Special Issue No. – 2, August, 2019

National Conference on Advancement in Engineering, Science & Technology

Bharath Institute of Higher Education and Research, Chennai, Tamil Nadu, India

Blockchain and its Applications in Various Fields – A Surve

Authors:

Allin Geo Varghese,S.Amudha,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00001

Abstract:

Automatic international has delivered efficiencies, new ingenious items, and close customer connections all round with the aid of the a success usage of transportable, IoT (net of factors), on-line life, exam and cloud innovation to create models for higher selections. Blockchain is as of late presented and altering the computerized global conveying some other point of view to security, flexibility and effectiveness of frameworks. at the same time as at the start promoted via Bitcoin, Blockchain is considerably greater than an established order for virtual foreign money. It gives a secure technique to trade any sort of right, management, or change. Mechanical development regularly is based upon confided in organizations; but expanding manage, cybercrime and extortion are repressing extension. To cope with these difficulties, Blockchain will empower more mild-footed esteem chains, quicker object improvements, nearer consumer connections, and swifter incorporation with the IoT and cloud innovation. Facilitate Blockchain furnishes a decrease price of trade with a believed contract checked without mediation from outsider.

Keywords:

Blockchain,Bitcoin,

Refference:

I. Anuradha.C, Khanna.V, “Improving network performance and security in WSN using decentralized hypothesis testing “Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016 .
II. Anuradha.C, Khanna.V, “A novel gsm based control for e-devices“Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
III. Kavitha, R., Nedunchelian, R., “Domain-specific Search engine optimization using healthcare ontology and a neural network backpropagation approach”, 2017, Research Journal of Biotechnology, Special Issue 2:157-166
IV. Kavitha, G., Kavitha, R., “An analysis to improve throughput of high-power hubs in mobile ad hoc network” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 361-363
V. Kavitha, G., Kavitha, R., “Dipping interference to supplement throughput in MANET” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 357-360
VI. Pothumani, S., Sriram, M., Sridhar, J., Arul Selvan, G., “Secure mobile agents communication on intranet, Journal of Chemical and Pharmaceutical Sciences”, volume 9, Issue 3, Pg No S32-S35, 2016
VII. Pothumani, S., Sriram, M., Sridhar , “Various schemes for database encryption-a survey”, Journal of Chemical and Pharmaceutical Sciences,volume 9, Issue 3, Pg NoS103-S106, 2016

VIII. Priya, N.,Sridhar,J.,Sriram, M.“Vehicularcloudcomputing security issues and solutions” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
IX. Priya, N., Sridhar, J., Sriram, M. “Mobile large data storage security in cloud computing environment-a new approach” JCPS Volume9 Issue 2. April – June 2016
X. P. Zahradnik, “Equiripple Approximation of Low-pass FIR Filters Equiripple Approximation of Low-pass FIR Filters”,IEEE Transactions on Circuits and Systems II: Express Briefs, Issue: 99,pp. 1-5, 2017
XI. P. Zhao, J. McNeely, P. Golconda, M. A. Bayoumi, R. A. Barcenas, W.Kuang, ” Low-Power Clock Branch Sharing Double-Edge Triggered Flip- Flop”, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Vol.: 15, Issue: 3,pp: 338 – 345, 2007
XII. R. Kubasek, Z. Smekal, E. Gescheidtova, K. Bartusek, “Design of Twochannel Half-band Bank of Digital Filters using Optimization Methods”, International Conference on Networking, International Conference on
Systems and International Conference on Mobile Communications and Learning Technologies, page: 151, 2006
XIII. S. Archana, G. Durga, “Design of low power and high speed ripple carry adder”, International Conference on Communication and Signal pocessing, pp: 939 – 943, 2014
XIV. S. K. Mitra and J. F. Kaiser, Handbook for Digital Signal Processing. New York, NY, USA: Wiley, 1993.
XV. S. Samadi, A. Nishihara, H. Iwakura, “Universal maximally flat low pass FIR systems”, IEEE Transactions on Signal Processing Vol: 48, Issue: 7,pp: 1956 – 1964,2000
XVI. Wen Bin Ye, Xin Lou, Ya Jun Yu, “Design of Low-Power Multiplierless Linear-Phase FIR Filters” , IEEE Access, Volume: 5,pp: 23466 – 23472,2017
XVII. X. Zhang, K. Intosume, and T. Yoshikawa, “Design of low delay FIR halfband filters with arbitrary flatness and its application to filter banks,” Electron. Comm. Jpn 3, vol. 8, no. 10, pp. 1–9, 2000

