No. |
Title and Author |
Area |
Country |
Page |
1 |
A Survey of Various Intrusion Detection Systems
-Dr. Shailendra Singh ; Prof. Ravindra Kumar Gupta; Nitin Namdev
In this paper, we present an overview of existing intrusion detection techniques. All these algorithms are described more or less on their own. Intrusion detection system is a very popular and computationally expensive task. We also explain the fundamentals of intrusion detection system. We describe today's approaches for intrusion detection system. From the broad variety of efficient techniques that have been developed we will compare the most important ones. We will systematize the techniques and analyze their performance based on both their run time performance and theoretical considerations. Their strengths and weaknesses are also investigated. It turns out that the behavior of the algorithms is much more similar as to be expected. Read More...
|
Computer Enginnering |
India |
1054-1055 |
2 |
New Fuzzy Logic Based Intrusion Detection System
-Dr. Shailendra Singh ; Prof. Ravindra Kumar Gupta; Nitin Namdev
In this paper, we present an efficient intrusion detection technique. The intrusion detection plays an important role in network security. However, many current intrusion detection systems (IDSs) are signature based systems. The signature based IDS also known as misuse detection looks for a specific signature to match, signaling an intrusion. Provided with the signatures or patterns, they can detect many or all known attack patterns, but they are of little use for as yet unknown attacks. The rate of false positives is close to nil but these types of systems are poor at detecting new attacks, variation of known attacks or attacks that can be masked as normal behavior. Our proposed solution, overcomes most of the limitations of the existing methods. The field of intrusion detection has received increasing attention in recent years. One reason is the explosive growth of the internet and the large number of networked systems that exist in all types of organizations. Intrusion detection techniques using data mining have attracted more and more interests in recent years. As an important application area of data mining, they aim to meliorate the great burden of analyzing huge volumes of audit data and realizing performance optimization of detection rules. The objective of this dissertation is to try out the intrusion detection on large dataset by classification algorithms binary class support vector machine and improved its learning time and detection rate in the field of Network based IDS. Read More...
|
Computer Science & Enginnering |
India |
1056-1059 |
3 |
A Decision Tree Based Classifier for Classification & Prediction of Diseases
-Prof. Gajendra Singh ; Bhupendra Patidar
In this paper, we are proposing a modified algorithm for classification. This algorithm is based on the concept of the decision trees. The proposed algorithm is better then the previous algorithms. It provides more accurate results. We have tested the proposed method on the example of patient data set. Our proposed methodology uses greedy approach to select the best attribute. To do so the information gain is used. The attribute with highest information gain is selected. If information gain is not good then again divide attributes values into groups. These steps are done until we get good classification/misclassification ratio. The proposed algorithms classify the data sets more accurately and efficiently. Read More...
|
Computer Science & Enginnering |
India |
1060-1062 |
4 |
Comprehensive Survey of Data Classification & Prediction Techniques
-Prof. Gajendra Singh ; Bhupendra Patidar
In this paper, we present an literature survey of the modern data classification and prediction algorithms. All these algorithms are very important in real world applications like- heart disease prediction, cancer prediction etc. Classification of data is a very popular and computationally expensive task. The fundamentals of data classification are also discussed in brief. Read More...
|
Computer Science & Enginnering |
India |
1063-1064 |
5 |
An Efficient Compressed Data Structure Based Method for Frequent Item Set Mining
-Prof. Gajendra Singh ; Devendra Verma
Frequent pattern mining is very important for business organizations. The major applications of frequent pattern mining include disease prediction and analysis, rain forecasting, profit maximization, etc. In this paper, we are presenting a new method for mining frequent patterns. Our method is based on a new compact data structure. This data structure will help in reducing the execution time. Read More...
|
Computer Science & Enginnering |
India |
1065-1066 |
6 |
Frequent Item Set Mining - A Review
-Prof. Gajendra Singh ; Devendra Verma
In this paper, we present a literature survey of existing frequent item set mining algorithms. The concept of frequent item set mining is also discussed in brief. The working procedure of some modern frequent item set mining techniques is given. Also the merits and demerits of each method are described. It is found that the frequent item set mining is still a burning research topic. Read More...
|
Computer Science & Enginnering |
India |
1067-1068 |
7 |
Modern Techniques for Providing Security in Cloud Computing Environment
-Prof. Gajendra Singh ; Dinesh Kumar Bhayal
Cloud security is nowadays is a burning research topic. In this paper, we present an survey overview of existing cloud security algorithms. All these algorithms are described more or less on their own. Cloud security is a very popular task. We also explain the fundamentals of sequential rule mining. We describe today's approaches for cloud security. From the broad variety of efficient algorithms that have been developed we will compare the most important ones. We will systematize the algorithms and analyse their performance based on both their run time performance and theoretical considerations. Their strengths and weaknesses are also investigated. It turns out that the behaviour of the algorithms is much more similar as to be expected. Read More...
|
Computer Science & Enginnering |
India |
1069-1070 |
8 |
A Third Party Auditor Based Technique for Cloud Security
-Prof. Gajendra Singh ; Dinesh Kumar Bhayal
Cloud security means providing security to users data. There are so many methods for doing this task. They all have their merits and demerits. To ensure the security of users' data in the cloud, we propose an effective, scalable and flexible cryptography based scheme. Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against malicious data modification attack, The proposed scheme not only achieves scalability due to its hierarchical structure, but also inherits flexibility. We implement our scheme and show that it is both efficient and flexible in dealing with access control for outsourced data in cloud computing with comprehensive experiments. Read More...
|
Computer Science & Enginnering |
India |
1071-1072 |
9 |
Voltage Stability & Power Quality Assessment of Distributed Generation Based Wind Farm System
-Dr. Dipesh M. Patel ; Mr. Dattesh Y. Joshi
This paper demonstrated the power quality & voltage stability problems associated with the renewable based distribution generation systems and how the Flexible AC Transmission System (FACTS) device such as Static Synchronous Compensator (STATCOM) play an important role in Power Quality Improvement. First we simulated the wind farm system without STATCOM and after the system simulated with STATCOM. We use the MATLAB/Simulink software for Simulation. Read More...
|
Electrical Engineering |
India |
1073-1076 |
10 |
A Symmetric Key Generation for File Encryption and Protection using/by USB Storage Device
-Ankur P. Desai ; Kajal K. Isamaliya; Mitesh R. Patel; Pankaj Singh Parihar
Most of the file protection softwares provides either one level protection of the simple encryption method or two level protection which is password protection and encryption using simple key generation algorithm which key is generated by the softwares by using characters of password given by the users. In such a softwares or applications when once password cracked or reverse engineering is done by simple entering password one can have access the file or decrypt the file. My research work will provide one more level protection for such a problem which generate Symmetry key using USB storage device to encrypt file. This research work will carry out not only protection two level protection but also provide extra third level protection to protect file using USB storage device. USB File Lock Using USB Storage Device and Digital Keys (Signature) is a high performance File encryption / protection program, password securing your file against outside unauthorized access by the use of an USB stick/Storage. You should provide facility to send password on sms and even email so that authorised person can use for decrypt a file. You should provide facility to encrypt all type of files without restrictions. Password encryption process should be there so no one can access password specified directly from the encrypted file. This provides you security for your data and private information when your data is in transit or in the email as attachment. Any person getting hold of your files will not be able to use them unless he/she has the USB Storage from the same set. We are planning to use an USB Storage to store the encryption key and also uses three other verification keys stored inside Storage plus a unique hardware serial number of the Storage. This makes it very safe and can even be used in military communication.
Advantage of USB Storage is that its easily available at reasonable rates. SO no special hardware is required for this.
A storage or memory USB Storage, also called a memory stick, provides a convenient means to pass files between computers or devices. The memory stick contains a rewritable solid-state memory chip that does not require power to retain its contents. As capacities have grown and price has dropped, these portable, plug-and-play storage drives have replaced floppy disks and even writable discs for exchanging files and archiving data. Read More...
|
Computer Science & Enginnering |
India |
1077-1081 |
11 |
Simulation of Single and Multilayer of Artificial Neural Network using Verilog
-Shaktivel S.M ; Rajesh Vasdadiya; Shreyas J. Patel
Artificial neural network play an important role in VLSI circuit to find and diagnosis multiple fault in digital circuit. In this paper, the example of single layer and multi-layer neural network had been discussed secondly implement those structure by using verilog code and same idea must be implement in mat lab for getting number of iteration and verilog code gives us time taken to adjust the weight when error become almost equal to zero. The purposed aim at reducing resource requirement, without much compromises on the speed that neural network can be realized on single chip at lower cost. Read More...
|
Electronics & Communication |
India |
1082-1085 |
12 |
Survey Performance Improvement Construct FP-Growth Tree
-Asha D. Patel ; Yogadhar Pandey
Construction of a compact FP-tree ensures that subsequent mining can be performed with a rather compact data structure. This does not automatically guarantee that it will be highly efficient since one may still encounter the combinatorial problem of candidate generation if one simply uses this FP-tree to generate and check all the candidate patterns. we study how to explore the compact information stored in an FP-tree, develop the principles of frequent-pattern growth by examination of our running example, explore how to perform further optimization when there exit a single prefix path in an FP-tree, and propose a frequent- pattern growth algorithm, FP-growth, for mining the complete set of frequent patterns using FP-tree. Read More...
|
Computer Science & Enginnering |
India |
1086-1087 |
13 |
Secure System based on Dynamic Features of IRIS Recognition
-Shreyas A. Pathak
Basically, the idea behind this system is improvement in cybernetics, the biometric person identification technique based on the pattern of the human iris is well suited to be applied to access control. The human eye is sensitive to visible light. Security systems having realized the value of biometrics for two basic purposes: to verify or identify users. In this busy world, identification should be fast and efficient. In this paper I focus on an efficient methodology for identification and verification for iris detection using Haar transform and Minimum hamming distance. I use canny operator for the edge detection. This biological phenomenon contracts and dilates the two pupils synchronously when illuminating one of the eyes by visible light .I applied the Haar wavelet compressing the data. By comparing the quantized vectors using the Hamming Distance operator, we determine finally whether two irises are similar. The result shows that system is quite effective. Read More...
|
Computer Science & Enginnering |
India |
1088-1092 |
14 |
Analysis of different FIR Filter Design Method in terms of Resource Utilization and Response on Field-Programmable Gate Array
-Prof. R. C. Patel ; Nilesh B. Bosmiya
In this paper fully parallel FIR filters are designed with different design method on FPGA for resource utilization and response analysis. fully parallel band-pass FIR filters with same specification designed and simulated on ISE. The suggested implementations are synthesized with Xilinx ISE 14.2 version. Results show comparison of three different filter design methods in terms of resource utilization. Read More...
