Manuscripts

Recent Papers

Protection Saving Positioned Multi-Keyword Scan for Different Information in Distributed Computing

Observing the read of cloud computing, it's become augmenting standard for information house owners to outside provider their data to public cloud servers whereas permitting information users to regain this information. To relate to seclusion, safe searches over encrypted cloud information have provoked a lot of analysis works below the only real owner model. However, most cloud servers in observing don't simply Serve distinctive owner; instead, they support multiple house owners to share the advantages brought by cloud computing. In this paper, we recommend -To keep safe the secrecy many |and a number of other |and several other} owner model search several keywords and hierarchical. to create doable cloud servers to execute safe to seem omission knowing the $64000 data of each keyword and trap-doors, to stay alive the privacy of connected scores between keywords and files and rank the search result, we recommend a completely unique Additive Order and Privacy conserving operate family and dynamic hidden key creation rule and a replacement information user to ascertain as real rule.

Published by: Usha L. G, B. N Veerappa

Author: Usha L. G

Paper ID: V2I7-1155

Paper Status: published

Published: July 24, 2017

Full Details

Comparative Analysis of Discrete and Fused Floating Point Arithmetic Units and its Application for Fused Butterfly Unit

For DSP application that requires a large dynamic range floating point implementations are more suitable than fixed point representation. Floating point arithmetic is much useful in the implementation of various DSP applications as it allows the designer and the user to concentrate on the algorithms and architecture without worrying about the numerical issues. Many applications use floating point hardware to perform DSP tasks in real time and hence overcome the limitations imposed by the use of fixed point numeric systems. The multi-functional floating-point unit includes a multiplier unit, a fused Add-Subtract unit which uses hardware more efficiently in comparison to the separate unit blocks for each operation. This method reduces the area of the designed block but the speed of operation is also reduced. The blocks are reduced based on the common operation between each designed unit.

Published by: Priya Purohit, Monika Gupta, Abhay Sharma

Author: Priya Purohit

Paper ID: V2I7-1149

Paper Status: published

Published: July 21, 2017

Full Details

Survey on Proof of Violation​ in Cloud Storage

Proof of Violation (POV) scheme in the cloud storage systems, this scheme is used in which it allows the users to produce some cryptographic proofs, to determine whether the violation has been occurred by the user or whether he is innocent by providing cryptographic proofs. Since Security and reliability are the two major concerns about cloud storage. However, clients lose control of files when uploading to the cloud storage. Files may be unexpectedly exposed to a third party or modified without permission or the hackers may take an advantage of such files. The cloud may not follow user’s instruction to safely store files. For example, if files are damaged or lost, users usually do not have any precise proof to prove it. Since customers cannot make informed decisions about the risk of losing data stored, since their incentive to rely on these services is reduced. Hence a new scheme approach i.e., proof of violation is been developed in which it can be achieved using SLA Agreement, in which it can be used to provide the mutual non-repudiation guarantee with the service provider in the cloud storage. Auditing of files must be done, since it keep tracks of each file operation and determines if there is any violation in the SLA. The result of all these file operations and hash values of the downloaded files are stored in the cloud server and hence can achieve real-time auditing through it. Therefore the cloud must provide security features so that only authorized person can access and provide authentication for each file to improve better security features and back-up the lost data files. Therefore in order to enhance better performance and efficiency through which maximum time effort can be reduced.

Published by: Sindhu J. P, Divyashree .J

Author: Sindhu J. P

Paper ID: V2I7-1146

Paper Status: published

Published: July 21, 2017

Full Details

Implementation of Robust Satellite Image Enhancement for Fusion of Multispectral and Panachromatic Images

This paper shows execution and assessment of the picture combination methods connected on the panchromatic and multispectral satellite pictures. The review territory is secured diverse landscape morphologies. A decent combination plan ought to safeguard the phantom qualities of the source multi-ghostly picture and also the high spatial determination attributes of the source panchromatic picture. So as to discover the combination calculation which is most appropriate for the panchromatic and multispectral pictures, combination calculations, for example, PCA and wavelet calculations have been utilized and broke down. In this paper, execution assessment criteria are likewise utilized for quantitative appraisal of the combination execution. The otherworldly nature of combined pictures is assessed by the Deviation Angle, Spectral Angle, Correlation Index, ERGAS, Q4 and RMSE. The examination shows that the DWT combination plot has the best definition and also phantom constancy, and has better execution with respect to the high textural data retention. Accordingly, as the review region is concerned, it is most suited for the panchromatic and multispectral picture combination.

