Articles


Time-Based Proxy Re-encryption Scheme for Secure Data Sharing in a Cloud Environment

Dayananda RB, Prof. Dr. G. Manoj Someswar

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 01 (2015), 6 January 2015

Abstract: In this research paper, we will describe the system model and security model in our scheme and provide our design goals and related assumptions. We consider a cloud computing environment consisting of a cloud service provider (CSP), a data owner, and many users. The CSP maintains cloud infrastructures, which pool the bandwidth, storage space, and CPU power of many cloud servers to provide 24/7 services. We assume that the cloud infrastructures are more reliable and powerful than personal computers. In our system, the CSP mainly provides two services: data storage and re-encryption. After obtaining the encrypted data from the data owner, the CSP will store the data on several cloud servers, which can be chosen by the consistent hash function, where the input of the consistent hash function is the key of the data, and the outputs of the consistent hash function are the IDs of the servers that store the data. On receiving a data access request from a user, the CSP will re-encrypt the cipher text based on its own time, and return the re-encrypted cipher text.

Mobile Agent Based MapReduce Framework for Big Data Processing

Sonu Yadav

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 01 (2015), 6 January 2015

Distributed computing accomplished broad appropriation because of consequently parallelizing and transparently executing tasks in distributed environments. Straggling tasks is an essential test confronted by all Big Data Processing Frameworks, for example, Mapreduce[3], Dryad[4], Spark[5]. Stragglers are the assignments that run much slower than different tasks and since a job completes just when it’s last undertaking completions, stragglers postponement work fruition. The literature reviews stragglers recognition and rescheduling systems proposed so far and brings up their strengths and shortcomings. This thesis additionally displays wise attributes and impediments of the existing state- of-the- craftsmanship calculations to take care of the issue of stragglers relief. This thesis presents a systematic and organized study of community detection techniques. The literature survey shows that most of the algorithms fail to efficiently reschedule the stragglers. Innocently one may anticipate that straggler taking care of will be a simple assignment, doubling tasks that are sufficiently slower. Actually it is a complex issue for a few reasons. In the first place, Speculative assignments are not free they seek certain assets, for example, system with other running tasks. Second, picking the node to run speculative task on is as significant as picking the task. Third, in Heterogeneous environment it may be challenging to recognize nods that are marginally slower than the mean and stragglers. At long last, Stragglers ought to be recognized as right on time as could reasonably be expected. The proposed framework uses mobile agent approach for rescheduling because the agent can start the execution at the other place from the very same place they left in the earlier machine. The implementation and results shows the proposed work is efficient and improves the overall performance of a big data processing framework.

Projective Change between Special (α,β)- Finsler Metric and Rander’s Metric

Gayathri. K, Narasimhamurthy. S.K

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 01 (2015), 6 January 2015

Finsler geometry is originated from Differential geometry. Finsler geometry is Riemannian metric without quadratic restriction. In Finsler space we see special metrics such as Randers metric, Kropina metric and Matsumoto metric.,etc. Projective change between two Finsler metrics arise from Information Geometry. Such metrics have special geometric properties and will play an important role in Finsler geometry. In this paper,we are going to study class of Projective change between two s, which are defined as the sum of a Riemannian metric and .

Keywords: Finsler metric, Special Finsler metric, , Douglas Space, Geodesic, Spray coefficients, Projectively related metric, Projective change between two metrics

Fuzzy Logic based Speed Control of an Induction Motor Using Indirect Vector Control Method

Lakhya Jyoti Phukon, Dr. Neelanjana Baruah

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 01 (2015), 6 January 2015

Efficiency optimization of motor drives is very important not only from the viewpoints of energy loss and hence cost saving, but also from the perspective of environmental pollution. Several efficiency optimization methods for induction motor (IM) drives have been introduced nowadays by researchers. Distinctively, artificial intelligence (AI)-based techniques, in particular Fuzzy Logic (FL) one, have been emerged as a powerful alternative to conventional methods. Design objectives that are mathematically hard to express can be incorporated into a Fuzzy Logic Controller (FLC) using simple linguistic terms. The merit of FLC relies on its ability to express the amount of ambiguity in human reasoning. When the mathematical model of a process does not exist or exists with uncertainties, FLC has proven to be one of the best alternatives to move with unknown process.

In this paper, an implementation of intelligent controller for speed control of an induction motor (IM) using indirect vector control method has been developed and analyzed in detail. The project is complete mathematical model of field orientation control (FOC) of induction motor and simulated in MATLAB for studies of a 50 HP, squirrel cage type induction motor has been considered. The comparative performance of Fuzzy Logic control technique has been presented and analyzed in this work. The present approach avoids the use of flux and speed sensor which increase the installation cost and mechanical robustness. The fuzzy logic controller is found to be a very useful technique to obtain a high performance speed control. The indirect vector controlled induction motor drive involves decoupling of the stator current in to torque and flux producing components.

