This document proposes a key-aggregate searchable encryption (KASE) scheme to enable scalable and flexible data sharing in cloud storage. KASE allows a data owner to generate a single aggregate encryption key that can be used by authorized users to search over any number of encrypted files, avoiding the need to distribute multiple keys. The scheme consists of seven algorithms for system setup, key generation, encryption, key extraction, trapdoor generation, trapdoor adjustment, and trapdoor testing. It provides a secure and efficient way for flexible data access delegation in cloud storage.
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...IRJET Journal
The document summarizes a proposed system for multi-keyword search over encrypted data in cloud computing. It aims to retrieve the top k most relevant documents matching a user's query while preserving data privacy. The system uses Lucene indexing to build an index of keywords extracted from outsourced documents. When documents are added or removed, the index is updated. A top-k query technique ranks document relevance and returns the top matching results. Encryption is done using the Blowfish algorithm before documents are outsourced to the untrusted cloud server. This allows efficient search over the encrypted data based on keyword queries.
This document discusses searchable encryption systems and the current state of data security. It covers common uses of encryption like SSL and describes limitations of early encryption methods like Yao's Garbled Circuits. The document then focuses on fully homomorphic encryption, which allows computations on encrypted data without decrypting it first. While promising, homomorphic encryption has limitations in speed and potential security issues that require more research to address.
Key aggregate searchable encryption (kase) for group data sharing via cloud s...LeMeniz Infotech
Key aggregate searchable encryption (kase) for group data sharing via cloud storage
Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Visit : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Key aggregate searchable encryption (kase) for group data sharing via cloud s...CloudTechnologies
We are the company providing Complete Solution for all Academic Final Year/Semester Student Projects. Our projects are
suitable for B.E (CSE,IT,ECE,EEE), B.Tech (CSE,IT,ECE,EEE),M.Tech (CSE,IT,ECE,EEE) B.sc (IT & CSE), M.sc (IT & CSE),
MCA, and many more..... We are specialized on Java,Dot Net ,PHP & Andirod technologies. Each Project listed comes with
the following deliverable: 1. Project Abstract 2. Complete functional code 3. Complete Project report with diagrams 4.
Database 5. Screen-shots 6. Video File
SERVICE AT CLOUDTECHNOLOGIES
IEEE, WEB, WINDOWS PROJECTS ON DOT NET, JAVA& ANDROID TECHNOLOGIES,EMBEDDED SYSTEMS,MAT LAB,VLSI DESIGN.
ME, M-TECH PAPER PUBLISHING
COLLEGE TRAINING
Thanks&Regards
cloudtechnologies
# 304, Siri Towers,Behind Prime Hospitals
Maitrivanam, Ameerpet.
Contact:-8121953811,8522991105.040-65511811
cloudtechnologiesprojects@gmail.com
http://cloudstechnologies.in/
IRJET- Secure File Storage on Cloud using CryptographyIRJET Journal
This document summarizes a research paper that proposes a secure file storage system on the cloud using cryptography. It discusses how the proposed system would split files into multiple chunks and store them across different cloud servers in an encrypted format to preserve confidentiality, integrity, and availability of data. The document provides background on cloud computing benefits and security challenges. It then describes the proposed system's use of symmetric and asymmetric encryption algorithms like AES, DES, and RC2 to encrypt chunks before storage.
This document presents a system for secure ranked keyword search over encrypted cloud data. It aims to allow data owners to outsource encrypted data to the cloud while enabling authorized users to efficiently search the data. The system uses an encrypted index and relevance scores to return search results in ranked order based on relevance, without revealing keywords or data contents. It proposes algorithms for building the encrypted index, calculating relevance scores, and mapping values to enable ranked search. The system is designed to achieve security of data and queries while providing efficient search functionality on outsourced encrypted cloud data.
KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...Nexgen Technology
bulk ieee projects in pondicherry,ieee projects in pondicherry,final year ieee projects in pondicherry
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
The document proposes a system for multi-keyword ranked search over encrypted cloud data while preserving privacy. It addresses limitations in previous systems that allowed single keyword search or did not consider privacy. The proposed system uses asymmetric key encryption, a block-max index, and dynamic key generation to allow efficient retrieval of relevant encrypted data from the cloud without security breaches. It involves three parts: (1) a server that encrypts and stores data in the cloud and sends decryption keys; (2) a cloud server that handles search requests, ranks results, and responds; and (3) users that request data from the cloud server.
