Articles

  1. A SURVEY ON DATA MINING SECURITYDownload Article

    S.Indhumathi, M.Senthamarai

    Abstract

    close

    Security is a research area concerned with the privacy driven from personally identifiable information when considered aimed at data mining. Consequently, PPDM has become an increasingly important field of research. A number of methods and techniques have been developed for secrecy preserving data mining. Privacy preservative Data mining remains an evolving technology which performs data mining operations in centralized or distributed data in a secured manner to preserve sensitive data. This paper provides a complete review on PPDM and different techniques such as data partition, data modification, data restriction technique which could be used to prevent the data access from unauthorized users.

  2. A SURVEY ON MULTIMODAL BIOMETRICS AUTHENTICATION AND TEMPLATE PROTECTIONDownload Article

    1Aravindhraj Natarajan, 2Dr.N.Shanthi

    Abstract

    close

    Biometric systems play a vital role in security systems. All the equipments, systems, centers, etc are protected with the help of the biometric authentication systems. The biometric system should also ensure the security of the stored template along with authentication. Multimodal biometric system is highly efficient than Single biometric system. This work involves the review of several authentication and template protection techniques such as fuzzy vault, Social network analysis, Delunay quadrangle mechanism and topology code. These mechanisms are compared and the results are examined using the parameters such as Genuine Acceptance Rate (GAR), False Acceptance Rate (FAR), False Reject Rate (FRR) and Equal Error Rate (EER). Index Terms: Fuzzy Vault, Delunay Quadrangle, GAR, FAR, FRR and EER

  3. A REVIEW ON SECURITY ISSUES IN CLOUD COMPUTINGDownload Article

    1Deepa.K, 2Prabhu.S

    Abstract

    close

    Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Cloud computing raises privacy and confidentiality concerns because the service provider necessarily has access to all the data, and could accidentally or deliberately disclose it or use it for unauthorized purposes. Most organizations outsource at least some IT functions to third party service providers. Cloud computing arrangements are becoming increasingly popular as more and more organizations are attracted to the potential cost savings and enhanced flexibility that cloud computing services can offer. While there are a number of benefits to outsourcing data storage or processing to a cloud provider, there are also a number of steps that an organization should take to help ensure that the security and integrity of its data is maintained in the cloud and to ensure that it complies with its privacy law obligations.In this article,we discuss various security and privacy issues while outsourcing data and some solutions to mitigate these issues in cloud environment. Keywords: Cloud Computing, Security, Privacy

  4. SURVEY PAPER ON BIG DATADownload Article

    *1Deepak.G, 2Prabhakaran.T

    Abstract

    close

    Big data is the term for any collection of data sets so large and complex that it becomes difficult to process using traditional data processing applications. The challengesinclude analysis, capture, curation, search, sharing, storage, transfer, visualization, and privacy violations. The trend to larger data sets is due to the additional information derivable from analysis of a single large set of related data, as compared to separate smaller sets with the same total amount of data, allowing correlations to be found to "spot business trends, prevent diseases, combat crime and so on." Big data is difficult to work with using most relational database management systems and desktop statistics and visualization packages, requiring instead "massively parallel software running on tens, hundreds, or even thousands of servers". Big data usually includes data sets with sizes beyond the ability of commonly used software tools to capture, curate, manage, and process data within a tolerable elapsed time. Big data "size" is a constantly moving target, as of its ranging from a few dozen terabytes to many petabytes of data. Big data is a set of techniques and technologies that require new forms of integration to uncover large hidden values from large datasets that are diverse, complex, and of a massive scale. Big data environment is used to acquire, organize and analyze the various types of data. There is an observation about Map Reduce framework that framework generates large amount ofintermediate data. Index Terms- Big data,Hadoop,MapReduce, Pig, Hive, Hbase.