View | Download

Big Data confidentiality in Healthcare

Authors:

S. Amudha,K. AnitaDavamani,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00002

Abstract:

We exist these days in an overall release, anywhere protection is not really kept up, with the huge information getting included, it's just deteriorating, since information is from this time forward all over and about everybody, we can't generally educate who recognizes what concerning who, where the information is really depending, and what utilizes are through not in of it. Security however a vital angle that individuals dependably require in numerous areas, and it's not less vital in the human services diligence, where data just gets much progressively close to home and touchy that any protection rupture turns into an issue of last chance. In this paper, we have focused on the benefits of giant data within the healthful services phase, even as a little of the principle challenges frequently intimate with. We’ve then centered on the Moroccan setting, incontestable the problems it's and its specificities, thus on propose proposals to urge the leaders to require the approach of massive Data. Lastly, we've enlightened the safety problems in healthful services and also the gift ways won’t to guarantee the patient's protection.

Keywords:

Moroccan setting,massive Data,

Refference:

I. Anuradha.C, Khanna.V, “Improving network performance and security in WSN using decentralized hypothesis testing “Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016 .
II. Anuradha.C, Khanna.V, “A novel gsm based control for e-devices“Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April-June 2016
III. Kavitha, R., Nedunchelian, R., “Domain-specific Search engine optimization using healthcare ontology and a neural network backpropagation approach”, 2017, Research Journal of Biotechnology,
Special Issue 2:157-166
IV. Kavitha, G., Kavitha, R., “An analysis to improve throughput of highpower hubs in mobile ad hoc network” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 361-363
V. Kavitha, G., Kavitha, R., “Dipping interference to supplement throughput in MANET” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 357-360
VI. Pothumani, S., Sriram, M., Sridhar, J., Arul Selvan, G., “Secure mobile agents communication on intranet, Journal of Chemical and Pharmaceutical Sciences”, volume 9, Issue 3, Pg No S32-S35, 2016
VII. Pothumani, S., Sriram, M., Sridhar , “Various schemes for database encryption-a survey”, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg NoS103-S106, 2016
VIII. Priya, N.,Sridhar,J.,Sriram, M.“Vehicularcloudcomputing security issues and solutions” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
IX. Priya, N., Sridhar, J., Sriram, M. “Mobile large data storage security in cloud computing environment-a new approach” JCPS Volume9 Issue 2. April – June 2016
X. P. Zahradnik, “Equiripple Approximation of Low-pass FIR Filters Equiripple Approximation of Low-pass FIR Filters”,IEEE Transactions on Circuits and Systems II: Express Briefs, Issue: 99,pp. 1-5, 2017
XI. P. Zhao, J. McNeely, P. Golconda, M. A. Bayoumi, R. A. Barcenas, W. Kuang, ” Low-Power Clock Branch Sharing Double-Edge Triggered Flip- Flop”, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Vol.: 15, Issue: 3,pp: 338 – 345, 2007

View | Download

Online Examination Service Using Mobile Application in IOT

Authors:

S. Srigowthem,V.Khanna,B.Sundarraj,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00003

Abstract:

Day-to-day life has been changed a lot . Each and everything is held through internet and many institutions, companies works through internet. Most advantages or helpful by internet is, having exam through online (or) internet. So we can write or attend the exam anywhere anytime. To make this, we need cloud concept too. In cloud, we create own cloud and store the data for exam, so a person can access data from cloud through internet anytime. And mobile application is also being trend now, so many applications of this is possible to make it out.

