IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Log into android mobile to fetch the device oriented information using remote...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Log into android mobile to fetch the device oriented information using remote...eSAT Journals
Abstract This paper presents a platform for sharing device oriented mobile information via a local private cloud. The android application helps the user to fetch the device oriented information like missed call history, messages, battery status and GPS. Our system contains a website which helps the user to track all the required information through his personal account. Thus our system helps in making it easier to support new cloud services as output, and our android application helps in setting various triggers to push the device oriented information into the cloud. Keywords: List Android, Device oriented information, Cloud.
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTSJournal For Research
In today’s developing world various technologies are coming up, which aims in reducing the user’s work by providing specific results which is made possible by keeping track of the various activities performed by the user throughout the entire time. Context aware computing is one of the emerging fields that help in the process of providing accurate and specific results. Context aware computing refers to a general class of mobile systems that has the ability to sense the physical environment in which the user is currently in and adapt their behavior accordingly. Context awareness is a property of mobile devices that is defined in compliment to location awareness. Systems that use context aware computing provide the user’s preference based on the various environmental factors like location, time and other conditions. Researchers have been working on this domain for about a decade and various applications were developed for the purpose of demonstrating the capability of the context-aware systems, until recently this technology has been put in heavy use since nowadays whichever applications are made by companies for end-users have a requirement of providing more accurate and specific results. Recently context-aware systems combined with pervasive computing, which means always connected and available, are a growing trend which are applied on devices. The dependence on internet for providing results, introduces various complexities because in some places the extent of the internet is limited. Therefore the context aware technology should be made to work offline using the power of smart devices like smartphones which is owned by the majority of the world. In this way the technology can be provided on to various smart devices which would result in a much more enriched user experience.
Video Analytics applications like security and
surveillance face a critical problem of person re-identification
abbreviated as re-ID. The last decade witnessed the emergence of
large-scale datasets and deep learning methods to use these huge
data volumes. Most current re-ID methods are classified into
either image-based or video-based re-ID
In Today life The Security is the most common challenging issue in the world and with such advancements happening, the security of most is the home security. Many of technology come in market For Security. In the Modern world advances in electronics and communications technologies have led to the miniaturization and improvement of the performance of computers and networking. These changes have given rise to the development of several home automation technologies and system. Surveillance can be defined as monitoring of the behaviour, other changing information,activities,observing or analysing particular area for the purpose of directing, influencing,managing or protecting. A home security system should provide safety and security features for a home by alarming the residents from natural,accidental and/or human dangers such as:flooding,fire,theft,animals invading etc. To design a software application for intrusion detection system to identify malicious activities using cloud technology.
Over the years the process of manual attendance has been carried out which is not only time consuming
but also provides erroneous result. Automated time and attendance monitoring system provides many
benefits to organizations. This reduces the need of pen and paper based manual attendance tracking
system. Following this thought, we have proposed a smart location based time and attendance tracking
system which is implemented on android mobile application on smartphone reducing the need of additional
biometric scanner device. The location of an organization has a specific location, which can be determine
by the GPS. Each employee’s location can be determined by the GPS using smartphone. This location is
defined as a key of time and attendance tracking in our paper.
Log into android mobile to fetch the device oriented information using remote...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Log into android mobile to fetch the device oriented information using remote...eSAT Journals
Abstract This paper presents a platform for sharing device oriented mobile information via a local private cloud. The android application helps the user to fetch the device oriented information like missed call history, messages, battery status and GPS. Our system contains a website which helps the user to track all the required information through his personal account. Thus our system helps in making it easier to support new cloud services as output, and our android application helps in setting various triggers to push the device oriented information into the cloud. Keywords: List Android, Device oriented information, Cloud.
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTSJournal For Research
In today’s developing world various technologies are coming up, which aims in reducing the user’s work by providing specific results which is made possible by keeping track of the various activities performed by the user throughout the entire time. Context aware computing is one of the emerging fields that help in the process of providing accurate and specific results. Context aware computing refers to a general class of mobile systems that has the ability to sense the physical environment in which the user is currently in and adapt their behavior accordingly. Context awareness is a property of mobile devices that is defined in compliment to location awareness. Systems that use context aware computing provide the user’s preference based on the various environmental factors like location, time and other conditions. Researchers have been working on this domain for about a decade and various applications were developed for the purpose of demonstrating the capability of the context-aware systems, until recently this technology has been put in heavy use since nowadays whichever applications are made by companies for end-users have a requirement of providing more accurate and specific results. Recently context-aware systems combined with pervasive computing, which means always connected and available, are a growing trend which are applied on devices. The dependence on internet for providing results, introduces various complexities because in some places the extent of the internet is limited. Therefore the context aware technology should be made to work offline using the power of smart devices like smartphones which is owned by the majority of the world. In this way the technology can be provided on to various smart devices which would result in a much more enriched user experience.
Video Analytics applications like security and
surveillance face a critical problem of person re-identification
abbreviated as re-ID. The last decade witnessed the emergence of
large-scale datasets and deep learning methods to use these huge
data volumes. Most current re-ID methods are classified into
either image-based or video-based re-ID
In Today life The Security is the most common challenging issue in the world and with such advancements happening, the security of most is the home security. Many of technology come in market For Security. In the Modern world advances in electronics and communications technologies have led to the miniaturization and improvement of the performance of computers and networking. These changes have given rise to the development of several home automation technologies and system. Surveillance can be defined as monitoring of the behaviour, other changing information,activities,observing or analysing particular area for the purpose of directing, influencing,managing or protecting. A home security system should provide safety and security features for a home by alarming the residents from natural,accidental and/or human dangers such as:flooding,fire,theft,animals invading etc. To design a software application for intrusion detection system to identify malicious activities using cloud technology.
Over the years the process of manual attendance has been carried out which is not only time consuming
but also provides erroneous result. Automated time and attendance monitoring system provides many
benefits to organizations. This reduces the need of pen and paper based manual attendance tracking
system. Following this thought, we have proposed a smart location based time and attendance tracking
system which is implemented on android mobile application on smartphone reducing the need of additional
biometric scanner device. The location of an organization has a specific location, which can be determine
by the GPS. Each employee’s location can be determined by the GPS using smartphone. This location is
defined as a key of time and attendance tracking in our paper.
A Survey on Security for Server Using Spontaneous Face DetectionIJERA Editor
In today’s computerized world, cyber crime has increased. The web network of www also increases day by day. So the protection of software and data in our computers has become very important. For this purpose we are developing the “Server Security System” with the help of some technologies such as GPRS, TCP-IP, SMTP, and MIME. In our project we are developing a system such that we get the image of an unauthorized person or user. To do this we are using a webcam. We send a mail to the authorized person's GPRS phone. For this purpose we use a mobile it can be any mobile. In parallel we are changing the password by generating a random string & then Shutting-Down the computer remotely. By using java programming we can create such applications which will help us to stop the cyber crime. It is not visible to new user so that he is unaware from this software so this will definitely helpful to make them fool.
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...Dr. Amarjeet Singh
Internet of Things (IoT) is undoubtedly a well-known research area. Security on IoT communication services is the major challenge with advanced technology and devices. This paper mainly focusing on Perceptron layer based attacks and counter measures based on Effective Authentication System (EAS). This paper is ordered as outlining IoT Architecture, Types of Threats ,Perceptron Layer based attacks, sensor based communication services ,RFID mechanism ,Tag identify and verification by back end server and Hash based Effective Authentication System (EAS) to avoid pseudonym attacks .This paper proposes EAS as security measure by preventing privacy attack, pseudonym attack, location tracking and asynchronous attack.
Comparative Study on Intrusion Detection Systems for Smartphonesiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
IoT Network Attack Detection using Supervised Machine LearningCSCJournals
The use of supervised learning algorithms to detect malicious traffic can be valuable in designing intrusion detection systems and ascertaining security risks. The Internet of things (IoT) refers to the billions of physical, electronic devices around the world that are often connected over the Internet. The growth of IoT systems comes at the risk of network attacks such as denial of service (DoS) and spoofing. In this research, we perform various supervised feature selection methods and employ three classifiers on IoT network data. The classifiers predict with high accuracy if the network traffic against the IoT device was malicious or benign. We compare the feature selection methods to arrive at the best that can be used for network intrusion prediction.
