IJET -Volume 3, Issue 6 , November - December 2017
S.No
|
Title/Author Name
|
Serial No
|
21 |
Optimization of an Innovative Gaseous and Particulates Monitoring Device of Air Quality Set within National Ambient Air Quality Standards (NAAQS) in the Barangay of Villanueva, Misamis Oriental
- Kathleen E. Padrigalan , Erich P. Abad , Jay E.salvador
Abstract
This study is collaboration with Environmental Science and Technology (EST) and Electronics and Communication Technology (ECT) students. The study outline to a descriptive-comparative and experimental type, because the Innovated Automatic Utility Model were used to assess the air quality in the Brgy. Tambobong and Brgy. Balacanas, Villanueva, Misamis Oriental. It emphasizes the automation process of which the device will detect the air quality and automatically compare the detected values with the National Ambient Air Quality Standards (NAAQS) and set an alarm if it exceeds set standards. It is beneficial for the residents and its neighboring barangays, because it was given awareness to the people as to quality of air where the public are breathing. The health of the people of the barangay is the prime concern of this study. The study is designed to withstand different weather condition present in the community. The device is a Solar Panel based that has a 5 Volt output, with a battery as backup supply during night time. The prototype design uses sensors that could detect certain pollutant, these sensors are wired to a Micro-controller and programmed to allow the device to give real-time output based on the air pollutants present in the atmosphere and compare the reading with the given National Ambient Air Quality Standards (NAAQS). The prototype is operating twenty four (24) hours and seven (7) days a week to monitor and asses the air quality of the said Barangay. This study presumes to be reliable to monitor the quality of the air. Furthermore, this study aims the awareness on the community of the hazardous pollutants. Keyword: Innovated Automatic Utility Model, National Ambient Air Quality Standards (NAAQS), Solar Panel, Micro-controller.× Kathleen E. Padrigalan , Erich P. Abad , Jay E.Salvador,"Optimization of an Innovative Gaseous and Particulates Monitoring Device of Air Quality Set within National Ambient Air Quality Standards (NAAQS) in the Barangay of Villanueva, Misamis Oriental"Vol. 3 - Issue 6 ( 136 - 143 ) - November - December 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I5P21 |
22 |
Utilizer-Accommodation Rating Prognostication by Exploring Gregarious User's Rating Comportments
- Mohammad Naheed Tabasum ,Ramchandar Rao , I. Narasimha Rao
Abstract
This paper is the 57th research paper in a series investigating the evolution of mechanical engineering in ancient Egypt. It tries to achieve this purpose through investigating the footwear industry through the Dynastic Periods. It outlines the footwear designs and production techniques used by the ancient Egyptians. Types of footwear are covered with extensive examples from different eras highlighting the characteristics of each footwear. Used materials are assigned (if available) to complete the design requirements in any age including the present days. Keyword: Mechanical engineering; ancient Egypt; footwear industry, sandals, shoes.× Mohammad Naheed Tabasum ,Ramchandar Rao , I. Narasimha Rao,"Utilizer-Accommodation Rating Prognostication by Exploring Gregarious User's Rating Comportments"Vol. 3 - Issue 6 ( 144 - 149 ) - November - December 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I5P22 |
23 |
Attribute Based Hybrid Encryption With Data Sharing in Cloud Computing Using Circuit Ciphertext-Policy
- Addagatla.Shwetha , M.Sridevi
Abstract
In the cloud, for accomplishing access control and keeping information secret, the information proprietors could receive credit predicated encryption to scramble the put away information. Clients with hindered figuring power are however more obligated to assign the veil of the decoding undertaking to the cloud servers to diminish the registering cost. Accordingly, trait predicated encryption with assignment rises. All things considered, there are provisos and inquiries staying in the point of reference relevant works. [1] For example, amid the designation, the cloud servers could alter or supersede the assigned cipher text and react a manufactured figuring result with dangerous plan. They may withal cheat the qualified clients by reacting them that they are ineligible for the imply of cost saving. Moreover, amid the encryption, the get to strategies may not be sufficiently adaptable too. Since arrangement for general circuits empowers to accomplish the most incredible type of get to control, a development for acknowledging circuit cipher text-strategy trait predicated half breed encryption with certain assignment has been considered in our work.