Keywords:

Exam,Online,Student,Database,Web Service,Administrator,

Refference:

I. Anuradha.C, Khanna.V, “Improving network performance and security in WSN using decentralized hypothesis testing “Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June
2016 .
II. Anuradha.C, Khanna.V, “A novel gsm based control for edevices“ Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
III. Kavitha, R., Nedunchelian, R., “Domain-specific Search engine optimization using healthcare ontology and a neural network backpropagation approach”, 2017, Research Journal of Biotechnology,
Special Issue 2:157-166
IV. Kavitha, G., Kavitha, R., “An analysis to improve throughput of highpower hubs in mobile ad hoc network” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 361-363
V. Kavitha, G., Kavitha, R., “Dipping interference to supplement throughput in MANET” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 357-360
VI. Pothumani, S., Sriram, M., Sridhar, J., Arul Selvan, G., “Secure mobile agents communication on intranet, Journal of Chemical and Pharmaceutical Sciences”, volume 9, Issue 3, Pg No S32-S35, 2016
VII. Pothumani, S., Sriram, M., Sridhar , “Various schemes for database encryption-a survey”, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg NoS103-S106, 2016
VIII. Priya, N.,Sridhar,J.,Sriram, M.“Vehicularcloudcomputing security issues and solutions” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016

View | Download

Collaborative Approach of Secrecy Regulation and Obstruction of Photo Theft on Social Platform

Authors:

C. Anuradha,S .Pothumani,R. Vishwaa,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00004

Abstract:

Nowadays, People are well-connected to one another in Social Networks. Usage of Internet and involvement in Online Social Platforms are increasing day by day. People sharing their personal information in these platforms. Even, they started Uploading their Photo in the Internet and it became very common among the Internet users. Without understanding the risk, user involved in sharing their personal details. Some fraudulent users uploading another user’s photo without their knowledge. They are getting photos of others in many ways such as by taking photos using their mobile cameras, collecting images from Social networks, stealing images from the theft mobile. They are posting the photos in the Social media applications which are stored enduringly in the database. This results in the misuse of photo and involved in many criminal activities. To overcome this security problem, a competent face recognition system is needed which identify the user in the photo. To handle this, a set of users, friends list and their private photographs. This system accomplished as an evidence of approach in social network on Facebook application.

Keywords:

Photo Theft,Internet Platform,Collaborative approach,Securing Image,

Refference:

I. Anuradha.C, Khanna.V, “Improving network performance and security in WSN using decentralized hypothesis testing “Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June, 2016 .
II. Anuradha.C, Khanna.V, “A novel gsm based control for e-devices “Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
III. Kavitha, R., Nedunchelian, R., “Domain-specific Search engine optimization using healthcare ontology and a neural network backpropagation approach”, 2017, Research Journal of Biotechnology, Special Issue 2:157-166
IV. Kavitha, G., Kavitha, R., “An analysis to improve throughput of high power hubs in mobile ad hoc network” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 361-363
V. Kavitha, G., Kavitha, R., “Dipping interference to supplement throughput in MANET”, 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 357-360
VI. Pothumani, S., Sriram, M., Sridhar, J., Arul Selvan, G., “Secure mobile agents communication on intranet, Journal of Chemical and Pharmaceutical Sciences”, volume 9, Issue 3, Pg No S32-S35, 2016
VII. Pothumani, S., Sriram, M., Sridhar , “Various schemes for database encryption-a survey”, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg NoS103-S106, 2016
VIII. Priya, N.,Sridhar, J.Sriram, M. “Vehicular cloud computing security issues and solutions” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
IX. Priya, N., Sridhar, J., Sriram, M. “Mobile large data storage security in cloud computing environment-a new approach” JCPS Volume9 Issue 2. April – June 2016

View | Download

An Analysis of Computation Offloading Mechanisms for Computationally Intensive Mobile Applications

Authors:

C. Anuradha,M. Ponnavaiko,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00005

Abstract:

Smart phones are generally utilized in our everyday lives. We utilize computationally escalated versatile applications, for example, face location, enlarged reality, video preparing, video gaming and discourse acknowledgment. These applications are perplexing as well as they request high figuring assets. These gadgets show a few constraints, for example, restricted calculation control, little memory estimate, erratic system availability, constrained battery lifetime, and so forth. Every one of these constraints can be survived if distributed computing can be coordinated with cell phones. Versatile distributed computing is the worldview which can be utilized to give boundless access of figuring assets to cell phones. Computational offloading is a ground-breaking system utilized in versatile distributed computing for improving reaction time and battery productivity of the cell phones which are considered as two basic factors in the ease of use of portable applications. By offloading computationally concentrated assignments to committed processing framework, gadgets can diminish load alone assets while profiting by assets given by the devoted foundation. This paper gives a diagram of different foundation, structures and procedures for calculation offloading.

