Logo

e-ISSN: 2455-6491 | Published by Global Advanced Research Publication House (GARPH)







Archives of International Journal of Advanced Innovative Technology in Engineering(IJAITE)


Volume 1 Issue 2 March 2016



1. Network Monitoring Using Rmi Technology

AUTHOR NAME : SAURABH D. SUTONE, SHIVAM P. MUDLIYAR, RAJAT R. SHUKLA, PROF. SACHIN LAKDE

ABSTRACT : The paper aim is to secure the network or a LAN by implementing such a software which is enable to carry out operations which are capable to monitor whole of the network ,sitting on one chair by viewing remote desktop ,convey messages to remote system and is also able to shut down the system by performing remote aborting operations , this project is purely developed in JAVA RMI (REMOTE METHOD INVOCATION) Technology. This paper is to provide the maximum details about the network to the administrator on their screen without knowing them their users. The administrator can view the live screen of client’s desktop and then he/she could convey a message to the user to stop their activity immediately. Even than if client do not stops than administrator has the facility to abort the system remotely or restart the system whatever necessary an administrator thinks.

Download





2. A Text Content Filtering System For Social Networking Websites

AUTHOR NAME : MISS. NEHALI S. JIRAPURE, MISS. NEHA S. CHAVHAN

ABSTRACT : Social Networking Websites (SNW’s) are nowadays a strong medium to share, communicate, and express personal (sharable) information among the people. It has become a medium of sharing homogeneous interests, activities, backgrounds or real life connections. SNW service allows individual to create a public profile, create a list of users with whom to share their information. SNW enables its user to post different types of data/information such as text, image, audio, video etc. on their post page or in comments. Unfortunately SNW provides very little support about the actual content in post. As an example, any user may text such a post containing some abused language which is not acceptable in public social networking site. In this paper we tried to explore the problems with possible solution on only text content posted in SNW.

Download





3. Optimization Of Association Rule By Mlms-Ga

AUTHOR NAME : SONALI P. MAHINDRE, DR. G. R. BAMNOTE

ABSTRACT : Association rule mining plays a very important role in various data mining process. The diversity of association rule mining spread in various field such as market bucket analysis, medical diagnose and share market prediction. Now a day’s various authors and researcher focus on validation of association rule mining. For the validation of association rule mining used various optimization algorithm are used such as genetic algorithm, ACO and particle of swarm optimization also used. Some authors used trigonometric functions for validation of rule such functions are monotonic and non-monotonic. In the continuity of these used sine and cosine based constraints function. The sine and cosine functions work in certain range of interval. For the selection validation of these function used genetic algorithm. Genetic algorithm is very famous optimization technique in association rule mining. Multiple constraints and meta-heuristic function play major role in efficient association rule mining technique. The multiple constrains applied in form of inbound and outbound condition and valued the rule for real time database. Meta-heuristic function applied by many researchers in current research trend in data mining for pattern and rule extraction. These functions optimized rule and reduce the rules of redundancy for association rule mining.

Download





4. An Approach For Efficient Query Processing For Materialized View Selection And Maintenance

AUTHOR NAME : SARVESH ANASANE, PROF. SHYAM P. DUBEY

ABSTRACT : The ability to afford decision makers with both accurate and timely consolidated information as well as rapid query response times is the fundamental requirement for the success of a Data Warehouse. To provide fast access, a data warehouse stores materialized views of the sources of its data. As a result, a data warehouse needs to be maintained to keep its contents consistent with the contents of its data sources. To improve the affection of OLAP queries is an important aspect of data warehouse domain. It affects the efficiency of queries in data warehouse directly. Base on the PBUS algorithm, a novel method is proposed to select materialized views of multidimensional data called dynamic selection Strategy. Another technique is the hybrid mediator is an integration system where one part of data is queried on demand as in the virtual approach, while another part is extracted, filtered and stored in a local database. Statistical analysis on existing query set help to predict the attributes likely to be used for future queries. The materialized views are generated accordingly.

Download





5. Implementation Of Sound Signature In Graphical Password Authentication System

AUTHOR NAME : NAFEES FATEMA, BHAKTI KADU, PROF. S. G. ANANTWAR

ABSTRACT : In this project, a graphical password system with a supportive sound signature to increase the remembrance of the password is discussed. In proposed work a click-based graphical password scheme called Cued Click Points (CCP) is presented. In this system a password consists of sequence of some images in which user can select one click-point per image. In addition user is asked to select a sound signature corresponding to each click point this sound signature will be used to help the user in recalling the click point on an image. System showed very good Performance in terms of speed, accuracy, and ease of use. Users preferred CCP to Pass Points, saying that selecting and remembering only one point per image was easier and sound signature helps considerably in recalling the click points.

