Monday, June 18, 2018

Vehicles Awake Routing Protocol with Analysis Determine Knowledge Perception for VANET

The Vehicular Ad-hoc Networks VANET ascents as an surface technology for smart transport as observed in the latter date decennary.The routing is the important element for keeping effectual communication between smart vehicles, which need to be entreated snappily. A traffic-aware routing protocol TARCO that considers integrated real-time traffic conditions for integrating delivery paths over a vehicular environs is presented. Routing in VANETs plays 0 crucial role in production of networks.VANET protocols are classified as topology based and position based concordat.

Device-to-device D2D communication is admired as a propitious technique as granting the reliable integration between vehicles. The D2D-based vehicle-to-vehicle communication links coincide by recycling the similar sequence property, solution in a more intricate Combat scenario. Thus the access mode switch and resource allocation between cellular and VANETs become a challenging issue. 

Each road segment was then assigned a weight according to the overall view of the traffic conditions and updated systematically to reflect traffic variations. Finally, the road segments providing operative and dependable data paths were used to frame a routing path with latched connectivity and a short distribution lag to the destination. Simulation results showed that the use of TARCO leads to high network performance in terms of the packet delivery ratio, end-to-end delay and communication upward.

By Mr. P. Senthil | Mrs. A. Jayanthi | R. Shobana "Vehicles Awake Routing Protocol with Analysis Determine Knowledge Perception for VANET"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Special Issue | Active Galaxy , June 2018,


Direct Link: http://www.ijtsrd.com/papers/ijtsrd14569.pdf

URl: http://www.ijtsrd.com/engineering/computer-engineering/14569/vehicles-awake-routing-protocol-with-analysis-determine-knowledge-perception-for-vanet/mr-p-senthil

review papers, ugc approved journals for engineering, special issue publication

Online Voting Using Biometric

The problem of voting system is still critical in terms of safety and security. This paper deals with the web-based voting system using fingerprint and Aadhar card in order to provide a high performance with high security to the voting system. The Online voting using system allows the voters login to scan their fingerprint, which is then matched with an already saved image within a database that is retrieved from Aadhar card database to check the voter is eligible or not for casting the vote the verification done by the hall supervisor. The users must login by Aadhar card details based, then the voter login success full, the page will open and shows the candidate details then click on his her favorable candidates to cast their votes. This will increase the voting percentage in India and reduces the cost of contributing the elections. By using biometric fingerprint it provides high level security and reliability of every one.

By Dr. S. Hemalatha | Ms. M. Gowthami | V. Karthi "Online Voting Using Biometric"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Special Issue | Active Galaxy , June 2018, 

Direct Link: http://www.ijtsrd.com/papers/ijtsrd14568.pdf

URl: http://www.ijtsrd.com/engineering/computer-engineering/14568/online-voting-using-biometric/dr-s-hemalatha

research papers, paper publication for engineering, conference issue publication

Integrity Assurance with Minimum Location Disclosure on Mobile Devices by Using Pmac

Since the boom of smart phones and location-based services, spatio-temporal data i.e., user locations with timestamps have become increasingly essential in many real-life applications. To ensure these data are faithfully extracted from the underlying location tracking hardware and not altered by any malicious party or the user himself herself, integrity assurance schemes such as digital signatures or message authentication codes MAC must be adopted. However, these conventional schemes disclose to the verifier the complete plaintext location and thus jeopardize users' privacy. Propose an integrity assurance scheme with minimum location disclosure. 
 
That is, the granule of the disclosed location is just small enough to prove the user is has been to a certain place, and the verifier cannot learn anything beyond it. To this end, a new MAC scheme called Prefix-verifiable MAC PMAC , based on which we design indexes and protocols to authenticate both spatial and spatio-temporal predicates. Security analysis and experimental results show our scheme is both secure and efficient for practical use.
 
By Mr. P. Senthil | Mrs. S. DurgaDevi | Bhargavi M. B. "Integrity Assurance with Minimum Location Disclosure on Mobile Devices by Using Pmac"
 
Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Special Issue | Active Galaxy , June 2018

Direct Link: http://www.ijtsrd.com/papers/ijtsrd14567.pdf

URl: http://www.ijtsrd.com/engineering/computer-engineering/14567/integrity-assurance-with-minimum-location-disclosure-on-mobile-devices-by-using-pmac/mr-p-senthil

best journal, manuscript submission, call for paper engineering

Cost Based On Product Quality Prediction Using Datamining

In real time problem is the finding the top-k profitable product in the existing market. To find in the best product in the market such the new product could not dominate by other product in the market. Authentication and skyline analysis are best decision-making applications. In the existing focus the customers to analysis the set of product from a pool of given products. Set of product in the existing market want to identify possible product such that novel product are not dominated by other in market. There are two problem occasion of the finding top-k preferable products are studied. In first problem instance to set the cost of these products maximized number of total in income.

