International Journal of Engineering and Techniques
IJET -Volume 3, Issue 3, May - June 2017
S.No
|
Title/Author Name
|
Serial No
|
11 |
Trust is good Control is Better- Creating Secure Clouds by Continuous Auditing
- S.Deepalakshmi , E.Dilipkumar
Abstract
Cloud service certifications (CSC) attempt to assure a high level of security and compliance. However, considering that cloud services are part of an ever-changing environment, multi-year validity periods may put in doubt reliability of such certifications. We argue that continuous auditing (CA) of selected certification criteria is required to assure continuously reliable and secure cloud services, and thereby increase trustworthiness of certifications. CA of cloud services is still in its infancy, thus, we conducted a thorough literature review, interviews, and workshops with practitioners to conceptualize architecture for continuous cloud service auditing. Our study shows that various criteria should be continuously audited. Yet, we reveal that most of existing methodologies are not applicable for third party auditing purposes. Therefore, we propose a conceptual CA architecture, and highlight important components and processes that have to be implemented. Finally, we discuss benefits and challenges that have to be tackled to diffuse the concept of continuous cloud service auditing. We contribute to knowledge and practice by providing applicable internal and third party auditing methodologies for auditors and providers, linked together in a conceptual architecture. Further on, we provide groundings for future research to implement CA in cloud service contexts. Keyword: - - .× S.Deepalakshmi , E.Dilipkumar , "Trust is good Control is Better- Creating Secure Clouds by Continuous Auditing" Vol. 3 - Issue 3( 63-67 ) - May - June 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I3P11 |
12 |
A Recommendation System for Legal Semantic Web
- Narendra Kumar , Dr. Pankaj Kumar
Abstract
Recommendation systems can take advantage of semantic reasoning-capabilities to overcome common limitations of current systems and improve the recommendations’ quality. In this paper, we present a personalized-recommendation system, a system that makes use of representations of items and user-profiles based on ontologies in order to provide semantic applications with personalized services. The absence of super ordinate authorities having full access and control introduces some serious issues requiring novel approaches and methods. The role of web semantics here is that we introduce intelligent matching of the court case details. The search is not only thorough but also accurate and precise to the maximum level of attainment with the use of ontology designed exclusively for this purpose. Keyword: Legal Web, Legal Decision Making, Legal Ontology, Law Search. .× Narendra Kumar , Dr. Pankaj Kumar , "A Recommendation System for Legal Semantic Web" Vol. 3 - Issue 3( 68-74 ) - May - June 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I3P12 |
13 |
Automated Predictive Big Data Analytics Using Ontology Based Semantics
- Karthikeyan R , Dr.T.Geetha , Vasanthakumar K , Vetrivel A
Abstract
Study the growth history of galaxies by following their 'merger trees' in large-scale astrophysical simulations. The service uses the addition of lambda expressions and the Stream API in Java 8, Java has gained a powerful and expressive query language that operates over in-memory collections of Java objects, making the transformation and analysis of data more convenient. There is much enthusiasm currently about the possibilities created by new and more extensive sources of data to better understand and manage cities. Here, I explore how big data can be useful in urban planning by formalizing the planning process as a general In this paper we discuss Pig SPARQL, a competitive yet easy to use SPARQL query processing system on Map Reduce that allows adhoc SPARQL query processing on large RDF graphs out of the box. Instead of a direct mapping, Pig SPARQL uses the query. Keyword: - - - .× Karthikeyan R , Dr.T.Geetha , Vasanthakumar K , Vetrivel A , "Automated Predictive Big Data Analytics Using Ontology Based Semantics" Vol. 3 - Issue 3( 75-81 ) - May - June 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I3P13 |
14 |
THE SYBIL ATTACK
- Dr.T.Geetha , Karthikeyan R , Kannusamy V , Kumaravel V
Abstract
The emergence of sensor networks as one of the dominant technology trends in the coming decades has posed numerous unique challenges to researchers. These networks are likely to be composed of hundreds, and potentially thousands of tiny sensor nodes, functioning autonomously, and in many cases, without access to renewable energy resources. Cost constraints and the need for ubiquitous, invisible deployments will result in small sized, resource-constrained sensor nodes. While the set of challenges in sensor networks are diverse, we focus on security of Wireless Sensor Network in this paper. We propose some of the security goal for Wireless Sensor Network. Further, security being vital to the acceptance and use of sensor networks for many applications; we have made an in depth threat analysis of Wireless Sensor Network. We also propose some countermeasures against these threats in Wireless Sensor Network. Keyword: Wireless Sensor Network (WSN), Security.× Dr.T.Geetha , Karthikeyan R , Kannusamy V , Kumaravel V , "THE SYBIL ATTACK" Vol. 3 - Issue 3( 82-88 ) - May - June 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I3P14 |
15 |
Vane Plate Placement Error Detection Using Machine Vision
- Annu Kumari
Abstract
The main objective of this thesis is to understand, how machine vision can be efficiently applied to detect the directional placement error of the vane plates in the rotor of the “Vane pump” and also to detect the non-placement error of the vane plate of the rotor. Though the plates can be inserted manually, but many a times due to repetitive operation there might be errors caused which can simply be eliminated by using a simple machine vision system during testing process after assembly of the vane plates in the rotor. This is basically carried out to help the manufacturing industries, solve their simple yet, critical problems easily. Due to which one can easily minimize the loss of cycle time and economy, as a result there would be tremendous increase in the production. Keyword: Machine vision, Cognex vision system, Rotor, Vane plate, Lens, Laser sensor.× Annu Kumari , "Vane Plate Placement Error Detection Using Machine Vision " Vol. 3 - Issue 3( 89-95 ) - May - June 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I3P15 |
16 |
A Review of Multiple Layer Security of Cloud Server
