IOSR Journal of Computer Engineering (IOSR-JCE)

National Conference on Innovations and Research in Engineering (NCIRE-2017)

Volume 1

Paper Type : Research Paper
Title : Privacy Preserving Horizontal partitioning of outsourced database for frequent pattern mining using paillier
Country : India
Authors : Manasi Dhage || Dr. A.B.Banubakode

Abstract: In recent years data sharing is an important task. This data publication is conducted by various organizations under some important rules and regulations. such data is useful in various researchers. Also With high demand for cloud services there are serious concerns about the privacy of individuals and also the outsourced database. In such cases there is high demand to check the utility of data and integrity of data. Data integration is another form of data sharing, where data owners sends there data to server for aggregation and then performed preprocessing on aggregated data before storing on third party server or cloud. There are several challenges while designing secure system like hiding the original and sensitive information of the individual and whole database from attacker. So in this system to tackle these challenges, the proposed system uses the technique of homomorphic encryption which works..............

Keywords - Collaborative data publishing, Differential privacy, Horizontal partitioning, Homomorphic Encryption, Utility verification.

[1] Jingyu Hua, An Tang, Yixin Fang, Zhenyu Shen, and Sheng Zhong, ``Privacy-Preserving Utility Verification of the Data Published by Non-interactive Differentially Private Mechanisms", IEEE Transactions on Information Forensic and Security.
[2] Charu C. Aggarwal, (2005), "On k-Anonymity and the Curse of Dimensionality", Proceedings of the 31st VLDB Conference, Trondheim, Norway, pp.901-909
[3] AshwinMachanavajjhala, Daniel Kifer, Johannes Gehrke, MuthuramakrishnanVenkita Subramanian, (2006), "l-Diversity : Privacy Beyond K-Anonymity", Proc. International conference on Data Engineering.(ICDE),pp.24.
[4] Anil Prakash, RavindarMogili ,(2012), "Privacy Preservation Measure using t closeness with combined l-diversity and k-anonymity", International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCEE)Volume 1, Issue 8,pp:28-33
[5] Yeye He, Jeffery Naughton .F, (2009), "Anonymization of Set Valued Data via Top Down Local Generalization", Proc. International Conference on Very Large Databases (VLDB), pp.934-945..


Paper Type : Research Paper
Title : Implementation of Social Event Analysis by Using Multi Modal Event Topic Model
Country : India
Authors : Vandekar Ganesh N || GawandeTejas U || Kane Akash A || ShindeMukunda B || Kandalkar Sarika

Abstract: TThe tremendous improvement of social events on internet, it has been more complex to precisely find search and organize the entertaining events. Tremendous social media data, which is helpful to graze, search and monitor social events by users or administration. To deal with this problem, we proposed a shocker multi-modal social event tracking and progress formation to not only impressive capture multi-modal topic of social events, but effective event docket details over time. To derive this intention, we proposal a shocker multi-modal event topic model [MMETM], which can impressive model social media documents, incorporate long text with relative images, and to understand the relativity between textual and visual modal to distinct the visual delegate topics and non-visual delegate topics. To apply the MMETM model............

Keywords - Location services, GPS(Global Positioning System), AWD, IR-Square Tree, Android Virtual Device (AVD)

[1]. D. Patel, W. Hsu, and M. L. Lee, "Mining relationships among intervalbased events for classification," in Proc. SIGMOD, 2008, pp. 393–404.
[2]. J. Allan, R. Papka, and V. Lavrenko, "On-line new event detection and tracking," in Proc. SIGIR, 1998, pp. 37–45.
[3]. M. Merler, B. Huang, L. Xie, G. Hua, and A. Natsev, "Semantic model vectors for complex video event recognition," IEEE Trans. Multimedia, vol. 14, no. 1, pp. 88–101, Feb. 2012.
[4]. T. Zhang and C. Xu, "Cross-domain multi-event tracking via CO-PMHT," ACM Trans. Multimedia Comput. Commun. Appl., vol. 10, no. 4, pp. 31:1–31:19, 2014.
[5]. X. Yang, T. Zhang, C. Xu, and M. S. Hossain, "Automatic visual concept learning for social event understanding," IEEE Trans.Multimedia, vol. 17, no. 3, pp. 346–358, Mar. 2015.


Paper Type : Research Paper
Title : A Review on Efficient Visual Aided Image Search System with Local Spot and Scene Search
Country : India
Authors : Miss. ReshmaGodase || Mr. Amar Jadhav || Miss. Asmita Kanawade || Prof. M. R. Deore

Abstract: Recently, image categorization has been an active research topic due to the urgent need to retrieve and browse digital images via semantic keywords. As an important and challenging problem in machine learning and computer vision, multilabel classification is typically implemented in a max-margin multilabel learning framework, where the inter-label separability is characterized by the sample-specific classification margins between labels. However, the conventional multilabel classification approaches are usually incapable of effectively exploring the intrinsic inter-label correlations as well as jointly modeling the interactions between inter-label correlations and multilabel classification. To address this issue, we proposed an efficient visual aided image search application on mobile phone combined with.............

Keywords- Multilabel Classification, GPS(Global Positioning System), CCV Color Coherence Vector, coherent region, Android Virtual Device (AVD)

[1]. X. Kong, M. K. Ng, and Z.-H. Zhou, "Transductivemultilabel learning via label set propagation," IEEE Trans. Knowl. Data Eng., vol. 25, no. 3, pp. 704–719, Mar. 2013.
[2]. J. Read, B. Pfahringer, G. Holmes, and E. Frank, "Classifier chains for multi-label classification," J. Mach. Learn., vol. 85, no. 3, pp. 333–359, Dec. 2011.
[3]. M.-L. Zhang and Z.-H. Zhou, "Multilabel neural networks with applications to functional genomics and text categorization," IEEE Trans. Knowl. Data Eng., vol. 18, no. 10, pp. 1338–1351, Oct. 2006.
[4]. G. Tsoumakas, I. Katakis, and L. Vlahavas, "Random k-labelsets for multilabel classification," IEEE Trans. Knowl. Data Eng., vol. 23, no. 7, pp. 1079–1089, Jul. 2011.
[5]. J. Deng et al., "Large-scale object classification using label relation graphs," in Proc. Eur. Conf. Comput. Vis., 2014, pp. 48–64.


Paper Type : Research Paper
Title : Light Weight Security Technology for Packet-Drop-Attack in Wireless Network
Country : India
Authors : Mr. Nitin B. Matale || Mr. Ajinkya N. Jadhav || Mr.Hemant B. Gunjal || Prof. Harish Patil

Abstract: A Wireless-Sensor-Network (WIRELESS-SENSOR-NETWORK (WSN)) is extensively utilized as a part of numerous application spaces. Information is accumulate from various sensor places. Many promising assaults like provenance phony, Packet-drop - Attack, DDos assault, