International Journal of Education and Management Engineering (IJEME)

IJEME Vol. 7, No. 5, Sep. 2017

Cover page and Table of Contents: PDF (size: 561KB)

Table Of Contents

REGULAR PAPERS

Adaptive Dictionary-based Compression of Protein Sequences

By Akash Nag Sunil Karforma

DOI: https://doi.org/10.5815/ijeme.2017.05.01​, Pub. Date: 8 Sep. 2017

This paper introduces a simple and fast lossless compression algorithm, called CAD, for the compression of protein sequences. The proposed algorithm is specially suited for compressing proteomes, which are the collection of all proteins expressed by an organism. Maintaining a changing dictionary of actively used amino-acid residues, the algorithm uses the adaptive dictionary together with Huffman coding to achieve an average compression rate of 3.25 bits per symbol, better than most other existing protein-compression and general-purpose compression algorithms known to us. With an average compression ratio of 2.46:1 and an average compression rate of 1.32M residues/sec, our algorithm outperforms every other compression algorithm for compressing protein sequences in terms of the balance in compression-time and compression rate.

[...] Read more.
Realization of Flip Flops using LabVIEW and MATLAB

By Mittarpal Naresh Kumar Priyanka Anand Sunita

DOI: https://doi.org/10.5815/ijeme.2017.05.02, Pub. Date: 8 Sep. 2017

Digital electronics is the backbone of current technology, play a pivotal role in the growth of humanity. Digital memory is part of digital electronics consists flip-flops building blocks designed by using logical NAND and NOR gates. Validation of storing information in form of bits can be understood from analysis of working of flip-flops. In the present investigation, VI Model of the different flip flops in LabVIEW has been realized and simulation implementation of flip flops is utilized to analyze the functioning of memory elements. The characteristics table of all kind of flip flop is verified using VI Models. Moreover, different flip-flops are also realized in MATLAB using Simulink. In the phase of digital and internet, this student -centric learning of existing theory of flip-flops can easily understand using simulation environment.

[...] Read more.
Exploitation of PDF Reader Vulnerabilities using Metasploit Tool

By Ritu Choudhary Mehak Khurana

DOI: https://doi.org/10.5815/ijeme.2017.05.03, Pub. Date: 8 Sep. 2017

With the rising importance of the client-side execution scenario, attackers also shifted their focus to the browser based attacks, and compromises based on client devices. Though security experts have come up with various solutions to such attacks but, the attackers at the same time find new ways and technologies to deal with such situations. In this paper, we will discuss about the framework called Metasploit and then we shall define what exactly the Metasploit Framework is and how it can be used in various attack scenarios, this will be followed by a brief description of the terms used including; the exploits, its modules, payloads and meterpreter. Later, the uses of the product will be discussed. The basic purpose of metasploit framework is a module launching, the attacker is able to configure an exploit module and initiate it at a target system. If the exploit succeeds, the payload is executed on the system for which it is targeted and the attacker can interact with the victim machine using the shell created on the host machine. There are number of exploits and payload options available in metasploit framework. It is one of the most useful frameworks as far as the security is concerned. Lastly, we will discuss the method to attack the compromised systems by malicious PDF file using Metasploit Framework. Therefore, the main purpose of this paper is to impart a deep understanding of what Metasploit is and how it can be utilized when one needs to get the access of the local or the remote machine.

[...] Read more.
Development of Cloud Based Incubator Monitoring System using Raspberry Pi

By Mala Sruthi B S. Jayanthy

DOI: https://doi.org/10.5815/ijeme.2017.05.04, Pub. Date: 8 Sep. 2017

Accurate and quantifiable measurement of light is essential in creating desired outcomes in practical day to day applications such as in Poultry Industry. Light measurement is essential in ensuring the efficiency of egg hatching process. Artificial incubation has been used in the poultry farm for hatching of the eggs. For better hatching of the eggs, the temperature and humidity has to be maintained properly. The proposed system is equipped with DHT11 sensor which monitors the temperature and humidity of the incubator and continuously updates to the cloud through Wi-Fi. Remote user checks the temperature and humidity values and controls the intensity of the bulb through an Android app in his mobile phone. A servo motor is attached to the egg turner kept inside the incubator and is rotated according to the specified delay in order to prevent the yolk from getting stick to the shell of the eggs and also to provide uniform temperature for the eggs. From the experimental results, it is inferred that better hatching of the eggs could be achieved by controlling the intensity of the bulb remotely.

[...] Read more.
Automatic Control of Railway Gates and Destination Notification System using Internet of Things (IoT)

By Chandrappa S Dharmanna Lamani Shubhada Vital Poojary Meghana N U

DOI: https://doi.org/10.5815/ijeme.2017.05.05, Pub. Date: 8 Sep. 2017

The Internet of Things (IoT) is a network of interconnected devices which are outfitted with sensors and Radio-Frequency Identification (RFID) devices. These devices are uniquely addressable and use standard communication protocols like Transmission Control Protocol (TCP), User Datagram Protocol (UDP) and Internet Control Message Protocol (ICMP) in a networking environment. Here devices are communicating with each other without human interaction. The objective of this work is to provide an Automatic Railway Gate Controller, which operates the railway gates without gatekeeper which makes it useful for operation at level crossings. This controller deals with the reduction of time of which the gate is being kept closed and provide the safety to the road users by reducing the accidents that usually occur due to carelessness of road users and the gatekeepers. In addition to this, one more additional module is implemented for the passenger’s convenience. Here, passenger needs to register their phone number via website to get destination arrival notification. This system is cost effective, real time and automatic.

[...] Read more.
Multilevel Authentication based Data Security and Verification over Cloud Computing Environment

By Deepak Soni Nishchol Mishra

DOI: https://doi.org/10.5815/ijeme.2017.05.06, Pub. Date: 8 Sep. 2017

There are various algorithm proposed in the area of cloud computing environment. Now a days the cloud computing is the very interesting area for research purpose. Cloud computing environment provides the security of user data and integrity verification with the users data, also cloud provide on demand network access to a shared pool of configurable computing resources like network, servers, storage, applications and services that can be rapidly provisioned and provide with minimum user effort and service provider interaction. Uses of cloud computing services is very easy and also in very low cost. The cloud computing services are on demand over the internet, so it provides the facility to clients that access these services remotely from anywhere, anytime with the help of internet and any devices like pc, laptop mobiles etc. The data or information of cloud user is save in cloud service provider so in the cloud computing environment the security of data and privacy of data is primary issue[1]. In this paper a security model is proposed here we provide a mechanism to cloud user to encrypt their data or sensitive information and generate a integrity verification key then save the data on cloud in encrypted form. The cloud user have many choices like private phase, public phase and hybrid phase and the hybrid phase tier1 and tier 2. In all three sections there are various encryption techniques are implemented like AES (Advanced Encryption Scheme)[9], IDEA, Blowfish[12], And SAES based on the security factors namely authentication, confidentiality, security, privacy, non-repudiation and integrity. In Private phase a Unique token generation mechanism with the help of SHA-2 implemented it helps to ensure the authenticity of the user, The Hybrid section of the model provides On Demand Security Choices Tier one or Tier two and Public section provides faster execution with the help of Blowfish algorithm. Overall the user data Is wrapped in two folds of encryption and integrity verification in all sections.

[...] Read more.