Abstract
In cloud computing system ,data is stimulated to a distantly placed cloud server. Cloud provisions the information authentically and go back to the proprietor whenever wanted. But there is no assurance that information store in the cloud is protected and not changed by cloud . In order to defeat the danger of honesty of data, the user must be able to use the help of Third party Auditor(TPA).TPA has understanding in inspection honesty of the information, that clouds users does not have, and that is difficult for the owner to check .The data in the cloud should be exact ,reliable ,available and elevated excellence.[1]This paper is to address this important problem related to the data integrity and design a cloud assisted privacy preserving mobile-health monitoring system to protect the privacy of the involved parties and their data. for that purpose we have used the algorithms:1)Tate pairing 2)Token generation 3)AES(Advanced Encryption Standards)-SHA1 and MD5.
Keywords— Data integrity,TPA,Tate pairing, Cryptography
Enhancing security features in cloud computing for healthcare using cipher an...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Enhancing security features in cloud computing for healthcare using cipher an...eSAT Journals
Abstract Health Care is the most important unindustrialized field. Cloud is an emerging trend in software industry. In medical field, there are large dataset comprising highly sensitive data about patient’s medical records. Based on these records, diagnosis for the patient will be given. Moving data to the cloud makes to explore a large information for diagnosis as expert documentation will also be stored as part of health record. Physicians from anywhere at any time can get access over these reports for better treatment. The Medicare industry vacillates to store these data to the cloud as the patients might feel insecure about their health records. This work introduces the idea of combining Cipher Cloud, Inter Cloud and ABE schemes, proposes an innovative method to enhance security features in the cloud by double encryption using algorithms and tools. By this, only authorized entities are proficient of accessing these records. Rather than storing data in single cloud, Inter Cloud (Multi-cloud) also adds advantage for our proposed work. Keywords: Virtualization, Cipher cloud, Trust, Encryption, Inter cloud
Personal Health Record over Encrypted Data Using Cloud ServiceYogeshIJTSRD
CBPHR Cloud Based Personal Health Record systems are used for storage and management of patient records. Cloud computing provides real time health care data in a convenient and cost effective manner. Due to the lack of visibility in cloud platform, the users are always concerned with data privacy and security. This is the main obstacle in widely adopting CBPHR systems in health care sector. The paper is discussing a cloud based patient health record management scheme which is highly secured. In this approach, indexes are encrypted under different symmetric keys and also the encrypted data indexes from various data providers can be merge by cloud without knowing the index content. It also provides efficient and privacy preserving query processing using a single data query submitted by the data user. Encrypted data will be processed by cloud from all related data providers without knowing its query content. Dinesh Soni | Dr. Lakshmi JVN "Personal Health Record over Encrypted Data Using Cloud Service" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd41230.pdf Paper URL: https://www.ijtsrd.comcomputer-science/computer-security/41230/personal-health-record-over-encrypted-data-using-cloud-service/dinesh-soni
Healthcare information exchange using blockchain technologyIJECEIAES
Current trend in health-care industry is to shift its data on the cloud, to increase availability of Electronic Health Records (EHR) e.g. Patient’s medical history in real time, which will allow sharing of EHR with ease. However, this conventional cloud-based data sharing environment has data security and privacy issues. This paper proposes a distributed solution based on blockchain technology for trusted Health Information Exchange (HIE). In addition to exchange of EHR between patient and doctor, the proposed system is also used in other aspects of healthcare such as improving the insurance claim and making data available for research organizations. Medical data is very sensitive, in both social as well as legal aspects, so permissioned block-chain such as Hyperledger Fabric is used to retain the necessary privacy required in the proposed system. As, this is highly permissioned network where the owner of the network i.e. patient holds all the access rights, so in case of emergency situations the proposed system has a Backup Access System which will allow healthcare professionals to access partial EHR and this backup access is provided by using wearable IOT device.
Cloud Compliance with Encrypted Data – Health Recordsijtsrd
several tending organizations area unit mistreatment electronic health record EHRS area unit period, patient centered records that create data accessible instantly and firmly to approved users. so information storage becomes associate evoking interest for developing EHRS systems. this can not price an excellent deal however it additionally provides the adjustable giant space mobile access more and more required within the gift world, however, before cloud based EHRSs system will become associate beingness, problems with information security, personal details of patients and overall performance should be shown. As normal cryptography techniques for EHRSs cause hyperbolic access management and performance overhead, this paper proposes the employment of Cipher text Policy Attribute Based cryptography CPABE to encrypted information is unbroken confidential although the storage server is untrusted EHRSs supported health care suppliers credentials to decipher EHRSs it ought to contain these several attributes required for correct access . the planning and usage of cloud related EHRS system supported CP ABE area unit galvanized and bestowed, beside introductory experiments to research the flexibleness and measurability of the planned approach. Mohan Prakash | Nachappa S "Cloud Compliance with Encrypted Data – Health Records" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30773.pdf Paper Url :https://www.ijtsrd.com/computer-science/computer-security/30773/cloud-compliance-with-encrypted-data-%E2%80%93-health-records/mohan-prakash
International Journal of Engineering Research and Applications (IJERA) aims to cover the latest outstanding developments in the field of all Engineering Technologies & science.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
Enhancing security features in cloud computing for healthcare using cipher an...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Enhancing security features in cloud computing for healthcare using cipher an...eSAT Journals
Abstract Health Care is the most important unindustrialized field. Cloud is an emerging trend in software industry. In medical field, there are large dataset comprising highly sensitive data about patient’s medical records. Based on these records, diagnosis for the patient will be given. Moving data to the cloud makes to explore a large information for diagnosis as expert documentation will also be stored as part of health record. Physicians from anywhere at any time can get access over these reports for better treatment. The Medicare industry vacillates to store these data to the cloud as the patients might feel insecure about their health records. This work introduces the idea of combining Cipher Cloud, Inter Cloud and ABE schemes, proposes an innovative method to enhance security features in the cloud by double encryption using algorithms and tools. By this, only authorized entities are proficient of accessing these records. Rather than storing data in single cloud, Inter Cloud (Multi-cloud) also adds advantage for our proposed work. Keywords: Virtualization, Cipher cloud, Trust, Encryption, Inter cloud
Personal Health Record over Encrypted Data Using Cloud ServiceYogeshIJTSRD
CBPHR Cloud Based Personal Health Record systems are used for storage and management of patient records. Cloud computing provides real time health care data in a convenient and cost effective manner. Due to the lack of visibility in cloud platform, the users are always concerned with data privacy and security. This is the main obstacle in widely adopting CBPHR systems in health care sector. The paper is discussing a cloud based patient health record management scheme which is highly secured. In this approach, indexes are encrypted under different symmetric keys and also the encrypted data indexes from various data providers can be merge by cloud without knowing the index content. It also provides efficient and privacy preserving query processing using a single data query submitted by the data user. Encrypted data will be processed by cloud from all related data providers without knowing its query content. Dinesh Soni | Dr. Lakshmi JVN "Personal Health Record over Encrypted Data Using Cloud Service" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd41230.pdf Paper URL: https://www.ijtsrd.comcomputer-science/computer-security/41230/personal-health-record-over-encrypted-data-using-cloud-service/dinesh-soni
Healthcare information exchange using blockchain technologyIJECEIAES
Current trend in health-care industry is to shift its data on the cloud, to increase availability of Electronic Health Records (EHR) e.g. Patient’s medical history in real time, which will allow sharing of EHR with ease. However, this conventional cloud-based data sharing environment has data security and privacy issues. This paper proposes a distributed solution based on blockchain technology for trusted Health Information Exchange (HIE). In addition to exchange of EHR between patient and doctor, the proposed system is also used in other aspects of healthcare such as improving the insurance claim and making data available for research organizations. Medical data is very sensitive, in both social as well as legal aspects, so permissioned block-chain such as Hyperledger Fabric is used to retain the necessary privacy required in the proposed system. As, this is highly permissioned network where the owner of the network i.e. patient holds all the access rights, so in case of emergency situations the proposed system has a Backup Access System which will allow healthcare professionals to access partial EHR and this backup access is provided by using wearable IOT device.
