Applied Mechanics and Materials
Vols. 580-583
Vols. 580-583
Applied Mechanics and Materials
Vols. 578-579
Vols. 578-579
Applied Mechanics and Materials
Vol. 577
Vol. 577
Applied Mechanics and Materials
Vol. 576
Vol. 576
Applied Mechanics and Materials
Vol. 575
Vol. 575
Applied Mechanics and Materials
Vol. 574
Vol. 574
Applied Mechanics and Materials
Vol. 573
Vol. 573
Applied Mechanics and Materials
Vols. 571-572
Vols. 571-572
Applied Mechanics and Materials
Vols. 568-570
Vols. 568-570
Applied Mechanics and Materials
Vol. 567
Vol. 567
Applied Mechanics and Materials
Vol. 566
Vol. 566
Applied Mechanics and Materials
Vol. 565
Vol. 565
Applied Mechanics and Materials
Vol. 564
Vol. 564
Applied Mechanics and Materials Vol. 573
Paper Title Page
Abstract: Infrastructure-As-A-Service (IAAS) provides an environmental setup under any type of cloud. In Distributed file system (DFS), nodes are simultaneously serve computing and storage functions; that is parallel Data Processing and storage in cloud. Here, file is considered as a data or load. That file is partitioned into a number of File chunks (FC) allocated in distinct nodes so that Map Reduce tasks can be performed in parallel over the nodes. Files and Nodes can be dynamically created, deleted, and added. This results in load imbalance in a distributed file system; that is, the file chunks are not distributed as uniformly as possible among the Chunk Servers (CS). Emerging distributed file systems in production systems strongly depend on a central node for chunk reallocation or Distributed node to maintain global knowledge of all chunks. This dependence is clearly inadequate in a large-scale, failure-prone environment because the central load balancer is put under considerable workload that is linearly scaled with the system size, it may thus become the performance bottleneck and the single point of failure and memory wastage in distributed nodes. So, we have to enhance the Client side module with server side module to create, delete and update the file chunks in Client Module. And manage the overall private cloud and apply dynamic load balancing algorithm to perform auto scaling options in private cloud. In this project, a fully distributed load rebalancing algorithm is presented to cope with the load imbalance problem.
556
Abstract: The aim of the project work is automatically to filter the dirty words from other users without displaying to the profile owner. In Online Social Network may have possibilities of posting some dirty messages so it need to filter without displaying to owner. It has achieved by using Rule based Filtering System. The Rule Based Filtering System allows users customize to filter the noisy or dirty words by applying some filtering Criteria. It exploits Machine Learning (ML). Machine Learning is a text categorization techniques to specify some categories for assign the short text dirty words based on their content. The content-based filtering on messages posted on user space has specified the additional challenges to be given the short length of these messages. Online social networks not only make it easier for users to share their opinions with each other, but also serve as a platform for developing filter algorithms.
560
Abstract: The growth of interconnected computer increases the amount and obscurity of attacks. Computer systems require apt security mechanism. Intrusion detection and prevention systems play an important part in detecting and preventing the attacks before they conciliate software. Multi-variant execution environment is an intrusion detection and prevention mechanism that executes several slightly different versions of a program, called variants, in concurrency. The variants are defined as more than 2 same instances. These variants contain the same operational unit of the original program. The variants are built to have indistinguishable manners under normal execution environment. If any of the variant is under attack, there are noticeable divergences in their execution behavior. A monitor compares the execution manners of the variants at specific synchronization points and raises an alarm when a variance is detected.
565
Abstract: Grid computing is that the major analysis space wherever the distributed resources square measure used. In programming, the largest challenge is to amass optimum answer for the submitted jobs within the grid. For giant subtask need time intense computation, this paper introduces a replacement fault recovery mechanism into grid systems associated an thorough study on grid service. We have a tendency to propose a replacement algorithmic program on considering these factors. In our planned algorithmic program Recovery Mutual programming, a catalog is employed which is able to be responsive in accumulation of saving its state sporadically. Consequently the turnout of a system is exaggerated with the localized approach.
571
Abstract: Heterogeneous grid resources in hand by completely different organization spread throughout the internet or wide area networks. In existing Distributed Hash Table (DHT) is the organization used for that mapping key to the nodes of a network based on a standardized hashing performs. to meet high scalable and dynamism resilient, thence we have a tendency to propose a Grid resource management theme called ranked Cycloid Overlay design (HCO) that\'s data locality-preserving. In HCO, we have a tendency to establish program/data locality by cluster resources based on their physical proximity and practical matching with user application. We have a tendency to any develop dynamism-resilient resource management rule, cluster-token forwarding rule, and deadline-driven resource management algorithms square measure planned. On adopting these algorithms consumes less overhead, speedy, dynamism-resilient multi resource discovery. The well-organized resource cluster, reduces communications price, and enhances resource discovery success rate flexibly extant in large scale applications.
