Issues [Year wise]

Year Wise :


Paper Title : ICUP: Privacy Preserving Public Auditing Mechanism for Cloud Data
Authors : B. Seetharamulu, Dr.G.V. Uma, , ,
Affiliations :
Abstract :
Cloud services are used to store and sharing the information, where we can store huge volume of data as well can share among multiple users. While sharing the data among multiple users privacy of the users and data and also provide data integrity it’s a challenging issue with the present system. In order address the above issues we proposed ICUP Mechanism which performs public auditing on shared data stored in the cloud by this first privacy preserving mechanism. For auditing the integrity of shared data it utilizes the ring signature to compute the verification information. The third party auditor is able to verify the integrity of shared data in the cloud. Hence, this is the mechanism who kept the identity of signer in shared data private from third party auditor. By utilizing the auditing shared data it demonstrates efficacy and efficiency.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Novel Decoupling Design for Voltage Control of Wind-Driven IG System
Authors : V. SRIKANTH REDDY, G. RAVI KUMAR, , ,
Affiliations : M.Tech Research Scholar, Priyadarshini Institute of Technology & Management
Associate Professor, Priyadarshini Institute of Technology & Management
Abstract :
This paper addresses a systematic approach based on Eigen structure assignment to determine the mode shape and transient response of a STATCOM utilized as an exciter for induction generators (IG). A physical control scheme, including four control loops: ac voltage, dc voltage, ac active current and ac reactive current controllers, is pre-specified for the STATCOM. A synthetic algorithm is proposed to embed these physical control loops in the output feedback path. With appropriate oscillation mode design (Eigen structure) in each state variable, the STATCOM active current and reactive current will no longer be governed by the same mode but driven by new respective modes. The simulation and experimental results demonstrated that under various system disturbances, the proposed mode decoupling STATCOM is effective in regulating IG terminal voltage.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : A Seven-Level Grid Connected Inverter for Photovoltaic system
Authors : SATHISH KUMAR, G. RAVI KUMAR, , ,
Affiliations : M.Tech Research Scholar, Priyadarshini Institute of Technology & Management
Associate Professor, Priyadarshini Institute of Technology & Management
Abstract :
This paper proposes fuzzy logic controller based a single-phase seven-level inverter for grid-connected photovoltaic systems, with a novel pulse width-modulation (PWM) control scheme. Three reference signals produces from fuzzy logic controller which are identical to each other are going to compare with the amplitude of the triangular carrier signal. The inverter is capable of producing seven levels( Vab = Vdc Vab = 2Vdc/3 Vab = Vdc/3 Vab = 0 Vab =−V dc/3 Vab= − 2Vdc/3 Vab = −V dc )of output-voltage levels from the dc supply voltage. The total harmonic distortion is reduces by this control strategy. The proposed system was verified through simulation.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Intend of Battery-Super Capacitors Arrangement in UPS
Authors : B. NAGARJUNA REDDY, SHAIK. MABHU JANI, , ,
Affiliations : M.Tech Research Scholar, Priyadarshini Institute of Technology & Management
Assistant Professor, Priyadarshini Institute of Technology & Management
Abstract :
This paper presents a study of the reduction in battery stresses by using Super capacitors (SCs) in UPS. We aim at investigating the optimal Super capacitors-battery combination versus the SCs cost. This investigation is threefold; first, super capacitors and battery models developed using MATLAB/ Simulink are presented and validated. Second, the architecture and the simulation of the designed system that combines the SCs and the battery are shown. The Super capacitors are used as high-power storage devices to smooth the peak power applied to the battery during backup time and to deliver full power during short grid outages. By charging the SCs through the battery at a suitable rate, all impulse power demands would be satisfied by the Super capacitors. Third, extensive simulations are carried out to determine the gain in battery RMS current, the gain in energy losses, the energy efficiency and the elimination rate of surge load power. These four performance parameters are determined by simulation and then analyzed.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Upgrading Power Quality of a Distributed Generation Power System
Authors : T. RAVI BABU, G. RAVI KUMAR, , ,
Affiliations : M.Tech Research Scholar, Priyadarshini Institute of Technology & Management
Associate Professor, Priyadarshini Institute of Technology & Management
Abstract :
This paper presents analysis and improvement of power quality (voltage sag, voltage swell) performance of grid connected inverter used in distributed generation. The developed controller controls power supplied by the DGs at the PCC. The controller is designed to deliver current at unity power factor at PCC. An increase in reactive power demand and harmonics at PCC due to change of load and grid impedance variation, would affect the system voltage at PCC.This paper proposes the structure of the designed controller consists of output power with voltage control.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : A Single-Stage Power Conversion PV-Battery System
Authors : T. GOPALA KRISHNA, A. VYSHNAVI, , ,
Affiliations : M.Tech Research Scholar, Priyadarshini Institute of Technology & Management
Assistant Professor, Priyadarshini Institute of Technology & Management
Abstract :
The main concept of the new converter is to use a Single stage three phase grid ties solar PV converter to perform dc/dc and dc/ac operations. This converter solution is appealing for PV-battery applications, because it minimizes the number of conversion stages, improving efficiency and reducing cost, weight and volume.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Linear Modeling of STATCOM with Design of Current and Voltage Controllers with Variation of DC-Link Voltage
Authors : P. LAXMI NARAYANA, G. RAVI KUMAR, , ,
Affiliations : M.Tech Research Scholar, Priyadarshini Institute of Technology & Management
Associate Professor, Priyadarshini Institute of Technology & Management
Abstract :
The STATCOM is a shunt connected voltage source converter using self-commutating device and can be effectively used for reactive power control. Its principle of operation is similar to that of a synchronous condenser. This paper describes the linear modeling of STATCOM along with design of current and voltage controllers. The designed controllers with variation of DC-link voltage have been applied to the STATCOM and suitable DC-link voltage has been selected on basis of spike and over shoot of the responses. The values of the passive parameters decided on basis of selected DC-link voltage are used for the design and fabrication of a STATCOM. All responses are obtained through MATLAB SIMULINK tool box and presented here for clarity of the control strategy.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Benefits of HVDC and FACTS Devices Applied in Power Systems
Authors : P. SURESH KUMAR, G. RAVI KUMAR, , ,
Affiliations : M.Tech Research Scholar, Priyadarshini Institute of Technology & Management
Associate Professor, Priyadarshini Institute of Technology & Management
Abstract :
The progress of electrical power provisions began more than hundred years ago. At the launching stage, there were only small DC networks within the local limitations, which were able to cover of industrial plants. A growing stipulates on energy, technology changed to be transmitted from DC to AC power and voltage levels. The driving force for the development of power systems is the increase of electrical power demand. Therefore, power system developed from the regional to national systems. To achieve technical and economic advantages, extend further to large continental systems by applying interconnections to the neighboring systems. This paper will treat benefits of HVDC and FACTS devices applied in power systems such as increased power transmission capability, improved static and dynamic stability, an increase of a availability and a decrease of transmission losses by using power Electronics techniques.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : A Novel Control Strategy of PV making System with LPC for Loading Balance of Distribution Feeders
Authors : N. MAHESH, A. VYSHNAVI, , ,
Affiliations : M.Tech Research Scholar, Priyadarshini Institute of Technology & Management
Assistant Professor, Priyadarshini Institute of Technology & Management
Abstract :
At Present days solar power plants are more dependable, because no fuel and reduced CO2 emission. But the solar power generation system do not work in all weather conditions, it is power generated only solar radiation time .To overcome this problem by using fuel cell (FC). In fuel cell power generation there will be no problems, where as in fuel cell power distribution systems have some problems like overloading the distribution feeders. In this project to overcome this overloading by using Loop Power Controller (LPC) and also photovoltaic (PV) power generation is incorporated in balancing the feeder loading..The loop power controller to control real power and reactive power flow by adjusting voltage ratio and phase shift. Daily loading unbalance is determined by analyzing fuel cell (FC) power generation recording by using SCADA system and load profile based on Data Automation System (DAS).The loop power controller can improve controllability, operational flexibility and reduce power loss of the distribution system. The Loop Power Controller (LPC) is based on the MATLAB/ SIMULINK
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Investigation of Dynamic Voltage Restorer for Compensation of Voltage Sag and Swell
Authors : M. SURESH, G. RAVI KUMAR, , ,
Affiliations : M.Tech Research Scholar, Priyadarshini Institute of Technology & Management
Associate Professor, Priyadarshini Institute of Technology & Management
Abstract :
The power quality (PQ) requirement is one of the most important issues for power companies and their customers. The power quality disturbances are voltage sag, swell, notch, spike and transients etc. The voltage sag and swell is very severe problem for an industrial customer which needs urgent attention for its compensation. There are various methods for the compensation of voltage sag and swell. One of the most popular methods of sag and swell compensation is Dynamic Voltage Restorer (DVR), which is used in both low voltage and medium voltage applications. In this paper, the comprehensive reviews of various articles, the advantages and disadvantages of each possible configuration and control techniques pertaining to DVR are presented. The compensation strategies and controllers have been presented in literature, aiming at fast response, accurate compensation and low costs. This review will help the researchers to select the optimum control strategy and power circuit configuration for DVR applications. This will also very helpful in finalizing the method of analysis and recommendations relating to the power quality problems.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Performance Estimation of Five Level Inverter for Solar Grid Connected System
Authors : SHEKAR BABU, SHAIK. MABHU JANI, , ,
Affiliations : M.Tech Research Scholar, Priyadarshini Institute of Technology & Management
Assistant Professor, Priyadarshini Institute of Technology & Management
Abstract :
Reformations in electricity sector along with various renewable energy promotion policies have increased the importance of small grid connected photovoltaic (PV) systems utilizing single-stage single-phase inverters. To improve the performance multilevel inverter are preferred over two levels. This paper proposes a single-stage five level inverter for grid connected (PV) system. The output current of the inverter can be adjusted according to the voltage of the photovoltaic (PV) array. This control scheme is based on SPWM topology. Schemes based on SPWM which do not require the service of a phase locked loop for interfacing the inverter to the grid are increasingly being employed for such applications. Performance evaluation of the five-level inverter is done on MATLAB platform. The viability of the proposed scheme is confirmed by performing simulation and results validation.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Power Quality Step Up In Distribution System Using D-STATCOM
Authors : K. NARENDRA BABU, A. VYSHNAVI, , ,
Affiliations : M.Tech Research Scholar, Priyadarshini Institute of Technology & Management
Assistant Professor, Priyadarshini Institute of Technology & Management
Abstract :
solid state power converters are widely used in applications such as Adjustable speed drives (ASD), Static power supplies. Hence it affects the power quality (i.e.) related to non-standard voltage, current and frequency at the load side. In this paper an attempts has been to analyses the role of D-STATCOM (Distribution static compensator) and located at load side in the distribution system, which can to eliminating or overcome the problems of source side like voltage sag and interruption etc... In order to maintain the power system quality the D-STATCOM will absorb and provide reactive power to mitigate voltage sag, swell, interruption and improve powerfacor in various conditions. Utility distribution network, sensitive industrial load and critical commercial operation suffer from various type of outage and service interruption, which can cost significant financial losses. Here in this paper the work has been carried out by various techniques with D-STATCOM to minimize the problem associated in distribution system such as voltage sag, swell, interruption and low power factor in power system with different condition. D-STATCOM used to supply the reactive power and absorb the real power to maintain power quality as well.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Single-Phase To Three-Phase Drive System Composed of Two Parallel Single-Phase Rectifiers
Authors : G. ANIL KUMAR, G. RAVI KUMAR, , ,
Affiliations : M.Tech Research Scholar, Priyadarshini Institute of Technology & Management
Associate Professor, Priyadarshini Institute of Technology & Management
Abstract :
This paper proposes a single-phase to three-phase drive system composed of two parallel single-phase rectifiers, a three-phase inverter, and an induction motor. The proposed topology permits to reduce the rectifier switch currents, the harmonic distortion at the input converter side, and presents improvements on the fault tolerance characteristics. Even with the increase in the number of switches, the total energy loss of the proposed system may be lower than that of a conventional one. The model of the system is derived, and it is shown that the reduction of circulating current is an important objective in the system design. A suitable control strategy, including the pulse width modulation technique (PWM), is developed. Experimental results are presented as well.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Power Quality Step up Using Modular Multilevel Converter for Renewable Energy Source
Authors : G. SIVA NAGESWARA RAO, SHAIK. MABHU JANI, , ,
Affiliations : M.Tech Research Scholar, Priyadarshini Institute of Technology & Management
Assistant Professor, Priyadarshini Institute of Technology & Management
Abstract :
Multilevel inverters have received more attention in industrial application, such as motor drives, FACTS devices and renewable energy systems, etc.Primarily multilevel inverters are known to have output voltages with more than two levels. A modular multilevel converter (MMC) is one of the next-generation multilevel converters intended for high or medium-voltage power conversion without transformers. Compared with the existing multilevel converters, one of the most desirable advantages offered by MMC may be its ability to process both active power and reactive power with its terminals directly connected to high-voltage networks. D-STATCOM (Distribution Static Compensator) is a shunt device which is generally used to solve power quality problems in distribution systems. D-STATCOM is used in correcting power factor, maintaining constant distribution voltage and mitigating harmonics in a distribution network. In this paper MMC D-STATCOM inverter controls the DC link voltage as well as the active and reactive power transferred between the renewable energy source, specifically wind turbine, and the grid in order to regulate the power factor (PF) of the grid regardless of the input active power from wind turbine. In this concept in future by increasing the levels of Multilevel Inverter we improve the power quality.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Enhance Power Quality of 1-Φ Grid-connected PWM Inverter using Fuzzy with Hysteresis Current Controller
Authors : E. PRAVEEN KUMAR, A. VYSHNAVI, , ,
Affiliations : M.Tech Research Scholar, Priyadarshini Institute of Technology & Management
Assistant Professor, Priyadarshini Institute of Technology & Management
Abstract :
Continuously rising demand of electrical energy and the insufficiency of conventional energy sources lead to the development of distributed generation (DG) system. The main difficulty is the harmonization of the DG to the utility grid. Usually current regulated PWM voltage-source inverters (VSI) are used for synchronizing the utility grid with DG source in order to meet the following objectives like: to ensure grid stability, active and reactive power control through voltage and frequency control and power quality improvement (i.e. harmonic elimination) etc. In our paper we proposed hysteresis current control technique will be used as inverter control technique, which is one of the feedback control scheme. In addition to hysteresis current controller fuzzy will be used in order to improve performance.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Function of Distribution Power Electronic Transformer for Medium Voltage
Authors : B. KALYANI, G. RAVI KUMAR, , ,
Affiliations : M.Tech Research Scholar, Priyadarshini Institute of Technology & Management
Associate Professor, Priyadarshini Institute of Technology & Management
Abstract :
In this paper a distribution power electronic transformer (DPET) for feeding critical loads is presented. The PE based transformer is a multi-port converter that can connect to medium voltage levels on the primary side. Bidirectional power flow is provided to the each module. The presented structure consists of three stages: an input stage, an isolation stage, and an output stage. The input current is sinusoidal, and it converts the high AC input voltage to low DC voltages. The isolated DC/DC converters are then connected to the DC links and provide galvanic isolation between the HV and LV sides. Finally, a three-phase inverter generates the AC output with the desired amplitude and frequency. The proposed DPET is extremely modular and can be extended for different voltage and power levels. It performs typical functions and has advantages such as power factor correction, elimination of voltage sag and swell, and reduction of voltage flicker in load side.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : DVR Scheme for Recompense of Voltage Sags, State-of-The-Art Review
Authors : B. GOPAIAH, G. RAVI KUMAR, , ,
Affiliations : M.Tech Research Scholar, Priyadarshini Institute of Technology & Management
Associate Professor, Priyadarshini Institute of Technology & Management
Abstract :
The problem of voltage sags and its severe impact on sensitive loads is well known. To solve this problem, The DVR is a modern and important custom power device for compensation voltage sags in power distribution systems. The Dynamic Voltage Restorer (DVR) is fast, flexible and efficient solution to voltage sag problem. The DVR is a series compensator used to mitigate voltage sags and to restore load voltage to its rated value. In this paper, an overview of the DVR, its functions, configurations, components, operating modes, voltage injection methods and closed -loop control of the DVR output voltage are reviewed along with the device capabilities and limitations.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : A Grid-Connected Hybrid Generation System with Multilevel Inverter Using SVM Technique.
