IJET -Volume 3, Issue 6 , November - December 2017
S.No
|
Title/Author Name
|
Serial No
|
51 |
A Broad Assessment of Data Migration practice in Network Communication Industries
- Kinda Shiva, Lali RajKumar
Abstract
�Data is the new Oil� Maybe this quote seems more familiar now days. More or less this quote self-defines its existence and importance in this world of digitization. With the growth of digital media and its relevance endeavors Data transaction must needs to be dealt in highly secured and efficient manner which not only confers its ultimate reliability but also focusses upon the ease and efficiency in its transfer mechanism. So hereby we are trying to introduce the common methods and practices performed to achieve this target. As the latest verdict and decision of our honorable Supreme Court of India in its judgment stated Right to Privacy as a fundamental right which hitherto needs to maintains and defines all the security measures must be conferred by any institution machinery who is dealing with the personal data management work. As per mandate it�s also seems necessary to have data security audit for networking firms and hence it must comply and guarantees the most available techniques and methodology to adopt for its storing, transfer and migration purposes in personal data analysis and management working environment. We are not providing here any technical specialties and regulations that need to be dealt in such an environment but our sole focus lies upon to make aware and provide general sense of its transfer mechanism for the end user to understand this rigid mechanism in simple logistic form. As tracing fault and providing optimal solutions in this regards needs higher end machinery and manpower with high technicality which not available at source to us. So we simply try to present this techniques in as simple and lucid manner as possible. . Keyword: Mobile Switching Center (MSC), Home Location Register (HLR), ESM (Enhanced Services Manager), Service Control Point (SCP).× Kinda Shiva, Lali RajKumar,"A Broad Assessment of Data Migration practice in Network Communication Industries" Vol. 3 - Issue 6 ( 335 - 340 ) - November - December 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I5P51 |
52 |
An Efficient Adaptive Graph Time-Variant Classification (AGTVC) Using Roughset Based Online Streaming Feature Selection Algorithm
- N. Arul Kumar, S.Vinodkumar
Abstract
Adaptive incremental sub-graph classification is a significant tool for examining data with structure dependence. In this paper proposed a novel Adaptive Graph Time-Variant Classification (AGTVC) Using Roughset Based Online Streaming Feature Selection algorithm mines the relevant features from the synthetic real-world social network data sets which improve the graph learning prediction accuracy than previous methods. The proposed AGTVC algorithm divide feature selection and load into memory in a mini-batch manner, which is a important reduction in memory and running time. Experiments results shows the AGTVC algorithms can decrease both the processing time and memory cost. The ROSFS algorithm learns both feature selection and possible results to converts a high dimensional problem into a big constraint problem with respect to feature vector. The experimental results are reanalyzed with several constrains such as number of dimensions versus objective, running time and accuracy. Based on the results generated on this paper, it concludes that AGTCV accuracy and performance increases compared to the previous method of ISJF algorithm. Keyword: Data Mining, Feature Selection, Graph Classification, Roughset.× N. Arul Kumar, S.Vinodkumar,"An Efficient Adaptive Graph Time-Variant Classification (AGTVC) Using Roughset Based Online Streaming Feature Selection Algorithm" Vol. 3 - Issue 6 ( 341 - 346 ) - November - December 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I5P52 |
53 |
Experimental Turbomatching of Turbochargers B60J68,A58N70,A58N72 and A58N75 for Short Haulage Truck
- Badal Dev Roy, Dr. R.Saravanan
Abstract
Adaptive incremental sub-graph classification is a significant tool for examining data with structure dependence. In this paper proposed a novel Adaptive Graph Time-Variant Classification (AGTVC) Using Roughset Based Online Streaming Feature Selection algorithm mines the relevant features from the synthetic real-world social network data sets which improve the graph learning prediction accuracy than previous methods. The proposed AGTVC algorithm divide feature selection and load into memory in a mini-batch manner, which is a important reduction in memory and running time. Experiments results shows the AGTVC algorithms can decrease both the processing time and memory cost. The ROSFS algorithm learns both feature selection and possible results to converts a high dimensional problem into a big constraint problem with respect to feature vector. The experimental results are reanalyzed with several constrains such as number of dimensions versus objective, running time and accuracy. Based on the results generated on this paper, it concludes that AGTCV accuracy and performance increases compared to the previous method of ISJF algorithm. Keyword: Data Mining, Feature Selection, Graph Classification, Roughset.× Badal Dev Roy, Dr. R.Saravanan,"Experimental Turbomatching of Turbochargers B60J68,A58N70,A58N72 and A58N75 for Short Haulage Truck" Vol. 3 - Issue 6 ( 347 - 359 ) - November - December 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I5P53 |
54 |
Spatial and Temporal Correlations for Resolution Scanty MIMO-OFDM Channel Estimation
- Kolekapongu Sireesha,Rama Krishna P ,DR.Menta Srinivasulu
Abstract