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyIRJET Journal
This document summarizes 6 research papers related to security in mobile cloud computing. It discusses issues like data integrity, authentication, and access control when mobile devices' data and computations are integrated with cloud computing. Several cryptographic techniques are described that can help ensure privacy and security, such as proxy provable data possession, attribute-based encryption, and proxy re-encryption. The document concludes that while mobile cloud computing provides benefits, security of user data shared in the cloud is the main challenge, and various frameworks have been proposed but no single system addresses all security aspects.
Privacy preserving multi-keyword ranked search over encrypted cloud dataIGEEKS TECHNOLOGIES
This document proposes a system called privacy-preserving multi-keyword ranked search over encrypted cloud data (MRSE). Existing searchable encryption systems only support single-keyword or boolean keyword search without result ranking. The proposed MRSE system allows a user to search for multiple keywords and returns documents ranked by relevance. It establishes privacy requirements and uses an efficient "coordinate matching" semantic to quantify document similarity based on keyword matches. The system architecture includes modules for data owners to encrypt and upload files, for users to search and download encrypted files, and for ranking search results.
Define and solve the problem of effective and secure ranked keyword search over encrypted cloud data.
Ranked search greatly enhances system usability by returning the matching files in a ranked order regarding to
certain relevance criteria (e.g., keyword frequency), thus making one step closer towards practical deployment of
privecy- preserving data hosting services in Cloud Computing. To improve the security for the data retrieval from
cloud environment, the One Time Password is used. The One Time Passwod is sent to the user mail to view the
original data. The Model exhibits the Querying Process over the cloud computing infrastructure using Secured and
Encrypted Data access and Ranking over the results would benefit the usre for the getting better results.
key aggregate cryptosystem for scalable data sharing in cloud storage abstractSanjana Yemajala
This document proposes a key-aggregate cryptosystem (KAC) for securely and flexibly sharing encrypted data in cloud storage. KAC allows a data owner to encrypt files under different class identifiers and generate a single aggregate key encompassing decryption power for any chosen ciphertext class set. This aggregate key can be sent through limited secure channels like email, addressing disadvantages of traditional approaches that require sending many distinct secret keys. The proposed solution could help Alice securely share specific encrypted files on Dropbox with Bob by sending him a single aggregate key.
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDNaseem nisar
1. EASiER proposes an encryption-based access control architecture for social networks that uses attribute-based encryption. It introduces a minimally trusted proxy to enable efficient revocation without reissuing keys.
2. Multi-authority attribute based encryption schemes allow multiple authorities to issue secret keys for attributes. This is useful in applications with attributes managed by different authorities.
3. Existing social network privacy architectures focus on encryption-based access control but do not address efficient revocation of users or attributes. EASiER addresses this issue.
Key aggregate cryptosystem for scalable data sharing in cloud storage using pairng based cryptography. We used JPBC tool to implement Key Aggregate cryptosystem.
This document discusses securely mining data stored in the cloud using encryption techniques. It proposes using k-means clustering on the data, then encrypting it with AES. Homomorphic encryption is then performed using Paillier cryptosystem to allow computations on the encrypted data while preserving privacy. The key advantages discussed are that this approach allows for secure data mining and analysis in the cloud without revealing private information to unauthorized parties. It also analyzes related work on encryption and homomorphic techniques for secure cloud computing and big data analysis.
This document summarizes a research paper that proposes a security architecture for cloud computing that dynamically configures cryptographic algorithms and keys based on security policies and inputs like network access risk and data sensitivity. The architecture aims to improve security while reducing costs by only using the necessary level of encryption for each situation. It describes using the Blowfish algorithm instead of AES and adjusting the key size from 128 to 448 bits depending on factors like network type and data size. Results show Blowfish has better performance than AES, especially with larger keys on larger amounts of data. The goal is to provide flexible, efficient security tailored to each user's needs.