Securing Mobile Cloud Using Fingerprint AuthenticationApurva Kini
Given topic describes an authentication technique for mobile cloud using one of the bio-metric techniques i.e. fingerprint authentication . Here we are making use of Mobile Phone's camera to take fingerprint samples.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Malware threat analysis techniques and approaches for IoT applications: a reviewjournalBEEI
Internet of things (IoT) is a concept that has been widely used to improve business efficiency and customer’s experience. It involves resource constrained devices connecting to each other with a capability of sending data, and some with receiving data at the same time. The IoT environment enhances user experience by giving room to a large number of smart devices to connect and share information. However, with the sophistication of technology has resulted in IoT applications facing with malware threat. Therefore, it becomes highly imperative to give an understanding of existing state-of-the-art techniques developed to address malware threat in IoT applications. In this paper, we studied extensively the adoption of static, dynamic and hybrid malware analyses in proffering solution to the security problems plaguing different IoT applications. The success of the reviewed analysis techniques were observed through case studies from smart homes, smart factories, smart gadgets and IoT application protocols. This study gives a better understanding of the holistic approaches to malware threats in IoT applications and the way forward for strengthening the protection defense in IoT applications.
Comparison of friction stirs welding technique with conventional welding methodseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Fpga implementation of race control algorithm for full bridge prcp convertereSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Experimental investigation of chemical etching on en 5 steel using nitric acideSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A Survey on Security for Server Using Spontaneous Face DetectionIJERA Editor
In today’s computerized world, cyber crime has increased. The web network of www also increases day by day. So the protection of software and data in our computers has become very important. For this purpose we are developing the “Server Security System” with the help of some technologies such as GPRS, TCP-IP, SMTP, and MIME. In our project we are developing a system such that we get the image of an unauthorized person or user. To do this we are using a webcam. We send a mail to the authorized person's GPRS phone. For this purpose we use a mobile it can be any mobile. In parallel we are changing the password by generating a random string & then Shutting-Down the computer remotely. By using java programming we can create such applications which will help us to stop the cyber crime. It is not visible to new user so that he is unaware from this software so this will definitely helpful to make them fool.
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...Dr. Amarjeet Singh
Internet of Things (IoT) is undoubtedly a well-known research area. Security on IoT communication services is the major challenge with advanced technology and devices. This paper mainly focusing on Perceptron layer based attacks and counter measures based on Effective Authentication System (EAS). This paper is ordered as outlining IoT Architecture, Types of Threats ,Perceptron Layer based attacks, sensor based communication services ,RFID mechanism ,Tag identify and verification by back end server and Hash based Effective Authentication System (EAS) to avoid pseudonym attacks .This paper proposes EAS as security measure by preventing privacy attack, pseudonym attack, location tracking and asynchronous attack.
Comparative Study on Intrusion Detection Systems for Smartphonesiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
IoT Network Attack Detection using Supervised Machine LearningCSCJournals
The use of supervised learning algorithms to detect malicious traffic can be valuable in designing intrusion detection systems and ascertaining security risks. The Internet of things (IoT) refers to the billions of physical, electronic devices around the world that are often connected over the Internet. The growth of IoT systems comes at the risk of network attacks such as denial of service (DoS) and spoofing. In this research, we perform various supervised feature selection methods and employ three classifiers on IoT network data. The classifiers predict with high accuracy if the network traffic against the IoT device was malicious or benign. We compare the feature selection methods to arrive at the best that can be used for network intrusion prediction.
