Articles

  1. E-VOTING THROUGH BIOMETRIC SECURITY SYSTEM WITH MMS USING ARM PROCESSORDownload Article

    Y.B.T.Sundari, J.Pushpa Rani

    Abstract

    close

    This paper presents a new technique to evaluate e-voting system with highly security optimization method; this is based on biometric security system such as face recognition along with finger prints. This system, introduced a device which is highly security using a software platform and hardware platform. The entire system controlled by ARM processor which is used in hardware section. In voting, time the maintenance is also an important factor. This system is developed in such a way that it can work for specific period, which has been implemented with the help of a software platform. The image and finger print of voter or authorized person are stored in database of system. Voter image will be captured by the camera and fingerprint will be taken by the fingerprint reader. These two are compared with the database of the system. This method processed by MATLAB GUI with PCA algorithm. The system doesn’t allow unauthorized person and it is indicated by Blinking of the Red LED. It can allow the only authorized person and it is indicated by Blinking of the Green LED. So malfunctions can be avoided by using this system. The LCD display which is connected to the processor will display the polling information. This system also sends the voter information along with image through MMS to the administrator of the election commission. Instead of sending voted information from every polling booth to the election commission, the data can be aggregated and can be compressed at a point, where different data from different polling booths can be mingled. This can be done wirelessly by forming wireless network where the data can be aggregated and compressed at the network main node and can be sent to election commission main office. Because sometimes the polling booths have to be established at remote places where no proper facilities are available to place wired connections, like mountain areas and very rural areas. This will bring quick results in election.

  2. PRIVACY PRESERVING ENHANCED COLLABORATIVEDownload Article

    1P.Kalaiyarasi, 2Mr.C.Muthubharathi

    Abstract

    close

    Collaborative tagging is one of the most popular services available online, and it allows end user to loosely classify either online or offline resources based on their feedback, expressed in the form of free-text labels (i.e., tags). Although tags may not be parse sensitive information, the wide use of collaborative tagging services increases the risk of cross referencing, thereby seriously compromising user privacy. In this paper, we make a first contribution toward the development of a privacy-preserving collaborative tagging service, by showing how a specific privacyenhancing technology, namely tag suppression, can be used to protect end-user privacy. Moreover, we analyze how our approach can affect the effectiveness of a policy-based collaborative tagging system that supports enhanced web access functionalities, like content filtering and discovery, based on preferences specified by end users. Index Terms Policy-based collaborative tagging, social bookmarking, tag suppression, privacy enhancingtechnology, Shannon’s entropy, privacy-utility tradeoff

  3. NETWORK ROUTING TOPOLOGY INFERENCE FROM END-TO-END MEASUREMENTSDownload Article

    M.Ramu

    Abstract

    close

    Inferring the routing topology and link performance from a node to a set of other nodes is an important component in network monitoring and application design. We build a framework for designing topology inference algorithms based on additive metrics. The framework can flexibly fuse information from multiple measurements to achieve better estimation accuracy. We develop computationally efficient (polynomial-time) topology inference algorithms based on the framework. We prove that the probability of correct topology inference of our algorithms converges to one exponentially fast in the number of probing packets. In particular, for applications where nodes may join or leave frequently such as overlay network construction, application-layer multicast, and peer-to-peer file sharing/streaming, we propose a novel sequential topology inference algorithm that significantly reduces the probing overhead and can efficiently handle node dynamics. We demonstrate the effectiveness of the proposed inference algorithms via Internet experiments.

  4. VIRTUALIZATION OF DISTIRIBUTED DATABASES USING XMLDownload Article

    M.Ramu

    Abstract

    close

    Our objective is to develop a database virtualization technique for data analysts or other users who apply data mining methods to can use all ubiquitous databases in the Internet as if they were recognized as a single database, thereby helping to reduce their workloads such as data collection from the Internet databases and data cleansing works. In this study, firstly we examine XML schema advantages and propose a database virtualization method by which such ubiquitous databases as relational databases, object-oriented databases, and XML databases are useful, as if they all behaved as a single database. Next, we show the method of virtualization of ubiquitous databases can describe ubiquitous database schema in a unified fashion using the XML schema. Moreover, it consists of a high-level concept of distributed database management of the same type and of different types, and also of a location transparency feature.

  5. PERFORMANCE STUDY OF CONCRETE BY PARTIAL REPLACEMENT OF INGREDIENT MATERIALDownload Article

    Prof. M. Esakimuthu

    Abstract

    close

    Concrete is a mixture of cement, fine aggregate, coarse aggregate and water. Concrete plays a vital role in the development of infrastructure viz., buildings, industrial structures, bridges and highways etc. leading to utilization of large quantity of concrete. The performance of marble powder, quarry dust and marble chips combinations is expected to give better results than conventional constituents of normal mixing. Leaving the waste materials to the environment causes environmental problem. Hence the reuse of waste has been emphasized. In this paper an experimental study has been done to investigate the use of marble powder, quarry dust and marble chips as a partial replacement for cement, fine and coarse aggregate in concrete respectively. The compressive strength, tensile strength and flexural strength test of concrete was conducted. It is proposed to conduct the above test to verify whether the above combination will improve the strength of the concrete substantially compared to normal mix concrete.