Keywords:  Induction motor(IM) drive,  Indirect Vector Control of Induction Motor(IVCIM),  Fuzzy Logic Controller(FLC),Field Oriented Control(FOC), Matlab,Fuzzy Inference System(FIS), Simulink model

Engaging students in Group based Learning through e-learning techniques in Higher Education System

Sivakumar Venkataraman, Subitha Sivakumar

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 01 (2015), 6 January 2015

Learning styles are growing fast as the technology growth in the world. New techniques are forthcoming within the higher education system to get better the student’s presentation, tutors philosophy and the institution enlargement. ICT the Information and Communication Technology innovates the new technologies to conversing the information and knowledge to having a different transform for teachers to teach and for students to learn. This paper is mainly focused on a study to determine the impact of student learning based on group-based learning and the importance of this methodology. The author describes to engage the student’s within groups through e-learning techniques to observe how the technique helps learners in learning a module or subject. Number of surveys is conducted among the students and the staff members concerning the impact of Group-Based learning and e-Learning.

Keywords: Learning styles, Information and Communication Technology, Group-Based learning, e-Learning. 

A Review on Nanomaterial: Chitosan

Prabhakar Narhari Gunjal, Sharad Narhari Gunjal, Sanjay Shivaji Kale, Shital Sanjay Kale, Prashant Uttam Gunjal, Yogita Prashant Gunjal, Shrikant Uttam Gunjal

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 01 (2015), 6 January 2015

Nanotechnology is gaining importance rapidly as a most powerful technology. Its immense potential promises the possibility of significant changes in near term future, once the most essential machines -called the Universal Assembler and the Nanocomputer are built. The present paper aims to reviews the previous work done and recent advancements in the field of nanotechnology. Today the products made using nanomaterials having general as well as special applications like treating cancer, phosgene detection, energy harvesting for self powered nanosystems, chip fabrication, batteries, aerospace materials etc.

Chitosan and its oligosaccharides, which are known to possess multiple functional properties, have attracted considerable interest due to their biological activities and potential applications in the food, pharmaceutical, agricultural and environmental industries. Many researchers have focused on chitosan as a potential source of bioactive materials in the past few decades. This review focuses on the biological activities of chitosan and chitooligosaccharides based on our and others’ latest research results..

Keywords— Nanotechnology, universal assembler, biological activity, chitosan, chitooligosaccharides..

Studies of Fresh Water Toxic Phytoplanktonic (Microcystis) of Keenkjhar Lake, Thatta, Sindh, and Pakstan

Khalid Hussain Lashari, Zulfiqar Ali Laghari, Zameer Ali Palh, Gulshan Ara Sahato, Ghulam Murtaza Mastoi

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 01 (2015), 6 January 2015

The present study is the first study of Keenjhar lake carried out to gain the knowledge about the toxic Phytoplanktonic Cyanophyta (Microcystis). In which total of 14 phytoplanktonic Cyanophyta (Microcystis) species were recorded during January 2004 to December 2004.A large number  micro organism including a variety of Cyanobacterial toxic species have been observed .Hence the present research work was planned to resolved phytoplanktonic Cyanophyta  (Microcystis ) of Keenjhar Lake.

Key Word: Toxic Phytoplanktonic  Cyanophyta (Microcystis) of Keenjhar Lake.

Traditonal Health Care Practices Among Kondh and Bhuyan Tribes of Odisha

Debajanee Lenka, A. Mohapatra

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 01 (2015), 6 January 2015

Introduction: Traditional knowledge which includes both oral and written. It refers to the knowledge, innovation and practices of local communities or ethnic group around the world. It is the component of knowledge system which refers the old age tradition and practices and inherited from generation to generation through folk tales, rituals etc. Traditional knowledge is the knowledge which is unique to a given culture and society. This knowledge is important part of lives of poor. This present study attempts to find out attitudes of people towards modern medicine facilities available in the village. Objective is to explore the traditional knowledge system of health care practices in two primitive tribes.

Methods:-two primitive tribes of Odisha have been considered for their traditional health care practices. It’s a comparative study of health care practices among Kondh of Budrikia village of Kandhmal district and Bhuyan of Talpadar village of Keonjhar district. Total sample 50 0f two villages including traditional health practitioners (THP) and old age persons. Door to door survey, Interview and focus group discussion (FGD) conducted during this field work for empirical data collection.

Result: This paper represents that indigenous or tribal people of Odisha in present day sustaining their practices regarding health care; modernity can never change their practices and ruined their identity. Not only they use plants and leaves even also use animal to cure any ailment and diseases. 36 plant species including flora and fruits has been used for medicinal purposes.