Authors : B. MAHESH, SHAIK. MABHU JANI, , ,
Affiliations : M.Tech Research Scholar, Priyadarshini Institute of Technology & Management
Assistant Professor, Priyadarshini Institute of Technology & Management
Abstract :
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : A Logic-based Friend Reference Semantic System for an online Social Networks
Authors : A.Kirankumar, P.Ganesh Kumar Reddy, A.Ram Charan Reddy, Baneti Shivaji , D.Jayanarayan Reddy
Affiliations : Department of CSE, G.Pullaiah College of Engineering and Technology. Kurnool JNTU Anatapur, Andhra Pradesh, India
Abstract :
Outstanding achievement of rising Web 2.0, and distinctive informal community (social network) Sites, for example, Amazon and motion picture lens, recommender frameworks are making remarkable chances to help individuals scanning the web when searching for pertinent data, and settling on decisions. By and large, these recommender frameworks are arranged in three classifications: content based, collaborative separating, and cross breed based suggestion frameworks. As a rule, these frameworks utilize standard suggestion routines, for example, counterfeit neural networks, nearest neighbor, or Bayesian systems. Be that as it may, these methodologies are constrained contrasted with systems focused around web applications, for example, informal communities or semantic web. In this paper, we propose a novel methodology for suggestion frameworks called semantic social proposal frameworks that improve the assessment of informal communities (social network) abusing the force of semantic interpersonal organization investigation. Investigates true information from Amazon look at the nature of our suggestion system and additionally the execution of our proposal calculations.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Design and Performance of Automatic Vending Machine using VHDL
Authors : UPIRTHI VIJITHA, A SOMASEKAR, , ,
Affiliations : M.Tech, Priyadarshini Institute of Technology and Science for Women
Associate Professor, Priyadarshini Institute of Technology and Science for Women
Abstract :
At the present days, Vending Machines are well known among Japan, Malaysia and Singapore. The quantity of machines in these countries is on the top worldwide. This is due to the modern lifestyles which require fast food processing with high quality. This paper describes the designing of multi select machine using Finite State Machine Model with Auto-Billing Features. Finite State Machine (FSM) modeling is the most crucial part in developing proposed model as this reduces the hardware. In this paper the process of four state (user Selection, Waiting for money insertion, product delivery and servicing) has been modeled using MEALY Machine Model. The proposed model is tested using Spartan three development board and its performance is compared with CMOS based machine.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Design of Low Power TPG with LP-LFSR
Authors : VINUKONDA SRILATHA, RAKESH K, , ,
Affiliations : M.Tech Research Scholar, Priyadarshini Institute of Technology and Science for Women
Assistant Professor, Priyadarshini Institute of Technology and Science for Women
Abstract :
This paper presents a novel test pattern generator which is more suitable for built in self test (BIST) structures used for testing of VLSI circuits. The objective of the BIST is to reduce power dissipation without affecting the fault coverage. The proposed test pattern generator reduces the switching activity among the test patterns at the most. In this approach, the single input change patterns generated by a counter and a gray code generator are Exclusive-O Red with the seed generated by the low power linear feedback shift register [LP-LFSR]. The proposed scheme is evaluated by using, a synchronous pipelined 4x4 and 8x8 Braun array multipliers. The System-On-Chip (SOC) approach is adopted for implementation on Altera Field Programmable Gate Arrays (FPGAs) based SOC kits with Nios soft-core processor. From the implementation results, it is verified that the testing power for the proposed method is reduced by a significant percentage.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Robust Model-Based Data Management
Authors : B.ASWINI, B.RANJITH, , ,
Affiliations : M.Tech Research Scholar, Priyadarshini Institute of Technology and Science for Women</br>HOD-CSE, Priyadarshini Institute of Technology and Science for Women
Abstract :
Making new connections according to personal preferences is a crucial service in mobile social networking, where the initiating user can find matching users within physical proximity of him/her. In existing systems for such services, usually all the users directly publish their complete profiles for others to search. However, in many applications, the users’ personal profiles may contain sensitive information that they do not want to make public. In this paper, we propose Find U, the first privacy-preserving personal profile matching schemes for mobile social networks. In Find U, an initiating user can find from a group of users the one whose profile best matches with his/her; to limit the risk of privacy exposure, only necessary and minimal information about the private attributes of the participating users is exchanged. Matching user profiles using their physical proximity via mobile social networking is a critical thing. We propose Find U, the concept used to limit the privacy levels and also to find the best matching profiles. To realize the user privacy levels here we are using secure multiparty computation (SMC) techniques. We also propose protocols such as PSI, PCSI to prove their security proofs. We evaluate the efficiency of the protocols by adopting the total run time and energy consumption.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : EAACK: Secure IDS for Wireless Sensor Networks
Authors : JALAGAM NAGAMANI, K.SUMALATHA, , ,
Affiliations : M.Tech Research Scholar, Priyadarshini Institute of Technology and Science for Women
Assistant Professor, Priyadarshini Institute of Technology and Science for Women
Abstract :
The migration to wireless network from wired network has been a global trend in the past few decades.The open medium and wide distribution of nodes make MANET vulnerable to malicious attackers. A new technique EAACK (Enhanced Adaptive Acknowledgement) method designed for MANET was proposed for intrusion detection.EAACK demonstrates higher malicious-behavior-detection rates in certain circumstances while does not greatly affect the network performances.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Robust Model-Based Data Management
Authors : B.ASWINI, B.RANJITH, , ,
Affiliations : M.Tech Research Scholar, Priyadarshini Institute of Technology and Science for Women
HOD-CSE, Priyadarshini Institute of Technology and Science for Women
Abstract :
Making new connections according to personal preferences is a crucial service in mobile social networking, where the initiating user can find matching users within physical proximity of him/her. In existing systems for such services, usually all the users directly publish their complete profiles for others to search. However, in many applications, the users’ personal profiles may contain sensitive information that they do not want to make public. In this paper, we propose Find U, the first privacy-preserving personal profile matching schemes for mobile social networks. In Find U, an initiating user can find from a group of users the one whose profile best matches with his/her; to limit the risk of privacy exposure, only necessary and minimal information about the private attributes of the participating users is exchanged. Matching user profiles using their physical proximity via mobile social networking is a critical thing. We propose Find U, the concept used to limit the privacy levels and also to find the best matching profiles. To realize the user privacy levels here we are using secure multiparty computation (SMC) techniques. We also propose protocols such as PSI, PCSI to prove their security proofs. We evaluate the efficiency of the protocols by adopting the total run time and energy consumption.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Privacy Preserving Transitional Data Set Using Heuristic Approach
Authors : K.SANDHYA, K.SUMALATHA, , ,
Affiliations : M.Tech Research Scholar, Priyadarshini Institute of Technology and Science for Women
Assistant Professor, Priyadarshini Institute of Technology and Science for Women
Abstract :
In this paper, we propose a upper-bound privacy leakage constraint based approach to identify which intermediate datasets need to be encrypted and which do not, so that privacy preserving cost can be saved while the privacy requirements of data holders can still be satisfied. To identify and encrypt all functionally encrypt able data, sensitive data that can be encrypted without limiting the functionality of the application on the cloud. However, preserving the privacy of intermediate datasets becomes a challenging problem because adversaries may recover privacy-sensitive information by analyzing multiple intermediate datasets. Encrypting all datasets in cloud is widely adopted in existing approaches to address this challenge. But we argue that encrypting all intermediate datasets are neither efficient nor cost-effective because it is very time consuming and costly for data-intensive applications to encrypt/decrypt datasets frequently while performing any operation on them.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Mobile Transmission Using Rigorous Data for Wireless Sensor Networks
Authors : K.MANIMALA, B.RANJITH, , ,
Affiliations : M.Tech Research Scholar, Priyadarshini Institute of Technology and Science for Women
HOD-CSE, Priyadarshini Institute of Technology and Science for Women
Abstract :
Wireless Sensor Networks (WSNs) are progressively more used in data-intensive applications such as micro-climate monitor, exactitude agriculture, and audio/video supervision. A key dispute faced by data-intensive WSNs is to convey all the data generated within an application's duration to the base station regardless of the fact that antenna nodes have restricted power supplies. We recommend using low-cost not reusable mobile transmissions to concentrate the energy expenditure of data-intensive WSNs. Our advance differs from preceding work in two main aspects. First, it does not require complex motion planning of mobile nodes, so it can be implemented on a number of low-cost mobile sensor platforms. Second, we incorporate the energy exploitation due to both mobility and wireless transmissions into a holistic optimization framework. Our framework consists of three main algorithms. The first algorithm computes an optimal routing tree pretentious no nodes can move. The second algorithm improves the topology of the routing tree by tightfistedly adding new nodes exploiting mobility of the newly added nodes. The third algorithm improves the routing tree by relocating its nodes without changing its topology. This iterative algorithm converges on the optimal position for each node given the restriction that the routing tree topology does not change. We present professional distributed implementations for each algorithm that require only inadequate, confined to a small area bringing together. Because we do not automatically calculate an optimal topology, our ending routing tree is not automatically optimal. However, our simulation results show that our algorithms significantly surpass the best presented solutions.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Secure Data Sharing for Dynamic Groups in the Public Cloud
Authors : S.L.SOWJANYA, D.RAVIKIRAN, , ,
Affiliations : M.Tech Research Scholar, Priyadarshini Institute of Technology and Science for Women
Professor, Priyadarshini Institute of Technology and Science for Women
Abstract :
-Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. Sharing group resource among cloud users is a major problem, so cloud computing provides an economical and efficient solution. Mona, secure data sharing in a multi-owner manner for dynamic groups preserves data, identity privacy from an unfrosted cloud and allows frequent change of the membership. In this project, we propose a secure multi owner data sharing scheme, for dynamic groups in the cloud. By leveraging group signature and dynamic broadcast encryption techniques, any cloud user can anonymously share data with others. Proposing a new model for Sharing Secure Data in the Cloud for the Dynamic Group.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Entrustment of Access Control in Public Clouds
Authors : A.NAGA BALA, D.RAVIKIRAN, , ,
Affiliations : M.Tech Research Scholar, Priyadarshini Institute of Technology and Science for Women
Professor, Priyadarshini Institute of Technology and Science for Women
Abstract :
Cloud computing, as an emerging computing standard. Cloud computing enables users to remotely store their data in a cloud and also benefit from services on-demand. With rapid development of cloud computing, more enterprises will outsource their sensitive data for sharing in a cloud. Delegation is a process of sharing access rights by users of an access control model. It facilitates the distribution of authorities in the model. It is also useful in collaborative environments. Delegation may also result in privacy violations if it allows accessing data without the data provider’s consent. Even Though the consent is taken, the privacy can still be violated if the data is used differently than the data provider agreed. Our work investigates data privacy in delegation. Based on this setting, a delegation model is designed to consider the privacy policies in taking delegation decisions and also, to set the data usage criteria for the access right receivers
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : New Design and achievement of IPTV Service Delivery through Virtualizationv
Authors : RATNAKUMARI M, D.RAVIKIRAN, , ,
Affiliations : M.Tech Research Scholar, Priyadarshini Institute of Technology and Science for Women
Professor, Priyadarshini Institute of Technology and Science for Women
Abstract :
Usage of IPTV Service conveyance through Virtualization is of pragmatic enthusiasm toward numerous applications, for example, locating an IPTV Service conveyance disappointment. The interruption location is characterized as an instrument for an IPTV Service conveyance through virtualization to discover the presence of immoral, mistaken, or atypical moving assailant (intruder)s. In this examination IPTV conveys the television content over a web Convention foundation. Virtualized cloud-based Services will advantage of statically multiplexing crosswise over applications to yield paramount expense reserve funds to the administrator the cloud based IPTV give bring down a supplier's expenses of constant IPTV benefits through a virtualized IPTV structural planning and through sagacious time moving of Service conveyance. It exploits the distinctions in the due dates connected with Live television versus Video-on-Demand (VoD) to successfully multiplex these Services.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : SOT Model towards Peer to Peer System
Authors : S JOHN BEE, B.RANJITH, , ,
Affiliations : M.Tech Research Scholar, Priyadarshini Institute of Technology and Science for Women
HOD-CSE, Priyadarshini Institute of Technology and Science for Women
Abstract :
In a peer-to-peer (P2P) network, each device assumes the part of Client and server in the meantime. In P2p framework, a standout amongst the most essential issues is trust administration. P2P frameworks depend on different companions to finish the undertakings. Companions need to trust one another for fruitful operation of the framework. While imparting in the middle of companions trust development is paramount to take administration from the obscure asset. In this paper we think over for four trust models focused around different methodologies, for example, by approaches, by notoriety and so forth. Presently a large portion of models for trust administration are focused around notoriety. There are numerous models which meets expectations under aforementioned methodologies out of these we have examined Eigen trust, SORT, Worldwide Trust model and NICE. We have likewise analyzed four trust models in P2P frameworks. The examination is focused around the profits and their properties.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Extracting Spread-Spectrum Hidden Data from Picture Representation
Authors : R NEELIMA DEVI, B.RANJITH, , ,
Affiliations : M.Tech Research Scholar, Priyadarshini Institute of Technology and Science for Women
HOD-CSE, Priyadarshini Institute of Technology and Science for Women
Abstract :
In this paper, we introduce a novel high bit rate LSB Picture information concealing system. The fundamental thought of the proposed LSB computation is information installing that causes negligible implanting contortion of the host picture. Utilizing the proposed two-stage result, information concealing bits are inserted into higher LSB layers, resulting in expanded vigor against clamor expansion or picture layering. Listening tests demonstrated that the perceptual nature of information hided picture is higher on account of the proposed technique than in the standard LSB strategy.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Exigent Life from Wireless ad-hoc Signal Networks
Authors : J.JAYASANTHI, K.SUMALATHA, , ,
Affiliations : M.Tech Research Scholar, Priyadarshini Institute of Technology and Science for Women
Assistant Professor, Priyadarshini Institute of Technology and Science for Women
Abstract :
An ad hoc sensor wireless network has been drawing interest among the researches in the direction sensing and pervasive computing. The security work in this area is priority and primarily focusing on denial of communication at the routing or medium access control levels. In this paper the attacks which are mainly focusing on routing protocol layer that kind of attacker is known as resource depletion attacks. These “Vampire” attacks are not impacting any specific kind of protocols. Finding of vampire attacks in the network is not a easy one. It’s very difficult to detect, devastating .A simple vampire presenting in the network can increasing network wide energy usage. We discuss some methods and alternative routing protocols solution will be avoiding some sort of problems which causing by vampire attacks.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Revolution of Storms from Vendor lock-in to the Data storage
Authors : Y.ANITHA, D.RAVIKIRAN, , ,
Affiliations : M.Tech Research Scholar, Priyadarshini Institute of Technology and Science for Women
Professor, Priyadarshini Institute of Technology and Science for Women
Abstract :
The open stack-based private cloud can help mitigate vendor lock-in and promises transparent use of cloud computing services. Most of the basic technologies necessary to realize the open stack-based private cloud already exist, yet lack integration. Thus, integrating these state-of-the-art tools promises a huge leap toward the open stackbased private cloud. To avoid vendor lock-in, the community must drive the ideas and create a truly open stack-based private cloud with added value for all customers and broad support for different providers and implementation technologies.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Mobile Social Networks for Flattering Unsigned Profile Matching
Authors : ANUSHA.V, K.SUMALATHA, , ,
Affiliations : M.Tech Research Scholar, Priyadarshini Institute of Technology and Science for Women
Assistant Professor, Priyadarshini Institute of Technology and Science for Women
Abstract :
Social networking makes digital communication technologies sharpening tools for extending the social circle of people. Privacy preservation is a significant research issue in social networking. Here user Profile matching with privacy preservation in mobile social networks (MSNs) is studied and a family of Profile matching protocols is introduced. An explicit Comparison-based Profile matching protocol (eCPM) which runs between two parties, an initiator and a responder is proposed which enables the initiator to obtain the comparison-based matching result about a specified attribute in their Profiles, while preventing their attribute values from disclosure. An implicit Comparison-based Profile matching protocol (iCPM) is then proposed which allows the initiator to directly obtain some messages instead of the comparison result from the responder. The messages unrelated to user Profile can be divided into multiple categories by the responder. The initiator implicitly chooses the interested category which is unknown to the responder. Two messages in each category are prepared by the responder, and only one message can be obtained by the initiator according to the comparison result on a single attribute. iCPM is further generalized into an implicit Predicate-based Profile matching protocol (iPPM) which allows complex comparison criteria spanning multiple attributes.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : High Dimensional Data Clustering Based On Feature Selection Algorithm
Authors : K.SWATHI, B.RANJITH, , ,
Affiliations : M.Tech Research Scholar, Priyadarshini Institute of Technology and Science for Women
HOD-CSE, Priyadarshini Institute of Technology and Science for Women
Abstract :
Feature selection is the process of identifying a subset of the most useful features that produces compatible results as the original entire set of features. A feature selection algorithm may be evaluated from both the efficiency and effectiveness points of view. While the efficiency concerns the time required to find a subset of features, the effectiveness is related to the quality of the subset of features. Based on these criteria, a FAST clustering-based feature Selection algorithm (FAST) is proposed and experimentally evaluated. The FAST algorithm works in two steps. In the first step, features are divided into clusters by using graph-theoretic clustering methods. In the second step, the most representative feature that is strongly related to target classes is selected from each cluster to form a subset of features. Features in different clusters are relatively independent; the clustering-based strategy of FAST has a high probability of producing a subset of useful and independent features. The MinimumSpanning Tree (MST) using Prim’s algorithm can concentrate on one tree at a time. To ensure the efficiency of FAST, adopt the efficient MST using the Kruskal’s Algorithm clustering method.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Security Enhancement for Enabling Dynamic Data and Mutual Trust in Public Cloud
Authors : K.NAGA SANDHYA, D.RAVIKIRAN, , ,
Affiliations : M.Tech Research Scholar, Priyadarshini Institute of Technology and Science for Women
Professor, Priyadarshini Institute of Technology and Science for Women
Abstract :
In Cloud Computing, Storage as a Service is one of the most required services, but the security of the data stored in the cloud using these services is the key issue. The outsourced data in the cloud has to be guaranteed with confidentiality, integrity and access control. In this work, we device a mechanism of cloud data storage based on indirect mutual trust between the Cloud Service Provider (CSP) and the cloud users through Trusted Third Party Auditor (TTPA). This work facilitates the user to store their data as blocks and enables them to perform dynamic operations on blocks. The stored data can be accessed by a group of users authorized by the data owner. The owner has the privilege to grant or revoke access of the stored data in the cloud. The present system is providing a good security mechanism for stored data and proper sharing of keys among authorized users, and data owner for the cryptographic mechanism.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Cloud Partitioning of Load Balancing Using Round Robin Model
Authors : M.V.L.SOWJANYA, D.RAVIKIRAN, , ,
Affiliations : M.Tech Research Scholar, Priyadarshini Institute of Technology and Science for Women
Professor, Priyadarshini Institute of Technology and Science for Women
Abstract :
The purpose of load balancing is to look up the performance of a cloud environment through an appropriate circulation strategy. Good load balancing will construct cloud computing for more stability and efficiency. This paper introduces a better round robin model for the public cloud based on the cloud partitioning concept with a switch mechanism to choose different strategies for different situations. Load balancing is the process of giving out of workload among different nodes or processor. It will introduces a enhanced approach for public cloud load distribution using screening and game theory concept to increase the presentation of the system.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Role of Open Source Software in E-Governance
Authors : S. Prem Kumar, Archana Thakur, C. Umashankar, V.V.Venkata Ramana,
Affiliations : Dr S. Prem Kumar, Prof & Head, Dept. of CSE, G. Pullaiah College of Engg & Technology, Kurnool, India
Deputy Secretary, UGC, New Delhi
Prof. C. Umashankar, Registrar, Rasthriya Sanskrit Vidhya Peetha, Tirupathi, India, [email protected]
Senior Technical Director, NIC, Hyderabad, India.
