Privacy and trust in cloud computing
This paper focuses on analyzing security and privacy problems facing cloud computing. The major issue discussed in the research that of losing control of data by both the cloud service providers (CSPs) and cloud service users (CSOs). Cloud computing offers organizations an innovative business model to adopt IT services without having to incur massive investment costs. A general analysis of the cloud is provided including its various forms. The growth and development of cloud computing technology are hampered by the fears of losing control of sensitive data by corporations and individuals. Solutions regarding this problem are discussed., and an intensive elucidation of the optimal one is included.
Published by: Faisal Alghayadh, Yasamin Alagrash, Debatosh Debnath
Author: Faisal Alghayadh
Paper ID: V4I4-1314
Paper Status: published
Published: July 24, 2018
Static pointer compression
Static Pointer Compression automatically identifies and transforms instances of type-safe data structures, replacing pointers in the data structure with smaller integer offsets from the start of the pool they are located in. Because pool allocation divides a program up into pools, it allows recursive data structures to each grow to 232 bytes and in some cases 232 nodes, without encountering a runtime error. However, the possibility of this runtime error is not acceptable for all domains. Static Pointer Compression can speed up pointer intensive programs from 20% to 2x in extreme cases over pool allocation, matching the performance of programs compiled to use native 32-bit pointers in many cases. In cases where the use of 64-bit mode enables features that are not available in 32-bit mode e.g. the AMD64 architecture, pointer compression can even beat native 32-bit performance. The pointer compression runtime library is almost identical to the standard pool allocator runtime. The only two functionality differences are that it guarantees that the pool is always contiguous and that it reserves the 0th node to represent the null pointer. The library interface is also cosmetically different in that the memory allocation/free functions take indices instead of pointers, and numbers of nodes to allocate instead of the number of bytes
Published by: Pramod Kumar
Author: Pramod Kumar
Paper ID: V4I4-1315
Paper Status: published
Published: July 24, 2018
Intrusion detection based on ANN by analyzing network traffic parameter
Nowadays, every individual is interchange the data from information systems, that are more open to the Internet and communication medium, the value of security of networks is extremely increased because of its tremendous utilization. In Internet different types of server are connected to each other now they are under the threats of network attackers. Actually, Intrusion Detection System (IDS) is the second level of defense for which it can be the most powerful system that handles the Attacks done at computer System by making alerts to do the analysts take some sort of actions to prevent this Attacks. IDS are based on the Principle of that an attacker behavior will be clearly different from that of a genuine user. In the proposed system we use a KDD-NSL dataset which will be as the first line of implementation for collect different attribute related to network packet then extract certain attributes from the actual dataset and use such attribute parameter is used to make training dataset and save it into the database. Our training dataset includes 4500+ data rows of values and forty-one attributes. Then in next step is to implement a real-time IDS again find out the different network packets features from dataset according attribute then load training dataset then apply artificial neural network algorithm which is work in three layers input layer, output layer and hidden layer which is a Back Propagation (BPN) and Feed Forward (FF) algorithms so that it provides two outputs normal packets and attacks packet. Proposed system evaluated on the base of performance are classified correctly for both anomaly-based detection and misuse based detection using a dataset of network packets and normal packets.
Published by: Rahul R Bhoge, Dr. M. A. Pund
Author: Rahul R Bhoge
Paper ID: V4I4-1323
Paper Status: published
Published: July 24, 2018
A research on formulation and evaluation chewing gum of Simvastatin
In the present era, many research and technological advancements are made in the field of oral drug delivery as it is highly accepted amongst patient. In this research the formulation of antihyperlipidemic chewing gum of simvastatin using water-insoluble gum base water-soluble other portion containing drug as well as excipients like taste masking agent sorbitol which use as a coating agent in this formulation. The primary and important requirement in the formulation of simvastatin chewing gum is the gum base, which gives it gummy texture for chewing action and as a drug vehicle.T his gum is isolated from the natural sources like a sapodilla moniker tree (Chiku) which fully grow in the Maharashtra region. This gum base has a property as like other gum bases which are present in nature. For the improvement in the stability of that gum base, which is converted in the dry form by drying and adding filler as talc and emulsifier such lecithin which was freshly collected from egg yolk. By drying this mixture further it converts in a directly compressible gum base powder, which possesses all-important flow property which requires for direct compression. Direct compression is one of the best methods as compared to the molding method in the formulation of chewing gum. For direct compression in directly compressible gum require other additional excipients like antiadherant, anti-caking agent, lubricant, antioxidant, flavor, and sweetening, the coating agent (sorbitol). For evaluation of formulated chewing gum, all parameter is same as like tablet except in-vitro drug release performance. For this purpose, the disintegration apparatus was modified in such way that it continuously compress or crush the chewing gum as like our mastication activity in the mouth, resulting in releases of the drug in the salivary fluid and absorbance were calculate on UV-visible spectra. In this also study the effect of stroke & distance between jaws which gives the valuable information about drug release performance in various ages patient.
