IJET -Volume 3, Issue 4 , July - August 2017
S.No
|
Title/Author Name
|
Serial No
|
11 |
Public Auditing for Shared Cloud Data with Group User Revocation
- N.Gayathri , Dr.A.Nagarajan
Abstract
In cloud computing data to be shared in cloud, in the process to be performed in sharing data to be secure manner in publically, revocation to be used for the purpose of existing user to revoked resign that the process of entering to the cloud then getting data and upload the information from the cloud. In this concept, we propose it is cloud audit the efficient by the revocation user. More proxy a signature by resign by the existing users, public auditing it is a shared data to be verifiable, it is no need without process of sharing data from cloud, in this mechanism batch auditing verify multiple auditing simultaneously, multiple it is the performance to be highly efficient in the asymmetric key algorithm to be used securely performed. It is the purpose of easily get the information from the cloud sequentially, experimentally results do that improve efficiency in user revocation. Keyword: Shared Data, Revocation, Public Auditing, Revoked Signature.× N.Gayathri , Dr.A.Nagarajan , " Public Auditing for Shared Cloud Data with Group User Revocation" Vol. 3 - Issue 4 ( 73 - 80 ) - July - August 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I4P11 |
12 |
Confidential E-Voting System Using Face Detection and Recognition
- Aanjana Devi.S , Dr.Palanisamy.V , Anandha Jothi.R
Abstract
In any developing country democracy plays an important role where a leader for a country is elected by the citizen. One of the main issues in the conventional voting system is that it consumes lots of man-power as well as resources and the preparation have been started many days before the commencement of the election. During this preparation some people may involve in illegal arrangement with each other or try to replace with their henchmen in this process to win the election. It is a confidential process so it must be transparent, Meddle-Proof, Usable, Authenticated, Accurate, Verifiability and Mobility. There are some drawbacks in conventional voting system such as damage of machines, chances of violence, dummy voting and problem of proper monitoring. Manual voting system has been followed in many parts of our country so people could not poll their vote because it is place oriented and there is region wise distribution, voters need to reach the place of voting. To overcome these problems a new confidential E-Voting system is introduced which provides security to the election system by detection and recognising voter’s face who is going to cast his/her vote. In this system the voter’s face is detected, captured and stored in the database then match the captured image with the image already stored on database to recognise the person. If match occurs then the person is allow to cast their vote once the vote is casted the same person will not be permitted to cast votes this provide security against duplicate vote and fraudulent and make the system more efficient and user friendly. Keyword: Accurate, Authentication, Eigen face , Viola Jones algorithm.× Aanjana Devi.S , Dr.Palanisamy.V , Anandha Jothi.R , " Confidential E-Voting System Using Face Detection and Recognition" Vol. 3 - Issue 4 ( 81 - 85 ) - July - August 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I4P12 |
13 |
Neural Networks for Shortest Path Computation and Routing in Computer Networks
- R.Karthikeyan, Dr.T.Geetha , Thamaraiselvi V , Tharani V
Abstract
Many intellectual optimization performances like Artificial Neural Networks (ANN),Genetic Algorithms (GAs), etc., were being planned to find the stagnant shortest path. Rapid expansions in the wireless communication predominantly in the field of mobile networks havematerialized as two major fields namely Mobile Ad hoc Networks (MANETs) and Wireless Sensor Networks (WSN). Topology elusiveness is the top most challenge in the mobile wireless network field i.e., the network topology changes over time due to energy conservancy or node mobility. In order to find the shortest path (SP) with in this network becomes a dynamic optimization problem due to nodes mobility. Nodes usually die due to low energy or it may move, this scenario makes the network to be more complex for finding shortest path. In this paper we propose a novel method of using Genetic Algorithms (GAs) to solve the dynamic shortest path discovery and routing in MANETs. MANETs is one of the faster growing new-generation wireless networks. The tentative results indicate that this GA based algorithm can quick adapt to environmental change (i.e. the network topology change) and create high quality solutions after each change. Keyword: - - -.× R.Karthikeyan, Dr.T.Geetha , Thamaraiselvi V , Tharani V , " Neural Networks for Shortest Path Computation and Routing in Computer Networks" Vol. 3 - Issue 4 ( 86 - 91 ) - July - August 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I4P13 |
14 |
Mechanical Engineering in Ancient Egypt, Part 53: Farming Tools
- Galal Ali Hassaan
Abstract