Abstract :
In day to day activities, e-Governance applications are becoming part of every citizen’s life. The models of eGovernance are G2C, G2G, G2B with which the respective stake holders are enjoying the benefits. In the wide spread of eGovernance, it is quite obvious to notice that there are innumerable applications of e-Governance which help the human race for quality life. The major ingredients of e-Governance are Connectivity, Information, Skill set, Budget. The cost of software is the major hurdle in introducing novel beneficial e-Governance applications. This can be mitigated using free and Open Source Software(OSS). Improper implementation of e-Governance activities leads to problems which can be controlled by eGovernance frame work elements like planning, audit on services, social audit, infra structure audit, professional audit, software audit, software down time, budgeting the total projects under the umbrella activities of free and Open Source Software(FOSS). International organizations such as UNESCO, IOSN etc are promoting free and open source software because of its benefits of savings, security, scalability, reliability, precession, interoperability and globalization. The return on investment is the major focus of the governments which is possible with OSS and also this in turn reduces the financial burden on public and makes them enjoy the real fruits of e-Governance applications.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Enhance the QoS capability of Hybrid Networks using QoS-Oriented Distributed Routing Protocol
Authors : N.Asha Jyothi, G.Ramya, G.Mounika, R.Sandeep Kumar,
Affiliations : Department of IT, G.Pullaiah College of Engineering and Technology. Kurnool JNTU Anatapur, Andhra Pradesh, India
Abstract :
With the expanding interest for constant applications in the Wireless Senor Network (WSN), ongoing discriminating occasions suspect a proficient quality-of-service (QoS) based Routing for information conveyance from the Network foundation. Outlining such QoS based Routing convention to meet the unwavering quality and postponement certification of discriminating occasions while protecting the vitality effectiveness is a testing assignment. Impressive exploration has been centred on creating hearty vitality productive QoS based Routing conventions. In this paper, we tended to a remote crossover arrange that incorporates a mobile wireless ad hoc network (MANET) and a wireless infrastructure network has been turned out to be a finer option for the cutting edge remote Networks. By straight forwardly embracing asset reservation-based QoS Routing for MANETs, half breeds Networks inherit invalid reservation and race condition issues in MANETs. Instructions to ensure the QoS in cross breed Networks remains an open issue. In this paper, we propose QoS-Oriented Distributed routing protocol (QOD) to upgrade the QoS help capacity of hybrid Networks.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED

 


Paper Title : A Fault Node Recovery Algorithm to Improve the Life Span of WSNs
Authors : K.Bichya , , , ,
Affiliations : Assistant Professor, Telangana, India
Abstract :
This paper proposes a fault node recovery algorithm to enhance the lifetime of WSNs when a rate of the sensor node shuts down. This algorithm is concentrated around the assessment spread algorithm solidified with the inherited figuring. The algorithm can realize less substitution of sensor nodes and more reused guiding ways. In this proposed algorithm assembles the amount of element nodes up to 8.7 times, diminishes the rate of data adversity by pretty about 99%, and abatements the rate of essentialness usage by pretty much 32%. Sensors in WSNs are having inclination to fail, in light of the imperativeness weariness, fittings disillusionments, regular conditions etc. Inadequacy strength is one of the essential issues in WSNs. The current inadequacy safety instruments either consume immense extra essentialness to distinguish and recover from the disillusionments or need to use additional fittings and programming resources. The proposed algorithm enhances the lifetime of a sensor nodes close down and it depends on after venturing stool dispersal Algorithm joined with the inherited computation. It can achieve less supplanting of sensor nodes with more reused guiding ways moreover manufactures the amount of element nodes, diminish the rate of data disaster with diminished imperativeness use.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Offering Secure Information in the Cloud for the Dynamic Group
Authors : Venkata Sujan, Ch.Shashikala, Dr.S.Prem Kumar, ,
Affiliations : M.Tech Research Scholar
Assistant Professor
Head of the Department Department of CSE, G.Pullaiah College of Engineering and Technology. Kurnool JNTU Anatapur, Andhra Pradesh, India
Abstract :
Cloud computing is a developing processing ideal model in which assets of the registering framework are given as administrations over the Web. Offering gathering asset among cloud clients is a real issue, so Cloud computing gives an efficient and effective compact. Mona, secure information imparting in a multi-manager way for element gatherings preserve information, identity protection from an untrusted cloud and permits successive change of the participation. In this paper, we propose a confined multi manager information offering scheme, for element amasses in the cloud. By leveraging group signature and dynamic show encryption systems, any cloud client can secretly impart information to others. Proposing another model for offering Secure Information in the Cloud for the dynamic group.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Network Life Time Prolonged Energy Efficient Routing In Adhoc Networks
Authors : Barma Udayashanth Kumar, Dr.S.Prem Kumar, , ,
Affiliations : M.Tech Research Scholar
Head of the Department Department of CSE, G.Pullaiah College of Engineering and Technology. Kurnool JNTU Anatapur, Andhra Pradesh, India
Abstract :
– Energy aware routing algorithms called Reliable Minimum Energy Cost Routing and Reliable Minimum Energy Routing (RMER) are proposed for wireless adhoc networks. RMECR defines the requirements of adhoc networks like energy-efficiency, reliability, reliability and prolonging the network lifetime. It consider energy consumption and the remaining battery energy of the nodes. RMER finds routes minimizing the total energy required for end to end packet traversal. RMECR and RMER both ensure reliability using hop by hop or end to end packet retransmission. Energy consumed by processing elements of transceivers, limited no of transmission allowed per packet, packet size, the impact of acknowledgement packet are considered in wireless adhoc network.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : PABKE: Provable Attribute-based Keyword explore over Outsourced Encrypted Data
Authors : G Pavan Kumar, Korathala Sreekanth Reddy, Chittem Raviteja, Shaik Mohammed Arif,
Affiliations : Department of CSE, G.Pullaiah College of Engineering and Technology. Kurnool JNTU Anatapur, Andhra Pradesh, India
Abstract :
Cloud Computing has changed the phenomena of IT industry completely. It allows access to highly scalable, inexpensive, on demand computing resources that can execute the code and store data that are provided. But adoption and approach to cloud computing applies only if the security is ensured. Cloud computing is lacking in security, confidentiality and visibility. Secure the cloud means to secure the storage. Security is achieved by the encryption. There are various encryption standards to ensure the cloud security. Attribute-based encryption (ABE) is public key encryption technique that allows users to encrypt and decrypt messages based on user attributes. In a typical implementation, the size of the cipher text is proportional to the number of attributes associated with it and the decryption time is proportional to the number of attributes used during decryption. To reduce the decryption time in cloud outsourced decryption technique is used. By providing a transformation key to the cloud ABE cipher text is converted into simple cipher text and it only incurs a small computational overhead for the user to recover the plaintext from the transformed ciphertext.. To ensure that transformation performed by cloud server is correct and the data is not modified by the untrusted servers proposed system is introduced. This provides secured and Verifiable Outsourced decryption.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Two Layer Encryption be Imminent to Protected Data Sharing in Cloud Computing
Authors : V.VIDYA, K.PADMA KIRAN, C.VANI , K.TARAKESWAR,
Affiliations : Department of IT, G.Pullaiah College of Engineering and Technology. Kurnool JNTU Anatapur, Andhra Pradesh, India
Abstract :
Cloud computing is a emerging paradigm of computing in IT because of its performance ,low cost ,availability accessibility ,economy of scale, on-demand and other luxuries. Data is the most valuable of clients (or) company’s asset; it must be protected with much vigilance than any other. Data Security in cloud is one of the big issue which acts as obstacle in the implementation of cloud computing. In this paper we proposed scheme is „Two Layer Encryption‟ means Double Encryption for securely outsourcing the data in cloud. This scheme solves key escrow problem and Data Reveal problem by RSA algorithm of asymmetric key approach. In existing mCL-PKE scheme there is Certificate-less Encryption and also single encryption. In our proposed scheme we have two layer encryption schemes by this approach the data/information will be highly secured while preserving and sharing in cloud environment.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED

 


Paper Title : Advance EMAP for Vehicular Ad Hoc Networks
Authors : Pocha Nageswara Reddy , I.S.Raghuram, Dr.S.Prem Kumar, ,
Affiliations : M.Tech Research Scholar
Assistant Professor
Head of the Department Department Of CSE, G.Pullaiah College of Engineering and Technology. Kurnool JNTU Anatapur, Andhra Pradesh, India
Abstract :
A Vehicular Ad hoc Network (VANET) is a sort of mobile Peer-To-Peer wireless network that permits giving communication among adjacent vehicles and in the middle of vehicles and close-by settled roadside gear. The absence of concentrated framework, high node portability and expanding number of vehicles in VANET bring about a few issues examined in this paper, for example, interfering with associations, troublesome routing, security of correspondences and adaptability. Existing framework for VANET correspondence is demonstrated to have a few disadvantages. We have proposed a component so as to give secure and effective communication in VANET environment. We conquer the disadvantages of the current framework by utilizing Malicious Vehicular Analyzer algorithm and Elliptic Curve Cryptography (ECC). Utilizing these algorithms, vindictive messages are recognized. It likewise recognizes the mishap and different issues in the way of the vehicles. Elliptic Curve Cryptography (ECC) calculation is utilized for stronger security amid correspondence.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : An authority: Merchant Lock in to Meta storage
Authors : Shaik Murthujavali, P.Kiranrao, Dr.S.Prem Kumar, ,
Affiliations : M.Tech Research Scholar
Assistant Professor
Head of the Department Department Of CSE, G.Pullaiah College of Engineering and Technology. Kurnool JNTU Anatapur, Andhra Pradesh, India
Abstract :
-Expense and versatility advantages of Cloud storage administrations are evident. Notwithstanding, selecting a solitary storage service provider limits accessibility and versatility to the chose supplier and may further cause a merchant lock basically. In this paper, we introduce Meta Storage Capacity, an unified Cloud storage framework that can incorporate differing Cloud storage suppliers. Meta storage Capacity is a very accessible and versatile circulated hash table that imitates information on top of assorted storage service. Meta Capacity reuses instruments from Amazon's Dynamo for cross-supplier replication and thus acquaints a novel methodology with oversee consistency-inactivity tradeoffs by amplifying the customary majority (N; R; W) configurations to an (np; R; W) conspire that incorporates distinctive providers as an extra measurement. With Metastorage, new means to control consistency-inertness tradeoffs are presented.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Well-Organized Security Solution for Privacy Preserving Cloud Services
Authors : M.Asma Farheen, M.Manasa, B.Ragalatha, Ms. K.Lakshmi,
Affiliations : Department of IT, G.Pullaiah College of Engineering and Technology. Kurnool JNTU Anatapur, Andhra Pradesh, India
Abstract :
The cloud computing could be a new computing model that comes from grid computing, distributed computing, parallel computing, virtualization technology, utility computing and alternative laptop technologies during this paper, we have a tendency to present a unique privacy-preserving security resolution for cloud services. We have a tendency to wear down user identification and secure communication. Our resolution provides solely registered users to access cloud services. Our resolution offers anonymous authentication. This implies that users’ personal attributes (age, valid registration, and successful payment) may be proved while not revealing users’ identity. Our resolution offers secure communication of transmitted information.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Cloud-Based Novel Mobile Social TV (CloudmoV)
Authors : M.Sri Devi, G.Sushmitha Vardana, C.Kavitha, P.Rama Rao,
Affiliations : Department of CSE, G.Pullaiah College of Engineering and Technology. Kurnool JNTU Anatapur, Andhra Pradesh, India
Abstract :
In this era of information and technology, two technologies became integral part of our lives, well at least for the younger or tech savvy generation, mobile phones and social media. Such is the power of these two, that business were forces to integrate these in their marketing and customer support strategies. Social media has become a place for today’s customer to hangout, so it has also become a place for today’s enterprises to advertise their products. From cosmetics to films everyone has a presence on the social network. In this paper, we propose the design of a Cloud-based, novel Mobile social TV system (CloudMoV). The system effectively utilizes both PaaS (Platform-as-a-Service) and IaaS (Infrastructureas-a- Service) cloud services to offer These various designs for flexible transcoding capabilities, battery efficiency of mobile devices and spontaneous social interactivity together provide an ideal platform for mobile social TV services. These various designs for flexible transcoding capabilities, battery efficiency of mobile devices and spontaneous social interactivity together provide an ideal platform for mobile social TV services.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Cloud Supported Personal Health Records with Security and Audit ability
Authors : Sree Sai Rajesh C, Syed Mohammed Nadeem, Vajjala Revanth Kumar, R.Varaprasad,
Affiliations : Department Of IT, G.Pullaiah College of Engineering and Technology. Kurnool JNTU Anatapur, Andhra Pradesh, India
Abstract :
convinced by the security issues, checking the selection of online medicinal services frameworks and the wild achievement of cloud administration models, we propose to incorporate security with mobile healthcare frameworks with the assistance of the private cloud. Our framework offers notable peculiarities including productive key administration, security protecting information storage, and recovery, particularly for recovery at crises, and review capacity for abusing wellbeing information. Particularly, we propose to incorporate key administration from pseudorandom number generator for unlink capacity, a safe indexing system for protection protecting pivotal word seek which conceals both pursuit and access examples focused around repetition, and coordinate the idea of trait based encryption with limit marking for giving part based access control with review capacity to avoid potential mischief, in both ordinary and crisis cases.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Data sets preparing for Data mining analysis by SQL Horizontal Aggregation
