Niyamat I. Ujloomwale and Ranjana Badre
Cloud computing is worthy of consideration and try to build business systems as a way for businesses in this way can undoubtedly bring about lower costs, higher profits and more choice; for large scale industry, Data security has become the most important issue of cloud computing security. Though many solutions have been proposed, many of them only consider one side of security; this paper proposes the cloud data security must be considered to analyse the data security risk, the data security requirements, deployment of security functions and the data security process through encryption. Distribution of file is done on cloud servers with token generation. The security architecture of the system is designed by using encryption/decryption algorithm, which eliminates the fraud that occurs today with stolen data. There is no danger of any data sent within the system being intercepted, and replaced. The system with encryption is acceptably secure, but that the level of encryption has to be stepped up, as computing power increases. Results in order to be secured the system the communication between modules is encrypted. Since the customer does not have control over data the cloud provider should assure the customer that data is not modified. In this paper a data correctness scheme is proposed in which a Cloud service Provider assures the user that the data stored in the cloud is safe. This scheme also achieves the integration of storage correctness insurance and data error localization i.e., the identification of misbehaving server(s).
Aniket V. Kulkarni, Prathamesh S. Kharche , Vivek V. Sonawane
In the present technological revolution power is very precious. So we need to find out the causes of power loss and improve the power system. Due to industrialization the use of inductive load increases and hence power system losses its efficiency. So we need to improve the power factor with a suitable method. Automatic power factor correction device reads power factor from line voltage and line current by determining the delay in the arrival of the current signal with respect to voltage signal from the function generator with high accuracy by using an internal timer. This time values are then calibrated as phase angle and corresponding power factor. Then the microcontroller calculates the compensation requirement and accordingly switches on different capacitor banks. Automatic power factor correction techniques can be applied to the industries, power systems and also house-holds to make them stable and due to that the system becomes stable and efficiency of the system.
Jasmeet Kaur and Jigisha Pandya
The online transaction is now becoming a trend in Indian market to interact with its customers for any business solutions. As per recent surveys users doing online transactions are growing daily. It has become back bone of financial institution’s multichannel strategy. Information about financial institutions, their customers, and their transactions is extremely sensitive which is at higher risk in today’s vulnerable technical world. It has been observed that such business done via a public network costs new challenges for security and trustworthiness. Any online transaction system must solve the issues of authentication, confidentiality, integrity, and nonrepudiation, which means it must ensure that only qualified people can access a transaction gateway, that the information viewed remains private and can’t be modified by third parties, and that any transactions made are traceable and verifiable. For confidentiality and integrity, Secure Sockets Layer/Transport Layer Security (SSL/TLS) is the well-known Internet transaction standards, whereas for authentication no single scheme has become predominant yet so far these days.
Ashwini A. Mate, A. R. Khedkar, M. Murugan
Orthogonal frequency division multiplexing (OFDM) is modulation technique used in high speed communication. OFDM is special case of frequency division multiplexing. OFDM offers various advantages. The major drawback of OFDM system is its sensitivity to carrier frequency offset (CFO). Various causes of CFO are Doppler shift and differences between frequencies of transmitter and receiver. The carrier frequency offset leads to intercarrier interference in OFDM systems. Because of intercarrier interference system performance degrades. There are various techniques of mitigating effect of intercarrier interference on OFDM system. In this paper effect of CFO on performance of OFDM system for different modulation techniques such as BPSK, QPSK, 8PSK, and 16PSK is discussed. Performance is evaluated in terms of bit error rate (BER).
Rupali Wavare, M.P. Turuk, Rajkumar
This paper presents the third iterative UBW Fractal antenna with UWB application. A new ultawideband circular fractal antenna with notched-band characteristics is presented. A notched-band characteristic is achieved by employing an L-shape slot. The UBW fractal antenna has been designed on substrate εr = 4.3, thickness h= 1.53 mm with 6 mm radius. The impedance bandwidth of the proposed fractal antenna is 8.3 GHz ranging from 3.7 GHz to 12 GHz with circular polarization. Analysis of antenna is done using HFSS.The proposed antenna has been analyzed theoretically and experimentally with respect to design parameters. The simulated results are in good agreement with the experimental results. This type of antenna is useful for UWB wireless communication.
Nanda Kulkarni and B.R.Jadhavar
With the development of positioning in indoor wireless environments, RSS-based indoor positioning algorithm has been widely applied.In this deliverable we provide the details of building an indoor positioning system using WLAN Received Signal Strength (RSS) fingerprints The standard deviation between measured and predicted path loss is 5.8 dB for the entire data set, and can be as small as 4 dB for specific areas within a building. Path loss contour plots for measured data are presented. In addition, contour plots for the path loss prediction error indicate that the prediction models presented in this paper are accurate to within 6 dB for a majority of locations in a building. In our case, users that carry a terminal (laptops) are able to self-locate and positioning is performed entirely on the device using the observed RSS fingerprint. Currently, one positioning method, i.e. K-Nearest Neighbors (KNN) and other one filtering method, i.e. Kalman filter, has been integrated into our positioning platform. In the future we plan to implement and integrate more positioning and filtering modules, while at the same time try to improve the performance with respect to the positioning error by tweaking and fine-tuning both modules. The rest of this report is structured as follows. The details four experimentation area in the premises of Enggbuilding .
Radhika Gulhane, Rajkumar, A. S. Shirsat
In this paper, a new EBG structure is introduced and designed. This structure is based on mushroom like EBG structure. But there is some difference in mushroom like EBG and new EBG structure. Shape of both EBG are different & in new EBG structure, no connecting via between patch and ground plane.The basic principle of the EBG is that it absorbs surface waves that reduces losses of the radiator to a great extent. A UWB monopole antenna is proposed and the EBG structures are implemented with it to increase the gain of the antenna over the UWB band.
S. S. Chavan, M. S. Chavan, H. B. Vanjari
According to the result of moving object detection research on video sequences, this paper proposes a new method to detect moving object based on background subtraction. First of all, we establish a reliable background updating model based on statistical and use a dynamic optimization threshold method to obtain a more complete moving object. And then, morphological filtering is introduced to eliminate the noise and solve the background disturbance problem. At last, contour projection analysis is combined with the shape analysis to remove the effect of shadow; the moving human body is accurately and reliably detected. The experiment results show that the proposed method runs quickly, accurately and fits for the real-time detection.
VaishaliKathale-Ladde and B. C. Deotare
Wells constructed by the lining with the terracotta rings are called as Ring Wells were excavated from large number of ancient sites from India. These ring wells were identified as soak-pits, draw-wells or granaries just on the basis of their context and content from the physical observations. Since no one has studied from chemical point of view, present study reveals some features of ring well from chemical point of view first time by analyzing the filling material of the ring well from ancient historic site BhonDist.Buldhana,Maharashtra.
SCMR is a centre for multi-disciplinary research work, A few activities of SCMR for the benefit of industry.
© 2018, SPJ Centre for Multi-disciplinary Research . All rights reserved | Design by Design For U