This letter proposes a parametric insufficient diverse data different output(MIMO)- OFDM direct estimation plot in perspective of the finite rate of progression (FRI) speculation, whereby super-assurance assessments of route delays with optional regards can be proficient. Then, both the spatial and brief connections of remote MIMO channels are abused to improve the precision of the channel estimation. For outside correspondence circumstances, where remote coordinates are insufficient in nature, route deferments of different transmit-get gathering device sets share a normal deficient illustration due to the spatial association of MIMO channels. Mean while, the channel small illustration is about unaltered in the midst of a couple of touching OFDM pictures due to the brief relationship of MIMO channels. By at the same time abusing those MIMO channel qualities, the proposed scheme performs better than anything existing front line designs. In addition, by joint treatment of signs related with different gathering devices, the pilot overhead can be diminished under the arrangement of the FRI speculation. Keyword: Super-resolution, sparse channel estimation, MIMO-OFDM, finite rate of innovation (FRI), spatial and temporal correlations.× Kolekapongu Sireesha,Rama Krishna P ,DR.Menta Srinivasulu,"Spatial and Temporal Correlations for Resolution Scanty MIMO-OFDM Channel Estimation" Vol. 3 - Issue 6 ( 360 - 365 ) - November - December 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I5P54 |
55 |
Uploadoriented File Data and Remote Data Integrity Check Using Proxy Server with Partial Data
- B.Lingaiah, Dama Prahtyusha,G Ashok Kumar
Abstract
Cosmically massive number of customers relishesstoring information onto open cloud server (PCS) because of swell in headways in distributed computing. As an outcomes the early security binds are inside should be tackled to profit sizably voluminous number of customers in handling their information on open cloud servers.[3] As many of the customers are not authorized to get to the general population cloud server ,they will be sent to intermediary servers to process the information. In combination to that, checking for information respectability at the remote spots are withal of a noteworthy security issues in broad daylight cloud storeroom. From this, it profits to sundry customers in outsourcing their information to the server by indicates of intermediary and downloading the quintessential information with security. From the purpose of explaining security situations, we set forth an intermediary server arranged information transferring and remote respectability checking of the information predicated on character. For indistinguishably equivalent, open key encryption and unscrambling strategies are been used. [1] The remote information honesty checking using intermediary server with incomplete information strategy is used to manage this bind. Our calculation is proficient and extremely flexible. Predicated on the true customers authorize, our convention can catch private information uprightness checking using fractional information. Keyword: Cloud figuring, character arranged encryption and unscrambling, intermediary predicated open key cryptography, PCS.× B.Lingaiah, Dama Prahtyusha,G Ashok Kumar,"Uploadoriented File Data and Remote Data Integrity Check Using Proxy Server with Partial Data" Vol. 3 - Issue 6 ( 366 - 371 ) - November - December 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I5P55 |
56 |
Two Element Approach Control for Web-Predicated Cloud Computing Accommodations
- CH.Kavya, G Ashok Kumar
Abstract
In this paper, we present a beginning ?ne-grained two-factor confirmation (2FA) get to control framework for web-predicated distributed computing lodging. Speci?cally, in our proposed 2FA get to control framework, a property predicated get to control system is actualized with the vitality of both an utilizer mystery key and a lightweight security invention. As an utilizer can't get to the framework in the event that they don't hold both, the component can upgrade the security of the framework, particularly in those situations where numerous clients share a similar PC for web-predicated cloud facilities. In advisement, characteristic predicated control in the framework withal empowers the cloud server to limit the entrance to those clients with a similar arrangement of properties while safeguarding utilizer protection, i.e., the cloud server just kens that the utilizer ful?lls the required predicate, buthasno origination on theexact identity of the utilizer.Finally, we withal complete a reenactment to exhibit the practicability of our proposed 2FA framework. Keyword: Fine-grained, two-factor, access control, Web services.× CH.Kavya, G Ashok Kumar,"Two Element Approach Control for Web-Predicated Cloud Computing Accommodations" Vol. 3 - Issue 6 ( 372 - 376 ) - November - December 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I5P56 |
57 |
iPath: Route Assumption in Radio Sensor Channels
- Chandana, G Ashok Kumar
Abstract