Authors : V.Nikitha, P.Jhansi, K.Neelima, D.Anusha,
Affiliations : Department Of IT, G.Pullaiah College of Engineering and Technology. Kurnool JNTU Anatapur, Andhra Pradesh, India
Abstract :
Data mining is essentially employed in getting ready information sets for data processing analysis. However it's most time overwhelming method. It needs great deal of manual effort. Data processing is essentially used domain for obtaining the patterns from historical info or keep info. Great deal of effort is needed to arrange datasets that will be input for data processing algorithmic program. As we tend to have already got some aggregation operate easy lay, MIN, SUM, COUNT, AVG that aren't economical for creating datasets in data processing analysis. This combination operate have disadvantage as they come single price single price per mass cluster in this table. In data processing analysis when we tend to needs information in horizontal layout that prong we need arduous effort. therefore we tend to are developing straightforward however powerful tool to urge SQL code to come combined columns in horizontal layout type, that returns cluster of varieties rather than one number per row. This new cluster of tool or operate is claimed to be horizontal aggregation. From third queries we'll get output information that is appropriate for varied data processing operations. It means that this paper provides horizontal aggregation victimization some constructs that embody SQL queries. Here we tend to are victimization 3 functions that is Grouping column, Horizontal column, combination column. Users need to provide this as input. So user gets the output that is appropriate for data processing analysis.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Privacy-Preserving Optimal Convention site Grit on Mobile Devices
Authors : Nadir Zeeshan, Y.Praveen Kumar, G.Arun Kumar, P.Madhu Sudhan,
Affiliations : Department Of IT, G.Pullaiah College of Engineering and Technology. Kurnool JNTU Anatapur, Andhra Pradesh, India
Abstract :
-Readied with dynamic sensible telephones and cell phones, today's greatly interconnected urban populace is more energetic about these gadgets to get ready and organize their day by day lives. Location-Sharing-Based Services (LSBS) supplement Area Based Administrations by exploitation areas from a gathering of clients, and not just people, to create some contextualized administration upheld the areas inside the group. Notwithstanding, there is a unit developing issues concerning the abuse of area data by outsiders that fills the need for a considerable measure of security controls in such administrations. We have a tendency to address the important disadvantage of protection LSBSs by giving sensible and elective answers for the security downside in one such administration, especially the fair rendezvous purpose (FRVP) determination administration. The privacy protective FRVP (PPFRVP) disadvantage is general enough and pleasantly catches the calculations and security necessities in LSBs. Among this paper; we have a tendency to propose privacy-preserving algorithms for significant Partner in nursing ideal gathering area for a gaggle of clients. We have a tendency to perform a radical security investigation by formally measuring protection loss of the planned methodologies.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Securing Personal Health Records in Cloud Utilizing Multi Authority Attribute Based Encryption
Authors : Meghana A, Gaddam Gowthami, Mahendrakar Kavitha Bai, M.Srilakshmi,
Affiliations : Department of IT, G.Pullaiah College of Engineering and Technology. Kurnool JNTU Anatapur, Andhra Pradesh, India
Abstract :
Personal health record is keep up in the bring together server to keep up patient’s personal and diagnosis information Personal health record (PHR) is a developing patient-driven model of wellbeing data trade, which is regularly outsourced to be put away at an outsider, for example, cloud providers. Nonetheless, there have been wide security concerns as personal health data could be presented to those outsider servers and to unapproved gatherings. The security plans are utilized to ensure individual information from free. To guarantee the patients' control over access to their PHRs, it is a swearing up and down to method to scramble the PHRs before outsourcing .In this paper we propose novel patient-driven framework and suite of component for information access control to PHR's put away in semi trusted servers. To accomplish fine-grained and versatile information access control for PHRs, we influence attribute based encryption (ABE) methods to scramble each patient’s PHR record. Information holder redesigns the Personal information into outsider cloud server farms. Various information managers can get to the same information values. Our scheme helps effective on-interest client/attribute renouncement
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Encouraging Effective Client System by Enhanced Website Structure
Authors : P.Bindu Sarika, Kodila Kavya, Bannela.Kuruva Revathi, R.Anil Kumar,
Affiliations : Department of IT, G.Pullaiah College of Engineering and Technology. Kurnool JNTU Anatapur, Andhra Pradesh, India
Abstract :
website outline is simple assignment yet, to explore client productively is enormous test, one of the reason is client conduct is continue changing and web developer or architect not think as indicated by client's behavior. Planning well structured websites to encourage powerful client itinerary designs has long been a test in web use mining with different applications like path expectation and change of site administration. Instructions to enhance a website without presenting generous progressions. Particularly, we propose a scientific programming model to enhance the client route on a site while minimizing modifications to its present structure. Results from broad tests led on an openly accessible genuine information set show that our model not just fundamentally enhances the client path with not very many progressions, additionally can be viably explained. Additionally tried the model on extensive engineered information sets to show that it scales up extremely well. Likewise, we characterize two assessment measurements and use them to survey the execution of the enhanced site utilizing the genuine information set. Assessment results affirm that the client route on the enhanced structure is to be sure incredibly upgraded. More interestingly, we find that vigorously bewildered clients are more prone to profit from the enhanced structure than the less perplexed clients.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : A Hybrid Cloud Move Toward For Certified Deduplication
Authors : E.Mounika, P.Manvitha, U.Shalini, Mrs. K.Lakshmi,
Affiliations : Department of CSE, G.Pullaiah College of Engineering and Technology. Kurnool JNTU Anatapur, Andhra Pradesh, India
Abstract :
-Information deduplication is one of critical information packing strategies for wiping out copy duplicates of rehashing information, and has been broadly utilized as a part of Cloud storage to diminish the measure of storage room and spare data transfer capacity. To secure the secrecy of delicate information while supporting deduplication, the merged encryption system has been proposed to encode the information before outsourcing. To better secure information security, this paper makes the first endeavor to formally address the issue of approved information deduplication. Not the same as customary deduplication frameworks, the differential benefits of clients are further considered in copy check other than the information itself. We additionally show a few new deduplication developments supporting approved copy weigh in a half and half cloud building design. Security dissection exhibits that our plan is secure regarding the definitions defined in the proposed security model.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : An Impeccable Key Aggregate Framework with Adaptable Offering of Information in Cloud
Authors : V.Teja Rani, N.Soujanya, G.Nikhila, K.Harika,
Affiliations : Department of CSE, G.Pullaiah College of Engineering and Technology. Kurnool JNTU Anatapur, Andhra Pradesh, India
Abstract :
Cloud computing gives the adaptable structural planning to impart the applications and the other system assets. Cloud storage empowers arranged online Storage when information is put away on various virtual servers for the most part facilitated by third parties despite being facilitated on committed servers. We propose an impeccable key aggregate framework with adaptable offering of information in cloud. This proposal gives secure information Storage and recovery. Alongside the security the right to gain entrance arrangement is additionally stowed away for concealing the client's personality. This plan is so influential since we utilize total encryption and string matching calculations in a solitary plan. The curiosity is that one can total any set of secret keys and make them as minimal as a single key, yet finishing up the force of every last one of keys being collected. The plan catches any change made to the first document and if discovered clear the error's. The calculation utilized here are exceptionally basic so expansive number of information can be put away in cloud without any issues. The security, verification, privacy are equivalent to the unified methodologies.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Anonymous Authentication of data storage in cloud computing administration with Decentralized Access
Authors : G.Gayathri Nikhila, A.Bhuvana Pramida, P.Jyothsna, K.Lavanya,
Affiliations : Department of CSE, G.Pullaiah College of Engineering and Technology. Kurnool JNTU Anatapur, Andhra Pradesh, India
Abstract :
Cloud computing is a climbing processing standard in which stakes of the registering schema are given as an organization over the Web. As ensuring as it might be, this standard furthermore conveys quite a few people new difficulties for information security and access control when customers outsource touchy information for offering on cloud servers, which are not inside the same trusted domain as information owners. Regardless, in finishing hence, these results unavoidably display a considerable preparing overhead on the information owner for key dissemination and information organization when fine grained information access control is popular, and in this manner don't scale well. The issue of in the meantime achieving fine-graininess’, versatility, and information classifiedness of access control truly still stays questionable. This paper addresses this open issue by, on one hand, describing and actualizing access approaches focused around information qualities, and, of course, allowing the information manager to delegate most of the figuring endeavors included in fine-grained information access control to un-trusted cloud servers without disclosing the underlying information substance. We fulfill this objective by misusing and joining methods of decentralized key policy Attribute Based Encryption (KP-ABE). Far reaching examination demonstrates that the proposed methodology is exceptionally productive and secure.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : A LocX Unique Approach for Location-Based Social Applications
Authors : P Chinna Masumanna, G.Vijay Subramanyam, B.Sharath Kumar Reddy, I.S.Raghuram,
Affiliations : Department of IT, G.Pullaiah College of Engineering and Technology. Kurnool JNTU Anatapur, Andhra Pradesh, India
Abstract :
The limitation capacity of Smartphone’s has given a gigantic help to the ubiquity of geosocial applications, which encourage social connection between clients geologically near one another. Nonetheless, today's geosocial applications raise security concerns because of use suppliers putting away a lot of data about clients (e.g., profile information) and locations (e.g., user’s gift at a location). We tend to propose Zerosquare and Foursquare, a privacy-friendly location hub that encourages the event of privacy-preserving geosocial applications. In this paper, we tend to introduce LocX, an exceptional different that gives altogether enhanced area security while not including instability into inquiry comes about or trusting on durable suspicions with respect to server security. Our key knowledge is to utilize secure client particular, separation safeguarding direction changes to any or all area learning imparted to the server.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Public Reviewing for Imparted Information to Effective Client Repudiation in Cloud Computing
Authors : P Baziga Tabassum, Varada Sravani, Katrimala Sahaja, V Jhansi Rani,
Affiliations : Department of IT, G.Pullaiah College of Engineering and Technology. Kurnool JNTU Anatapur, Andhra Pradesh, India
Abstract :
With promotion of cloud administrations, different clients effectively impart and overhaul their information through distributed storage. For information uprightness and consistency in the distributed storage, the review mechanisms were proposed. Be that as it may, existing methodologies have some security vulnerabilities and oblige a ton of computational overheads. This paper proposes a protected and proficient review mechanism for element imparted information in distributed storage. The proposed plan keeps vindictive cloud service providers from misleading an examiner. In addition, with information storing and offering administrations in the cloud, clients can without much of a stretch alter and offer information as a gathering to guarantee offer information uprightness can be checked openly, clients in the gathering need to process marks on all the squares in imparted information. Distinctive pieces in imparted information are for the most part marked by diverse clients because of information alterations performed by distinctive clients. For security reasons, once a client is disavowed from the gathering, the squares which were awhile ago marked by this denied client must be re-marked by a current client. The straight forward system, which permits a current client to download the comparing piece of imparted information and re-sign it amid client repudiation, is wasteful because of the expansive size of imparted information in the cloud. In this paper, we propose a novel open evaluating mechanism for the uprightness of imparted information to proficient client repudiation at the top of the priority list.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Enhance the QoS capability of Hybrid Networks using QoS-Oriented Distributed Routing Protocol
Authors : N.Asha Jyothi, G.Ramya, G.Mounika, R.Sandeep Kumar,
Affiliations : Department of IT, G.Pullaiah College of Engineering and Technology. Kurnool JNTU Anatapur, Andhra Pradesh, India
Abstract :
With the expanding interest for constant applications in the Wireless Senor Network (WSN), ongoing discriminating occasions suspect a proficient quality-of-service (QoS) based Routing for information conveyance from the Network foundation. Outlining such QoS based Routing convention to meet the unwavering quality and postponement certification of discriminating occasions while protecting the vitality effectiveness is a testing assignment. Impressive exploration has been centred on creating hearty vitality productive QoS based Routing conventions. In this paper, we tended to a remote crossover arrange that incorporates a mobile wireless ad hoc network (MANET) and a wireless infrastructure network has been turned out to be a finer option for the cutting edge remote Networks. By straight forwardly embracing asset reservation-based QoS Routing for MANETs, half breeds Networks inherit invalid reservation and race condition issues in MANETs. Instructions to ensure the QoS in cross breed Networks remains an open issue. In this paper, we propose QoS-Oriented Distributed routing protocol (QOD) to upgrade the QoS help capacity of hybrid Networks.
