A Method and a System for Secure Access to a Network Resource
Bank, casino, Defense, Secret Agencies, Homes and ATM Safe is not just a vault. Every individual have believe that their money is completely secure in ATMs and strong rooms. All the banks and casinos protect their safe with their man power and latest technologies. However some masterminds have ability to deceive these systems for stealing money, important data and reputation of that organization get ruin too. The entire organization those related to money wants completely secure their money and data hence no one can Robb their safe. The present invention relates to security of resources such as monetary funds, data stores and document stores etc. and more specifically, to a method and system for secure access to a network resource. Humans are becoming very dependent on the machines and it is correct to do so as the machines are much more reliable from the security point of concern. The advancement of technology has led to increment the use of reliable safety devices. For example, ATMs, banks or any high security zone are somehow or other are managed and controlled by the use of electronically controlled high level security apparatuses. But as technology is evolving, traditional security systems are lagging to provide the required security. So advancement of technology is required so that confidential data or monetary funds can be kept into safer zones.
Published by: Uma Shankar Gupta, Ram Chander Rohilla
Author: Uma Shankar Gupta
Paper ID: V3I5-1262
Paper Status: published
Published: October 17, 2017
Studies on Strengthening of High Performance Self Compacting Concrete
Self Compacting Concrete (SCC) has more attention because of its ability to compact without the need of internal or external vibration. The placing of normal conventional concrete is difficult in reinforcement confinement places and also the strength of the concrete is low when it is subjected to severe exposure condition. In order to overcome these effects, the admixtures were used in the concrete to increase the strength and durable properties of the concrete. Self-Compacting Concrete (SCC) is one of the concrete which makes use of admixture to increase the flowability of the concrete without any additional vibration. As the concrete is flowable, it has good workability. SCC has more workability and by the addition of mineral admixtures like fly ash and silica fume, the concrete will attain more strong and durable, so that the concrete will behave as Self Compacting High-Performance Concrete (SCHPC).The aim of the study is to determine the flexural behavior of the self-compacting high-performance concrete. In this present work, the various literature related to SCC with different mineral admixtures was studied and the best among them was chosen for the future work
Published by: R. Karthika, S. Balamurugan
Author: R. Karthika
Paper ID: V3I5-1266
Paper Status: published
Published: October 17, 2017
A Study on Market Segmentation of Samsung Electronics Ltd. With special References to Mobile Phones
Market Segmentation refers to dividing a broad target market into subsets of consumers businesses, or countries that have, or are perceived to have, common needs, interests, and priorities, and then designing and implementing the marketing strategies to target them. Samsung is among the top players when it comes to the mobile phones. It offers a wide range of products for all sections of the society. Its focus is on the middle-class section of the society has given them a stronger footing in the Indian market which is also a reason for its high sales. According to the researcher after seeing the result it was founded that Samsung is highly focused on the middle section of the society and the consumer itself want the mobile phones should be at cheaper rates which suit to their pocket. In this research, the researcher has collected the data from the students and the research is based on the opinion of the students.
Published by: Abhishek Bajaj
Author: Abhishek Bajaj
Paper ID: V3I5-1269
Paper Status: published
Published: October 17, 2017
Vulnerability Assessment of Sensor Network Using Multisink Timestamp and Attack Graph Based Metrics
Attack graph security metrics used for providing the security to the network .We proposed mainly three algorithms those are Shortest path metrics, Number of paths metrics and mean of path length metrics. These three techniques is mostly used for example where the earthquakes or volcanos can occur. In our work we are findings the hotspots areas or sensing the hotspot points from the large geographical areas where the volcanos or earthquakes may be occurred in future and these three algorithms providing the security to that area so that we can avoid the volcanos or earthquakes. But attack graph security metrics used for aggregating the result of those three security metrics and provide the more security.
