IJET -Volume 4, Issue 1 , January - February 2018
S.No
|
Title/Author Name
|
Serial No
|
31 |
An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing
- Gummala Brahmani, J Rajasekhar, V Sridhar Reddy 10.29126/23951303/IJET-V4I1P31
Abstract
Cipher text-policy attribute-based encryption (CP-ABE) has been a preferred encryption technology to solve the challenging problem of secure data sharing in cloud computing. The shared data files generally have the characteristic of multilevel hierarchy, particularly in the area of healthcare and the military. However, the hierarchy structure of shared files has not been explored in CP-ABE. In this paper, an efficient file hierarchy attribute-based encryption scheme is proposed in cloud computing. The layered access structures are integrated into a single access structure, and then, the hierarchical files are encrypted with the integrated access structure. The cipher text components related to attributes could be shared by the files. Therefore, both cipher text storage and time cost of encryption are saved. Moreover, the proposed scheme is proved to be secure under the standard assumption. Experimental simulation shows that the proposed scheme is highly efficient in terms of encryption and decryption. With the number of the files increasing, the advantages of our scheme become more and more conspicuous. Keyword: Cloud computing, data sharing, file hierarchy, ciphertext-policy, attribute.× Gummala Brahmani, J Rajasekhar, V Sridhar Reddy"An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing" Volume 4 - Issue 1 ( 206 - 210 ) - January - February 2018, International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V4I1P31 |
32 |
Well-Dressed Crawler by Using Site Locating & in-Site Exploring Stages
- N.Priyanka, DR.Shaik Abdul Nabi 10.29126/23951303/IJET-V4I1P32
Abstract
As sizeable web increments at a fast tempo, there was broadened electricity for techniques that assist securely locate massive net interfaces. In spite of the route that, in context of the quantity of degree of net companies and the appealing idea of the large internet, finishing complete-estimate growth and extra usefulness is a confusing hassle. We advise a - prepare shape, named The Dual-Stage famous Crawler, for persuading gathering good sized net interfaces. In the principle stage, The Dual-Stage fresh out of the plastic new Crawler performs website online primarily based honestly keeping apart for tremendous pages with the help of web records, swearing off showing a top-notch scope of pages. To cease more distinguished exact effects for an associated with circulate step by step The Dual-Stage sharp looking Crawler positions regions to type out extra prominent pertinent ones for a given difficulty. In the second one level, It satisfies fast in-web page looking with the guise of exposing the most applicable relationship with a versatile connection arranging. To turning away slant on showing some additional key relationship in protected internet files, we plot an affiliation tree facts shape to fulfill extra enormous reputation for a web website. Our exploratory consequences on a sports association of administrator areas show the adeptness and accuracy of our proposed crawler form, which appropriately recovers essential web interfaces from remarkable scale dreams and obtains additional reap fees than special crawlers. Keyword: Site locating, In-website online researching, TOC, Pro middle, Search.× N.Priyanka, DR.Shaik Abdul Nabi"Well-Dressed Crawler by Using Site Locating & in-Site Exploring Stages" Volume 4 - Issue 1 ( 211 - 215 ) - January - February 2018, International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V4I1P32 |
33 |
Optimization of Hydraulic Cylinder Design used for container lifting device using Genetic Algorithm
- Prof.U.V.Shah, Dr. G. H. Upadhyay 10.29126/23951303/IJET-V4I1P33
Abstract
This paper presents the use of different optimization techniques used for the optimization of hydraulic cylinder. These techniques are used to solve a three objective optimization problem in which a hydraulic cylinder is to be designed. It reflects mainly two techniques of Genetic Algorithm using MATLAB R2012a i.e. single and multi-objective optimization with several constraints. Different two dimensional parametric Pareto-optimal plots are obtained for the conflicting objectives like material stress, force on piston, Cylinder wall thickness and cross-sectional area of the cylinder. This optimization analysis strengthens and extends the results suggested by previous works. Keyword: Container lifting device (CLD), Algorithm, Genetic algorithm, Cross over, Mutation, Optimization, Single and Multi-objective optimization, Pareto optimization.× Prof.U.V.Shah, Dr. G. H. Upadhyay"Optimization of Hydraulic Cylinder Design used for container lifting device using Genetic Algorithm" Volume 4 - Issue 1 ( 216 - 227 ) - January - February 2018, International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V4I1P33 |
34 |
Modified GSO Based Kurtosis Maximization Criterion for BSS in Hindi Speech Processing System Help of LDA
- Ms. Meena Patil, Dr. J.S. Chitode 10.29126/23951303/IJET-V4I1P34
Abstract