:10.22362/ijcert/2019/v6/i04/v6i04
DOI Link : https://doi.org/10.22362/ijcert/2019/v6/i04/v6i04

 


Paper Title : To a Measurable Statistical Framework for Source Haziness in Sensor Networks
Authors : Zunaira Begum, K.Tarakeswar, Dr.S.Prem Kumar, ,
Affiliations : M.Tech Research Scholar
Assistant Professor
Head of the Department Department Of CSE, G.Pullaiah College of Engineering and Technology. Kurnool JNTU Anatapur, Andhra Pradesh, India
Abstract :
-In specific applications, the areas of events reported by a sensor networks need to stay unnamed .The fundamental point of the paper is the Source Haziness in Sensor Network .i.e. Unapproved Eyewitnesses must be not able to locate the inception of occasions by judging the network movement. This Exploration shows another framework for, investigating and assessing obscurity in sensor network .Paper is isolated into twofold: to begin with, it presents the idea of "interim lack of definition" and gives a quantitative measure to model Anonymity in remote sensor network; second, it maps source secrecy to the factual issue of double speculation testing with annoyance parameters. We then dissect existing answers for planning unnamed sensor network utilizing the proposed model. By changing over it to paired codes. At last writing demonstrates how lack of clarity can be enhanced utilizing the portrayed framework.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Dynamic Query Structures for Database Exploration
Authors : Alisam Pavan Kumar, I.S.Raghuram, Dr.S.Prem Kumar, ,
Affiliations : M.Tech Research Scholar
Assistant Professor
Head of the Department Department Of CSE, G.Pullaiah College of Engineering and Technology. Kurnool JNTU Anatapur, Andhra Pradesh, India
Abstract :
-In New exploratory databases and web databases keep up tremendous and heterogeneous information. These cement world databases incorporate over such a variety of relations and properties. Noteworthy predefined query structures are not ready to answer diverse advertisement ad-hoc query’s from clients on those databases. This paper proposes Dynamic Query structures, an inquisitive database query structure interface, which has the capacity powerfully make query structures. The importance of DQS is to catch a client's decision and group inquiry structure parts, help him/her to make conclusion. The making of query structure is a monotonous methodology and is led by the clients. In every redundancy, the framework naturally makes order arrangements of structure segments and the client then includes the craved structure parts into the inquiry structure. The grouping of structure segments is focused around the caught client decision. A client might likewise top off the inquiry structure and convey query’s to view the query yield at each one stage. Consequently, a query structure could be alertly refined till the client answer with the inquiry yield. A probabilistic model is produced for assessing the incredibleness of a query structure in DQS. I have examined assessment and client study ensures the adequacy and productivity of the framework.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Encouraging Viable Client System through Website Structure Change
Authors : B.Kundan, Dr.S.Prem Kumar, , ,
Affiliations : M.Tech Research Scholar
Head of the Department Department of CSE, G.Pullaiah College of Engineering and Technology. Kurnool JNTU Anatapur, Andhra Pradesh, India
Abstract :
Outlining overall organized sites to encourage viable client route has long been a test. An essential reason is that the web designers understanding of how a site ought to be organized can be respectably not quite the same as that of the clients. While different routines have been proposed to relink site pages to enhance safety utilizing client route information, the totally revamped new structure can be exceptionally unusual, and the expense of bewildering clients after the progressions stays unanalyzed. This paper delivers how to enhance a site without presenting considerable progressions. Particularly, we propose a numerical programming model to enhance the client route on a site while minimizing changes to its present structure. Results from broad tests directed on a freely accessible true information set demonstrate that our model not just altogether enhances the client route with not very many progressions, additionally can be successfully illuminated. Assessment results affirm that the client route on the enhanced structure is undoubtedly enormously improved. All the more interestingly, we find that intensely confused clients are more prone to profit from the enhanced structure than the less perplexed clients.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Transfer Reliability and Clogging Control Procedures in Pioneering Networks
Authors : Surya pogu Jayanna, N.Poorna Chandra Rao, Dr.S.Prem Kumar, ,
Affiliations : M.Tech Research Scholar
Assistant Professor
Head of the Department Department of CSE, G.Pullaiah College of Engineering and Technology. Kurnool JNTU Anatapur, Andhra Pradesh, India
Abstract :
Pioneering networks are a class of mobile ad hoc networks (MANETs) where contacts between versatile hubs happen erratically and where a complete end-toend way in the middle of Source and goal once in a while exists at one time. Two critical capacities, generally gave by the Transport layer, are guaranteeing the unwavering quality of information transmission in the middle of source and terminus, and guaranteeing that the system does not get to be congested with movement. Notwithstanding, altered variants of TCP that have been proposed to help these capacities in MANETs are inadequate in artful networks. Moreover, artful networks require distinctive methodologies to those received in the more basic discontinuously associated networks, e.g. profound space networks. In this article we catch the state of the craft of suggestions for exchange unwavering quality and stockpiling blockage control networks in pioneering networks. We examine potential networks for exchange dependability administration, i.e. bounce by-jump care exchange and end-to-end return receipt. We likewise recognize the necessities for capacity clogging control and sort these issues focused around the quantity of message duplicates dispersed in the networks. For single-duplicate sending, stockpiling clogging administration and blockage shirking component are talked about. For different duplicate sending, the primary stockpiling clogging control components are replication administration and drop strategy. At long last, we distinguish open exploration issues in the field where future examination could conveniently be centered.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Moderating vampire attacks in Wireless Sensor Network
Authors : Kuruva Laxmanna, N.Poorna Chandra Rao, Dr.S.Prem Kumar, ,
Affiliations : M.Tech Research Scholar
Assistant Professor
Head of the Department Department Of CSE, G.Pullaiah College of Engineering and Technology. Kurnool JNTU Anatapur, Andhra Pradesh, India
Abstract :
Ad-hoc sensor system and steering information in them is a noteworthy examination zone. There are a ton of conventions created to ensure from DOS assault, yet it is not totally conceivable. One such DOS assault is Vampire attack emptying of hub life out of remote adhoc sensor systems. In this paper, introduces a system to endure the assault by utilizing the PLGP strategy. On the off chance that this, any Vampire assault, the PLGP system takes part in the circumstances and conveys the parcel to goal without dropping the bundle. In this way giving a most extreme lifetime of the battery and solid message conveyance even if there should be an occurrence of Vampire attack
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Novel Method For Examine Progress in Cloud Environment Using Secure Cloud Forensic Structure
Authors : Vankam Anil Madhava, P.Kiran Rao, Dr.S.Prem Kumar, ,
Affiliations : M.Tech Research Scholar
Assistant Professor
Head of the Department Department Of CSE, G.Pullaiah College of Engineering and Technology. Kurnool JNTU Anatapur, Andhra Pradesh, India
Abstract :
Cloud computing signifying a noticeably new innovation and an alternate ideal model in the field of Cloud computing that include more researchers. We can see in this context the need to know precisely where, when and how a bit of information is transformed or put away. Contrasted and excellent digital forensic, the field of cloud legal represents a considerable measure of troubles since information is not put away on a solitary stockpiling unit and moreover it includes the utilization of virtualization advances. In this paper we will introduce in detail another and novel method for observing movement in cloud situations and datacenters utilizing a safe cloud forensic structure. We discuss the building design of such schema and in what manner would it be able to be connected on top of new or existing Cloud computing arrangements. Additionally, for testing and results gathering we have executed this answer for our past created Cloud computing framework.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Security Saving Open Examining for Secure Cloud storage
Authors : D.Farooq Basha, P Suman Prakash, Dr.S.Prem Kumar, ,
Affiliations : M.Tech Research Scholar
Assistant Professor
Head of the Department
Department of CSE, G.Pullaiah College of Engineering and Technology. Kurnool JNTU Anatapur, Andhra Pradesh, India
Abstract :
Cloud computing is a sort of registering that depends on offering processing assets instead of having nearby servers or individual gadgets to handle applications. Cloud information stockpiling has numerous focal points over neighborhood information stockpiling. Client can transfer their information on cloud and can get to that information whenever anyplace without any hurdle. Cloud computing decreases cost by apportion figuring and stockpiling assets, unpredictable with an on interest provisioning instrument depending on a pay for every utilization plan of action. The Client doesn't need to stress over capacity and upkeep of cloud information. As the information is put away at the remote place how clients will get the affirmation about put away information. Thus Cloud information stockpiling ought to have some system which will determine capacity rightness and uprightness of information put away on cloud. Clients can fall back on third-party auditor (TPA) to check the trustworthiness of outsourced information and be straightforward. TPA ought to have the capacity to effectively review the cloud information stockpiling without requesting the neighborhood duplicate of information. Particularly, our commitment in this work could be outlined as the accompanying perspectives: Empower general society inspecting arrangement of information stockpiling security in Cloud computing and give a protection safeguarding examining convention, i.e., our proposal backings an outer evaluator to review client's outsourced information in the cloud without learning data on the information content. In Our Scheme is the first to backing versatile and proficient open reviewing in the Cloud computing. In demanding, our plan attains clump examining where a few designated evaluating undertakings from distinctive clients could be performed simultaneously by the TPA.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : The Use of Heuristics in Decision Tree Learning Optimization
Authors : Elma Kolçe (Çela), Neki Frasheri , , ,
Affiliations :
Abstract :
— Decision tree algorithms are among the most popular techniques for dealing with classification problems in different areas. Decision tree learning offers tools to discover relationships, patterns and knowledge from data in databases. As the volume of data in databases is growing up very quickly, the process of building decision trees on such databases becomes a quite complex task. The problem with decision trees is to find the right splitting criterion in order to be more efficient and to get the highest accuracy. Different approaches for this problem have been proposed by researchers, using heuristic search algorithms. Heuristic search algorithms can help to find optimal solutions where the search space is simply too large to be explored comprehensively. This paper is an attempt to summarize the proposed approaches for decision tree learning with emphasis on optimization of constructed trees by using heuristic search algorithms. We will focus our study on four of the most popular heuristic search algorithms, such as hill climbing, simulated annealing, tabu search and genetic algorithms.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Secure Information Recovery for Decentralized Interruption Tolerant Defense Data Network
Authors : Korra Bichya, , , ,
Affiliations :
Abstract :
Portable nodes in military environments, for example, a front line or an antagonistic area are prone to experience the undergo of irregular system network and frequent partitions. Interruption tolerant network (ITN) innovations are getting to be fruitful results that permit remote device conveyed by officers to speak with one another and access the secret data or summon dependably by abusing outside capacity nodes. Probably the most difficult issues in this situation are the requirement of approval arrangements and the strategies redesign for secure information recovery. Ciphertext-policy attribute-based encryption (CP-ABE) is a guaranteeing cryptographic answer for the right to gain entrance control issues. In any case, the issue of applying CP-ABE in decentralized DTNs presents a few securities and protection challenges as to the property disavowal, key escrow, and coordination of characteristics issued from distinctive powers. In this paper, we propose a safe information recovery plan utilizing CP-ABE for decentralized DTNs where numerous key powers deal with their qualities autonomously. We show how to apply the proposed mechanism to safely and proficiently deal with the classified information dispersed in the. Interruption tolerant network (ITN)
:NOT ASSIGNED
DOI Link : NOT ASSIGNED

 


Paper Title : Offloading Mobile Computation to Save Energy in Cloud Computing
Authors : Nagaraj Meghashree, M.Sri Lakshmi, Dr.S.Prem Kumar, ,
Affiliations : M.Tech Research Scholar</br>Assistant Professor</br>Head of the Department, Department of CSE, G.Pullaiah College of Engineering and Technology, Kurnool, JNTU Anatapur, Andhra Pradesh, India.
Abstract :
The movement in the Technology has made exceptionally fundamental gadgets of, for example, ethereal telephones of late 80's and Pentium 4 processor into today's stock. No one is tantamount to the power of advanced cells of this era whose current market has been arrived at its unfathomable stature. We search the Web, send emails, organize our lives, watch features, transfer information on informal communities, use web keeping money, find our path by utilizing GPS and online maps, and impart in progressive courses through advanced cells. A lot of people new applications are developing at an extraordinary way. We felt excited while utilizing advanced cells by introducing and taking care of new applications, however less content with the battery lifetime. Vitality effectiveness is the key thought for the portable framework. Cloud computing can possibly spare portable customer vitality. Be that as it may the investment funds from offloading the computation need to surpass the vitality expense of the extra correspondence. In the event that the applications are more computationally escalated they could be offloaded or else they might be run in the versatile framework itself. Offloading is possible from portable framework to lattice field servers where computation is performed. Offloading relies on upon different parameters, for example, vitality utilization and bandwidth. Offloading, in any case, causes protection concerns on the grounds that delicate information may be sent to servers. The protection might be secured by utilizing two methods, for example, Encryption of information and Steganography in processing offloading.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Organizing of Multipath Routing For Intrusion Lenience in Various WSNs
Authors : A.Rebekah Johnson, N.Parashuram, Dr.S.Prem Kumar, ,
Affiliations : M.Tech Research Scholar</br>Assistant Professor</br>Head of the Department, Department of CSE, G.Pullaiah College of Engineering and Technology, Kurnool, JNTU Anatapur, Andhra Pradesh, India.
Abstract :
In this paper we propose Organizing of Multipath Routing for Intrusion Lenience in Various WSNs sent in unattended environmental vitality reviving is troublesome. WSN fulfils application particular QoS necessities i.e., dependability, convenience, security and minimize vitality utilization to drag out framework valuable lifetime with restricted assets. The burdens of existing work incorporate repetition administration conspires that did not address overwhelming question movement. Uncertainty in multipath steering choice is because of the more elevated amount of interruption tolerance rate. The proposed work introduced Trust Based Neighbor Weighted Voting Plan to fortify interruption identification in WSN. It assesses the element radio scope of neighbor hubs. Weight limit is assessed for denoting the sensor hub as typical hub and noxious hub. It tosses the correspondence of interior malevolent hub by recognizing lower weight votes of relating sensor hub. It oversees the best WSN settings regarding the excess level utilized for an outsource multipart directing number of weighted votes interruption summon interim. WSN lifetime is boosted with a trust based weighted voting and handles simultaneous higher question movement.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : IP Fast Rerouting framework with Backup Topology
Authors : Laddagiri Kiranmai, K.Lakshmi, Dr.S.Prem Kumar, ,
Affiliations : M.Tech Research Scholar</br>Assistant Professor</br>Head of the Department Department of CSE, G.Pullaiah College of Engineering and Technology, Kurnool JNTU Anatapur, Andhra Pradesh, India
Abstract :
This paper portrays the distinctive IP quick rerouting plans utilizing reinforcement topology. This paper portrays the plan which goes under complete IPFRR casing function as per IETF (Internet engineering task force).the first segment gives the fundamental thought regarding the IPFRR utilized for the rerouting reason. The second area bargains about the diverse strategies utilized under IPFRR with ideas and illustrations. The third area depicts the essential three design situation for IPFRR. The fourth area gives the conclusion on the premise of the relative hypothetical studies made in the above segments and tries to discover the best for rerouting. The conclusion proposes that any of the single plan is not fit for expert voiding full scope, thus it demonstrates that to acquire a full scope of 100% these plans must be utilized as a part of a blend with alternate plans.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Messaging Among Mobility Groups in MANET
Authors : Jollu Jayachandrudu, K.Lakshmi, Dr.S.Prem Kumar, ,
Affiliations : M.Tech Research Scholar</br>Assistant Professor</br> Head of the Department Department of CSE, G.Pullaiah College of Engineering and Technology, Kurnool JNTU Anatapur, Andhra Pradesh, India
Abstract :
Mobility in mobile ad hoc network (MANET) is chargeable for augmenting the overheads. MANET is assortment of multi-hop wireless mobile nodes that communicate with one another while not centralized management or established infrastructure. The present literature relies on single node’s mobility. During this paper, a replacement idea of cluster mobility is planned. Each node uses mobile Internet Protocol (IP) practicality. MANET is split into teams. Each cluster includes a cluster representative (CR). The CR could be a central purpose in a very cluster and chargeable for communication with different cluster. Once a cluster moves and joins different group, CR registers the full cluster itself. CR is assigned a Virtual Address (VA). Our intended premise saves network information measure by reducing the quantity of message changed. It conjointly reduces the routing table updates.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Privacy Preserving Information Brokering for Data Handling Frameworks
Authors : K.Samunnisa, K.Tarakeswar, Dr.S.Prem Kumar, ,
Affiliations : M.Tech Research Scholar</br>Assistant Professor</br>Head of the Department Department of CSE, G.Pullaiah College of Engineering and Technology, Kurnool JNTU Anatapur, Andhra Pradesh, India
Abstract :