  5. A STUDY ON QUANTUM KEY DISTRIBUTION IN NETWORK SECURITYDownload Article

    Gomala Priya1, S.Sasirekha2

    Abstract

    close

    In this survey, we introduce the motivation and the current state of the art of research in quantum key distribution. In particular, we discuss the present security modelstrengths and weaknesses of Quantum key distribution (QKD). QKD provides a way for distribution of secure key in at least two parties which they initially share. Quantum key distribution it gives effectiveness in the detect attacks and provide efficient performance. QKD is provides the secure management for authorized users and reduce the eves gain informationand there are many protocols, algorithm and techniques for providing a secure key. In this paper all the concerned QKD protocols, algorithm and techniques that share a secret key is explained and comparative study of all quantum mechanism. .Keywords: Quantum key distribution, quantum protocols, quantum technique.

  6. A SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTING ENVIRONMENTSDownload Article

    T.Gothandeshwaran1, K.Shanmugapriya2

    Abstract

    close

    Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over the Internet. The main area of concentration in the cloud computing is allocation of resources to a requested end user. A Resource Allocation System (RAS) in Cloud Computing can be seen as any mechanism that aims to guarantee that the applications’ requirements are attended to correctly by the provider’s infrastructure.One of the major problems is to allocate resources to requestmaintaining high resource utilization, thus minimizing the operational cost of the cloud environment and better allocate physical and/or virtual resource to developerapplications. The other challenges of resource allocation are conference client demands and application requirements.Manyresearches have used resource allocation algorithm, heuristicalgorithm, optimal allocation algorithm problem, efficient resource allocation method. In this paper various parameters and different techniques and various resource allocation strategies and their challenges are discussed in detail. Furthermore, we have carried out experiments to illustrate efficiency of our algorithm with respect to commonly used resource allocation algorithm. Keywords:Cloud Computing, Resource Allocation, optimal resource allocation, Infrastructures.

  7. A REVIEW ON PRIVACY PRESERVING DATA PUBLISHING IN DATA MININGDownload Article

    Gowthamy.R1, Uma.P2

    Abstract

    close

    The data mining process of collecting, extracting and storing valuable information is actively done by many enterprises now-a-days. Among lots of developments, data mining face hot issues on security, privacy and data integrity. People become embarrassed when adversary tries to know the sensitive information about an individual. Data mining use one of the latest technique called privacy preserving data publishing (PPDP) in the field of data security, which enforces security for the digital information provided by governments, corporations, multinational companies and individuals. This information act as a source of decision making in business. PPDP provides required tools and techniques to secure exchanging and publishing data. PPDP gathers more involvement of research communities because of securing sensitive information belongs to an individual. This survey will be a key of collecting various methods used for preserving and publishing useful data. KEYWORDS:Data mining, privacy preservation, sensitive information

  8. A SURVEY ON CLOUD COMPUTING STORAGEDownload Article

    Keerthi.E1, Maheswari.S2

    Abstract

    close

    Cloud storage is a model of data storage where the data is stored in logical pools, the physical storage spans multiple servers (and often locations), and the physical environment is typically owned and managed by a hosting company.cloud storage providers are responsible for keeping the data available and accessible, and should be protected and running. People and organizations can buy or lease storage from the providers to store application data and files. Cloud storage service can access from anywhere , a web service such as Application Programming Interface (API) and by the applications that utilize the API, such as cloud desktop storage, a cloud storage gateway or web-based content management systems. Cloud storage is made up of many distributed resources. If your internet connection is slow or unstable, you might have problems accessing or sharing your files. Companies that require a large amount of storage may also find costs increase for the first few gigabytes of data stored. KEYWORDS: cloud storage, distributed resources.

  9. A SURVEY ON SOFTWARE QUALITY IN SOFTWARE ENGINEERINGDownload Article

    Kiruthika.S1, Karuppusamy.S2

    Abstract

    close

    In software engineering Software Quality is one important concern.Software quality refers to two related but distinct notions that exist wherever quality is defined in a business context:Software functional quality reflects how well it complies with or conforms to a given design based on functional requirements or specifications.Software structural quality refers to how it meets non-functional requirements that support the delivery of the functional requirements,such as robustness or maintainability.An aggregated measure of software quality can be computed through a qualitative or quantitative scoring scheme or a mix of both and then a weighting system reflecting the priorities. Many ideas are developed and tools are used to increase the software quality in each software development life cycle.Different mechanism and algorithms are also used to improve the quality. Keywords: Software quality,code-smell, software engineering

