Sunday, April 1, 2018

Using Docker for Containerization in High Performance Computing Applications


Virtualization technology plays a vital role in cloud computing. In particular, benefits of virtualization are widely employed in high performance computing (HPC) applications. Containers have a long and storied history in computing. Unlike hypervisor virtualization, where one or more independent machines run virtually on physical hardware via an intermediation layer, containers instead run user space on top of an operating system's kernel. As a result, container virtualization is often called operating system-level virtualization. Container technology allows multiple isolated user space instances to be run on a single host. In this paper we explain how to deploy high performance applications using docker. 


by Pradeep Murugan | Suraj Subramanian | V. Pandarinathan | Dr. D. Rajinigirinath"Using Docker for Containerization in High Performance Computing Applications"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd11591.pdf 

Direct URL: http://www.ijtsrd.com/engineering/computer-engineering/11591/using-docker-for-containerization-in-high-performance-computing-applications/pradeep-murugan

research publication, ugc approved journals for engineering, special issue publication

Blockchain beyond cryptocurrencies


A new model for building massively scalable and profitable applications is emerging. Bitcoin paved the way with its cryptographically stored ledger, scarce-asset model, and peer-to-peer technology. These features provide a starting point for building a new type of software called decentralized applications, or dapps. They are more flexible, transparent, distributed, resilient, and have a better incentivized structure than current software models. Centralized systems are currently the most widespread model for software applications. 


Centralized systems directly control the operation of the individual units and flow of information from a single center. Blockchain, a massively replicated database of transactions that's able to avoid Sybil attacks. For the first time, the blockchain lets us achieve decentralized consensus without the use of a centralized server. 

By Pradeep Murugan | Suraj Subramanian | Mr. V Pandarinathan | Dr. D. Rajinigirinath"Blockchain beyond cryptocurrencies"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd11589.pdf 

Direct URL: http://www.ijtsrd.com/engineering/computer-engineering/11589/blockchain-beyond-cryptocurrencies/pradeep-murugan

multidisciplinary journal, submit paper online, indexed journal

Expert Finding System


Current education system turning to the digital learning technique. E-learning is one of the most widely used methods for the education. E-learning gives experience as individual learning at any time as well as anywhere, so user get more interest, flexibility at learning. In this paper we have introduced e-training platform which has divided into two important part; first part is learning data has to be secured, for securing data we has used file encryption and decryption technique, and second part comes use of data mining techniques and concepts for huge data storage. 


By Nalawade Priyanka | Mane Gayatri | Jankar Priyanka | Kurde Ashwini | Prof. Balwante Shrikrishna Shivrai"Expert Finding System"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd11594.pdf 

Direct URL: http://www.ijtsrd.com/engineering/computer-engineering/11594/expert-finding-system/nalawade-priyanka

review papers, ugc approved journals for engineering, special issue publication

ATM Security System by using Hybrid Authentication


In current ATM process there is lot of ATM fraud Malicious money transaction and theft are happens by means of lack of privacy protection in current scheme. We address the problem of shoulder-surfing attacks on authentication schemes by proposing Illusion PIN (IPIN), a PIN-based authentication method that operates on touch screen devices. IPIN uses the technique of hybrid images to blend two keypads with different digit orderings in such a way, that the user who is close to the device is seeing one keypad to enter her PIN, while the attacker who is looking at the device from a bigger distance is seeing only the other keypad. 


The user's keypad is shuffled in every authentication attempt since the attacker may memorize the spatial arrangement of the pressed digits. To reason about the security of Illusion PIN, we developed an algorithm which is based on human visual perception and estimates the minimum distance from which an observer is unable to interpret the keypad of the user. In addition, we estimated the minimum distance from which a camera is unable to capture the visual information from the keypad of the user. 

Based on our analysis, it seems practically almost impossible for a surveillance camera to capture the PIN of a Smartphone user when IPIN is in use. In current scheme we also implement the OTP authentication mechanism. This will enhance more security which is attached with virtual Keyboard of ATM machine. So we proposed the concept of ATM protection including shuffling keyboard with OTP authentication. 