|
Instrumentation & Control Engineering |
India |
1093-1095 |
15 |
Design & Check Cyclic Redundancy Code using VERILOG HDL
-Prof. Dhiraj Jain ; Hiren G. Patel
the CRC or cyclic redundancy check is a widely used technique for error checking in many protocols used in data transmission. The aim of this project is to design the CRC RTL generator or a tool that calculates the CRC equations for the given CRC polynomials and generates the Verilog RTL code .This block deals with the calculation of equations for standard polynomials like CRC-4, CRC-8, CRC-16, CRC-32 and CRC-48, CRC-64 and also user defined proprietary polynomial. To use PERL as the platform it also aims at having a simpler user interface. To generate the RTLs for any data width and for any standard polynomial or user defined polynomial, this design aims to be complete generic. The RTLs generated by this tool are verified by System Verilog constrained random testing to make it more robust and reliable. Read More...
|
Electronics and Communication |
India |
1096-1098 |
16 |
Hand Shape Based Gesture Recognition in Hardware
-Prince Nagar ; Ghanshyam Kumar Singh; Ram Mohan Mehra
It is possible to recognize and classify ten hand gestures based solely on their shapes. This paper discusses a simple recognition algorithm that uses three shape-based features of a hand to identify what gesture it is conveying. The overall algorithm has three main steps: segmentation, feature calculation, and classification. The algorithm takes an input image of a hand gesture and calculates three features of the image, two based on compactness, and one based on radial distance. The parameters found in the classification step were obtained empirically using 200 hand images. The algorithm was tested on another 200 hand images, and was able to successfully classify 182 images, or with an overall success rate of 91 percentage. Read More...
|
Electronics and Communication |
India |
1099-1103 |
17 |
Hand Gesture Controls for Digital TV using Mobile ARM Platform
-Ajit S. Gundale ; Pallavi G. Potadar
This paper presents a new approach for controlling digital television using a real-time camera. Proposed method uses a camera, a mobile ARM platform and computer vision technology, such as image segmentation and gesture recognition, to control TV operations such as changing channels, increasing or decreasing volume etc. For this we have used an ARM based mobile platform with OMAP processor. For processing the images we implemented the code using OpenCV library. Hand detection is one of the important stages for applications such as gesture recognition and hand tracking. In this paper, it proposes a new method to extract hand region and consequently the fingertips from color images. Read More...
|
Electronics and Communication |
India |
1104-1107 |
18 |
VHDL Implementation of Flexible Multiband Divider
-Arathy G.
In this paper an efficient multiband flexible divider for Bluetooth, Zigbee and other wireless standards is proposed based on pulse swallow topology and is implemented using Xilinx ISE 13.2 and modalism 6.4c.It consist of a propose wideband multimodulus 32/33/47/48 prescaler, swallow s-counter ,p-counter. As a modification I have implemented a modified multiband flexible divider by combining p and s counters together and by using a modified 2/3 prescaler. Compared to the proposed system modified one will reduce the circuit complexity, power consumption, gate counts etc. Read More...
|
Electronics and Communication |
India |
1108-1111 |
19 |
Myoelectric Leg for Transfemoral Amputee
-Kirtan P. Parekh ; Jignesh B. Vyas
This paper will review the works on Surface Electromyography (SEMG) signal acquisition and controlling as well as the uses of SEMG signals analysis for Transfemoral amputee's people. In the beginning, this paper will briefly go through the basic theory of myoelectric signal generation. Next, the signal acquisition & filtering techniques applied for SEMG signal will be explained. Then after this EMG signal control or actuate the myoelectric leg who was suffering from Transfemoral amputee using microcontroller. This paper gives the better controlling SEMG signal and also very smooth and easy controlling of the Prosthetic leg motor using Myoelectric Controller. Read More...
|
Biomedical Engineering |
India |
1112-1115 |
20 |
Tool Wear Analysis of USM for Composite Material using Taguchi Technique
-Alpesh Makwana ; Akash Pandey; Bhupesh Goyal
In today's world, composite materials have many engineering application for manufacturing, packaging, automobile industry. For the machining of these composite materials, many accurate and cost effective machining processes have been used to reduce the machining time and man hour. The work piece of composite material of aluminium 6061 and silicon carbide powder of 100 mesh is prepared by the stir casting process with different weight fraction of powder in aluminium matrix. The prepared work piece of the composites are then carried out for machining on Ultra Sonic Machine to evaluate the tool wear rate with different process variables which are work piece material composition, amplitude, pressure and thickness of composite sheet. Experiments have been conducted to conclude that by changing the amplitude, tool wear is effectively increased at higher rate. Other variables also make definite changes which are smaller in comparison to amplitude. The comparison of mathematical model with experimental results will also serve as future validation of the model. Read More...
|
Mechanical Engineering |
India |
1116-1120 |
21 |
Reviews of Cascade Control of Dc Motor with Advance Controller
-Bhavina Rathod
The proportional- integral-derivative (PID) control is the most used algorithm to regulate the armature current and speed of cascade Control system in motor drives. The controller uses two PID controllers. One PI controller is for speed control and second PID controller for current control in cascade structure. Inner loop is for the current control which is faster than the outer loop. Outer loop is for speed control. The output of the encoder is compared with a preset reference speed. The output of the PI controller is summed and is given as the input to the current controller. Read More...