Cloud Compliance with Encrypted Data – Health Recordsijtsrd
several tending organizations area unit mistreatment electronic health record EHRS area unit period, patient centered records that create data accessible instantly and firmly to approved users. so information storage becomes associate evoking interest for developing EHRS systems. this can not price an excellent deal however it additionally provides the adjustable giant space mobile access more and more required within the gift world, however, before cloud based EHRSs system will become associate beingness, problems with information security, personal details of patients and overall performance should be shown. As normal cryptography techniques for EHRSs cause hyperbolic access management and performance overhead, this paper proposes the employment of Cipher text Policy Attribute Based cryptography CPABE to encrypted information is unbroken confidential although the storage server is untrusted EHRSs supported health care suppliers credentials to decipher EHRSs it ought to contain these several attributes required for correct access . the planning and usage of cloud related EHRS system supported CP ABE area unit galvanized and bestowed, beside introductory experiments to research the flexibleness and measurability of the planned approach. Mohan Prakash | Nachappa S "Cloud Compliance with Encrypted Data – Health Records" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30773.pdf Paper Url :https://www.ijtsrd.com/computer-science/computer-security/30773/cloud-compliance-with-encrypted-data-%E2%80%93-health-records/mohan-prakash
International Journal of Engineering Research and Applications (IJERA) aims to cover the latest outstanding developments in the field of all Engineering Technologies & science.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
This is particularly the case on e Health monitoring applications for chronic patients, Where Patients
monitoring refers to a continuous observation of patient’s condition (physiological and physical) traditionally
performed by one or several body sensors. The architecture for this system is based on medical sensors which
measure patients’ physical parameters by using wireless sensor networks (WSNs). These sensors transfer data
from patients’ bodies over the wireless network to the cloud environment. The system is aimed to prevent delays
in the arrival of patients’ medical information to the healthcare providers, Therefore, patients will have a high
quality services because the e heath smart system supports medical staff by providing real-time data gathering,
eliminating manual data collection, enabling the monitoring of huge numbers of patients. We underline the
necessity of the analysis of data quality on e-Health applications, especially concerning remote monitoring and
assistance of patients with chronic diseases.
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...IJERA Editor
Information and communication technology (ICT) are becoming a natural part in healthcare. Instead of keeping patient information inside a written file, you can find all information stored in an organized database as well defined files using a specific system in almost every hospital. But those files sometimes got lost or information was split up in files in different hospitals or different departments so no one could see the whole picture from this point we come up with our idea. One of this paper targets is to keep that information available on the cloud so doctors and nurses can have an access to patient record everywhere, so patient history will be clear which helps doctors in giving the right decision. We present security architecture for establishing privacy domains in e-Health bases. In this case, we will improve the availability of medical data and provide the ability for patients to moderate their medical data. Moreover, e-Health system in cloud computing has more than one component to be attacked. The other target of this paper is to distinguish between different kinds of attackers and we point out several shortcomings of current e-Health solutions and standards, particularly they do not address the client platform security, which is a crucial aspect for the overall security of systems in cloud. To fill this gap, we present security architecture for establishing privacy domains in e-Health infrastructures. Our solution provides client platform security and appropriately combines this with network security concepts.
Health Data Share Service System using RESTtheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
Secure Sharing of Personal Health Records in Cloud Computing using EncryptionEditor IJCATR
The PHR is a tool that you can use to collect, track and share past and current information about your health or the health of someone
in your care. Personal health record (PHR) is considered as an emerging patient-centric model of health information exchange, where people can
share their health information to other people. Since there are wide privacy concerns about the health records and due to high operational cost,
users stored at a third party server called as Cloud Server. The issues such as risks of privacy exposure, scalability in key management, access
problem, user revocation, have remained the most important challenges towards achieving fine-grained, cryptographically enforced data access
control. In order to get rid off from this ,in this paper we introduce attribute-based encryption (ABE) techniques to encrypt each patient's PHR
file so that an unauthorised people won’t be able to view our PHR file.
A Novel Framework for Securing Medical Records in Cloud ComputingIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
IoT based on secure personal healthcare using RFID technology and steganography IJECEIAES
Internet of things (IoT) makes it attainable for connecting different various smart objects together with the internet. The evolutionary medical model towards medicine can be boosted by IoT with involving sensors such as environmental sensors inside the internal environment of a small room with a specific purpose of monitoring of person's health with a kind of assistance which can be remotely controlled. RF identification (RFID) technology is smart enough to provide personal healthcare providing part of the IoT physical layer through low-cost sensors. Recently researchers have shown more IoT applications in the health service department using RFID technology which also increases real-time data collection. IoT platform which is used in the following research is Blynk and RFID technology for the user's better health analyses and security purposes by developing a two-level secured platform to store the acquired data in the database using RFID and Steganography. Steganography technique is used to make the user data more secure than ever. There were certain privacy concerns which are resolved using this technique. Smart healthcare medical box is designed using SolidWorks health measuring sensors that have been used in the prototype to analyze real-time data.
