-
ImagedIt - A Secure Cloud Application
Sanket Mantri ; Dhiraj Gupta; Pravin Shendkar; Abhishek Dubey
Computer Engineering
Year: 2016, Volume:2, Issue : 11
Pages: 62 - 67
Cloud computing has gained a lot of hype in the current world of I.T. Cloud computing is a big thing in the computing world after the internet. Cloud computing is used for the tasks performed on the computer over the internet and is visualized as the next-generation architecture of IT Enterprise. The ‘Cloud’ can be accessed through the internet. It is related to several technologies and the convergence of these various technologies has made it to be called as Cloud Computing. ImagedIt is an image storage service which enables user cloud storage, file sharing and collaborative editing. In this application, we focus on secure data storage in cloud. Quality of Service is an important aspect of Cloud Computing. To ensure the user’s data is intact i.e. checking correctness in the cloud a new simple and fast algorithm for image encryption is proposed. This scheme achieves data storage, correctness and allows the authenticated user to access his/her data.
Read More...
-
A Survey Paper on Load Balancing Algorithms for Resource Management in Virtualization
SURUCHI DILIPBHAI PATEL ; DINESH VAGHELA
Computer Science and Engineering
Year: 2016, Volume:2, Issue : 11
Pages: 68 - 70
Load balancing is the major concern in the cloud computing environment. Cloud comprises of many hardware and software resources and managing these will play an important role in executing a client's request. Now a day's clients from different parts of the world are demanding for the various services in a rapid rate. In this present situation the load balancing algorithms built should be very efficient in allocating the request and also ensuring the usage of the resources in an intelligent way so that underutilization of the resources will not occur and preemptive based resource management be there in the cloud environment. In this paper, we have discuss about several Load Balancing Algorithms for Resource Management in Virtualization.
Read More...
-
Efficient Clustering Protocol and Preventing Attacks in Dynamic WSN
Priti Sanjay Kharche ; Sachin R.Jadhav ; Reshma Tapale; Nitali Khedkar; Surekha Rathod
Information Technology
Year: 2016, Volume:2, Issue : 11
Pages: 71 - 75
The Wireless Sensor Network (WSN) is the fast growing technology in networking area. Various applications based on WSN are implemented from recent years due to its mobile nature. In WSN, sensor nodes are deployed at physical area to capture the environmental data. But these nodes have limited resource capacity such as energy. To save resources, secure data routing and energy is the most concern topic in WSN. To save the energy, resources and data loss prevention, data should be aggregated before directly sending to base station. Efficient clustering algorithms are available for data aggregation process to minimize the data redundancy, secure data routing and data loss prevention and to save the network energy. Existing system have introduce a velocity-based clusteringalgorithm and implement a relay placement technique with MAODV protocol to provide seamless communication among clusters. But, this system have not provide any data loss prevention measure if cluster head or relay node is compromised by attacker. To protect the data loss, in this paper we introduced Assistant Cluster Head (ACH) in each cluster with MAODV protocol. If the cluster head is caused by attack, then this ACH collect the data from all cluster members and forward it to the base station. Existing system uses various clustering protocols such as LEACH, HEED and MAODV protocol. Experimental results show that the MAODV protocol with ACH provide better data loss prevention, save energy than the existing LEACH, HEED and MAODV protocol.
Read More...
-
A Study on Impact of Merger on Financial Performance of Selected Banks
Dr. M.Ravichandran ; P.Pandeeswari
other
Year: 2016, Volume:2, Issue : 11
Pages: 76 - 79
India has witnessed the storm of mergers in recent years. Banks play a major role in the economy, serving as sources for loans and giving consumers places to deposit their savings. When banks merge it can have benefits to both the owners and the community of customer. Many banks now consider acquisition or merger as a choice to empower their business invader to fill service or technology gaps. This study is mainly concentrated on the financial performance and profitability of the banks after their merger. This study is carried out for merger of Centurion bank of Punjab with HDFC Bank.
Read More...
-
Comparative Study of Different Technologies for Treating Municipal Wastewater- A Review
Ankit Kumar Singh ; Govind Pandey
Environment Engineering
Year: 2016, Volume:2, Issue : 11
Pages: 80 - 84
Municipal Wastewater Treatment aims to the production of large amount of sewage sludge, which requires proper and environmentally accepted management before disposal. The main objective of this paper is to outline the current situation and discuss future perspectives for sludge treatment and disposal management. A great variety of wastewater treatment technologies are used in the world, while differences are observed between aerobic and anaerobic digestion are the most popular methods. This paper reviews treatment process, advantages and disadvantages of various technologies present in India.
Read More...