Keywords:

Mobile cloud computing,computation offloading,energy consumption,execution time,bandwidth,network connectivity,

Refference:

I. A.Sangeetha,C.Nalini,”Semantic Ranking based on keywords extractions in the web”, International Journal of Engineering & Technology, 7 (2.6) (2018) 290-292
II. S.V.Gayathiri Devi, C.Nalini, N.Kumar, ”An efficient software verification using multi-layered software verification tool “International Journal of Engineering & Technology, 7(2.21)2018 454-457
III. C.Nalini, ShwtambariKharabe, ”A Comparative Study On Different
Techniques Used For Finger – Vein Authentication”, International Journal Of Pure And Applied Mathematics, Volume 116 No. 8 2017, 327-333, Issn:1314-3395
IV. M.S. Vivekanandan and Dr. C. Rajabhushanam, “Enabling Privacy Protection and Content Assurance in Geo-Social Networks”, International Journal of Innovative Research in Management, Engineering and
Technology, Vol 3, Issue 4, pp. 49-55, April 2018.
V. Dr. C. Rajabhushanam, V. Karthik, and G. Vivek, “Elasticity in Cloud Computing”, International Journal of Innovative Research in Management, Engineering and Technology, Vol 3, Issue 4, pp. 104-111, April 2018.
VI. K. Rangaswamy and Dr. C. Rajabhushanamc, “CCN-Based Congestion Control Mechanism In Dynamic Networks”, International Journal of Innovative Research in Management, Engineering and Technology, Vol 3,
Issue 4, pp. 117-119, April 2018.
VII. Kavitha, R., Nedunchelian, R., “Domain-specific Search engine optimization using healthcare ontology and a neural network backpropagation approach”, 2017, Research Journal of Biotechnology, Special Issue 2:157-166
VIII. Kavitha, G., Kavitha, R., “An analysis to improve throughput of high-power hubs in mobile ad hoc network” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 361-363
IX. Kavitha, G., Kavitha, R., “Dipping interference to supplement throughput in MANET” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 357-360
X. Michael, G., Chandrasekar, A.,”Leader election based malicious detection and response system in MANET using mechanism design approach”, Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April -June 2016
XI. Michael, G., Chandrasekar, A.,”Modeling of detection of camouflaging worm using epidemic dynamic model and power spectral density”, Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
XII. Pothumani, S., Sriram, M., Sridhar, J., Arul Selvan, G., Secure mobile agents communication on intranet, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg No S32-S35, 2016
XIII. Pothumani, S., Sriram, M., Sridhar , Various schemes for database encryption-a survey, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg NoS103-S106, 2016
XIV. Pothumani, S., Sriram, M., Sridhar, A novel economic framework for cloud and grid computing, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg No S29-S31, 2016
XV. Priya, N., Sridhar, J., Sriram, M. “Ecommerce Transaction Security Challenges and Prevention Methods- New Approach” 2016 ,Journal ofChemical and Pharmaceutical Sciences, JCPS Volume 9 Issue 3.page no:S66-S68 .
XVI. Priya, N.,Sridhar,J.,Sriram, M.“Vehicular cloudcomputing security issues and solutions” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
XVII. Priya, N., Sridhar, J., Sriram, M. “Mobile large data storage security in cloud computing environment-a new approach” JCPS Volume 9 Issue 2. April – June 2016
XVIII. Anuradha.C, Khanna.V, “Improving network performance and security in WSN using decentralized hypothesis testing “Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016 .
XIX. Anuradha.C, Khanna.V, “A novel gsm based control for e-devices“Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
XX. Anuradha.C, Khanna.V, “Secured privacy preserving sharing and data integration in mobile web environments “Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
XXI. Sundarraj, B., Kaliyamurthie, K.P. Social network analysis for decisive the ultimate classification from the ensemble to boost accuracy rates 2016 8
XXII. International Journal of Pharmacy and TechnologySundarraj, B., Kaliyamurthie, K.P. A content-based spam filtering approach victimisation artificial neural networks 2016 8 3 International Journal of Pharmacy and Technology
XXIII. Sundarraj, B., Kaliyamurthie, K.P. Remote sensing imaging for satellite image segmentation 2016 8 3 International Journal of Pharmacy and Technology.

