{"title":"Legal requirements and identifying data security for cloud service","authors":"Godfrin","doi":"10.1109/ICONSTEM.2016.7560948","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560948","url":null,"abstract":"The implementation of cloud computing embraces remarkable potential for small and medium-sized enterprises (SMEs) as it permits them to reduce the costs as well as improve scalability and flexibility. In order to choose a suitable cloud service, it is essential to carefully classify non-functional and functional requirements. In this regard, the features affecting legal requirements as well as IT security are significant areas to the users of SMEs. However, the smaller the enterprise, the lower the possibility that there is enough expertise to categorize the requirements in these subject areas. Addressing this issue, the influence of this paper is the depiction of a method for finding IT security and legal requirements regarding a cloud service in an organized kind of way. The existing method was implemented as a part of a model for a cloud service search. According to this search system, an evaluation with users of SMEs was conducted. The evaluation results demonstrate the search system and its underlying technique to successfully assist the users regarding the identification of appropriate legal and IT security requirements, hence dropping the amount of knowledge required by users of SMEs, as well as the connected effort of penetrating for appropriate cloud services.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126970904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
O. Pandithurai, B. Preethi, M. Meena, V. Nivedha, V. Ramya
{"title":"A framework for efficacy in lane discipline management using hybrid approach","authors":"O. Pandithurai, B. Preethi, M. Meena, V. Nivedha, V. Ramya","doi":"10.1109/ICONSTEM.2016.7560927","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560927","url":null,"abstract":"In the current scenario, accidents are occurring more in number. The occurrence of accidents is more in rural areas when compared to cities. Careless driving and violation of road safety rules are the major causes of such accidents. Single lane roads are common in rural areas. In such roads, the vehicles drivers don't follow lane discipline as there is less population density. Also in case of any accidents, there are fewer chances of people nearby the accident scene to witness the accident and report it to the nearby emergency service. In such cases, helping the victims becomes a difficult task. This increases the number of deaths in accidents. If some safety measures are implemented, such accidents can be avoided. A framework for lane discipline management using hybrid technology is proposed to enhance safer driving on single lane roads and to make people strictly follow the lane discipline. In this framework, the GPS, vehicular ad hoc networks and LTE technologies are used to track the vehicles violating lane discipline and to alert emergency services in case of accidents.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124555741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal location of unified power flow controller enhancing system security","authors":"J. S. Amirtham, V. Uma","doi":"10.1109/ICONSTEM.2016.7560971","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560971","url":null,"abstract":"This paper Optimally locate the Unified Power flow Controller based on real power performance index (Severity index) in the power system network. Two voltage source (Power injection) model is utilized to revise the behaviour of the UPFC in the regulation of active power, reactive power and voltage profile. This model is integrated in Newton Raphson algorithm for load flow studies. Both contingency as well as the non-contingency cases with and without FACTS device are analyzed. The Optimal Power Flow (OPF) is the most important issue which is to be taken into consideration in power systems. The objective of an Optimal Power Flow is to find the optimal operating condition for the generation units for minimizing their operational costs and simultaneously satisfying the constraints. Here in this work Particle Swarm optimization (PSO) procedure has been used to minimize the fuel cost with and without Unified Power Controller. And also the system's power losses are also minimized efficiently. For the validation and comparison purposes of the proposed techniques, and simulations are carried out on IEEE 30 bus system. Results validate that the performances of the power system can be successfully improved by the optimal allocation of the Unified power flow controller.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132460532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A comparative study on job scheduling algorithm augmenting load balancing in cloud","authors":"Aswathy B. Namboothiri, R. Raj","doi":"10.1109/ICONSTEM.2016.7560960","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560960","url":null,"abstract":"Cloud Computing is an emergent area in the field of Information Technology having the Internet as its base and provides various services as utility and follows pay-as you-go model. Load balancing is a critical issue in cloud computing which is a technique that uses multiple nodes and distributes dynamic workload among them so that no single node is overloaded and ensures none of the system collapse as a victim of overloading. Load balancing includes optimal utilization of resources which increases the performance of the system and thereby the minimization of the load of competent resources. This paper makes a survey that helps in analyzing the issues of existing load balancing algorithms and gives a comparison among these algorithms on the basis of different qualitative metrics like throughput, reliability, performance, resource utilization etc.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"186 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125166794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Developed RAID DP with combined storage media","authors":"N. Ali, V. Thakare","doi":"10.1109/ICONSTEM.2016.7560930","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560930","url":null,"abstract":"Different storage media have different performance in terms of fetching data. Most powerful one is RAM that has characteristics making it fast to serve I/O processes. Then, we have flash memory that has high performance of read tasks but less in write ones. Third one is HDD which is the slowest but most reliable in terms of preserving data. In this model, we used a combination of the first and third one to form a developed structure of RAID DP that has a much better performance. For parity disk drives, we used DRAM memory for its great performance. Because parity disks are the most overloaded with write processes. RAID 1 is also used as inner RAID system to preserve data stored in DRAM SSD (Solid State Drive) to HDD.