Manuscripts

Recent Papers

Research Paper

Authorization of data sharing in cloud

A Secure information sharing plan proposes by utilizing calculation called DSS-CP-ABE in light of Attribute-Based Encryption (ABE) technique to offer effective access control over ciphertext. To utilize intermediary servers for encryption and decoding tasks. In our approach, computational activities in ABE are directed on intermediary servers, which significantly lessen the computational overhead on customer side cell phones. Then, in DSS-CP-ABE, keeping in mind the end goal to keep up information protection, a variant ascribe is added to the entrance structure. The unscrambling key organization is changed with the goal that can be sent to the intermediary servers securely. Here present sluggish re-encryption and portrayal field of credits to decrease the repudiation overhead when managing the client disavowal issue. At last, we execute the information sharing model system in light of LDSS. The investigations demonstrate that DSS can enormously decrease the overhead on the customer side, which just presents an insignificant extra cost on the server side. Such an approach is useful to execute practical information sharing security plot on cell phones.

Published by: Tamilarasi S., Ramya V.

Author: Tamilarasi S.

Paper ID: V4I4-1198

Paper Status: published

Published: July 9, 2018

Full Details
Research Paper

In vitro propagation of pomegranate

An investigation on “Micropropagation of pomegranate (PunicagranatumL.) Var. Bhagwan” In the present investigation total five sub-experiments was carried out. In which CRD was applied for a laboratory experiment and RBD for field experiment to find out best explants, surface sterilants, shooting media, rooting media, and hardening mixtures. Regarding the suitability of explants, shoot tip was best for culture establishment. The study on surface sterilization revealed that explants treated with 0.1 percent mercuric chloride for 10 minutes showed the maximum survival percentage (90.58%) and less contamination percentage (9.42) in shoot tip explants. Shoot differentiation study showed that maximum number of shots per shoot tip explant (1.73) was recorded in treatment containing MS + BAP 2.0 mg/l, maximum shoot length (2.80 cm) was observed on medium containing MS + BAP 2.5 mg/l and maximum number of leaves (7.73) was recorded on medium containing MS +BAP 2.5mg/among the auxins used in the rooting experiment the maximum number of roots(9.66) per shoot tip explant was recorded in treatment containing ½ MS + NAA 6 mg/l. Maximum root length (3.20 cm) was found on medium containing ½ MS + IBA mg/l. While hardening in different hardening media, it was observed that maximum (71.87%) survival of plantlets from shoot tip explants was found on medium containing soil + sand (1:1v/v).

Published by: Gorad D. S., Shaikh S. A., Kallalbandi B. M., Mali A. S.

Author: Gorad D. S.

Paper ID: V4I4-1191

Paper Status: published

Published: July 9, 2018

Full Details
Research Paper

Storage identity based encryption in cloud for secure data sharing

Identity based public key system(IDPKS) is an attractive alternative to public key cryptography. ID-PKS setting eliminates the demands of public key infrastructure(PKI) and certificate administration in conventional public key settings. Due to the absence of PKI, the revocation problem is a critical issue in IBE settings. Several IBE schemes have been proposed regarding this issue in IBE settings. ID-based encryption (IBE) allows a sender to encrypt message directly by using a receiver’s ID without checking the validation of public key certificate. Accordingly, the receiver uses the private key associated with his/her ID to encrypt such ciphertext. Since a public key setting has to provide a user revocation mechanism, the research issue on how to revoke misbehaving/compromised users. We propose a new IBE scheme with a cloud revocation authority(CRA) to solve the two shortcomings, namely the performance is significantly improved and the CRA holds only a system secret for all the users. Finally, we extend the proposed IBE scheme to present a CRA-aided authentication scheme with no period-limited privileges for managing a large number of various cloud services.

Published by: M. Sandeep, J. Mohana

Author: M. Sandeep

Paper ID: V4I4-1199

Paper Status: published

Published: July 9, 2018

Full Details
Research Paper

Retina based authentication for E-voting system using MD5 algorithm

The electronic voting system is the easiest way for the election process. The E-Voting System is a digital electronic system. In this process, the user’s data are collected in a digital manner. The stored data should be protected from unauthorized persons. The major issues of this process are the protection of stored data. The data security is considered as an important factor in an online voting system. Hence, the stored templates should be needed to prevent unauthorized users. In this work, explores unique retina features in a single can be existing in a binary format which can be quickly matched with the stored template to authorize identity. As biometric template are deposited in the database, owing to security threats biometric template may be altered by unauthorized persons. If the biometric template is altered authorized user will not be allowed to access the source. A box counting algorithms used to extract retina blood vessels from retina image. It analyzes and presents a high-level security and better image encryption using MD5 algorithm which is implemented on high descriptor value in an image. The matching process is done by using a tree data structure. The experimental results show high accuracy for the matching process when applying more images and achieve optimal results in secure online E-voting system.

Published by: R. Suganya, R. Anandha Jothi, Dr. V. Palanisamy

Author: R. Suganya

Paper ID: V4I4-1143

Paper Status: published

Published: July 7, 2018

Full Details
Research Paper

Formulation of solutions of standard quadratic congruence of even composite modulus as a product of two odd primes and eight

In this paper, a formula for finding solutions of a standard quadratic congruence of even composite modulus as a product of two different odd primes and eight is established. It solves the problem directly. It saves the time of calculation. The formulation is the merit of the paper.

Published by: Bikashchandra Mukunda Roy

Author: Bikashchandra Mukunda Roy

Paper ID: V4I4-1195

Paper Status: published

Published: July 7, 2018

Full Details
Research Paper

Design and thermal analysis of ceramic coated Mercedes Benz piston

Piston is considered to be one of the important parts of an internal combustion engine. It is a part which bears the pressure of the combustion of the gas inside the cylinder. Normally they are made up of cast iron which bears the gas pressure. It is used to deliver the power via connecting the rod to the main shaft of the engine. Nowadays they are made of aluminum alloy to keep it lightweight. As the top surface of the piston has to bear the load, it is advisable to cover it with some coating material so that it could bear the thermal load. Piston made up of gray cast iron coated with a ceramic material (MgZrO3) which is bonded by special material (NiCrAl) is designed for Mercedes Benz/1985 by machine design approach to determine the dimensions of the piston and then it is modeled in ANSYS Workbench 17.1. The pressure of the 5 N/mm2 is applied on the piston. The equivalent stresses are found to be same for both coated and non-coated piston. Thermal analysis of both coated and the non-coated piston is done. The properties like equivalent stresses, temperature variation, and total deformation under pressure and thermal load are determined with the change in the thickness of the ceramic coating material. It is concluded that ceramic coated piston is able to handle the thermal load and is indifferent towards the structural load.

Published by: Mangal Mai Shukla, Om Prakash Tiwari

Author: Mangal Mai Shukla

Paper ID: V4I4-1194

Paper Status: published

Published: July 7, 2018

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X