IJAIR- Volume 8 Issue 1 (January 2019)

 


Sr/No/ Title Pdf
1 Impact of Crocodile Conservation on Livelihoods in North, Madhya Pradesh, India
R. K. Gurjwar1, R. J. Rao2

Abstract: Human impacts on the conservation of biological diversity are a matter of concern. Many rivers and water bodies in India have come under tremendous human pressure in the recent years due to several factors. A study was carried out in North, M.P. from 2015-2016 and 2016-17 to collect data on crocodile population at the study site, socio-economic status of the adjoining villages and human-crocodile conflict. Data has been Collected to assess the impact of Crocodile conservation on rural livelihoods, determine the status and distribution of muggers in M.P., to understand local people’s attitudes towards mugger and their conservation. Methods have been suggested to promote public awareness and education for the conservation of muggers.



Download
2 Interrelationship between the Factors of Components of Lifestyle among Youth
1Dr. Manjula G Kadapatti, 2Miss Lallawmzuali

Abstract:Youth compromises of maximum population in India. But the lifestyle of today’s youth is confined only to gizmo gadgets, disco and pubs. Youth is an experience that may shape an individual's level of dependency, which can be marked in various ways according to different cultural perspectives. Personal experience is marked by an individual's cultural norms or traditions, while a youth's level of dependency means the extent to which he still relies on his family emotionally and economically. The objective of the study is to find the interrelationship between the factors of components of lifestyle among youth. The lifestyle scale developed by S.K. Bawa and Sumanpreet Kaur was administered to the students. A sample of 200 college students of the age group of15-24 years from urban Bangalore was randomly selected for the present study. Wherein 100 students were from Government College and 100 students were from Private College. The tests used to analyze the data were student t-test and chi-square test. It shows that youth were health conscious, engaged in physical exercises to maintain body weight and concern about their career options and they do regular preparation for exam and keen to gain knowledge and update oneself.



Download
3 Prevalence of Malnutrition among Nursing Students
Gothainayagi#1, Samundeeswari#2, Maheswari#3, Dr. Muthamilselvi#4

Abstract: — Adolescent stage is an important period of growth and development, age group of 18-25 years is known to be emerging “adulthood”. It’s a period of transition from adolescence to adulthood. Adherences of unhealthy dietary practices among adolescents are likely to play a major role in weight changes during this period. The aim of the present study focuses on this special group to investigate the prevalence rate of malnutrition and its associated demographic variables. The study design was descriptive cross sectional survey and Cluster sampling technique was deployed. The results reveals that 42% of students were underweight, 41% were normal and 14% of students falls under Grade I obesity, 3% of students were in Grade II obesity, the least percentage (0.3%) of students in Grade III obesity. Adolescent of 19-20 years were found to be malnourished (42.25%). Gender and area of residence had an association with BMI. Adjusted Odds ratio of Sex shows 31.44, 95% CI: 1.052- 1.108, whereas type of family shows AOR = 0.196, 95% CI: 1.134-1.211 and area of residency depicts AOR = 0.000, 95% CI: 1.052-1.108. Factors like social, environmental, psychological play an important role in their selection of food with the influence of peer groups and the family dietary practices.



Download
4 A study on the impact of consumer attitude on consumer response towards Web based Interactive Advertisement (WIA) with special reference to financial services
1Mr. Devatatta Shamkan Tare,

Abstract: As per the study conducted by to Klein in the year 1998, data search procedures are serious analysts of Internet consumer behavior, and data exploration services on the Internet are mostly valuable for exploration goods owing to the low professed costs of measuring objective data. The economics of data search clarify the relationship between consumers’ channel choices in relation to search and purchase processes. Because searching via one channel and buying via other channel may be professed as more costly than probing and buying through a single channel, consumers may tend to use a single channel for information search and purchasing. According to certain study conducted by the researchers, for search goods, an aim to search the Internet for product information primes to an purpose to purchase through the same medium, so that the information search and the certain purchasing channels should be measured vital elements leading to consumers’ choice in purchase formats. This research examines the influence of financial services website on consumers’ Internet buying behavior towards financial services. The study particularly focuses on the effect of consumers’ attitudes toward the financial services websites of their interests and on their use of those websites for information search and on their intentions to avail those services through those websites and channels other than the Internet websites.