Securing Mobile Cloud Using Fingerprint AuthenticationApurva Kini
Given topic describes an authentication technique for mobile cloud using one of the bio-metric techniques i.e. fingerprint authentication . Here we are making use of Mobile Phone's camera to take fingerprint samples.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Malware threat analysis techniques and approaches for IoT applications: a reviewjournalBEEI
Internet of things (IoT) is a concept that has been widely used to improve business efficiency and customer’s experience. It involves resource constrained devices connecting to each other with a capability of sending data, and some with receiving data at the same time. The IoT environment enhances user experience by giving room to a large number of smart devices to connect and share information. However, with the sophistication of technology has resulted in IoT applications facing with malware threat. Therefore, it becomes highly imperative to give an understanding of existing state-of-the-art techniques developed to address malware threat in IoT applications. In this paper, we studied extensively the adoption of static, dynamic and hybrid malware analyses in proffering solution to the security problems plaguing different IoT applications. The success of the reviewed analysis techniques were observed through case studies from smart homes, smart factories, smart gadgets and IoT application protocols. This study gives a better understanding of the holistic approaches to malware threats in IoT applications and the way forward for strengthening the protection defense in IoT applications.
Comparison of friction stirs welding technique with conventional welding methodseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Fpga implementation of race control algorithm for full bridge prcp convertereSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Experimental investigation of chemical etching on en 5 steel using nitric acideSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Sdci scalable distributed cache indexing for cache consistency for mobile env...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Taguchi optimization for efficient extraction of a natural dye from bougainvi...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A Survey of Cyber foraging systems: Open Issues, Research ChallengesEswar Publications
This paper presents a survey on current applications which practice the pervasive mechanism of cyber foraging. The applications include the LOCUSTS framework, Slingshot, Pupetter. This applications advocated the operating principle of task sharing among resource deficient mobile devices. These applications face some design issues for providing efficient performance like task distribution and task migration apart from the security aspect. The general operating mechanism of the cyber foraging technique are also discussed upon and the design options to leverage the throughput of the inherent mechanism is also represented in a suitable way.
ABSTRACT
Cloud computing promises to significantly change the way we use computers and access and store our personal and business information. With these new computing and communications paradigms arise new data security challenges. Existing data protection mechanisms such as encryption have failed in preventing data theft attacks, especially those perpetrated by an insider to the cloud provider.
For securing user data from such attacks a new paradigm called fog computing can be used. Fog Computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage, and application services to end-users. The motivation of Fog computing lies in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined network This technique can monitor the user activity to identify the legitimacy and prevent from any unauthorized user access. Here we have discussed this paradigm for preventing misuse of user data and securing information.
CONCLUSION
This proposal of monitoring data access patterns by profiling user behavior to determine if and when a malicious insider illegitimately accesses someone’s documents in a Cloud service. Decoy documents stored in the Cloud alongside the user’s real data also serve as sensors to detect illegitimate access. Once unauthorized data access or exposure is suspected, and later verified, with challenge questions for instance, this inundate the malicious insider with bogus information in order to dilute the user’s real data. Such preventive attacks that rely on disinformation technology could provide unprecedented levels of security in the Cloud and in social networks.
Securing mobile cloud using finger print authenticationIJNSA Journal
Mobile cloud computing becomes part of mobile users daily life transactions. Mobile devices with Internet
capabilities have increased the use of mobile clouding computing. Due to hardware limitations in mobile
devices, these devices can't install and run applications require heavy CPU processing or extensive
memory. Cloud computing allows mobile users to synchronize their data with remote storage and utilize
applications require heavy CPU processing or extensive memory such as Microsoft Office or Adobe
Photoshop, as they run in a desktop computer.
Securing Mobile Cloud Using Finger Print AuthenticationIJNSA Journal
Mobile cloud computing becomes part of mobile users daily life transactions. Mobile devices with Internet capabilities have increased the use of mobile clouding computing. Due to hardware limitations in mobile devices, these devices can't install and run applications require heavy CPU processing or extensive memory. Cloud computing allows mobile users to synchronize their data with remote storage and utilize applications require heavy CPU processing or extensive memory such as Microsoft Office or Adobe Photoshop, as they run in a desktop computer.