Blind Speech Separation (BSS) is a procedure for assessing individual source segments from their blends at various sensors. It is called blind for the reason that any extra other data won't be utilized other than the blends. Techniques for using Linear Discriminant Analysis (LDA) give little direction about down to earth contemplations for isolating single-channel certifiable information, in which a large portion of them are nonlinear, no stationary, and even disordered in many fields. Blind source separation of super and Hindi sub-Gaussian Signal is proposed using conjugate gradient algorithm and kurtosis expansion criteria. In this paper amplify kurtosis' parameter utilizing propelled Hybrid Group Search Optimization (GSO) demonstrates with GA. The fitness function is enhanced with the utilization of kurtosis maximization model and scout honey bee stage is enhanced with the utilization of LDA. Simulations outcomes exhibit that proposed strategy for utilizing fitness function have speedy convergence, effortlessness and a better signal to noise proportion for separation assignments in light of GSO process. Examinations were done with the instant mixture of two speech sources utilizing two sensors, this proposed model to demonstrate the better execution measurements contrasted with different strategies. Keyword: Blind speech separation, Hindi signal, optimization, Kurtosis Maximization, Signal, and Mixture Signal and linear discriminant analysis.× Ms. Meena Patil, Dr. J.S. Chitode"Modified GSO Based Kurtosis Maximization Criterion for BSS in Hindi Speech Processing System Help of LDA" Volume 4 - Issue 1 ( 228 - 243 ) - January - February 2018, International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V4I1P34 |
35 |
Limited Supply, Load Scheduling and Solar Energy Combined Cost Optimization for Consumers in Developing Countries
- Amit Suresh Closepet, K Uma Rao 10.29126/23951303/IJET-V4I1P35
Abstract
To solve the energy crisis in India, it is very important to develop smart algorithms to gain a mush quicker solution to the power cut problems. India, it is filled with a lot of basic essential issues that first needs to be solved such as continuous access for drinking water to all, food for all and most importantly electricity for all. This paper talks about how combining solar energy, load shifting and partial outage can benefit the consumers to tackle the power cut problems. Knowing the power cut scenario in the local areas, the step one of the algorithm calculates, the partial power that can be supplied to the consumers, the second algorithm calculates the loads that can be shifted during the power cuts, the third algorithm calculates how much benefit can be obtained from the solar power that is being generated in the consumer premesis, and finally how much of the back-up i.e. the diesel consumption of the diesel generator can be reduced. Keyword: Load Shifting, Partial Outage, Power Shortage, DSM, Power Management.× Amit Suresh Closepet, K Uma Rao"Limited Supply, Load Scheduling and Solar Energy Combined Cost Optimization for Consumers in Developing Countries" Volume 4 - Issue 1 ( 244 - 251 ) - January - February 2018, International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V4I1P35 |
36 |
Effects of Recycled Waste Tire Rubber as Coarse Aggregate on the Performance of Concrete
- Imran Khan, Dr. Sanjay Sharma, Mir Aijaz 10.29126/23951303/IJET-V4I1P36
Abstract
This paper is the second in the series of publishing papers in our research of sound absorption behavior of rubberized concrete. There are very serious problems with the disposal of waste tires in India and worldwide. Because of environmental problem associated with the disposal of waste automobile tires so we need to find an environment-friendly solution. Then this study explores the possibility of reusing tire waste in concrete engineering applications through enhancing the properties of concrete mix as partial replacement with coarse aggregate to produce ideal concrete mix. In this study, percentage replacement of tire waste with natural aggregate in the concrete mix by weight is 0%, 10%, 20%, and 30% respectively. Chipped type generally square in shape and max 20mm in size are used as coarse aggregate. Tests were conducted to determine slump performance, flexural strength, density calculation, water absorption for control and rubberized concrete mix of M25.. Keyword: Rubberized concrete, Scrap rubber, chipped shape rubber, recycling, waste management.× Imran Khan, Dr. Sanjay Sharma, Mir Aijaz"Effects of Recycled Waste Tire Rubber as Coarse Aggregate on the Performance of Concrete" Volume 4 - Issue 1 ( 252 - 256 ) - January - February 2018, International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V4I1P36 |
37 |
Analyzation of Automatic Repeat Request (ARQ) Protocols
- Jeshvina.S, Sneha.P, Saraanya.S 10.29126/23951303/IJET-V4I1P37
Abstract