Download
5 Energy Efficient Cloud Migration Policy Using Virtual Concept and Hybrid of Bully-Election Divide and Conquer Techniques
1Kosher Ali, 2Dr. Amit Shrivastava, 3Vijay Bhandari

Abstract: Cloud computing and its components make use of their combine efforts to process input request to any cloud architecture. Cloud components such as virtual machine Vm, Cloud Data centre DC, Broker request Br and their configuration combine configure a cloud scenario. Cloud computing component make use of request, resource and its utilization analysis to process any of the algorithm. It make usage of resource in proper optimization manner. In order to provide better quality of services and proper cloud component scheduling many algorithms were proposed. Algorithm such as round robin, throttle, Genetic algorithm etc. were proposed by the existing research work. Limitations with such algorithms are of monitoring single level of utilization. They are either concentrating on resource utilization or in energy consumption by their resources for that request process. Further the internal process doesnot comply with parallel process of monitoring such utilization. In this research, An Advance Algorithm named VMERRU (Virtual machine energy resource request utilization) is proposed. The approach also make use of utilizing monitoring of energy , resource usage count, input request requirement and matching requirement of assigning DC, VM to it. Thus an optimal request handling algorithm with parallel computation is proposed. An implementation is performed using CloudSim API cloudanalyst simulator and further computation shows the efficiency of proposed algorithm.



Download
6 A comparative study of health related life-style of teachers belonging to public and private sector of Uttar Pradesh
1Sravan Kr. Singh Yadav, 2Prof. Vishan Singh Rathore

Abstract: The aim of the present study was to compare health related life-style of teachers belonging to public and private sector of Uttar Pradesh. For the purpose of the present study 50(Fifty) male teachers of Uttar Pradesh (25 from public sector and 25 from private sector) were selected randomly as subject who falls between the age group of 30 to 45 years. Assessment of health related life style by using life style assessment inventory (LSAI) developed by David S. and Michael was applied to collect the data. Independent samples t-test was applied to calculate the collected data at 0.05 level of Significance. The all statistical analyzed was carried out using MS Excel and SPSS 20.0 version. The result of the study indicates that there was an insignificant difference of health related life-style between public and private sector school teachers of Uttar Pradesh.



Download
7 SMART DEVICE USING WEARABLE GESTURE
M.Sudha#1, M.Sangeetha#2, R.Saranya#3,S.Tamilselvi#4

Abstract: In this paper, the main aim is to connect the physical world into digital world. This will work through the movements (gesture) of the hand. In the recent years, the researches faces some problems like bulkiness of the device. We are going to set the two components as single device. This will be reduces the bulkiness of the device. we are also going to develop this project by using our device as a fifth sense for a disabled persons. This technology makes use of a camera, smart phone, a projector, mirror, speaker and a color taps.



Download
8 An approach for the Sybil Attack Detection and Prevention using heuristic based approach and VANET efficient path with security algorithm
1Swamil Soni, 2Prof. Damodar Tiwari

Abstract: Recently Wireless Sensor Networks are strongly making up their position in the market which is on high-demand for the purpose of the smart testing and the system of productions. The open access frequency (for example: 2.4 GHz) provides an access to the use of the low-cost hardware, but which needed to be shared with the access with the other devices also, that leads to the interference and thus occurs errors. The again and again transmission of the damage packages may also get succeed. The transmission for the packages may get pass, at the extra energy usage of nodes. Since, energy plays an important role in networks, so for this the avoidance of the interference is a must done factor. In this paper we have introduced the channel administration for the wireless sensor networks which will be responding to the interference if occurs. For this purpose we will be going through the checking terminal which will include the checking of the strengths of the signals accordingly to the frequency bands. So, after checking points the conclusion which is obtained states the six analysis strategies are thought about, and effects of applying the resulting decision of best frequency groups to WSNs in an automotive testing condition are explored. The best technique permits a reduction of energy utilization of a node by around 15%.



Download
9 Data Secure & De-Duplication Analysis Using AMHD Algorithm over Cloud Data Storage
1Pawan Kumar Harijan, 2Dr. Rahul Sharma

Abstract: Cloud computing environment is having its advantage while processing and storage of users large data. Data security, on demand processing of input data, data communication with the multiple entity , load sharing of multiple component are the major facilities provided by the cloud computing scenario. While dealing with such useful scenario, there are still lacking which is in terms on security and accessibility. Cloud computing help in data processing execution efficiently. Cloud computing exhibit data duplication storage, which further need an approach for observation using multiple parameter based detection. Currently defined approach use the randomized tag and deduplication detection based on file size, file name and its annotation scheme. Previous given approach find its efficiency while dealing with same format of file and in single group. In this paper an AMHD (Annotation meta heuristic duplicability) Algorithm is proposed for duplicate content observation and detection. Finding observed results shows the efficiency of our approach over existing scenario.