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
An electronic Medical record (EHR) is a of a computerized version of a patient's paper record. Our reality
has been drastically changed by advanced innovation like – PDAs, tablets, and web-empowered gadgets
have changed our day to day lives and the manner in which we impart. Medication is a data rich enterprise.
EHR incorporate the clinical and treatment chronicles of patients, an EHR framework is worked to go past
standard clinical information gathered in a supplier's office and can be a more extensive perspective on a
patient's consideration. Electronic Health Record (EHR) frameworks face issues with respect toinformation
security, honesty and the board. We could execute blockchain innovation to change the EHR frameworks
and could be an answer of these issues. The main goal of our proposed structure is to implement and
execute blockchain innovation for EHR and furthermore to give secure capacity of electronic records by
characterizing granular access rules for the clients of the proposed framework. Thus this structure furnishes
the EHR framework with the advantages of having a versatile, secure and necessary integral chain-based
arrangement
This is particularly the case on e Health monitoring applications for chronic patients, Where Patients
monitoring refers to a continuous observation of patient’s condition (physiological and physical) traditionally
performed by one or several body sensors. The architecture for this system is based on medical sensors which
measure patients’ physical parameters by using wireless sensor networks (WSNs). These sensors transfer data
from patients’ bodies over the wireless network to the cloud environment. The system is aimed to prevent delays
in the arrival of patients’ medical information to the healthcare providers, Therefore, patients will have a high
quality services because the e heath smart system supports medical staff by providing real-time data gathering,
eliminating manual data collection, enabling the monitoring of huge numbers of patients. We underline the
necessity of the analysis of data quality on e-Health applications, especially concerning remote monitoring and
assistance of patients with chronic diseases.
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...IJERA Editor
Information and communication technology (ICT) are becoming a natural part in healthcare. Instead of keeping patient information inside a written file, you can find all information stored in an organized database as well defined files using a specific system in almost every hospital. But those files sometimes got lost or information was split up in files in different hospitals or different departments so no one could see the whole picture from this point we come up with our idea. One of this paper targets is to keep that information available on the cloud so doctors and nurses can have an access to patient record everywhere, so patient history will be clear which helps doctors in giving the right decision. We present security architecture for establishing privacy domains in e-Health bases. In this case, we will improve the availability of medical data and provide the ability for patients to moderate their medical data. Moreover, e-Health system in cloud computing has more than one component to be attacked. The other target of this paper is to distinguish between different kinds of attackers and we point out several shortcomings of current e-Health solutions and standards, particularly they do not address the client platform security, which is a crucial aspect for the overall security of systems in cloud. To fill this gap, we present security architecture for establishing privacy domains in e-Health infrastructures. Our solution provides client platform security and appropriately combines this with network security concepts.
Health Data Share Service System using RESTtheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
Secure Sharing of Personal Health Records in Cloud Computing using EncryptionEditor IJCATR
The PHR is a tool that you can use to collect, track and share past and current information about your health or the health of someone
in your care. Personal health record (PHR) is considered as an emerging patient-centric model of health information exchange, where people can
share their health information to other people. Since there are wide privacy concerns about the health records and due to high operational cost,
users stored at a third party server called as Cloud Server. The issues such as risks of privacy exposure, scalability in key management, access
problem, user revocation, have remained the most important challenges towards achieving fine-grained, cryptographically enforced data access
control. In order to get rid off from this ,in this paper we introduce attribute-based encryption (ABE) techniques to encrypt each patient's PHR
file so that an unauthorised people won’t be able to view our PHR file.
A Novel Framework for Securing Medical Records in Cloud ComputingIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
IoT based on secure personal healthcare using RFID technology and steganography IJECEIAES
Internet of things (IoT) makes it attainable for connecting different various smart objects together with the internet. The evolutionary medical model towards medicine can be boosted by IoT with involving sensors such as environmental sensors inside the internal environment of a small room with a specific purpose of monitoring of person's health with a kind of assistance which can be remotely controlled. RF identification (RFID) technology is smart enough to provide personal healthcare providing part of the IoT physical layer through low-cost sensors. Recently researchers have shown more IoT applications in the health service department using RFID technology which also increases real-time data collection. IoT platform which is used in the following research is Blynk and RFID technology for the user's better health analyses and security purposes by developing a two-level secured platform to store the acquired data in the database using RFID and Steganography. Steganography technique is used to make the user data more secure than ever. There were certain privacy concerns which are resolved using this technique. Smart healthcare medical box is designed using SolidWorks health measuring sensors that have been used in the prototype to analyze real-time data.
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
An electronic Medical record (EHR) is a of a computerized version of a patient's paper record. Our reality
has been drastically changed by advanced innovation like – PDAs, tablets, and web-empowered gadgets
have changed our day to day lives and the manner in which we impart. Medication is a data rich enterprise.
EHR incorporate the clinical and treatment chronicles of patients, an EHR framework is worked to go past
standard clinical information gathered in a supplier's office and can be a more extensive perspective on a
patient's consideration. Electronic Health Record (EHR) frameworks face issues with respect toinformation
security, honesty and the board. We could execute blockchain innovation to change the EHR frameworks
and could be an answer of these issues. The main goal of our proposed structure is to implement and
execute blockchain innovation for EHR and furthermore to give secure capacity of electronic records by
characterizing granular access rules for the clients of the proposed framework. Thus this structure furnishes
the EHR framework with the advantages of having a versatile, secure and necessary integral chain-based
arrangement
Along with improvement of clouds, cloudlet and wearable devices, it becomes necessary to provide better medical information sharing over the internet. As we know, sharing medical information is very critical and challenging issue because medical information contains patient’s delicate information. The medical information sharing mainly includes collection, storage and sharing of medical information over the internet. In existing healthcare framework, patient asks health query/question which is being answered by multiple doctors. The user is provided with correct answer with the help of truth discovery method. The medical information and history of patient is directly delivered to the remote cloud. The paper proposes system to provide confidentiality of medical information and protect healthcare system from intrusion. In this proposed system, during the medical information collection stage, the Number Theory Research Unit (NTRU) algorithm is used to encrypt user’s vital signs collected various sensors. Then to protect medical information stored at remote cloud against the malicious attacks, a Collaborative Intrusion Detection System (CIDS) built on cloudlet mesh is proposed. Medical Knowledge Extraction (MKE) System is proposed to provide most reliable answer to the user’s health related query. MKE extract the medical knowledge from noisy query-answers pairs and estimate the trustworthiness degree and doctor expertise using truth discovery method.
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING Akshay Mittal
Emerging Threats and Countermeasures - Digital health is the convergence of digital technology in healthcare. The emerging technology and the use of innovations are needed in healthcare for advancements and better outcomes. With the use of innovations, new threats and challenges are emerging in the industry which needs to be managed for efficient operations.
An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...IJERA Editor
Health organizations are beginning to move mobile commerce services in recent years to enhance services and quality without spending much investment for IT infrastructure. Medical records are very sensitive and private to any individuals. Hence effective security mechanism is required. The challenges of our research work are to maintain privacy for the users and provide smart and secure environment for accessing the application. It is achieved with the help of personalization. Internet has provided the way for personalization. Personalization is a term which refers to the delivery of information that is relevant to individual or group of individuals in the format, layout specified and in time interval. In this paper we propose an Ontology Based Access Control (OBAC) Model that can address the permitted access control among the service providers and users. Personal Health Records sharing is highly expected by the users for the acceptance in mobile commerce applications in health care systems.
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
Abstract
The effect of addition of mono fibers and hybrid fibers on the mechanical properties of concrete mixture is studied in the present
investigation. Steel fibers of 1% and polypropylene fibers 0.036% were added individually to the concrete mixture as mono fibers and
then they were added together to form a hybrid fiber reinforced concrete. Mechanical properties such as compressive, split tensile and
flexural strength were determined. The results show that hybrid fibers improve the compressive strength marginally as compared to
mono fibers. Whereas, hybridization improves split tensile strength and flexural strength noticeably.
Keywords:-Hybridization, mono fibers, steel fiber, polypropylene fiber, Improvement in mechanical properties.
Material management in construction – a case studyeSAT Journals
Abstract
The objective of the present study is to understand about all the problems occurring in the company because of improper application
of material management. In construction project operation, often there is a project cost variance in terms of the material, equipments,
manpower, subcontractor, overhead cost, and general condition. Material is the main component in construction projects. Therefore,
if the material management is not properly managed it will create a project cost variance. Project cost can be controlled by taking
corrective actions towards the cost variance. Therefore a methodology is used to diagnose and evaluate the procurement process
involved in material management and launch a continuous improvement was developed and applied. A thorough study was carried
out along with study of cases, surveys and interviews to professionals involved in this area. As a result, a methodology for diagnosis
and improvement was proposed and tested in selected projects. The results obtained show that the main problem of procurement is
related to schedule delays and lack of specified quality for the project. To prevent this situation it is often necessary to dedicate
important resources like money, personnel, time, etc. To monitor and control the process. A great potential for improvement was
detected if state of the art technologies such as, electronic mail, electronic data interchange (EDI), and analysis were applied to the
procurement process. These helped to eliminate the root causes for many types of problems that were detected.
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
Abstract
Drought management needs multidisciplinary action. Interdisciplinary efforts among the experts in various fields of the droughts
prone areas are helpful to achieve tangible and permanent solution for this recurring problem. The Gulbarga district having the total
area around 16, 240 sq.km, and accounts 8.45 per cent of the Karnataka state area. The district has been situated with latitude 17º 19'
60" North and longitude of 76 º 49' 60" east. The district is situated entirely on the Deccan plateau positioned at a height of 300 to
750 m above MSL. Sub-tropical, semi-arid type is one among the drought prone districts of Karnataka State. The drought
management is very important for a district like Gulbarga. In this paper various short term strategies are discussed to mitigate the
drought condition in the district.
Keywords: Drought, South-West monsoon, Semi-Arid, Rainfall, Strategies etc.
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
Abstract
Pavements are subjected to severe condition of stresses and weathering effects from the day they are constructed and opened to traffic
mainly due to its fatigue behavior and environmental effects. Therefore, pavement rehabilitation is one of the most important
components of entire road systems. This paper highlights the design of concrete pavement with added mono fibers like polypropylene,
steel and hybrid fibres for a widened portion of existing concrete pavement and various overlay alternatives for an existing
bituminous pavement in an urban road in Bangalore. Along with this, Life cycle cost analyses at these sections are done by Net
Present Value (NPV) method to identify the most feasible option. The results show that though the initial cost of construction of
concrete overlay is high, over a period of time it prove to be better than the bituminous overlay considering the whole life cycle cost.
The economic analysis also indicates that, out of the three fibre options, hybrid reinforced concrete would be economical without
compromising the performance of the pavement.
Keywords: - Fatigue, Life cycle cost analysis, Net Present Value method, Overlay, Rehabilitation
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
Abstract
The issue of growing demand on our nation’s roadways over that past couple of decades, decreasing budgetary funds, and the need to
provide a safe, efficient, and cost effective roadway system has led to a dramatic increase in the need to rehabilitate our existing
pavements and the issue of building sustainable road infrastructure in India. With these emergency of the mentioned needs and this
are today’s burning issue and has become the purpose of the study.
In the present study, the samples of existing bituminous layer materials were collected from NH-48(Devahalli to Hassan) site.The
mixtures were designed by Marshall Method as per Asphalt institute (MS-II) at 20% and 30% Reclaimed Asphalt Pavement (RAP).
RAP material was blended with virgin aggregate such that all specimens tested for the, Dense Bituminous Macadam-II (DBM-II)
gradation as per Ministry of Roads, Transport, and Highways (MoRT&H) and cost analysis were carried out to know the economics.
Laboratory results and analysis showed the use of recycled materials showed significant variability in Marshall Stability, and the
variability increased with the increase in RAP content. The saving can be realized from utilization of recycled materials as per the
methodology, the reduction in the total cost is 19%, 30%, comparing with the virgin mixes.
Keywords: Reclaimed Asphalt Pavement, Marshall Stability, MS-II, Dense Bituminous Macadam-II
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
Abstract
Soil stabilization has proven to be one of the oldest techniques to improve the soil properties. Literature review conducted revealed
that uses of natural inorganic stabilizers are found to be one of the best options for soil stabilization. In this regard an attempt has
been made to evaluate the influence of RBI-81 stabilizer on properties of black cotton soil through laboratory investigations. Black
cotton soil with varying percentages of RBI-81 viz., 0, 0.5, 1, 1.5, 2, and 2.5 percent were studied for moisture density relationships
and strength behaviour of soils. Also the effect of curing period was evaluated as literature review clearly emphasized the strength
gain of soils stabilized with RBI-81 over a period of time. The results obtained shows that the unconfined compressive strength of
specimens treated with RBI-81 increased approximately by 250% for a curing period of 28 days as compared to virgin soil. Further
the CBR value improved approximately by 400%. The studies indicated an increasing trend for soil strength behaviour with
increasing percentage of RBI-81 suggesting its potential applications in soil stabilization.
