Tuesday, February 27, 2018

Design of Dual Pulsating Latch Flip-Flop (DPLFF) using Novel Pulse Generator


In this paper various flip-flop structures have been studied. In all designs to reduce power consumption, the Pulse Generator circuitry should be in build along with the flip-flop itself. If a pulse generator is included along with DPSCRFF structure, power consumption can be reduced. In this work a new design of flip-flop, Double Pulse Latch Flip-flop (DPLFF) is proposed. DPLFF eliminates unnecessary glitches, which consume more power. 


DPLFF consume less power for same delay as compared with other existing techniques, which is performing one of the fastest known flip-flops. In serial operation as shift register the proposed DPLFF can perform better at the higher frequency. The stacking of transistor in the latch stage cause reduction in subthreshold leakage current & thus the static power consumption is also less for DPLFF. This is better suited for low power circuits at deep submicron technology where leakages are more dominant. 

By Surbhi Vishwakarma | Dr. Vinod Kapse"Design of Dual Pulsating Latch Flip-Flop (DPLFF) using Novel Pulse Generator"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-2 , February 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd12743.pdf 

Direct URL: http://www.ijtsrd.com/engineering/electronics-and-communication-engineering/12743/design-of-dual-pulsating-latch-flip-flop-dplff-using-novel-pulse-generator/surbhi-vishwakarma

peer reviewed journals, manuscript submission, call for paper engineering

Cooling by using Earthen Pot


Demand for electric power is more in summer is concern for most utilities. However evaporating cooling required more amount of water which is main source as an evaporator, and this only work efficiently when humidity is low. Evaporating cooling could be a quite common kind of cooling for the thermal comfort since it is relative low cost and needed less energy than several different styles of cooling. In our project, we are using earthen pots and soft cotton curtains are used for cooled air. Meeting demand for electrical power throughout peak periods in the summer may be a major concern for many utilities within the fast-moving world. 


From the demand points of read on the grid and value to the consumer, need to quite know install, energy-efficient evaporative coolers instead of standard air conditioners. 

By Rajat. R. Wade | Anurag. D. Choudhari"Cooling by using Earthen Pot"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-2 , February 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd10796.pdf 

Direct URL: http://www.ijtsrd.com/engineering/mechanical-engineering/10796/cooling-by-using-earthen-pot/rajat-r-wade

multidisciplinary journal, submit paper online, indexed journal

An Efficient Securing Code Based Cloud Storage using RC5 Encryption Algorithm against Pollution Attacks


The widespread diffusion of distributed and cloud storage solutions has changed dramatically the way users, system designers, and service providers manage their data. Outsourcing data on remote storage provides indeed many advantages in terms of both capital and operational costs. To provide solutions for the above pollution attack and user data breach, we propose an early pollution detection algorithm able to spot the presence of an attack while fetching the data from cloud storage during the normal disk reading operations. 

Thus each fragment is check for malicious content and passed over to the server for processing. 

The alarm triggers a procedure that locates the polluting nodes in early stage of processing to avoid the intrusion. Also to detect the polluted content hashing methods are used. In this way, after network peers receive the transmitted data, hash value is calculated by hash functions and then the result is compared with the received hash value from the content distribution network (CDN) servers to determine whether the transmitted data is polluted or not. 

I proposed system to addresses in preserving user data confidentiality and integrity after outsourcing. For this concern, we present our design for a new cloud storage encryption scheme that enables cloud storage providers to create convincing fake user secrets to protect user privacy. 

By Vani. S | Priya Radhika Devi. T"An Efficient Securing Code Based Cloud Storage using RC5 Encryption Algorithm against Pollution Attacks"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-2 , February 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd10744.pdf 

Direct URL: http://www.ijtsrd.com/engineering/computer-engineering/10744/an-efficient-securing-code-based-cloud-storage-using-rc5-encryption-algorithm-against-pollution-attacks/vani-s

peer reviewed journals, manuscript submission, call for paper engineering

An Efficient File Hierarchy based E-System with Clinical Document Architecture in Cloud Computing


E- Healthcare system monitors the health condition and gives medical treatment through our web application. They collect the real time personal information (PHI) and patient's physical problem and transmitted it to the healthcare provider. To securely share the PHR information in cloud computing, a patient divides his PHR information M into two parts: personal information m1 that may contain the patient's name, social security number, telephone number, home address, etc. The medical record m2 which does not contain sensitive personal information, such as medical test results, treatment protocols, and operation notes. 