Discussion: In present scenario the traditional value, faith and indigenous knowledge of health care system of present society are facing challenges due to migration of youths to cities and there urban migrants tend to undermine their own culture belief and knowledge based on traditional health care system. If this traditional knowledge won’t be documented, in future this knowledge will be diminished by the influence of modernity. 

Key words: - traditional knowledge, indigenous knowledge.

Kerberos Authentication with Role Based Access Control Model for Cloud Environment

Yaser Fuad Al-Dubai, Dr. Khamitkar S.D, Dr. Parag Bhalchandra

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 01 (2015), 6 January 2015

In cloud computing environment the Role Based Access Control (RBAC) model has certain facilities for security communities. This system model has established itself as powerful, highly robust and generalized model for providing security access control management. There are several practical applications and circumstances where the users may be prohibited to consider particular roles only at certain defined time validities. Moreover, these roles could be invoked only after predefined time intervals according to the permission of certain even or action. Sequentially to incarcerate this kind of dynamic aspects of a role, numerous models similar to Temporal RBAC (TRBAC) was proposed, then while this scheme could not send anything else just only the constraints of role enabling. In this article, we have proposed high robust and secure scheme called Kerberos Authentication with Role Based Access Control (KARBAC) model which is efficient for authentication and expressing a broad range of temporal constraints. Specifically, in this scheme we allowed the expressions periodically as well as at certain defined time constraints on roles, user-role assignments as well as assignment of role-permission. According to KARBAC model. The results obtained explain that the KARBAC system model provides optimum solution for efficient user creation, role assignment and security management model in cloud computing with higher robust user count and role permission, even without compromising with the security issues.

Keywords: Role Based Access Control system, Cloud environment, TRBAC, Security management, and Temporal constraints.

Review on Localization of License Plate Number Using Dynamic Image Processing Techniques and Genetic Algorithms

Kiran Kondlekar, A. S. Shirsat

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 01 (2015), 6 January 2015

Automatic license Plate Recognition (ALPR) is the method of extracting vehicle license plate information from an image or a sequence of images. A design of a new Genetic Algorithm (GA) is introduced to detect the locations of the License Plate (LP) symbols. The extracted information can be used with or without a database in number of application applications, such as electronic payment systems, toll payment, parking fee payment and freeway and arterial monitoring systems for traffic surveillance. The ALPR uses either a color, black and white, or infrared camera to take images. The quality of the acquired images is a major factor in the success of the Automatic License Plate Recognition. Connected Component Analysis Technique (CCAT) is used to detect candidate objects inside the unknown image. A scale-invariant Geometric Relationship Matrix (GRM) has been introduced to model the symbols layout in any LP which simplifies system adaptability. Most of CCAT problems such as touching or broken bodies have been minimized by modifying the GA .The system as a real- life application has to quickly and successfully process the license plates. These plates usually contain different colors, and different fonts. Some plates may have a single color background and some others have background images. The license plates can be partially occluded by dirt, lighting, and other accessories on the car. The system recognizes the plate by appropriate detection.

Keywords: Genetic algorithms (GAs), image processing, image representations, license plate detection, machine vision, road vehicle identification

A Review on Device Controlled Using Eye Movement

Prashant Salunkhe, Ashwini R. Patil

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 01 (2015), 6 January 2015

This Paper is Introduced an eye controlled system. Traditionally, human computer interface uses keyboard, mouse as an input devices but this paper presents hand free interface between computer and human. Here providing a novel idea to control computer mouse cursor using human eyes movement. It controls mouse-moving by automatically affecting the position where eyesight focuses on and simultaneously mouse- click by affecting blinking action. In this paper we describe Face detection and Eye tracking technology with Algorithm of proposed system.  This technology is very helpful for solving the HMI problems of the disabled and providing them a way to communicate with the outside world, improve their ability of living and help them regain confidence.

Filtering of Unwanted Messages from OSN User Walls

N. Bhargavi, K. Ramesh, D. Venkatesh

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 01 (2015), 6 January 2015

An information filtering scheme is an information organization designed in support of unstructured or semi structured information. Filtering applications naturally entail streams concerning incoming information, moreover being transmitted by distant sources. Text categorization is accordingly a discipline at intersection of machine learning and information retrieval and as such it contributes to a numeral of characteristics by means of other responsibilities. Filtering was used to explain the procedure of accessing as well as retrieving information from distant databases, in which incoming information is the consequence of database searches. To enforce the filtering rules precise by the user the initial component makes use of the categorization of message provided by means of the module of short text classifier.

Keywords: Filtering rules, Short text classifier, Database, Machine learning.