In recent year’s organizations heave rising require for data imparting through oninterest access. Data handling frameworks have been proposed to associate vast scale inexactly unified information sources through a facilitating overlay, in which the intermediaries settle on steering choices to regulate customer questions to the asked for information servers. Numerous existing data handling frameworks expect that agents are trusted and accordingly just embrace server-side access control for information privacy. Notwithstanding, security of information area and informed buyer can even now be derived from metadata, (for example, inquiry and access control guidelines) traded inside the DHS, yet little consideration has been put on its assurance. In this paper, we propose a novel methodology to save protection of numerous stakeholders included in the data expediting procedure. We are among the first to formally characterize two security attacks, namely attribute-correlation attack and inference attack, and propose two countermeasure plans automaton segmentation and query segment encryption to safely impart the directing choice making obligation among a chose set of expediting servers. With extensive security investigation and trial results, we indicate that our methodology flawlessly incorporates the security requirement with question steering to give framework wide security with inconsequential overhead.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Intensification of Information safety by Cryptography in Cloud Computing
Authors : K.Sivanagalakshmi, R.Anil Kumar, Dr.S.Prem Kumar, ,
Affiliations : M.Tech Research Scholar</br>Assistant Professor</br> Head of the Department Department of CSE, G.Pullaiah College of Engineering and Technology, Kurnool JNTU Anatapur, Andhra Pradesh, India
Abstract :
Cloud computing security challenges and it’s additionally an issue to numerous analysts; first necessity was to concentrate on security which is the greatest concern of associations that are considering a move to the cloud. The points of interest of Cloud computing incorporate decreased expenses, simple upkeep and re-provisioning of assets, and consequently expanded benefits. Yet the appropriation and the section to the Cloud computing applies just if the security is guaranteed. Instructions to surety a finer information security furthermore in what manner would we be able to keep the customer private data secret? There are two real inquiries that present a test to Cloud computing suppliers. At the point when the information exchanged to the Cloud we utilize standard encryption routines to secure the operations and the stockpiling of the information. Anyhow to process information placed on a remote server, the Cloud suppliers need to get to the basic information. In this paper we are proposing Homomorphic encryption algorithm to execute operations on encoded information without decoding them which will give us the same comes about after computations as though we have worked straightforwardly on the basic information
:NOT ASSIGNED
DOI Link : NOT ASSIGNED

 


Paper Title : Higher Infer the Structures and Textures of the Missing Region through Examplar-Based Image Inpainting Algorithm
Authors : M.Sravana Sandhya, Shasikala.Ch, Dr.S.Prem Kumar, ,
Affiliations : M.Tech Research Scholar</br>Assistant Professor</br> Head of the Department Department of CSE, G.Pullaiah College of Engineering and Technology JNTU Anatapur, Andhra Pradesh, India
Abstract :
Even though fabulous development happens in image process province, still “filling the missing spaces” is area of concern in it. Although mass of progress has been created within the past years, still lot effort to be done. A distinctive algorithmic rule is given for examplarbased inpainting. within the estimated algorithmic rule inpainting is applied on the coarse version of the input image, latter stratified primarily based super resolution algorithmic rule is employed to seek out the data on the missing areas. The distinctive issue of the projected technique is less complicated to inpaint low resolution than its counter half. To create inpainting image less sensitive to the parameter projected examplar-based patch propagation algorithmic rule on a spread of natural pictures. We tend to apply our algorithmic rule to the applications of text removal, object removal and block completion. We tend to compare our algorithmic rule with the previous diffusion-based, examplar-based, and sparsity-based inpainting algorithms. With the assistance of Comparisons, we'll show that the projected examplar-based patch propagation algorithmic rule will higher infer the structures and textures of the missing region, and manufacture sharp inpainting results per the encompassing textures.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Consistent Data Release in MANET Using Light Weight Verification Algorithm with High Node Mobility
Authors : B.Natraj Kumar, M.Sri Lakshmi, Dr.S.Prem Kumar, ,
Affiliations : M.Tech Research Scholar</br>Assistant Professor</br>Head of the Department Department of CSE, G.Pullaiah College of Engineering and Technology JNTU Anatapur, Andhra Pradesh, India
Abstract :
This paper addresses data aggregation and data packets problems for extremely dynamic mobile temporary networks and Wireless sensor Networks thereby resulting in a timely and reliable reduction in each communication and energy consumption. However there may be node failures in existing systems Associate in an aggregation framework doesn't address problems with false sub-aggregate values down to compromised nodes resulting in massive errors in base station computed aggregates once data is transferred through mobile device nodes. It cannot conjointly transfer data when nodes fail at the intermediate level. This paper proposes a completely unique light-weight verification rule and Position primarily based timeserving Routing (PTR) protocol that reduces node failure and knowledge loss problems. Theoretical analysis and simulation prove that PTR and also the novel light-weight verification rule succeed glorious performance below high node quality with acceptable overhead. Conjointly the new void handling theme performs expeditiously.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : An Enhanced Predictive Proportion using TMP Algorithm in WSN Navigation
Authors : Tekur Vijetha, M.Sri Lakshmi, Dr.S.Prem Kumar, ,
Affiliations : M.Tech Research Scholar</br>Assistant Professor</br>Head of the Department Department of CSE, G.Pullaiah College of Engineering and Technology JNTU Anatapur, Andhra Pradesh, India
Abstract :
Numerous organizing toward oneself sensor nodes may work together and build a disseminated monitoring, wireless Sensor Network (WSN) later on. Recently, various WSN applications have been utilizing GPS gadgets to track and place the position of the remote sensor nodes. Because of costly hardware assets and power requirements of the sensor nodes, the use of GPS equipment in WSN application is still unattainable. The target following frameworks which are as of now being used assessing the position of moving target focused around estimations on Received Signal Strength (RSS), Time of Arrival (TOA), Angle of Arrival (AOA) and Time Difference of Arrival (TDOA). These estimations are less judicious for the application, which requires exceedingly exact target following. This paper proposes a Target Movement Prediction Algorithm (TMPA) focused around topological directions. TMPA utilizes Topological Preserving Maps (TPM) to track and explore the area of the target and Adaptive Weighted Target Tracking (AWTT) procedure consolidates blame and enhances the precision in the expectation. Our reenactment results indicate that the time taken to distinguish the target developments is impressively low and change in forecast degree.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Price Discrimination in Communication Networks
Authors : B.Asha Singh, M.Sri Lakshmi, Dr.S.Prem Kumar, ,
Affiliations : M.Tech Research Scholar</br>M.Tech Research Scholar</br>Head of the Department Department Of CSE, G.Pullaiah College of Engineering and Technology JNTU Anatapur, Andhra Pradesh, India
Abstract :
We study the best usage-based rating downside in an incredibly resource-constrained network with one increasing service supplier and multiple teams of surplus-maximizing users. With the idea that the service supplier is aware of the utility operate of every user (thus complete information), we discover that the entire value differentiation theme can do an over sized revenue gain (e.g., 50%) compared to no value differentiation, once the entire network resource is comparably restricted and therefore the high-willingness-to-pay users are minorities. However, the entire value differentiation theme could result in a high implementation quality. To trade off the revenue against the implementation complexity; we tend to any study the partial value differentiation theme and style a polynomial-time formula which will cipher the best partial differentiation costs. We tend to additionally think about the unfinished data case wherever the service supplier doesn't understand to that cluster every user belongs. We tend to show that it's still doable to comprehend value differentiation beneath this situation and supply the sufficient and necessary condition under that an incentive-compatible differentiation theme can do similar revenue as beneath complete data.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Privacy Preserving Data Sharing With Anonymous ID Assignment Using AIDA Algorithm
Authors : Allam.Jyothi, A.Kusuma, Dr.S.Prem Kumar, ,
Affiliations : M.Tech Research Scholar</br>Assistant Professor</br> Head of the Department Department of CSE, G.Pullaiah College of Engineering and Technology JNTU Anatapur, Andhra Pradesh, India
Abstract :
In contemporary world web has created a leeway into daily lives with all information being hold on during a server of some type so spread or employed in the style required. this can be confined to multiple applications like patient medical records, balloting details, banking, social networking, email, analysis etc. however the identity has to be preserved for each the information and therefore the owner because the case is also that is more and {more} turning into a drag with additional and more identities allotted to the information particularly just in case of distributed server sharing. Existing solutions target the central server model that is computationally costly, includes a immense information measure exchange, information security is compromised and therefore not fitted to the distributed model hip currently. The proposed work focuses on the distributed side of computing wherever the IDs are anonymous employing a distributed computation with no central authority and such IDs will be used as a part of schemes for sharing or dividing communications information measure, information storage, and alternative resources anonymously and while not convict. it's doable to use secure add to permit one to opt-out of a computation beforehand on the premise of sure rules in applied mathematics revealing limitation. These model suites for the distributed computing model with Anonymous ID assignment wherever procedure overhead is low, information measure consumption is additionally less. The AIDA algorithm is applied serially and therefore is secure, however chiefly the distributed nature of the information sharing system is sustained. The protocol for privacy conserving mistreatment anonymous id assignment is no-hit.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Ontology Based PMSE with Manifold Preference
Authors : Mubasheera Tazeen, Shasikala.Ch, Dr.S.Prem Kumar, ,
Affiliations : M.Tech Research Scholar</br> Assistant Professor</br>Head of the Department Department Of CSE, G.Pullaiah College of Engineering and Technology JNTU Anatapur, Andhra Pradesh, India
Abstract :
Data mining is a framework utilizing for more machine learning strategy to naturally examine and Extricating learning from data put away in the database. The objective of data mining is to concentrate concealed prescient Data from the database. This paper makes utilization of data mining idea for gathering client's numerous inclinations from navigates data. The gathering client inclination is focused around the substance and the area ideas. In the existing system, RSVM calculation doesn’t perform re-positioning for various inclinations. To defeat this inconvenience, the proposed work is focused around PRRA calculation. This calculation is utilized to discover the most limited ways which help us to show signs of improvement result. PMSE think all the more about security which focused around client and in the addition area by leveraging the measure of substance. To portray the assorted qualities of the ideas connected with an inquiry and their significance's to the client's need, four entropies are acquainted with offset the weights between the substance and area features [11].
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Green Computing: A Methodology of Saving Energy by Resource Virtualization.
Authors : V.Rohini, R. Sandeep Kumar, Dr.S.Prem Kumar, ,
Affiliations : M.Tech Research Scholar</br>Assistant Professor</br>Head of the Department Department Of CSE, G.Pullaiah College of Engineering and Technology JNTU Anatapur, Andhra Pradesh, India
Abstract :
In the past a couple of years computer standard was moved to remote data farms and the software and hardware services accessible on the premise of pay for utilize .This is called Cloud computing, In which client needs to pay for the Services .Cloud give the Services – Programming as a Service ,stage as a Service and foundation as a Service .These Services gave through the remote server farms (since the information is scattered/disseminated over the web.), as Programming requisition and different Services relocated to the remote server farm ,Service of these server farm in the imperative. Server farm Service confronts the issue of force utilization. At present Cloud computing based framework squander an extraordinary measure of force and produces co2. Since numerous servers don't have a decent quality cooling framework. Green Computing can empower more vitality proficient utilization of computing power .This paper indicates the prerequisite of Green Computing and methods to spare the vitality by distinctive methodologies
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : User Adaptive Mobile Video Streaming and Resourceful Video Sharing in Cloud
Authors : Kamarthi Rekha, R. Vara Prasad, Dr. S. Prem kumar, ,
Affiliations : M.Tech Research scholar, Department of CSE G. Pullaiah College of Engineering & Technology</br>M.Tech, Asst.Professor Department of CSE G. Pullaiah College of Engineering & Technology</br>Head of the Department Department of Computer Science & Engineering G. Pullaiah College of Engineering & Technology
Abstract :
Over the past decade The mobile phones breed to be a necessary part of our daily life, Smartphone uses more than basic phones much and also user demands to run lots of applications have improved The conquest of next design mobile phone communication based on the capability of service suppliers to engineer. The Streams are programmed by the Scalable Video Coding expansion of the H.264/AVC model. Adding or removing the layer is determined on the basis of the user behavior environment of the mobile system. The current advances in the mobile video streams greater than mobile networks have been souring more than these new trends, increasingly more traffic is accounted by video streaming and downloading. While the video streaming is not so demanding in wired networks, mobile networks have been misery from video traffic transmissions ended scarce bandwidth of wireless links instead of network operators frantic hard work to augment the wireless link bandwidth (e.g., 3G and LTE), elevated video transfer load from mobile users are quickly vast the wireless connection capacity. Though receiving video streaming transfer via 3G/4G mobile networks, mobile users regularly undergo from lengthy buffering time and irregular disruptions due to the restricted bandwidth and connection stipulation variation caused by multi-path vanishing and user mobility. Thus, it is vital to advance the service excellence of mobile video streaming while using the networking and computing assets resourcefully.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED

 


Paper Title : A Survey: Query Processing Techniques for Secure Cloud Databases
Authors : N.Swetha,, Prof. S Ramachandram, , ,
Affiliations : Research Scholar, Dept. of CSE, Osmania University, Hyderabad
Principal, Dept. of CSE, Osmania University, Hyderabad.
Abstract :
The Major challenge in cloud computing is to manage distributed cloud. Traditional relational database management systems (RDBMS) are a choice but they are not compatible to measure crossways large clusters of distributed servers. Therefore changeovers to RDBMS have been developed. The development of new database management systems (DBMS) for the cloud computing environment or flexibility of the existing systems to the cloud computing environment is a critical component of cloud computing research. This paper focuses on the study of a relational database system based on holomorphic encryption schemes to preserve the integrity and confidentiality of the data. And also examines various SQL queries over encrypted data. And this paper helps in focusing where research is needed.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Enhancing CAPTCHA based Image Authentication for E-mail ID and Password
Authors : MACHARLA BHANU KUMAR, K.KRANTHI KUMAR, , ,
Affiliations : Pursuing M.Tech, CSE Branch,Dept of CSE
Assistant Professor, Department of Computer Science and Engineering
NRI Institute of Technology, Guntur, Andhra Pradesh, India
Abstract :
-In this paper we survey the current Captcha password schemes furthermore exhibit the significance of Email authentication over cutting edge Captcha Advancements where Captcha and Its graphical password it can addresses various security issues out and out. CAPTCHA is accomplished by revision of letters in order arbitrarily on the catches and it is anything but difficult to baffle by straightforward key loggers .In data security, client authentication is a noteworthy issue in each framework. What's more, for authentication reason each framework relies on upon password whether it is literary password or graphical password. CAPTCHA is a test work by computer programs which human can pass however computer programs can't pass .The thought process of incorporating so as to enhance Email authentication is finished visual authentication instruments. This is ensured to the regular assaults endured by other authentication schemes.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Performance of AHB Bus Tracer with Dynamic Multiresolution and Lossless Real Time Compression
Authors : VELLANKI SATHEESH BABU, B.N. SRINIVASA RAO, , ,
Affiliations : Pursuing M.Tech, VLSI DESIGN, Dept of ECE
Assistant Professor, Department of Electronics and Communication Engineering Avanthi Institute of Engineering and Technology, Visakhapatnam, Andhra Pradesh, India.
Abstract :
In this paper we demonstrate the On-Chip bus SoC(system-on-chip) infrastructure that connects major hardware components. Monitoring the on-chip bus signals is crucial to the SoC debugging and performance analysis/optimization. The past two decades of SoC evolution have seen an exponential increase in complexity. Today’s devices have multiple processing units, CPUs, GPUs, DSPs, DMAs, third-party IP blocks and custom logic. As if the hardware is not complicated enough, there will of course be substantial amounts of sophisticated software code running on the SoC hardware/software integration, and testing are made very much harder. The commercial consequences of problems in the development flow are potentially dire: since the debugging / analysis needs are adaptable: some designers need all signals at cycle-level, while some others only care about the transactions. For the latter case, tracing all signals at cycle-level wastes a lot of trace memory. Thus, there must be a way to capture traces at different abstraction levels based on the specific debugging/analysis need.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : An Effective Supermodularity Based Approach for Data Privacy at Storage Level
Authors : Annamneni Soujanya, Baburao Kopuri, , ,
Affiliations : M.Tech (CSE), Department of Computer Science & Engineering, NRI Institute of Technology
Associate Professor, Department of Computer Science & Engineering, NRI Institute of Technology.
Abstract :
In this paper we presented a supermodulaity based approach for data privacy using noval encryption mechanisum in this conncetion the seviority of data privacy at storage level is most considerable so in our presented system lack of data privacy , scalability due to low security algorithm while data transformation so in our proposed system Scalability and privacy risk of data anonymization can be addressed by using differential privacy. Differential privacy provides a theoretical formulation for privacy. A scalable algorithm is use to find the differential privacy when applying specific random sampling. The risk function can be employ through the supermodularity properties.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : SYSTEM EVALUATION OF 32 BIT UNNSIGNED MULTIPLER USING CLAA AND CSLA.
