89 research outputs found

    Secure Dynamic Groups Auditing Service with Group Signature for Cloud Storage

    Get PDF
    Cloud storage has become a commonplace of storing and sharing data across multiple users. It is a challenge to preserve confidentiality and maintain identity privacy while sharing data within multiple dynamic groups, due to frequent change in the membership. Also, maintaining data integrity is an issue as data is stored and audited by untrusted cloud service provider (CSP). In this paper, we propose, third party auditor (TPA) auditing scheme to maintain data integrity and enabling TPA to perform audits for multiple users efficiently and simultaneously. By exploiting group signature scheme any member can anonymously share data within the group. The efficiency and the computation cost of the proposed system are independent with the number of users revoked and the data stored on the cloud. DOI: 10.17762/ijritcc2321-8169.150612

    PLC Installation on Inner Ring Bore SHG Grinding Machine

    Get PDF
    To supply product of high quality in the market for maintaining the market requirements, machinery should be up to date. This project work is based on the upgradation of the inner ring track grinding machine on a production line. A grinding machine is a type of machine, which uses an abrasive wheel on cutting tool. Each grain of abrasive operation on the wheel's surface cuts a small chip from the work-piece via deformation. Grinding is used to finish work-pieces that must show high surface and high accuracy of shape and dimension. The main objective is:- 1. To reduce the cycle time of machine. 2. To improve the quality of the bearing. 3. To reduce the maintenance cost of the grinding machine. The aim of our system is to reduce the down time of the grinding machine i.e. to increase the productivity of bearings. Apart from down time, our objective is to improve the quality of the bearings. Quality defines the speed, precision and efficiency of bearings. Reduction of the cost of maintenance of the machine is also our prime objective. We meet our objectives with the help of Mitsubishi PLC and Servo System. DOI: 10.17762/ijritcc2321-8169.16049

    Исследование последовательности импульсов тормозного излучения малогабаритного бетатрона

    Get PDF
    Разработана имитационная модель потока импульсного тормозного излучения и реализована в подпрограмме на MathCad. Адаптирована модель потока импульсного тормозного излучения к имитационной модели формирования цифровых радиографических изображений. Исследовано влияние параметров исходного потока тормозного излучения на качество цифровых радиографических изображений. Проведён цикл натурных экспериментов по оценке изменения параметров потока импульсов регистрируемого излучения с цифровых детекторов на этапах формирования радиографического изображения на комплексе высокоэнергетической цифровой радиографии Томского политехнического университета.A simulation model of pulsed radiation flux and implemented in a subroutine on MathCad is available. Pulse bremsstrahlung flow model for a simulation model of digital radiographic image formation Adapted. Effect of source stream parameters. Experiments on the study of changes in the parameters of the pulse flux are recorded using digital detectors at the stages of radiographic image formation on the complexes of high-energy digital radiography of the Tomsk Polytechnic University

    ChemInform Abstract: Synthesis of (4.4.4)Propellahexaene.

    No full text

    Reversible Secured Data Hiding using Binary Encryption and Digital Bit Modification Scheme

    Full text link
    The information is getting precious day by day because of the digital revolution and more reach exposure of citizens to technology. The security of information is in demand and the topmost priority among researchers to develop data security systems. Image steganography is one of the data hiding schemes which is invisible in nature, although it uses visible image media to hide information. Steganography is not only limited to images. There are other media like text, audio, or video that can be utilized for hiding information. In this research work, a novel data hiding is being developed using an image as cover media. Researchers are facing during the development of the technique is maintaining the payload capacity as well as higher PSNR values and other parameters. This work uses colour images as cover and digital bit modification methods to hide secure information. Only hiding is not enough to secure information. There is an additional layer of security added by encrypting a secure message using an encryption method. The digital bit modification method is unconventionally spread the sequential bitstream over channels. This would make this approach unique and better as it is keeping the PSNR level higher along with NCC and lower MSE. All this is done by keeping the payload capacity as the maximum available. The average value of PSNR is 60.295dB, NCC is 1.00, and MSE is 0.1567.</jats:p
    corecore