Articles

  1. AN EFFICIENT PRIVACY PROTECTION METHOD FOR RAIN CLOUD COMPUTINGDownload Article

    S.Rajpriya, S.Jagadeesan

    Abstract

    close

    Cloud computing is an evolving term for anything that involves delivering hosted services over the Internet. In cloud environment, data security and privacy is consistently a major issue due to outsourcing organizational sensitive information into cloud. In order to carry out privacy protection causes enormous operating cost. Thus it is a serious issue to achieve the most suitable protection to turn down performance utilization while present privacy protection. In this paper, the Efficient Privacy Protection method (EPPM) is proposed to afford the suitable privacy protection which is fulfilling the user demand privacy constraint and maintaining system performance all together. First, we analyze the privacy level as per user requirement and compute security degree and also encryption algorithms performance. Then, suitable security work is derived by the outcome of analysis and quantified data. Lastly, in different cloud environments the EPPM not only fulfills the user-demand privacy but also maintains the cloud system performance is shown by the simulation results. The EPPM results in 30%-50% when compared to other security methods.

  2. BRAINGATE TECHNOLOGY Download Article

    Ramoju Kishore Kumar, D. Pratyusha, N.Sriram

    Abstract

    close

    BrainGate is a brain implant system developed by the bio-tech company Cyber kinetics in 2003 in conjunction with the Department of Neuroscience at Brown University. It is a pseudo controlling mechanism through a computer chip. This system is to help those who have lost control of certain bodily functions, such as a patient with ALS, with spinal cord injury to operate various gadgets such as light, fan and etc. It monitors brain activity in patient and converts intention of the user into computer commands so this commends helps in control of robotic arm or a cursor on screen. In order to achieve this various instruments have been used such as chip, digitizer (external processor), decoder etc. and finally remarkable breakthrough offers hope that people who are paralyzed will one day be able to independently operate artificial limbs and wheel chair. The idea of moving prosthetic devices not by manual control, but by “thinking” has been a fascinated approach.

  3. EXPERIMENTAL ANALYZATION AND OPTIMIZATION OF SINGLE CYLINDER DIESEL ENGINE FOR PONGAMIA BIO DIESEL BLENDS BY USING TAGUCHI METHODDownload Article

    1M. Ezhilarasan, 2Dr. K. Sundaramurthy

    Abstract

    close

    The main aim of this project is to find the effective compression ratio of direct injection (DI) single cylinder Variable Compression Ratio (VCR) diesel engine with respect to brake power , fuel economy and emissions through experimental investigations and design of experiments (DOE) method. The experiments are carried out with Pongamia Methyl ester biodiesel with different combinations like 10%, 15%, 20% under three levels and the responses brake power, fuel economy and emissions were investigated. The optimum values of the response could be predicted using Signal - Noise ratio(S/N ratio) and optimum combination of control parameters were specified. Using Taguchi method an inverted L9 orthogonal array has been utilized to determine the engine test trials layout. In order to maximize the performance of Pongamia Methyl ester biodiesel engine the signal to noise ratio (SNR) related to higher the-better (HTB) quality characteristics has been used. It is found that, at compression ratio of 18:1 for A20 blended fuel (20%PME+80%Diesel) shows better performance which is very close to neat diesel fuel. It is also found that the increase of compression ratio increases the BTE and reduces BSFC and having lower emission without any engine in design modifications. Keywords: Wear Diesel engine; Compression ratio; performance; methyl ester of Pongamia oil.