[10] In such a framework, combine with evident calculation and encode then-Macintosh component, the information classification, the fine-grained get to control and the accuracy of the appointed registering comes about are very much found out simultaneously. In addition, our plan accomplishes security against separated plaintext assaults under the k-multiline Decisional Differ-Hellman proposition. In addition, a broad reproduction battle validates the plausibility and productivity of the proposed arrangement. Keyword: Attribute predicated encryption, information sharing, certain assignment, confirmation, classification, multi straight guide, half breed encryption.× Addagatla.Shwetha , M.Sridevi,"Attribute Based Hybrid Encryption With Data Sharing in Cloud Computing Using Circuit Ciphertext-Policy" Vol. 3 - Issue 6 ( 150 - 154 ) - November - December 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I5P23 |
24 |
Aggressive Hash Table Predicated Social Analyze for Defended Cloud Cache
- Sainni Usharani , M.Sridevi
Abstract
Cloud stockpiling is an undeniably famous utilization of distributed computing, which can give on demand outsourcing of information facilities for both associations and people. Notwithstanding, clients may not planarity believe the cloud convenience suppliers (CSPs) with the goal that it is challenging to decide if the CSPs meet their licit prospects for information security. Thus, it is basic to create productive evaluating systems to brace information proprietors' trust and trust in distributed storage. In this paper, we introduce an open reviewing plan for secure distributed storage predicated on unique hash table (DHT), which is an early two-dimensional information structure situated at a third equality examiner (TPA) to record the information property data for dynamic examining. Contrasting from the subsisting works, the proposed conspire relocates the authorized data from the CSP to the TPA, and in this manner fundamentally lessens the computational cost and correspondence overhead. In the mean time, misusing the auxiliary favorable circumstances of the DHT, our plan can withal accomplish higher refreshing productivity than the subsisting plans. In incorporation, we extend our plan to brace protection conservation by amalgamating the homomorphic authenticator predicated on people in general key with the aimless concealing incited by the TPA, and accomplish cluster examining by utilizing the total BLS signature system. We formally demonstrate the security of the proposed conspire, and assess the reviewing execution by point by point examinations and correlations with the subsisting ones. Keyword: Cloud storage, Cloud security, PublicAuditing, Dynamic Hash Table, HomomorphicAuthenticator, Batch Auditing, BLS signaturetechnique.× Sainni Usharani , M.Sridevi,"Aggressive Hash Table Predicated Social Analyze for Defended Cloud Cache" Vol. 3 - Issue 6 ( 155 - 159 ) - November - December 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I5P24 |
25 |
Rep-Oriented Data Uploading and Remote Integrity Check in Cloud Based on Identity
- Donthu Prashanthi , M.Sridevi
Abstract
An ever increasing number of customers would relish storing their information to open cloud servers (PCSs) alongside the quick improvement of distributed computing. Nascent security situations must be fathomed with a specific end goal to benefit more customer�s process their information out in the open cloud. At the point when the[1] customer is limited to get to PCS, he will designate its intermediary to process his information and transfer them. Then again, remote information uprightness checking is moreover a central security situation out in the open distributed storage. It makes the customers check whether their outsourced information are kept in place without downloading the entire information. From the security situations, we propose a novel intermediary arranged information transferring and remote information uprightness checking model in character predicated open key cryptography: personality predicated intermediary situated information transferring and remote information trustworthiness checking out in the open cloud (ID-PUIC). We give the formal definition, framework model, and security show. At that point, a solid ID-PUIC convention is outlined using the bilinear pairings. The proposed ID-PUIC convention is provably secure predicated on the hardness of computational Diffie�Hellman dilemma. Our ID-PUIC convention is furthermore effective and adaptable. Predicated on the unblemished customer's authorize, the proposed ID-PUIC convention can understand private remote[3] information trustworthiness checking, assigned remote information honesty checking, and open remote information respectability checking. Keyword: Cloud figuring, personality predicated cryptography, intermediary open key cryptography, remote information uprightness checking.× Donthu Prashanthi ,M.Sridevi,"Rep-Oriented Data Uploading and Remote Integrity Check in Cloud Based on Identity" Vol. 3 - Issue 6 ( 160 - 165 ) - November - December 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I5P25 |
