IJETE
Call for papers , Manuscript submission last date 30th April 2018. Send to ijete.editor@ijete.org

Volume 2 Issue 4 April 2015 Edition

AN EXPERIMENTAL WORK ON CONCRETE BY ADDING BACILLUS SUBTILIS
PRADEEPKUMAR.A, AKILA DEVI, ANESTRAJ.S, ARUN.S, SANTHOSHKUMAR.A
pp 69-73
Abstract: The present investigation is to obtain the performance of the concrete by the microbiologically induced special growth. One such has led to the development of a very special concrete known as bacterial concrete where bacteria is induced in the mortars and concrete to heal up the faults. Researchers with different bacteria proposed different concretes. Here an attempt was made by using the bacteria “Bacillus subtilis strain no jc3”. This study showed a significant increase in the compressive strength due to the addition of bacteria. When 30 ml of “Bacillus Subtilis” is added in M20 grade concrete it attains maximum compressive strength. In concrete self-healing property is successfully achieved due to addition of bacteria.
EXPERIMENTAL STUDY ON SELF CURING CONCRETE USING SODIUM LIGNOSULPHONATE
RIYAZ AHAMED. K, PRADEEP KUMAR.A, DURAI PRIYADARSHINI, KALAIVANI.K, KINGSTA BEAUTLIN.M
pp 74-78
Abstract: Concrete is a mixture of cement, aggregates and water with or without suitable admixtures. Curing is the process of maintaining the proper moisture content to promote optimum cement hydration immediately after placement and to attain desirable strength and other properties. This paper reports an experimental study carried out to investigate the usage of sodium lignosulphonate as self-curing agent. In this study compressive strength and split tensile strength of self-curing concrete with varying percentages(0.5%,1%,1.5%,2%,2.5%,3%) for 7,14,28 days are analyzed, tested and compared with conventional concrete of similar mix design. According to IS: 10262-1982, the mix design is determined for concrete of grade M20.Compressive and split tensile test results shows that the optimum strength of self-curing concrete attain at 0.5% mixture of sodium lignosulphonate when compared to conventional concrete.
SECURITIES ON SMART-CARDS IN DISTRIBUTED SYSTEMS USING ONE TIME PASSWORD
RAJA IYAPPAN P, KARTHIKA M
pp 79-83
Abstract: Smart Card or Chip card technology is fast becoming commonplace in our culture and daily lives. Smart cards provide computing and business systems the enormous benefit of portable and secure storage of data and value. At the same time, the integration of smart cards into your system introduces its own security management issues, as people access card data far and wide in a variety of applications. When a smart card is exaggerated by an attacker, the attacker will try to analyze the secret information within the smart card or break the entire authentication system. So we need smart card based password authentication scheme for providing the security to the smart card. Cryptographic protocols protect the exchange of money between the smart card and the machine. In our proposed scheme involves two different methods with a server and a user, and typically consists of following phases. Those are registration phase and authentication phase. In this registration phase is used to determine who is the user and server, after that the user is able to access many times. Using valid smart card and password user attempt the successful login. Here by providing two-factor (password and smart card) authentication One time Password Generation it enable access the smart at time of authenticating card with server. The user can get auto generated password as randomly and also get update password information which generated by the server to the smart card accordingly. This work is done in the authentication phase. Due to the limitation of computational power, a smart card may not be able to afford heavy computations. Thus employ an additional pre-computation phase to speed-up the authentication process during the log-in phase by providing Eye Exposure scanner which able to authenticate only with Particular card holder with server.
DUALSHIELD: NETWORK ATTACK DETECTION & PREVENTION
NITIN NIMASE, RESHMA THOMBRE, MONALI TINGARE, SONALI TINGRE
pp 84-88
Abstract: Internet one of the important means of communication and a source of information have become an inseparable part of daily life. Web services have advanced to multi-tiered design wherein the web server runs various applications at front-end logic and data are outsourced to file server or database. Internet is broadly used and so the web servers along with database servers are prone to various attacks. In order to prevent these attacks, we try to monitor both web and consequent database requests to ferret out attacks, those independent IDS would not be able to identify. Intrusion Detection Systems (IDS) are designed to protect nasty activities or policy violations and generate reports for management of sessions. Intrusion detection is the process of identifying possible events, login information, documenting existing threats and identifies problems in security policies. An IDS examines all inbound and outbound network activities and search for a specific attack that is previously documented. The study of this paper enables us to identify important reduced input features in building IDS that is computationally efficient and effective. We have also used Data Mining for extracting information from a dataset that contains user or client details that are accessing web services and other information. Implementation of DualShield will help us to expose various types of attack like Denial of Service Attack (DOS), SQL Injection and Direct DB Attack.
FIXED POINT LMS ADAPTIVE FILTER WITH LOW ADAPTATION DELAY
INGUDAM CHITRASEN MEITEI, MR. P. BALAVENKATESHWARLU
pp 89-95
Abstract: In this paper, the behaviour of the Delayed LMS (DLMS) algorithm is studied. It is found that the step size in the coefficient update plays a key role in the convergence and stability of the algorithm. An upper bound for the step size is derived that ensures the stability of the DLMS. A novel partial product generator has been used for achieving lower adaptation delay and area-delay-power efficient implementation. The relationship between the step size and the convergence speed, and the effect of the delay on the convergence speed are also studied. The analytical results are supported by the computer simulations. The problem of the efficient realization of a DLMS transversal adaptive filter is investigated.
USE OF PET (POLY ETHYLENE TERAPHTALATE) WASTE IN BITUMINOUS ROAD CONSTRUCTION –A CRITICAL REVIEW
K.V.R.PRASAD, DR S.P.MAHENDRA, DR N.S.KUMAR
pp 96-99
Abstract: Over the years, plastics have become the preferred packaging material by virtue of their superiority over other conventional materials. With the increasing use of plastic as packaging material, post-consumer plastic wastes became an increasingly serious environmental issue.So,there is an immediate need for adoption of environment friendly technologies such as economic recycling, development of biodegradable plastics, conversion of plastic wastes into value added products and fuel, use of plastic wastes for road construction, recycling of PET bottles into fibers or bottle to bottle technologies etc. In this paper, an attempt was made to summarise the present scenario of plastics waste management vis-à-vis various disposal techniques, which need to be expeditiously taken-up with an eye on innovative solutions.
COMPUTER NETWORKS BASED SINGLE SIGN ON PROCESS
MANOJ ATAKARE, RAHUL BARGE, ARSHAD MOMIN
pp 100-103
Abstract: Distributed Computer network based Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential to be authenticated by multiple service providers in a distributed computer network. Recently, Chang and Lee proposed a new SSO scheme and claimed its security by providing well-organized security arguments. In this paper, however, we demonstrative that their scheme is actually insecure as it fail to meet credential privacy and soundness of authentication. Specifically, we present two impersonation attacks. The first attack allows a malicious service provider, who has successfully communicated with a legal user twice, to recover the user’s credential and then to impersonate the user to access resources and services offered by other service providers. In another attack, an outsider without any credential may be able to enjoy network services freely by impersonating any legal user or a nonexistent user. We identify the flaws in their security arguments to explain why attacks are possible against their SSO scheme. Our attacks also apply to another SSO scheme proposed by Hsu and Chuang, which inspired the design of the Chang–Lee scheme. Moreover, by employing an efficient verifiable encryption of RSA signatures proposed by Ateniese, we propose an improvement for repairing the Chang–Lee scheme.
AN EFFICIENT AND RELIABLE DATA ROUTING FOR IN-NETWORK AGGREGATION IN WIRELESS SENSOR NETWORK
SHIVAKUMAR A B, JAGADEESHA R, ANANDA BABU J, RASHMI K R
pp 104-107
Abstract: The main key issue in Wireless Sensor Networks (WSNs) is energy conservation in nodes. WSNs are used in many applications for precise monitoring. These contain high density of nodes which lead to redundant data while sensing an event in network. Data aggregation or data fusion is utilized to reduce and save energy in network. The size and number of exchanged messages is reduced by aggregating data at intermediate nodes it helps reduce the duplicates of data. These will be reducing data communication costs and energy data consumption in WSN. Data Routing for In-Network Aggregation is proposed, it contains some key aspects like depleted number of messages for setting up a routing tree, maximized number of super-imposed routes, high data aggregation rate, and reliable aggregation and transmission of data. The proposed system is best aggregation quality in WSNs.