All articles must contain an abstract. Peer to Peer (P2P) network is useful for developing applications and downloading files from the internet. In the existing P2P networks, communication is initiated and supported b...
All articles must contain an abstract. Peer to Peer (P2P) network is useful for developing applications and downloading files from the internet. In the existing P2P networks, communication is initiated and supported by peers. Security issues constitute the main challenge in the design of reliable communication techniques for P2P networks. In the past, Rumor Riding Protocol was used in distributed systems for performing coordination and communication. However, the existing Rumor Riding Protocol is used flooding technique to forward the response to the initiator it may leads high network traffic to avid this I have Enhanced Multi path forwarding technique to Rumor Riding Protocol and also enhancement with security features to make them suitable for downloading applications in P2P networks. In this method, it enhances the Rumor Riding Protocol with security features by including a Cryptographic Puzzle, a Challenge Question scheme using trust modeling and an intelligent beta reputation model for secured communication in P2P networks. For this purpose, five new techniques are proposed in this research work, all of which aim at enhancing the security of communication using Rumor Riding Protocol in the P2P networks.
With the spread of Covid–19 pandemic it is difficult for many patients to physically visit the Hospitals and get treatment. The Improved technology enable such patients to contact the concern doctors and get diagnosi...
With the spread of Covid–19 pandemic it is difficult for many patients to physically visit the Hospitals and get treatment. The Improved technology enable such patients to contact the concern doctors and get diagnosis information online. The security of the sensitive data of the Patients is vulnerable when the information is shared across the network. To address this, we are proposing a novel approach with the Privacy ensured self-care health management schema using Secure Multiparty computation (MPC). Through this approach the patient can share the sensitive data to the Hospital server through the online mode, the data will be shared in the encrypted format which will be matched with the existing data at the Hospital records and the best relevant match based on the smart Index of disease. The privacy preserving is key aspect in this model as the data is shared in the sensitive mode so the Homomorphic Encryption (HE) approach is used to perform computations on the Patient's sensitive data in the encrypted mode and ensure the confidentiality from Intruders to access the information. This model also proposes a novel approach which can overcome many security threats. The patient's data will be shared and used in a more secured manner so the patients specifically the elder who are not advised to visit the public places in this pandemic can also receive better treatment through online.
Digital Technology is inevitable for better life of the people. Voting by people plays the vital role in democracy as the leaders will be elected by it. IoT helps many edge devices to interact with a Cloud for storage...
Digital Technology is inevitable for better life of the people. Voting by people plays the vital role in democracy as the leaders will be elected by it. IoT helps many edge devices to interact with a Cloud for storage and computation of the Voting results. The major concern for the Voter is whether the vote casted by him is tamperproof or not. Though Cloud offerings are started a decade ago still information security in the cloud is always a concern. This paper focuses on creating a tamperproof framework to ensure the data Integrity. It proposes a novel approach where the user can cast the vote from any of the electronic devices with a unique ID allotted to him, a two-step authentication can be applied like OTP to ensure the security. The votes from these edge devices will be sent to the untrusted third party public cloud for computation, the votes will be saved in the encrypted format. The computation will be done on encrypted data. The Block chain based workflow ensures that the votes which are shared in the encrypted format will not be tampered to ensure trust and Integrity to the proposed model. The model also can be extended to many public shared e-models like E-Auction and healthcare systems.
In this paper we propose a novel algorithm for implementing the mathematical model using the Non Linear Time Series Forecasting using the methods of deep learning which has to avoid noise and tends to transforms the s...
In this paper we propose a novel algorithm for implementing the mathematical model using the Non Linear Time Series Forecasting using the methods of deep learning which has to avoid noise and tends to transforms the space to next level in a iterative manner by swapping the down-trend to up-trend or up-trend to down-trend based on the iterative set values by computing the transformations. The proposed model must handle huge dimensional data which is in a dynamic nature of proposed model and then we need to compare the results attained from the proposed model with the complex ARIMA model and identified various trial and error methods for predicting the future price without guidance. For obtaining the results we used the petroleum dataset of India and attained the results which prove that our proposed mathematical model is far better than the famous ARIMA model while handling non linear time series applications.
作者:
R S AnandShibin DavidM. GajendiranKingston StanleyResearch Scholar
Department of mechanical Engineering Karunya Institute of Technology and Sciences Coimbatore India Assistant Professor
Department of Computer Science and Engineering Karunya Institute of Technology and Sciences Coimbatore India Assistant Professor
Department of Mechanical Engineering Sri Venkateswara College of Engineering Chennai India Assistant Professor
Department of Biomedical Engineering Karunya Institute of Technology and Sciences Coimbatore India
A shell and tube device is deployed for the applications such as oil refinery processes, chemical processes and high pressure technologies. The hot fluid flows to the tubes in the heat exchanger, and the cool fluid mo...
A shell and tube device is deployed for the applications such as oil refinery processes, chemical processes and high pressure technologies. The hot fluid flows to the tubes in the heat exchanger, and the cool fluid moves through the shell section. Hence, heat is transferred from the tube section to the shell section of the heat exchanger. This article is deals with the modelling and analysis of mini shell and tube heat exchanger (MSTHE) for low temperature applications which is less than 250°C. The design of the heat exchanger is made with nine tubes which are of 6 mm diameter and shell of 41 mm diameter. As conventional design does not result in the internal heat transfer, computational fluid dynamics scheme is adopted to design the modified heat exchanger by adopting the conditions such as velocity of tube fluid and pressure drop. The modelling of MSTHE is done by Pro/E whereas CFD analysis is done with ANSYS. The contour obtained from the analysis proves that the MSTHE is applicable for the temperature less than 250°C and have the potential to transfer heat effectively.
Detection of tumors present in the Magnetic Resonance brain image is a challenging task in the research field of medical imaging processing. The tumors with distinguished boundaries are difficult to find in the MR bra...
Detection of tumors present in the Magnetic Resonance brain image is a challenging task in the research field of medical imaging processing. The tumors with distinguished boundaries are difficult to find in the MR brain images, while performing the manual segmentation process. There is a necessity of an automated segmentation technique for performing better segmentation in terms of tumors with distinguished boundaries. The automated modified monkey search technique is used to find the optimized cluster position, and a random search operation is performed is locate all the pixels present in the image and then finally the location of the tumor region is exactly segmented/predicted by using the suggested monkey search algorithm. The suggested technique will support the radiologist for finding the tumors with distinguishing boundaries and accuracy of prediction of tumors is also improved lot with this approach. Based on the early prediction of tumors, diagnosing procedures will save the lives of many human beings.
作者:
M. S. Bennet PrabaJ S Femilda JosephinAssistant Professor
Department of Computer Science and Engineering SRM Institute of Science and Technology Ramapuram Chennai India. Associate Professor
Department of Software Engineering SRM Institute of Science and Technology Kattankulathur Chennai – 603 203 India.
Connected cars are comfortable to drivers. But it also threat to humans. Connected vehicles share data like street safety, traffic analysis, road administration information like café, hospital, etc utilizing intr...
Connected cars are comfortable to drivers. But it also threat to humans. Connected vehicles share data like street safety, traffic analysis, road administration information like café, hospital, etc utilizing intruded on web availability and it is time delicate. Connected vehicles allow drivers and passengers to connect to the outside world while on the road. Security is the primary challenge for automakers and other stakeholders, because connected vehicles rely on wireless and cellular communication interfaces. Information should be protected from intruders. The communications between connected vehicles should be a trusted one. Safety is the primary focus of connected cars and the intruders should be identified and the intruders and falsified nodes can be identified by authentication schemes. In VANET vehicles react as indicated by the data got from the opposite end, so it is very vital that the data spreading in the framework is valid and produced by a genuine client. But there are many pitfalls in various authentication schemes. Privacy of the connected vehicles should be while sharing information and also information shared between connected vehicles should be an authenticated one. So still it a major challenge in connected vehicles due to the special characteristics like mobility, time sensitive, etc. This survey discussed the various authentication schemes and the various attacks related to that. Based on the survey, future directions of the secured trusted communications of connected vehicles have been discussed. The aim of this survey is to identify secured authentication techniques for a trusted communication.
Improvisational actors are adept at creative exploration within a set of boundaries. These boundaries come from each scene having “games” that establish the rules of-play. In this paper, we introduce a game that all...
Improvisational actors are adept at creative exploration within a set of boundaries. These boundaries come from each scene having “games” that establish the rules of-play. In this paper, we introduce a game that allows an expressive motion robot to collaboratively develop a narrative with an improviser. When testing this game on eight improv performers, our team explored two research questions: (1) Can a simple robot be a creative partner to a human improviser, and (2) Can improvisers expand our understanding of robot expressive motion? After conducting 16 scenes and 40 motion demonstrations, we found that performers viewed our robot as a supportive teammate who positively inspired the scene's direction. The improvisers also provided insightful perspectives on robot motion, which led us to create a movement categorization scheme based on their various interpretations. We discuss our lessons learned, show the benefits of merging social robotics with improvisational theater, and hope this will encourage further exploration of this cross-disciplinary intersection.
Recommender System suggests items of interest to users based on their preferences. These preferences are gauged through various sources such as purchase history, ratings, reviews and browsing behaviour. Collaborative ...
Recommender System suggests items of interest to users based on their preferences. These preferences are gauged through various sources such as purchase history, ratings, reviews and browsing behaviour. Collaborative filtering and content based filtering are the two widely used techniques that help in generating recommendations to the target user(s) by identifying similar users to target user or similar items to items of interest. Through this paper a new method to identify similar users based on the similarity of reviews has been proposed.
Splicing systems was first proposed by Head on organic considerations to demonstrate indubitable chimeric behavior of DNA particles and are of current intrigue and study. In this paper, we study some of the chomskian ...
Splicing systems was first proposed by Head on organic considerations to demonstrate indubitable chimeric behavior of DNA particles and are of current intrigue and study. In this paper, we study some of the chomskian hierarchy of array grammars namely (Regular:Regular)array grammar,(Context Free:Regular)array grammar and (Regular:Context Free)array grammar using H-array system. The Array rewriting rules is limited to extent by the action of row and column splicing.
暂无评论