Download





6. A Robust Authentication Scheme With Captcha Using Enhanced Security Primitive

AUTHOR NAME : GUNJAN MALVIYA, PALLAVI ITANKAR

ABSTRACT : All the applications on web implement varied authentication schemes to secure data from unauthorized access. Without proper authentication scheme the data is subjected to be attacked. Passwords are most widely used form of authentication scheme. Lot of researches has been done to make this scheme better and more secure. Still there is lot of scope as this form of authentication schemes has several vulnerabilities such as eavesdropping, replay attack etc. One more type of attack which is been a trouble for service providers is Denial of Service (DoS) attack sometimes called as botnet attack. This is an attempt to make a machine or network resource unavailable to its intended users by flooding it with useless requests/traffic. CAPTCHA is a possible solution for such DoS attack. But programs are designed to bypass the CAPTCHA security. In this work we make an attempt to present a robust authentication scheme using modified process of CAPTCHA to enhance authentication security at input level. The proposed scheme is supposed to be security measure for number of attacks such as eavesdropping, replay attack, and botnet attack.

Download





7. To Study Of Brain Fingerprinting Technology And Its Application

AUTHOR NAME : PRIYANKA K. BANSOD, SHITAL P. BURGHATE, PROF. JAVERIYA I. SYED

ABSTRACT : Brain fingerprinting is based on finding that the brain generates a unique brain wave pattern when a person encounters a familiar stimulus Use of functional magnetic resonance imaging in lie detection derives from studies suggesting that persons asked to lie show different patterns of brain activity than they do when being truthful. Issues related to the use of such evidence in courts are discussed. The author concludes that neither approach is currently supported by enough data regarding its accuracy in detecting deception to warrant use in court. In the field of criminology, a new lie detector has been developed in the United States of America. This is called “brain fingerprinting”. This invention is supposed to be the best lie detector available as on date and is said to detect even smooth criminals who pass the polygraph test (the conventional lie detector test) with ease. The new method employs brain waves, which are useful in detecting whether the person subjected to the test, remembers finer details of the crime. Even if the person willingly suppresses the necessary information, the brain wave is sure to trap him, according to the experts, who are very excited about the new kid on the block.

Download





8. Global Wireless E-Voting System

AUTHOR NAME : POOJA V. SHELKE, POOJA D. POKALE, PROF. JAVERIYA I. SYED

ABSTRACT : In the era of technology, the voting machine, which is present today, is highly unsecured. Being in the age of computers we are compromising the security by option for electronic voting machine because in the present electronic voting machine is not intelligent that is it cannot determine the person came for the voting is eligible or not. That mean the whole control is kept in the hand of voting in charge officer. One more risk with the present voting machine is that anybody can increase the vote count, since the count is present in the voting itself.

Download





9. Fpga Based Vlsi Design And Its Implementation Of Rsa Cryptosystem Algorithm Using Vedic Mathematics

AUTHOR NAME : DHANASHRI R. KADU, DR. G. P. DHOK

ABSTRACT : The standard techniques for providing privacy and security in data networks include encryption/decryption algorithms such as Advanced Encryption System (AES) (private-key) and RSA (public-key). RSA is one of the safest standard algorithms, based on public-key, for providing security in networks. Even though the RSA Algorithm is an old and simple encryption technique, there is a scope to improve its performance. This paper proposes the implementation of RSA encryption algorithm using the sutras or principles of ancient Indian Vedic mathematics that have been modified the algorithm to improve performance. It is observed that, RSA algorithm is difficult to implement with high speed because one of the most time consuming processes in RSA encryption/ decryption algorithm is the computation of ab mod n where “a” is the text, (b, n) is the key. Generally the prime number used for RSA Encryption system will around 100 to 150 decimal digits. The computations involved are tedious and time consuming. Also the hardware is quite complex. To increase the computation speed, the multiplication principle of Vedic mathematics is used in this paper. “Urdhva-tiryakbhyam” is the sutra (principle) which used to compute the multiplication. It literally means vertical and crosswise manipulation. The significance of this technique is that it computes the partial products in one step and avoids the shifting operation which saves both time and hardware. The VHDL code is simulated and synthesized on ModelSim SE 6.3f and Altera Quartus II 9.1 tools respectively.