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Editor IJMTER
The advent of cloud computing, data owners are motivated to outsource their complex
data management systems from local sites to commercial public cloud for great flexibility and
economic savings. But for protecting data privacy, sensitive data has to be encrypted before
outsourcing.Considering the large number of data users and documents in cloud, it is crucial for
the search service to allow multi-keyword query and provide result similarity ranking to meet the
effective data retrieval need. Related works on searchable encryption focus on single keyword
search or Boolean keyword search, and rarely differentiate the search results. We first propose a
basic MRSE scheme using secure inner product computation, and then significantly improve it to
meet different privacy requirements in two levels of threat models. The Incremental High Utility
Pattern Transaction Frequency Tree (IHUPTF-Tree) is designed according to the transaction
frequency (descending order) of items to obtain a compact tree.
By using high utility pattern the items can be arranged in an efficient manner. Tree structure
is used to sort the items. Thus the items are sorted and frequent pattern is obtained. The frequent
pattern items are retrieved from the database by using hybrid tree (H-Tree) structure. So the
execution time becomes faster. Finally, the frequent pattern item that satisfies the threshold value
is displayed.
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online
15.secure keyword search and data sharing mechanism for cloud computingVenkat Projects
The document proposes a ciphertext-policy attribute-based mechanism called CPAB-KSDS that allows encrypted data stored in the cloud to be securely searched and shared. Existing solutions only support either search or sharing of encrypted data, not both. CPAB-KSDS supports both attribute-based keyword search and data sharing while also enabling keyword updates during sharing without interacting with the private key generator. The system architecture requires a processor, 40GB hard disk, 2GB RAM, Windows OS, Java/J2EE coding, MySQL database, and Netbeans IDE.
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET Journal
This document discusses various cryptographic techniques for securing data shared over cloud computing. It begins with an introduction to cloud computing and the types of cloud services. It then discusses some critical threats to cloud security like unauthorized access, lack of integrity checks, and denial of service attacks. The document analyzes popular encryption algorithms like RSA, AES, DES, Blowfish and IDEA that can be applied for cloud data security. It provides details on how each algorithm works and compares their characteristics. The document concludes that a multilevel security architecture applying multiple encryption algorithms is needed to securely transmit data over the cloud.
IRJET- Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET Journal
This document discusses cryptography techniques for ensuring security in cloud computing. It begins by providing background on cloud computing and noting that privacy and security are key concerns. It then discusses how cryptography can address these concerns through various encryption algorithms. Specifically, it outlines symmetric key algorithms like AES, DES, and 3DES that use a single private key for encryption and decryption. It also briefly mentions asymmetric key algorithms like RSA that use public/private key pairs. The document focuses on how properly implementing cryptography through these algorithms can help secure data storage, transmission, and access in cloud environments.
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATAIRJET Journal
The document proposes a new deduplication system that supports endorsed duplicate check and separates the record structure and substance. It utilizes AES calculation to encrypt information for security. MD5 and sha1 calculations are utilized to recognize duplicate records. The private cloud is outfitted with mystery validation to give more prominent security. The proposed framework separates record structure and substance and underpins endorsed duplicate check to give proficient deduplication while ensuring information security in the cloud.
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataIRJET Journal
This document discusses a proposed scheme for secure and dynamic multi-keyword ranked search over encrypted cloud data. The scheme allows data owners to encrypt and outsource their data to the cloud while still enabling authorized users to perform keyword searches. It utilizes a tree-based index structure and "Greedy Depth-first Search" algorithm to provide efficient multi-keyword ranked search. The k-nearest neighbor algorithm is used to encrypt the index and query vectors while still allowing accurate relevance scoring of encrypted results. Phantom keywords are added to blind search results and prevent statistical attacks. The scheme also enables dynamic updates like deletion and insertion of files by the data owner. Experimental results demonstrate the performance of the proposed scheme.
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET Journal
This document proposes a method for secure sharing of personal data on cloud storage using key aggregation and cryptography. It discusses how traditional cloud storage raises privacy and security issues due to outsourcing of data. The proposed method uses key-aggregate encryption to encrypt data files and generate a single aggregate key, reducing the need to exchange keys for individual files. This allows data owners to selectively and securely share a large number of encrypted files with data users by distributing the aggregate encryption key. When data users search for files, a trapdoor is generated and sent to the cloud for searching over authorized encrypted files. The method aims to enable secure, efficient and flexible sharing of encrypted personal data on cloud storage.