Download
10 DIVERSITY OF POLYGONACEAE MEMBERS IN IDUKKI DISTRICT, KERALA
Mahesh Mohanan P1, Neena A1, Antony, VT 2& * Binu Thomas1

Abstract: The explosive growth of human population, uncontrolled exploitation of natural resources, habitat loss and pollution are rapidly degrading the quality of environment and cause the loss of species diversity at an alarming rate. Idukki is a biodiversity rich area and includes so many rare, endangered and endemic species. Western Ghats, the boundary of Idukki district is considered as one of the 18 centres in the world were megadiversity exists.In this context we have undertook a study of diversity and distribution of the family polygonaceae in idukki district and documents the members of the family.



Download
11 Plants Used In the Treatment of Skin Diseases in Harapanahalli Taluk, Karnataka, India
Siddalinga Murthy SM

Abstract: An ethno-botanical survey was conducted to unveil the knowledge treasure of folk medicine in Harapanahalli taluk of Davanagere district, Karnataka state, India. The indigenous knowledge of local traditional healers and the native plants used for the treatment of skin diseases were collected through questionnaire and personal interviews. A total of twenty one plant species were found to be used in the treatment of various skin diseases by the rural and folk people in Davanagere district. Out of these, plant species like Aloe vera (L.) N. Burm., Aristolochia indica L., Azadirachta indica A. Juss., Curcuma longa L., Thespesia populnea (L.) Soland and Erythrina indica Lam. were found to be most effective against skin diseases. The scientific, local and family names of all these medicinal plants along with the habit, part used and mode of their administrations were recorded. Importance was also given in creating awareness among the rural people for the protection and conservation of these valuable medicinal plants.



Download
12 Assessment of Post-Tensioned Slab along with Seismic Effect
Ankush Kumar Jain1 , Nafisul Hasan2 , Abdulla Arashad3

Abstract: Construction industry is being revolutionized with growing technology and innovation. Man started to reach sky not in any aero plane but with the height of building. Tall structures have considerably reduced the problem of shelter but are considered highly susceptible to seismic loads and uneconomical. Both the problems are aroused due to high weight of the building. Of all the structural members in a building slabs are considered to be occupying high area and the load of the building is mostly contributed due to slab. In general for commercial areas normal slabs are not been considered, as the spans between the supports are more which leads to increasing in deflection and ultimately provision of huge depth and percentage of steel is increased beyond the codal provision ,once such solution to reduce the slab depth and provide economical design is flat slabs technology.



Download
13 Impact of Behavioural Biases on Investment Performance
Ms. Aradhana Bhopte*

Abstract: The present study examines the impact of behavioral biases on investment performance. The study was conducted in Gwalior region. The respondents are investors of Gwalior region. Sample size was 300. Factors analysis and regression analysis was conducted to explore the factors and also to check the impact of behavioral biases on investment performance. The study concluded that there is a significant impact of behavioral biases on investment performance.



Download
14 Ethical Talent Management and organizational health- A pluralistic approach
1Dr.M.Dhanabhakyam, 2 Sowmya G

Abstract:Talent management interventions being a major human resource trend of the present business era, the talent philosophy itself cripples the ethical management systems of the companies. The operationalization of the word talent in different contexts, the existence of talent incongruence between the employees and the employers, the exclusive talent identification policies become double edged swords and shadow negative impact on the organizational health. Management is moreover unaware of their skewed talent identification and management policies and its possible impact on the employee performance and the organizational health. This study identifies the ethical talent development practices and assesses the impact of ethical talent management interventions on organizational health. Talent management is not a singular approach, it must be judged on ethical dimension of management which take care the prevailing organizational health.



Download
15 Significance of Inheritance and Cohesion on Ambiguity
1Dr. Brijesh Kumar Bhardwaj, 2Dr. R. M. L.

Abstract: Lately, the ambiguity of the software is increasing because of automation of each section of application. Software is no place remained as one-time development item since its architectural measurement is increasing with addition of new prerequisites over a brief duration. Object Oriented Development procedure is a popular development approach for such frameworks which sees and models the necessities as real world substances. Classes and Objects logically speak to the substances in the arrangement space and quality of the software is specifically relying upon the design quality of these logical elements. Cohesion and Inheritance (Cohesion and Inheritance) are two major design unequivocal factors in Object Oriented Design which impacts the design of a class and dependency between them in complex software. It is also most significant to measure Cohesion &Inheritance for software to control the ambiguity level as prerequisites increases. Several measurements are in practice to quantify Cohesion and Inheritance which plays a major part in measuring the design quality. The software enterprises are concentrating on increasing and measuring the quality of the item through quality design to proceed with their market image in the aggressive world. As a part of our research, this paper features on the impact of Cohesion and Inheritance on design quality of an unpredictable framework and its measures to quantify the overall quality of software.