Automatic Repeat Request (ARQ) protocols provide a widely recognized avenue for guaranteeing reliable transmissions over unreliable transmission of data. They are implemented in data link layer. The main functions of data link layer are data link control and media access control. Data link control ensures that the data is received at the destination side without any error and loss; by two mechanisms i.e. flow control and error control. Whereas Media access control is about how to share the link. The protocols are used in error and flow control mechanisms to ensure the reliability of the transferred data; they are divided into two Protocols for noiseless channel and Protocols for noisy channel. Keyword: Flow control, Error control, ARQ, ACK (acknowledgement), NAK, Frames.× Jeshvina.S, Sneha.P, Saraanya.S"Analyzation of Automatic Repeat Request (ARQ) Protocols" Volume 4 - Issue 1 ( 257 - 268 ) - January - February 2018, International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V4I1P37 |
38 |
A Survey on Data Storage & Security in Cloud Using RDIC & ID by PKI
- MD Yaseen Reena, G Ravindra Bharathi 10.29126/23951303/IJET-V4I1P38
Abstract
Remote data integrity checking (RDIC) enables a data storage server, verbalizes a cloud server, to prove to a verifier that it is genuinely storing a data owner’s data veraciously. To date, a number of RDIC protocols have been proposed in the literature, but most of the constructions suffer from the issue of an intricate key management, that is, they rely on the extravagant public key infrastructure (PKI), which might obstruct the deployment of RDIC in practice. In this paper, we propose an incipient construction of identity-predicated (ID-predicated) RDIC protocol by making utilization of key-homomorphic cryptographic primitive to reduce the system involution and the cost for establishing and managing the public key authentication framework in PKI predicated RDIC schemes. We formalize ID-predicated RDIC and its security model including security against a malevolent cloud server and zero erudition privacy against a third party verifier. The proposed ID-predicated RDIC protocol leaks no information of the stored data to the verifier during the RDIC process. The incipient construction is proven secure against the malignant server in the generic group model and achieves zero cognizance privacy against a verifier. Extensive security analysis and implementation results demonstrate that the proposed protocol is provably secure and practical in the authentic-world applications. Keyword: Cloud Computing, Privacy preserving, Key homomorphic cryptography, Performance, Security..× MD Yaseen Reena, G Ravindra Bharathi"A Survey on Data Storage & Security in Cloud Using RDIC & ID by PKI" Volume 4 - Issue 1 ( 269 - 273 ) - January - February 2018, International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V4I1P38 |
39 |
Characterization of Hydroxyapatite from Bovine Bone by Mechanical Combination Method
- Burmawi, Novesar Jamarun, Syukri Arief, Gunawarman 10.29126/23951303/IJET-V4I1P39
Abstract
Hydroxyapatite is a chemical compound similar to human bone. For implant materials, the needs for hydroxyapatite is increasing. Therefore, sources for cheap hydroxyapatite with abundant availability are needed. Hydroxyapatite can be produced from bovine bone by a combination of mechanical processes. This was done by crushing, boiling and calcining the bovine bone. The calcination process was carried out at a temperature of 1000° C with a time variation of 3 and 6 hours. Characterization was done by X-Ray Diffraction (XRD), X-Ray Fluorescence, Scanning Electro Machine and EDX. The obtained bovine bone hydroxyapatite has a content similar to commercial hydroxyapatite. Produced hydroxyapatite has a ratio of Ca and P of 1.61, 1.74 and 1.68. The results of SEM-EDX show the porosity of hydroxyapatite. This result showed how this material can be applied as implant material. Keyword: Hydroxyapatite, bovine bones, mechanical treatment, characteristic, inplant.× Burmawi, Novesar Jamarun, Syukri Arief, Gunawarman"Characterization of Hydroxyapatite from Bovine Bone by Mechanical Combination Method" Volume 4 - Issue 1 ( 274 - 279 ) - January - February 2018, International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V4I1P39 |
40 |
Internet of Things (IoT) : an Overview of Security Concerns
- M.N.Nachappa, M. C. Aparna, M.N.Varun Somanna 10.29126/23951303/IJET-V4I1P41
Abstract
The concept of combining computers, sensors, and networks to monitor and control devices has been around for decades, the recent confluence of key technologies and market trends is ushering in a new reality for the “Internet of Things’’. IoT promises to usher in a revolutionary, fully interconnected “smart” world, with relationships between objects and their environment and objects and people becoming more tightly intertwined. The prospect of the Internet of Things as a ubiquitous array of devices bound to the Internet might fundamentally change how people think about what it means to be “online”. While the potential ramifications are significant, a number of potential challenges may stand in the way of this vision – particularly in the areas of security. We discuss some of the issues related to this. Keyword: Internet of things (IoT), Security, Authentication.× M.N.Nachappa, M. C. Aparna, M.N.Varun Somanna"Internet of Things (IoT) : an Overview of Security Concerns" Volume 4 - Issue 1 ( 280 - 286 ) - January - February 2018, International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V4I1P40 |