-
Effect of Plastic Waste on Properties of Road Aggregate
Pratiksha Singh Rajput ; R. K. Yadav
Geo Technical Engineering
Year: 2016, Volume:2, Issue : 11
Pages: 85 - 88
The present study investigates the use of waste plastic for the modification of properties of road aggregates. The shredded plastic waste was thoroughly mix with heated aggregates forming a layer on the surface of the aggregates .These plastic waste coated aggregates are tested for impact value, crushing value, specific gravity and water absorption. It has been found that there is significantly improvement in the properties of plastic coated aggregates.
Read More...
-
Wheel Changer
Amal C Abraham ; Ben Mathai Mathew; Gokul Ramanadhan K; Hashir Nazeer; NIRMAL CHANDRAN V
Mechanical Engineering
Year: 2016, Volume:2, Issue : 11
Pages: 89 - 96
In current scenario, task of changing punctured/damaged wheel(s) of heavy vehicles outside a well-equipped work shop is very difficult, time consuming and prone to accidents. Till now, there do not exist any proper tool or mechanism to aid the replacement of damaged wheels from heavy vehicles. The tool that we developed is a perfect solution for the above said difficulties. The most common tyres used in heavy vehicles are R20 and R22 and air pressure inside it ranges from 100 – 125 psi. So the one wheel totally weighs 80 – 125 kg and the whole process of changing the wheel consumes a large amount of calories of energy.The aim of this product is to eliminate the difficulties and threats in changing the wheel. Using the tool – Wheel Changer, single person can remove punctured wheel from the wheel hub of the axle, bring the Stepney from its holder to the desired position in the axle and fix it within no time. Placing the damaged wheel in the desired position in the truck frame. Thus by the usage of this tool, threats can be eliminated and time consumption and effort can be minimised. The tool mainly consists of 3 parts. Base, height adjuster and the wheel holder. If the tool is provided with torque multiplier and impact wrench which are available in the market to unscrew and screw the bolts, the whole process can be made more efficient. Since the tool - Wheel changer is flexible, compact, lightweight and cost effective, it is possible to provide a kit consist of the tool changer, torque multiplier and impact wrench along with the vehicle/ Chassis.
Read More...
-
Floating Solar PV Potential in Large Reservoirs in India
Aseem Kumar Sharma ; D P Kothari
Renewable Energy
Year: 2016, Volume:2, Issue : 11
Pages: 97 - 101
The 100GW Solar Power (by year 2022) target set by Govt. of India needs optimum utilisation of available area for deployment of Solar PV panels. Though land & roof tops are considered as focus areas, Floating Solar PV (FSPV) on large reservoirs & other water bodies also offers significant potential. This paper aims to analyse the FSPV potential in large reservoirs in India. This paper also touches upon the types of FSPV & benefits of deployment of FSPV.
Read More...
-
Non Signature Based Virus Detection in Emails
Mayank Sinha ; Prof. Hasib Shaikh; Ameya Angane; Snehal Chavan
Computer Engineering
Year: 2016, Volume:2, Issue : 11
Pages: 102 - 105
Virus programs found on computer, copy into another clean program without taking the user’s permission. A good anti-virus program which consists of all the features to detect such malicious programs would be ideal, but in certain engineering scenarios, this is not sufficient enough. These programs can certainly detect the malicious programs and delete entire email file. In this technique, the system scans and lets the user know about the availability of malware and instead of deleting the entire email file, it blocks the program for access until the malware is removed from the program. This method is called ‘Self Organising Mapping’ (SOM). This paper introduces an effective and simple method to scan and let know the user about the availability of possible malware and helps to avoid its access.
Read More...
-
Mouse Pointer Movement Using Eye Tracking System And Voice Recognition
Avadhut Keluskar ; Pawan Dixit; Akshay Kondalkar; Hasib Shaikh; Sonal Balpande
Computer Engineering
Year: 2016, Volume:2, Issue : 11
Pages: 106 - 109
The field of human computer interaction has been undergoing a new renaissance lately. While many companies have and are still spending millions to develop highly visually appealing GUIs and state-of–art interaction systems for the common users since the inception of desktops, the development of interaction systems for the disabled has taken a kick start recently. The Eye gaze system is a communication and control system for people with complex physical disabilities i.e. You can run system with your eyes and voice system. There are some who can’t use their hands and for them the voice guided systems have been in use for quite some time now. Through voice recognition system user can give voice command and control the computer system. Our eye gaze system helps in providing solution to this problem. Our system controls the computer cursor by following the user’s gaze. Thus, our scheme can be used to enhance the quality of life of people with disabilities, all over the world.
Read More...