  4. A COMPATIBLE VOIP, FIREWALL AND E-MAIL SERVER IMPLEMENTATION USING RASPBERRY PIDownload Article

    R.Mohanraj, Dr.V.K.Manavalasundaram

    Abstract

    close

    Network is a group of more than two computers linked together. Network computer devices that originate, map and transfer of data are known as network nodes. Firewall is used to prevent the entire computer network and monitors the both incoming and outgoing packets. It also enables the content filtering, mac based ip for the network computers. E-mail servers are the communication providing and controlling area for exchanging the data between the users in an institution or organization. A new server is developed with VoIP, Firewall and E-mail server are implemented in a raspberry pi board which makes the implementation and maintenance of the server easy. VoIP is use to provide a free voice call and a video call with conference facility between the users in an intranet. Firewall makes the server as more secure from the unauthorized users from outside network. It provides the mac based ip allocation so the devices will accept only one user to access. E-mail server is implemented to avail e-mail facility between the institution/organization. Each user has their unique id and the storage space depends upon their priority. This server is of compatible size so it is easy to carry and install in any network.

  5. PREVENT FOREST FIRE ATTACK MODEL FOR SOCIAL NETWORK USING MULTI TRUST ALERT AUTHENTICATION CODE TECHNIQUESDownload Article

    E.NehruJagadesh, K.E.Eswari

    Abstract

    close

    In recent times, verifying users with the help of their friends (i.e., trustee-based social authentication) has been shown to be aauspicious backup authentication mechanism. A user in this system is connected with a few trustees that were selected from the user’s friends. When the customer/user wants to recover access to the account, the service provider sends dissimilar verification codes to the user’s trustees. The user must obtain at least k (i.e., recovery threshold) verification codes from the trustees before being directed to reset his or her password. The first systematic study about the security of trusteebased social authentications is presented in this paper. In specific, a novel framework of attacks, which we call forest fire attacks are introduced. In these attacks,by exploiting trustee-based social authentications an attacker initially obtains a small number of compromised users, and then the attacker iteratively attack the rest of users. Then, we construct a probabilistic model to formalize the threats of forest fire attacks and their costs for attackers. Moreover, various defense strategies are discussed. Finally, the proposed framework is put onto extensively evaluate various concrete attack and defense strategies using three real-world social network datasets. The results have strong implications for the design of more secure trustee-based social authentications.

  6. LIPS RECOGNITION BASED CLASSIFICATION APPROACH TO TALKER DIARIZATION ON TV TALK-SHOWSDownload Article

    S.Kannan, K.E.Eswari

    Abstract

    close

    Speaker diarization is the job of determining “who spoke when?” in an audio or video recording that contains an unknown quantity of speech and also an unidentified number of speakers. In the speaker diarization technique can be used to determine the speech part and non-speech part of the recordings. There are dissimilar loom can be estimated for speaker diarization. Accordingly, many important improvements in accuracy and robustness have been reported in journals and conferences in the area. It can be applicable on multiple distant microphones and single distant microphones. In this article, we propose solutions to the problem of speaker diarization of TV talk-shows, a problem for which adapted multimodal approaches, relying on other streams of data than only audio, remain largely under exploit ed. Hence we propose an original system that leverages prior knowledge on the structure of this type of content, especially the visual information relating to the active speakers, for an improved diarization performance.

  7. CENTRALIZED VOTING SYSTEM USING FINGERPRINTDownload Article

    M.Ranjith, Mr.S.Sadesh

    Abstract

    close

    The constituencies are provided with separate server. The votes of that constituency are recorded in the server. Polling booths are connected to the server via internet, this enables the voter to vote from any one of the polling booth. Voters are provided with separate username and password. Finger prints are used for authentication of the voter. A biometric verification technique which uses two separate biometric features, combined to obtain a unique identifier of the individual. A combined biometric approach consists of storing features of two fingers, and imprints from both fingers are required in the user validation process, lowering the risk of misuse and privacy loss. By storing the combined template of minutiae, the complete minutiae feature of a single fingerprint will not be compromised even when the database is stolen. It is difficult for the attacker to distinguish the original minutiae templates from combined minutiae template. This will increase the security to the stored finger print. Each user can able to vote only once. Finally the results are announced as soon as the polling gets completed.

Sign in

Registered and Approved by National Science Library (NSL),National Institute of Science Communication And Information Resources(NISCAIR),
Council of Scientific and Industrial Research,New Delhi, India"