This paper is the 53rd research paper in a series investigating the evolution of mechanical engineering in ancient Egypt.It tries to achieve this purpose through investigating the farming tools during the ancient Egyptian Predynastic and Dynastic times. It outlines the farming techniques used by ancient Egyptians between land ploughing and grain storage. Extensive examples from different eras are presented for each process outlining the tools used and their location and time span.. Keyword: Mechanical engineering; ancient Egypt; farming tools; ploughing; sowing; irrigation; harvesting; transportation; threshing; winnowing; grain storage.× Galal Ali Hassaan, " Mechanical Engineering in Ancient Egypt, Part 53: Farming Tools" Vol. 3 - Issue 4 ( 92 - 111 ) - July - August 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I4P14 |
15 |
Analyzing the Behavior of Electricity Consumption Using Hadoop
- Dr. Mohammed Abdul Waheed, Samreen Sultana
Abstract
In a competitive retail market, large volumes of smart meter data provide opportunities for load serving entities to enhance their knowledge of customers’ electricity consumption behaviors via load profiling. Instead of focusing on the shape of the load curves, this paper proposes a novel approach for clustering of electricity consumption behavior dynamics, where“dynamics” refer to transitions and relations between consumption behaviors, or rather consumption levels, in adjacent periods. First, for each individual customer, symbolic aggregate approximation is performed to reduce the scale of the data set, and time-based Markov model is applied to model the dynamic of electricity consumption, transforming the large data set of load curves to several state transition matrixes. Second, a clustering technique by fast search and find of density peaks (CFSFDP) is primarily carried out to obtain the typical dynamics of consumption behavior, with the difference between any two consumption patterns measured by the Kullback–Liebler distance, and to classify the customers into several clusters. To tackle the challenges of big data, the CFSFDP technique is integrated into a divide-andconquer approach toward big data applications. A numerical case verifies the effectiveness of the proposed models and approaches. Keyword: Load profiling, big data, Markov model, electricity consumption, behavior dynamics, distributed clustering, demand response.× Dr. Mohammed Abdul Waheed, Samreen Sultana , " Analyzing the Behavior of Electricity Consumption Using Hadoop" Vol. 3 - Issue 4 ( 112 - 115 ) - July - August 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I4P15 |
16 |
Microcontroller Based Coin Counter with Segregator and Packing System
- Marjun S. Sequera , Christine Marie J. Madrid , Cozzete Ebora , Kent Excel Lagare , Mark Dariel Laid , Keno Lamaclamac , Vhynne Clyve Llamis , Cayetano Moreto III, Mary Katheleen Panaligan
Abstract
This study is focused on providing automation and elimination of errors occurring in coin sorting and handling. This study usestheGizduino ATMEGA 328 microcontroller and Arduino programming language respectively. The machine will only process the Philippine peso coins: one peso, five peso and ten peso. The final output of the system is the packed twenty pieces of coins of the three denomination mentioned. The machine passed the over all evaluation of the committee. Hence the result indicates that the machine is of good quality evidently to be technically and physically functional, capable of performing its system process. Keyword: coin sorting, coin segregator, automated coin packing× Marjun S. Sequera , Christine Marie J. Madrid , Cozzete Ebora , Kent Excel Lagare , Mark Dariel Laid , Keno Lamaclamac , Vhynne Clyve Llamis , Cayetano Moreto III, Mary Katheleen Panaligan , " Microcontroller Based Coin Counter with Segregator and Packing System " Vol. 3 - Issue 4 ( 116 - 123 ) - July - August 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I4P16 |
17 |
Personal Identification with Human Iris Recognition Based on EMD
- Shubhangi D C , Nageshwari Anakal
Abstract
Iris recognition is an invasive biometric technique used to identify human being. Iris is defined as annular region between pupil and sclera of human eye which exhibits extraordinary texture that is unique for each individual. Hence, imposes various challenges in accurate iris segmentation and feature extraction techniques to provide many opportunities for researchers in pursuing their research work in this area. The iris is a stable biometric trait that has been widely used for human recognition in various applications. However, deployment of iris recognition in forensic applications has not been reported. A primary reason is the lack of human friendly techniques for iris comparison. To further promote the use of iris recognition in forensics, the similarity between irises should be made visualizable and interpretable. Building on this framework, we propose a new approach for detecting and matching iris for personal identification process. we adopt a matching model based on the Earth Mover’s Distance (EMD). Our approach outperforms the known visible-feature-based iris recognition method on three different data sets. In particular, our approach achieves over 22% higher rank one hit rate in identification, and over 51% lower equal error rate in verification. In addition, the benefit of our approach on multi-enrollment is experimentally demonstrated. Keyword: Human Identification, biometrics, Iris, forensics, visible feature.packing× Shubhangi D C , Nageshwari Anakal , " Personal Identification with Human Iris Recognition Based on EMD " Vol. 3 - Issue 4 ( 124 - 128 ) - July - August 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I4P17 |