View | Download

Optical Character Recognition with Tesseract

Authors:

C. Geetha,K. Anitha Davamani,V.V. Krishna Teja,S. Hema Sekhar,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00006

Abstract:

Optical Character Recognition is the machine replication of human perusing. Electronic Conversion of examined pictures where picture can be type composed or printed content. It is executed utilizing Google's open source Optical Character Recognition programming called Tesseract. The OCR accepts picture as the information, gets content from that picture and afterward changes over it into whatever other language that the client needed. This framework can be helpful in different applications like banking, legitimate industry, explorers’ different ventures, and home and office robotization. It for the most part intended for individuals who are unfit to peruse any sort of content archives and to diminish the weight of information passage occupations

Keywords:

Tesseract,

Refference:

I. Anuradha.C, Khanna.V, “Improving network performance and security in WSN using decentralized hypothesis testing “Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016 .
II. Anuradha.C, Khanna.V, “A novel gsm based control for e-devices“ Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
III. Kavitha, R., Nedunchelian, R., “Domain-specific Search engine optimization using healthcare ontology and a neural network backpropagation approach”, 2017, Research Journal of Biotechnology, Special Issue 2:157-166
IV. Kavitha, G., Kavitha, R., “An analysis to improve throughput of high-power hubs in mobile ad hoc network” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 361-363
V. Kavitha, G., Kavitha, R., “Dipping interference to supplement throughput in MANET” , 2016, Journal of Chemical and
Pharmaceutical Sciences, Vol-9, Issue-2: 357-360
VI. Pothumani, S., Sriram, M., Sridhar, J., Arul Selvan, G., “Secure mobile agents communication on intranet, Journal of Chemical and Pharmaceutical Sciences”, volume 9, Issue 3, Pg No S32-S35, 2016
VII. Pothumani, S., Sriram, M., Sridhar , “Various schemes for database encryption-a survey”, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg NoS103-S106, 2016
VIII. Priya, N.,Sridhar,J.,Sriram, M.“Vehicularcloudcomputing security issues and solutions” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
IX. Priya, N., Sridhar, J., Sriram, M. “Mobile large data storage security in cloud computing environment-a new approach” JCPS Volume9 Issue 2. April – June 2016

View | Download

System Failure Detection and Diagnosis by Analyzing Syslog and SNS Data: Applying Big Data Analysis to Network Operations

Authors:

D. Vimala,I. MaryLinda,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00007

Abstract:

We present two major information examination strategies for diagnosing the reasons for system disappointments and for identifying system disappointments early. Syslogs contain log information created by the framework. We dissected syslogs what's more, prevailing with regards to distinguishing the reason for a system disappointment via consequently learning more than 100 million logs without requiring any past learning of log information. Investigation of the information of an interpersonal interaction benefit (in particular, Twitter) empowered us to recognize conceivable system disappointments by extricating system disappointment related tweets, which represent under 1% of all tweets, continuously and with high exactness.

