International Conference on Emerging Trends in Engineering and Technology Research (ICETETR-2019)

Paper Type :: Research Paper
Title :: An Energy Efficient Multifactor Authentication Scheme For eHealth Meets Security
Country :: India
Authors :: Atchaya ,.P || Dr. PriyaRadhikadevi .T
Page No. :: 01-04

In the EXISTING SYSTEM, Personal health record (PHR) is an emerging patient-centric in Cloud Computing Servers. However, there is no Security in keeping privacy concerns of the Patient & could be exposed to those third party servers and to unauthorized parties. In the PROPOSED MODEL, a novel patientcentric framework and a suite of mechanisms for data access control to PHRs stored in semi-trusted servers. We leverage attribute based encryption (ABE) techniques to encrypt each patient's PHR file. Our scheme also enables dynamic modification of access policies or file attributes, supports efficient on-demand user/attribute revocation and break-glass access under emergency scenarios.

[1]. Author Reza Curtmola† Juan Garay‡ Seny Kamara§ Rafail Ostrovsky "Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions".
[2]. Author –Jin "Privacy-preserving personal health record using multi-authority attribute based encryption with revocation ".
[3]. See discussions, stats, and author profiles for this publication January 2008"Efficient signature schemes supporting redaction, pseudonym mization, and data deidenti fication".
[4]. Frank Kargl, Institute of Media Informatics, Elaine Lawrence, Martin Fischer, Yen Yang Lim University of Technology Sydney Broadway 2007 NSW, "Security, Privacy and Legal Issues in Pervasive EHealth Monitoring Systems".
[5]. Upkar Varshney Published online: 12 July 2007# Springer Science + Business Media, LLC 2007 "Pervasive Healthcare and Wireless Health Monitoring".

Paper Type :: Research Paper
Title :: Optimal Service Providing In Cloud Computing With Performance Guarantee
Country :: India
Authors :: Elamathi.V || Dr. PriyaRadhikadevi .T
Page No. :: 05-08

As an effective and efficient way to provide computing resources and services to customers on demand, cloud computing has become more and more popular. From cloud service providers' perspective, profit is one of the most important considerations, and it is mainly determined by the configuration of a cloud service platform under given market demand. However, a single long-term renting scheme is usually adopted to configure a cloud platform, which cannot guarantee the service quality but leads to serious resource waste. In this paper, a double resource renting scheme is designed firstly in which short-term renting and long-term renting are combined aiming at the existing issues. This double renting scheme can effectively guarantee the quality of service of all requests and reduce the resource waste greatly............

[1]. K. Hwang, J. Dongarra, and G. C. Fox, Distributed and Cloud Computing. Elsevier/Morgan Kaufmann, 2015.
[2]. J. Cao, K. Hwang, K. Li, and A. Y. Zomaya, "Optimal multiserver configuration for profit maximization in cloud computing," IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 6, pp. 1087–1096, 2016.
[3]. A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, and I. Stoica, "Above the clouds: A berkeley view of cloud computing," Dept. Electrical Eng. and Comput. Sciences, vol. 28, 2017.
[4]. R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, "Cloud computing and emerging it platforms: Vision, hype, and reality for delivering computing as the 5th utility," Future Gener. Comp. Sy., vol. 25, no. 6, pp. 599– 616, 2016.

Paper Type :: Research Paper
Title :: Reducing Network Delay in an Energy Efficient Wireless Sensor Networks
Country :: India
Authors :: Prabha.M || Dr.Darly S S
Page No. :: 09-14

Millions of sensors are deployed to monitor the smart grid. They consume huge amounts of energy in the communication infrastructure. Therefore, the establishment of an energy-efficient protocol for sensor nodes is challenging and urgently needed. Recently the research focus on a promising routing scheme in wireless sensor networks (WSNs), is shifting towards duty-cycled WSNs in which sensors are sleep scheduled to reduce energy consumption. Energy-balanced clustering routing protocol based on task separation in wireless sensor networks. In this scheme, the network is firstly divided into clusters by using global information. And each of them has the same number of sensor nodes so as to balance the energy consumption of intra-cluster...........

Keywords - Quorum time slot adaptive condensing protocol, energy efficiency, Network delay Minimization, Mobile Sink, and Wireless Sensor Networks.