Late remote sensor systems (WSNs) are ending up progressively involute with the developing system scale and the dynamic idea of remote correspondences. Numerous evaluation and symptomatic methodologies rely upon per-bundle directing ways for exact and fine-grained examination of the involute system comportments. In this paper, we propose iPath, a novel way surmising way to deal with recreating the per-parcel steering ways in unique and monstrously monster scale systems. The simple origination of iPath is to misuse high way homogeneous credit to iteratively construe long ways from short ones. iPath starts with an underlying kenned set of ways and performs way surmising iteratively. iPath incorporates a novel plan of a lightweight hash work for confirmation of the deduced ways. With a specific end goal to additionally enhance the surmising capacity and also the execution effectiveness, iPath incorporates a quick bootstrapping calculation to recreate the underlying arrangement of ways. We withal actualize iPath and assess its execution using follows from sizably voluminous-scale WSN organizations and additionally broad reenactments. Results demonstrate that iPath accomplishes considerably higher remaking proportions under various system settings contrasted with other best in class approaches. Keyword: Measurement, path reconstruction, wireless sensor networks.× Chandana, G Ashok Kumar,"iPath: Route Assumption in Radio Sensor Channels" Vol. 3 - Issue 6 ( 377 - 381 ) - November - December 2017, International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I5P57 |
58 |
For fended and Efficacious Keyword Arranged Search Program on Cypher Cloud
- Sravani Nunna ,Dama Prahtyusha
Abstract
Major issue openly mists is the means by which to allot records predicated on fine-grained property predicated get to control approaches, sharing information in a dynamic gatherings while protecting information what's more, personality security from an un trusted cloud is as yet a testing issue, because of the regular difference in the enrollment., scrambling records with various keys using an open key cryptosystem for example, trait predicated encryption (ABE), and additionally intermediary re-encryption (PRE) approach has a few impuissance�s: it can't productively handle incorporating/renouncing clients or personality characteristics, and arrangement transforms; it requires to keep numerous encoded reproductions of the same reports; it acquires high computational expenses. In this paper, I propose a safe multi-proprietor characteristic ascendant substances predicated information sharing plan for dynamic gatherings in the cloud. Tha point of my paper is secure information partaking in a dynamic gathering where the there is no tweaked Attribute ascendant elements where as multi � proprietor trait ascendant elements plot is conceivable. key arrangement key approach characteristic predicated encryption (KP-ABE) strategy is used to separate dynamic AA (Attribute ascendant elements ) . By utilizing gathering signature , marked receipts and dynamic communicate encryption procedures, any cloud utilizer can secretly impart information to others. As the outcome the calculation cost is lessened and capacity overhead and encryption calculation cost of our plan are free with the quantity of repudiated clients so the encryption cost is furthermore decreased. Keyword: Cloud computing, data sharing, dynamic groups,attribute- based encryption.× Sravani Nunna ,Dama Prahtyusha,"For fended and Efficacious Keyword Arranged Search Program on Cypher Cloud" Vol. 3 - Issue 6 ( 382 - 387 ) - November - December 2017, International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I5P58 |
59 |
Ongoing Global Localisation of Robotic Autos in Lane Level by Means of Lane Marking Identification and Shape Registration
- Boggarapu Kantha Rao ,Kondra Vennela
Abstract
Independent vehicles are required to expect a key part later on of urban transportation systems, as they offer potential for additional prosperity, extended gainfulness, more unmistakable receptiveness, better road capability, and beneficial outcome on nature. Research in self-decision structures has seen incredible advances starting late, on account of the augmentations in open preparing power and decreased cost in recognizing and enrolling progresses, achieving creating inventive accessibility level of totally self-decision vehicles. The objective of this paper is to give a general blueprint of the present headways in the space of independent vehicle programming structures. Significant parts of autonomous vehicle. Keyword: autonomous vehicles; localization; perception; planning; automotive control; multi-vehicle cooperation.× Boggarapu Kantha Rao ,Kondra Vennela,"Ongoing Global Localisation of Robotic Autos in Lane Level by Means of Lane Marking Identification and Shape Registration" Vol. 3 - Issue 6 ( 388 - 393 ) - November - December 2017, International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I5P59 |
60 |
A Canny General Remote Control Framework for Home Apparatuses
- SK.Mujafarahmed,Narati.Swarnalatha,Boggarapu Kantha Rao
Abstract
Web of Things devices talks with each other without need of neither human-to-human correspondence nor human-to-PC association. Such structures can work mentally and settle on decisions without human commitment. Web of Things when completed honestly can comprehend a broad assortment of overall issues, for instance, destructive occasions, pollution and even regulate home mechanical assemblies remotely. Home motorization is finishing the fundamental methodology of home devices without the need of human collaboration. This paper makes home computerization a reality using raspberry pi and a wireless that remotely controls home contraptions from the web. A Home computerization compact application and an automation webpage content furthermore been created for execution of the web of things framework. Keyword: Internet of things, Raspberry pi, Home automation, Remote control, Smart Home, Android application, Smart home, Scenarios, Euclidean distance, Energyconsumption, Prediction accuracy.× SK.Mujafarahmed,Narati.Swarnalatha,Boggarapu Kantha Rao,"A Canny General Remote Control Framework for Home Apparatuses" Vol. 3 - Issue 6 ( 394 - 399 ) - November - December 2017, International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I5P60 |