26 |
Cost Optimization Case Study for Online Social Networks Ongeo-Istributed Clouds
- Chirumamilla.Mamata ,M.Sridevi
Abstract
Geo-appropriated mists give a charming stage to convey online gregarious system (OSN) facilities. To use the capability of mists, a noteworthy worry of OSN suppliers is upgrading the financial cost spent in using cloud assets while considering other important requirements, including giving copacetic nature of settlement (QoS) and information accessibility to OSN users.[3] In this paper, we think about the scrape of cost advancement for the dynamic OSN on numerous geo-disseminated mists over continuous eras while meeting predefined QoS and information accessibility essentials. We show the cost, the QoS, and also the information accessibility of the OSN, plan the pickle, and outline a calculation assigned . We complete broad trials with a sizably voluminous-scale credible world Twitter follow more than 10 geo-conveyed mists the whole way across the US. Our outcomes demonstrate that, while continually finding out the QoS and the information accessibility as required, can decrease substantially more one-time cost than the best in class strategies, and it can withal essentially diminish the aggregate cost when ceaselessly assessed more than four years, with OSN elements commensurable to legitimate world cases. Keyword: Cloud figuring, online pleasant system, streamlining models and techniques, execution investigation and assessment.× Chirumamilla.Mamata ,M.Sridevi,"Cost Optimization Case Study for Online Social Networks Ongeo-Istributed Clouds" Vol. 3 - Issue 6 ( 166 - 171 ) - November - December 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I5P26 |
27 |
Encryption on Identity-Based Throw Cloud Revocation Authority and ITS Applications
- Kommula Rani ,M.Sridevi
Abstract
Character predicated encryption (IBE) is an open key cryptosystem and disposes of the legitimate statutes of open key foundation (PKI) and endorsement organization in traditional open key settings. Because of the nonattendance of PKI, the repudiation difficulty is a reprover al issue in IBE settings. A few revocable IBE plans have been proposed with respect to this issue. Recently, by implanting an outsourcing calculation method into IBE, Li et al. proposed a revocable IBE plot with a key-refresh cloud convenience supplier (KU-CSP). [1] However, their plan has two weaknesses. One is that the calculation and correspondence costs are higher than precursor revocable IBE plans. The other weakness is absence of adaptability as in the KU-CSP must keep a mystery esteem for every utilizer. In the article, we propose a nascent revocable IBE plot with a cloud disavowal power (CRA) to settle the two deficiencies, to be specific, the execution is altogether improved and the CRA holds just a framework mystery for every one of the clients. For security examination, we show that the proposed conspire is semantically secure under the decisional bilinear Diffie - Hellman (DBDH) place. Convincingly, we stretch the proposed revocable IBE plan to introduce a CRA - profited validation conspire with period-delineated benefits for dealing with a cosmically massive number of sundry cloud lodging. [6] We proposed a nascent revocable IBE conspire with a cloud denial power (CRA), in which the disavowal methodology is performed by the CRA to lighten the lo promotion of the PKG. This outsourcing calculation system with other ascendant elements has been utilized in Li et al's. Revocable IBE plot with KU-CSP. Their plan requires higher computational and communicational expenses than anteriorly proposed IBE plans. For the time key refresh methodology, the KU-CSP in Li et al's. conspire must keep a mystery esteem for every utilizer with the goal that it is absence of versatility. In our revocable IBE conspire with CRA, the CRA holds just an ace time key to play out the time key refresh systems for every one of the clients without influencing security. Keyword: open key framework,Identity-predicated encryption,cloud disavowal power,verification,and calculation method.× Kommula Rani ,M.Sridevi,"Encryption on Identity-Based Throw Cloud Revocation Authority and ITS Applications" Vol. 3 - Issue 6 ( 172 - 176 ) - November - December 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I5P27 |
28 |
