL REFERENCE TO THRISSUR DISTRICT
Asst. Prof. Vipin Benny
Abstract: Online shopping is the process of buying goods and services from merchants over internet. Since the emergence of the World Wide Web, merchants have sought to sell their products to people who spend time online. Consumers can buy a huge variety of items from online stores, and just about anything can be purchased from companies that provide their products online. Books, clothing, toys, hardware, software and health insurance are just some of the hundreds of products consumer can buy from online stores. Many people choose to shop online because of the convenience. Online stores almost never close. The internet has generated a tremendous level of excitement through its involvement with all kind of electronic business and procedures ranging from e-Commerce, e-Business, e-CRM, e-Supply chain, e-Marketing, Payment and e-Governance. There are so many people purchase goods through internet, among these people the major role is played by our young generation. So this study aims to analyze the online shopping habits among college students.
|
Download
|
8 |
PERSONALITY, SOCIAL NETWORKING ADDICTION AND HAPPINESS OF ADOLESCENTS:
A CORRELATIONAL STUDY
Lt. Comdr. Latika Bhalla1, Dr. Sangeeta Bhamidipati2, Dr. K V Mohan Rao3
Abstract: The world has taken a huge leap in terms of technological progression and has tied down a sizeable population to smart devices that show the entire world with the click of a few buttons. The adolescents are more vulnerable to such advancements and are the ones who are more prone to addiction. Addiction to anything shows a lack of the ability to control impulses, so the excessive usage of anything, such as social media, is considered an impulse control disorder. Social media addiction is an overwhelming and destructive use of the internet, and those who use social media to this degree have been reported to have negative effects on their professional, academic, and social lives. The technology has changed today’s relationships and, as a result, face-to-face interpersonal skills are disappearing among people. Happiness is deriving the pleasure and satisfaction out of something, spending time with one another. In the social media context, people are delighted when they see increased number of likes/comments on a post. This utopian world starts controlling the gear of happiness. Whether one gets influenced or addicted to social media networking or not depends only on the kind of personality that he or she is bestowed with. The five traits that, in varying amounts, make up most human personalities are extraversion, conscientiousness, agreeableness, openness to experience, and neuroticism. This research study is intended to find out what kind of a relation exists between personality traits, happiness perceived and social media addiction in adolescents aged between 15 to18. In order to arrive at the same, 200 school going adolescents were administered the Social Media Addiction scale, Happiness Scale and the Big Five Personality Inventory Scale. As hypothesized, some personality traits had a positive correlation with social media addiction.
|
Download
|
9 |
ECO ANATOMICAL ADAPTATION OF LEAF IN SELECTED TRUE MANGROVE SPECIES IN KERALA
1S. Surya, 2Asst. Prof. N. Hari
Abstract: This investigation was carried out with the objectives of studying the anatomical features of leaves of selected true mangrove species seen in Kerala. Based on the results, it is observed that all the selected species have some peculiar features which facilitate their growth in salty aquatic environment. Aegiceras corniculatum, Acanthus ilicifolius, Acanthus ebracteatus have numerous glandular trichomes in adaxial and abaxial epidermis. However, in Sonneratia alba and Sonneratia caseolaris including numerous large mucilage cells. Avicennia marina and Avicennia officinalis consists of glandular and non-glandular trichomes. In Exoecaria agallocha length of palisade layer was very extensive due to its xeromorphic nature. In rhizophoraceae, members have homogeneity in anatomical features such as presence of thick cuticle, branched sclereids, crystalliferous cells, and colorless non- assimilatory water storage tissue in hypodermis, tannin cells and terminal trachieds. In Kandelia candel and Lumintzera recemosa have isobilateral leaf but rest of them comprise dorsi-ventral leaf.
|
Download
|
10 |
DIVERSITY OF POLYGONACEAE MEMBERS IN IDUKKI DISTRICT, KERALA
Mahesh Mohanan P1, Neena A1, Antony, VT 2& * Binu Thomas1
Abstract: The explosive growth of human population, uncontrolled exploitation of natural resources, habitat loss and pollution are rapidly degrading the quality of environment and cause the loss of species diversity at an alarming rate. Idukki is a biodiversity rich area and includes so many rare, endangered and endemic species. Western Ghats, the boundary of Idukki district is considered as one of the 18 centres in the world were megadiversity exists.In this context we have undertook a study of diversity and distribution of the family polygonaceae in idukki district and documents the members of the family.