  6. WASTE PLASTIC ALTERNATIVE FUELSDownload Article

    C.Sakthivel, S.Sakthivel, M.Balaji

    Abstract

    close

    This process involves catalytic degradation of waste plastic into fuel range hydrocarbon i.e. petrol, diesel and kerosene etc. A catalytic cracking process in which waste plastic were melted and cracked in the absence of oxygen and at very high temperature, the resulting gases were cooled by condensation and resulting crude oil was recovered. From this crude oil various products petrol, diesel and kerosene etc. Can be obtained by distillation. This process mainly consists of four main parts: Reacting vessel or reaction chamber, Condensation unit Receiving unit Distillation unit. More specifically the degradation of waste plastic except polyvinyl chloride (PVC) and polyethylene terephthalate (PET) over two commercial grade cracking catalysts, containing 20% and 40% ultra-stable Y zealot, respectively hydrocarbons, was studied in a semi-batch reactor. Also the effect of polymer catalyst ratio was studied on the formation of liquid. The best results were obtained when polymer catalyst ratio was 4:1 and after this ratio the liquid yield decreases. Furthermore alternate method for disposal of waste plastic is also studied. And the results of this process are found to be better than other. Keywords: polyvinyl chloride, crude oil, oxygen.

  7. RECYCLED PAVEMENT BLOCKSDownload Article

    Prof. M. Esakimuthu

    Abstract

    close

    Concrete paving blocks are ideal materials on the footpaths and roads for easy laying, better look and finish. In this paper, a parametric experimental study for producing paving blocks using waste steel aggregates (the form of rounded bearings of size 6.35 mm) is presented. Waste steel bearings are added in concrete of paver blocks in various percentages. Rubber pads are also used below the paver blocks. Impact strength of paver blocks with various percentages of waste steel aggregates and using rubber pads is investigated. Test results show that combination of using rubber pads and adding various percentages of waste steel aggregates in paver blocks gives upto 50% more impact strength than ordinary paver blocks. Index Terms- Waste Steel Aggregates, Compressive Strength, Flexural Strength, Concrete Interlocking Paving Blocks, Impact Test.

  8. AN ADEPT METHOD TO DETECT AND TRACEBACK DDoS ATTACKS IN WIRELESS NETWORKS USING PACKET FLOW ANALYSISDownload Article

    S.Sathishkumar, Dr.C.Senthil Singh

    Abstract

    close

    The recent past has entered into an era of implementing wireless networks for the better beneficiary outcomes when compared to that of traditional wired networks. The support that the wireless networks provide in connectivity, availability of resources and cost wise comparisons has made them more popular. However there have been certain limitations to the open nature of the wireless framework in terms of security and confidentiality. Better the security measure yields an even stronger attack. The most prominent attack of the wireless network is the Denial-of-Service attack. These attacks tend to alter the legitimate communication between the service provider and the requester, by sending unwanted and meaningless data into the medium. Traceback mechanisms try to identify andblock the attackers from proceeding. Evaluation of these mechanisms depends on the level of how well they try to keep the attackers beyond the normal functionalities of the wireless network. This paper is dedicated to estimate the variations in the normal and attack traffic in the wireless networks. Key Words: Network security, Trace back, DoS attacks

  9. ROUTING AND MISBEHAVIOUR DETECTION MECHANISM IN DISRUPTION TOLERANT NETWORKS (WSN)Download Article

    Manojkumar K, Dr.C.Senthil Singh

    Abstract

    close

    Network security has focused primarily on protecting communication and network resources. It involves the authorization of access to data in a network which is controlled by a network administrator. Security incidents are rising at an alarming rate every year. As the complexity of the threats increase, so do the security measures required to protect networks. Denial of Service (DoS) attacks constitutes one of the major threats and among the hardest security problems in today's Internet. DoS are the disruption of services by attempting to limit access to a machine or service instead of subverting the service itself. The DDoS attack is the most advanced form of DoS attacks. It is distinguished from other attacks by its ability to deploy its weapons in a ‗‗distributed‘‘ way over the Internet and to aggregate these forces to create lethal traffic. DDoS attacks never try to break the victim's system, thus making any traditional security defense mechanism inefficient. The main goal of a DDoS attack is to cause damage on a victim either for personal reasons, either for material gain, or for popularity.

Sign in

Registered and Approved by National Science Library (NSL),National Institute of Science Communication And Information Resources(NISCAIR),
Council of Scientific and Industrial Research,New Delhi, India"