-
Securing Data Deduplication On Hybrid Cloud Using Asymmetric Key Algorithm
Prakash Gapat ; Prakash Gapat; Snehal Khillare ; Akshay Khiste; Rohini Pise
Information Technology
Year: 2016, Volume:2, Issue : 11
Pages: 759 - 763
Data deduplication is an effective compression tech-nique to eliminate duplicate copies of repeating data.It has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. For the protection of sensitive data while supporting deduplication, the convergent encryption technique is being used to encrypt the data before outsourcing it to cloud storage.In order to make system more secure, the different privileges of users are again considered while checking duplicate content.But the problem which occurs in this approch is that int this we use symmetric key encryption technique to encryts and decrypts data.In this only single key is used for encryption and dycryption , This key can be misused. So we are using public key cyptography method in this approch the file is encrypted by using public key and drypted by using private key this two different keys are generated on private cloud.
Read More...
-
An Efficient Data Gathering and Aggregation for Multiple Applications in Wireless Sensor Networks
Mr. T. Balaji ; Mr. P. Nanda Kumar; Mrs. M. Fathima Begum; Mr. M. Abdul Naseer; Mr. S. Abdul Kani
Computer Science and Engineering
Year: 2016, Volume:2, Issue : 11
Pages: 764 - 770
Data aggregation in wireless sensor networks refers to acquiring the sensed data from the sensors to the gateway node. It reduces the amount of power consumed during data transmission between the sensor nodes. Generally homomorphic encryptions have been applied to conceal communication during aggregation. Since enciphered data can be aggregated algebraically without decryption. Here adversaries are able to forge aggregated results by compromising them. However, these schemes are not satisfying multi-application environments, provide insecure transmission and do not provide secure counting for unauthorized aggregation attacks. In this paper, we propose a new concealed data aggregation scheme extended from homomorphic privacy encryption system. The proposed scheme designed for a multi-application environment, mitigates the impact of compromising attacks in single application environments and also it can avoid the damage from unauthorized aggregations by the privacy homomorphic encryption scheme.
Read More...
-
Voice Control Robot for Object Detection
Pallavi Dinkar Aher ; Pallavi D Aher; Sunil Bhise; Mugdha Kakade; A. U. Deshmukh
Electronics and Telecommunication
Year: 2016, Volume:2, Issue : 11
Pages: 771 - 774
The project presents a smart approach for a real time inspection and selection of objects. Image processing in today’s world grabs massive attentions as it leads to possibilities of broaden application in many fields of high technology. This project presents a mechatronics color detection system solution with the application of image processing. Image processing procedure senses the objects in an image captured in real-time by a webcam and then identifies color and information out of it. This information is processed by image processing for pick-and-place mechanism and select right switch. The microcontroller sends signal to circuit which drives the various motors of the robotic arm to grip the object and place it in the specified location and turn on the switch. Based upon the detection, the robotic arm moves to the specified location, releases the object.
Read More...
-
Serving Robot
Neeti Malik ; Aplana Singh; Neetu Rani; Pratibha; Srishti Pragya
Electronics & Communication Engineering
Year: 2016, Volume:2, Issue : 11
Pages: 775 - 777
In today’s world the use of robot is going on increasing. Robots are able to carry out every work more effectively and efficiently than a man can do. Hence one of such application of robot could be SERVING ROBOT. There are many areas of research that could be done for a serving robot. In this paper we have tried to demonstrate a prototype of Autonomous Serving Robot which will take order and serve the food to the customer. The implementation is done with available resources to reduce the cost of project. In this paper we demonstrate the idea of automatic menu serving robot. We have made a robot which provides proper service to customer in restaurant. If a person wants to give an order, then he can call the robot by simply pressing a switch on his table. The whole system makes use of RF technology.
Read More...
-
Watershed based Morphometric Analysis of South Pennar River Basin, Krishnagiri District, Tamil Nadu using Remote Sensing and GIS
Dr. L.Yeshodha ; R. Vinithra
Remote Sensing and GIS
Year: 2016, Volume:2, Issue : 11
Pages: 778 - 783
Remote sensing and GIS has emerged as an efficient tool in delineation of drainage pattern and ground water potential and its planning and management. This technique can be employed for identification of morphological features and analyzing the properties of basin. In the present study an attempt has been made to analyze morphometric parameters and prioritize six sub watershed of South Pennar river basin in Hosur block, Krishnagiri district Tamil Nadu. Quantitative morphometric parameters of the basin can address linear, areal and relief aspects to understand conditions of drainage and their relationship with soil and water. The morphometric parameters are stream ordering, stream length, stream length ratio, and bifurcation ratio, drainage density, stream frequency, form factor, circulatory ratio, and elongated ratio were analyzed to know the characters of the watershed. The knowledge based weightage as being assigned by considering its influence on soil erosion then the compound value of all the parameters were computed, based on this all sub-watersheds has been prioritized into four classes very high, high, medium and low.