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET Journal
This document discusses using homomorphic encryption to securely store and process data in the cloud. It begins with an introduction to cloud computing and data security challenges. The proposed system would encrypt user data before transferring it to the cloud server using homomorphic encryption. This allows computations to be performed on the encrypted data without decrypting it first, protecting data privacy. The document reviews related work on authentication schemes and secure file storage using encryption. It presents the proposed system architecture and concludes that homomorphic encryption can help address cloud computing security issues by allowing operations on encrypted user data.
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET Journal
1) The document proposes a Secure Data Sharing in Clouds (SeDaSC) methodology for secure data sharing in cloud computing.
2) SeDaSC provides data confidentiality and integrity, access control, secure data sharing without reencryption, protection from insider threats, and forward/backward access control.
3) The methodology encrypts files with a single encryption key and distributes key shares to users and a cryptographic server to counter insider threats while allowing authorized access.
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET Journal
1) The document proposes a Secure Data Sharing in Clouds (SeDaSC) methodology for secure data sharing in cloud computing.
2) SeDaSC provides data confidentiality and integrity, access control, secure data sharing without reencryption, protection from insider threats, and forward/backward access control.
3) It encrypts files with a single key, and generates two shares of the key - one given to the user and the other stored by a trusted third party, to prevent insider threats from malicious users.
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...IRJET Journal
This document proposes a secure tree-based search scheme for encrypted cloud data that supports multi-keyword ranked search and dynamic operations like deletion and insertion of documents. It combines the vector space model and TF-IDF model to construct a tree-based index and propose a "Greedy Depth-first Search" algorithm for efficient multi-keyword search. The scheme uses PEKS to encrypt the file index and queries while ensuring accurate relevance scoring between encrypted data. It aims to overcome security threats to keyword privacy in existing searchable encryption schemes and provide flexible dynamic operations on document collections in the cloud.
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingIRJET Journal
This document summarizes a proposed lightweight secured data sharing scheme for cloud computing. It discusses issues with securely sharing data over cloud systems, including lack of control over data and potential for exploitation. The proposed system uses a combination of Attribute-Based Encryption (ABE) and Byte Rotation Encryption to encrypt data before uploading it to the cloud. This allows users to securely store and share encrypted data. The system aims to work efficiently on devices with limited resources by encrypting data in parallel threads. The encrypted data is decrypted using a randomly generated key that is shared only with authorized users.
Implementation of De-Duplication AlgorithmIRJET Journal
The document describes an implementation of a data de-duplication algorithm using convergent encryption. It discusses how data de-duplication works to reduce storage usage by identifying and removing duplicate copies of data. Convergent encryption is used, which generates the same encrypted form of a file from the original file's hash, allowing duplicate encrypted files to be de-duplicated while preserving privacy. The algorithm divides files into blocks, generates hashes for each block, and encrypts the file blocks using the hashes as keys. When a file is uploaded, its hash is checked against existing hashes to identify duplicates, with duplicates replaced by pointers to the stored copy. This allows efficient de-duplication while encrypting data for privacy and security when stored
IRJET- Storage Security in Cloud ComputingIRJET Journal
This document summarizes a research paper that proposes a dual encryption method for securing data in cloud computing. The method first encrypts data files using the AES symmetric encryption algorithm, producing ciphertext-1. It then encrypts ciphertext-1 again using the Blowfish asymmetric encryption algorithm with a randomly generated key, producing ciphertext-2. This double encryption makes the data more secure, as an attacker would need to decrypt both ciphers to access the original content. The method aims to protect sensitive data from hackers and provide stronger security for cloud storage compared to single encryption algorithms.