|
Download
|
11 |
Plants Used In the Treatment of Skin Diseases in Harapanahalli Taluk, Karnataka, India
Siddalinga Murthy SM
Abstract: An ethno-botanical survey was conducted to unveil the
knowledge treasure of folk medicine in Harapanahalli taluk of
Davanagere district, Karnataka state, India. The indigenous knowledge
of local traditional healers and the native plants used for the treatment
of skin diseases were collected through questionnaire and personal
interviews. A total of twenty one plant species were found to be used in
the treatment of various skin diseases by the rural and folk people in
Davanagere district. Out of these, plant species like Aloe vera (L.) N.
Burm., Aristolochia indica L., Azadirachta indica A. Juss., Curcuma
longa L., Thespesia populnea (L.) Soland and Erythrina indica Lam.
were found to be most effective against skin diseases. The scientific,
local and family names of all these medicinal plants along with the
habit, part used and mode of their administrations were recorded.
Importance was also given in creating awareness among the rural
people for the protection and conservation of these valuable medicinal
plants.
|
Download
|
12 |
Assessment of Post-Tensioned Slab along with Seismic
Effect
Ankush Kumar Jain1
, Nafisul Hasan2
, Abdulla Arashad3
Abstract: Construction industry is being revolutionized
with growing technology and innovation. Man started to
reach sky not in any aero plane but with the height of
building. Tall structures have considerably reduced the
problem of shelter but are considered highly susceptible to
seismic loads and uneconomical. Both the problems are
aroused due to high weight of the building. Of all the
structural members in a building slabs are considered to be
occupying high area and the load of the building is mostly
contributed due to slab. In general for commercial areas
normal slabs are not been considered, as the spans between
the supports are more which leads to increasing in
deflection and ultimately provision of huge depth and
percentage of steel is increased beyond the codal provision
,once such solution to reduce the slab depth and provide
economical design is flat slabs technology.
|
Download
|
13 |
Impact of Behavioural Biases on Investment
Performance
Ms. Aradhana Bhopte*
Abstract: The present study examines the impact
of behavioral biases on investment performance.
The study was conducted in Gwalior region. The
respondents are investors of Gwalior region.
Sample size was 300. Factors analysis and
regression analysis was conducted to explore the
factors and also to check the impact of
behavioral biases on investment performance.
The study concluded that there is a significant
impact of behavioral biases on investment
performance.
|
Download
|
14 |
Ethical Talent Management and organizational
health- A pluralistic approach
1Dr.M.Dhanabhakyam, 2
Sowmya G
Abstract:Talent management interventions being
a major human resource trend of the present
business era, the talent philosophy itself cripples
the ethical management systems of the
companies. The operationalization of the word
talent in different contexts, the existence of
talent incongruence between the employees and
the employers, the exclusive talent identification
policies become double edged swords and
shadow negative impact on the organizational
health. Management is moreover unaware of
their skewed talent identification and
management policies and its possible impact on
the employee performance and the
organizational health. This study identifies the
ethical talent development practices and assesses
the impact of ethical talent management
interventions on organizational health. Talent
management is not a singular approach, it must
be judged on ethical dimension of management
which take care the prevailing organizational
health.
|
Download
|
15 |
Significance of Inheritance and Cohesion
on Ambiguity
1Dr. Brijesh Kumar Bhardwaj, 2Dr. R. M. L.