[1]. Stojmenovic, "Position based routing in ad hoc networks," IEEE Communication Magazine, vol. 40, no. 7, pp. 128–134, July 2002.
[2]. K. Seada, A. Helmy, and R. Govindan, "On the effect of localization errors on geographic face routing in sensor networks," in Proc. of IEEE/ACM IPSN, Berkeley, CA, Apr. 2004, pp. 71–80.
[3]. J. Gao, L. J. Guibas, J. Hershberger, L. Zhang, and A. Zhu, "Geometric spanners for mobile networks," IEEE J. Sel. Areas Commun., vol. 23, no. 1, pp. 174–185, Jan. 2005.
[4]. L. Blazevic, J.-Y. Le Boudec, and S. Giordano, "A location-based routing method for mobile ad hoc networks," IEEE Trans. Mobile Comput., vol. 4, no. 2, pp. 97–110, Mar. 2005.
[5]. Q. Huang, S. Bhattacharya, C. Lu, and G.-C. Roman, "FAR: Faceaware routing for mobicast in large-scale networks," ACM Transactions on Sensor Networks, vol. 1, no. 2, pp. 240–271, November 2005.

Paper Type :: Research Paper
Title :: Early Detection of Common Ct Imaging Signs of Lung Diseases
Country :: India
Authors :: M.Sandhiya || Mrs.S.Kalai Vani
Page No. :: 15-19

Frequently appearing image signs in lung CT images are used in diagnosing lung diseases. Pre- Processing is done using Gradient Anisotropic Diffusion Image Filter and Segmentation is done using Region Growing Filters. The features are extracted using Gray Level Co-occurence Matrix (GLCM).The feature values are classified using classifiers like Support Vector Machine(SVM), Neuro Fuzzy, Extreme Learning Machine (ELM).Optimal feature selection is done using Linear Discriminate Analysis.

[1]. Ozcift, Akin. "SVM feature selection based rotation forest ensemble classifiers to improve computer-aided diagnosis of Parkinson disease." Journal of medical systems 36.4 (2012): 2141-2147.
[2]. Gangeh, Mehrdad J., et al. "Multiple classifier systems in texton-based approach for the classification of CT images of lung." Medical Computer Vision. Recognition Techniques and Applications in Medical Imaging. Springer Berlin Heidelberg, 2011. 153- 163.
[3]. Korfiatis, Panayiotis D., et al. "Texture-based identification and characterization of interstitial pneumonia patterns in lung multidetector CT." Information Technology in Biomedicine, IEEE Transactions on 14.3 (2010): 675-680.
[4]. Aoki, Takatoshi, et al. "Peripheral Lung Adenocarcinoma: Correlation of Thin-Section CT Findings with Histologic Prognostic Factors and Survival 1." Radiology 220.3 (2001): 803-809.
[5]. Yang, Zhi-Gang, et al. "High-resolution CT analysis of small peripheral lung adenocarcinomas revealed on screening helical CT." American Journal of Roentgenology 176.6 (2001): 1399-1407.

Paper Type :: Research Paper
Title :: Secure Cloud Storage with Face Detection Technology
Country :: India
Authors :: M.Srudhi || V.Uma
Page No. :: 20-24

In any case, the capacity benefit gave by cloud server isn't completely trusted by clients. In an existing data are corrupted by the unauthenticated user with the help of the employees. In a normally the data are securely handled by the organization but some employees sold their access specifiers to the hackers for money. Due to this issue, the data are not safe. To overcome this, we can go for the advance safe technology. In this technique, the data are uploaded by the encryption format with video mode and the data are downloaded by the user with the help of face detection video mode when the data user accept the user request by the face detection video mode. Then only the data are shared from one place to another. In this technique, we are using the Encryption algorithm for share the data.

Keywords: secure cloud storage, regular language, searchable encryption, resist keyword guessing attack

[1]. Erl T, Cope R, Naserpour A. Cloud computing design patterns[M]. Prentice Hall Press, 2015.
[2]. Li Z, Dai Y, Chen G, et al. Toward network-level efficiency for cloud storage services[M]//Content Distribution for Mobile Internet: A Cloud-based Approach. Springer Singapore, 2016: 167-196.
[3]. Zhang Q, Yang L T, Chen Z, Li P. Privacy-preserving doubleprojection deep computation model with crowdsourcing on cloud for big data feature learning[J]. IEEE Internet of Things Journal, 2017, DOI: 10.1109/JIOT.2017.2732735.
[4]. Zhang Q, Yang L T, Chen Z, Li P. PPHOPCM: Privacy-preserving High-order Possibilistic c-Means Algorithm for Big Data Clustering with Cloud Computing[J]. IEEE Transactions on Big Data, 2017, DOI: 10.1109/TBDATA.2017.2701816.
[5]. Chang V, Ramachandran M. Towards achieving data security with the cloud computing adoption framework [J]. IEEE Transactions on Services Computing, 2016, 9(1): 138-151.

Paper Type :: Research Paper
Title :: Transaction Based E-Commerce Recommendation Using Collaborative Filtering
Country :: India
Authors :: D.Subashini || Mr.P.Rethina Sabapathi
Page No. :: 25-29

Product recommendations are a must-have feature for all ecommerce websites as they can drive sales, increase conversion rate and order value. The main aim of this project is to provide the recommendation to the e-commerce users based on user preferences. Customer will be segmented based on the transaction that they perform and based on the customer transaction detail, the user point of interest and cold products is identified in the e-commerce application and the product is recommended to the user using colloborative filtering approach.