The combination of cloud computing and mobile computing introduces mobile cloud computing, which also present new issues of security threats such as unauthorized access to resources exist in mobile cloud. Protecting mobile cloud computing from illegitimate access becomes an important concern to mobile users. This paper proposes and implements a new user authentication mechanism of mobile cloud computing using fingerprint recognition system. Fingerprint images of mobile users can be captured and processed using mobile phone camera to access mobile cloud computing . The implementation of the proposed solution in different mobile operating systems and devices show security enhancement in mobile cloud computing with accepted performance level.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering
Smartphone Remote Detection and Wipe System using SMSEditor IJCATR
The project based on mobile application which functions on an Android operating system. The objective of this which
enable the user to locate the mobile phone in a silent mode to General mode when it is misplaced as well as if it is lost and wipe the
data from the device. To create an account the user needs to provide his /her mobile number, a password and 4 trustworthy numbers
this completes the registration process. The application, which is still in a deactivation mode, will operate only when the phone is
misplaced and the user sends the set password/ pass code from one of the 4 trustworthy numbers to one’s own mobile number. This
will change the profile of the misplaced phone i.e. switch it from the silent mode to the sound mode. It will also send an
acknowledgement to the trustworthy number from which the user has sent the message. Furthermore, it will also provide the location
with and also if mobile is lost then we can take back up from another mobile by using same application, we can also wipe the data
remotely by sending the message.
— in distributed computing environment, Mobile agents
are mobile autonomous processes which operate on behalf of
users (e.g., the Internet). These applications include a specialized
search of a middleware services such as an active mail system,
large free-text database, electronic malls for shopping, and
updated networking devices. Mobile agent systems use less
network bandwidth, increase asynchrony among clients and
servers, dynamically update server interfaces and introduce
concurrency. Due to software components, security of mobile
agent is essential in any mobile agent based application. Security
services such as Confidentiality, Integrity, Authentication,
Authorization and Non-Repudiation are discussed and combat
with by the researchers. This work is proposing a new technique
for access control area of security for the mobile agents and it
will be implemented using an example of shopping cart data
sharing for multiple levels.
VIRTUAL MACHINES DETECTION METHODS USING IP TIMESTAMPS PATTERN CHARACTERISTICijcsit
Virtual machines (VMs) are underlying technologies of IT solutions such as cloud computing. VMs provide
ease of use through their on-demand characteristics and provide huge benefits in terms of lowering costs and
improving scalability. VMs are also being used as malware detection systems, and with the rapidly expanding
usage of mobile devices, besides of their usage as honeypots, VMs are coming to be used as emulators for
detecting malware in apps. This is due to the limited resources, such as processing power, available in mobile
devices. Currently, the security of applications for mobile devices is checked by running them in VM
environments before they are released to the end user. We argue that such a process may cause or overlook
serious security threats to the end user. In particular, if a piece of malware can detect its current running
environment, it may change its behavior such that it doesn’t perform malicious operations in environments it
suspects to be emulators. In this way, when the malware detects that its running environment is on a VM, it
may be able to hide from the security system on the VM. This is a potential security hazard for end users,
especially users of mobile devices. In this paper, we present a VM detection method that we argue could be
used for remotely detecting VM environments. The detection method works by analyzing the pattern of IP
timestamps in replies sent from the target environment. The method does not require any installation of
software on the target machine which further increase its potential harm if it were to be used by malware to
detect VM environments. In this paper, we also present a technique to disguise a real PC machine such that it
shows the similar IP timestamp patterns as the VM. By using this technique, malware may not be able to
differentiate between a real machine and a VM, thus providing protection to PC end users.
Security Concern Related to Mobile Computing, Middleware and Gateway required for mobile Computing, Making Existing Application Mobile Enable , mobile technology
Analysis and reporting of programming skills using mobile cloud based compilereSAT Journals
Abstract
Cloud Computing is a growing technology which enables on demand network access to resources . In mobile cloud computing
there is access to remote servers rather than local servers using portable devices and it is also shaping new environment for
computing where user is free to move while working and there is no need to work at a specific location . Installing compiler
manually is very crucial task because it consumes lot of space. In this paper mobile cloud based compiler is used to compile
and execute programs which is hosted on private cloud. We can use this compiler remotely through any network via smart
phone or any portable device which will help us to avoid installation of compilers on every machine.