Abstract: Lately, the ambiguity of the software is increasing
because of automation of each section of application. Software is
no place remained as one-time development item since its
architectural measurement is increasing with addition of new
prerequisites over a brief duration. Object Oriented
Development procedure is a popular development approach for
such frameworks which sees and models the necessities as real
world substances. Classes and Objects logically speak to the
substances in the arrangement space and quality of the software
is specifically relying upon the design quality of these logical
elements. Cohesion and Inheritance (Cohesion and Inheritance)
are two major design unequivocal factors in Object Oriented
Design which impacts the design of a class and dependency
between them in complex software. It is also most significant to
measure Cohesion &Inheritance for software to control the
ambiguity level as prerequisites increases. Several measurements
are in practice to quantify Cohesion and Inheritance which plays
a major part in measuring the design quality. The software
enterprises are concentrating on increasing and measuring the
quality of the item through quality design to proceed with their
market image in the aggressive world. As a part of our research,
this paper features on the impact of Cohesion and Inheritance on
design quality of an unpredictable framework and its measures
to quantify the overall quality of software.
|
Download
|
16 |
A SURVEY ON: MODULAR APPROACH FOR CUSTOMIZABLE UART
1Pratibha Vishwakarma, 2Mr.Sanjeev Shrivastava
Abstract: This paper propose a technique for software-implementation of an UART (Universal-Asynchronous-Receive-Transmit) with the goal of getting a customizable UART-core which can be used as a module in implementing a bigger system irrespective of one’s choice of implementation platform. This paper is implementing the design through Verilog HDL using Xilinx 14.2 design suite and it is tested on Spartan-6 FPGA after interfacing the circuit under test using PC with the help of RS-232 cable. The simulation results and the test results are supporting our proposal.
|
Download
|
17 |
Growth Centers in Developing Countries "Factors and Requirements for Success" – Lessons from the Indian Case
Muhammad AbdulRahman Seddeek *1, T.V.KRISHNA2.
Abstract: After the Second World War, many countries seek to achieve fast growth and remedy the development problems through using growth centres policy. India one of the developing countries which tried to get the policy benefits due to suffering from regional inequalities and unbalance in the implementation of plans and policy towards few privileged sectors of communities and neglect the other areas and sectors. The implementation of the policy happened on two distinguished stages and both of them have strong points like encourage the small and medium cities to develop them and help the poor rural and excess labor to find substitutional employment in their areas. The weak points appear in the difficulties of urban control in the growth centres and the disabilities of equipped the proposed growth centres with the proper infrastructures. To avoid the weak points and increase the success probabilities of policy implementation some recommendation are given such as providing adequate resources in the growth centres with the preparation to meet the urbanization requirements, should establish Periodic follow-up of economic changes and Create the multi integration between growth centres in the region.
|
Download
|
18 |
MULTIPLE CONSTANT MULTIPLICATION TECHNIQUE FOR CONFIGURABLE FINITE IMPULSE RESPONSE FILTER DESIGN
Trapti Chodoker, Rajeev Thakur and Puran Gour
Abstract:This paper highlights the design of finite impulse response(FIR) filter with the help of an evolutionary optimization technique, particularly multiple constant multiplication. The Finite Impulse Response (FIR) Filter is that the necessary part for comingupwith associate economical digital signal process system. Transpose kind finite impulse response (FIR) filter is of course a pipelined structure that supports the multiple constant multiplications (MCM) technique however direct form FIR filter structure doesn’t support MCM technique. The MCM is more practical in Transpose form once the common operand is multiple with the set of constant coefficient that cut back the procedure delay. The implementation of MCM technique is simpler in fixed coefficient Transpose form FIR filter however complicated in configurable coefficient. For this purpose, the coefficient of the filter are encoded by Canonical Signed Digit (CSD). FIR filter supported canonical signed digits illustration of coefficient so as to attenuate the power consumption and quick implementation of the filter Performance of the proposed filter has been analyzed in terms of its area, power and speed. The look of FIR filter is planned to implement using Xilinx tool.
|
Download
|
19 |
OPTIMIZATION OF MILLING PARAMETERS IN VERTICAL MILLING MACHINE USING EN24 STEEL AS SPECIMEN
1Gaurav Tamrakar, 2Mr. Anoop Kumar, 3Dr. Pravin Borkar
Abstract:
The surface roughness and Material Removal Rate analysis are dependent on various parameters, specific to input parameters are feed, speed, and percentage of water in Coolant. The combination of these parameters is designed by MINITAB using L9 orthogonal array. On the basis of Design of Experiment, the milling operations are performed in order to evaluate surface roughness and material removal rate. The authors performed the experiment on Vertical Milling Machine using for cutting Alloy material with end mill tools. Experiment wise investigation of the EN24 plates is fixed as work-piece specimen milling operation is carried out. The experiment is performs on different sets of EN24 plates as per design of experiment by MINITAB.