Published by: Somnath Raosaheb Thanage, Dr. Bhawar Sanjay B., Dr. Dighe Santosh
Author: Somnath Raosaheb Thanage
Paper ID: V4I4-1243
Paper Status: published
Published: July 23, 2018
Minimization of artifacts in wrist pulse signals using signal processing techniques
Pulse pressure is a manifestation of arterial palpation of the heartbeat. Wrist pulse signal contains important information about the health status of a person and pulse signal diagnosis has been employed in oriental medicine for a very long time. This paper mainly addresses the problem of removing artifacts from wrist pulse signals. Noise is an irregular function that accompanies a transmitted electrical signal and tends to obscure it. The collected wrist pulse signals contain noise. The type of noise which the signal contains may be random noise, structured noise or physiological interference. In our paper, we have employed signal processing techniques in order to remove noise from the wrist pulse signal. Low Pass Filter (LPF) and Wavelet Transform (WT) techniques are used for this purpose. In our work, we have considered simulation and actual cases. In simulation cases, we have added noise to the signal and tried to remove it. In actual cases, we have considered the results of the simulation and implemented the signal processing techniques on actual noisy wrist pulse signals. Our work has studied the efficacy of LPF and WT techniques in minimizing artifacts in wrist pulse signals in simulation and in actual cases. Calculated mean square error for a simulated signal show that wavelet denoising has lesser mean square error than low pass filtering. Hence we have concluded that wavelet denoising is a better filtering than low pass filter.
Published by: B Shreyas, Abhishek M R, S Hema Priyadarshini, Dr. Anand Prem Rajan
Author: B Shreyas
Paper ID: V4I4-1281
Paper Status: published
Published: July 23, 2018
A study on geopolymer concrete with fly ash
The use of Portland cement in concrete construction is under critical review due to a high amount of carbon dioxide gas released to the atmosphere during the production of cement. From few years, attempts to increase the utilization of fly ash to partially replace the use of Portland cement in concrete are gathering momentum. Geopolymer concrete is a ‘new’ material that does not need the presence of Portland cement as a binder. Instead, the source of materials such as fly ash, metakaolin that are rich in Silicon (Si) and Aluminium (Al) are activated by alkaline liquids to produce the binder. Hence concrete with no Portland cement. This study reports the details of the development of the process of making low calcium based fly ash and Metakaolin-based geopolymer concrete. In the present experimental study, attempts are made to study on the various strength properties like compressive strength, split tensile strength, an also durability properties like initial surface absorption test on Geopolymer concrete made up of fly ash and Metakaolin. ISAT test was held on long-term durability properties of Geopolymer concrete. Experiments were conducted on Geopolymer Concrete with different percentages of metakaolin and molarity of alkaline activator. Studies were made on the residual compressive strength of Geopolymer Concrete mixes. It was observed that as the addition of Metakaolin to control the concrete mix of fly ash increases, the workability of the concrete mix was found to decrease as compared to Fly ash based control mix. It is observed from the experimental results and its analysis, that compressive and splitting tensile strength of geopolymer concrete increases with using high molarity NaOH solution and 25 to 50 percent Metakaolin. The replacement of fly ash up to this percentage shows 10 to 12% increment in Compressive strength and 28 to 34% increment in the split tensile strength of geopolymer concrete at 28 and 90 days respective
Published by: Digvijay Singh, Sherin Felix
Author: Digvijay Singh
Paper ID: V4I4-1312
Paper Status: published
Published: July 23, 2018