Download
16 A SURVEY ON: MODULAR APPROACH FOR CUSTOMIZABLE UART
1Pratibha Vishwakarma, 2Mr.Sanjeev Shrivastava

Abstract: This paper propose a technique for software-implementation of an UART (Universal-Asynchronous-Receive-Transmit) with the goal of getting a customizable UART-core which can be used as a module in implementing a bigger system irrespective of one’s choice of implementation platform. This paper is implementing the design through Verilog HDL using Xilinx 14.2 design suite and it is tested on Spartan-6 FPGA after interfacing the circuit under test using PC with the help of RS-232 cable. The simulation results and the test results are supporting our proposal.



Download
17 Growth Centers in Developing Countries "Factors and Requirements for Success" – Lessons from the Indian Case
Muhammad AbdulRahman Seddeek *1, T.V.KRISHNA2.

Abstract: After the Second World War, many countries seek to achieve fast growth and remedy the development problems through using growth centres policy. India one of the developing countries which tried to get the policy benefits due to suffering from regional inequalities and unbalance in the implementation of plans and policy towards few privileged sectors of communities and neglect the other areas and sectors. The implementation of the policy happened on two distinguished stages and both of them have strong points like encourage the small and medium cities to develop them and help the poor rural and excess labor to find substitutional employment in their areas. The weak points appear in the difficulties of urban control in the growth centres and the disabilities of equipped the proposed growth centres with the proper infrastructures. To avoid the weak points and increase the success probabilities of policy implementation some recommendation are given such as providing adequate resources in the growth centres with the preparation to meet the urbanization requirements, should establish Periodic follow-up of economic changes and Create the multi integration between growth centres in the region.



Download
18 MULTIPLE CONSTANT MULTIPLICATION TECHNIQUE FOR CONFIGURABLE FINITE IMPULSE RESPONSE FILTER DESIGN
Trapti Chodoker, Rajeev Thakur and Puran Gour

Abstract:This paper highlights the design of finite impulse response(FIR) filter with the help of an evolutionary optimization technique, particularly multiple constant multiplication. The Finite Impulse Response (FIR) Filter is that the necessary part for comingupwith associate economical digital signal process system. Transpose kind finite impulse response (FIR) filter is of course a pipelined structure that supports the multiple constant multiplications (MCM) technique however direct form FIR filter structure doesn’t support MCM technique. The MCM is more practical in Transpose form once the common operand is multiple with the set of constant coefficient that cut back the procedure delay. The implementation of MCM technique is simpler in fixed coefficient Transpose form FIR filter however complicated in configurable coefficient. For this purpose, the coefficient of the filter are encoded by Canonical Signed Digit (CSD). FIR filter supported canonical signed digits illustration of coefficient so as to attenuate the power consumption and quick implementation of the filter Performance of the proposed filter has been analyzed in terms of its area, power and speed. The look of FIR filter is planned to implement using Xilinx tool.



Download
19 OPTIMIZATION OF MILLING PARAMETERS IN VERTICAL MILLING MACHINE USING EN24 STEEL AS SPECIMEN
1Gaurav Tamrakar, 2Mr. Anoop Kumar, 3Dr. Pravin Borkar

Abstract: The surface roughness and Material Removal Rate analysis are dependent on various parameters, specific to input parameters are feed, speed, and percentage of water in Coolant. The combination of these parameters is designed by MINITAB using L9 orthogonal array. On the basis of Design of Experiment, the milling operations are performed in order to evaluate surface roughness and material removal rate. The authors performed the experiment on Vertical Milling Machine using for cutting Alloy material with end mill tools. Experiment wise investigation of the EN24 plates is fixed as work-piece specimen milling operation is carried out. The experiment is performs on different sets of EN24 plates as per design of experiment by MINITAB. The best setting among the feed, speed, and percentage of water in Coolant for low surface roughness and high MRR has been evaluated. Moreover, Grey Relation Method is used to convert Surface roughness and Material Removal into single responses. In each case, the best setting among the feed, speed, and percentage of water in Coolant for low surface roughness and high MRR and both is found by S/N ratio curve. The results are shown in conclusion section.



Download
20 Bacterial Nucleotide Immunogen Enhances the efficacy of vaccine
M.Muruganandam

Abstract: Bacterial nucleotide especially plasmid DNA and their fragments act as Good Immunogen during vaccine development and its efficacy in inducing immune response is good. The plasmid DNA has short sequence DNA. In induce both cellular and humoral immune responses. It has lot of advantages, it is stored in room temperature . Transport is very easy, preparation method is also easy. So it is highly suitable for vaccine development for most of the bacterial infectious diseases. Nowadays, Multidrug resistant pathogens appear in many places in our global threat , WHO advise to produce new vaccines against these MDR-pathogens, these short sequence nucleotide open new window to develop new vaccine.