The best setting among the feed, speed, and percentage of water in Coolant for low surface roughness and high MRR has been evaluated. Moreover, Grey Relation Method is used to convert Surface roughness and Material Removal into single responses. In each case, the best setting among the feed, speed, and percentage of water in Coolant for low surface roughness and high MRR and both is found by S/N ratio curve. The results are shown in conclusion section.
|
Download
|
20 |
Bacterial Nucleotide Immunogen Enhances the efficacy of vaccine
M.Muruganandam
Abstract: Bacterial nucleotide especially plasmid DNA and their fragments act as Good Immunogen during vaccine development and its efficacy in inducing immune response is good. The plasmid DNA has short sequence DNA. In induce both cellular and humoral immune responses. It has lot of advantages, it is stored in room temperature . Transport is very easy, preparation method is also easy. So it is highly suitable for vaccine development for most of the bacterial infectious diseases. Nowadays, Multidrug resistant pathogens appear in many places in our global threat , WHO advise to produce new vaccines against these MDR-pathogens, these short sequence nucleotide open new window to develop new vaccine.
|
Download
|
21 |
Ultrasonic vibration shock treatment effects on biomass production of yeast
M.Muruganandam
Abstract: Ultrasonic vibration is one of the physical stress factor. Here stress treatment was provided to yeast cells, after that growth performance was studied. The ultrasonic vibration was given (2 MHZ) to yeast cells with different timings such as 0,2,4,6,8,10 and 12 minutes. After the treatment, Yeast were incubated to 72 hours at 37oC.At the end of the experiment,optical density and biomass production of yeast were calculated. The highest OD (0.72) was observed in 2 minutes treatment .The highest biomass production also observed in 2 minutes treatment (1.044gm).The two minutes treatment produce highest growth rate compared to other treatment. If the stress time increases, the biomass production and OD value also decreased. So stress always suppress growth rate, However initially it induce growth then slowly suppress growth rate of yeast cells.
|
Download
|
22 |
VENDOR CLIENT MANAGEMENT (VCM)
*Dr.Benita.S.Monica#1 & Ms.Subhasini.J#2
Abstract: Vendor plays an important role in any company’s success or failure, and it refers to all the ways and methods of handling arrangements with vendors and its works. Vendor hold wealth of knowledge relating to their product or services and utilization within industry. Vendor client management will be focusing on providing trust commitment and quality towards the client and create positive response to the business. Vendor manager has the responsibility to select the right vendor to yield the desired performance characteristics. The manager has to focus massive amount of details to manage vendor effectively. An important objective of purchase management is to maintain good relationship with vendors. Vendor management will facilitate the process of performance monitoring, reporting and profit risk assessment. Hence the study is timely and vital to understand the perception towards vendor client management.
|
Download
|
23 |
THE IMPACT OF JOB SATISFACTION ON TEACHERS’ORGANIZATIONAL COMMITMENT
Musa Shu’aibu, Dr. Nimisha Beri
Abstract: Job satisfaction is of great importance in all organizations, be it public or private, it makes description on how well an individual or employee is happy in or with his/her job, many factors do contribute towards job satisfaction among employees in any given organization which is different from individual to another or from employee to employee. Satisfaction of job determines teachers’ commitment to their organization and employees are more committed to their organization when they are satisfied with their job. This paper makes summary and analysis of the literature which is available for the topic under discussion. The finding reveals that when teachers are satisfied with their job, it leads to the significant increase in organizational commitment of teachers. It was discussed that teachers exhibit very good organizational commitment when satisfied with aspects of their job. It was concluded that, job satisfaction makes significant impact in the commitment of teachers towards their job.