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageIJERA Editor
Cloud computing is new way of economical and efficient storage. The single data mart storage system is a less
secure because data remain under a single data mart. This can lead to data loss due to different causes like
hacking, server failure etc. If an attacker chooses to attack a specific client, then he can aim at a fixed cloud
provider, try to have access to the client’s information. This makes an easy job of the attackers, both inside and
outside attackers get the benefit of using data mining to a great extent. Inside attackers refer to malicious
employees at a cloud provider. Thus single data mart storage architecture is the biggest security threat
concerning data mining on cloud, so in this paper present the secure replication approach that encrypt based on
biocrypt and replicate the data in distributed data mart storage system. This approach involves the encryption,
replication and storage of data
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...Editor IJCATR
The Data sharing is an important functionality in cloud storage. In this article, we show how to securely, efficiently, and
flexibly share data with others in cloud storage. We describe new public-key cryptosystems which produce constant-size ciphertexts
such that efficient delegation of decryption rights for any set of ciphertexts are possible. The novelty is that one can aggregate any set
of secret keys and make them as compact as a single key, but encompassing the power of all the keys being aggregated. In other
words, the secret key holder can release a constant-size aggregate key for flexible choices of ciphertext set in cloud storage, but the
other encrypted files outside the set remain confidential. This compact aggregate key can be conveniently sent to others or be stored in
a smart card with very limited secure storage. We provide formal security analysis of our schemes in the standard model. We also
describe other application of our schemes. In particular, our schemes give the first public-key patient controlled encryption for flexible
hierarchy, which was yet to be known.
Revocation based De-duplication Systems for Improving Reliability in Cloud St...IRJET Journal
1) The document discusses improving the reliability of deduplication systems in cloud storage by implementing user revocation along with Shamir's secret sharing scheme and ramp secret sharing scheme.
2) Deduplication systems aim to eliminate redundant data and achieve single instance storage, but reliability and security are ongoing issues when users are revoked.
3) The paper proposes using Shamir's secret sharing algorithm and ramp secret sharing scheme for encryption to maintain reliability when users are removed by allowing the data to be rechecked for duplication.
An Approach towards Shuffling of Data to Avoid Tampering in CloudIRJET Journal
This document proposes an approach to secure data stored in the cloud by using data shuffling, access control policies, and deduplication. It discusses encrypting user data using AES before uploading it to the cloud. An administrator can control the shuffling of encrypted data between servers at regular intervals to avoid tampering. Access control policies require authorized users to authenticate with a secret key before performing file operations. Deduplication prevents duplicate files from being stored to reduce storage usage by hashing and comparing file contents. The proposed approach aims to enhance security, prevent data tampering and duplication, and efficiently use cloud storage.
IRJET - Virtual Data Auditing at Overcast EnvironmentIRJET Journal
This document discusses a proposed scheme for remote data integrity checking of files stored in the cloud while hiding sensitive confidential information. The scheme works as follows:
1) A user hides confidential data blocks in an original file and generates signatures before uploading the blinded file to a sanitizer.
2) The sanitizer cleans up the blinded data blocks to remove confidential information and converts the signatures to be valid for the cleaned file.
3) The cleaned file and signatures are then uploaded to the cloud. A third party auditor can remotely check the integrity of the stored data while the confidential information is protected. The scheme supports data sharing in the cloud while maintaining privacy and allowing for integrity audits.
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudIRJET Journal
This document reviews key-based encryption schemes for secure data sharing on cloud. It discusses how traditional encryption techniques are not suitable for large scale data sharing due to complex key management. A key-based encryption scheme is proposed that allows a data owner to generate an aggregate encryption key and submit a single aggregate trapdoor for keyword search. This reduces key management complexity and the number of trapdoors needed compared to traditional techniques. The proposed scheme uses seven polynomial algorithms for security including key generation, encryption, key extraction and trapdoor generation. It aims to provide an effective solution for secure and scalable data sharing using cloud storage.
IRJET- Protection of Personal Data on Distributed Cloud using BiometricsIRJET Journal
This document proposes a system to securely store personal user files on distributed cloud servers using biometric authentication. The system splits user files into encrypted fragments that are stored across multiple cloud storages like AWS and Google Drive. When the user wants to access a file, their fingerprint is authenticated and the encrypted fragments are retrieved from the clouds, decrypted using Rijndael encryption, and merged back into the original file which is then downloaded to the user. The system aims to improve security over storing files on a single cloud by distributing encrypted fragments across multiple clouds and requiring biometric authentication to access the decrypted files.
IRJET- Key Exchange Privacy Preserving Technique in Cloud ComputingIRJET Journal
This document proposes a key exchange privacy preserving technique for cloud computing using Diffie-Hellman algorithm. It discusses issues with existing cloud security methods like data encryption. The proposed system uses Diffie-Hellman key exchange between users and cloud database to securely store and access files. When a user wants to store or access a file, prime numbers are used to generate secret keys for the user and database. These keys are exchanged and matched using Diffie-Hellman to authenticate the user before allowing file operations. This approach securely shares secret keys to preserve privacy in cloud storage and transfers without leaking sensitive user information. The system was implemented using Java and Amazon Web Services for cloud storage and database.
