Manuscripts

Recent Papers

Comparative Study of Low Cost Adsorbents in the Elimination of Methylene Blue Dye from Aqueous Solutions

Textile industries consume large volume of water and chemicals for wet processing of textiles. As a result, produce large volumes of colored (dye) water as waste. The effectiveness of adsorption for dye removal from wastewaters has made it an ideal alternative to other expensive treatment options. The present study gives the preliminary experimental results using low cost adsorbents viz; plantain flower petals, banana peels, snake gourd seeds, and egg shell in the eliminating methylene blue dye from aqueous solutions. The effect of various factors on the adsorption of the dye was studied in batch mode which includes pH, concentration of adsorbent and dosage of adsorbents. The study revealed that plantain flower petals were very effective in the removal of methylene blue dye and about 99.7 % removal of dye was observed.

Published by: M. Padmaja, R. Pamila

Author: M. Padmaja

Paper ID: V3I3-1580

Paper Status: published

Published: June 21, 2017

Full Details

Impact of Attacks on Permutation Only Image Encryption Scheme

Permutation is a commonly used primitive in multi- media (image/video) encryption schemes, and many permutation-only algorithms have been proposed in recent years for protection of multimedia data. In permutation-only image ciphers, the entries of the image matrix are scrambled using a permutation mapping matrix which is built by splitting and shuffling the part of the image. The literature on the cryptanalysis of image ciphers indicates that permutation-only image ciphers are insecure against ciphertext-only attacks and/or known/chosen- plaintext attacks. However, previous studies have not been able to ensure the correct retrieval of the complete plaintext elements. In this paper, we re-visited the previous works on cryptanalysis of permutation-only image encryption schemes and made the cryptanalysis work on chosen-plaintext attacks complete and more efficient. We proved that in all permutation-only image ciphers, regardless of the cipher structure, the correct permutation mapping is recovered completely by a making multiple combination of two encrypted image. To the best of our knowledge, for the first time, this paper gives a combination attack that completely determines the correct plaintext elements using a deterministic method. Also, the detection of hacker at adminside with the help of IP detection and blocking system is to be done in this system for future prevention of permutation attack.

Published by: Ambare Snehal Bharat

Author: Ambare Snehal Bharat

Paper ID: V3I3-1583

Paper Status: published

Published: June 21, 2017

Full Details

RER: Reactive Efficient Routing for Wireless Sensor Networks

In Wireless Sensor Networks (WSNs) the major challenge is to provide efficient and reliable communication between source and destination, especially in industrial WSNs (IWSNs) with dynamic and harsh environments. Hence, a Reactive Efficient Routing (RER) is designed to improve the routing protocol to provide efficient packet delivery against the unreliable wireless links. Here Dynamic Source Routing (DSR) protocol is used in the proposed system and a special technique called biased back-off scheme used to find a robust guide path through which cooperative forwarding opportunities are more. So, the data packets are sent to the destination efficiently. Performance of RER is measured using four parameters Bit error rate, Packet delivery ratio, Throughput and Control overhead packet through simulation.

Published by: Ranjan .V, Vishmitha K. V, Sushmitha J. V, Vidyashree R. Koti

Author: Ranjan .V

Paper ID: V3I3-1538

Paper Status: published

Published: June 21, 2017

Full Details

Homomorphism and Isomorphism of Rough Group

The chief objective of this study is to show the usefulness of Rough set theory in Group theory. The aim of this paper is to determine the definable and undefinable groups also construct the rough group ,upper rough group, homomorphism and isomorphism of rough group using rough set theory.

Published by: L. Jesmalar

Author: L. Jesmalar

Paper ID: V3I3-1541

Paper Status: published

Published: June 21, 2017

Full Details

Implementing Secure And Efficient Auditing Protocol For Cloud Storage

In cloud storage environment, data owners host their data on cloud servers and users can access the data from cloud servers. Due to the data outsourcing, this process of data hosting service introduces new security challenges, which requires an independent auditing service to check the data integrity in the cloud. Because, owner need to be convinced that the data are correctly stored in the cloud. Two-Party storage auditing system could not be guaranteed to provide proper auditing result thus Third-Party auditing is the better choice for the storage auditing in cloud computing. In this we try to evaluate ECC algorithm for encryption and decryption.A Third-Party auditor is capable to do a more efficient work and convinces both the cloud serviceproviders and the owner. There are chances of data being lost or get misplaced in cloud storage environment. For this we propose replication mechanism to third party auditing such that it will enhance the data availability. We divide a data file into fragments and replicate the fragmented data over the cloud nodes. Each of the nodes stores only a single fragment of a particular data file that ensures that even in case of a successful attack, no meaningful information is revealed to the attacker.Furthermore, the nodes storing the fragments are separated with certain distance to prohibit an attacker of guessing the locations of the fragments. Hence user will get the belief that his data is safely stored on the cloud and could retrieve data without any modification.To better protect data security, the first attempt to formally address the problem of authorized data deduplication.

Published by: Manisha L. Narad, Prof. Amruta Amune

Author: Manisha L. Narad

Paper ID: V3I3-1577

Paper Status: published

Published: June 21, 2017

Full Details

Design and Analysis of Hybrid Nanogrid

With pace of time there is a huge development in technologies. In recent time there is a concern of energy as right now fossil fuel is used but as population increasing in near future to meet demand it would be very tough that why we are focusing on renewable energy. Distributed energy resources based micro grid and Nano-grid framework is most technically viable bottom-top approach to sustainably meet ever-increasing demand of rural and urban communities. Recently the growth of DC operative home appliances like mobile and lap top chargers, ovens and hair dryer’s etc. are increasing and therefore a DC/DC converter is an efficient way to meet the electricity need from the local DER and helps in improving the system efficiency. In our dissertation we took three different section of solar panel and after that simulation carried out with help of buck boost converter and besides this MPPT algorithm (P & O method) for solar PV module and closed loop PI control system also used. The proposed methodology is to extract maximum DC power from solar PV system and it is directly fed to DC load or DC Nano grid. The simulation results demonstrate the buck boost converter application for maintain constant voltage at DC bus irrespective of variation of solar PV generation. Also it improves the system efficiency by reducing no. of conversions. In our dissertation work analysis of ploy crystalline, mono crystalline and thin film crystalline is done and got different simulation result.

Published by: Vijeta Pal, Sourabh Maheshwari, Ameer Faisal

Author: Vijeta Pal

Paper ID: V3I3-1548

Paper Status: published

Published: June 21, 2017

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X