Manuscripts

Recent Papers

Privacy Preserving and Secure Data Integrity Protection Security in Regenerating Coding Based Public Cloud Storage

Now a day’s use of cloud computing is rapidly increasing. Cloud infrastructure is being a common solution adopted by large organizations for storing and accessing data. It provides the current need for data storage with a flexible and dynamic storage that can grow. In this paper, we describe the design and development of a cloud computing based secure cloud data storage using encryption. Cloud data storage is a major solution to overcome this problem. These mechanisms to provide data integrity and security for client’s data in cloud storages. In users should be able to just use the cloud storage as if it is local, without worrying about the need to verify its integrity. This understands the trend in terms of complexity and strength of a secured solution and provides some insights of what is still left in such area of research. Cloud data storage provide better privacy as well as ensure data availability and reliability can be achieved by dividing the user’s data block into data pieces. Cloud storage is of critical importance so that users can resort to a third party auditor (TPA) to check the integrity of outsourced data and be worry-free.

Published by: Monika B. Thakare, N. M Dhande

Author: Monika B. Thakare

Paper ID: V3I2-1196

Paper Status: published

Published: March 9, 2017

Full Details

Self Operated Petrol Pump

In current days fuel stations are operated manually. These fuel pumps are time-consuming and require more manpower. To place fuel stations in distant area it very costly to provide excellent facility to the consumers all these problem are sorted out by the use of unmanned petrol pump which requires less time to operate and it is effective and can be installed anywhere the customer self-going to avail the services the payment is done by electronic clearing system. The simple and proper use of microcontroller and GSM technology provides a total security and atomization in the distribution of fuel. It has easy operated mobile phone system and graphics user interface (GUI). It interfaces with high-speed fuel dispenser which is convenient for the consumer to operate. In our system the password will be provided to the user and customer has to enter this password on the LCD provided by the fuel station which will help the petrol company to create authentication for the user also the distribution of the fuel is not possible until it gets verified by the database. In short, we provide a secure system for fuel distribution. The advancement of this project can help industry financially.

Published by: Pooja Ashok Dalavi, C. R. Dongarsane, Sunaina Golandag, Snehal Powar

Author: Pooja Ashok Dalavi

Paper ID: V3I2-1194

Paper Status: published

Published: March 9, 2017

Full Details

Cosmic Radiation Raining Down on Earth and Malignancy Nexus

This document gives information about a special type of radiation which is highly detrimental to human health and terrestrial ecosystem.Cosmic rays are charged subatomic particles. They are electrically charged particles. Cosmic rays are mostly protons and ions, which have positive charges. A small percentage are electrons, which have negative charges. Cosmic rays pour down on Earth like a constant rain. We don't much notice these high-energy particles, but they may have played a role in the evolution of life on our planet. Cosmic rays are mostly high-energy protons originating from supernova shock waves. It is difficult to precise trace where a cosmic ray came from because its trajectory is bent by magnetic fields. In fact, a typical cosmic ray will bounce inside the galaxy's magnetic field for millions of years before eventually colliding with something… like Earth. Every square centimeter on the top of the Earth's atmosphere is hit by several cosmic rays per second. This is forever going on. None of these "primary" cosmic rays ever reach us on the ground. Instead, they collide with atoms in the upper atmosphere, creating a shower of lower energy "secondary" particles. At sea level, the majority of cosmic ray secondaries are highly penetrating muons. About 10,000 muons pass through our bodies every minute. Some of these muons will ionize molecules as they go through our flesh, occasionally leading to genetic mutations that may be harmful.The passage of a cosmic ray through your body can leave various fluids within your body momentarily ionized.

Published by: Moubani Bandyopadhyay

Author: Moubani Bandyopadhyay

Paper ID: V3I2-1192

Paper Status: published

Published: March 9, 2017

Full Details

Analysing Two-Term Dot Product of Multiplier Using Floating Point and Booth Multiplier

ABSTRACT: The Floating Point in two-term Dot-Product of multiplier referred as discrete design. Floating Point is a wide variety for increasing accuracy, high speed, high performance and reducing delay, area and power consumption. This application of floating point is used for algorithms of Digital Signal Processing and Graphics. Many floating point application is to reduce area, from the survey the fused floating point gives better performance using both the single precision and the double precision in multiplication, addition, and subtraction. The scientific notations sign bit, mantissa and exponent are used. The real numbers are divided into two, fixed component of significant range (lack of dynamic range) and exponential component in floating point (largest dynamic range). Converting decimal to fused floating point and normalize the exponent part and rounding operation for reducing latency. The other operation is compared by booth multiplication. It is also used for reduction of area and power. That multiplies two signed binary numbers in two’s complement notation, it used desk calculators that were faster at shifting than adding and created the algorithm to increase their speed, then both the results are verified in Verilog hardware description Language.

Published by: Mukesh Krishna .R, Mohana Priya .S, Manicka Vasagam .P, Dr. B. Vinoth Kumar

Author: Mukesh Krishna .R

Paper ID: V3I2-1190

Paper Status: published

Published: March 9, 2017

Full Details

A Review on Performance Analysis of Energy Detection Technique for Cognitive Radio over Different Windowing Techniques

The Spectrum is based on the tremendous growth in the wireless communication network which raises the demand of the frequency user.The most efficient way of allocating spectrum and reliable spectrum sensing is Dynamic spectrum allocation. Cognitive radio is one of the emerging technology in wireless communications in which a network can flexible changes its transceiver parameter. The Primary user can take the priority decision to detect the presence of the primary user, this can be done by a technology so-called cognitive radio. This can happen if we prefer the appropriate window technique to evaluate system parameter for sensing the availability of vacant band. We show that by comparing the different windows techniques, cognitive radios not only provide better spectrum opportunity but also provide the chance to a huge number of wireless users. In this paper Energy detection based Spectrum Sensing with different windowing methods i.e. rectangular and hamming are developed, that uses to detect the energy of the received signal. We detect the spectral correlation between the two peaks of the signal to sense the presence of the primary user.Therefore windowing strategies are used for improves system performance by reducing spectrum leak. The comparative analysis using different windowing methods shows in Energy detection method.

Published by: Preeti Garud, Shivangini Morya

Author: Preeti Garud

Paper ID: V3I2-1189

Paper Status: published

Published: March 9, 2017

Full Details

Black hole Attack in Mobile ad Hoc Networks: A Review

Mobile ad hoc networks are widely used networks in the present times. The nodes in such network consist of laptops, mobile phones etc. These devices often have very important information in them. Security of these networks is very vital. These networks are prone to various kinds of attacks such as black hole attack, wormhole attack, DDoS attack etc. Out of many other attacks possible, black hole attack is pretty dangerous as it drops all the packets received by it. This paper presents various studies that have been done by many authors in the past regarding detection and prevention of such attacks.

Published by: Harsimran Kaur, KamalJeet Mangat

Author: Harsimran Kaur

Paper ID: V3I2-1185

Paper Status: published

Published: March 8, 2017

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X