International Conference On Progressive Research In Applied Sciences, Engineering And Technology (ICPRASET 2K18)
(Volume-9)

CIVIL

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Refining The Acoustical Defects Of Assembly Buildings By Scientific Positioningof Sound Systems
Country
::
India
Authors
::
L.K.Rex || G.Abirami || S.Bhuvaneshwari || R.Sathanandavathi || S.Yogalakshmi
Page
::
01-06

The public assembly buildings like outdoor and indoor stadiums are prone to acoustical defects arising out of multifold reasons observed during many stage events.This investigation was carried out with an aim todo away with the obstructions interveningduring the gala events. The factors identified to influence the acoustics of buildings are geometrical properties of the building, materials used for construction and interiors, openings in buildings, orientation and positioning of sound systems, number and capacity of sound systems and so on. Considering all these parameters into account, an investigation was made with a scientific approach of setting up of sound systems that suits well for any building geometry built with the conventional construction materials. The results of the study proposed non-linear polynomial equations for orientation and positioning of surround sound systems to generate a highly audible and ambient atmosphere.

 

Keywords: - Audible, ambient, assembly buildings, acoustics,orientation, positioning, sound systems.

[1] Subash S. Deshpande, Sanjay N. Patil and Anil K. Gupta, "Acoustics-Essential Requirement for Public Buildings", IOSR Journal of Mechanical and Civil Engineering, pp 25-28.
[2] C. Rougier, J. Defrance, N. Noe, J. Maillard and M. Baulac, "Acoustic Environmental Impact of Stadiums", Internoise, 13-16 June 2010, Lisbon-Portugal.
[3] Luke Zoontjens and Tom Cockings, "Review of Design Approaches to Acoustics in Australian Hospitals", Internoise, 16-19
November 2014, Melbourne-Australia.
[4] M. Azimi, "Noise Reduction in Buildings using Sound Absorbing Materials", Journal of Architectural Engineering Technology,
Vol.6, Issue 2, 2017.
[5] Chan-Ki Jeon, Jae-Seong Lee, Hoon Chung, Ju-Ho Kim and Jong-Pil Park, "A Study on Insulation Characteristics of Glass Wool and Mineral Wool Coated with a Polysiloxane Agent", Advances in Materials Science and Engineering, Vol.2017.

 

CSE

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
A situation aware emergency response smartphone Application using sensor Networks
Country
::
india
Authors
::
Sakthi.G || Praveen.J || Rajeswari.G
Page
::
07-10

Social media now plays a important role in how the public communicates during an emergency. The First2Recognize Emergency Support System influence existing social media technologies to greatly improve emergency preparedness and management in the Vancouver Sound. Responders can use the First2Recognize portal to gather and view large amounts of data from popular social media sites. First2Recognize uses advanced technology to compile this data into filterable and editable categories. Data can also be viewed in tabular and map format. Tabular view lists abbreviated data in expandable columns and gives the status and importance of each listing. Map view gives a real-time overview of locations and incident types.

[1] N. Balasubramanian, A. Balasubramanian, and A. Venkataramani. Energy consumption in mobile phones: a measurement study and implications for network applications. In Proc. of the ACM SIGCOMM Conference on Internet MeasurementConference (IMC), 2009.
[2] J. D. Banfield and A. E. Raftery. Model-based Gaussian and Non-Gaussian clustering. Biometrics, 1993.
[3] J. Biagioni and J. Eriksson. Map inference in the face of noise and disparity.InProc. of the International Conference on Advances in Geographic Information Systems, 2012.
[4] L. Cao and J. Krumm. From GPS traces to a routable road map. In Proc. of the ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2009.
[5] J. Davics, A. Beresford, and A. Hopper. Scalable, distributed, real-time map generation. IEEE Pervasive Computing, 2006.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Public Auditing And Energy Saving Task Scheduling Strategy In Cloud Computing
Country
::
India
Authors
::
Mr.K.Lakshminarayanan.M.E
Page
::
11-13

Cloud computing is the long dreamed vision of computing as a utility, where users can remotely store their data into the cloud so as to enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources. By data outsourcing, users can be relieved from the burden of local data storage and maintenance. Thus, enabling public auditability for cloud data storage security is of critical importance so that users can resort to an external audit party to check the integrity of outsourced data when needed. To securely introduce an effective third party auditor (TPA), the following two fundamental requirements have to be met: 1) TPA should be able to efficiently audit the cloud data storage without demanding the local copy of data, and introduce no additional on-line burden to the cloud user. Specifically, our contribution in this work can be summarized as the following three aspects:

[1] G. Lovasz, F. Niedermeier, and H. De-Meer, Performance tradeoffs of energy-aware virtual machine consolidation, Journal of Networks Software Tools and Applications, vol.16, pp. 37–38, 2013.
[2] J. X. Chen, Energy efficient design of cloud data center,Cloud IDC, vol. 57, pp. 481–496, 2011.
[3] O. Philippe and L. Jorge, Deep network and service management for cloud computing and data centers: A report on CNSM 2012, Journal of Network and Systems Management, vol. 21, pp. 707–712, 2013.
[4] Y. S. Jing, A. Shahzad, and S. Kun, State-of-the-art research study for green cloud computing, Journal of Supercomputing, vol. 65, pp. 445–468, 2013.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Fast phrase search scheme in cloud computing for encrypted keyword
Country
::
India
Authors
::
Mr.T.Ragupathi.M.E
Page
::
14-16