Keywords: Mobile Cloud Computing, Cloud Serve ,Compiler, Private Cloud.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Secure intrusion detection and countermeasure selection in virtual system usi...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Smart surveillance systems play an important role in security today. The goal of security systems is to protect users against fires, car accidents, and
other forms of violence. The primary function of these systems is to offer security in residential areas. In today’s culture, protecting our homes is
critical. Surveillance, which ranges from private houses to large corporations, is critical in making us feel safe. There are numerous machine learning algorithms for home security systems; however, the deep learning convolutional neural network (CNN) technique outperforms the others. The
Keras, Tensorflow, Cv2, Glob, Imutils, and PIL libraries are used to train and assess the detection method. A web application is used to provide a
user-friendly environment. The flask web framework is used to construct it. The flash-mail, requests, and telegram application programming interface (API) apps are used in the alerting approach. The surveillance system tracks
abnormal activities and uses machine learning to determine if the scenario is normal or not based on the acquired image. After capturing the image, it is
compared with the existing dataset, and the model is trained using normal events. When there is an anomalous event, the model produces an output from which the mean distance for each frame is calculated.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Detect and immune mobile cloud infrastructure
1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Special Issue: 11 | NCAMESHE - 2014 | Jun-2014, Available @ http://www.ijret.org 182
DETECT AND IMMUNE MOBILE CLOUD INFRASTRUCTURE A.Malathy1, J.Gayathri2, T.A.Vijayalakshmi3, M.Ramkumar4 1PG Scholar, Department of computer science, Knowledge Institute of Technology, Salem, Tamil Nadu 2PG Scholar, Department of computer science, Knowledge Institute of Technology, Salem, Tamil Nadu 3PG Scholar, Department of computer science, Knowledge Institute of Technology, Salem, Tamil Nadu 4Department of computer science, Knowledge Institute of Technology, Salem, Tamil Nadu Abstract Mobile devices with cloud based service are highly effective and they are very flexible and adaptable. Mobile cloud infrastructure is a new concept where mobile devices and cloud services are clubbed together. As it a commodity, service providers should know the security issues. In this paper various security threats are widely discussed based on situation. A new methodology is proposed in order to detect the abnormal behavior. By detect the host and the communication channel certain malicious programs are injected in the test bed in order to identify the abnormal behavior. Using machine learning algorithm, these suspicious programs are detected. To find the next neighboring node and to detect the fault, FDMC algorithm is implemented. Keywords: Fault Detection, Virtual Mobile Instances Signature based.
--------------------------------------------------------------------***------------------------------------------------------------------ 1. INTRODUCTION Different mobile services are provided as application to electronic gadgets like smart phones, tables and cloud based mobile services benefit users by providing enormous flexibility and wealthy communication. Data can be retrieved, processed and send at any time using mobile devices. Flexibility is there when mobile devices are accessed using cloud computing. Each virtual instance is denoted by a mobile device and users can connect and make use of it. Virtualization in mobile devices in cloud platform provides virtual instances to the mobile users. Virtual cloud infrastructure gives the virtual mobile instances. These instances are managed using extensive power and storage capacity. Virtual smartphone over IP is a classic example of virtual mobile instances. The threatening thing for the service provider is the security. Even through signature based preventive algorithms are used in the virtual mobile instances, in order to find the malicious and suspicious applications, which basically run on the mobile cloud environment in the mobile cloud infrastructure certain malicious programs are injected which actually spreads the entire cloud and affects the commuting devices as well. Using FDMC algorithm to find the next neighboring node and detect the fault. Certain signature based vaccine are injected in the cloud in order to keep trace the malfunctions in the cloud instances. By monitoring the data, suspicious behavior can be detected using the machine learning algorithm. In order to validate these methodologies a test bed is created which is basically a platform to test large projects. In this paper the entire concept is classified in to different section.
Detecting the suspicious behavior in the cloud infrastructure.
Security aspects and the possible situations of attacks
Monitoring the architecture of the cloud infrastructure.
Correct validation for the proposed architecture.