[1]. Liu H., Kong X., Bai X., Wang W., Bekele T. M., and Xia F., "Context-based collaborative filtering for citation recommendation," IEEE Access, vol. 3, pp. 1695±1703, 2015.
[2]. A. L. A. Rodriguez, "Clustering by fast search and find of density peaks," Sci., vol. 344, no. 6191, pp. 1492–1496, Jun. 2014.
[3]. V. L. Migu_eis, A. S. Camanho, and J. F. E. Cunha, "Customer data mining for lifestyle segmentation," Expert Syst. Appl., vol. 39, no. 10, pp. 9359–9366, 2012.
[4]. F.-M. Hsu, L.-P. Lu, and C.-M. Lin, "Segmenting customers by transaction data with concept hierarchy," Expert Syst. Appl., vol. 39, no. 6, pp. 6221–6228, 2012.
[5]. H.-P. Kriegel, P. Kr€oger, J. Sander, and A. Zimek, "Density-based clustering," Wiley Interdisciplinary Rev.: Data Mining Knowl. Discovery, vol. 1, no. 3, pp. 231–240, 2011.

Paper Type :: Research Paper
Title :: OTPAAS—One Time Password As A Service Alternative Title: Multiple Service Authentications With Cloud OTP As A Service
Country :: India
Authors :: Mr B.Anbarasu(ME) || Anusuya S
Page No. :: 30-35

Conventional password-based authentication is considered inadequate by users as many online services started to affect each other. Online credentials are used to recover other credentials and complex attacks are directed to the weakest one of many of these online credentials. As researchers are looking for new authentication techniques, one time passwords, which is a two-factor authentication scheme, looks like a natural enhancement over conventional username/password schemes. The manuscript places the OTP verifier to the cloud to ease adoption of its usage by cloud service providers. When the OTP verifier is placed on the cloud as a service, other cloud service providers could outsource their OTP deployments as well as cloud users could activate their respective account on the OTP provider on several cloud services............


Paper Type :: Research Paper
Title :: Beacon Based Smart Shoping System
Country :: India
Authors :: J.Dedeepya || Mrs.V.Uma
Page No. :: 36-39

A shopping system is said to be efficient which provides a better user experience. IOT plays a main role in implementing an efficient shopping system. Location of Everything (LoE) system plays a key role to improve most services in IoT area. On the other hand, data mining techniques are essential analyses when we have big data from IoT platforms. Indeed, integration of location-based methods and data mining analysis process can make a smart system service for IoT scenarios and applications. For this purpose, we design a smart shopping platform including four components, location of everything component, data collection component, data filtering/analyzing component and data mining component. Then a novel accurate localization scheme named "location orbital" is developed that estimates the current location of mobile objects (users or everything) based on both current and the previous locations.

[1]. Impact of static trajectories on localization in wireless sensor networks Javad Rezazadeh, Marjan Moradi, Abdul Samad Ismail, Eryk Dutkiewicz, 2014
[2]. Efficient localization via Middle-node cooperation in wireless sensor networks Javad Rezazadeh, Marjan Moradi, Abdul Samad Ismail,2015
[3]. Acceptance of Smartphone-Based Mobile Shopping: Mobile Benefits, Customer Characteristics, Perceived Risk and the Impact of Application Context Marco Hubert, Markus Blut, Christian Brock, Christof Backhaus, Tim Eberhardt
[4]. A survey of Internet-of-Things: Future Vision, Architecture, Challenges and Services Dhananjay Singh, Yongin, Gaurav Tripathi, Antonio J. Jara,2014.
[5]. A Reverse Localization Scheme for Underwater Acoustic Sensor Networks Marjan Moradi, Javad Rezazadeh and Abdul Samad Ismail,2012

Paper Type :: Research Paper
Title :: A Joint Optimization Approach To Security And Insurance Management System
Country :: India
Authors :: S.Gomathi || Mr.R.Prem Kumar
Page No. :: 40-43

In this paper we have presented a joint approach to security and cyber insurance provisioning in the cloud. Using a stochastic optimization, we have presented a method of optimally provisioning both services in the face of uncertainty regarding future pricing, incoming traffic and cyber attacks. Thus, an application may guard against attacks by provisioning security services from providers such as Avast and Trend Micro. These services may take various forms, such as secure data storage, identity and access management (IAM), and intrusion detection services to screen incoming traffic. And then cyber insurance is used to provide explicit cover in the event that malicious activity leads to financial loss. Insurance coverage may be first- or third-party with such as theft of money and digital assets, business interruption, and cyber extortion, privacy breaches, loss of third-party data.