  10. A SURVEY ON CLUSTERING IN DATAMININGDownload Article

    Monisha.S1, Vanathi.D2

    Abstract

    close

    The main objective of the data mining process is to extract information from a large data set and transform it into an understandable structure for further use. Clustering is a main task of exploratory data analysis and data mining applications. Clustering is the task of grouping a set of objects in such a way that objects in the same group (called a cluster) are more similar to each other than to those in other groups (clusters). Graph clustering is a graph based method, clustering of vertices on basis of edge structure. K-means is one of the popular partitioned based clustering algorithms in the area of research. The impact factor of k-means is its simplicity, high efficiency and scalability. In this survey paper, a review of clustering and its different techniques in data mining is done. Keywords: Data Mining, Clustering tec, K-Means Algorithm, Graph Clustering.

  11. SURVEY ON QOS ROUTING IN MOBILE AD HOC NETWORKSDownload Article

    Saranya.R1, Padma2, Shanthi.N3

    Abstract

    close

    A mobile ad hoc network (MANET) is always self-configuring, infrastructure-less network that connected without wires. MANETs has a routable networking environment on top of a Link Layer ad hoc network. Each device in a MANET moves independently in any pathway. Hence it changes the links to additional devices recurrently. Each must forward traffic unrelated to its own use, and therefore be a router. QoS routing is a cross-layer optimizationadaptive routing mechanism. The cross-layer mechanism provides local QoS information for the routing algorithm, by taking into consideration the impacts of node mobility and lower-layer link performance. The complete routing mechanism includes three parts: (1) a modified dynamic source routing algorithm that handles route discovery and the collection of QoS related parameters; (2) a local statistical computation and link monitoring function located in each node. and (3) an integrated decision-making system to calculate the number of routing paths, packet delivery ratio and traffic distribution rates. To reduce end-to-end delay and throughput various algorithms and protocol techniques are needed. A survey on qos routing in MANETs is discussed in this paper. Keywords:-Manet, end-to-end delay, throughput

  12. A SURVEY ON SECURITY WIRELESS SENSOR NETWORKDownload Article

    Sharmila.B1, Mrs.M.Parvathi2

    Abstract

    close

    In wireless sensor network (WSN), security is provided based on key management for authorized users. Establishing a secure and efficient data transmission between communication parties against eavesdropping attacks, Brute force attacks, Message manipulation attacks, delay attack. Security requirements and efficient protocols are used to provide secure data transmission from base station to target node. If any attacks occurred on the network that are identified and studied in security research. The aggregation concept is usually required in many sensor applications to obtain temporal variation information of aggregates. Thus, security in wireless sensor network plays an important role in the security of the whole network. We also propose a series of security mechanisms to protect the proposed protocols. Both theoretical analysis and simulations show the effectiveness and efficiency of our schemes. Keywords:Wireless sensor networks, security, key management, attacks.

  13. A SURVEY ON CLASSIFICATION IN DATA MININGDownload Article

    1Subhashini Padma, 2P.Vanitha

    Abstract

    close

    Data mining is the analysis step of the "Knowledge Discovery in database”. It is an interdisciplinary subfield of computer science and the computational process of discovering patterns in large data sets Classification is a data mining technique used to predict group membership for data instances. In this paper, we present the basic classification techniques. Several major kinds of classification method including decision tree induction, Bayesian networks, k-nearest neighbor classifier, genetic algorithm and fuzzy logic techniques. This paper provides a comprehensive review of different classification techniques in data mining. KEYWORDS: Bayesian networks, k-nearest neighbor classifier, Fuzzy logic, classification technique and decision tree induction