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
Abstract
Reinforced masonry was developed to exploit the strength potential of masonry and to solve its lack of tensile strength. Experimental
and analytical studies have been carried out to investigate the effect of reinforcement on the behavior of hollow concrete block
masonry prisms under compression and to predict ultimate failure compressive strength. In the numerical program, three dimensional
non-linear finite elements (FE) model based on the micro-modeling approach is developed for both unreinforced and reinforced
masonry prisms using ANSYS (14.5). The proposed FE model uses multi-linear stress-strain relationships to model the non-linear
behavior of hollow concrete block, mortar, and grout. Willam-Warnke’s five parameter failure theory has been adopted to model the
failure of masonry materials. The comparison of the numerical and experimental results indicates that the FE models can successfully
capture the highly nonlinear behavior of the physical specimens and accurately predict their strength and failure mechanisms.
Keywords: Structural masonry, Hollow concrete block prism, grout, Compression failure, Finite element method,
Numerical modeling.
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
Abstract
Increase in traffic along with heavier magnitude of wheel loads cause rapid deterioration in pavements. There is a need to improve
density, strength of soil subgrade and other pavement layers. In this study an attempt is made to improve the properties of locally
available loamy soil using twin approaches viz., i) increasing the compaction of soil and ii) treating the soil with chemical stabilizer.
Laboratory studies are carried out on both untreated and treated soil samples compacted by different compaction efforts. Studies
show that increase in compaction effort results in increase in density of soil. However in soil treated with chemical stabilizer, rate of
increase in density is not significant. The soil treated with chemical stabilizer exhibits improvement in both strength and performance
properties.
Keywords: compaction, density, subgradestabilization, resilient modulus
Geographical information system (gis) for water resources managementeSAT Journals
Abstract
Water resources projects are inherited with overlapping and at times conflicting objectives. These projects are often of varied sizes
ranging from major projects with command areas of millions of hectares to very small projects implemented at the local level. Thus,
in all these projects there is seldom proper coordination which is essential for ensuring collective sustainability.
Integrated watershed development and management is the accepted answer but in turn requires a comprehensive framework that can
enable planning process involving all the stakeholders at different levels and scales is compulsory. Such a unified hydrological
framework is essential to evaluate the cause and effect of all the proposed actions within the drainage basins.
The present paper describes a hydrological framework developed in the form of a Hydrologic Information System (HIS) which is
intended to meet the specific information needs of the various line departments of a typical State connected with water related aspects.
The HIS consist of a hydrologic information database coupled with tools for collating primary and secondary data and tools for
analyzing and visualizing the data and information. The HIS also incorporates hydrological model base for indirect assessment of
various entities of water balance in space and time. The framework would be maintained and updated to reflect fully the most
accurate ground truth data and the infrastructure requirements for planning and management.
Keywords: Hydrological Information System (HIS); WebGIS; Data Model; Web Mapping Services
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
Abstract
The study demonstrate the potentiality of satellite remote sensing technique for the generation of baseline information on forest types
including tree plantation details in Bidar forest division, Karnataka covering an area of 5814.60Sq.Kms. The Total Area of Bidar
forest division is 5814Sq.Kms analysis of the satellite data in the study area reveals that about 84% of the total area is Covered by
crop land, 1.778% of the area is covered by dry deciduous forest, 1.38 % of mixed plantation, which is very threatening to the
environmental stability of the forest, future plantation site has been mapped. With the use of latest Geo-informatics technology proper
and exact condition of the trees can be observed and necessary precautions can be taken for future plantation works in an appropriate
manner
Keywords:-RS, GIS, GPS, Forest Type, Tree Plantation
Factors influencing compressive strength of geopolymer concreteeSAT Journals
Abstract
To study effects of several factors on the properties of fly ash based geopolymer concrete on the compressive strength and also the
cost comparison with the normal concrete. The test variables were molarities of sodium hydroxide(NaOH) 8M,14M and 16M, ratio of
NaOH to sodium silicate (Na2SiO3) 1, 1.5, 2 and 2.5, alkaline liquid to fly ash ratio 0.35 and 0.40 and replacement of water in
Na2SiO3 solution by 10%, 20% and 30% were used in the present study. The test results indicated that the highest compressive
strength 54 MPa was observed for 16M of NaOH, ratio of NaOH to Na2SiO3 2.5 and alkaline liquid to fly ash ratio of 0.35. Lowest
compressive strength of 27 MPa was observed for 8M of NaOH, ratio of NaOH to Na2SiO3 is 1 and alkaline liquid to fly ash ratio of
0.40. Alkaline liquid to fly ash ratio of 0.35, water replacement of 10% and 30% for 8 and 16 molarity of NaOH and has resulted in
compressive strength of 36 MPa and 20 MPa respectively. Superplasticiser dosage of 2 % by weight of fly ash has given higher
strength in all cases.
Keywords: compressive strength, alkaline liquid, fly ash
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
Abstract
Composite Circular hollow Steel tubes with and without GFRP infill for three different grades of Light weight concrete are tested for
ultimate load capacity and axial shortening , under Cyclic loading. Steel tubes are compared for different lengths, cross sections and
thickness. Specimens were tested separately after adopting Taguchi’s L9 (Latin Squares) Orthogonal array in order to save the initial
experimental cost on number of specimens and experimental duration. Analysis was carried out using ANN (Artificial Neural
Network) technique with the assistance of Mini Tab- a statistical soft tool. Comparison for predicted, experimental & ANN output is
obtained from linear regression plots. From this research study, it can be concluded that *Cross sectional area of steel tube has most
significant effect on ultimate load carrying capacity, *as length of steel tube increased- load carrying capacity decreased & *ANN
modeling predicted acceptable results. Thus ANN tool can be utilized for predicting ultimate load carrying capacity for composite
columns.
Keywords: Light weight concrete, GFRP, Artificial Neural Network, Linear Regression, Back propagation, orthogonal
Array, Latin Squares
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
Abstract
This paper presents an outlook on experimental behavior and a comparison with predicted formula on the behaviour of circular
concentrically loaded self-consolidating fibre reinforced concrete filled steel tube columns (HSSCFRC). Forty-five specimens were
tested. The main parameters varied in the tests are: (1) percentage of fiber (2) tube diameter or width to wall thickness ratio (D/t
from 15 to 25) (3) L/d ratio from 2.97 to 7.04 the results from these predictions were compared with the experimental data. The
experimental results) were also validated in this study.
Keywords: Self-compacting concrete; Concrete-filled steel tube; axial load behavior; Ultimate capacity.