|
Download
Download
|
24 |
An Exploratory Frame work on the Applications of E-Commerce
ArdraJ.#1
Abstract: Today E-commerce have become a part of our everyday life. It is no longer a technology that only technically advanced and wealthy people use. Electronic commerce predominantly comprises of the marketing, buying, advertising, selling distribution as well as the examining of products by means of internet. E-commerce has given a free rein to another revolution in Kerala that changed the commercial way of business. The companies like Amazon and eBay actually began using E- commerce and now it plays a major role in Indian economy. This paper talks about the recent trends in the business in the state of Kerala that employs e-commerce and its impact on Indian economy by exploring the benefits and limitations of e-commerce. The benefits in general are wider reach, savings in time, low cost, all time accessibility, well synchronisation and large assortment. However, there are certain limitations, one among many being trust, financial security, human less transaction and delivery.
|
Download
|
25 |
LeveragingDataDE-duplicationtoImprove thePerformanceofPrimaryStorageSystemin theCloud
1BhargaviLankera,2P.Sravanthi
Abstract: Cloud computing is a distributed system which works with the multiple component to provide a processing of users input request. The input request can be of data storage, data access and utilizing the data in real time with different available model. Cloud computing consist of multiple layers and model of performing the processing of large amount of data. Different areas of research are available which includes the data security, authentication, accessibility and identity based data utilization. Data usage over the cloud helps in fast and scalable usage of data. Cloud data is accessible with various platform includes web and mobile units. Thus the availability of data and its accessibility increase the vulnerability over the data. This topic is required in further research to enhance the security over the cloud data and accessing them on secure channel. This research discuss about the algorithm which enhance the security with hybrid level of security model. An end to end communication protocol with enhances cryptography and data auditing approach is presented. Thus the algorithm shows the efficiency over the traditional security mechanism. The proposed algorithm works experimented over the java platform using Apache server. The Computation parameter which is taken for comparison is computation time, computation cost, and bandwidth and Energy consumption in data packet transmission. The experiment performed over the proposed security and reliable model shows the efficiency of proposed approach over the traditional solution of data processing in cloud computing distributed environment.
|
Download
|
26 |
Understand Short Texts by Harvesting and Analysis Semantic Knowledge
1Raheema Sheik, 2K. Laxmaiah
Abstract: Semantic web mining and Synaptic web entropy mining is an important and recent research area today where number of technique presented in order to mine the web crawl efficiently and to find the web page rank of various data available in the web, in the present paper which is taken by us for the further research is the hybrid approach where the entropy is calculated based on the semantic-synaptic based approach and the important role of the entropy required today to monitor the todays web fluctuation and various stages of multiple portals and web data available today , here as the authors of the paper mentioned about the scope of the semantic monitoring ,we assume it to be a great way to make it better to experience and query search for the extracted data and opinion monitoring, we have monitored a paper which works with the short text analysis, challenges associated with it and finding data relevance in available knowledge base. Using the spatial data and related information with the input dataset. It can able to find more specific data about the user input. We here mentioning and further trying to make user experience better to utilize the data extracted from the user and visualize them efficiently as per the user requirement. ANN approach can further be utilized for efficient parameter computation.
|
Download
|
27 |
IF SECURE SESSION KEY BASED CLOUD ACCESS AND DISTRIBUTION SYSTEM
1Sumanjali Billi, 2I Surya Sekhar
Abstract: Cloud computing is a new approach in the field of information technology based on the World Wide Web. It is new approach in the field information technology and also it satisfies a end users requirement for computing resources like services and applications etc. Security is one of the most challenging issue in the cloud computing. In cloud computing, services need to address the security during the transmission of sensitive information. Many organization, companies or banks have confidential information, this information is very essential. The cloud does not provide a fully guaranteed of data and it is compromised by the attackers. In this paper by providing a new method, we improve the security of data access in the cloud computing for a bank or any other particular location by using location-based encryption.
