Volume-7 Issue-2


Version
Download 14
Total Views 187
Stock
File Size 4.00 KB
File Type unknown
Create Date March 30, 2018
Last Updated November 23, 2018
Download

Download Abstract Book

S. No

Volume-7 Issue-2, May 2018, ISSN: 2277-3878 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd.

Page No.

1.

Authors:

Vineet Anshuman

Paper Title:

Inter-Carrier SDN Orchestration–“The Third-Generation Future Network”

Abstract: There is massive transformation in data communications network which is pushing service providers to re-think connectivity. With OTT (Over the top players) eating into revenues of the telcos, the telcos are rethinking of a future network that could deliver self-service, ON demand and seamless cloud connectivity for their customers. The future network is a network that can deliver Orchestrated network services to enable digital transformation in a seamless fashion. This will include Network itself being delivered as a service through an automated, orchestrated, managed software based service orchestrator.

Keywords: The Need for Future Network.

References:

  1. http://www.opennetworking.org
  2. opendaylight.org
  3. http://www.mef.net/
  4. linuxfoundation.org

1-3

http://blueeyesintelligence.org/2checkout_download.html

2.

Authors:

Omkar Shivaji Mohite, Aditya Vilas Kumbhar, Mangesh Dhananjay Kulkarni, Ajit Vasant Ghadage, Kale R.U.

Paper Title:

Fault Current Limitation by using Series Transformer

Abstract: This paper related to fault current limitation in radial distribution of network. In order to control fault current, primary winding of an isolation transformer is connected in series with phase line and secondary winding is connected to inductive coil (reactor), which is connected in parallel with a bypass switch. This is of parallel insulated gate bipolar transistor (IGBT). This system can improve the power quality of power system. This system also gives un- interrupted power supply. The magnitude of the current is reduced due to reactor connected in secondary winding. Because of simple structure cost is very low. This system is designed for single phase 230 volts, 50Hz ac supply.

Keywords: Isolation Transformer, Arduino UNO, Reactor, uninterruptable supply. 

References:

1. M. T. Hagh and M. Abapour, “DC reactor type transformer inrush current limiter,” IET Elect. Power Appl., vol. 1, no. 5, pp. 808–814, Sep. 2007.
2. IEEE Paper 2015 by Hamid Radmanesh “Series Transformer-Based Solid State Fault Current Limiter”
3. www.Electronics foryou.com.
4. “Power System & its faults” book by J.B. Gupta

4-6

http://blueeyesintelligence.org/2checkout_download.html

3.

Authors:

Carmen Georgeta Dumitrache

Paper Title:

Topography and Cadastral Applications

Abstract: Surveying or land surveying is the technique, profession and science to determine the exact position of terrestrial or three-dimensional points and distances and angles between them. These points are usually on the Earth's surface, and are often used to establish land maps and boundaries ownership or governmental purposes. In this paper I will make some analyze about topography and cadastral applications.

Keywords: Land, Cadaster, Topography, Surface Area

References:

  1. Johnson, Anthony, Solving Stonehenge: New Key to an Ancient Enigma. (Thames & Hudson, 2008) ISBN 978-0-500-05155-9
  2. National Cooperative Highway Research Program: collection, processing and integration of GPS data in GIS, p. 40. Published by Transport Research Board, 2002 ISBN 0309069165, 9780309069168
  3. Toni Schenk1, Suyoung Seo, Beata Csatho Study Precision Airborne Laser Scanning Data with Photogrammetry, p. 118
  4. Thomas Kibblewhilte şi Sara J Wilkinson, Measurement units: a phenomenon in the UK or profession with genuine global appeal? International Federation of Surveyors, 2004. Retrieved December 13, 2011.
  5. http://www.surveyorsinfrance.com
  6. A system test history Rectangular Albert C. White, 1983 Pub: Washington, DC: US Department of Interior, Bureau of Land Management: For sale by the Supt. de Docs, USGPO.

7-10

http://blueeyesintelligence.org/2checkout_download.html

4.

Authors:

Eesha Mishra, Archita Bhatnagar

Paper Title:

Wanna Cry Ransom Ware: Evaluating Risk & Implementing Security Measures

Abstract: Incidents of wannacry has been escalated over 150 countries, including the United States, United Kingdom, Spain, Russia, Taiwan, France, and Japan. The software can run in as many as 27 different languages, it is important to understand to what extent cyber attacks can be predicted . There are many related and ongoing research available on cyber security threat, but wannacry ransomware attack has become one of the main security concern now a days. This paper shall evaluate the securitymeasures to secure victim's pc from wannacry ransomware attack and analyze the risk from this threat.

Keywords: Ransom Ware, Wannacry.

References:

  1. http://www.cyberswachhtakendra.gov.in/alerts/wannacry_ransomware.html
  2. https://www.avast.com/faq.php?article=AVKB50
  3. https://dl.acm.org/citation.cfm?id=3053035

11-12

http://blueeyesintelligence.org/2checkout_download.html

5.

Authors:

Namit Mohale, Sourabh Gupta, Shubham Goyal, Ruchi Goel

Paper Title:

iG Protection (Data Encryption using Gestures)

Abstract: In today’s world, unimaginable bytes of data is being generated every second around the globe. A lot of this data is private and confidential to individuals or organizations, and they do not wish for others to access this data. They might keep the data safe in portable drives, but as soon as the data gets connected to a network or is being transferred through a network, it becomes highly vulnerable to threats of it being stolen by hackers, as network has the biggest loopholes as compared to rest when it comes to security. The data is also vulnerable to being physically stolen. Depending on the delicacy of data, it could be highly misused for all you know it could be the nuclear launch codes. Here we propose a method to not only encrypt the data for protection, but to take it to a different level. Whilst data encryption algorithms auto-generate secret keys that are used to encrypt the data, we propose in our method to use hand gestures to generate to generate the key, each key being unique to a certain set and sequence of hand gestures, to be used as encryption key in encryption algorithm. Hence we are using Blowfish algorithm for data encryption and Open CV for gesture recognition. Blowfish being a symmetric key algorithm, the same set of gestures that were used to encrypt the data would be used to decrypt it.

Keywords: Data Encryption, Blowfish Algorithm, Gesture Recognition, Open CV, Artificial, Intelligence, Symmetric Key Encryption, Decryption.

References:

  1. Kari Pulli, Anatoly Baksheev, Kirill Kornyakov, Victor Eruhimov, “Realtime Computer Vision with OpenCV”, ACM New York, 2012
  2. Gary Bradski, Adrian Kaehler, “Learning OpenCV”, Willow Garage, ICRA 2010 ROS Tutorial
  3. Tanjyot Aurora, Parul Arora, “Blowfish Algorithm”, IJCSCE, 2013
  4. Bill Gatliff, “Encrypting data with Blowfish Algorithm”, 2003
  5. Schneier, Bruce, “Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition”, New York, NY: John Wiley & Sons, 1995

13-16

http://blueeyesintelligence.org/2checkout_download.html