Authors : SIVASANKAR RAO.Y, SOMASEKHAR .A, , ,
Affiliations : (M.Tech) VLSI, Dept. of ECE
Associate Professor, Dept. of ECE Priyadarshini Institute of Technology & Management
Abstract :
- In this paper deals with the comparison of the VLSI design of the carry look-ahead adder (CLAA) based 32- bit signed and unsigned integer multiplier. Multiplication is a fundamental operation in most signal processing algorithms. Multipliers have large area, long latency and consume considerable power. Therefore low-power multiplier design has been an important part in low- power VLSI system design. In computational circuits the adders plays a key role in arithmetic operations. Adders like Ripple carry adder, Carry look ahead adder, Carry select adder, Carry skip adder and carry save adder etc. In this paper, a high performance and low power 32bit unsigned multiplier is proposed using adders. The CLAA based multiplier and CSLA based multiplier uses the same delay for multiplication operation.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Square and Cube Architecture using Less Complex and Low Power Architectures
Authors : BELLAM SREEKANYA, K.RAKESH, , ,
Affiliations : (M.Tech) VLSI, Dept. of ECE
Assistant Professor, Dept. of ECE Priyadarshini Institute of Technology & Science for Women
Abstract :
In this paper we are going to explore the importance of the design of a Low power and less area square and cube architectures using Vedic sutra , the optimized multiplier are having regular, less complex and parallel structure in design thus this kind of algorithm and its designs used to design square and cube circuit using Vedic sutras over and over again times square and cube are the most sustained on operations in several digital signal processing applications and computation can be condensed using Radix8 and the overall processor performance can be improved for numerous applications.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Investigation on Performance of high speed CMOS Full adder Circuits
Authors : KATTUPALLI KALYANI, G.VASANTH RAO, , ,
Affiliations : (M.Tech) VLSI, Dept. of ECE
Assistant Professor, Dept. of ECE Priyadarshini Institute of Technology & Science for Women
Abstract :
- In this paper we demonstrate the performance analysis of CMOS Full adder circuits in this connection the full Adder is designed using CMOS logic style by dividing it in three modules so that it can be optimized at various levels. First module is an XOR-XNOR circuit, which generates full swing XOR and XNOR outputs simultaneously and have a good driving capability. The objective this concept is identified the comparison of power, surface area and complexity of Full adder designs using CMOS Logic Styles. Full adder Design is better compared to conventional design. Transistor Design with respect to power, delay, Power Delay Product Comparison. It is observed that less power is consumed in the Transmission based full adder than the Convention full adder and Pass Transistor full adder.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : IMPLEMENTATION OF HARDWARE IP ROUTER BASED ON VLSI
Authors : KARLAPUDI SRAVANI, P T BALAKRISHNA, , ,
Affiliations : (M.Tech) VLSI, Dept. of ECE
Associate Professor, Dept. of ECE Priyadarshini Institute of Technology & Science for Women
Abstract :
A Network-on-chip is a new paradigm in complex system-on-chip designs that provide efficient on chip communication networks. It allows scalable communication and allows decoupling of communication and computation. The data is routed through the networks in terms of packets. We attempts to overcome latency and time reduction issue and can provide multipurpose networking router by means of verilog and it was synthesized in Xilinx 13.2 version, simulated Modelsim 10.0 version. In this paper our attempt is to provide a multipurpose networking router by means of Verilog code, by this we can maintain the same switching speed with more secured way of approach we have even the packet storage buffer on chip being generated by code in our design in the so we call this as the self-independent router called as the VLSI Based router. The three architectures were analyzed for their performance in terms of delay, throughput and latency and we concluded that CDMA router performs better than the other two.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Circuit for Revisable Quantum Multiplier Implementation of Adders with Reversible Logic
Authors : KONDADASULA VEDA NAGA SAI SRI, M.SAI RAMA KRISHNA, , ,
Affiliations : (M.Tech) VLSI, Dept. of ECE
Assistant Professor, Dept. of ECE Priyadarshini Institute of Technology & Science For Women
Abstract :
Programmable reversible logic is gain wide consideration as a logic design style for modern nanotechnology and quantum computing with minimal impact on circuit heat generation in improved computer architecture and arithmetic logic unit designs. In this paper, a 2*2 Swap gate which is a reduced implementation in terms of quantum cost and delay to the previous Swap gate is presented. Then, a novel 3*3 programmable UPG gate capable of calculating the universal logic calculations is presented and verified, and its advantages over the Toffoli and Peres gates are discussed. The UPG is then implemented in a reduced design for calculating n-bit AND, n-bit OR and n-bit ZERO calculations. Then, two 3*3 RMUX gates capable of multiplexing two input values with reduced quantum cost and delay compared to the previously existing Fredkin gate is presented and verified. Next, a novel 4*4 reversible programmable RC gate capable of nine unique logical calculations at low cost and delay is presented and verified. The UPG and RC are implemented in the design of novel sequential and tree-based comparators. These designs are compared to previously existing designs, and their advantages in terms of cost and delay are analyzed.Then, the RMUX is used to improve a reversible SRAM cell we previously presented. The memory cell and comparator are implemented in the design of a Min/Max Comparator device.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Enable Batch Auditing for Secure Cloud Storage Using TPA
Authors : PRATHIBHA MAGULURI, B.RANJITHKUMAR, , ,
Affiliations : M.Tech (CSE), Priyadarshini Institute of Technology & Science for women’s
Associate Professor (Dept.of CSE), Priyadarshini Institute of Technology & Science for women’s
Abstract :
In this paper we used cloud storage servers remotely in order to store and share the data and enjoy the ondemand high-quality applications and services from a shared pool of configurable computing resources, without communication challenges However, the fact that users no longer have physical control over outsourcing data in this connection data integrity over public cloud is a challenging task, thus this integrity will audited by trusted third party behalf of cloud without reviling any user privacy and also TPA executes multiple task simultaneously i.e batch auditing our proposed framework provides high security and high performance.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Recommender Systems for e-commerce application using CF
Authors : SIVA KALYANI, S NAGA LAKSHMI, , ,
Affiliations : M.Tech (CSE), Priyadarshini Institute of Technology & Science
Assistant Professor (Dept.of CSE), Priyadarshini Institute of Technology & Science
Abstract :
Collaborative filtering (CF) is a very important and common technology for recommender systems. Recommender systems are evidenced to be valuable means that for internet on-line users to deal with the data overload and became one amongst the foremost powerful and common tools in e-commerce. However, current CF ways suffer from such issues as knowledge sparseness, recommendation quality and big-error in predictions with lack of user privacy. There are 3 common approaches to determination the suggestion problem: ancient cooperative filtering, cluster models, and search-based ways and a completely unique rule to advocate things to users supported a hybrid technique. Initial we have a tendency to use cluster to create the user clusters supported the similarity of users. We’ve got taken users look history for similarity calculation. Second we have a tendency to be getting to realize the things that are powerfully related to one another by victimization association rule mining. Finally we'll be victimization these robust association rules in recommendation of things. In ordered to supply the protection we have a tendency to used onion routing algorithms.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Privacy Preserving of Data Retrieval for Decentralized Disruption-Tolerant Military Networks
Authors : K Naga Brahma Chari, Dr G Rama swamy, , ,
Affiliations : M.Tech (CSE), Priyadarshini Institute of Technology & Science
Professor (Dept.of CSE), Priyadarshini Institute of Technology & Science
Abstract :
Disruption-tolerant network advancements are becoming to be a productive provision that enable remote device passed on by officers to articulate with one another and access the classified information or secret information by abusing outside storage nodes. This framework provides the effective state of associations to approval methods and therefore the solutions overhaul for secure information recovery in most troublesome cases. The foremost encouraging scientific discipline solutions are at home with management the access problems known as Cipher text-Policy AttributeBased encoding (CP-ABE). Indisputably the foremost troublesome problems during this state are the requirement of endorsement arrangements and therefore the methodologies design for secure information recovery. Then again, the problem of applying CP-ABE in suburbanized DTNs presents a handful of securities and insurance challenges on the property denial, key escrow, and coordination of characteristics issued from explicit forces. During this paper, we have a tendency to propose a protected information recovery arrangement mistreatment CP-ABE for suburbanized DTNs wherever varied key forces manage their properties freely. We have a tendency to show the way to apply the projected half to firmly and proficiently touch upon the delineate information speckled within the information scattered within the Interference or disruption tolerant network.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Cooperative Provable Data Possession for Multi-Cloud Server Storage
Authors : VIJAY KUMAR, CH.HARIKA, , ,
Affiliations : (M.Tech) CSE, Dept. of Computer Science and Engineering
Assistant Professor, Dept. of Computer Science and Engineering Priyadarshini Institute of Technology & Science
Abstract :
— Provable data possession (PDP) is a strategy for guaranteeing the trustworthiness of information away outsourcing. In this paper, we address the construction of a proficient PDP scheme for disseminated distributed storage to bolster the versatility of administration and information migration, in which we consider the presence of different cloud administration providers to agreeably store and keep up the customers' information. We display an cooperative PDP (CPDP) scheme based on homomorphic verifiable response and hash file indexing order. We demonstrate the security of our scheme based on multi-proven zeroknowledge proof system, which can fulfill culmination, information soundness, and zero-information properties. In addition, we verbalize execution optimization instruments for our scheme, and specifically exhibit a proficient technique for selecting ideal parameter qualities to minimize the computation expenses of customers and capacity administration providers. Our examinations demonstrate that our solution presents lower computation and communication overheads in comparison with non-helpful methodologies
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : In Service-Oriented MSN Providing Trustworthy Service Evaluation
Authors : D.RAMANJANEYULU, U.USHA RANI , , ,
Affiliations : M.Tech (CSE), Priyadarshini Institute of Technology & Science
Associate Professor ( Dept.of CSE), Priyadarshini Institute of Technology & Science
Abstract :
In this paper, we are going to propose survey based administration assessment to empower clients to share administration audit in administration situated versatile interpersonal organization. Every administration supplier freely keeps up a TSE for itself, which gathers and stores clients' surveys about its administrations without requiring any third trusted power. The administration surveys can then be made accessible to intrigued clients in settling on savvy administration choice choices. This paper portrays how the audit related normal dangers are destroyed and makes these surveys more fitting and valid. It portrays two frameworks bTSE and SrTSE, these frameworks are depicted to survey related issues and their suitable arrangements. The regular dangers of audits are Linkability, survey dismissal and change which are evacuated by utilizing bTSE; which makes utilization of tokens give incorporated surveys and the framework is progressed and the most vital risk called as Sybil assault is uprooted by utilizing SrTSE; which makes utilization of pseudonyms. Through execution assessment, we demonstrate that the bTSE accomplishes better execution as far as accommodation rate and defer than an administration audit framework that does not receive client collaboration.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Recommendation System for Find Friend on Social Networks.
Authors : B.NAGESH, CH.HARIKA, , ,
Affiliations : (M.Tech) CSE, Dept. of Computer Science and Engineering
Assistant Professor, Dept. of Computer Science and Engineering Priyadarshini Institute of Technology & Science
Abstract :
Social networks have become an unlimited source of information, for that several applications have been proposed to mine information from social networks such as: recommender systems. The rapidity and scalability of such a recommender algorithm is as important as the actual logic behind the algorithm because such algorithms generally run over a "huge" graph and implementing these normally would probably take a lot of time for recommending items even if there is one user. The basic idea of recommendation system is to recommend items to users. In this paper various recommender systems are classified are discussed. This paper focuses on providing the overview about the various categories of recommendation techniques developed till now. This paper we present review on recommendation system for find friend on social networks..
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Efficient Data Access Control for Multi-Authority Cloud Storage using CP-ABE.
Authors : PRAVEEN KUMAR, S.NAGA LAKSHMI, , ,
Affiliations : (M.Tech) CSE, Dept. of Computer Science and Engineering
Assistant Professor, Dept. of Computer Science and Engineering Priyadarshini Institute of Technology & Science
Abstract :
Security and data privacy is paramount to cloud users seeking to protect their gigabytes of vibrant business data from the inquisitive eyes of unauthorized users who are attempting to exceed their authority and also it becomes a challenging issue in cloud storage systems. Ciphertext-Policy Attribute-based Encryption (CP-ABE) is observed as one of the most seemly technologies for data access control in cloud storage, because it gives more direct control access strategies to the cloud data owners. This CP-ABE scheme provides intrinsic security mechanisms designed to minimize the security attacks and threats in cloud system. In this paper, we design a Fortified Access control for Multi-Authority Cloud Storage Systems, where the process of data access control is strengthened to ensure the safety of the cloud data. Fortified access control to discourse not only the data privacy difficulties in existing control scheme, by using multiple authorities in the cloud storage system, the proposed scheme can efficiently reaches the tenable access control and revokes the anonymous access to the cloud data. The study and simulation analysis illustrates that proposed well organized Fortified Access Control is both secure and efficient for Cloud Storage Systems.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Privacy Preserving with Anonymous Authentication using Decentralized Access Control
Authors : M.Rajesh, Dr G Rama swamy, , ,
Affiliations : M.Tech (CSE), Priyadarshini Institute of Technology & Science
Professor (Dept.of CSE), Priyadarshini Institute of Technology & Science
Abstract :
— the spearheading decentralized access control plan for vulnerable data storage in Cloud that backings unidentified confirmation. In the proposed plan, the Cloud checks the validness of the server without knowing the client's uniqueness before putting away data. The proposed outline concentrates on the full cycle access controlling plan wherein the displayed framework it was overlooked. Keeping in mind the end goal to accomplish secure access controlling plan we proposed fine-grained approach at cloud level, it keeps unapproved access controlling from clients or foes adequately our validation and access control plan is decentralized and solid, not at all like different access control plans intended for Cloud which are unified. The correspondence, calculation overheads are like unified methodologies. In addition, our proposed plan demonstrates that our framework has secure crypto instrument towards accomplishing data integrity and security.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Automatic and Systematic Methodology for Test Packet Generation
Authors : Prasanna, CH.Harika, , ,
Affiliations : (M.Tech) CSE, Dept. of Computer Science and Engineering
Assistant Professor, Dept. of Computer Science and Engineering Priyadarshini Institute of Technology & Science
Abstract :
As of late systems are becoming wide and more complex. In any case, managers use devices like ping and trace route to investigate issues. Consequently, we proposed a programmed and Systematic methodology for testing and investigating systems called Automated Test Packet Generation (ATPG). This methodology gets switch designs and creates a device autonomous model. ATPG create a couple set of Packet Generation to discover each connection in the system. Test bundles are sent as often as possible and it recognize disappointments to limit the issue. ATPG can distinguish both practical and execution (throughput, inertness) issues. We found, less number of Packet Generation is sufficient to test all principles in systems. For case, 4000 parcels can cover all tenets in Stanford spine system while 53 are sufficiently much to cover all connections.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Low Cost Multipurpose Camera
Authors : shahil tp, deepak joseph, sharon TOM, ,
Affiliations : B-Tech (Electronics and Communication Engineering) , Vimal Jyothi Engg. College Chemperi , Kannur ,Kannur university (AICTE)
Abstract :
today we are facing many problems with shortage of electricity, so we should develop new systems which use less electricity. Presently we have many security system which consumes electricity in large amount, also they are costly. To overcome this problem we developed a low cost multipurpose camera. With the invention of Raspberry pi, it’s easy to develop low cost multi –Purpose security camera. While compared to ordinary system our system has many advantages, this system has reduced power consumption, less memory is used, and any system can be changed into our system.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : BUS PASSENGER ALERT SYSTEM
Authors : Jerrin Yomas, Maneesha Unnikrishnan, Anju C. Justin, ,
Affiliations : Vimal Jyothi Engineering College, Chemperi
Abstract :
This is microcontroller based project. In this project we introduce a new system for bus passenger alert. The device that we make will automatically produce a sound message when we reach each bus station. It will also monitor the speed of the vehicle. If the speed exceeds a particular limit a message will be passed to the RTO office to take the necessary actions.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Ultra Stable Flying Robo
Authors : Anoop B K, Manoj K C, Antony Sebastian, Jinu Jose , Jithin M ,Mukunda Dasa K
Affiliations : ASSISTANT PROFESSOR, VIMAL JYOTHI ENGINEERING COLLEGE, CHEMPERI KANNUR
VIMAL JYOTHI ENGINEERING COLLEGE, CHEMPERI KANNUR
Abstract :
— Today we are running out of energy, out of resources, space, etc. high competition in the field for giving more service with lowest cost and maximizing the service. Innovations and inventions are taking place all over the world for delivering the service at lowest cost. The man mobility is decreasing and the work he can do from one place is increasing day by day. Here we are describing a flying object which can fly through the sky for multiple tasks with cheap maintaining costs. For example giving internet, television channels, parcel service, Traffic monitoring etc. are little while we consider the whole scenario. About the device, this device works with the solar energy incorporated with Lithium cells / NiCd Battery chemistries.. Idea by Bionic imitations. And this device has 8 legs which will be used for float movement. It also has gyroscope and accelerometer for steady movements. The attached GPS will enable the device positioning on to deferent geo locations. Communicating with the device is another crucial factor. So far we have two options for the movement. One is the pre allocated trip route set by GPS co-ordinates. Another one is that to establish a wireless RF connection with the device or using the available mobile networks.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Smart Restaurant
Authors : Mrs. Bindu Sebastian, Athira Varghese, Megha Merin Jose, ,
Affiliations : ECE Department, Vimal Jyothi Engineering College,Kannur
Abstract :
Smart Restaurant is concept to realize the automation in restaurants or hotels. In this restaurant the kitchen people can get orders from each table through voice alert. This project consists of two sections one is transmitter section and other is receiver section. In our project we have designed an electronic system to order through RF based wireless communication using a menu card provided on each table. Touch panel is used here, which offers simple and multiple menus driven control panel. Mainly touch screen technology is used where control or settings of different parameters in wide manner. We can select the items shown in its display along with its price and can order the selected items through touch panel. The total cost of the items is also displayed. This order details are collected by wireless receiver placed in the kitchen and will display the items in its display along with the voice announcement through speaker. Each table has its own unique digital code. So the kitchen people can supply those items to that table after preparing it. This will give advantage to avoid the time delay usually experienced during bearer coming, collecting order and finally passes to the kitchen manually.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : TSUNAMI DETECTION SYSTEM
Authors : Mrs.Grace John , Athira P I, Sreedevi K, ,
Affiliations : ECE Department, Vimal Jyothi Engineering College,Kannur
Abstract :
The Tsunami waves cause considerable destruction and kills people . The detection section of the proposed system consists of a microcontroller, a vibration sensor to detect the Tsunami occurrence and a tilt sensor to monitor the sea waves. The principle is as follows, on the onslaught of Tsunami or any other natural calamity of this type , there is an abnormal pressure changes in the sea floor producing vibrations. Here a piezoelectric vibration sensor is used which gives an output depending on variations, and a microcontroller is used to announce the oncoming of Tsunami event to a concerned person, through the mobile computing. Mobile is used to give warning calls or send warning messages.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Review on Data Mining Techniques with Big Data
Authors : TEMPALLI NARENDRA BABU, R.MADHURI DEVI, , ,
Affiliations : M.Tech (CSE), Priyadrshini Institute of Technology & Management
AssociateProfessor (Dept.of CSE), Priyadrshini Institute of Technology & Management
Abstract :
The term Big Data comprises large- volume, complex, growing data sets with multiple, autonomous sources. With the fast development of networking, data storage, and the data collection capacity, Big Data are now rapidly expanding in all science and engineering domains, including physical, biological and biomedical sciences. This paper presents a HACE theorem that characterizes the features of the Big Data revolution, and proposes a Big Data processing model, from the data mining perspective. This data-driven model involves demand- driven aggregation of information sources, mining and analysis, user interest modeling, and security and privacy considerations. We analyze the challenging issues in the data-driven model and also in the Big Data revolution.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Automatic and Methodical approach for Test Packet Generation
Authors : BEJJANKI PRADEEPKUMAR, D.RAVI KIRAN, , ,
Affiliations : M.Tech (CSE), Priyadrshini Institute of Technology & Management
Professor (Dept.of CSE), Priyadrshini Institute of Technology & Management
Abstract :
Recently networks are growing wide and more complex. However administrators use tools like ping and trace route to debug problems. Hence we proposed an automatic and Methodical approach for testing and debugging networks called Automatic Test Packet Generation (ATPG). This approach gets router configurations and generates a device-independent model. ATPG generate a few set of test packets to find every link in the network. Test packets are forwarded frequently and it detect failures to localize the fault. ATPG can detect both functional and performance (throughput, latency) problems. We found, less number of test packets is enough to test all rules in networks.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : A Secure and Dynamic Multi Keyword Ranked Search Scheme over encrypted
Authors : A.Raghavendra Praveen Kumar, K.Tarakesh, U.Veeresh, ,
Affiliations : Pursuing M.Tech, CSE Branch, Dept of CSE
Assistant Professor, Department of Computer Science and Engineering
Assistant Professor, Department of Computer Science and Engineering G.Pullaiah College of Engineering and Technology, Kurnool, Andhra Pradesh, India.