|
Download
|
28 |
Secure Data Sharing In Cloud Computing Using Revocable-Storage IBE
1Sunita Palleti, 2CH. Suresh Kumar
Abstract: Cloud computing is a distributed system which works with the multiple component to provide a processing of users input request. The input request can be of data storage, data access and utilizing the data in real time with different available model. Cloud computing consist of multiple layers and model of performing the processing of large amount of data. Different areas of research are available which includes the data security, authentication, accessibility and identity based data utilization. Data usage over the cloud helps in fast and scalable usage of data. Cloud data is accessible with various platform includes web and mobile units. Thus the availability of data and its accessibility increase the vulnerability over the data. This topic is required in further research to enhance the security over the cloud data and accessing them on secure channel. This research discuss about the algorithm which enhance the security with hybrid level of security model. An end to end communication protocol with enhances cryptography and data auditing approach is presented. Thus the algorithm shows the efficiency over the traditional security mechanism. The proposed algorithm works experimented over the java platform using Apache server. The Computation parameter which is taken for comparison is computation time, computation cost, and bandwidth and Energy consumption in data packet transmission. The experiment performed over the proposed security and reliable model shows the efficiency of proposed approach over the traditional solution of data processing in cloud computing distributed environment.
|
Download
|
29 |
Core End To End Traffic Retandary Elimination for Reducing Cloud Bandwidth Cost
1Vamsi Priya Challa, 2M Vijetha
Abstract: In today’s era, End to End TRE (Traffic redundancy) over the cloud computing is a recent technology and recent research topic under cloud computing environment. The Cloud computing and its mechanism to transfer the data, managing its component is an important process for complete process. Where the component such as third party auditor, data centre and virtual machine take participate. There are process involve in the middle such as Packet forwarding, data storage, transmission over the different channel takes process in user activity. In this area of research recent technique PACK takes an advantage of chunking scheme with execution of SHA-1 as security signature approach. According to understanding algorithm PACK face little problem formulation such as in finding high level prediction with efficient signature scheme. The algorithm exhibit reliable prediction over the data. In this dissertation work, our work presented as EPACK, which is the extension version of PACK to identify redundancy prediction over the transmitted data. Algorithm used of similarity measure algorithm, which take use of similarity score measure value from the available data and storage. The algorithm makes use of Meta information, topical relation in between the file parameters, SHA-2 for signing information and outperforms the high level prediction as compare to existing technique. The proposed algorithms also take use of security concern in between any transmission of data in different components. A highly security enhancement of ECC algorithm named HECC (Hyper Elliptic curve cryptography) is used to perform security level in this approach. This can performs over the PACK & EPACK algorithm with comparison parameter by performing data transmission using JDK framework. The proposed scheme and result comparison analysis shows the efficiency of our approach while comparing with PACK algorithm. The further approach over the simulation parameter and environment outperform its best while comparing with the existing PACK technique.
|
Download
|
30 |
A Consideration Independent Score Based Benchmark for Distributed Database
1MD. Zaheda Parveen, 2P Sravanthi
Abstract: Big data and hadoop plays an important role in dealing with the large number of process and big data processing in different scenario. There are multiple nodes participate in the Distribution and different type of data movement scenario. The existing algorithm which is taken for the further improvement work is distributed dataset algorithm, which is phase based Distribution algorithm to process the large number of data and data packets. Our enhance distributed dataset algorithm technique outperform as compare with the existing distributed dataset algorithm and other scheduler so far. Thus the requirement leads us to perform further improvement to the distributed dataset algorithm Distribution technique. In this dissertation our work perform to create a new heuristic based Distribution algorithm which make use of existing scenario and improve it with balanced distribution technique. The proposed technique is based on enhance model which is heuristic & priority based Distribution and load balancing Distribution based scenario which make use of all the resources properly and outperform the complete distribution using the provided Distribution algorithm. The proposed work implemented and tested in java technology and upon processing data range from 1 gb to 5 gb there are performance monitored in terms of computation processing time, throughput with hardware configuration as 4 gb ram, 750 gb hard disk and the competitive results were monitored. Thus the result as compare to existing technique were monitored which are 1.1 x improved while comparing with existing algorithm.