Cloud computing has generated much interest in the research community in recent years for its many advantages, but hasalso raise security and privacy concerns. The storage and access of confidential documents have been identified as one of the centralproblems in the area. In particular, many researchers investigated solutions to search over encrypted documents stored on remotecloud servers. While many schemes have been proposed to perform conjunctive keyword search, less attention has been noted onmore specialized searching techniques. In this paper, we present a phrase search technique based on Bloom filters that is significantlyfaster than existing solutions, with similar or better storage and communication cost. Our technique uses a series of n-gram filters tosupport the functionality. The scheme exhibits a trade-off between storage and false positive rate, and is adaptable to defend againstinclusion-relation attacks. A design approach based on an application's target false positive rate is also described.

[1] D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano, "Public key encryption with keyword search," in In proceedings of
Eurocrypt,2004, pp. 506–522.
[2] B. Waters, D. Balfanz, G. Durfee, and D. K. Smetters, "Building an encrypted and searchable audit log," in Network and
Distributed System Security Symposium, 2004.
[3] M. Ding, F. Gao, Z. Jin, and H. Zhang, "An efficient public key encryption with conjunctive keyword search scheme based on
pairings," in IEEE International Conference onNetwork Infrastructure and Digital Content, 2012, pp. 526–530.
[4] F. Kerschbaum, "Secure conjunctive keyword searches for unstructured text," in International Conference on Network and System Security, 2011, pp. 285–289.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Dynamic Trust : Trusted Routing Framework In Wsn Against Blockhole Attack And Sinkhole Attacks
Country
::
India
Authors
::
Nallakumar R || Preetha Rexlin P.L || Susithra. D || Vickma. S
Page
::
17-21

The Wireless Sensor Network[WSN] is an infrastructure less, Self-Configuring and dynamic typological oriented Network. The unique features of Wireless Sensor Networks including dynamic topology and open wireless medium, may lead WSN to suffer from many security vulnerabilities. The proposed research deal with the following security issues, such as wormhole, sinkhole attacks, flooding and intrusions. To afford a best possible route for secure data transmission, the system introduces a new secure routing protocol. The new trust based routing protocol "SA-AODV" (Secure Trustable AODV) enables the route discovery with trust calculation mechanism................

 

Keywords - Blockhole attack, security trust, Wireless Sensor Network.

1. Dallas, Daniel, Christopher Leckie, and KotagiriRamamohanarao,(2007) "Hop count monitoring: Detecting sinkhole attacks in wireless sensor networks".
2. Krontiris, Ioannis, ThanassisGiannetsos, and TassosDimitriou,(2008) "Launching a sinkhole attack in wireless sensor networks; the intruder side." Networking and Communications, WIMOB'08. IEEE International Conference on Wireless and Mobile Computing,.
3. LiuA,Dong M, Ota K, et al(2015) "An Efficient Scheme for Selective Forwarding Attack Detecting in WSNs,"
4. Liu A, Jin X, CuiG,Chen Z,(2013) "Deployment guidelines for achieving maximum lifetime and avoiding energy holes in sensor network," Information Sciences.
5. Macker, Joseph. (1999)"Wireless Sensor Networking (WSN): Routing protocol Performance issues and evaluation considerations

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Securing Web Applications Against Cross Sitescripting, Injection Attacks And Authentication Attacks
Country
::
India
Authors
::
M.Newlin Rajkumar || Susithra. D || Preetha Rexlin P.L || Vickma. S
Page
::
22-25

Web applications are one of the most widespread platforms for information and services delivery over Internet today. As they are increasingly used for critical services, web applications become a popular and valuable target for security attacks. Although a large body of techniques has been developed to fortify web applications and mitigate the attacks toward web applications, there is little effort devoted to drawing connections among these techniques and building a big picture of web application security research. In the proposed system a security scheme is proposed to protect the web application from cross site scripting and injection attacks, with the aim of regulating the existing techniques into detailed analysis that promotes future investigation...........


Key words: - Script injection attacks, process site scripting, web application attacks.