Evaluation of punching shear in flat slabseSAT Journals
Abstract
Flat-slab construction has been widely used in construction today because of many advantages that it offers. The basic philosophy in
the design of flat slab is to consider only gravity forces; this method ignores the effect of punching shear due to unbalanced moments
at the slab column junction which is critical. An attempt has been made to generate generalized design sheets which accounts both
punching shear due to gravity loads and unbalanced moments for cases (a) interior column; (b) edge column (bending perpendicular
to shorter edge); (c) edge column (bending parallel to shorter edge); (d) corner column. These design sheets are prepared as per
codal provisions of IS 456-2000. These design sheets will be helpful in calculating the shear reinforcement to be provided at the
critical section which is ignored in many design offices. Apart from its usefulness in evaluating punching shear and the necessary
shear reinforcement, the design sheets developed will enable the designer to fix the depth of flat slab during the initial phase of the
design.
Keywords: Flat slabs, punching shear, unbalanced moment.
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
Abstract
Intake towers are typically tall, hollow, reinforced concrete structures and form entrance to reservoir outlet works. A parametric
study on dynamic behavior of circular cylindrical towers can be carried out to study the effect of depth of submergence, wall thickness
and slenderness ratio, and also effect on tower considering dynamic analysis for time history function of different soil condition and
by Goyal and Chopra accounting interaction effects of added hydrodynamic mass of surrounding and inside water in intake tower of
dam
Key words: Hydrodynamic mass, Depth of submergence, Reservoir, Time history analysis,
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
Abstract
Efficiency of the road network system is analyzed by travel time reliability measures. The study overlooks on an important measure of
travel time reliability and prioritizing Tiruchirappalli road network. Traffic volume and travel time were collected using license plate
matching method. Travel time measures were estimated from average travel time and 95th travel time. Effect of non-motorized vehicle
on efficiency of road system was evaluated. Relation between buffer time index and traffic volume was created. Travel time model has
been developed and travel time measure was validated. Then service quality of road sections in network were graded based on
travel time reliability measures.
Keywords: Buffer Time Index (BTI); Average Travel Time (ATT); Travel Time Reliability (TTR); Buffer Time (BT).
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
Abstract
The development of watershed aims at productive utilization of all the available natural resources in the entire area extending from
ridge line to stream outlet. The per capita availability of land for cultivation has been decreasing over the years. Therefore, water and
the related land resources must be developed, utilized and managed in an integrated and comprehensive manner. Remote sensing and
GIS techniques are being increasingly used for planning, management and development of natural resources. The study area, Nallur
Amanikere watershed geographically lies between 110 38’ and 110 52’ N latitude and 760 30’ and 760 50’ E longitude with an area of
415.68 Sq. km. The thematic layers such as land use/land cover and soil maps were derived from remotely sensed data and overlayed
through ArcGIS software to assign the curve number on polygon wise. The daily rainfall data of six rain gauge stations in and around
the watershed (2001-2011) was used to estimate the daily runoff from the watershed using Soil Conservation Service - Curve Number
(SCS-CN) method. The runoff estimated from the SCS-CN model was then used to know the variation of runoff potential with different
land use/land cover and with different soil conditions.
Keywords: Watershed, Nallur watershed, Surface runoff, Rainfall-Runoff, SCS-CN, Remote Sensing, GIS.
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
Abstract
Land and water are the two vital natural resources, the optimal management of these resources with minimum adverse environmental
impact are essential not only for sustainable development but also for human survival. Satellite remote sensing with geographic
information system has a pragmatic approach to map and generate spatial input layers of predicting response behavior and yield of
watershed. Hence, in the present study an attempt has been made to understand the hydrological process of the catchment at the
watershed level by drawing the inferences from moprhometric analysis and runoff. The study area chosen for the present study is
Yagachi catchment situated in Chickamaglur and Hassan district lies geographically at a longitude 75⁰52’08.77”E and
13⁰10’50.77”N latitude. It covers an area of 559.493 Sq.km. Morphometric analysis is carried out to estimate morphometric
parameters at Micro-watershed to understand the hydrological response of the catchment at the Micro-watershed level. Daily runoff
is estimated using USDA SCS curve number model for a period of 10 years from 2001 to 2010. The rainfall runoff relationship of the
study shows there is a positive correlation.
Keywords: morphometric analysis, runoff, remote sensing and GIS, SCS - method
-
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
Abstract The nonlinear Static procedure also well known as pushover analysis is method where in monotonically increasing loads are applied to the structure till the structure is unable to resist any further load. It is a popular tool for seismic performance evaluation of existing and new structures. In literature lot of research has been carried out on conventional pushover analysis and after knowing deficiency efforts have been made to improve it. But actual test results to verify the analytically obtained pushover results are rarely available. It has been found that some amount of variation is always expected to exist in seismic demand prediction of pushover analysis. Initial study is carried out by considering user defined hinge properties and default hinge length. Attempt is being made to assess the variation of pushover analysis results by considering user defined hinge properties and various hinge length formulations available in literature and results compared with experimentally obtained results based on test carried out on a G+2 storied RCC framed structure. For the present study two geometric models viz bare frame and rigid frame model is considered and it is found that the results of pushover analysis are very sensitive to geometric model and hinge length adopted. Keywords: Pushover analysis, Base shear, Displacement, hinge length, moment curvature analysis
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
Abstract
Depletion of natural resources and aggregate quarries for the road construction is a serious problem to procure materials. Hence
recycling or reuse of material is beneficial. On emphasizing development in sustainable construction in the present era, recycling of
asphalt pavements is one of the effective and proven rehabilitation processes. For the laboratory investigations reclaimed asphalt
pavement (RAP) from NH-4 and crumb rubber modified binder (CRMB-55) was used. Foundry waste was used as a replacement to
conventional filler. Laboratory tests were conducted on asphalt concrete mixes with 30, 40, 50, and 60 percent replacement with RAP.
These test results were compared with conventional mixes and asphalt concrete mixes with complete binder extracted RAP
aggregates. Mix design was carried out by Marshall Method. The Marshall Tests indicated highest stability values for asphalt
concrete (AC) mixes with 60% RAP. The optimum binder content (OBC) decreased with increased in RAP in AC mixes. The Indirect
Tensile Strength (ITS) for AC mixes with RAP also was found to be higher when compared to conventional AC mixes at 300C.