|
Download
|
31 |
Trust Enhanced Cryptographic Role Based Access Control if Secure Cloud Data Storage
1Sushma Uopanaboina, 2B Anand Kumar
Abstract: Cloud data storage has provided significant benefits by allowing users to store massive amount of data on demand in a cost-effective manner. To protect the privacy of data stored in the cloud, cryptographic role-based access control (RBAC) schemes have been developed to ensure that the data can only be accessed by those who are allowed by access policies. However, these cryptographic approaches do not address the issues of trust. In this paper, we propose trust models to reason about and to improve the security for stored data in cloud storage systems that use cryptographic RBAC schemes. The trust models provide an approach for the owners and roles to determine the trustworthiness of individual roles and users, respectively, in the RBAC system. The proposed trust models consider role inheritance and hierarchy in the evaluation of trustworthiness of roles. We present a design of a trust-based cloud storage system, which shows how the trust models can be integrated into a system that uses cryptographic RBAC schemes. We have also considered practical application scenarios and illustrated how the trust evaluations can be used to reduce the risks and to enhance the quality of decision making by data owners and roles of cloud storage service.
|
Download
|
32 |
Unified intelligent water management using
Cyber infrastructure based on cloud computing
and IoT
1Indira Derangula, 2G Sudheer
Abstract: In this project, we are focusing on continuous and real time monitoring of water supply in IOT
platform. Water supply with continuous monitoring makes a proper distribution so that, we can have a
record of available amount of water in tanks, flow rate, abnormality in distribution line. Internet of things
is nothing but the network of physical objects embedded with electronics, sensors, software, and network
connectivity. Monitoring can be done from anywhere as central office. Using thing speak as free server
data continuously pushed on cloud so we can see data in real time operation. Using different sensors with
controller and raspberry pi as Minicomputer can monitor data and also control operation from cloud with
efficient client server communication.
|
Download
|
33 |
Vampire attacks: Drainin life from
wireless AD-HOC sensor Network
1Lekhya Meka, 2M. Manikanta Rao
Abstract: Ad hoc low-power wireless networks are an exciting research direction in sensing and
pervasive computing. Prior security work in this area has focused primarily on denial of
communication at the routing or medium access control levels. This paper explores resource
depletion attacks at the routing protocol layer, which permanently disable networks by quickly
draining nodes’ battery power. These “Vampire” attacks are not specific to any specific protocol, but
rather rely on the properties of many popular classes of routing protocols. We find that all examined
protocols are susceptible to Vampire attacks, which are devastating, difficult to detect, and are easy
to carry out using as few as one malicious insider sending only protocol-compliant messages. In the
worst case, a single Vampire can increase network-wide energy usage by a factor of ODNÞ, where N
in the number of network nodes. We discuss methods to mitigate these types of attacks, including a
new proof-of-concept protocol that provably bounds the damage caused by Vampires during the
packet forwarding phase.
|
Download
|
34 |
Human IRIS as a Biometric for Identity
Verification
1Niziya Mohammad,
2M. Narsimha Rao
Abstract: —The use of human biometrics for automatic identity verification has become widespread. Mostly used human biometrics are face, fingerprint, iris, gait, retina, voice, hand geometry etc. Among them iris is an externally visible, yet protected organ whose unique epigenetic pattern remains stable throughout one’s whole life. These characteristics make it very attractive to use as a biometric for identifying individuals. This paper presents a detailed study of iris recognition technique. It encompasses an analysis of the reliability and the accuracy of iris as a biometric of person identification. The main phases of iris recognition are segmentation, normalization, feature encoding and matching. In this work automatic segmentation is performed using circular Hough transform method. Daugman’s rubber sheet model is used in normalization process. Four level phase quantization based 1D Log-Gabor filters are used to encode the unique features of iris into binary template. And finally the Hamming distance is considered to examine the affinity of two templates in matching stage. We have experimented a better recognition result for CASIA-iris-v4 database.
|
Download
|
35 |
Image Steganography based on complemented
message and Inverted bit LSB substitution
1Radha Rukmini Sheelam,
2K. Rainu
Abstract: Steganography is the art of encoding embedding secret information in cover media in such a way so as not to provoke an eavesdropper’s suspicion. The primary purpose of this paper is to provide
three levels of security, first is provided by complementing the secret message, second by hiding
complemented secret message in cover image pixels that are selected randomly by using pseudo random
number generator, third by using inverted bit LSB method2 as stenographic technique rather than simple
LSB, thus, reduces the chance of the hidden message being detected. MSE (Mean Square Error) and
PSNR (Peak Signal to Noise Ratio) are two common quality measurements to measure the difference
between the cover-image and the stego-image. Results showed that the proposed method gives better
results than simple LSB and inverted LSB with higher PSNR and lower MSE.
|
Download
|
36 |
Internet of Things: Securing data using image
steganography
1Soujanya Kesavarapu, 2M. Manikanta Rao
Abstract: Steganography is the art of encoding embedding secret information in cover media in such a
way so as not to provoke an eavesdropper’s suspicion. The primary purpose of this paper is to provide
three levels of security, first is provided by complementing the secret message, second by hiding
complemented secret message in cover image pixels that are selected randomly by using pseudo random
number generator, third by using inverted bit LSB method2 as stenographic technique rather than simple
LSB, thus, reduces the chance of the hidden message being detected. MSE (Mean Square Error) and
PSNR (Peak Signal to Noise Ratio) are two common quality measurements to measure the difference
between the cover-image and the stego-image. Results showed that the proposed method gives better
results than simple LSB and inverted LSB with higher PSNR and lower MSE.
|
Download
|
37 |
Efficient detection of Brain Tumor from MRI's using KMean Segmentation and Normalized Histogram
1Soujanya Maddi, 2G. Sudheer
Abstract: In this project, we are focusing on continuous and real time monitoring of water supply in IOT
platform. Water supply with continuous monitoring makes a proper distribution so that, we can have a
record of available amount of water in tanks, flow rate, abnormality in distribution line. Internet of things
is nothing but the network of physical objects embedded with electronics, sensors, software, and network
connectivity. Monitoring can be done from anywhere as central office. Using thing speak as free server
data continuously pushed on cloud so we can see data in real time operation. Using different sensors with
controller and raspberry pi as Minicomputer can monitor data and also control operation from cloud with
efficient client server communication.
|
Download
|
38 |
Wireless Sensor Network based Pollution
Monitoring System in Metropolitan Cities
1Venkata Usha Bollam, 2M. Narsimha Rao
Abstract: In this project, we are monitoring air pollution and vehicle traffic congestion which leads to air
pollution, driver frustration, and costs billions of dollars annually in fuel consumption. Finding a proper
solution to vehicle congestion is a considerable challenge due to the dynamic and unpredictable nature of
the network topology of vehicular environments, especially in urban areas. Recent advances in sensing,
communication and computing technologies enable us to gather real-time data about traffic condition of
the roads and mitigate the traffic congestion via various ways such as Vehicle Traffic Routing Systems
(VTR), electronic toll collection system (ETCS), and intelligent traffic light signals (TLSs). Regarding this
issue, an innovative technology, called Intelligent Guardrails (IGs), is presented in this project. IGs take
advantages of the Internet of Things (IOT) and vehicular networks to provide a solution for vehicle traffic
congestion in large cities. IG senses the roads' traffic condition and uses this information to set the
capacity of the roads dynamically.
|
Download
|
39 |
HOME AUTOMATION BASED ON IOT
1Sumanjali Bandi, 2B. Naresh Reddy
Abstract: In this era of science internet is one of a fast growing factor which affiliates many facilities just like: Home Automation which is based on IOT is one of the most useful technologies for the safety purpose of home. It plays a very important role from industrial machines to the neither consumer home appliances which will be working even if you are nor active for some time.
In this modern generation, peoples used automatic devices rather than using the manual devices. Since, internet is influencing people at high rate of population, inventing new technologies daily. In all the technologies IOT is the most useful technology. Home Automation System utilizes the innovation of Internet of Things for checking and controlling of the electrical and electronic machines at home from any remote area by just utilizing a Smartphone. Execution of a minimal effort, adaptable home mechanization framework is exhibited.
|
Download
|