Published by: Ms. Patil Priyanka Nagnath, Prof. Dhainje Prakash .B
Author: Ms. Patil Priyanka Nagnath
Paper ID: V3I5-1254
Paper Status: published
Published: October 17, 2017
A Review on Security to Network using Security Metrics and Multisink Timestamp
The emergence of wireless sensor networks (WSNs) can be considered one of the most important revolutions in the field of information and communications technology (ICT). Recently, there has been a dramatic increase in the use of WSN applications such as surveillance systems, battleground applications, object tracking, habitat monitoring, forest fire detection and patient monitoring. Due to limitations of sensor nodes in terms of energy, storage and computational ability, many security issues have arisen in such applications. As a result, many solutions and approaches have been proposed for different attacks and vulnerabilities to achieve security requirements. This paper surveys different security approaches for WSNs, examining various types of attacks and corresponding techniques for tackling these. We use multisink timestamp and attack graph based metrics. Multsink Timestamp technique finding out the attacking or sensing the attacking points among all networks in small period of time.For e.g. the large geographical areas where the volcanos or earthquakes may be occurred in future and these techniques finding out those areas provides the security to that area so that we can avoid the volcanos or earthquakes. For finding out the attacks in network we usea three methods Normalized Mean of Path Lengths Metric, Standard Deviation of Path Lengths Metric, Mean of Path Lengths Metric.These three metrics creates clusters of all networks and finding out only the attacking networks. The paper suggests an approach to network attack modeling and security evaluation which is realized in advanced Security Information and Event Management (SIEM) systems. It is based on modeling of computer network and malefactors’ behaviors, building attack graphs, processing current alerts for real-time adjusting of particular attack graphs, calculating different security metrics and providing security assessment procedures. Increasing inclination of people to use software systems for most of the purposes comes a major challenge for software Engineers the engineering of secure software systems. The concept of computer Security is being heavily researched and this perfectly makes sense in a world where e-commerce and e governance are becoming the norms of the day. Along with their potential for making life easier and smarter for people, these systems also carry with them the danger of insecurity. Because any software system is an outcome of some software engineering process it makes sense to incorporate security considerations during the software engineering processes. We use the attack based graph to provide the security to network. For that purpose we use the shortest path metric, the Number of Paths metric, and the Mean of Path Lengths metric are three attack graph-based security metrics that can extract security relevant information. The metric and the Mean of Path Lengths metric fail in the number of ways an attacker may violate a security policy. The Number of Paths metric fails to adequately account for the attack effort associated with the attack paths. To overcome these shortcomings, we propose a complimentary suite of attack graph-based security metrics and specify an algorithm for combining the usage of these metrics. Attack graph can provide clues for the network defender on how an attacker exploits the vulnerability on the network to achieve goals. System administrators use attack graph to determine how vulnerable their systems and to determine what security measures are used to maintain their systems. In a network of large and complex organizations, securing a network is a very challenging task. Attack graphs are very important in the effort to secure the network, because it can directly indicate the presence of vulnerabilities in network and how attackers use the vulnerabilities to implement an effective attack. In this paper, we will describe some very good algorithms can be used to generate the attack graph.
Published by: Ms. Patil Priyanka Nagnath, Dhainje Prakash .B
Author: Ms. Patil Priyanka Nagnath
Paper ID: V3I5-1260
Paper Status: published
Published: October 16, 2017
Power Quality Improvement and Harmonic Mitigation by Using D-Statcom
The main impact in the power distribution system is the quality of power, which causes more distortion in the source due to using nonlinear load. The main cause for distortion is harmonics, and interharmonics. Thus it is necessary to control the harmonics to improve the power quality of the system. There are number of control techniques to improve the power quality with the FACTS devices. In this paper performance of Distribution Static Compensator (D-STAT COM) for Power Quality improvement has been studied. The simulation is done in MATLAB/SIMULINK environment.
Published by: Soujanya Mekala
Author: Soujanya Mekala
Paper ID: V3I5-1258
Paper Status: published
Published: October 14, 2017