Monitoring metrics needs to be configured for providing services and charging the users
1.1 Cloud Services based on Certain Situations Based on the virtualization concept certain malicious mobile applications are allowed to execute in the virtual mobile instances and if any program attacks the cloud, it leads to major problem. This paper focuses on the abnormal behavior in the cloud infrastructure Continuous monitoring is essential in order to find the malfunction in the cloud. So monitoring architecture is created to check both host and the data network flow. Using machine learning algorithm the unusual behavior is detected by implementing in the test bed environment. 1.2 Mobile Devices as a part of Cloud Construct Mobile computing assigns different roles to mobile devices. Assigning the cloud through mobile devices is generally termed as mobile computing. Different mobile devices form a cloud group and various jobs are delegated to different mobile devices to perform the job faster in the cloud computing infrastructure.
Users may execute mobile application on demand services based on their needs. So the service providers also get benefited and obtain more profit. Perhaps this would have been better if the services are free of malware. So monitoring the entire host and entire data is a feasible host.
2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Special Issue: 11 | NCAMESHE - 2014 | Jun-2014, Available @ http://www.ijret.org 183
Machine learning techniques and monitoring real time traffic is a solution.
Fig 1: Mobile instances vs. mobile cloud 2. Detecting the Suspicious Behavior Behavior determines what application runs on the mobile cloud infrastructure. Application creates flow between internal or external. These actions reflect the value of virtual resources. If any unexpected changes happen, the mobile instances intimate the cloud infrastructure and the user through alarm. Using signaled base method malware are detected with high accuracy and short duration. This generally detects the existing malware but couldn’t able to identify the newly injected malware. Vaccine application cannot detect the new malware. Cloud infrastructure connects the number of virtual instances when the malware is accepted. It sends to the entire cloud infrastructure. In order to resolve this problem host data are detected in the virtual instance and network are detected in the cloud infrastructure. There are two types of mobile cloud contacts creation and non-creation. Creation contacts directly with the mobile users and non-creation contacts by manipulating the background jobs. 2.1 Role of Hypervisor A hypervisor is a software program which runs the virtual machines. Once the hypervisor is installed on the physical device, it splits the nodes into right and non-rights. Virtual instances executes in non-right platforms. In order to monitor, the virtual instance, there is a bridge applications installed in the virtual mobile instance. This agent based programs supervises
2.2 Types of Mobile Users
Individual Users: Users are classified into three categories normal users, advanced users and developers based on their requirements.
Normal Users: Users are interested in gaming services provided by cloud providers and they access cloud through 3G/4G or Wi-Fi. Advanced users: Users from private organization may use cloud for their office work. They access cloud services via office Wi-Fi or 3G/4G for simulation work. Developers: Frequent changes in cloud are necessary for developers; they may use all kind of services provided by cloud. Office Workers: We categorize office workers as staff in a main office, Staff in branches and agents based on the information they used.
Fig 2: Types of cloud users Staff in a Main Office: Mobile office system is installed in the main office which can be used by the employees. Staff in Branch Offices: User needs to have a static mobile environment where they can access system from the branch office to the head office. Agents: People work with the company to develop a project may use mobile office system. 3. IMPLEMENTING SECURITY ON MOBILE PRIVATE CLOUD Most of the company wants to have a control over the mobile devices when it is provided by the company or by BYOD (Bring your own device). Mobile Device Management (MDM) with rigid deployment, and stable visibility and control that spans in mobile devices, real documents and the application. Actually this MDM supports all the latest mobile devices including apple iPhone, blackberry, kindle fire, windows phone.