Abstract :
The major aim of this paper is to solve the problem of multi-keyword ranked search over encrypted cloud data (MRSE) at the time of protecting exact method wise privacy in the cloud computing concept. Data holders are encouraged to outsource their difficult data management systems from local sites to the business public cloud for large flexibility and financial savings. However for protecting data privacy, sensitive data have to be encrypted before outsourcing, which performs traditional data utilization based on plaintext keyword search. As a result, allowing an encrypted cloud data search service is of supreme significance. In view of the large number of data users and documents in the cloud, it is essential to permit several keywords in the search demand and return documents in the order of their appropriate to these keywords. Similar mechanism on searchable encryption makes centre on single keyword search or Boolean keyword search, and rarely sort the search results. In the middle of various multi-keyword semantics, deciding the well-organized similarity measure of “coordinate matching,” it means that as many matches as possible, to capture the appropriate data documents to the search query. Particularly, we consider “inner product similarity” i.e., the amount of query keywords shows in a document, to quantitatively estimate such match measure that document to the search query. Through the index construction, every document is connected with a binary vector as a sub index where each bit characterize whether matching keyword is contained in the document. The search query is also illustrates as a binary vector where each bit means whether corresponding keyword appears in this search request, so the matched one could be exactly measured by the inner product of the query vector with the data vector. On the other hand, directly outsourcing the data vector or the query vector will break the index privacy or the search privacy. The vector space model facilitate to offer enough search accuracy, and the DES encryption allow users to occupy in the ranking while the popularity of computing work is done on the server side by process only on cipher text. As a consequence, data leakage can be eradicated and data security is guaranteed.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Key Aggregate Searchable Encryption for Group Data Sharing Via Cloud Data Storage
Authors : K.Manohar, R. Anil Kumar, N.Parashuram, ,
Affiliations : Pursuing M.Tech, CSE Branch, Dept of CSE
Assistant Professor, Department of Computer Science and Engineering</br>Assistant Professor, Department of Computer Science and Engineering G.Pullaiah College of Engineering and Technology, Kurnool, Andhra Pradesh, India.
Abstract :
the ability of preferentially sharing encrypted data with unlike users through public cloud storage might really ease security distress, by possibility data disclose in the cloud. A key test to design such encryption idea lies in the well-organized management encryption keys. The preferred flexibility of allocating any group documents with any group of users by attaining weightage different encryption keys to be used for different documents. On the other hand, this involves the need of securely distributing to users by a large number of keys for both encryption and search, and those users have to progress to store the received keys. The indirect need for secure communication, storage, and complexity clearly cause the unreasonable approach. In this paper, we concentrate on this practical problem, by suggesting the novel concept of key aggregate searchable encryption (KASE) and instantiating the idea through a real KASE scheme, in which a data owner wants to share out a single key to a user for distributing a large number of documents, and the user needs to present a single trapdoor to the cloud for questioning the shared documents.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
Authors : C.Praveen Kumar, P Suman Prakash, Dr.S.Prem Kumar, ,
Affiliations : Pursuing M.Tech, CSE Branch, Dept of CSE
Assistant Professor, Department of Computer Science and Engineering
Professor & HOD, Department of computer science and engineering, G.Pullaiah College of Engineering and Technology, Kurnool, Andhra Pradesh, India.
Abstract :
Data distribution is not at all easier with the progress of cloud computing, and an exact examination on the shared data offers a collection of profits both to the the public and individuals. Data distribution with a huge number of applicants must get into account numerous issues, counting effectiveness, data integrity and confidentiality of data owner. Ring signature is a capable applicant to build an unsigned and genuine data sharing system. It lets a data owner to secretly authenticate his data which can be set into the cloud for storage or scrutiny purpose. so far the expensive certificate authentication in the conventional public key infrastructure (PKI) surroundings becomes a restricted access for this solution to be scalable. Identity-based (ID-based) ring signature, which eradicates the method of certificate verification, can be utilized instead. In this paper, we additionally improve the safety of ID-based ring signature by giving advance security: If a secret key of any user has been compromise, all earlier produced signatures that contain this user still remains legal. This property is particularly significant to any huge scale data distribution system, since it is unfeasible to request all data owners to re-authenticate their data still if a secret key of one single user has been compromised. We offer an actual and well-organized instantiation of our scheme, demonstrate its safety and supply an accomplishment to illustrate its realism.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : A Dynamic Secure Group Sharing Framework in Public Cloud Computing
Authors : N.Mounika, N.Parushuram, R.Anil Kumar, ,
Affiliations : Pursuing M.Tech, CSE Branch, Dept of CSE
Assistant Professor, Department of Computer Science and Engineering
Assistant Professor, Department of Computer Science and Engineering
G.Pullaiah College of Engineering and Technology, Kurnool, Andhra Pradesh, India.
Abstract :
Cloud computing is the extended vision of computing as a effectiveness, where data owners can remotely store their data. The essential service presents by the Cloud is Data Storage. On the other hand, it is a tricky task for sharing data in multi-owner manner anywhere group admin and all group members can store and alter data while protecting data and identity privacy from an untrusted cloud server, due to the frequent change of the membership. so secure multi-owner data sharing scheme for dynamic groups in the cloud computing have been projected which absorb addition of group signature and broadcast encryption techniques. However this system also recognized some boundaries in terms of competence and security. since multi-owner data storing and sharing in a dynamic surroundings dumps enormous amount of data files in the cloud, which leftovers in cloud for imprecise period of time. The confidential information stored may changed by service providers. To maintain cloud file’s security and privacy regular elimination of unwanted files is needed. To determine this drawback we propose new framework which is Reliable and Scalable Secure Method to Store and Share Secrete Data for groups in Cloud i.e MONA that remove unnecessary files automatically when the predefined time period for sharing specified by data owner has been run out which improve performance of the system in terms of security and efficiency. Also this method decreases the overhead at the time of upload and download file in the cloud. At last proposed method by name Multi Owner Data Sharing over Cloud (MODOC) declares required efficiency and most importantly security. We apply a working prototype of the MODOC method and assess its performance based on the time addicted during various operations the results give you an idea about that MODOC has the prospective to be effectively used for secure data sharing in the cloud.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
Authors : G.Mercy Vimala, R.Vara Prasad, P.Rama Rao, ,
Affiliations : Pursuing M.Tech, CSE Branch, Dept of CSE<
Assistant Professor, Department of Computer Science and Engineering
Assistant Professor, Department of Computer Science and Engineering
G.Pullaiah College of Engineering and Technology, Kurnool, Andhra Pradesh, India.
Abstract :
The Benefited from Cloud Computing, clients can achieve a flourishing and moderate methodology for information sharing among gathering individuals in the cloud with the characters of low upkeep and little administration cost. Then, security certifications to the sharing information records will be given since they are outsourced. Horribly, due to the never-ending change of the enrolment, sharing information while giving protection saving is still a testing issue, particularly for an untrusted cloud because of the agreement attack. In addition, for existing plans, the security of key dispersion depends on the safe communication channel, then again, to have such channel is a solid feeling and is difficult for practice. In this paper, we propose a safe information sharing plan for element individuals. Firstly, we propose a safe route for key dispersion with no safe correspondence channels, and the clients can safely acquire their private keys from gathering administrator. Besides, the plan can accomplish fine-grained access control, any client in the gathering can utilize the source in the cloud and refused clients can't get to the cloud again after they are rejected. Thirdly, we can protect the plan from trickery attack, which implies that rejected clients can't get the first information record regardless of the possibility that they scheme with the untrusted cloud. In this methodology, by utilizing polynomial capacity, we can achieve a protected client denial plan. At long last, our plan can bring about fine productivity, which implies past clients need not to overhaul their private keys for the circumstance either another client joins in the gathering or a client is give up from the gathering.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : A Survey on Dynamic Resource Allocation for Efficient Parallel Data Processing
Authors : B. Praveen Kumar, Santhosh Kumar, , ,
Affiliations : M.Tech (CSE), Sreyas Institute of Engineering & Technology
Associate Professor Dept.of Computer Science & Engineering, Sreyas Institute of Engineering & Technology
Abstract :
As recently ad-hoc parallel information handling has developed to be one of the executioner applications for Infrastructure as a service (IaaS) cloud. Most of the Distributed computing organizations have begun to coordinate systems for parallel information making ready in their item portfolio, making it straightforward for clients to get to these Infrastructure and to convey their projects. The preparing constitution which are right now utilized have been intended for static, homogeneous group setups and slight the specific way of a cloud. Subsequently, the dispensed figure assets may be lacking for huge parts of the submitted work and superfluously increment handling time and cost. In this paper we discuss the challenges for proficient parallel information handling in cloud and introduce our exploration venture Nephele. Nephele is the first information preparing structure to expressly neglect the dynamic quality portion offered by today's IaaS mists for each, trip booking and execution. In this paper we talk about the open doors and challenges for effective parallel information preparing Specific errands of a handling occupation can be doled out to distinctive sorts of virtual machines which are consequently instantiated and ended amid the employment execution. In view of this new structure, we perform amplified assessments of Map Reduce-roused preparing occupations on an IaaS cloud framework and contrast the outcomes with the mainstream information handling system Hadoop.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Avoid Link Failure Using Novel Re-routing Method
Authors : Batsala Balaraju, Sahukaru Jayavardhana Rao, , ,
Affiliations : M.Tech (CSE), Sri Vaishnavi College of Engineering at Srikakulam
Assistant Professor, Department of Computer Science & Engineering, Sri Vaishnavi College of engineering at srikakulam
Abstract :
In this paper we present a method to find a path when a link is failure when the data is transmitted for source node to destination node when a link Is failure before entering to the gate way protocol and to recover the response of failure the target application Is tested on small network up to tens of nodes for regional access of the service providers network which is one of the most challenging Task We provide and effective method to find the existing path for the Set of nodes to send the data when the link is failure.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : RFID BASED SHOPPING TROLLEY
Authors : Mrs.Lekshmy S, Ms.Aniltta T C, Ms.Nivya Shaji, ,
Affiliations : Department of ECE, Vimal Jyothi Engineering College, Chemperi, Kannur
Abstract :
While purchasing in super market we can gather items we want, put it in the container and at the time of billing only we come to know about the total cost. Also we need to stand in a queue for billing those items. To overcome this here we can design a RFID Based Trolley to make the purchase more easily and comfortable. An RFID Reader with electronics hardware system in fitted with the trolley to make the purchase comfortable. All the items are fitted with an RFID card whose price is fixed into the card. When an item is shown in front of the reader (fitted in the trolley) the amount for the item is added to the purchase bill and is shown on the LCD Display. It also has the provision for removing the items from the trolley where the cost is removed from the total cost. We can set a limit value for the purchase amount in the microcontroller, once the items are added the cost is added up and if it crosses certain limit it gives an alarm signal to indicate that. Along with this a search mode is also provided to the customer. By selecting search mode, customer can easily find out a product that the customer wants to search in the super market. MCU send data through RF module to the receiver side in the search mode if the particular product is selected using key pad. Send data is corresponds to product details that the customer wants to search in the super market. On receiver side, LED indication for corresponding data/product received will switch ON. Audio indication is also provided by MCU. 2.4 GHz open band wireless transceiver modules are used on receiver and transmitter which have range of 30m.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : SELF BALANCING ROBOT
Authors : Mrs.LEKSHMY.S, ALEESHA GEORGE, ATHIRA C.V, ,
Affiliations : Department of ECE, Vimal Jyothi Engineering College, Chemperi, Kannur
Abstract :
-In this paper, we presented the Balance model as a two wheeled self balancing robot that is capable of adjusting itself with respect to changes in weight and position. We developed the Balance System from a single gyroscope and a single accelerometer. The stability of the system is to show the capabilities of the ATmega328P in doing PID loops even with limited accuracy in position readings. PID control system is designed to monitor the motors so as to keep the system in equilibrium. It should be easily reproducible given the right parts and code
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Android controlled Smart Car
Authors : Jayesh George M, Adithya Sreyaj P P, Daniel Joseph, Sajeer P,
Affiliations : Vimal Jyothi Engineering College, Chemperi Kannur
Abstract :
A car is usually an electro-mechanical machine that is guided by computer and electronic programming. The car which can be controlling using an APP for android mobile. We are developing the remote buttons in the android app by which we can control the car motion with them. Here we use Bluetooth communication to interface controller and android. Controller can be interfaced to the Bluetooth module though UART. According to commands received from android the robot motion can be controlled. The consistent output of a robotic system along with quality and repeatability are unmatched.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Solar Power Smart Waste Bin
Authors : Mr. Jobin francis, Mr. Melbin TL, Mr. Praveen CN, ,
Affiliations : Vimal Jyothi Engineering College, Chemperi Kannur
Abstract :
India government recently introduced a new campaign named “SWACH BHARATH” that is aiming to make our country clean and tidy. That is, now the condition of our country is very bad in the field of waste management. There are many waste bins in our cities and country sides. But the reality is nobody using it in an effective way. As we all saw that in cities and streets the waste bin is there and all the wastes are near its side. The reason for this is, if one person deposit the waste outside of it, the person next coming to their will automatically throws the waste outside of the basket. This will continues. Our intention is to approach this problem in a different manner. If the lid of the waste bin opens automatically, when a person approaches to the waste bin then the person automatically deposit the waste inside it. No one has a tendency to throw the garbage outside the basket. That is our project “SOLAR POWERED SMART WASTE BIN “which is aimed to make our cities and streets clean and tidy.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED