Skip to main content

Posts

Upload & Help Juniors

Your Project with enclosed PPT, Document & Videos. After few moments we will upload that content in our website in a friendly manner which will be useful for our juniors in (the) future. We know (that) we are facing problems when we go in (an) unknown paths with a desire of (the) "need to do". Feeling OK when our Junior starts his journey with (the) same desire from the ground point. Even-though as an experienced person (,) why can't (we) help our Junior by providing some useful and valuable information that we received in our journey! Make Junior Happy
Recent posts

Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage

Cloud storage has been in widespread use nowadays, which alleviates users’ burden of local data storage. Meanwhile, how to ensure the security and integrity of the outsourced data stored in a cloud storage server has also attracted enormous attention from researchers. Proofs of storage (POS) is the main technique introduced to address this problem. Publicly verifiable POS allows a third party to verify the data integrity on behalf of the data owner, it significantly improves the scalability of cloud service. Even much slower than typical network uploading speed, and thus it becomes the bottleneck of the setup phase of the POS scheme. In this article, we propose a new variant formulation called “Delegatable Proofs of Storage (DPOS)”.Then, we construct a lightweight privacy-preserving DPOS scheme, which on one side is as efficient as private POS schemes, and on the other side can support third party auditor and can switch auditors at any time, close to the fu

SECURE PRIVILEGE BASED MULTILEVEL ORGANIZATIONAL DATA (P-MOD) SHARING IN CLOUD COMPUTING

Cloud computing has changed the way enterprises store, access and share data. Big data sets are constantly being uploaded to the cloud and shared within a hierarchy of many different individuals with different access privileges. With more data storage needs turning over to the cloud, finding a secure and efficient data access structure has become a major research issue. In this paper, a Privilege-based Multilevel Organizational Data-sharing scheme (P-MOD) is proposed that incorporates a privilege- based access structure into an attribute based encryption mechanism to handle the management and sharing of big data sets. Our proposed privilege-based access structure helps reduce the complexity of defining hierarchies as the number of users grows, which makes managing healthcare records using mobile healthcare devices feasible. It can also facilitate organizations in applying big data analytics to understand populations in a holistic way. Security analysis shows t

CLUSTERING ALGORITHM TO DETECT BRAIN TUMOR FROM MRI IMAGES

In recent decades, human brain tumor detection has became one of the most demanding issue in medical science. A brain tumor is the unnatural growth of tissue that can interrupt the proper function of the brain. The early detection an recognition of the brain tumor is a very crucial as it saves the life of the humans. Brain tumor extraction an its analysis or challenging task in medical image processing because brain image an its structure is complicated that can be analyzed only by expert radiologists. MRI (Magnetic Resonance Imaging) has became a particularly useful medical diagnostic tool for diagnosis of brain and other medical images. The important challenge in image processing is the presence of noise during the image capture process which may result either under segmentation or over segmentation. Segmentation of an image is the separation or division of the image into different regions of similar feature. Segmentation plays an important role in the proce

SURVEILLANCE ROBOT USING ARDUINO MICROCONTROLLER

The human cannot record video safely in critical conditions and environments. These conditions and environments may be buildings were the fire breaks out, Areas with poisonous gases or harmful radiation and the places where there is an exchange of fire such as battlefield. The world is full of surveillance, which was monitored by enemy countries. Especially, the border region of any country was controlled and monitored by the own country for their safety purpose, for that many technologies was used to monitor the region.      Earlier, the surveillance was done by human, which causes many deaths by enemy country. To overcome the problem, the technology was introduced by surveillance with the help of robot. But now, the technology was upgraded, which made us to make a new robot for surveillance, in this project, this was controlled by using Arduino with wi-fi module. The camera was fixed and captures the video and monitored through it. The robot ca

DATA HIDING IN AUDIO STEGANOGRAPHY USING PARITY CODING, ZLIB COMPRESSION AND DISCRETE WAVELET TRANSFORM

Information hiding technique is a new kind of secret communication technology. Audio Steganography is a technique used to transmit hidden data by modifying an audio signal. To improve robustness and embedding capacity for audio steganography parity coding and zlib compression are used. In this, data is compressed by using Zlib Compression. It is a combination of LZSS[Lempel-Ziv-Storer-Szymanski] and Huffman Coding. The compressed data is embedded in the appropriate frame of audio file using DWT. Apply reverse process of embedding to the stego audio signal and finally the message is extracted from the audio signal. The performance of audio steganography can be analysed by using signal to noise ratio(SNR), mean square error(MSE), bit error rate(BER). See the PPT in the below scroll window : The Download link for the PPT  Download The Download link for the Document  Download This Project was uploaded by Geethavani . If anyone want extra details regarding to this project Contact us by se

Industrial Automation & Monitoring using LabVIEW Software for Milk Dairy.

This Project deals with the Industrial Embedded Automation for a milk exporting industry (Chilling Plant) using NI ELVIS II Prototyping board with the help of LABVIEW Software. The different sensor networks are settled or placed at a different places of milk processing areas in industry. By making them into a bunch of connection and they connected to NI ELVIS II Board. And by ELVIS board to the PC(Personal Computer). In PC, the LABVIEW Software is installed for the extracting the information that coming from ELVIS Board through USB port of PC .LABVIEW will shows in a graphical manner or with some 3D animated format. These information will displayed on the PC window as a notification and by Email with SMTP protocol which will be secure at all time. So, operator can respond quickly. See the PPT in the below scroll window : The Download link for the PPT  Download The YouTube link for the Project Video  Play