- Dr. Sandeep Dalal ,Neetu Rani
Abstract
Cloud services are offering the flexible and scalable services. But there is always issue of security. When data is transferred from centrally located server storage to different cloud the compromise of person and private data would increase. There is always risk to the confidentiality and availability of data prior to selecting a cloud vender or choosing own cloud and cloud service migration. Cloud services usually have their security concerns that must be addressed. In this paper we have discussed the threats to cloud service and data in case of conventional security system and modern security system and proposed an idea to secure data on cloud using multiple layers of security. Keyword: - - -.× Dr. Sandeep Dalal , Neetu Rani "A Review of Multiple Layer Security of Cloud Server " Vol. 3 - Issue 3( 96-99 ) - May - June 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I3P16 |
17 |
A Modified Two Switched-Inductor QUASI Z-Source Inverter
- V.Malathi
Abstract
In this paper, the technique of bootstrap capacitor is applied to the (cSL-qZSI) topology to improve its features such as increasing its total gain and minimizing the total stress across the used component Using switched inductor principle has improved the boosting gain of the applied topology at the same shoot through duty cycle (D) compared with the convention one. This also leads to operate at higher modulation index (M) and so low stress over the components is resulted. Switched inductor cell is applied to classic qZSI topology instead of the two main inductors to give anew topology that has been called a continuous input current switched inductor quasi Z-Source Inverter (cSL-qZSI). Keyword: Z source inverter, bootstrap capacitor, Voltage gain.× V.Malathi "A Modified Two Switched-Inductor QUASI Z-Source Inverter" Vol. 3 - Issue 3( 100-107 ) - May - June 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I3P17 |
18 |
Modeling and Simulaton of Three Stage Interleaved Boost Converter Based Wind Energy Conversion System
- S.Lavanya
Abstract
This paper deals with modeling and simulation of three stage interleaved boost converter (ILBC) based induction motor drive fed from wind generator. The output of wind generator is converted into DC using a three phase uncontrolled rectifier. This voltage is boosted by using ILBC with reduced current ripple with three stages ILBC is proposed for this purpose. The output of the ILBC is converted into three phase balanced ac using a three phase inverter, which feeds a three phase induction motor. The simulation results for single pulse width modulation (PWM), sine PWM and space vector modulation (SVM) are presented. Keyword: Wind energy conversion system, interleaved boost converter, induction motor load.× S.Lavanya " Modeling and Simulaton of Three Stage Interleaved Boost Converter Based Wind Energy Conversion System " Vol. 3 - Issue 3( 108-114 ) - May - June 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I3P18 |
19 |
Voltage Stability Analysis by Simulated Annealing Algorithm
- M.Jayanthi , K. Anisha
Abstract
Power system is facing new challenges as the present system is subjected to severely stressed conditions. In order to avoid systemblackouts, power system is to be analyzed in view of voltage stability for a wide range ofsystem conditions.In voltage stability analysis, the main objective is to identify the system maximumloadability limit and causes of voltage instability.In this study, critical bus values in a power system are determined by using Simulated Annealing (SA) algorithm.Firstly, load value of the selected load bus is augmented step-by-step and load flow analysis is done for each case. This process iscontinued till there is no solution and in this way the critical bus values that are limit values of voltage stability are obtained.This study demonstrates the use of minimum singular value method order to determine the maximum loadability in power system.The reactive power at a particular bus is increaseduntil it reaches theinstability point at bifurcation. At this instability point, the connected load loadability. Secondly, by using SA algorithm, maximum loadability limit are directly determined without increasing the load of the selected load bus. The results show that the critical values can be easily determined using SA.This technique is tested on the IEEE-57 bus system. Keyword: Maximum loadability, Simulated Annealing, Voltage collapse, Stability index.× M.Jayanthi , K. Anisha " Voltage Stability Analysis by Simulated Annealing Algorithm " Vol. 3 - Issue 3( 115-121 ) - May - June 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I3P19 |
20 |
Result Paper on Protecting confidential information in POC System ECG Steganography
- Miss.Ankita K.Ramekar, Prof.M.A.Pund
Abstract
This paper proposes the development of Secure system for secret data communication through encrypted data hiding in ECG signals. The proposed encryption technique used to encrypt the secret data into unreadable form and enhances the safety of secret carrier information by making the information inaccessible to any intruder having a random method. After data encryption, the data hider will hide the secret data into the ECG signal coefficients. Although encryption achieves certain security effects, they make the secret messages unreadable and unnatural or meaningless. This is the reason a new security approach called reversible data hiding arises. It’s art of hiding the data in another transmission medium to get secret communication. It does not replace cryptography but rather boosts the security using its obscurity features. Here the DWT(Discrete Wavelet Transform) is used to decompose an ECG signal to different frequency sub bands. Hence, patients ECG signal and other readings such as blood pressure, glucose reading, position,etc., are collected at home by using Body Sensor Networks (BSNs) will be transmitted and diagnosed by remote patient monitoring systems. At the same cost that the patient privacy is protected against intruders while data traverse in open network and stored in hospital servers. In this project, to fulfill HIPAA act, a Discrete Wavelet Transform based steganography technique has been proposed. DWT technique allow ECG signal to put out of sight the patient confidential data and thus guarantees the patient’s privacy and confidentiality. Keyword: ECG, Steganography, Encryption, Wavelet, Watermarking, Confidentiality.× Miss.Ankita K.Ramekar, Prof.M.A.Pund " Result Paper on Protecting confidential information in POC System ECG Steganography " Vol. 3 - Issue 3( 122-128 ) - May - June 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I3P20 |