Keywords: Reclaimed asphalt pavement, Foundry waste, Recycling, Marshall Stability, Indirect tensile strength.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Cloud assisted privacy preserving and data integrity for mobile health monitoring
1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 12 | Dec-2014, Available @ http://www.ijret.org 20
CLOUD ASSISTED PRIVACY PRESERVING AND DATA INTEGRITY
FOR MOBILE HEALTH MONITORING
K.M.Jadhav1
, S.R.Idate2
1
PG Student,Department Of Information Technology, Bharti Vidyapeeth Deemed University College Of Engineering,
Pune, India
2
Assoc.Prof., Department Of Information Technology, Bharti vidyapeeth Deemed University College Of Engineering,
Pune, India
Abstract
In cloud computing system ,data is stimulated to a distantly placed cloud server. Cloud provisions the information authentically
and go back to the proprietor whenever wanted. But there is no assurance that information store in the cloud is protected and not
changed by cloud . In order to defeat the danger of honesty of data, the user must be able to use the help of Third party
Auditor(TPA).TPA has understanding in inspection honesty of the information, that clouds users does not have, and that is
difficult for the owner to check .The data in the cloud should be exact ,reliable ,available and elevated excellence.[1]This paper is
to address this important problem related to the data integrity and design a cloud assisted privacy preserving mobile-health
monitoring system to protect the privacy of the involved parties and their data. for that purpose we have used the
algorithms:1)Tate pairing 2)Token generation 3)AES(Advanced Encryption Standards)-SHA1 and MD5.
Keywords— Data integrity,TPA,Tate pairing, Cryptography
-------------------------------------------------------------------***-------------------------------------------------------------------
1. INTRODUCTION
Cloud storage is service ,where data is remotely maintained
and back up. The service is available to user over a network
,which usually the internet. It allows the user to store files
online ,so that the user can access them from any location
via the internet. The provider company makes them
available to the user online by keeping the uploaded files on
an external server. This gives companies using cloud storage
service ease and convenience, but can potentially be costly.
Users should also be aware that backing up their data is still
required when using cloud storage service ,because
recovering data from cloud storage is much slower than
local backup. Some of the cloud storage advantages are
decrease expenditure, afford more flexibility. In spite of
these advantages ,"cloud" require in some of the issues like
information honesty ,information loss, illegal right of entry,
isolation etc.
fortunately, even though cloud-assisted mHealth monitoring
could offer a huge chance to get better the excellence of
healthcare services and potentially reduce healthcare costs
.There is uncertain chunk in creation this technology a
truth.[2] exclusive of correctly addressing the information
organization in an mHealth system ,customers isolation may
be harshly breach during the collection ,storage ,diagnosis,
communications and computing .A current learning shows
that 75% Americans judge the isolation of their health
information important or very important[3].
2. RELATED WORK
1 .Gorp, P.V.; Comuzzi, M.; Fialho, A.; Kaymak,
U.Systems, Man, and Cybernetics (SMC), 2012 IEEE
International Conference on2012
In this paper, we show that both requirements can be
satisfied fully when adopting a novel cloud-based PHR
system architecture. [4]
2. Smith, R.; Jie Xu; Hima, S.; Johnson, We present a
prototype which takes health records from a commercial
data provider, anonymises them in an innovative way and
makes them available within a secure cloud-based Virtual
Research Environment (VRE)[5]
T.; Fabian, B.Business Informatics (CBI),. we present a
novel secure architecture for sharing electronic health
records in a cloud environment.[6]
Lingfeng Chen; Hoang, D.B.This paper addresses security
and privacy challenges in healthcare cloud by deploying a
novel framework with CPRBAC (Cloud-based Privacy-
aware Role Based Access Control) model for controllability,
traceability of data and authorized access to system
resources[7]
3. EXISISTING SYSTEM
They have proposed mobile health monitoring system which
provides a good opportunity for adversaries to obtain a large
set of medical information. In that clients input there related
health data such as a systolic blood pressure(BP),whether
they missed daily medications or have an abnormal diet and
2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 12 | Dec-2014, Available @ http://www.ijret.org 21
the energy consumption of physical activity to the decision
support system, which will then return a recommendation on
how the clients can improve their condition[2]
3.1 Limitations of Existing System
Exisisting system does not store medical data on
cloud side[2].
Exisisting system does not focus on Data integrity
issue.
4. PROPOSED SYSTEM
In proposed health monitoring system, If the patient wants to
consult about his BP problem or Diabetes problem such as
increase or decrease in the sugar level. For the medical
advice regarding above problem ,He can log in To The
mobile health monitoring Application, To use this
Application his mobile must have android base and he has to
install This particular mobile health monitoring application.
There is another application ,in which the provider can store
the general information regarding the health related problem
such as BP, Diabetes and Hypertension. In this Mobile
Health Monitoring System, provider have suggested, how to
take care when above described problems are arised. All
data of these application are stored on cloud. some times
what happens if there is no strong security system used then
data can be altered, changed or hacked by the hackers. Thus
there is no fear to provider or user regarding data security
,because In this applications data is secured strongly by
using following algorithms.Namely:1)Tate pairing 2)Token
Generation 3)AES (Advanced Encryption standards)
4.1 System Architecture
Fig 1 System Architecture
We now highlight our design of the proposed cloud assisted
privacy preserving and data integrity for Mobile Health
Monitoring System. Above fig 1.consist of 3 parties i.e
1)Android Mobile User 2)Cloud Health Provider and Semi
Trust Authority. Semi Trust Authority generate public and
private key for each and every user who does the registration
to Mobile Health Application. when any android mobile
user first do the registration to Mobile Health Application
and After that he will send Request for token to the Semi
Trust Authority .when Semi Trust Authority receives request
he will first check whether it is valid user or not and if it is
valid then he will send token to requested user. when user
receives token ,he will encrypt data by using that token and
send query for ex. systolic Bp:100 e.t.c.to cloud Health
Provider. When Cloud Health Provider Receives query from
user, cloud health provider requires the users private key to
decrypt users data .so ,he will send request to the semi
Trust Authority for users private key After receiving request
,Semi Trust Authority sends users private key to cloud
Health Provider and then Cloud Health Provider decrypts
data by using AES algorithm send Query Result to requested
user.
In our proposed cloud assisted privacy preserving and data
integrity for Mobile Health Monitoring System, actually
consist four modules which are as follows:
a) Cloud server
b) M-Health Provider
c)Trusted Authority
d) Client
a) Cloud Server:
1) Acts as offline storage
2) All data are saved in encrypted format
3) Even passwords of users too
b) MHealth Provider
1) Stores Data on cloud in encrypted format
2) can view user detail
3) Add medical data detail (BP,Systolic,e.t.c)
4) View or add comments or Description
c) Trusted Authority
1) Activates user account
2 )Generate token for user
3)Trusted Authority can't view token as it is generated and
to client .
Token = jz6v|ERHZiowFuiPL8SiB9==
d) Client
1) Registers with mHealth
2) Trusted authority must activate the user
3) can view their details
4) Raise Query
5) view Query results
6) Using token he can view query results
7) Query automatically send to Trusted authority.
8) Query = "blood pressure 50,missed medication:3"
3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 12 | Dec-2014, Available @ http://www.ijret.org 22
4.2 Mathematical Function Definition for the
System
M = Message
Min1 = Minimum value.
Max1 = Maximum value.
M = { , , ......... }
Where,
M = Message as per the High BP range and Low BP range.
for example,
Min1 -> specifies the low value
Range of Min1 = 60 -70 means it represents the low BP.
Min2-> Specifies the another Low value,
Range of Min2-> - 80-90 it represents normal BP.
Max1->Specifies the High value.
Range of Max1 ->100-120 it represents the normal BP.
Max2->130-160 it represents the high Bp.
Fig 2 Mathematical Function Definition For The System
4.3 Algorithmic Strategy
1) AES Algorithm
a) Encryption
Input: String to be encrypted
Output: Encrypted value
Begin
Get the instance of Cipher class i.e java.crypto.cipher.
Step 1: Generate the dynamic Key
Step 2:Using Base 64 encoder encode the bytes of given
String and get the encrypted value.
Return encrypted value.
End
b) Decryption
Input: String to be decrypted
Output: decrypt value
Begin
Get the instance of Cipher class i.e java.crypto.cipher.
Step 1: Generate the dynamic Key
Step 2:Using Base 64 decoder to decode the bytes of given
String and get the decrypted value.
Return decrypted value.
End
2) Tate Pairing
Input: Generate the public key and private key
Output: public key value and private key value
Begin
Point Key = new point(x,y)
pairing e = new Tate pairing curve,grouporder,coFactor);
point p = new point(x2,y2);
point Ppub = new point(x3,y3);
BFMasterPublicKeyparam = new
BFMasterPublicKey(e,p,Ppub);
private key = new BFUserPrivateKey(key param);
Return Public key and Private key
End
4.4 Experimental Results
1) Health Provider
STEPS:
TO START TOMCAT
Go to command line- Type cd
C:CloudHealthapache-tomcat-7.0.54bin
write : startup.bat
3 Go to Firefox :
http://localhost:8080/cloudhealthprovider
4 click on signup and create new account
5 sign in to application with user name and
password.
6 After sign in following window will be displayed
4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 12 | Dec-2014, Available @ http://www.ijret.org 23
In Above window There are three buttons
a) Home
b) Provider
c) Action
After clicking provider button following window will be displayed:
In above window, After clicking provider option ,The three sub options of provider will open these are:
a) Add medication details
b) View medication details
c) user search
5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 12 | Dec-2014, Available @ http://www.ijret.org 24
a) In add medication detail provider can add medication details of diseases which are displayed in following window:
b) In view medication details, provider can view the details of medications which he had added.
c) when user click on Action option then will get three sub options which are:
1)Update Profile
2)Change Password
3)Logout
1) If provider wants to update his profile then he has to click on update profile button.
2) If provider wants to change password then he has to click on change password button.
3) If provider wants to Logout from application then he has to click on logout button.
2) For Android User
STEPS:
C:CloudHealthadt-bundle-windows-x86_64-20140702eclipse . start eclipse.
After starting the eclipse following window will open
.
6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 12 | Dec-2014, Available @ http://www.ijret.org 25
After dragging the android mobile lock displaced in above window then following window will open. This window is
consisting of different options. as well as different applications. from these applications one has to select mobile health
application i.e m_Health.
After clicking mobile health application the next window will open. In that window there are two options one is sign in and
another is register. if the user is already having his account then he has to sign in only, otherwise he has to open new
account by clicking on register option. and has to submit it, then he will get his username and password.
7. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 12 | Dec-2014, Available @ http://www.ijret.org 26
After signing in to the android mobile health application following window will open.
In This window There are two options of two types of diseases These are:
i) Hypertension
ii)Diabetes
According to the need of user he has to select any one application from above mention window and to click the same.
For example, If the user is blood pressure patient, and if he knows that his BP is at high level, then he has to enter his information
about BP reading in the Hypertension form. after submitting it ,he will get immediately the required message displaced on the
mobile screen and then according to the suggestions of that message he has to act to control his BP level to normal side.
4.5 To View Databse
STEPS:
1. Start toad
8. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 12 | Dec-2014, Available @ http://www.ijret.org 27
In Above Database Healthcare provider, user and disease data is stored. The data stored in database is in encrypted format. This
data is encrypted by using Tate pairing algorithm and AES Algorithm. so there is no need to fear about the data is stolen or
hacked by anybody. following screen is displaying the user and provider data in encrypted format. This all Healthcare provider
and user data will be finally stored in cloud side with encrypted format. As per the requirement of user or provider same data
stored on cloud side will be decrypted as an when required by the user or provider.
USER DATA
PROVIDER DATA
9. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 12 | Dec-2014, Available @ http://www.ijret.org 28
5. CONCLUSION
We have come to the conclusion that, the above designed
application will help to the healthcare provider and to the
patient to solve there problems of medication.Thus this
paper has addressed this important problem related to the
data integrity and design a cloud assisted privacy preserving
mobile-health monitoring system to protect the privacy of
the involved parties and their data. for that purpose we have
used the algorithm:1)Tate pairing 2)Token generation
3)AES(Advanced Encryption Standards)-SHA1 and MD5
algorithms
REFERENCES
[1]. Saranya eswaran and Dr,sunitha Abburu,"Identifying
Data Integrity in the Cloud storage" in IJCSI,Vol.9,Issue
2,No 1,March 2012.
[2]. CAM:Cloud-Assisted Privacy Preserving Mobile Health
Monitoring Huang Lin,Jun Shao,Chi Zhang,and Yuguang
Fang,Fellow,IEEE.VOL. 8,NO.6,JUNE 2013.
[3]. L.Ponemon Institute,Americans' Opinions on Healthcare
Privaacy,2010[Online].Available:http://tinyurl.com/4atsdlj.
[4]. Gorp, P.V.; Comuzzi, M.; Fialho, A.; Kaymak,
U.Systems, Man, and Cybernetics (SMC), 2012 IEEE
International Conference on2012
[5]. Smith, R.; Jie Xu; Hima, S.; Johnson, O.Service
Oriented System Engineering (SOSE), 2013 IEEE 7th
International Symposium on2013
[6]. Ermakova, T.; Fabian, B.Business Informatics (CBI),
2013 IEEE 15th Conference on2013
[7]. High Performance Computing and Communications
(HPCC), 2011 IEEE 13th International Conference on2011.