Then the patient adopts CP-ABE scheme to encrypt the information m1 and m2 by different access policies based on the actual need. Also we propose The Clinical Document Architecture (CDA). Our CDA document integration system integrates multiple CDA documents per patient into a single CDA document and physicians and patients can browse the clinical data in chronological order and historical wise. 

By Archana. P | Prasanna. S"An Efficient File Hierarchy based E-System with Clinical Document Architecture in Cloud Computing"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-2 , February 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd10785.pdf 

Direct URL: http://www.ijtsrd.com/engineering/computer-engineering/10785/an-efficient-file-hierarchy-based-e-system-with-clinical-document-architecture-in-cloud-computing/archana-p

international peer reviewed journal, paper publication for engineering, conference issue publication

Practical data hiding technique in Covert timing channels


Out of order arrival of packets is an inevitable phenomenon on the Internet. Application performance can degrade to a great extent due to out-of-order arrival of packets Packet reordering is a common phenomenon on the Internet. Moreover, it is handled transparently from the user and application-level processes. In this paper, we propose a novel covert channel technique using the packet reordering phenomenon as a host for carrying secret communications. This makes it an attractive medium to exploit for sending hidden signals to receivers by dynamically manipulating packet order in a network flow. 


In our approach, specific permutations of successive packets are selected to enhance the reliability of the channel, while the frequency distribution of their usage is tuned to increase stealthiness by imitating real Internet traffic. It is very expensive for the adversary to discover the covert channel due to the tremendous overhead to buffer and sort the packets among huge amount of background traffic. A simple tool is implemented to demonstrate this new channel. 

We studied extensively the robustness and capabilities of our proposed channel using both simulation and experimentation over large varieties of traffic characteristics. The reliability and capacity of this technique have shown promising results. We also investigated a practical mechanism for distorting and potentially preventing similar novel channels. 

By M. Gokul Narayanan | PS. Lokesh | N. Kanimozhi"Practical data hiding technique in Covert timing channels"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-2 , February 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd10777.pdf 

Direct URL: http://www.ijtsrd.com/engineering/computer-engineering/10777/practical-data-hiding-technique-in-covert-timing-channels/m-gokul-narayanan

high impact factor, ugc approved journals for engineering, special issue publication

An Experimental Analysis of Turning Operation in SAE E52100 Alloy


Turning is a one type of machining process typically a non-rotary tool bit by moving linearly while the work piece rotates. It is used to create a cylindrical part by cutting unwanted materials. Today computer numerical control can be used, better known as CNC. Axles and shafts can be manufactured by turning process.by the different machining parameters such as feed, depth of cut and speed production rate and the quality of the product can also increase. 


Optical parameters play an important role in increase the productivity, reducing lead time with desired product quality at minimum cost. The experiments were conducted with Taguchi's L 9 mixed orthogonal array. EN 31 alloy steel can be machined by the Non-coated insert in computer numerical control lathe(CNC). By using the optical parameters individually for minimum surface roughness and maximum material removal rate(MRR) were found using taguchi analysis. 

Rakesh.V | Ramesh. P | Sundar. C | Rajamurthy. G"An Experimental Analysis of Turning Operation in SAE E52100 Alloy"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-2 , February 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd9631.pdf 

Direct URL: http://www.ijtsrd.com/engineering/mineral-and-metallurgical-engineering/9631/an-experimental-analysis-of-turning-operation-in-sae-e52100-alloy/rakeshv

high impact factor, ugc approved journals for engineering, special issue publication

Effect of Confinement on Reinforce Concrete Short Rectangular Column


In this paper presents a comparative investigation based on various types of effective confining material, like (stapled stirrups, WWM, welded spot stirrups, ferrocement, FRP).The transverse reinforcement plays an important role in the ductility of the column. The preparedness for the formation of the plastic hinges in column, it requires confinement of concrete by transverse reinforcement. 


To study the effectiveness of the Confinement reinforcement, its quantity, working out the optimum combination of the confinement reinforcement and also the load carrying capacity of the rectangular column. The study of rectangular column is significant as it is used mostly in the practical building construction. This project is high lighting the study of 'œstudy the different types of effective confining material on RC rectangular column' by improving the confining quality. It also adds the different properties of reinforced concrete column. 

By Khatri A. P"Effect of Confinement on Reinforce Concrete Short Rectangular Column"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-2 , February 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd9649.pdf 

Direct URL: http://www.ijtsrd.com/engineering/civil-engineering/9649/effect-of-confinement-on-reinforce-concrete-short-rectangular-column/khatri-a-p

manuscript publication, submit paper online, indexed journal