By S. Veeramalai | Mr. T. Praveen | S. Pradeepa Natarajan "Cost Based On Product Quality Prediction Using Datamining"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Special Issue | Active Galaxy , June 2018, 

Direct Link: http://www.ijtsrd.com/papers/ijtsrd14564.pdf

URl: http://www.ijtsrd.com/engineering/computer-engineering/14564/cost-based-on-product-quality-prediction-using-datamining/s-veeramalai

multidisciplinary journal, submit paper online, indexed journal

Controlling Traffic Signals Through GPS for Ambulance

In today's world, traffic jams during rush hours is one of the major interest. During surge hours, Emergency vehicles like Ambulances get caught in jams. Due to this, these emergency vehicles are not able to reach their target in time, resulting into a loss of human lives. We have Developed a system which is used to provide clearance to any emergency Ambulance vehicle by Turning all the red lights to green on the path of the emergency vehicle, hence providing a Complete green bay to the desired vehicle. A green bay is the synchronization of the green phase Of traffic signals. 

With a "green bay" setup, a vehicle transient through a green signal will continue to receive green signals as it travels down the road. Around the world, green bay is used to great effect. In the existing system we don't have automatic control traffic signal, due to this Emergency ambulance not able to reach the hospital within time. For this system we have implemented effective smart ambulance system by using GPS Technology. This project is Targeted to design and develop a real time smart ambulance system.

By Mrs. S. DurgaDevi | Mr. P. Senthil | T. Keerthana "Controlling Traffic Signals Through GPS for Ambulance"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Special Issue | Active Galaxy , June 2018, 

Direct Link: http://www.ijtsrd.com/papers/ijtsrd14563.pdf

URl: http://www.ijtsrd.com/engineering/computer-engineering/14563/controlling-traffic-signals-through-gps-for-ambulance/mrs-s-durgadevi

research publication, ugc approved journals for engineering, special issue publication

An Efficient Method For Text And File Encryption For Secure Data Transmission Through Audio Steganography

Steganography is the skill and learning of script unseen messages in such a mode that apart from the transmitter and envisioned receiver even recognizes there is a unseen message. Steganography works by exchanging bits of unusable or idle data in systematic Audio file with bits of dissimilar, imperceptible information. This unknown material can be plain text or cipher text. In a computer-based audio Steganography structure, underground messages are surrounded in numeral sound. The furtive memo is surrounded by marginally moving the twofold order of a sound file. 

Implanting surreptitious messages in numeral sound is usually a more hard process than inserting messages in other media, such as numeral images. These procedures sort from quite modest algorithms that pullout gen in the form of gesture noise to more dominant methods that feat erudite signal processing techniques to pelt material. Thus the main persistence of this project is to enlighten using Audio Steganography we can direct texts or even transcript files secretly
 
By Dr S Hemalatha | Androse | E Sharmili "An Efficient Method For Text And File Encryption For Secure Data Transmission Through Audio Steganography"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Special Issue | Active Galaxy , June 2018,

Direct Link: http://www.ijtsrd.com/papers/ijtsrd14562.pdf

URl: http://www.ijtsrd.com/engineering/computer-engineering/14562/an-efficient-method-for-text-and-file-encryption-for-secure-data-transmission-through-audio-steganography/dr-s-hemalatha

paper publication for student, paper publication for engineering, conference issue publication

A Survey On Online Corporate Job Recruiting Process Using Cloud Computing

This project Online Corporate Job Recruiting process is an online website in which jobseekers can register themselves in online and apply for job. The HR of the companies as well as the employees working in the companies can also register in this website. Online corporate job recruiting process provides online help to the users all over the world. This website also make it possible for recruiters and companies to post their staffing requirements and view profiles of interested candidates. Not only the companies, but also the employees those who are working in the corporate companies can also host the details about the recruitment process that takes place in their companies. 

This project is aimed at developing a web-based and central recruitment Process system for the HR Group for a company. After registering in this website the candidates will get a pop-up notification about the recruitments. The additional characteristics of this project is that if a seeking job candidate registered in this website and if their college name is similarly equal to the college name of the registered employees, then they will get a mail immediately by saying that your college mate is seeking job kindly help them. So by this the job seekers can easily get a job.

By Mrs. S. Shanmugapriya | Mr. Manikandan | S. Karpaga Meenakshi "A Survey On Online Corporate Job Recruiting Process Using Cloud Computing"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Special Issue | Active Galaxy , June 2018,

Direct Link: http://www.ijtsrd.com/papers/ijtsrd14561.pdf

URl: http://www.ijtsrd.com/engineering/computer-engineering/14561/a-survey-on-online-corporate-job-recruiting-process-using-cloud-computing/mrs-s-shanmugapriya

paper publication for student, paper publication for engineering, conference issue publication