[1]. McAfee, "Net Losses: Estimating the Global Cost of Cybercrime," Center for Strategic and International Studies, Economic Impact of Cybercrime II, Jun. 2014.
[2]. (2016) Identity theft resource center data breach reports. [Online]. Available:
[3]. (2016) A bold approach to cyber risk management. [Online]. Available: Publications/Speechesand-Monetary-Policy-Statements/Speeches/2016/A-Bold-Approach-to-Cyber-Risk-Management.aspx
[4]. (2016) Insurance 2020 beyond: Reaping the dividends of cyber resilience. [Online].Available:
[5]. (2016) Mcafee security-as-a-service solutions. [Online]. Available: Products/ProductsLanding.aspx

Paper Type :: Research Paper
Title :: Affect Analysis Of User Review To Determine The Topic Using NLP
Country :: India
Authors :: S.Sherine Monisha || Mr B.Anbarasu, M.E.
Page No. :: 44-49

The rapid increase in the number of e-commerce has given rise to a significant amount of user generated text, which contains good information about consumer preferences and opinion. However, supervised topic modeling remains a challenging problem. First, most supervised topic models require prespecifying the number of topics a priori . Such specification may result in model misspecification when the specified numbers of topics misrepresent the true underlying topic structure. For example, customer reviews for new products may contain unseen topics about new features.

[1]. D. Duan, Y. Li, R. Li, R. Zhang, X. Gu, and K. Wen, "LIMTopic: A framework of incorporating link based importance into topic modeling," IEEE Trans. Knowl. Data Eng., vol. 26, no. 10, pp. 2493–2506, Oct. 2014.
[2]. A. Abbasi, H. Chen, S. Thoms, and T. Fu, "Affect analysis of web forums and blogs using correlation ensembles," IEEE Trans.Knowl. Data Eng., vol. 20, no. 9, pp. 1168–1180, Sep. 2008.
[3]. A. Abbasi, S. France, Z. Zhang, and H. Chen, "Selecting attributes for sentiment classification using feature relation networks," IEEE Trans. Knowl. Data Eng., vol. 23, no. 3, pp. 447–462, Mar. 2011.
[4]. Y. Gao, Y. Xu, and Y. Li, "Pattern-based topics for document modelling in information filtering," IEEE Trans. Knowl. Data Eng., vol. 27, no. 6, pp. 1629–1642, Jun. 2015.

Paper Type :: Research Paper
Title :: Designing Home Inverter Using Cascaded Current Fed Push Pull Converter and SPWM Inverter
Country :: India
Authors :: Mrs.R.Suganya || Evanjelin.J
Page No. :: 50-54

In order to eliminate the low frequency transformer in inverter, cascaded current fed push pull converter with voltage doubler circuit is used, which directly gives step-up DC voltage to the inverter input. This transformer has the drawback of providing low direct input voltage and it is large in size, heavy weight and high cost. By using inverter it increases the efficiency and gives the maximum output voltage In this project, Inductive motor appliances is driven by inverter which is used in residential purposes (AC fan, light). The control mechanism used in inverter is Sine-Pulse Width Modulation (SPWM). The push pull converter stage provides electrical isolation between battery and inverter output. The boosted DC voltage is inverted by SPWM. Microcontroller is used to control the gate pulses of switches in converter.

Keywords: Current fed push pull converter, DC/AC inverter, Sine pulse width modulation (SPWM), Microcontroller.

[1]. D. R. Nayanasiri, D. M. Vilathgamuwa, D. L. Maskell and G. F. H. Beng, "Soft switching single inductor current-fed push-pull converter for PV applications," IECON 2014 - 40th Annual Conference of the IEEE Industrial Electronics Society, Dallas, TX, 2014, pp. 5589-5594.
[2]. S. D. Nugraha, O. A. Qudsi, D. S. Yanaratri, E. Sunarno and I. Sudiharto, "MPPT-current fed push pull converter for DC bus source on solar home application," 2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE), Yogyakarta, 2017, pp. 378-383.
[3]. M. Shahbazi, M. Mohamadian and A. Y. Varjani, "Parallel operation of series-parallel Uninterruptible Power Supplies," 2016 7th Power Electronics and Drive Systems Technologies Conference (PEDSTC), Tehran, 2016, pp. 268-272.
[4]. A. Lahyani, P. Venet, A. Guermazi and A. Troudi, "Battery/Super capacitors Combination in Uninterruptible Power Supply (UPS)," in IEEE Transactions on Power Electronics, vol. 28, no. 4, pp. 1509-1522, April 2013.
[5]. J. M. Shen, H. L. Jou and J. C. Wu, "Transformerless single-phase three-wire line-interactive uninterruptible power supply," in IET Power Electronics, vol. 5, no. 9, pp. 1847-1855, November 2012.