Published by: Kavana A. M, Dr. Mohamed Rafi

Author: Kavana A. M

Paper ID: V2I7-1147

Paper Status: published

Published: July 21, 2017

Full Details

Experimental Investigation and Analysis of Circular Tile Cutter Using FEA and FFT

Cutting system play very important role in marble cutting industry.Circular tile cutters with uniform radial cracks are mostly used in the cutting processes. Cutters are used to cut respective material to a required size or shape . They come in a number of different forms , from basis manual devices to complex attachments for power tools. Unwanted noise , vibration and accidental failure associated with the cutting process have become an important economic and technological aspect in the industry. The knowledge of natural frequencies of components is of great interest in the study of response of structures to various excitations . In this study natural frequencies will be evaluated in desired frequency ranges of cutter mechanism. Mode shapes at various natural frequencies will be evaluated using FEA and FFT results , CATIA V5 software will be used to design various existing blades and modification will be carried out as per results. Optimization to minimize the weight of circular tile cutter and therby reducing the material cost. Optimised model is further verified by FFT and thermal analysis.Conclusion and future scope will be suggested.

Published by: Sheetal A. Patil, Prof. M. K. Wasekar

Author: Sheetal A. Patil

Paper ID: V2I7-1140

Paper Status: published

Published: July 6, 2017

Full Details

Voltage Mode Universal Filter Using Current Conveyor

A second order voltage mode tunable universal filter is presented. The voltage mode filter is based on dual output second generation current controlled current conveyor (DOCCCII). The filter is capable of realizing high pass (HP), low pass (LP), band pass (BP), notch pass (NP) and all pass (AP) responses in voltage mode (VM). The filter employs only two capacitors and hence enjoys minimum component requirement. By properly exciting the filter structure with appropriate voltage signals the filter response in all four modes can be obtained. The filter enjoys tunability of quality factor and filter frequency. The filter is simulated in Hspice using 0.18µm CMOS model parameters obtained from TSMC. The DOCCCII works at a low supply voltage of ±1.5V.

Published by: Saurabh Kumar, Imranullah Khan

Author: Saurabh Kumar

Paper ID: V2I7-1138

Paper Status: published

Published: July 6, 2017

Full Details

Growth of the Hotel Industry in Coimbatore

Customer Attitude has become a topical issue in research and practice due to its proven dominance in hotel organizational success. The present study has been conducted on the customer attitude towards the hospitality industry by improving understanding of the relationships among customer loyalty, customer satisfaction, and image. Also this research identifies the various factors on which the customer point of view on hotels and lodging industry, which is mainly based on the data collected from various hotels indicate the customer satisfaction with performance of various aspects like housekeeping, reception, room service, price, food and beverages. Hotels are the most important part of the lodging industry which contributes to the sector by offering services and facilities of extremely high standards.Facilities provided may range from a modest-quality mattress in a small room to large suites andhotel operations vary in size, function, and cost. In this report, the area of customer complaint behaviour has received considerable attention from hotel managers as dissatisfied customers engage in a variety of complaint actions that could ruin the reputation of a hotel. The main objectives were to identify complaint patterns and the relationships between customers’ demographic backgrounds.

Published by: L. Dinesh, Dr. M. Usha

Author: L. Dinesh

Paper ID: V2I7-1139

Paper Status: published

Published: July 5, 2017

Full Details

An Integrated Approach for the selection of software requirements using Fuzzy AHP and Fuzzy TOPSIS Method

Software requirements selection (SRS) is an important research issue of the software requirements elicitation process. Different methods have been developed for the selection of software requirements by using the ant colony optimization, teaching learning based optimization, analytic hierarchy process (AHP), technique for order preference by similarity to ideal solution (TOPSIS), etc. Based on our literature review, we identify that existing methods for SRS do not support the integrated approach based on fuzzy AHP and fuzzy TOPSIS for the selection of software requirements from the set of requirements. Therefore, to address this issue in this paper we propose an integrated fuzzy AHP and fuzzy TOPSIS method for the selection of software requirements. Finally, the explanation of the proposed method is demonstrated with the help of a case study.

Published by: Arashiya Afrin, Mohd. Sadiq

Author: Arashiya Afrin

Paper ID: V2I6-1184

Paper Status: published

Published: July 1, 2017

Full Details

Workplace Issues with Women

The affluence of this paper is the workplace issues that the women are facing in their workplace. This paper is designed to bring the light on the issue the even in this modern era women are sill fighting for gender equality

Published by: Daisy Raj

Author: Daisy Raj

Paper ID: V2I6-1206

Paper Status: published

Published: June 30, 2017

Full Details

Motivation in the Workplace To Improve The Employees Performance

Motivation plays an important and essential element In order to feel employees good about their jobs and make them perform optimally. Many employees find money as a good motivator whereas some feel personally motivated through recognition and rewards. Motivation is very important in the workplace. As it directly affects the productivity of the employees. Unmotivated employees aren't able to contribute many efforts towards their job as compare to motivated employees. The motivation of the employees has always a major problem for the managers and leaders. A lot of research has been done on motivation by many scholars. Employers need to know their employees very well and use different strategies to motivate them based on their personal wants and needs. In this paper, I like to emphasis on the relevance of motivation in the workplace to improve the employee performance and productivity.

Published by: Daisy Raj

Author: Daisy Raj

Paper ID: V2I6-1205

Paper Status: published

Published: June 30, 2017

Full Details