576
Abstract: Ubiquitous health care facilities have become a more and more of widespread, particularly underneath the crucial request of the worldwide aging issue. Cloud computing owns the worldwide and on-demand service-oriented natures, which may apt the characteristics of health care services. However, the skills in addressing multimodal, heterogeneous, and non-stationary physiological signals to supply persistent customized services, meantime keeping high parallel on-line analysis for public, square measure challenges to the final cloud. During this work, we have a tendency to offer a personal cloud platform style that contains six layers in keeping with the particular needs. This strategy consumes message queue as a cloud engine, and every layer thereby achieves qualified independence by this loosely coupled suggests that of communications with distribute/contribute mechanism. What is more, a plug-in algorithmic rule define is additionally gettable, and large semi structure or unstructured medical knowledge square measure retrieved adaptively by this cloud style. Because the testing consequences showing planned cloud platform, with healthy, steady, and capable options, will fulfill high parallel requests from omnipresent health care services.
582
Abstract: Personal Health Record is internet based application that enables individuals to access and coordinates their womb-to-tomb health data. The patients have management over access to their own PHR. To attain security of non-public health records, we have a tendency to use the attribute based secret writing to write in code to inform before outsourcing it. Here we have a tendency to specialize in multiple forms of PHR owner situation and division of non-public health records users into multiple security domains that cut back key management complex for house owners and users. A high degree of patient’s privacy is secured. Our theme offer a personal health record owner full management of his/her information. In depth security and performance analysis shows that the projected theme is very economical.
588
Abstract: In this period of prevalence of Cloud Computing, SaaS, Virtualization and Software renting, what would be the magnitude of their impact in the field of education As an academician, one can visualize a lot of benefits in a variety of ways, if the benefits offered by these concepts are exploited in a productive and cost effective manner. When the gap of availability of knowledge and guidance, among rural students is bridged, the results are bound to be tremendously exciting. Since this research is about spreading knowledge, targeting the rural population, the aim is to concentrate on renting software free of cost. This research takes cognizance of the fact; the evolution in the field of virtualization of hardware and software; sets out to explore, how the technologies be successfully married to education, for the empowerment of the poor and rich alike. This paper therefore analyzes the current advancement in virtualization, various aspects of SaaS and Software renting in detail and suggests that the best way is to take the cautious approach, at every step to adopt these technologies/concepts. This also suggests starting small and scaling up the entire adoption after performing the due diligence of long term impacts, gives the best results. Sticking to the same principle, a real time environment of sample education institutions under one umbrella is considered for this study in a relatively rural setup.
593
Abstract: Internet is the prime vehicle to disseminate information from one place to another. Providing security to data is a major issue in transmitting data. One way of providing security to the data is encryption and decryption. Normal encryption is the way of changing the plaintext into cipher text using encryption and decryption algorithm and key. Literature reported different methods for encryption. An attempt is made in this paper to propose a modified encryption and decryption process performed with modified cellular automata rules. Cellular automata is idealized parallel processing machine which depends upon the cell value which is updated based on updating rule, which involves the cell and other cell values in a particular neighbourhood .Discrete references were made in the literature on the application of cellular automata rules. However lot more work remains to be done in this area. An attempt is made in this paper to provide encryption and decryption with cellular automata rules, using Data Encryption Standard (DES) and Advance Encryption Standard (AES) algorithms. They are operated at various stages, with the number of stages involved in sequential and cellular automata operating parallel. The major contribution of present work is, to develop methodology for identifying and application of 1D and 2D cellular automata rules and to fix the issues and challenges there in. A modified cellular automata set of rules are considered to develop 3D cellular automata rules for improved safety. Further a comparison is provided between existing 1, 2D automata rules versus the modified 3D cellular automata rules with respect to certain parameters. Keywords : Internet, Security, Cipher text, Plaintext, Cell value.
600
Abstract: Vehicular Ad-hoc NETwork (VANET) is an emerging technology. The integration of NEMO (NETwork MObility) with VANET is known as NEMO based VANETs. This combination supports the communication between the RSU (Road Side Unit) and Vehicles to provide the internet access through the public hotspots inside the public transportation systems. The travelers inside these systems can enjoy full internet access by using different Mobile Network Nodes (MNNs). Due to open nature of wireless system the physical layer attack can easily localize the MNNs by measuring their Received Signal Strength (RSS). The proposed system deals with the power variability and concealment techniques and propose the hybrid privacy preserving scheme to prevent the attackers from localizing the MNNs inside Nested NEMO based VANETs hotspots. The main aim of this proposed system is to make more confusion on the measurement of RSS and, hence, preserve the privacy at physical layer. The simulation is achieved by the integration of Vanet Mobisim and NS-2. In addition, our proposed scheme can be practically implemented due to having many MNNs that select the same fake point and, hence, increase estimation error on RSS measurement by the attacker. Key words: NEMO, Nested NEMO, Privacy, RSS, VANET
605