Download
21 Ultrasonic vibration shock treatment effects on biomass production of yeast
M.Muruganandam

Abstract: Ultrasonic vibration is one of the physical stress factor. Here stress treatment was provided to yeast cells, after that growth performance was studied. The ultrasonic vibration was given (2 MHZ) to yeast cells with different timings such as 0,2,4,6,8,10 and 12 minutes. After the treatment, Yeast were incubated to 72 hours at 37oC.At the end of the experiment,optical density and biomass production of yeast were calculated. The highest OD (0.72) was observed in 2 minutes treatment .The highest biomass production also observed in 2 minutes treatment (1.044gm).The two minutes treatment produce highest growth rate compared to other treatment. If the stress time increases, the biomass production and OD value also decreased. So stress always suppress growth rate, However initially it induce growth then slowly suppress growth rate of yeast cells.



Download
22 VENDOR CLIENT MANAGEMENT (VCM)
*Dr.Benita.S.Monica#1 & Ms.Subhasini.J#2

Abstract: Vendor plays an important role in any company’s success or failure, and it refers to all the ways and methods of handling arrangements with vendors and its works. Vendor hold wealth of knowledge relating to their product or services and utilization within industry. Vendor client management will be focusing on providing trust commitment and quality towards the client and create positive response to the business. Vendor manager has the responsibility to select the right vendor to yield the desired performance characteristics. The manager has to focus massive amount of details to manage vendor effectively. An important objective of purchase management is to maintain good relationship with vendors. Vendor management will facilitate the process of performance monitoring, reporting and profit risk assessment. Hence the study is timely and vital to understand the perception towards vendor client management.



Download
23 THE IMPACT OF JOB SATISFACTION ON TEACHERS’ORGANIZATIONAL COMMITMENT
Musa Shu’aibu, Dr. Nimisha Beri

Abstract: Job satisfaction is of great importance in all organizations, be it public or private, it makes description on how well an individual or employee is happy in or with his/her job, many factors do contribute towards job satisfaction among employees in any given organization which is different from individual to another or from employee to employee. Satisfaction of job determines teachers’ commitment to their organization and employees are more committed to their organization when they are satisfied with their job. This paper makes summary and analysis of the literature which is available for the topic under discussion. The finding reveals that when teachers are satisfied with their job, it leads to the significant increase in organizational commitment of teachers. It was discussed that teachers exhibit very good organizational commitment when satisfied with aspects of their job. It was concluded that, job satisfaction makes significant impact in the commitment of teachers towards their job.



Download
24 An Exploratory Frame work on the Applications of E-Commerce
ArdraJ.#1

Abstract: Today E-commerce have become a part of our everyday life. It is no longer a technology that only technically advanced and wealthy people use. Electronic commerce predominantly comprises of the marketing, buying, advertising, selling distribution as well as the examining of products by means of internet. E-commerce has given a free rein to another revolution in Kerala that changed the commercial way of business. The companies like Amazon and eBay actually began using E- commerce and now it plays a major role in Indian economy. This paper talks about the recent trends in the business in the state of Kerala that employs e-commerce and its impact on Indian economy by exploring the benefits and limitations of e-commerce. The benefits in general are wider reach, savings in time, low cost, all time accessibility, well synchronisation and large assortment. However, there are certain limitations, one among many being trust, financial security, human less transaction and delivery.



Download
25 LeveragingDataDE-duplicationtoImprove thePerformanceofPrimaryStorageSystemin theCloud
1BhargaviLankera,2P.Sravanthi

Abstract: Cloud computing is a distributed system which works with the multiple component to provide a processing of users input request. The input request can be of data storage, data access and utilizing the data in real time with different available model. Cloud computing consist of multiple layers and model of performing the processing of large amount of data. Different areas of research are available which includes the data security, authentication, accessibility and identity based data utilization. Data usage over the cloud helps in fast and scalable usage of data. Cloud data is accessible with various platform includes web and mobile units. Thus the availability of data and its accessibility increase the vulnerability over the data. This topic is required in further research to enhance the security over the cloud data and accessing them on secure channel. This research discuss about the algorithm which enhance the security with hybrid level of security model. An end to end communication protocol with enhances cryptography and data auditing approach is presented. Thus the algorithm shows the efficiency over the traditional security mechanism. The proposed algorithm works experimented over the java platform using Apache server. The Computation parameter which is taken for comparison is computation time, computation cost, and bandwidth and Energy consumption in data packet transmission. The experiment performed over the proposed security and reliable model shows the efficiency of proposed approach over the traditional solution of data processing in cloud computing distributed environment.