Keywords:

Big data,syslog,network failure detection,

Refference:

I. Anuradha.C, Khanna.V, “Improving network performance and security in WSN using decentralized hypothesis testing “Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016 .
II. Anuradha.C, Khanna.V, “A novel gsm based control for e-devices “Journal of Chemical and Pharmaceutical Sciences(JCPS)
Volume 9 Issue 2, April – June 2016
III. Kavitha, R., Nedunchelian, R., “Domain-specific Search engine optimization using healthcare ontology and a neural network backpropagation approach”, 2017, Research Journal of Biotechnology, Special Issue 2:157-166
IV. Kavitha, G., Kavitha, R., “An analysis to improve throughput of high power hubs in mobile ad hoc network” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 361-363
IV. Kavitha, G., Kavitha, R., “Dipping interference to supplement throughput in MANET” , 2016, Journal of Chemical and
Pharmaceutical Sciences, Vol-9, Issue-2: 357-360
V. Pothumani, S., Sriram, M., Sridhar, J., Arul Selvan, G., “Secure mobile agents communication on intranet, Journal of Chemical and Pharmaceutical Sciences”, volume 9, Issue 3, Pg No S32-S35, 2016
VI. Pothumani, S., Sriram, M., Sridhar , “Various schemes for database encryption-a survey”, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg NoS103-S106, 2016
VII. Priya, N.,Sridhar,J.,Sriram, M.“Vehicularcloudcomputing security issues and solutions” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
VIII. Priya, N., Sridhar, J., Sriram, M. “Mobile large data storage security in cloud computing environment-a new approach” JCPS Volume9 Issue 2. April – June 2016

View | Download

Effective Security Mechanism for Cloud Storage using Biometric System

Authors:

R. Kavitha,S.Pothumani,R. Ramya,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00008

Abstract:

Biometric distinctive proof has clad to be more and more distinguished as these days. With the development of distributed computing, information proprietors are persuaded to re-appropriate the substantial size of biometric details and distinctive evidential duty to the cloud to lose the pricey capability and computational prices that anyway conveys potential dangers to clients' security. During this paper, we have a tendency to propose a productive and security safeguarding biometric ID redistributing arrange. Particularly, the biometric information is encoded and redistributed to the cloud server. To carry out biometric recognizable evidence, the information proprietor encodes the question information and handover to the cloud. The cloud discharge distinctive proof activities over the disorganized information and gave the final outcome to the database proprietor. A thoroughgoing security investigation shows the projected arrange is secure irrespective of whether or not aggressors will manufacture recognizable proof demands and intrigue with the cloud. Dissimilar and gone by customs, trial results demonstrate the projected plan fulfill a superior outcome in each coming up with and distinctive proof methodology.

Keywords:

Cloud Storage,Biometric System,Identity Management System,

Refference:

I. Anuradha.C, Khanna.V, “Improving network performance and security in WSN using decentralized hypothesis testing “Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016 .
II. Anuradha.C, Khanna.V, “A novel gsm based control for e-devices “ Journal of Chemical and Pharmaceutical Sciences(JCPS)
Volume 9 Issue 2, April – June 2016
III. Kavitha, R., Nedunchelian, R., “Domain-specific Search engine optimization using healthcare ontology and a neural network backpropagation approach”, 2017, Research Journal of Biotechnology, Special Issue 2:157-166
IV. Kavitha, G., Kavitha, R., “An analysis to improve throughput of high power hubs in mobile ad hoc network” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 361-363
IV. Kavitha, G., Kavitha, R., “Dipping interference to supplement throughput in MANET” , 2016, Journal of Chemical and
Pharmaceutical Sciences, Vol-9, Issue-2: 357-360
V. Pothumani, S., Sriram, M., Sridhar, J., Arul Selvan, G., “Secure mobile agents communication on intranet, Journal of Chemical and Pharmaceutical Sciences”, volume 9, Issue 3, Pg No S32-S35, 2016
VI. Pothumani, S., Sriram, M., Sridhar , “Various schemes for database encryption-a survey”, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg NoS103-S106, 2016
VII. Priya, N.,Sridhar,J.,Sriram, M. “Vehicular cloud computing security issues and solutions” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
VIII. Priya, N., Sridhar, J., Sriram, M. “Mobile large data storage security in cloud computing environment-a new approach” JCPS Volume9 Issue2. April – June 2016

 

View | Download

Cognitive Security in Software Define Network Layer

Authors:

R. Kavitha,N.Priya,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00009

Abstract:

The need for better security is always increasing in exponential demand with the elevation of the security concerns created by the vulnerable code and software being produced. A smart, self-healing and cognitive security network is the demand of the generation. With machine learning capabilities and advanced deep learning, we explore the possibility of architecting such a network build on a SDN network. Software Defined Networking replaces the conventional way of traditional networking with an application layer giving the programming capability to the networks thus increasing the flexibility of the network in terms of adaptability. Programming machine learning capability by introducing a learning element to the SDN network. We deploy security and classification algorithm to identify and classify traffic into potential attacks and intrusion. The results show improved accuracy that can detect all possible attacks over the neural network based on our pattern recognition algorithm for intrusion detection and recognition. The network can also self-optimize itself to defend itself real-time.

Keywords:

SDN-Software Defined Networks,WAN,

Refference:

I. Anuradha.C, Khanna.V, “Improving network performance and security in WSN using decentralized hypothesis testing “Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June, 2016 .
II. Anuradha.C, Khanna.V, “A novel gsm based control for e-devices “ Journal of Chemical and Pharmaceutical Sciences(JCPS)
Volume 9 Issue 2, April – June 2016
III. Kavitha, R., Nedunchelian, R., “Domain-specific Search engine optimization using healthcare ontology and a neural network backpropagation approach”, 2017, Research Journal of Biotechnology, Special Issue 2:157-166
IV. Kavitha, G., Kavitha, R., “An analysis to improve throughput of high power hubs in mobile ad hoc network” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 361-363
V. Kavitha, G., Kavitha, R., “Dipping interference to supplement throughput in MANET” , 2016, Journal of Chemical and
Pharmaceutical Sciences, Vol-9, Issue-2: 357-360
VI. Pothumani, S., Sriram, M., Sridhar, J., Arul Selvan, G., “Secure mobile agents communication on intranet, Journal of Chemical and Pharmaceutical Sciences”, volume 9, Issue 3, Pg No S32-S35, 2016
VII. Pothumani, S., Sriram, M., Sridhar , “Various schemes for database encryption-a survey”, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg. No. 103-S106, 2016
VIII. Priya, N. Sridhar, J. Sriram, M. “Vehicular cloud computing security issues and solutions” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
IX. Priya, N., Sridhar, J., Sriram, M. “Mobile large data storage security in cloud computing environment-a new approach” JCPS Volume9 Issue 2. April – June 2016

View | Download

Authenticated Online Fee Payment System

Authors:

R. Kavitha,S.R. Srividhya,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00010

Abstract:

The widespread use of online payments has been grown rapidly like for bill and fee payments through android application or internet. But some of the applications or websites are not authenticated. Some websites are accepting the payments even we entered invalid information in particular fields. This project covers the issues of authentication in online payments, and it will check whether the entered fields are valid or not by using predefined format. If the entered information in particular fields is valid then it will redirect to the payment gateway, if not it will shows a message as invalid information.

Keywords:

Payment Authentication,Data Validation,

Refference:

I. Anuradha.C, Khanna.V, “Improving network performance and security in WSN using decentralized hypothesis testing “Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016 .
II. Anuradha.C, Khanna.V, “A novel gsm based control for e-devices “Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
III. Kavitha, R., Nedunchelian, R., “Domain-specific Search engine optimization using healthcare ontology and a neural network back propagation approach”, 2017, Research Journal of Biotechnology, Special Issue 2:157-166
IV. Kavitha, G., Kavitha, R., “An analysis to improve throughput of high-power hubs in mobile ad hoc network” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 361-363
V. Kavitha, G., Kavitha, R., “Dipping interference to supplement throughput in MANET” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 357-360
VI. Pothumani, S., Sriram, M., Sridhar, J., Arul Selvan, G., “Secure mobile agents communication on intranet, Journal of Chemical and Pharmaceutical Sciences”, volume 9, Issue 3, Pg No S32-S35, 2016
VII. Pothumani, S., Sriram, M., Sridhar , “Various schemes for database encryption-a survey”, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg. No. 103-S106, 2016
VIII. Priya, N., Sridhar, J.,Sriram, M.“Vehicular cloud computing security issues and solutions” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9, Issue 2, April – June 2016
IX. Priya, N., Sridhar, J., Sriram, M. “Mobile large data storage security in cloud computing environment-a new approach” JCPS Volume9 Issue 2. April – June, 2016

View | Download