Download





10. E-Grampanchayat

AUTHOR NAME : SAGAR BANKAR, ROHIT JAIN, ZAID SHAIKH, PROF.SACHIN DESHPANDE

ABSTRACT : Today’s age is the age of innovations and technological revolutions. Digitalization is the new form of revolution which is encountered in each and every field of the current modern world. In this current advanced generation, individual information holds a very important value for any administrative organization. Information can be processed and presented in day to day life. Management of information is an important part of the daily life cycle and is much needed when it comes to administrative work. We know managing data can be a very tedious job and specially maintaining it can be a very huge task. Hence a data can be stored in the most efficient way that is by digitizing it. The main purpose to initiate this was to take a step towards making “The Digital India” campaign a grand success. Many rural areas are deprived of advanced facilities which slow them down in the race for development. This project would revolutionize the functioning of the administrative departments in the rural areas and this is not the end, this initiative would also become a source of employment in the rural areas.

Download





11. Implement Intrusion Detection Node In Ad-Hoc Wireless Netork

AUTHOR NAME : SWAPNIL WARADE, Ms. PARUL BAHEKAR, PROF. SHYAM P. DUBEY

ABSTRACT : In recent year ad-hoc wired network are widely used but they are time consuming & complicated in the physical manner. But, now a day ad-hoc wireless network plays an important role for doing great work in minimum time & with great output. But with the new technology comes, their own set of problems like intrusion attacks, threats and other different types of attacks in the wireless networks will be occur. Hence, we find there are several security problems & in order to protect network from security problems, intrusion detection system (IDS) is another solution here. This system detects the attack with the help of patterns & alerts if intrusion is detect in the cluster, etc. In this paper, we propose a design of “Development of an intelligent system for intrusion detection in ad-hoc wireless network” (DIS-ID-ADN) it is a new methodology to detect intrusion in wireless network with the help of defining parameters, creating cluster & selecting a cluster head (CH) in each cluster. We first find the intrusion in cluster, restrict them & then with the help of parameters record intrusion system information & broadcast it to the other CH in a network & declare it as an intrusion in wireless ad hoc network.

Download





12. Image Forensic Analyses That Illumination Processes The Human Visual System

AUTHOR NAME : SWAPNIL DHARME, POOJA THAKRE

ABSTRACT : Digital Photo images are everywhere, on the covers of magazines, in newspapers, in courtrooms, and all over the Internet. We are exposed to them throughout the day and most of the time. Ease with which images can be manipulated; we need to be aware that seeing does not always imply believing. We propose methodologies to identify such unbelievable photo images and succeeded to identify forged region by given only the forged image. Formats are additive tag for every file system and contents are relatively expressed with extension based on most popular digital camera uses JPEG and Other image formats like png, bmp etc. We have designed algorithm running behind with the concept of abnormal anomalies and identify the forgery regions. Today, Powerful digital image editing software makes image modifications straightforward. This undermines our trust in photographs. In this paper, one of the most common forms of photographic manipulation, known as image composition or splicing is analyzed. A forgery detection method that exploits subtle inconsistencies in the color of the illumination of images. The proposed approach is machine-learning based and requires minimal user interaction. The technique is applicable to images containing two or more people and requires no expert interaction for the tampering decision. Here, the existing work can be extended by using advanced face detection method using skin tone information and edges. A lighting insensitive face detection method based upon the edge and skin tone information of the input color image is proposed. From these illuminant estimates, we extract texture- and edge-based features which are then provided to a machine-learning approach for automatic decision-making.

Download





13. An Overview On Thermo-Physical Properties of Nanofluids And Its Effect on Heat Transfer

AUTHOR NAME : Dr. S. V. BHALERAO, Dr. P. N. SHRIRAO, Prof. S. S. GADDAMWAR

ABSTRACT : The literature in enhanced heat transfer is growing faster. The enhancement of heating or cooling in an industrial process may create a saving in energy, reduce process time, raise thermal rating and lengthen the working life of equipment. Some processes are even affected qualitatively by the action of enhanced heat transfer. A number of investigations have been performed to gain an understanding of the heat transfer performance for their practical application to heat transfer enhancement. There are several methods to improve the heat transfer efficiency. Some methods are utilization of extended surfaces, application of vibration to the heat transfer surfaces, and usage of micro channels. Heat transfer efficiency can also be improved by increasing the thermal conductivity of the working fluid. In recent years, the nanofluid has emerged as an alternative heat transfer fluid for heat transfer applications showing a significant potential for heat transfer improvement. Nanofluids are this new class of heat transfer fluids and are engineered by suspending nanometer-sized particles in conventional heat transfer fluids. Nanofluids appear to be a very interesting alternative heat transfer fluids for many advanced thermal applications as in Electronics, Power generation, transmission and Renewable energy. The purpose of this review paper is to go through the thermo-physical properties of the nanofluids. This review paper also focused on the nanofluids performance in tube and covered the enhancement in heat transfer by the use of nanofluids in all applications and the effect of concentration, Reynolds number, type of nanofluid, and diameter of nanoparticles and other parameters.

Download