Download
26 Understand Short Texts by Harvesting and Analysis Semantic Knowledge
1Raheema Sheik, 2K. Laxmaiah

Abstract: Semantic web mining and Synaptic web entropy mining is an important and recent research area today where number of technique presented in order to mine the web crawl efficiently and to find the web page rank of various data available in the web, in the present paper which is taken by us for the further research is the hybrid approach where the entropy is calculated based on the semantic-synaptic based approach and the important role of the entropy required today to monitor the todays web fluctuation and various stages of multiple portals and web data available today , here as the authors of the paper mentioned about the scope of the semantic monitoring ,we assume it to be a great way to make it better to experience and query search for the extracted data and opinion monitoring, we have monitored a paper which works with the short text analysis, challenges associated with it and finding data relevance in available knowledge base. Using the spatial data and related information with the input dataset. It can able to find more specific data about the user input. We here mentioning and further trying to make user experience better to utilize the data extracted from the user and visualize them efficiently as per the user requirement. ANN approach can further be utilized for efficient parameter computation.



Download
27 IF SECURE SESSION KEY BASED CLOUD ACCESS AND DISTRIBUTION SYSTEM
1Sumanjali Billi, 2I Surya Sekhar

Abstract: Cloud computing is a new approach in the field of information technology based on the World Wide Web. It is new approach in the field information technology and also it satisfies a end users requirement for computing resources like services and applications etc. Security is one of the most challenging issue in the cloud computing. In cloud computing, services need to address the security during the transmission of sensitive information. Many organization, companies or banks have confidential information, this information is very essential. The cloud does not provide a fully guaranteed of data and it is compromised by the attackers. In this paper by providing a new method, we improve the security of data access in the cloud computing for a bank or any other particular location by using location-based encryption.



Download
28 Secure Data Sharing In Cloud Computing Using Revocable-Storage IBE
1Sunita Palleti, 2CH. Suresh Kumar

Abstract: Cloud computing is a distributed system which works with the multiple component to provide a processing of users input request. The input request can be of data storage, data access and utilizing the data in real time with different available model. Cloud computing consist of multiple layers and model of performing the processing of large amount of data. Different areas of research are available which includes the data security, authentication, accessibility and identity based data utilization. Data usage over the cloud helps in fast and scalable usage of data. Cloud data is accessible with various platform includes web and mobile units. Thus the availability of data and its accessibility increase the vulnerability over the data. This topic is required in further research to enhance the security over the cloud data and accessing them on secure channel. This research discuss about the algorithm which enhance the security with hybrid level of security model. An end to end communication protocol with enhances cryptography and data auditing approach is presented. Thus the algorithm shows the efficiency over the traditional security mechanism. The proposed algorithm works experimented over the java platform using Apache server. The Computation parameter which is taken for comparison is computation time, computation cost, and bandwidth and Energy consumption in data packet transmission. The experiment performed over the proposed security and reliable model shows the efficiency of proposed approach over the traditional solution of data processing in cloud computing distributed environment.



Download
29 Core End To End Traffic Retandary Elimination for Reducing Cloud Bandwidth Cost
1Vamsi Priya Challa, 2M Vijetha

Abstract: In today’s era, End to End TRE (Traffic redundancy) over the cloud computing is a recent technology and recent research topic under cloud computing environment. The Cloud computing and its mechanism to transfer the data, managing its component is an important process for complete process. Where the component such as third party auditor, data centre and virtual machine take participate. There are process involve in the middle such as Packet forwarding, data storage, transmission over the different channel takes process in user activity. In this area of research recent technique PACK takes an advantage of chunking scheme with execution of SHA-1 as security signature approach. According to understanding algorithm PACK face little problem formulation such as in finding high level prediction with efficient signature scheme. The algorithm exhibit reliable prediction over the data. In this dissertation work, our work presented as EPACK, which is the extension version of PACK to identify redundancy prediction over the transmitted data. Algorithm used of similarity measure algorithm, which take use of similarity score measure value from the available data and storage. The algorithm makes use of Meta information, topical relation in between the file parameters, SHA-2 for signing information and outperforms the high level prediction as compare to existing technique. The proposed algorithms also take use of security concern in between any transmission of data in different components. A highly security enhancement of ECC algorithm named HECC (Hyper Elliptic curve cryptography) is used to perform security level in this approach. This can performs over the PACK & EPACK algorithm with comparison parameter by performing data transmission using JDK framework. The proposed scheme and result comparison analysis shows the efficiency of our approach while comparing with PACK algorithm. The further approach over the simulation parameter and environment outperform its best while comparing with the existing PACK technique.



