作者:
E. NirmalaS. MuthurajkumarD. SubithaResearch Scholar
Department of Computer Technology Madras Institute of Technology (MIT) Campus Anna University Chennai India Assistant Professor
Department of Computer Technology Madras Institute of Technology (MIT) Campus Anna University Chennai India Assistant Professor
Department of Electronics and Communication Engineering Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Vel Nagar Chennai
The keyword searching algorithm plays a vital role in cloud computing Architecture. Here, the searching technique is applied as a tool to encrypted data set which is outsourced. This technique works well, by either di...
The keyword searching algorithm plays a vital role in cloud computing Architecture. Here, the searching technique is applied as a tool to encrypted data set which is outsourced. This technique works well, by either directed on multi keyword findings with exact match or one keyword search with fuzzy logic with a result of true or false. Though the existing techniques come across sensible difficultyin execution upon the encrypted data set, in the execution of multiple keyword based searching, keyword correction is difficult to achieve. To overcome with this problem, we construct a highly efficient, multiple corrections in keyword searching algorithm using ranking scheme. Multiple corrections like spell checks and errors. In the existing system of Author Wang and others scheme, they were unable to address the aforementioned problems, But in our method of multiple keyword searching technique, the Fuzzy Gramm algorithm helps to detect and handle the spelling errors by making a function call. Additionally the keywords with similar ancestry can be found by making use of stemming procedure. Alongside with thatrank keyword is used to achieve accurate checking with matched text file content. Thus the proposed approach enhances security and reliability to the maximum extent compared to the existing system.
作者:
R S AnandShibin DavidM. GajendiranKingston StanleyResearch Scholar
Department of mechanical Engineering Karunya Institute of Technology and Sciences Coimbatore India Assistant Professor
Department of Computer Science and Engineering Karunya Institute of Technology and Sciences Coimbatore India Assistant Professor
Department of Mechanical Engineering Sri Venkateswara College of Engineering Chennai India Assistant Professor
Department of Biomedical Engineering Karunya Institute of Technology and Sciences Coimbatore India
A shell and tube device is deployed for the applications such as oil refinery processes, chemical processes and high pressure technologies. The hot fluid flows to the tubes in the heat exchanger, and the cool fluid mo...
A shell and tube device is deployed for the applications such as oil refinery processes, chemical processes and high pressure technologies. The hot fluid flows to the tubes in the heat exchanger, and the cool fluid moves through the shell section. Hence, heat is transferred from the tube section to the shell section of the heat exchanger. This article is deals with the modelling and analysis of mini shell and tube heat exchanger (MSTHE) for low temperature applications which is less than 250°C. The design of the heat exchanger is made with nine tubes which are of 6 mm diameter and shell of 41 mm diameter. As conventional design does not result in the internal heat transfer, computational fluid dynamics scheme is adopted to design the modified heat exchanger by adopting the conditions such as velocity of tube fluid and pressure drop. The modelling of MSTHE is done by Pro/E whereas CFD analysis is done with ANSYS. The contour obtained from the analysis proves that the MSTHE is applicable for the temperature less than 250°C and have the potential to transfer heat effectively.
Emotions play a vital role in human living and are correlated with every single word which is being spoken, without them life will be saturated and irrelevant. Understanding of the real apparent facial expressions mig...
Emotions play a vital role in human living and are correlated with every single word which is being spoken, without them life will be saturated and irrelevant. Understanding of the real apparent facial expressions might be difficult because part of the emotion might not be revealed outside by everyone. In the proposed method, the emotions of the human are analyzed in two different ways so that the real hidden emotion of the subject can be detected. Every human has unique brain waves, which gives better accuracy than other techniques. It ensures that the facial expression exhibited outside is real or not. The emotion analyzed will be useful in treating the person with high mental stress and also infinding the emotion of differently abled person who requires medical treatment.
This article has been withdrawn: please see Elsevier Policy on Article Withdrawal ( https://***/about/our-business/policies/article-withdrawal ). This article has been withdrawn at the request of the Editor in Chief. ...
This article has been withdrawn: please see Elsevier Policy on Article Withdrawal ( https://***/about/our-business/policies/article-withdrawal ). This article has been withdrawn at the request of the Editor in Chief. Subsequent to acceptance of this special issue paper by the responsible Guest Editor Vimal Shanmuganathan, the integrity and rigor of the peer-review process was investigated and confirmed to fall beneath the high standards expected by Microprocessors & Microsystems. There are also indications that much of the Special Issue includes unoriginal and heavily paraphrased content. Due to a configuration error in the editorial system, unfortunately the Editor in Chief did not receive these papers for approval as per the journal's standard workflow.
Detection of tumors present in the Magnetic Resonance brain image is a challenging task in the research field of medical imaging processing. The tumors with distinguished boundaries are difficult to find in the MR bra...
Detection of tumors present in the Magnetic Resonance brain image is a challenging task in the research field of medical imaging processing. The tumors with distinguished boundaries are difficult to find in the MR brain images, while performing the manual segmentation process. There is a necessity of an automated segmentation technique for performing better segmentation in terms of tumors with distinguished boundaries. The automated modified monkey search technique is used to find the optimized cluster position, and a random search operation is performed is locate all the pixels present in the image and then finally the location of the tumor region is exactly segmented/predicted by using the suggested monkey search algorithm. The suggested technique will support the radiologist for finding the tumors with distinguishing boundaries and accuracy of prediction of tumors is also improved lot with this approach. Based on the early prediction of tumors, diagnosing procedures will save the lives of many human beings.