  14. A SURVEY ON DDOS ATTACK DETECTION AND PREVENTION METHODOLOGYDownload Article

    Subramaniam.T.K1, Deepa.B2

    Abstract

    close

    Denial of Service (DoS) or Distributed-Denial of Service (DDoS) is major threat to network security. Network is collection of nodes that interconnect with each other for exchange the Information. This information is required for that node is kept confidentially. Attacker in network computer captures this information that is confidential and misuse the network. Hence security is one of the major issues. There are one or many attacks in network. One of the major threats to internet service is DDoS (Distributed denial of services) attack. DDoS attack is a malicious attempt to suspending or interrupting services to target node. DDoS or DoS is an attempt to make network resource or the machine is unavailable to its intended user. Many ideas are developed for avoiding the DDoS or DoS. DDoS happen in two ways naturally or it may due to some botnets .Various schemes are developed defence against to this attack. Main idea of this paper is present basis of DDoS attack. DDoS attacktypes;DDoS attack components, survey on different mechanism to detect a DDoS or DoS Detection technique. KEYWORDS: DDoS, Security, botnets

  15. A SURVEY ON SECURITY IN SMART GRID ENVIRONMENTDownload Article

    Venkateswaran.D1, Satheeshkumar.S2

    Abstract

    close

    Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. The security in smart grid environment quite difficult. Attacker can easily attack the data that sends between the smart meter and the utility centre. The attacker can attack the data or inject false data on it. The techniques which are used are light weight authentication scheme, scalable key management and so on. To provide secure communication and prevent the data from attacker various techniques have been implemented. KEYWORDS: Smart Grid, Smart Grid security, Smart meter, advanced metering infrastructure.

  16. A SURVEY OF TEXT MINING METHODSDownload Article

    *1Vijaymeena.M.K, 2Aruna.V

    Abstract

    close

    The purpose of mining text data is to process unstructured information and numeric indices are extracted from the text to make the information contained in the text accessible to the various data mining algorithms such as statistical and machine learning. In order to derive summaries for the words contained in the text document, information should be extracted from datasets. The words or cluster of words can be analyzed and we can determine similarities between them or how they are related to other variables in the data mining project.Text Mining has become an research area and has a great significance. The previously unknown and new information are discovered by computer, by extracting information automatically from different written resources. In this paper, a Survey of various techniques to mine Text and applications of text mining has been presented. Keywords:Unstructured, categorization, Visualization

  17. DESIGN AND DEVELOPMENT OF COLD PRESS EXPELLER MACHINEDownload Article

    C. Sakthivel1, B. Vijayaprakash2

    Abstract

    close

    This project is carried out in a company called Parker biotech private limited, Chennai which is an ISO 9001-2008, GMP (Good Manufacturing Practice) certified manufacturing and exporting company. This project is about “Design and development of cold press expeller machine,” to design a screw press oil expeller for neem oil extraction, to fabricate the components of the expeller based on the design specifications and to test the expeller after fabrication and assembly of the components. While in designing and in material selection, consideration was given to the techno-economic status of the micro and small scale vegetable oil processors who are the intended users of the machine. The functional parts of the machine are worm shaft, prime mover, included barrel, hopper, gear reduction box, pulley, oil inlet, cake outlet, transmission belts and bearings. The worm shaft is at an increasing diameter while the screw system is at a decreasing pitch – a combination that is essential for obtaining maximum pressure for oil extraction and cake extrusion process. In operation, the gradually built-up pressure along the worm shaft conveys, crushes, presses and squeezes oil out of the seeds. The residual cake from where the oil is extracted is extruded out of the cake outlet in the form of flakes. Powered by a 40 hp three-phase electric motor, thepart drawings ofvarious partsthat usedfor manufacturingthe cold press expeller machineare drawnby the helpof solidworks(2012). KEYWORDS:Expeller Machine, Fabrication, Motor, Bearings, Solid Works

  18. DESIGN AND DEVELOPMENT OF AIR COOLED HEAT EXCHANGERDownload Article

    R.Vivek, S.Punithan

    Abstract

    close

    This project is about “Design and development of air cooled heat exchanger” and it is used to convert the hot fluid into cooled one. The existing system of the air cooled heat exchanger tube bundle is made up of mild steel due to that the heat reduction rate obtained is low. In this project, mild steel is going to be replaced by cast steel (ASME SA 179) in which heat reduction can be increased. The slag formation inside the tube bundle is the major problem found in the machinery and these can be reduced by implementing turbulator inside the tube bundle. Due to this the efficiency of the air cooled heat exchanger can be increased and the maintenance can be reduced. The part drawings of various parts that used for manufacturing the air cooled heat exchanger are drawn by the help of the software “Heat Transfer Research Institute” (HTRI 2011) and are analysed by HTRI. The part drawings are drafted by the software AutoCAD.