3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Special Issue: 11 | NCAMESHE - 2014 | Jun-2014, Available @ http://www.ijret.org 184
3.1 Security Aspects and the Possible Situations of Attacks Using the machine learning algorithm, certain features are extracted from the hardware devices like CPU, network utilization, memory were all monitored and malwares are detected using the mobile application .It determines the behavior of the mobile devices while surfing the internet, texting ,making calls and can able to detect the behavior of the device. 3.2 Fault Detection in Mobile Cloud It tracks the performance of the machine and raises an alarm to found the fault. FDMC is faster than brute-force algorithm. In cloud infrastructure one machine is to play a vital role in mobile cloud called Monitor. Entities are E1, E2,…….En. Each machine can have the own data partition Ii , test points are sent by P0 it read from the disk. At any moment of time P0, maintain a current list of t, observation time Ok found. Initially OK is empty the new Observation time is updated and receive from the entity E1, E2,…….En. The monitor to maintain the cut-off threshold C it initially set to infinitive and sequentially increase the value. Once OK changes, it set to the least value in OK and sends it to the entire machine in the cloud. In the CHECK mode to test the block of data read from the memory based on local dataset it trim the points when the current threshold Ci is less than it send the test point to next machine in the ring. The machine Pi maintain threshold Ci it has receive from the monitor P0. Algorithm: CHECK () Procedure CHECK () Begin For all blocks of data in Ii do
c getNextBlock(Ii);
For all points bB do
Nk(b) ⍉
For all points xIi do
For bB, b≠x do If rb < ci then remove b from B
For bB do Send (b, Nk(b),rb)to machine Pi+1 3.3 Unusual Behavior in Cloud Infrastructure There is lots of interruption for cloud services. The proposed design can find the anonymous or malicious behavior in the cloud infrastructure. The interruption detection system (IDS) manages the problems in the host interruption detection system (HIDS) and network Interruption detection system. This study doesn’t provide how the malicious program is detected. This architecture doesn’t display virtualization of each node, but it has the impact in the performance of cloud computing.
Mobile Cloud Computing Group
Number of mobile devices is combined to form a cloud computing group where a larger task is delegated to different mobile devices to make the job done in a shorter period of time and combination of mobile atmosphere.
3.4 Enrolling Mobile Devices Just by selecting the MDM services and by configuring the device, the particular devices get enrolled. The enrollments request can be obtained using various means (i.e.) by email communication or by SMS or by a custom universal resource locator Authentication should be provided based on the service provided and the employee designation. By leveraging the existing authentication the services can integrated with the enterprise system .Mobile apps expose lots of personal information.
Securing mobile devices
By introducing the passcode policies, certain level of security can be reached
By strongly enforcing the encryption standards
Identifying the rooted devices
Stolen devices should be locked so that unauthorized access can be prevented
Geo-Fencing is a software program which allows system admin to induce a program whenever there is enter or exit condition of the boundaries which is determined by administrator, an automatic intimation or alert is sent. So the company admin can set up boundaries and whenever the mobile is beyond the boundaries, he can disable the device, which is in the private cloud environment. Evaluation – Gathering behavior data: Test bed is implemented to validate the methodology and architecture. Xen hypervisor is installed on each physical node. Virtual images are created are created using the kernel .Linux gingerbread 2.36 is used and port is mirrored for each physical node. 4. CONCLUSIONS In the virtual cloud instance abnormal behaviors can be detected using signature based algorithm along with FDMC algorithm so that it finds the nearest neighboring node. Hence all the mobile devices can be checked whether it is affected by malicious program in the cloud. REFERENCES [1]. Taehyun Kim, Yeongrak Choi, Seunghee Han, Jae Yoon Chung, Jonghwan Hyun, Jian Li, and James Won-Ki Hong, “ Monitoring and Detecting Abnormal Behavior in Mobile Cloud Infrastructure” 2012 IEEE/IFIP 3rd Workshop on Cloud Management (CloudMan) [2]. Kanishka Bhaduri, Kamalika Das, Bryan L. Matthews “Detecting Abnormal Machine Characteristics in Cloud Infrastructures”
4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Special Issue: 11 | NCAMESHE - 2014 | Jun-2014, Available @ http://www.ijret.org 185
[3]. E. Y. Chen and M. Itoh, "Virtual Smartphone over IP", The next IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2010), Montrreal, Canada, June 2010, pp.1-6. [4]. F. Gens, "IT Cloud Services User Survey, pt.2: Top Benefits & Challenges", IDC eXchange(http://blogs.idc.com/ie/), August 14, 2008. BIOGRAPHIES
Currently Pursuing Master of Engineering Degree in Knowledge Institute of Technology Area of interest includes Mobile computing and cloud computing
Currently Pursuing Master of Engineering Degree in Knowledge Institute of Technology Area of interest includes wireless sensor network and cloud computing.
Currently Pursuing Master of Engineering Degree in Knowledge Institute of Technology Area of interest includes cloud computing, big data and mobile cloud.