With the spread of Covid–19 pandemic it is difficult for many patients to physically visit the Hospitals and get treatment. The Improved technology enable such patients to contact the concern doctors and get diagnosi...
With the spread of Covid–19 pandemic it is difficult for many patients to physically visit the Hospitals and get treatment. The Improved technology enable such patients to contact the concern doctors and get diagnosis information online. The security of the sensitive data of the Patients is vulnerable when the information is shared across the network. To address this, we are proposing a novel approach with the Privacy ensured self-care health management schema using Secure Multiparty computation (MPC). Through this approach the patient can share the sensitive data to the Hospital server through the online mode, the data will be shared in the encrypted format which will be matched with the existing data at the Hospital records and the best relevant match based on the smart Index of disease. The privacy preserving is key aspect in this model as the data is shared in the sensitive mode so the Homomorphic Encryption (HE) approach is used to perform computations on the Patient's sensitive data in the encrypted mode and ensure the confidentiality from Intruders to access the information. This model also proposes a novel approach which can overcome many security threats. The patient's data will be shared and used in a more secured manner so the patients specifically the elder who are not advised to visit the public places in this pandemic can also receive better treatment through online.
Digital Technology is inevitable for better life of the people. Voting by people plays the vital role in democracy as the leaders will be elected by it. IoT helps many edge devices to interact with a Cloud for storage...
Digital Technology is inevitable for better life of the people. Voting by people plays the vital role in democracy as the leaders will be elected by it. IoT helps many edge devices to interact with a Cloud for storage and computation of the Voting results. The major concern for the Voter is whether the vote casted by him is tamperproof or not. Though Cloud offerings are started a decade ago still information security in the cloud is always a concern. This paper focuses on creating a tamperproof framework to ensure the data Integrity. It proposes a novel approach where the user can cast the vote from any of the electronic devices with a unique ID allotted to him, a two-step authentication can be applied like OTP to ensure the security. The votes from these edge devices will be sent to the untrusted third party public cloud for computation, the votes will be saved in the encrypted format. The computation will be done on encrypted data. The Block chain based workflow ensures that the votes which are shared in the encrypted format will not be tampered to ensure trust and Integrity to the proposed model. The model also can be extended to many public shared e-models like E-Auction and healthcare systems.
In this paper we propose a novel algorithm for implementing the mathematical model using the Non Linear Time Series Forecasting using the methods of deep learning which has to avoid noise and tends to transforms the s...
In this paper we propose a novel algorithm for implementing the mathematical model using the Non Linear Time Series Forecasting using the methods of deep learning which has to avoid noise and tends to transforms the space to next level in a iterative manner by swapping the down-trend to up-trend or up-trend to down-trend based on the iterative set values by computing the transformations. The proposed model must handle huge dimensional data which is in a dynamic nature of proposed model and then we need to compare the results attained from the proposed model with the complex ARIMA model and identified various trial and error methods for predicting the future price without guidance. For obtaining the results we used the petroleum dataset of India and attained the results which prove that our proposed mathematical model is far better than the famous ARIMA model while handling non linear time series applications.
作者:
M. S. Bennet PrabaJ S Femilda JosephinAssistant Professor
Department of Computer Science and Engineering SRM Institute of Science and Technology Ramapuram Chennai India. Associate Professor
Department of Software Engineering SRM Institute of Science and Technology Kattankulathur Chennai – 603 203 India.
Connected cars are comfortable to drivers. But it also threat to humans. Connected vehicles share data like street safety, traffic analysis, road administration information like café, hospital, etc utilizing intr...
Connected cars are comfortable to drivers. But it also threat to humans. Connected vehicles share data like street safety, traffic analysis, road administration information like café, hospital, etc utilizing intruded on web availability and it is time delicate. Connected vehicles allow drivers and passengers to connect to the outside world while on the road. Security is the primary challenge for automakers and other stakeholders, because connected vehicles rely on wireless and cellular communication interfaces. Information should be protected from intruders. The communications between connected vehicles should be a trusted one. Safety is the primary focus of connected cars and the intruders should be identified and the intruders and falsified nodes can be identified by authentication schemes. In VANET vehicles react as indicated by the data got from the opposite end, so it is very vital that the data spreading in the framework is valid and produced by a genuine client. But there are many pitfalls in various authentication schemes. Privacy of the connected vehicles should be while sharing information and also information shared between connected vehicles should be an authenticated one. So still it a major challenge in connected vehicles due to the special characteristics like mobility, time sensitive, etc. This survey discussed the various authentication schemes and the various attacks related to that. Based on the survey, future directions of the secured trusted communications of connected vehicles have been discussed. The aim of this survey is to identify secured authentication techniques for a trusted communication.
In earlier days, welding only involves joining two metals of same kind and dissimilar metals were usually joined by fasteners. Friction Stud welding is a true engineering marvel of making welds between dissimilar meta...
In earlier days, welding only involves joining two metals of same kind and dissimilar metals were usually joined by fasteners. Friction Stud welding is a true engineering marvel of making welds between dissimilar metals without any melting or fillers involved. The friction stud welding doesn't involve heat generation from electricity and it is purely based on friction. Besides these facts the friction stud welding has numerous advantage and applications. This paper focuses on the process of stud welding, application and its limitations.
暂无评论