  19. OPTIMISATION OF ENERGY BY DESIGN AND ANALYSIS OF HEATING, VENTILATION AND AIR CONDITIONING SYSTEMS (HVAC)Download Article

    V.Vignesh, B.Shreeram

    Abstract

    close

    To optimize the energy the existing ‘Clivet’ type HVAC systems duct network is drawn using Solid works 2012 software and the air flow analysis in the existing network through flow simulation is carried out to know the performance of the existing system. From the air flow analysis through solid works flow simulation software it is clearly stated that the simulation results are more or less equal when compared to existing systems performance. Then the actual air velocity at each diffuser outlet is measured in the industry by using anemometer device and the total air volume is calculated. By comparing the designed air volume of the existing unit and the actual volume of the air flow through the duct network, it is evident that the amount of air volume in particular room is higher than the required level. The energy loss occurred in the duct network is because of the friction of the air molecule at the inner surface of the duct network. This friction loss will cause the energy loss in the duct network. In order to minimise the energy loss the existing systems bend radius can be varied and found that the increasing in the bend radius can reduce friction loss and suggested that the radius of 154-155 mm can be suitable to minimise the energy consumption. Then the heating and cooling load calculations are carried out. From the calculations it is found that the motor, pump, and fan in the air handling unit consume more energy. From the calculation of fan coil unit and pumping unit it is consuming Rs 2728 and Rs 4960 respective per month. To reduce the energy cost the air cooled condenser can be replaced in place of water cooled condenser which can produce hot water that can be used for heating purpose and reduce the energy used for fan coil unit. The required modifications, replacements and the necessary steps required to operate the air handling unit is discussed and the proper maintenance and controlling of the existing HVAC systems air handling unit is suggested to the industry to save the energy.

  20. COMPUTATIONAL INVESTIGATION OF INFLUENCE OF BEND ANGLE OVER HEAT TRANSFER RATE IN PIPE FLOW OF A HEAT EXCHANGERDownload Article

    S.Kaviraj, S.Parthiban

    Abstract

    close

    Heat transfer enhancement techniques are developed vigorously in heat transfer applications. Induced turbulence in heat exchanger at shell side is one of the heat transfer enhancement technique. If it generates turbulence and cross flow in flow path of fluid by baffles, heat transfer rate is increased. In many literatures, effects of bend over flow properties of pipe flow are investigated. There is very few such kind of literature over pipe bend effect in heat transfer rate because bend causes turbulence and reduces energy of fluid (pressure energy is converted into strain energy by impact with pipe at bend). Turbulence is undesirable in case of flow properties like pressure and velocity but favourable to heat transfer enhancement. Therefore, it is essential to investigate effect of pipe bend angle over heat transfer rate in heat transfer. In this present work, pipes with different bend angles (0, 25, 45, 60, 90, 100, 125) are designed and simulated using computational fluid dynamic software with water as flow medium at different temperatures (20,40,60,75)ºC. Pipe is considered as real wall and its temperature distribution is measured to corresponding temperature boundary condition at inlet. Ultimately, influence of bend angle over heat transfer enhancement in pipes will explored.

  21. A REVIEW ON PRIVACY ISSUESS IN CLOUD COMPUTINGDownload Article

    A.MOHAN KUMAR, K.GUNASEKARAN

    Abstract

    close

    Cloud computing is emerging as a powerful architecture to perform large-scale and complex computing. It extends the information technology (IT) capability by providing on-demand access to computer resources for dedicated use. The information security and privacy are the major concerns over the cloud from user perspective. This paper surveys and evaluates the architecture, data security and privacy issues in cloud computing like data confidentiality, integrity, authentication, trust, service level agreements and regulatory issues. The objective of this paper is to review comprehensively the current challenges of data security and privacy being faced by cloud computing and critically analyze these issues.

Sign in

Registered and Approved by National Science Library (NSL),National Institute of Science Communication And Information Resources(NISCAIR),
Council of Scientific and Industrial Research,New Delhi, India"