|
Applied Instrumentation |
India |
1121-1123 |
22 |
Study of Grout Mix Design Using to Admixture
-Prof M.G.Vanza ; P.A.Chaudhari
This paper is part of the dissertation work in which an experimental investigation is carried out to study the performance of the grout mixtures subjected to different types of curing regimes. Different grout mixtures have been designed varying the water/solids ratio and the dosage of the admixtures. The grout mixtures were then tested to study the mechanical property i.e. Compressive strength of the various grout mixes thus designed and subjected to two different curing regimes i.e. Air curing and water curing (full immersion curing). Read More...
|
Applied Mechanics |
India |
1124-1127 |
23 |
Development of A web and GSM Based Monitoring and Controlling System for PLC Based Application
-A.S. Gundale ; K.M. Vakani; P.D.R. Patnaik
In this paper we have developed a platform to remotely monitor and control PLC-based processes over web and GSM network. It will be great benefit if we control the process plant through remote monitoring and controlling. In recent years the development of industrial automation through remote monitoring and controlling has been increased. The proposed system is made possible by the use of PLC, Microcontroller, GSM modem, Ethernet Module, and other elements. The main aim of the remote monitoring and controlling is when a critical failure occurs notifications are generated and send to the expert via SMS and internet message with the help of GSM modem and through internet. The remote controlling of process is now much required control to use expert man power. The challenge here is to establish a proper serial and Ethernet communication between PLC and Microcontroller via appropriate protocol and also to integrate conventional process with recent communication technologies along with advancements in wireless and internet technology. Read More...
|
Electronics Engineering |
India |
1128-1130 |
24 |
An Efficient Method for Detecting Impurity from Rice Mixture Using Digital Embedded System
-Bharat K. Patel ; R. C. Patel
A faster, automatic, precise, economic and real time prototype system is developed for detecting impurity from rice using ARM controller. The system uses hue value of the color impurity to detect them real time from the mixture of rice. With the help of OpenCV (Open computer vision) library an algorithm is developed to track impurity from an embedded device to track impurity from rice mixture in real time. It is useful in quality inspection of rice grain in agriculture industry. Read More...
|
Instrumentation & Control Engineering |
India |
1131-1134 |
25 |
Use of Linear Regression in Machine Learning for Ranking
-Prof. Anil Mokhade ; Yashavant S. Ingle
Machine Learning is a growing field today in AI. We discuss use of a Supervised Learning algorithm called as Regression Learning in this paper for ranking. Regression Learning is used as Prediction Model. The values of dependent variable are predicted by Regression Model based on values of Independent Variables. By Regression Learning if after Experience E, program improves its performance P, then program is said to be doing Regression Learning. We chose to use Linear Regression for Ranking and discuss approaches for Rank Regression Model Building by selecting best Ranking parameters from Knowledge and confirming their selection further by performing Regression Analysis during Model building. Example is explained. Analysis of Results and we discuss the Combined Regression and Ranking approach how it is better for enhancing use of Linear Regression for Ranking purpose. We conclude and suggesting future work Ranking and Regression. Read More...
|
Computer Science & Enginnering |
India |
1135-1140 |
26 |
Design and Implementation of a Real Time Obstacle Avoiding Subsumption Controlled Reactive Robot
-M.R. Madki ; V.S. Dasmane
in Reactive robotic system, behaviors serves as the basic building block for robotic actions. A reactive control system tightly couples perception to action without the use of intervening abstract representations or time history. A simple wheeled vehicle is easy in mechanical design, controlling, and the construction part. But it doesn't work efficiently in all kind of surface. On a rough terrain, it performs poorly. The radius of a wheel could pass only a certain height of obstacle. To pass most of the obstacle that it meets, larger wheel radius need to be designed. In this paper the design & implementation of Subsumption based architecture, a reactive control system for real time obstacle avoidance which is compatible with low cost ultrasonic sensor, infrared sensors and fast enough to be implemented using microcontroller based development board is introduced with a legged robot. Read More...
|
Electronics & Telecommunication Engineering |
India |
1141-1143 |
27 |
Reversible Digital Watermarking of Audio Wav Signal Using Additive Interpolation-Error Expansion
-Minu Kuriakose ; Anand Baby Alias
Digital watermarking is the process of hiding information in a carrier signal. An audio watermarking is a kind digital watermarking over which the carrier signal is audio. Here in this paper, an advanced audio watermarking scheme called additive interpolation-error expansion technique is proposed. The paper proposes a successful method for embedding and extraction of binary bits and text in audio wav file. Read More...
|
Electronics and Communication |
India |
1144-1146 |
28 |
A Survey of different Data Hiding Techniques in Digital Images
-Divya John ; Akhil P V
Steganography is the art and science of invisible communication, which hides the existence of the communicated message into media such as text, audio, image and video without any suspicion. Steganography is different from cryptography and watermarking in its objectives which includes undetectability, robustness (resistance to various image processing methods and compression) and capacity of the hidden data. Image Steganography uses digital image as its cover media. This paper analyzes and discusses various techniques available today for image steganography along with their strengths and weaknesses. Read More...
|
Computer Science & Enginnering |
India |
1147-1150 |
29 |
Mathematical Modelling of A Pneumatically Actuated Half Car Active Suspension
-Dr.J.Jancirani ; Dennie John; K.Prabu
The isolation of passenger from road irregularities is the primary focus of suspension system development. A half-car model, consisting of the front and rear wheels in tandem, is used in this study. This system is used to study pitching of the vehicle body in addition to the dynamics of individual wheels. A pneumatic actuator placed parallel to the conventional spring and damper counters the force imparted by the road to the tyre by generating an opposing force. This actuator is controlled actively by PID controller which is capable of incorporating feedback from relevant data points on the model. The study is carried out at multiple road speeds to study the effect of vehicle speed variations on the suspension system. Simulation of the above model shows that there is significant improvement in the dynamics of the vehicle when the actively controlled pneumatic actuator is used. Read More...
|
Automobile Engineering |
India |
1151-1154 |
30 |
Design of Efficient High Speed Vedic Multiplier
-Dr. Ajay Somkuwar ; Dheeraj Jain
Multipliers are extensively used in Microprocessors, DSP and Communication applications. For higher order multiplications, a huge number of adders are to be used to perform the partial product addition. This paper proposed the design of high speed Vedic Multiplier using the techniques of Ancient Indian Vedic Mathematics that have been modified to improve performance. Vedic Mathematics is the ancient system of mathematics which has a unique technique of calculations based on 16 Sutras. The work has proved the efficiency of Urdhva Triyagbhyam. It enables parallel generation of intermediate products, eliminates unwanted multiplication steps. Urdhva tiryakbhyam Sutra is most efficient Sutra (Algorithm), giving minimum delay for multiplication of all types of numbers, either small or large. Read More...
|
Electronics and Communication |
India |
1155-1157 |
31 |
Implementation and Performance Analysis of a Vedic Multiplier Using Tanner EDA Tool
-Dr. Ajay Somkuwar ; Dheeraj Jain
high density, VLSI chips have led to rapid and innovative development in low power design during the recent years .The need for low power design is becoming a major issue in high performance digital systems such as microprocessor, digital signal processor and other applications. For these applications, Multiplier is the major core block. Based on the Multiplier design, an efficient processor is designed. Power and area efficient multiplier using CMOS logic circuits for applications in various digital signal processors is designed. This multiplier is implemented using Vedic multiplication algorithms mainly the "UrdhvaTriyakBhyam sutra., which is the most generalized one Vedic multiplication algorithm [1] . A multiplier is a very important element in almost all the processors and contributes substantially to the total power consumption of the system. The novel point is the efficient use of Vedic algorithm (sutras) that reduces the number of computational steps considerably compared with any conventional method . The schematic for this multiplier is designed using TANNER TOOL. Paper presents a systematic design methodology for this improved performance digital multiplier based on Vedic mathematics. Read More...
|
Electronics and Communication |
India |
1158-1162 |
32 |
A Survey on Credit Based Scheme for Multihop Wireless Network
-Divya T.V ; Linu Ann Joy
Wireless Network (WSN) is an evolving technology that has various applications both for mass public and military. The performance of wireless networks depends on the cooperation of all active nodes. However, supporting a wireless network is a cost-intensive activity for a mobile node. For a single mobile node perspective, the detection of routes as well as forwarding packets consumes local CPU time, memory and bandwidth. Sometimes the mobile nodes denying the packet of other nodes, while at the same time use their services to deliver its own data. This behaviour of an independent mobile node is commonly known as misbehaving or selfishness. There are different schemes used for minimizing malicious behaviour of mobile nodes. Here provide different payment based schemes that provide co-operation among nodes in the network. Read More...
|
Computer Science & Enginnering |
India |
1163-1166 |
33 |
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Control in Distributed Cloud Computing
-M.KUMARESAN ; N. R .SINDHU PRIYA
Cloud computing have high demand due to waste and huge data usage of clients. The privacy and security become major concern on the outsourced cloud data storage. The attribute based encryption schemes are used recently for access control of outsourced cloud data. It has highly inflexible in implementing complex access control policies. The existing work presented Hierarchical attribute set based Encryption (HASBE) that extended cipher-text policy attribute set based encryption (ASBE) with hierarchical structure of users. It used achieve scalability, inherits flexibility, fine grained access control, and employs multiple value assignments for access expiration time, and deal with user revocation efficiently. The performance analysis is made to evaluate the computational complexity of access control for outsourced data in cloud computing. However varying of cloud service provider complicates the hierarchical access control policies. The proposal presented an Adaptive Delegation Authority model enhancement to HASBE. It is used to minimize the complexity of access control policies in changing cloud service provider. The delegation authority coordinates the data owners and consumer for easy and quick data access control. It intimates the data owners and consumers about the authority delegation.
The delegation authority sends encryption standards to be followed thereafter. The simulation is carried with Cloud simulator using java to testify in the effectiveness of Adaptive Delegation Authority enhancement to HASBE. Read More...
|
Computer Science & Enginnering |
India |
1167-1171 |
34 |
RSA Based CPDP with Adaptive Indexed Cluster for Distributed Cloud Storage Services
-M.Kumaresan ; S.Abinaya
Provable data possession is a probabilistic technique for storage providers has proven integrity and ownership of client's data (without downloading) the essential for large files and folders. To check data is tampered with or deleted without downloading latest version of data. It provides replacement for hash and signature function in storage outsourcing. Most PDP schemes address scalability and dynamics of PDP Un-trusted servers in single cloud storage provider unsuitable for multi-cloud storages. Integrity of data storage outsourcing is done with provable data possession.
The existing work presented Cooperative Provable Data Possession (CPDP) scheme for distributed cloud storage. The multiple cloud service providers cooperatively store and maintain client's data. Operation of CPDP is based on Homo-morphic verifiable response and hash index hierarchy. The security of CPDP is arrived with multi-prover zero knowledge proof system. The performance optimization selects optimal metrics for clients and storage providers to minimize computation complexity and Communication overhead. IT present an RSA based CPDP with adaptive indexed cluster network for distributed cloud storage services. RSA encryption is associated with CPDP group user's data possession for multiple cloud storage locations of the client's data. The indexed clustered network is constructed to match the index structure of hash hierarchies of distributed cloud services. The indexed clustered network operations are based on adoptive parent tree hierarchy. Read More...
|
Computer Science & Enginnering |
India |
1172-1175 |
35 |
The Effects of Coconut Milk on the Rooting Of Two Types of Cutting of Terminalia Catappa
-M.E. Akalusi ; Shidiki A.A.; Jatau D.F
Objectives: The trial investigated the effects of coconut milk on stem and root cuttings of Terminalia catappa.
Methodology and results: Each cutting type treated with three coconut milk concentrations (0%, 50% and 100%).The experiment was a 2x3 factorial set, six treatment combinations replicated four times and laid out in a completely randomized design. The results showed that root cuttings produced significantly more cuttings with roots, number of roots on rooted cuttings and rooted cuttings with the longest roots (P<0.05) at 14 weeks after planting. Although cuttings treated with 100% coconut milk produced more cuttings with roots, number of roots on rooted cuttings and rooted cuttings with the longest roots, their results were not significantly better (P>0.05) than those treated with 50% and 0% coconut milk. There was a significant interaction (P<0.05) between cutting type and coconut milk concentration on the number of cuttings with roots, number of roots on rooted cuttings and rooted cuttings with the longest roots. Stem cuttings produced significantly more leaves (P<0.05) at 14 weeks after planting.
Conclusion and recommendation: There was a significant interaction (P<0.05) between cutting type and coconut milk concentration on the number of leaves produced. It was recommend that root cuttings treated with 100% coconut milk should be used for vegetative propagation programs of the species. Read More...
|
Biomedical Engineering |
India |
1176-1178 |
36 |
Green Marketing Revolution in India
-Kinjal Kumar Chandrakant Patel
Polonsky (1994) defines green marketing as, All activities designed to generate and facilitate any exchanges intended to generate and facilitate any exchanges intended to satisfy human needs or wants, such that the satisfaction of these needs and wants occurs, with minimal detrimental impact on the natural environment". India is a world leader in green IT potential, according to a recently released global enterprise survey. Among the companies that have succeeded thus far in their green marketing strategies are Apple, HP, Microsoft, IBM, Intel, Sony and Dell. HCL has a comprehensive policy designed to drive its environmental management program ensuring sustainable development. HCL is duty bound to manufacture environmentally responsible products and comply with environmental management processes right from the time products are sourced, manufactured, bought by customers, recovered at their end-of-life and recycled. As resources are limited and human wants are unlimited, it is important for the marketers to utilize the resources efficiently without waste as well as to achieve the organization's objective. So green marketing is inevitable. The paper examines the present trends of green marketing in India and its future. Read More...
|
Business Administration |
India |
1179-1183 |
37 |
FPGA Implementation of SubByte & Inverse SubByte for AES Algorithm
-Neethan Elizabeth Abraham
Advanced encryption standard was accepted as a Federal Information Processing Standard (FIPS) standard. In traditional look up table (LUT) approaches, the unbreakable delay is longer than the total delay of the rest of operations in each round. LUT approach consumes a large area. It is more efficient to apply composite field arithmetic in the SubBytes transformation of the AES algorithm. It not only reduces the complexity but also enables deep sub pipelining such that higher speed can be achieved. Isomorphic mapping can be employed to convert GF(28) to GF(22)2)2) ,so that multiplicative inverse can be easily obtained. SubBytes and InvSubBytes transformations are merged using composite field arithmetic. It is most important responsible for the implementation of low cost and high throughput AES architecture. As compared to the typical ROM based lookup table, the presented implementation is both capable of higher speeds since it can be pipelined and small in terms of area occupancy (137/1290 slices on a Spartan III XCS200-5FPGA). Read More...
|
Electronics and Communication |
India |
1184-1187 |
38 |
Design and Implementation of a Programmable Truncated Multiplier
-Sethu Merin George
Truncated multiplication reduces part of the power required by multipliers by only computing the most-significant bits of the product. The most common approach to truncation includes physical reduction of the partial product matrix and a compensation for the reduced bits via different hardware compensation sub circuits. However, this result in fixed systems optimized for a given application at design time. A novel approach to truncation is proposed, where a full precision multiplier is implemented, but the active section of the partial product matrix is selected dynamically at run-time. This allows a power reduction trade off against signal degradation which can be modified at run time. Such architecture brings together the power reduction benefits from truncated multipliers and the flexibility of reconfigurable and general purpose devices. Efficient implementation of such a multiplier is presented in a custom digital signal processor where the concept of software compensation is introduced and analysed for different applications. Experimental results and power measurements are studied, including power measurements from both post-synthesis simulations and a fabricated IC implementation. This is the first system-level DSP core using a fine-grain truncated multiplier. Results demonstrate the effectiveness of the programmable truncated MAC (PTMAC) in achieving power reduction, with minimum impact on functionality for a number of applications. Software compensation also shown to be effective when deploying truncated multipliers in a system. Read More...
|
Electronics and Communication |
India |
1188-1191 |
39 |
Power Swing Phenomena and Comparative Study of Its Detection on Transmission Line
-Ashit Pandya ; V.J.Upadhyay
Power systems are subject to a wide range of small or large disturbances during operating conditions. Small changes in loading conditions occur continually. The power system must adjust to these changing conditions and continue to operate satisfactorily and within the desired limits of voltage and frequency. The power system should be designed to survive larger types of disturbances, such as faults, loss of a large generator, or line switching. Certain system disturbances may cause loss of synchronism between a generator and rest of the utility system, or between interconnected power systems of neighboring utilities. If such a loss of synchronism occurs, it is imperative that the generator or system areas operating asynchronously are separated immediately to avoid widespread outages and equipment damage. Here it is described to distinguish between power swing and real fault. It is also discussed recent enhancements in the design of out of step tripping and blocking protection functions that improve the security and reliability of the power system. In addition to that the behavior of distance relay element during power swing and during fault is simulated using MATLAB and SIMULINK simulations. Read More...
|
Electrical Engineering |
India |
1192-1199 |
40 |
The Optimizing Multiple Travelling Salesman Problem Using Genetic Algorithm
-Dr. B. S. E. Zoraida ; R.Jayasutha
The traveling salesman problem (TSP) supports the idea of a single salesperson traveling in a continuous trip visiting all n cities exactly once and returning to the starting point. The multiple traveling salesman problems (mTSP) is complex combinatorial optimization problem, which is a generalization of the well-known Travelling Salesman Problem (TSP), where one or more salesman can be used in the path. In this paper mTSP has also been studied and solved with GA in the form of the vehicle scheduling problem. The existing model is new models are compared to both mathematically and experimentally. This work presents a chromosome methodology setting up the MTSP to be solved using a GA. Read More...
|
Computer Science & Enginnering |
India |
1200-1203 |
41 |
Parametric Optimization for Weld Strength of Resistance Spot Welding Using Full Factorial Method
-Prof. S. S. Patel ; Prof. M. G. Patel; Prof. A. G. Momin
Experimental investigation on resistance spot welding has been carried out using 33full factorial method. Stainless steel 304 has been considered for experimental work. The spot welding input parameters, which are considered for this work are welding current, cycle time and thickness, however tensile strength of nugget has been taken as output parameter. Results show that Welding current has significant impact on the tensile strength of nugget. Read More...
|
Mechanical Engineering |
India |
1204-1205 |
42 |
Optimization Approach for Capacitated Vehicle Routing Problem Using Genetic Algorithm
-A.Delphin Carolina Rani ; B.S.E.Zoraida; S.Sangeetha
Vehicle Routing Problem (VRP) is a combinatorial optimization problem which deals with fleet of vehicles to serve n number of customers from a central depot. Each customer has a certain demand that must be satisfied using each vehicle that has the same capacity (homogeneous fleet). Each customer is served by a particular vehicle in such a way that the same customer is not served by another vehicle. In this paper, Genetic Algorithm (GA) is used to get the optimized vehicle route with minimum distance for Capacitated Vehicle Routing Problem (CVRP). The outcomes of GA achieve better optimization and gives good performance. Further, GA is enhanced to minimize the number of vehicles. Read More...
|
Computer Science & Enginnering |
India |
1206-1209 |
43 |
Survey of Modified Routing Protocols for Mobile Ad-hoc Network
-Ashish B. Gaigole
In last few years extensive research work has been done in the field of routing protocols for Ad-hoc Network. Various routing protocols have been evaluated in different network conditions using different performance metrics. A lot of research has been done how to modify standard routing protocol in ad-hoc network to improve its performance. The hop count is not only metric that gives efficient routing path. There are various modified protocols which make the use of other parameters along with hop count to select the best routing path to the destination. In standard Ad-hoc On-demand Distance Vector (AODV) routing protocol only hop count is used for selecting the routing path. In this paper we have studied variants of AODV protocols with modified routing metric. Read More...
|
Computer Science & Enginnering |
India |
1210-1212 |
44 |
OBD I & II (On Board Diagnostic)
-Kasam Anil ; O.Sai Kiran; N.V.Yasasvi
OBD or On-Board Diagnostics refers to a system for emission control which has the capability to detect a malfunction and to store the related information in nonvolatile memory. The OBD system monitors the emission relevant components or systems, stores detected malfunctions indicating likely area of malfunction and activates Malfunction Indicator Lamp (MIL) if necessary. On-board diagnostics, required by governmental regulations, provide a means for reducing harmful pollutants into the environment. Since being mandated in 2010 in India, the regulations have continued to evolve and require engineers to design systems that meet strict guidelines.
The OBD system has a microcontroller based processing system and monitors the sensors installed at different parts of vehicle to observe various emission related parameters and emission control system/devices, processing unit will take input from these sensors and signal conditioners, calculate the real-time values of vehicle parameters and give output. System will be able to diagnose faults in parameters, abnormal abrupt changes, notify user of any abnormal condition, and indicate the cause of fault. The OBD system is installed in vehicles to improve in house emission compliance by alerting the vehicle operator when a malfunction exists and to aid automobile repair technicians in identifying and repairing malfunctioning systems in the emission control system. Read More...