Efficient Privacy-Enhancing Technology Based Query over Outsourced Encoded Information
- Dantoju Uday Kumar , M.Sridevi
Abstract
With the inescapability of perspicacious telephones, area predicated facilities (LBS) have gotten impressive consideration and turn out to be more famous and fundamental as of late. Be that as it may, the usage of LBS withal represents a potential risk to client's area privacy.[1] In this paper, going for spatial range inquiry, a prevalent LBS giving data about purposes of intrigue (POIs) inside a given separation, we display a proficient and protection safeguarding area predicated question arrangement, called EPLQ. Completely, to accomplish security saving spatial range question, we propose the principal predicate-just encryption conspire for inward item go (IPRE), which can be habituated to distinguish whether a position is inside a given round zone in a protection safeguarding way. To lessen question inactivity, we additionally outline a security safeguarding tree list structure in EPLQ. Point by point security examination validates the security properties of EPLQ. In advisement, broad trials are led, and the outcomes exhibit that EPLQ is exceptionally proficient in security saving spatial range question over outsourced scrambled information. Specifically, for a portable LBS utilizer using an Android telephone, around 0.9 s is expected to incite a question, and it withal just requires an item workstation, which assumes the part of the cloud in our trials, a couple of moments to test POIs. Keyword: Location-predicated facilities (LBS), outsourced encoded information, protection upgrading innovation, spatial range question.× Dantoju Uday Kumar ,M.Sridevi,"Efficient Privacy-Enhancing Technology Based Query over Outsourced Encoded Information" Vol. 3 - Issue 6 ( 177 - 182 ) - November - December 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I5P28 |
29 |
Battery Driven Walk-Behind Rice Seedling Transplanter with Solar and Piezoelectric Regenerative Power Inputs
- Celil May R. Ylagan
Abstract
Rice seedling transplanters are used by farmers to have better planting operational efficiency; to aid in challenges in labor scarcity and also to alleviate physical health issues that is related to manual rice planting. Philippines is an agricultural country with rice as its staple food, we have 34% of our agriculture land as rice paddies. Although we have a large area for rice planting, more than 50% of farm holdings is under one hectare. Purchase of large and expensive engine driven rice transplanters can be deemed unnecessary by local farmers. This study aims to show the prospect of replacing a gasoline fueled engine with a lead acid battery � DC Motor set up and the influence of adding STP010-12Solar panels and Piezoelectric array regenerative inputs. By computing and comparing power input and output it was observed that the solar panel can extend battery life to a hypothetical time of about eight (8) minutes as compared to using the battery alone; while the piezoelectric array can further extend it by one (1) minute. With the battery driven equipment�s compact structure it will be more suitable for small scaled rice farmers use. Keyword: Walk-Behind Rice Transplanter, Lead Acid Battery, Solar Power, Piezoelectric.× Celil May R. Ylagan,"Battery Driven Walk-Behind Rice Seedling Transplanter with Solar and Piezoelectric Regenerative Power Inputs" Vol. 3 - Issue 6 ( 183 - 188 ) - November - December 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I5P29 |
30 |
Design of Solar Desiccant Clothes Dryer
- Celil May R. Ylagan
Abstract
The system design uses solar energy as power source for a clothes dryer attached to a room. The device has two processes which is Dehumidified Air Inlet Process and Humid Air Outlet Process, consisting of heat exchangers, fans and a desiccant wheel. In the Dehumidified Air Inlet Process, the outside air is suctioned and dehumidified, acting as the working substance that removes moisture from the drying room. In the Humid Air Outlet Process, humid air from the drying room is removed and its moisture content is reduced by the second heat exchanger of the system. The air is then used as the working substance to regenerate the desiccant. The system can remove 1.7439 kg of moisture within 9.65 minutes. This calculation is based on assumptions and computation based on hermodynamic principles and equations. The purpose in the long term would be to reduce the consumption of electricity used for clothes dryer. Keyword: Desiccant, Air Dryer, Solar Flat Plate Collector, Solar Water Heater.× Celil May R. Ylagan,"Design of Solar Desiccant Clothes Dryer" Vol. 3 - Issue 6 ( 189 - 194 ) - November - December 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I5P30 |