Similar to IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage (20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
This study compares the use of Stark Steel and TMT Steel as reinforcement materials in a two-way reinforced concrete slab. Mechanical testing is conducted to determine the tensile strength, yield strength, and other properties of each material. A two-way slab design adhering to codes and standards is executed with both materials. The performance is analyzed in terms of deflection, stability under loads, and displacement. Cost analyses accounting for material, durability, maintenance, and life cycle costs are also conducted. The findings provide insights into the economic and structural implications of each material for reinforcement selection and recommendations on the most suitable material based on the analysis.
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
This document discusses a study analyzing the effect of camber, position of camber, and angle of attack on the aerodynamic characteristics of airfoils. Sixteen modified asymmetric NACA airfoils were analyzed using computational fluid dynamics (CFD) by varying the camber, camber position, and angle of attack. The results showed the relationship between these parameters and the lift coefficient, drag coefficient, and lift to drag ratio. This provides insight into how changes in airfoil geometry impact aerodynamic performance.
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
This document reviews the progress and challenges of aluminum-based metal matrix composites (MMCs), focusing on their fabrication processes and applications. It discusses how various aluminum MMCs have been developed using reinforcements like borides, carbides, oxides, and nitrides to improve mechanical and wear properties. These composites have gained prominence for their lightweight, high-strength and corrosion resistance properties. The document also examines recent advancements in fabrication techniques for aluminum MMCs and their growing applications in industries such as aerospace and automotive. However, it notes that challenges remain around issues like improper mixing of reinforcements and reducing reinforcement agglomeration.
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
This document discusses research on using graph neural networks (GNNs) for dynamic optimization of public transportation networks in real-time. GNNs represent transit networks as graphs with nodes as stops and edges as connections. The GNN model aims to optimize networks using real-time data on vehicle locations, arrival times, and passenger loads. This helps increase mobility, decrease traffic, and improve efficiency. The system continuously trains and infers to adapt to changing transit conditions, providing decision support tools. While research has focused on performance, more work is needed on security, socio-economic impacts, contextual generalization of models, continuous learning approaches, and effective real-time visualization.
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
This document summarizes a research project that aims to compare the structural performance of conventional slab and grid slab systems in multi-story buildings using ETABS software. The study will analyze both symmetric and asymmetric building models under various loading conditions. Parameters like deflections, moments, shears, and stresses will be examined to evaluate the structural effectiveness of each slab type. The results will provide insights into the comparative behavior of conventional and grid slabs to help engineers and architects select appropriate slab systems based on building layouts and design requirements.
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
This document summarizes and reviews a research paper on the seismic response of reinforced concrete (RC) structures with plan and vertical irregularities, with and without infill walls. It discusses how infill walls can improve or reduce the seismic performance of RC buildings, depending on factors like wall layout, height distribution, connection to the frame, and relative stiffness of walls and frames. The reviewed research paper analyzes the behavior of infill walls, effects of vertical irregularities, and seismic performance of high-rise structures under linear static and dynamic analysis. It studies response characteristics like story drift, deflection and shear. The document also provides literature on similar research investigating the effects of infill walls, soft stories, plan irregularities, and different
This document provides a review of machine learning techniques used in Advanced Driver Assistance Systems (ADAS). It begins with an abstract that summarizes key applications of machine learning in ADAS, including object detection, recognition, and decision-making. The introduction discusses the integration of machine learning in ADAS and how it is transforming vehicle safety. The literature review then examines several research papers on topics like lightweight deep learning models for object detection and lane detection models using image processing. It concludes by discussing challenges and opportunities in the field, such as improving algorithm robustness and adaptability.
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
The document analyzes temperature and precipitation trends in Asosa District, Benishangul Gumuz Region, Ethiopia from 1993 to 2022 based on data from the local meteorological station. The results show:
1) The average maximum and minimum annual temperatures have generally decreased over time, with maximum temperatures decreasing by a factor of -0.0341 and minimum by -0.0152.
2) Mann-Kendall tests found the decreasing temperature trends to be statistically significant for annual maximum temperatures but not for annual minimum temperatures.
3) Annual precipitation in Asosa District showed a statistically significant increasing trend.