|
Mechanical Engineering |
India |
1213-1218 |
45 |
Modeling Analysis& Solution of Power Quality Problems Using DVR & DSTATCOM
-Amitkumar Singh ; Janak B. Patel
A Power quality problem is an occurrence manifested as a nonstandard voltage, current or frequency that results in a failure or a disoperation of end use equipment. Utility distribution networks, sensitive industrial loads, and critical commercial operations all suffer from various types of outages and service interruptions which can cost significant financial loss per incident based on process down-time, lost production, idle work forces, and other factors. With the restructuring of Power Systems and with shifting trend towards Distributed and Dispersed Generation, the issue of Power Quality is going to take newer dimensions. The aim therefore, in this work, is to identify the prominent concerns in the area and thereby to recommend measures that can enhance the quality of the power, keeping in mind their economic viability and technical repercussions. In this paper electromagnetic transient studies are presented for the following two custom power controllers: the distribution static compensator (DSTATCOM), and the dynamic voltage restorer (DVR). Comprehensive results are presented to assess the performance of each device as a potential custom power solution. Read More...
|
Power Engineering |
India |
1219-1224 |
46 |
Design Tables for Simply Supported Beams with Rolled Steel I Sections
-Murali Sagar Varma Sagi ; M. Sai priya; M. Prem chand; N. kishore kumar
This paper presents the design tables for simply supported beams with rolled I steel sections. An attempt was made to reduce the effort to design economical rolled I-sections by developing design tables for various spans. Design table for each span consists of Load and corresponding safe section from bending, shear and deflection point of view for all categories of rolled I-sections. The design tables are developed for both laterally supported and laterally unsupported beams. Unit weight is taken as the criteria for choosing economic section among the safe sections from each category. This work is confined only to available rolled sections in IS 808: 1989 (steel tables) Read More...
|
Civil Engineering |
India |
1225-1228 |
47 |
Multibiometric Secure Index Value Code Generation for Authentication and Retrieval
-K.Baskar ; K.Saranya
The use of multiple biometric sources for human recognition, referred to as multibiometrics, mitigates some of the limitations of unimodal biometric systems by increasing recognition accuracy, improving population coverage, imparting fault-tolerance, and enhancing security.
In a biometric identification system, the identity corresponding to the input data (probe) is typically determined by comparing it against the templates of all identities in a database (gallery).
An alternative e approach is to limit the number of identities against which matching is performed based on criteria that are fast to evaluate. We propose a method for generating fixed-length codes for indexing biometric databases. An index code is constructed by computing match scores between a biometric image and a fixed set of reference images. Candidate identities are retrieved based on the similarity between the index code of the probe image and those of the identities in the database. The number of multibiometric systems deployed on a national scale is increasing and the sizes of the underlying databases are growing.
These databases are used extensively, thereby requiring efficient ways for searching and retrieving relevant identities. Searching a biometric database for an identity is usually done by comparing the probe image against every enrolled identity in the database and generating a ranked list of candidate identities. Depending on the nature of the matching algorithm, the matching speed in some systems can be slow.
The proposed technique can be easily extended to retrieve pertinent identities from multimodal databases. Experiments on a chimeric face and fingerprint bimodal database resulted in an
84% average reduction in the search space at a hit rate of 100%. These results suggest that the proposed indexing scheme has the potential to substantially reduce the response time without compromising the accuracy of identification. New representation schemes that allow for faster search and, therefore, shorter response time are needed. Read More...
|
Computer Science & Enginnering |
India |
1229-1233 |
48 |
FE Analysis for Investment Casting and Computer Simulation: A Review
-Vallabh D. Patel ; Swapnkumar S. Sonara
In the present paper a review for the experimental and finite element analysis techniques is adopted for Investment casting. Experimental Data taken for Solidification of investment Casting is modeled and meshed initially then validation is followed by comparing the experimental and modeled results. This helps to optimize the design criteria for investment casting. To overcome the problem of current gating /riser system and by comparing simulation results of optimized casting model with that of original model we can reduce the shrinkage porosity. Read More...
|
Mechanical Engineering |
India |
1234-1236 |
49 |
Case Study on Software Cost Estimation Techniques
-Arpita Sharma ; Mahender Kr. Beniwal; T. N. Sharma
According to the survey, only one third projects overrun their budget and two thirds of all major projects overrun their original estimates. To make exact prediction of software development is a critical issue and it is difficult to determine how much effort a project and project managers to analyze it. It is little bit difficult to make the estimation about the project and determine how much time and manpower a project requires in the beginning. System analysts are unable to make realistic hardware- software during the system design phase and software project personnel cannot exactly tell their proposed budget. So, it is optimistic related to software development and also it is inevitable because it compromises as a consequence. But in fact huge overruns results from inaccurate estimates that are believed to occur frequently. The entire process of developing a cost for software is not different from any other element of cost. However, aspects of the process are peculiar to software estimating. Some of the unique aspects are driven by the nature of software as a product. Other problems are created by the nature of the estimating methodologies. Read More...
|
Computer Enginnering |
India |
1237-1240 |
50 |
Compare "Urdhva Tiryakbhyam Multiplier" and "Hierarchical Array of Array Multiplier"
-Dr. Ajay Somkuwar ; Dheeraj Jain
Multipliers are extensively used in Microprocessors, DSP and Communication applications. For higher order multiplications, a huge number of adders are to be used to perform the partial product addition. The need of high speed multiplier is increasing as the need of high speed processors are increasing. In this project, comparative study of different multipliers is done for high speed. The project includes two 4x4 bit Vedic Multiplier (VM) "Urdhva Tiryakbhyam multiplier" and "Hierarchical Array of Array Multiplier" of Ancient Indian Vedic Mathematics which are compared in terms of their speed. Urdhva Tiryakbhyam sutra increases the speed of multiplier by reducing the number of iterations then Hierarchical Array of Array Multiplier. Read More...
|
Electronics and Communication |
India |
1241-1245 |