18 |
An Insight into Virtual Private Networks & IP Tunneling
- Karthikeyan R, Dr.T.Geetha , Sathya G , Aarthi V
Abstract
Virtual Private Network used to create an end-to-end tunnel over third-party networks such as the Internet or extranets. It cannot guarantee that the information remains secure while traversing the tunnel. There are many different types of VPN technologies available such as Internet Protocol Security, SSL, MPLS, L2F, PPTP, L2TP and GRE. IPSec has become a much more popular VPN security. A Virtual private network possesses all the features of the private network and is built on existing network, but they suffer severe security problems, particularly authentication problem. AVirtual private network possesses all the features of the private network and is built on existing network, but they suffer severe security problems, particularly authentication problem. This paper introduces a authenticated key agreement protocol based on certificateless cryptography to authenticate users to establish a secure session between them. Keyword: - - - × Karthikeyan R, Dr.T.Geetha , Sathya G , Aarthi V , " An Insight into Virtual Private Networks & IP Tunneling " Vol. 3 - Issue 4 ( 129 - 133 ) - July - August 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I4P18 |
19 |
Secure Online Voting System Using Voice Activity Detection Algorithm in Biometrics
- S. Nasrin , Dr.V. Palanisamy, R. Anandha Jothi
Abstract
This paper concentrates on biometric based electronic voting machine. Biometric is utilized to recognize the individual depend on upon their physiological and behavioral characteristics. We utilize exclusive voice acknowledgment for ID. A voice acknowledgment framework is intended to distinguish a director voice. By using VB.NET programming for coding the voice acknowledgment, the executive voice can be confirmed. The key is to convert over the speech waveform to a sort of parametrically representation for further examination and preparing. An extensive variety of potential outcomes exist for parametrically speaking to the discourse motion for the voice recognition framework such as �V.A.D� (�Voice Activity Detection�). The input voice flag is recorded and PC will contrast the flag and the flag that is put away in the database by using VAD technique. The voice construct biometric recognition is based with respect to single word recognition. An administrator articulates the secret word once in the instructional course in order to prepare and put away. In testing session, the clients can express the secret key again with a specific end goal to accomplish acknowledgment if there is a match. By utilizing VB.NET programming, the yield can get either the client is being perceived or dismisses. From the consequence of testing the framework, it effectively perceives the particular client's voice and rejected other clients' voice. This paper deals with the exactness of the entire framework effectively perceiving the client's voice. It is a medium extent of the security level structure. Keyword: Biometrics, Voice activity detection (VAD) Algorithm, voice recognition. × S. Nasrin , Dr.V. Palanisamy, R. Anandha Jothi , " Secure Online Voting System Using Voice Activity Detection Algorithm in Biometrics " Vol. 3 - Issue 4 ( 134 - 139 ) - July - August 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I4P19 |
20 |
The Effects of Grape Seed Powder and Extract on Quality of Fermented Turkish Sausage
- Zeynep Koc
Abstract
In this study, the effects of seed powder and extracts of two different grape varieties (Razaki and Black Gemre) on the maturation stage quality properties of Fermented Turkish sausage was investigated. Thiobarbituric acid (TBA), pH and color change characteristics of Fermented Turkish sausage have been investigated. TBA was influenced by grape seed extract on the 12th day of maturation in comparison to the control. The lowest value for different days of fermentation was obtained from 2000 ppm dosage of Black Gemre grape extract. In fermented Turkish sausage, pH were not significantly affected by supplemental grape seed powders and extracts. Color change in sausages with grape seed powder and extract was (L) slight bright, (a) slight reddish and (b) slight yellow. It has been concluded that grape seed powder and extract may be suitable for use as an antioxidant agent to prevent degradation of sausage by oxidation. Keyword: Grape seed powder and extract, Lipid oxidation, Fermented Turkish sausage. × Zeynep Koc , " The Effects of Grape Seed Powder and Extract on Quality of Fermented Turkish Sausage " Vol. 3 - Issue 4 ( 140 - 145 ) - July - August 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I4P20 |