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115624378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of FPGA controller based high step-up DC-DC converter using coupled inductor","authors":"A. Sophia, A. Babu","doi":"10.1109/ICONSTEM.2016.7560979","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560979","url":null,"abstract":"This paper proposes three phase high step up DC-DC converters are in need for applications, where increased loads are used. The proposed three phase DC-DC converter has with input-parallel, output series combination, accompanied by dual coupled inductors. The proposed converter inherits the advantage of being used in three phase applications, compared to the conventional converter. At the input, the presence of the paralleled dual coupled inductors shares the input current. The prototype circuit of the conventional converter has been modified by The prototype The proposed three phase converter has a rating of about 100 W output power at a switching frequency of about 40 kHz and satisfactory agreement between experimental and theoretical analysis has been observed. An output voltage of about 295 V has been harvested.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128061622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation of 16 bit systolic multiplier using modular shifting algorithm","authors":"S. Jayarajkumar, Kaliannan Sivanandam","doi":"10.1109/ICONSTEM.2016.7560950","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560950","url":null,"abstract":"The finite field multipliers consuming high-throughput rate and low-latency having grown excessive attention in recent cryptographic systems, and coding theory but such multipliers above Galois field GF(2m) for National institute standard technology (NIST) pentanomials are not so plentiful. We introduce two pairs of low latency and high throughput bit-parallel and digit-serial systolic multipliers depends on NIST pentanomials. We propose a unique decomposition technique to recognize the multiplication by several parallel arrays in a two-dimensional (2-D) systolic structure (BP-I) with a critical-path of 2Tx, where Tx is the propagation delay of XOR gate. The parallel arrays in two dimensional systolic structure are estimated along the vertical direction to attain a proposed 16-bit digit-serial structure (PDS-I) with the same critical-path. Designed for high-throughput applications, we proposed another pair of bit-parallel (BP-II) and Modified 16 bit digit-serial (PDS-II) structures based on a unique modular reduction method, where the critical-path is reduced to(Ta+Tx), Ta is an propagation delay of AND gate. The steps for data sharing between a pair of processing elements (PEs) of adjacent systolic arrays has been suggested to reduce the area-complexity of BP-I and BP-II advance. The existing method consumes more power and high area overhead. In systolic multiplier used to reduce area and power for the ASIC implementations and is also reduce the average computation time. Systolic multiplier is a better choice for high-speed VLSI implementation.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125956953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzzy logic controlled Cuk converter-inverter fed induction motor drive with reduced torque ripple","authors":"T. Srinivas, G. Themozhi","doi":"10.1109/ICONSTEM.2016.7560983","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560983","url":null,"abstract":"This paper deals with the modelling, simulation and implementation of a Fuzzy logic controlled Cuk converter-Inverter fed Induction motor drive. This work proposes PV fed Cuk converter to produce required DC voltage at the input of inverter. The output of the Photo Voltaic (PV) system is boosted using a Cuk converter. The output of the Cuk converter is inverted and applied to a three phase induction motor. Closed loop Proportional Integral Derivative (PID) and Fuzzy controlled systems are simulated and their responses are compared. The Fuzzy controlled drive system has advantages like reduced torque ripple and improved time domain response. The hardware is fabricated and the experimental results are compared with the simulation results.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124528643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Role check: Protecting the user information using attribute-based encryption, dynamic key generation & user retraction system","authors":"P. Akhila, M. Bhavani, R. Canessane","doi":"10.1109/ICONSTEM.2016.7560936","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560936","url":null,"abstract":"The EXISTING SYSTEM solely store the info within the cloud any user will access the info. within the projected SYSTEM the info is keep within the Remote Cloud. knowledge Owner will share the info and it's Key to the allowable Users. knowledge Sharing is achieved for 3 varieties of Users. 1. User based mostly 2. Role based mostly (Position / Role), 3. Attribute (Experience). within the MODIFICATION method of the Project is knowledge is uploaded by the info Owner supported Public Key, Secret Key, world Key and cluster Key. Public secret is haphazardly generated. Secret Key & cluster secret is generated via our Role / Attribute. For each User Name & Designation is employed. world secret is generated haphazardly. we tend to code the uploaded file exploitation AES algorithmic program. User Revocation is additionally developed during this half. If a user is moving out of the cluster or removed out of the cluster, secret is altered and therefore the new secret is armored to this Members. throughout knowledge transfer, except for validate all the Keys, Token is generated as E Mail, that is employed for additional Authentication.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123774919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal DG placement in distribution network using big bang-big crunch algorithm","authors":"T. Sudhakar, A. Vinoliya","doi":"10.1109/ICONSTEM.2016.7560955","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560955","url":null,"abstract":"In recent years DG installations are gaining much importance due to growing environmental and economic issues. This paper focuses on optimal placement of DG generators in distribution networks to minimize the overall system losses. In the proposed work the identifying the DG locations can be found out using the Big Bang Big Crunch algorithm. Based on these identified locations the DG's are placed and load flow is run to identify the total losses of the network. The proposed method is applied to 33-Bus distribution network and the load flow used is forward sweeper method. The results obtained for the network using the proposed methodology are tabulated.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125945710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}