Innovation and Invention

Innovation and Invention

The students from various colleges have invented new technological ideas with their intelligence and ideas under their respective teacher’s or mentor’s guidance.
Here you can find our students exhibiting their skills in their projects of various colleges with their innovative ideas with details.

Innovation distinguishes between a leader and a follower.

-       Steve Jobs

Innovative projects submitted by students       Upload Innovations

1. Anomaly Based Denial-of-Service Attack Detection Using Triangle Area Mapping and Multivariate Correlation AnalysisAnomaly Based Denial-of-Service Attack Detection Using Triangle Area Mapping and Multivariate Correlation Analysis


The world of information has become immensely open with the widespread growth in IT industry. This growth, while it has opened the doors for infinite developments, has also paved the path for welcoming a variety of threats that attacks the systems worldwide. One of the most severely menacing and rigorously aggressive attacks is the Denial of Service attack,Presented in this project is the DOS attack detection phenomenon that uses Anomaly-based Detection Systems (ADS) combined with Multivariate Correlation Analysis (MCA) that is capable of extracting the geometrical correlations between multiple network traffic features to determine the anomalous patterns that can signal a potential attack. Furthermore, to boost up the power of MCA to a much higher notch, Triangle Area Mapping (TAM) is used. The merger of MCA and TAM along with ADS brings out a DOS attack detection system with highest accuracy while maintaining the FPR to the negligible level.

2. Online Direction Computation using Current Traffic Index


Online direction computation using current traffic index aims to find the shortest path using current traffic circumstances. Most brief way processing is a standout amongst the most well-known questions in area based administrations. Briefest way issues can be illuminated proficiently when a coordinated diagram is almost non-cyclic. Prior results characterized diagram disintegration, now called the 1-dominator set, which comprises of an interesting gathering of non-cyclic structure ruled by a solitary related trigger vertex. In this project, a specific most brief way calculation just spends erase min operations on trigger vertices, along these lines making the reckoning of briefest ways through non-trigger vertices less demanding. The network shortest pathway problem desire at computing the precise path placed on live traffic chances. Beyond live traffic classes, the route returned by the navigation system is no longer insured and definite result. A promising access is let the server to gather live traffic data and then newscast them over radio or wireless network.

3. A Job Size Based Scheduler for Competent Task Assignments in Hadoop


MapReduce has emerged as a popular paradigm for processing large datasets in parallel over a cluster.Hadoop is an open source implementation of MapReduce, which is very attractive for parallel processing of a variety of different applications, e.g., web crawling, log processing, video and image analysis, recommendation systems, etc. The mapreduce cluster shared by several users with heterogeneous of workloads. When a group of jobs are simultaneously submitted to a MapReduce cluster, they compete for the pooled resources and the overall system performance in terms of job response times, might be degraded. Therefore, key challenge is the ability of proficient scheduling in such a shared MapReduce environment. However, we find that existing scheduling algorithms supported by Hadoop cannot always assurance good average response times under diverse workloads. In this project, we address this problem by introducing a novel Hadoop scheduler, which uses the knowledge of job size patterns to reduce average job response times by dynamically tuning the resource shares among users and the scheduling algorithms for each user.

4. CLOUD SECURITY USING SAP- SHARED AUTHENTICATION PROTOCOL


In the cloud computing users (information proprietors) host their information on cloud servers and other clients (information consumers) will access the information from the cloud. Amid such information getting, to the information sharing between different users is significant to have business or commercial productive benefits. In providing such sharing existing security solutions mainly focus on authentication so as prevent unauthorized access to users’ private data, but concerns nothing about the privacy of user when client queries cloud server for owner’s data. The challenged imposition itself may disclose client identity irrespective of whether or not user gets the data access permission. To address this privacy issue we propose shared authentication (SAP) protocol. Using SAP 1) shared access authority is achieved with participant confirmation, data hiding, client protection and forward security. 2) Characteristic based access is provided. 3) Intermediary re-encryption is connected by cloud server to give information sharing among different clients

5. Secure Continuous In-Network Aggregation In Wireless Sensor Networks


Many sensor applications require the continuous aggregation to obtain the temporal variation information of aggregates. However, in a hostile environment, the adversary could fabricate false temporal variation patterns of the aggregates by manipulating a series of aggregation results through compromised nodes. Existing secure aggregation schemes conduct individual verification for each aggregation result, which could be experienced as great accumulative communication cost and negative impact on transmission scheduling for continuous aggregation. In this project, distinct design issues for protecting continuous in network aggregation are identified and a novel scheme to detect false temporal variation patterns is proposed. Compared with the existing schemes, this scheme greatly reduces the verification cost by checking only a small part of aggregation results to verify the correctness of the temporal variation patterns in a time window.

6. A Privacy Preserved Public Auditing Method for Cloud Data Sharing Using Homomorphic Authentication Ring Signature


In Cloud Computing Public auditing on the integrity of the shared data is very big issue, because the public auditing scheme will disclose private information, and identity privacy to public verifiers. This project propose a new scheme called a privacy preserving mechanism that supports public auditing for shared data stored in the cloud. The ring signature scheme is essential to audit the correctness of data which is stored in the cloud. With this method, the identity of the signer on each block in shared data is kept secret from public verifiers. Public verifiers are one who is able to conveniently verify shared data integrity without retrieving the entire file stored in the cloud. In addition, this mechanism is able to perform multiple auditing tasks simultaneously rather than single auditing task. This survey shows the performance and competence of our mechanism when auditing the shared data integrity.

            







Page 1 of 2 << < Prev Next > >>