The conclusions recommend development planners account for rising summer precipitation and declining temperatures in
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
This document discusses the design and analysis of pre-engineered building (PEB) framed structures using STAAD Pro software. It provides an overview of PEBs, including that they are designed off-site with building trusses and beams produced in a factory. STAAD Pro is identified as a key tool for modeling, analyzing, and designing PEBs to ensure their performance and safety under various load scenarios. The document outlines modeling structural parts in STAAD Pro, evaluating structural reactions, assigning loads, and following international design codes and standards. In summary, STAAD Pro is used to design and analyze PEB framed structures to ensure safety and code compliance.
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
This document provides a review of research on innovative fiber integration methods for reinforcing concrete structures. It discusses studies that have explored using carbon fiber reinforced polymer (CFRP) composites with recycled plastic aggregates to develop more sustainable strengthening techniques. It also examines using ultra-high performance fiber reinforced concrete to improve shear strength in beams. Additional topics covered include the dynamic responses of FRP-strengthened beams under static and impact loads, and the performance of preloaded CFRP-strengthened fiber reinforced concrete beams. The review highlights the potential of fiber composites to enable more sustainable and resilient construction practices.
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
This document summarizes a survey on securing patient healthcare data in cloud-based systems. It discusses using technologies like facial recognition, smart cards, and cloud computing combined with strong encryption to securely store patient data. The survey found that healthcare professionals believe digitizing patient records and storing them in a centralized cloud system would improve access during emergencies and enable more efficient care compared to paper-based systems. However, ensuring privacy and security of patient data is paramount as healthcare incorporates these digital technologies.
Review on studies and research on widening of existing concrete bridgesIRJET Journal
This document summarizes several studies that have been conducted on widening existing concrete bridges. It describes a study from China that examined load distribution factors for a bridge widened with composite steel-concrete girders. It also outlines challenges and solutions for widening a bridge in the UAE, including replacing bearings and stitching the new and existing structures. Additionally, it discusses two bridge widening projects in New Zealand that involved adding precast beams and stitching to connect structures. Finally, safety measures and challenges for strengthening a historic bridge in Switzerland under live traffic are presented.
React based fullstack edtech web applicationIRJET Journal
The document describes the architecture of an educational technology web application built using the MERN stack. It discusses the frontend developed with ReactJS, backend with NodeJS and ExpressJS, and MongoDB database. The frontend provides dynamic user interfaces, while the backend offers APIs for authentication, course management, and other functions. MongoDB enables flexible data storage. The architecture aims to provide a scalable, responsive platform for online learning.
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
This paper proposes integrating Internet of Things (IoT) and blockchain technologies to help implement objectives of India's National Education Policy (NEP) in the education sector. The paper discusses how blockchain could be used for secure student data management, credential verification, and decentralized learning platforms. IoT devices could create smart classrooms, automate attendance tracking, and enable real-time monitoring. Blockchain would ensure integrity of exam processes and resource allocation, while smart contracts automate agreements. The paper argues this integration has potential to revolutionize education by making it more secure, transparent and efficient, in alignment with NEP goals. However, challenges like infrastructure needs, data privacy, and collaborative efforts are also discussed.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
This document provides a review of research on the performance of coconut fibre reinforced concrete. It summarizes several studies that tested different volume fractions and lengths of coconut fibres in concrete mixtures with varying compressive strengths. The studies found that coconut fibre improved properties like tensile strength, toughness, crack resistance, and spalling resistance compared to plain concrete. Volume fractions of 2-5% and fibre lengths of 20-50mm produced the best results. The document concludes that using a 4-5% volume fraction of coconut fibres 30-40mm in length with M30-M60 grade concrete would provide benefits based on previous research.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
The document discusses optimizing business management processes through automation using Microsoft Power Automate and artificial intelligence. It provides an overview of Power Automate's key components and features for automating workflows across various apps and services. The document then presents several scenarios applying automation solutions to common business processes like data entry, monitoring, HR, finance, customer support, and more. It estimates the potential time and cost savings from implementing automation for each scenario. Finally, the conclusion emphasizes the transformative impact of AI and automation tools on business processes and the need for ongoing optimization.