[1]. Shrivastava, Ankit, Santosh Choudhary, and Ashish Kumar. "XSS vulnerability assessment and prevention in web
application." Next Generation Computing Technologies (NGCT), 2016 2nd International Conference on. IEEE, 2016.
[2]. Gupta, Aditi, Javid Habibi, Michael S. Kirkpatrick, and Elisa Bertino. "Marlin: Mitigating code reuse attacks using code
randomization." IEEE Transactions on Dependable and Secure Computing 12, no. 3 (2015): 326-337.
[3]. Yang, Xinyu, Jie Lin, Wei Yu, Paul-Marie Moulema, Xinwen Fu, and Wei Zhao. "A novel en-route filtering scheme against false data injection attacks in cyber-physical networked systems." IEEE Transactions on Computers 64, no. 1 (2015): 4-18.
[4]. Miao, Fei, Quanyan Zhu, Miroslav Pajic, and George J. Pappas. "Coding schemes for securing cyber-physical systems against stealthy data injection attacks." IEEE Transactions on Control of Network Systems 4, no. 1 (2017): 106-117.
[5]. Halfond, William G., Jeremy Viegas, and Alessandro Orso. "A classification of SQL-injection attacks and countermeasures."
Proceedings of the IEEE International Symposium on Secure Software Engineering. Vol. 1. IEEE, 2006.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Statistical Features Based Real-time Detection of Drifted Twitter Spam
Country
::
India
Authors
::
Mr .M. Madhan .M.E.
Page
::
26-29

The Twitter Spam has become a critical problem nowadays. Recent works focus on applying machine learning techniques for Twitter spam detection, which make use of the statistical features of tweets. In our labelled tweets dataset, however, we observe that the statistical properties of spam tweets vary over time, and thus the performance of existing machine learning based classifiers decreases. This issue is referred to as "Twitter Spam Drift". In order to tackle this problem, we firstly carry out a deep analysis on the statistical features of one million spam tweets and one million non-spam tweets, and then propose a novel Lfun scheme. The proposed scheme can discover "changed" spam tweets from unlabelled tweets and incorporate them into classifier's training process. A number of experiments are performed to evaluate the proposed scheme. The results show that our proposed Lfun scheme can significantly improve the spam detection accuracy in realworld scenarios.

[1] M. Egele, G. Stringhini, C. Kruegel, and G. Vigna. Compa: Detecting compromised accounts on social networks. In Annual
Network and Distributed System Security Symposium, 2013.
[2] J. a. Gama, I. ˇ Zliobait˙e, A. Bifet, M. Pechenizkiy, and A. Bouchachia. A survey on concept drift adaptation. ACM Comput.
Surv., 46(4):44:1–44:37, Mar. 2014.
[3] H. Gao, Y. Chen, K. Lee, D. Palsetia, and A. Choudhary. Towards online spam filtering in social networks. In NDSS, 2012.
[4] H. Gao, J. Hu, C. Wilson, Z. Li, Y. Chen, and B. Y. Zhao. Detecting and characterizing social spam campaigns. In Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, IMC '10, pages 35–47, New York, NY, USA, 2010. ACM.
[5] H. Gao, Y. Yang, K. Bu, Y. Chen, D. Downey, K. Lee, and A. Choudhary. Spam ain't as diverse as it seems: Throttling osn spam with templates underneath. In Proceedings of the 30th Annual Computer Security Applications Conference, ACSAC '14, pages 76– 85, New York, NY, USA, 2014. ACM.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Prevention Of Distributed Denial Of Service Flooding Attacks Using Dynamic Random And Secure Path Identifiers
Country
::
India
Authors
::
M.Newlin Rajkumar || Vickma. S || Susithra. D || Preetha Rexlin. P.L
Page
::
30-34

There are increasing interests in using path identifiers as inter domain routing objects. However, the static path identifiers will easily makes the attackers to launch the distributed denial of service (DDoS) flooding attacks .To overcome this effect, for every transmission of packets the path identifiers is kept secret and will get updated dynamically. But there is a possibility that the attacking node will compromise the other nodes to take the overall control towards it. To prevent this issue, Dynamic random and secure path identifiers are used (DSPID). This paper analyses the network ingress filtering, IP trace back techniques to verify and guarantee that the incoming packets are really come from the legitimate networks. This work proposes the concept of providing the anonymous unique path identifiers to every nodes.

 

Keywords- Distributed Denial of Service attacks, Inter domain routing, Ingress Filtering, IP trace back.

1. H. Ballani, Y. Chawathe, S. Ratnasamy, T. Roscoe, S. Shenker, "Off by default!," In Proc. HotNets-IV, Nov. 2005, College Park,
MD, USA
2. A. Yaar, A. Perrig, and D. Song, "SIFF: a stateless internet flow filter to mitigate DDoS flooding attacks," In Proc. IEEE
Symposium on Security and Privacy, May 2004, Oakland, CA, USA.
3. H. Luo, Z. Chen, J. Cui, H. Zhang, M. Zukerman, C. Qiao, "CoLoR: an information-centric internet architecture for innovations,"
IEEE Network, vol. 28, no. 3, pp. 4 - 10, May 2014.
4. Luo, Hongbin, Zhe Chen, Jiawei Li, and Athanasios V. Vasilakos. "Preventing Distributed Denial-of-Service Flooding Attacks
With Dynamic Path Identifiers.
5. P.Arun Raj Kumar, S.Selvakumar " Distributed denial of service DDOS Threat in Collaborative Environment – A Survey on DDOS attack tools and traceback mechanisms" 2009 IEEE International Advance Computing Conference