IJETE
Call for papers , Manuscript submission last date 30th April 2018. Send to ijete.editor@ijete.org

Volume 1 Issue 9 October 2014 Edition

  

SUPPORT VECTOR MACHINES TECHNIQUE IN ANALYSIS OF CONCRETE- CRITICAL REVIEW
PREETHAM. S, SHIVARAJ. M, W. P. PREMA KUMAR, H. RAVI KUMAR
pp 199-203
Abstract: The state of art of support vector mechanics method (SVM) problems related to civil engineering is presented in this paper till now. Areas of further research are presented and ongoing numerical investigations on SVM techniques are shown.
CHARACTERIZATION OF ZNO NANOSTRUCTURE BASED METHANOL SENSOR PREPARED BY SOL-GEL AND CHEMICAL BATH DEPOSITION
SUDHAKAR RATTAN, VIJAY KUMAR ANAND
pp 204-207
Abstract: A ZnO nanostructure based methanol sensor prepared by sol gel having average length of 599nm is reported in this paper. A low temperature chemical bath deposition technique is employed using zinc nitrate hexahydrate and hexamethylenetetramineprecursor at 1000C on SiO2 substrate having sol gel grown seed layer. After structural characterization (XRD, SEM) three types of sensor structure designed using Aluminum electrode .The .1M concentration sample shows better magnitude response at 2500 C .While other sensor shows that at low temperature less than 1500 C the sensor operates. The possible sensing mechanism also discussed briefly.
MANAGING OVERLOADED MECHANISMS IN VM ENVIRONMENTS UNDER PID CONTROL SCHEMES
G.KARTHIKA, C.RADHAKRISHNAN, N.PREMKUMAR
pp 208-211
Abstract: Cloud computing has emerged as a new and alternative method for providing computing services. As cloud size increases, the probability that all workloads simultaneously scale up to their required services. This inspection agrees to multiplex cloud resources among numerous workloads, significantly humanizing resource use. The capability of host virtualized workloads such that available physical capacity is smaller than the sum of maximal demands of the workloads is passing on to as over-commit or over-subscription. Elasticity is one of the characteristic of cloud computing that improves the flexibility for clients and it permits them to adjust the quantity of physical resources associated to their services over time in an on-demand basis. However, elasticity makes troubles for cloud providers as it may lead to poor resource utilization, especially in combination with other reasons, such as user overestimations and pre-defined VM sizes. Use the elastic key feature in VM cloud environments and Estimating the resource allocation to design the self adapting system. By implementing distributed PID controller that changes the level of risk in data centers.
PUBLIC AUDITING AND USER REVOCATION IN DYNAMIC CLOUD ENVIRONMENT
P.BANUMATHI, S.SATHEESHKUMAR, S.KALIRAJ
pp 212-216
Abstract: Cloud Computing has been envisioned as the next generation architecture of IT Enterprise. In difference to conventional solutions, where the IT services are underneath appropriate physical, logical and recruits controls, Cloud Computing shift the application software and databases to the large information centers, where the organization of the information and services may not be completely responsible. With cloud computing and storage, users are capable to access and to divide resources accessible by cloud service providers at a lower minor cost. With cloud computing and storage services, information is not only stored in the cloud, but regularly shared among a huge number of users in a group. In this project, we propose Oruta, a privacy-preserving auditing scheme for shared data with large groups in the cloud. We utilize ring signatures to compute verification information on shared information, so that the TPA is capable to audit the accuracy of shared information, but cannot make public the uniqueness of the signer on each block. We can implement the batch auditing scheme to perform efficient public auditing to protect both identity and data privacy in cloud environments. And also extend this project to overcome the duplicated data in cloud storage and with privileges keys. We proposed deduplication scheme to check the redundant data allowed to perform the duplicate check for files marked with the corresponding privileges.
CONGESTION CONTROL IN AN INTERNETWORK
PANKAJ GAUTAM, DEEPIKA GUPTA, DEVESH KAUSHIK, PREETI SHARMA, RAHUL KUMAR, PUNEET, GYAN PRAKASH PAL
pp 217-220
Abstract: Today internetworking is growing exponentially with better connectivity. ISPs are providing better quality of services with upgraded network resources and technologies. But congestion is not avoidable in a network, which increases delay or drops the packets. Understanding of congestion and congestion control is must; there are different techniques, which are used for congestion control.
SURVEY ON KEYSTROKE DYNAMICS FOR A BETTER BIOMETRIC AUTHENTICATION SYSTEM
M.KANIMOZHI, KAVYA PUVIRAJASINGAM, M.SAVITHA
pp 221-228
Abstract: Biometrics is method of measuring the biological features of the human being for the purpose of authorization and authentication. It takes human natural attributes/features as inputs. New method of authenticating right now. Keystroke dynamics is a behavioural biometric that is used to provide authentication during user working with the computer system. Besides the traditional way of providing authentication through password, which is the static authentication, there is a new method called dynamic authentication which recognizes the user past login. This paper is a survey about various techniques and algorithms used for providing dynamic authentication.
SECURE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR NETWORKS IN THE PRESENCE OF SECURITY THREATS
G.GOMATHI, C.YALINI, T.K.REVATHI
pp 229-234
Abstract: Network security involves the authorization of access to data in a network, which is controlled the network administrator. Wireless sensor network (WSN) refers to a group of spatially dispersed and dedicated sensors for monitoring and recording the physical conditions of the environment and organizing the collected data at a central location. Collision attack means the group of nodes to access the illegal data. The data collected from individual nodes is aggregated at a base station or host computer. Due to limited computational power and power resources, aggregation of information from multiple sensor nodes done at the aggregating node is usually accomplished by simple methods such as averaging. However such aggregation is well-known to be highly vulnerable to node compromising attacks. Iterative filtering algorithms hold great promise for such a function. Such algorithms simultaneously aggregate data from multiple sources and provide trust assessment of these sources frequently in a form of corresponding weight factors assigned to data provided by each source. Data aggregation process can enhance the robustness and accuracy of information which is obtained by entire network. In a wormhole attack, the attacker receives packets at one point in the network, forwards them throughout a wired or wireless connection with less latency than the system links, and relays them to another point in the network. A distribute Warmhole detection algorithm for wireless sensor networks, which detect wormholes based on the distortions they create in a network.
A SURVEY ON PROPERTIES OF MANET AND DIFFERENT ROUTINGS FOR SECURE PACKET TRANSMISSION
NANDHINI.V , MS.A.KANIMOZHI
pp 235-240
Abstract: The Mobile Ad hoc Network is temporary, self configured, structure less wireless network. The security of the mobile node in Ad hoc is very complicated due to the malicious activity. We survey some of the issues of MANET and their mitigation technique then the properties of MANET and Trust based routing protocol along with anonymous routing protocol with its malicious activity.