By V. Saravanan | M. Sathishkumar | M. Babu"ATM Security System by using Hybrid Authentication"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd11535.pdf 

Direct URL: http://www.ijtsrd.com/engineering/computer-engineering/11535/atm-security-system-by-using-hybrid-authentication/v-saravanan

research papers, paper publication for engineering, conference issue publication

Fishermen Nautical Border Alert System


The assessment is done on a variety of methods of tracking and alerting the fishermen in maritime using GPS. Navigation in marine is the most important factor used by the fishermen. The tracking system uses the electronic scheme installed on the boat and with software design which allows the client or holder to track the boat location based on latitude and longitude data. Today global positioning system (GPS) technology is becoming the safe tool for navigation purpose. The position and location in sequence can be viewed in electronic map via GPS receiver. 


By Ms. M. Florence Dayana | M. Vengadeswari | G. Keerthana | M. Vinothini"Fishermen Nautical Border Alert System"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd11653.pdf 

Direct URL: http://www.ijtsrd.com/engineering/computer-engineering/11653/fishermen-nautical-border-alert-system/ms-m-florence-dayana

best journal, manuscript submission, call for paper engineering

Key-Aggregate Based Vulnerable Data Access Control in Cloud Computing


In the developing technologies in the computers the cloud computing is one the way to provide services through the internet to the users in the efficient manner. Cloud based services not only provide users with convenience, but also bring many security issues. The user can store his data in the cloud service. Although cloud computing brings great convenience to enterprises and users, the cloud computing security has always been a major hazard. For users, it is necessary to take full advantage of cloud storage service, and also to ensure data privacy. 


The system proposed a fine-grained two-factor authentication (2FA) access control system, 2FA access control system, an attribute-based access control mechanism is implemented with the necessity of both user secret key and a BBS+ Signatures. The mechanism implemented using CP-IBE(cipher text identity based encryption) and digit signature authority, compare to existing method which provide the paranoid security and achieving the secure data access in cloud computing. 

By Sowmiya. S | Dr. T. Priyaradhikadevi"Key-Aggregate Based Vulnerable Data Access Control in Cloud Computing"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd11633.pdf 

Direct URL: http://www.ijtsrd.com/engineering/computer-engineering/11633/key-aggregate-based-vulnerable-data-access-control-in-cloud-computing/sowmiya-s

manuscript publication, submit paper online, indexed journal

Heat Transfer Augmentation in Heat Exchanger using Nanofluid: A Review


Due to the limitation of fossil fuels, shortage of energy, optimization of energy consumption in various industrial processes becomes very important and challenging issue all over the world. A reduction in energy consumption is possible by enhancing the performance of heat exchanger and it is one of the most important devices related to energy and heat transfer. Nano fluid is a new engineering fluid which could improve the performance of heat exchanger. Nano fluids have greater potential for heat transfer enhancement and highly suited to application in practical heat transfer processes. Heat exchanger using Nano fluid is a device in which the heat transfer takes place by using Nano fluid. 


Nano fluid is made by the suspending Nano particles in the fluid like water, ethylene glycol and oil, hydrocarbons, fluorocarbons etc. The main focus of this paper is to determine the possibility and future scope of Nano fluids in the terms of heat transfer augmentation. This review covers the enhancement of heat transfer by using Nano fluids and potential applications of Nano fluids. This paper presents an updated review of the heat transfer applications of Nano fluids to develop directions for future work because the literature in this area is spread over a wide range of disciplines, including heat transfer, material science, physics, chemical engineering and synthetic chemistry. 

By Shriram Pathak | Amit Kaimkuriya"Heat Transfer Augmentation in Heat Exchanger using Nanofluid: A Review"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd11421.pdf 

Direct URL: http://www.ijtsrd.com/engineering/mechanical-engineering/11421/heat-transfer-augmentation-in-heat-exchanger--using-nanofluid-a-review/shriram-pathak

high impact factor, ugc approved journals for engineering, special issue publication