Read More...
-
Hardware Implimantation MATLAB bsed Face Recognition Door Access
Shankha Mitra Sunani ; Deepak; Jagadiswar; Rajanikanta
Electronics & Communication Engineering
Year: 2016, Volume:2, Issue : 11
Pages: 793 - 795
Authentication is a significant issue in system control in computer based communication. Human face recognition is an important branch of biometric verification and has been widely used in many applications, such as video monitor system, human-computer interaction, and door control system and network security. This project describes a method for Door Access System which will integrate with the face recognition technology using MATLAB algorithm. The system will have a database of the registered peoples. If the face matches with the database then it displays the authorized user and the door opens else it displays unauthorized user and the system starts beeping.
Read More...
-
A Study on Lifestyle of Breadwinners in Unorganised Sector in Trichy
SUBA A ; PROF. M. ROBINSON
MBA
Year: 2016, Volume:2, Issue : 11
Pages: 796 - 805
“The more lifestyle of a person depends on a chance, the more superstitious he becomesâ€. The Highest Indian Constitutional Document provides equality to all human beings with dignity, but it is not seen in this type of work force. This is very painful to those who are love humanity and its values. They are facing a threat from the giant Indian and Multinational Companies in the name of Globalization. This paper may help to understand the present life-style conditions of breadwinners in unorganised sector, nature of their work, income, housing, education occupation, water supply, amenities and facilities available with them. This study is useful in analyzing the lifestyle of unorganised workers and will bring a meaningful suggestion to the policy makers to upgrade the status of unorganised workers in future.
Read More...
-
CUSTOMER PERCEPTION TOWARDS E-BANKING IN TRICHY DISTRICT
M.MALATHI ; DR.C.THIRUMAL AZHGAN
MBA
Year: 2016, Volume:2, Issue : 11
Pages: 806 - 811
Banks today know better than anyone the opportunities and the risks they face in an ever changing competitive environment. In offering ecommerce products, banks had some key advantage over potential competitors. The purpose of this study is to find out the factors that mainly affect the customer perception of internet banking amongst gender and different age groups. This study helps in assessing these factors in the context of internet banking and would therefore help the bank management not only in improving level of satisfaction but also strengthening the bond between bank and their customer. This paper determines is to determine the customer’s perception towards the e-banking. A total number of customers taken for the study are 160. Questionnaires are used to conduct data collection and then analyzed using statistical techniques: Chi-square test, regression analysis, correlation and percentage analysis. This Study reveals that mostly the customers prefer internet banking due to reliability, convenience, sped, safety, security, cost effectiveness and an error free system.
Read More...
-
A Study on Performance Evaluation of Mutual Funds Schemes in India
N. BHAGYASREE ; MRS.B.KISHORI
MBA
Year: 2016, Volume:2, Issue : 11
Pages: 812 - 816
The present paper investigates the performance of open-ended, growth-oriented equity schemes for the period from April 2011 to March 2015 of transition economy. Daily closing NAV of different schemes have been used to calculate the returns from the fund schemes. BSE-sensex has been used for market portfolio. The historical performance of the selected schemes were evaluated on the basis of Sharpe, Treynor, and Jensen’s measure whose results will be useful for investors for taking better investment decisions. The study revealed that 14 out of 30 mutual fund schemes had outperformed the benchmark return. The results also showed that some of the schemes had underperformed; these schemes were facing the diversification problem. In the study, the Sharpe ratio was positive for all schemes which showed that funds were providing returns greater than risk free rate. Results of Jensen measure revealed that 19 out of 30 schemes were showed positive alpha which indicated superior performance of the schemes.
Read More...
-
A Study on Occupational Stress Among the Women Employees in Banking Sector at Trichy District
RM. Alagu Krithika ; Prof. M. Robinson
MBA
Year: 2016, Volume:2, Issue : 11
Pages: 817 - 820
Indian women’s are saved a lot after independence, from just an experienced homemaker; women today have gained skills and potential of not just because of being a homemaker but being at parity with their male counterpart. Moreover varying roles of women workers, they have preserved the conventional work culture of household. Now a day the Banking sector are thriving towards high rate that the women have to work for longer hours to sustain the standard of living and accomplish their basic needs. In spite of having the trending technologies and services, women feel to be work loaded and stressed. This study shows that a large number of bankers are facing high stress because of their job and the reasons behind this stress include long hours of working, improper reward system, lack of job autonomy, organizational culture, role conflict etc. and the main reason is because of lack of management support to employees. The employees can notice a number of symptoms indicate high level stress among them. However if these symptoms are not noticed in early Stage, they can cause serious problems to health among employees such as depression, heart problems, diabetes etc. Not only health but personal life of bankers are also being affected because of high job stress, most employees are unable to spend time at home or with family. However, with the help of proper management techniques by management, the bankers stress level can be reduced to great extent.
Read More...