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
The document describes the seismic design of a G+5 steel building frame located in Roorkee, India according to Indian codes IS 1893-2002 and IS 800. The frame was analyzed using the equivalent static load method and response spectrum method, and its response in terms of displacements and shear forces were compared. Based on the analysis, the frame was designed as a seismic-resistant steel structure according to IS 800:2007. The software STAAD Pro was used for the analysis and design.
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
This research paper explores using plastic waste as a sustainable and cost-effective construction material. The study focuses on manufacturing pavers and bricks using recycled plastic and partially replacing concrete with plastic alternatives. Initial results found that pavers and bricks made from recycled plastic demonstrate comparable strength and durability to traditional materials while providing environmental and cost benefits. Additionally, preliminary research indicates incorporating plastic waste as a partial concrete replacement significantly reduces construction costs without compromising structural integrity. The outcomes suggest adopting plastic waste in construction can address plastic pollution while optimizing costs, promoting more sustainable building practices.
The Transformation Risk-Benefit Model of Artificial Intelligence: Balancing R...gerogepatton
This paper summarizes the most cogent advantages and risks associated with Artificial Intelligence from an
in-depth review of the literature. Then the authors synthesize the salient risk-related models currently being
used in AI, technology and business-related scenarios. Next, in view of an updated context of AI along with
theories and models reviewed and expanded constructs, the writers propose a new framework called “The
Transformation Risk-Benefit Model of Artificial Intelligence” to address the increasing fears and levels of
AIrisk. Using the model characteristics, the article emphasizes practical and innovative solutions where
benefitsoutweigh risks and three use cases in healthcare, climate change/environment and cyber security to
illustrate unique interplay of principles, dimensions and processes of this powerful AI transformational
model.
Predicting damage in notched functionally graded materials plates thr...Barhm Mohamad
Presently, Functionally Graded Materials (FGMs) are extensively utilised in several industrial sectors, and the modelling of their mechanical behaviour is consistently advancing. Most studies investigate the impact of layers on the mechanical characteristics, resulting in a discontinuity in the material. In the present study, the extended Finite Element Method (XFEM) technique is used to analyse the damage in a Metal/Ceramic plate (FGM-Al/SiC) with a circular central notch. The plate is subjected to a uniaxial tensile force. The maximum stress criterion was employed for fracture initiation and the energy criterion for its propagation and evolution. The FGM (Al/SiC) structure is graded based on its thickness using a modified power law. The plastic characteristics of the structure were estimated using the Tamura-Tomota-Ozawa (TTO) model in a user-defined field variables (USDFLD) subroutine. Validation of the numerical model in the form of a stress-strain curve with the findings of the experimental tests was established following a mesh sensitivity investigation and demonstrated good convergence. The influence of the notch dimensions and gradation exponent on the structural response and damage development was also explored. Additionally, force-displacement curves were employed to display the data, highlighting the fracture propagation pattern within the FGM structure.
Manufacturing is the process of converting raw materials into finished goods through various production methods. Historically, manufacturing occurred on a small scale through apprenticeships or putting-out systems, but the Industrial Revolution led to large-scale manufacturing using machines powered by steam engines
Agricultural Profitability through Resilience: Smallholder Farmers' Strategie...IJAEMSJORNAL
This study investigated the knowledge strategies and coping utilized by smallholder farmers in Guimba, Nueva Ecija to reduce and adjust to the effects of climate change. Smallholder farmers, who are frequently susceptible to climate change, utilize various traditional and innovative methods to strengthen their ability to withstand and recover from these consequences. Based on the results of this study, farmers in Guimba, Nueva Ecija demonstrate a profound comprehension of the adverse weather conditions, such as typhoons, droughts, and excessive rainfall, which they ascribe to climate change. While they have a fundamental understanding of climate change and its effects, their knowledge of scientific intricacies is restricted, indicating a need for information that is particular to the context. Although farmers possess knowledge about climate change, they are not actively engaging in proactive actions to adapt to it. Instead, they rely on reactive coping mechanisms. This highlights the necessity for targeted educational and communicative endeavors to promote the acceptance and implementation of approaches. Furthermore, the absence of available resources poses a significant barrier to achieving successful adaptation, highlighting the importance of pushing for inexpensive and feasible measures for adaptation. Farmers recognize the benefits of agroforestry and have started integrating the growth of fruit trees, particularly mangoes, into their coping techniques.