Download
30 A Consideration Independent Score Based Benchmark for Distributed Database
1MD. Zaheda Parveen, 2P Sravanthi

Abstract: Big data and hadoop plays an important role in dealing with the large number of process and big data processing in different scenario. There are multiple nodes participate in the Distribution and different type of data movement scenario. The existing algorithm which is taken for the further improvement work is distributed dataset algorithm, which is phase based Distribution algorithm to process the large number of data and data packets. Our enhance distributed dataset algorithm technique outperform as compare with the existing distributed dataset algorithm and other scheduler so far. Thus the requirement leads us to perform further improvement to the distributed dataset algorithm Distribution technique. In this dissertation our work perform to create a new heuristic based Distribution algorithm which make use of existing scenario and improve it with balanced distribution technique. The proposed technique is based on enhance model which is heuristic & priority based Distribution and load balancing Distribution based scenario which make use of all the resources properly and outperform the complete distribution using the provided Distribution algorithm. The proposed work implemented and tested in java technology and upon processing data range from 1 gb to 5 gb there are performance monitored in terms of computation processing time, throughput with hardware configuration as 4 gb ram, 750 gb hard disk and the competitive results were monitored. Thus the result as compare to existing technique were monitored which are 1.1 x improved while comparing with existing algorithm.



Download
31 Trust Enhanced Cryptographic Role Based Access Control if Secure Cloud Data Storage
1Sushma Uopanaboina, 2B Anand Kumar

Abstract: Cloud data storage has provided significant benefits by allowing users to store massive amount of data on demand in a cost-effective manner. To protect the privacy of data stored in the cloud, cryptographic role-based access control (RBAC) schemes have been developed to ensure that the data can only be accessed by those who are allowed by access policies. However, these cryptographic approaches do not address the issues of trust. In this paper, we propose trust models to reason about and to improve the security for stored data in cloud storage systems that use cryptographic RBAC schemes. The trust models provide an approach for the owners and roles to determine the trustworthiness of individual roles and users, respectively, in the RBAC system. The proposed trust models consider role inheritance and hierarchy in the evaluation of trustworthiness of roles. We present a design of a trust-based cloud storage system, which shows how the trust models can be integrated into a system that uses cryptographic RBAC schemes. We have also considered practical application scenarios and illustrated how the trust evaluations can be used to reduce the risks and to enhance the quality of decision making by data owners and roles of cloud storage service.



Download
32 Unified intelligent water management using Cyber infrastructure based on cloud computing and IoT
1Indira Derangula, 2G Sudheer

Abstract: In this project, we are focusing on continuous and real time monitoring of water supply in IOT platform. Water supply with continuous monitoring makes a proper distribution so that, we can have a record of available amount of water in tanks, flow rate, abnormality in distribution line. Internet of things is nothing but the network of physical objects embedded with electronics, sensors, software, and network connectivity. Monitoring can be done from anywhere as central office. Using thing speak as free server data continuously pushed on cloud so we can see data in real time operation. Using different sensors with controller and raspberry pi as Minicomputer can monitor data and also control operation from cloud with efficient client server communication.



Download
33 Vampire attacks: Drainin life from wireless AD-HOC sensor Network
1Lekhya Meka, 2M. Manikanta Rao

Abstract: Ad hoc low-power wireless networks are an exciting research direction in sensing and pervasive computing. Prior security work in this area has focused primarily on denial of communication at the routing or medium access control levels. This paper explores resource depletion attacks at the routing protocol layer, which permanently disable networks by quickly draining nodes’ battery power. These “Vampire” attacks are not specific to any specific protocol, but rather rely on the properties of many popular classes of routing protocols. We find that all examined protocols are susceptible to Vampire attacks, which are devastating, difficult to detect, and are easy to carry out using as few as one malicious insider sending only protocol-compliant messages. In the worst case, a single Vampire can increase network-wide energy usage by a factor of ODNÞ, where N in the number of network nodes. We discuss methods to mitigate these types of attacks, including a new proof-of-concept protocol that provably bounds the damage caused by Vampires during the packet forwarding phase.



Download
34 Human IRIS as a Biometric for Identity Verification
1Niziya Mohammad, 2M. Narsimha Rao

Abstract: —The use of human biometrics for automatic identity verification has become widespread. Mostly used human biometrics are face, fingerprint, iris, gait, retina, voice, hand geometry etc. Among them iris is an externally visible, yet protected organ whose unique epigenetic pattern remains stable throughout one’s whole life. These characteristics make it very attractive to use as a biometric for identifying individuals. This paper presents a detailed study of iris recognition technique. It encompasses an analysis of the reliability and the accuracy of iris as a biometric of person identification. The main phases of iris recognition are segmentation, normalization, feature encoding and matching. In this work automatic segmentation is performed using circular Hough transform method. Daugman’s rubber sheet model is used in normalization process. Four level phase quantization based 1D Log-Gabor filters are used to encode the unique features of iris into binary template. And finally the Hamming distance is considered to examine the affinity of two templates in matching stage. We have experimented a better recognition result for CASIA-iris-v4 database.



Download
35 Image Steganography based on complemented message and Inverted bit LSB substitution
1Radha Rukmini Sheelam, 2K. Rainu

Abstract: Steganography is the art of encoding embedding secret information in cover media in such a way so as not to provoke an eavesdropper’s suspicion. The primary purpose of this paper is to provide three levels of security, first is provided by complementing the secret message, second by hiding complemented secret message in cover image pixels that are selected randomly by using pseudo random number generator, third by using inverted bit LSB method2 as stenographic technique rather than simple LSB, thus, reduces the chance of the hidden message being detected. MSE (Mean Square Error) and PSNR (Peak Signal to Noise Ratio) are two common quality measurements to measure the difference between the cover-image and the stego-image. Results showed that the proposed method gives better results than simple LSB and inverted LSB with higher PSNR and lower MSE.



Download
36 Internet of Things: Securing data using image steganography
1Soujanya Kesavarapu, 2M. Manikanta Rao

Abstract: Steganography is the art of encoding embedding secret information in cover media in such a way so as not to provoke an eavesdropper’s suspicion. The primary purpose of this paper is to provide three levels of security, first is provided by complementing the secret message, second by hiding complemented secret message in cover image pixels that are selected randomly by using pseudo random number generator, third by using inverted bit LSB method2 as stenographic technique rather than simple LSB, thus, reduces the chance of the hidden message being detected. MSE (Mean Square Error) and PSNR (Peak Signal to Noise Ratio) are two common quality measurements to measure the difference between the cover-image and the stego-image. Results showed that the proposed method gives better results than simple LSB and inverted LSB with higher PSNR and lower MSE.



Download
37 Efficient detection of Brain Tumor from MRI's using KMean Segmentation and Normalized Histogram
1Soujanya Maddi, 2G. Sudheer

Abstract: In this project, we are focusing on continuous and real time monitoring of water supply in IOT platform. Water supply with continuous monitoring makes a proper distribution so that, we can have a record of available amount of water in tanks, flow rate, abnormality in distribution line. Internet of things is nothing but the network of physical objects embedded with electronics, sensors, software, and network connectivity. Monitoring can be done from anywhere as central office. Using thing speak as free server data continuously pushed on cloud so we can see data in real time operation. Using different sensors with controller and raspberry pi as Minicomputer can monitor data and also control operation from cloud with efficient client server communication.



Download
38 Wireless Sensor Network based Pollution Monitoring System in Metropolitan Cities
1Venkata Usha Bollam, 2M. Narsimha Rao

Abstract: In this project, we are monitoring air pollution and vehicle traffic congestion which leads to air pollution, driver frustration, and costs billions of dollars annually in fuel consumption. Finding a proper solution to vehicle congestion is a considerable challenge due to the dynamic and unpredictable nature of the network topology of vehicular environments, especially in urban areas. Recent advances in sensing, communication and computing technologies enable us to gather real-time data about traffic condition of the roads and mitigate the traffic congestion via various ways such as Vehicle Traffic Routing Systems (VTR), electronic toll collection system (ETCS), and intelligent traffic light signals (TLSs). Regarding this issue, an innovative technology, called Intelligent Guardrails (IGs), is presented in this project. IGs take advantages of the Internet of Things (IOT) and vehicular networks to provide a solution for vehicle traffic congestion in large cities. IG senses the roads' traffic condition and uses this information to set the capacity of the roads dynamically.



Download
39 HOME AUTOMATION BASED ON IOT
1Sumanjali Bandi, 2B. Naresh Reddy

Abstract: In this era of science internet is one of a fast growing factor which affiliates many facilities just like: Home Automation which is based on IOT is one of the most useful technologies for the safety purpose of home. It plays a very important role from industrial machines to the neither consumer home appliances which will be working even if you are nor active for some time. In this modern generation, peoples used automatic devices rather than using the manual devices. Since, internet is influencing people at high rate of population, inventing new technologies daily. In all the technologies IOT is the most useful technology. Home Automation System utilizes the innovation of Internet of Things for checking and controlling of the electrical and electronic machines at home from any remote area by just utilizing a Smartphone. Execution of a minimal effort, adaptable home mechanization framework is exhibited.



Download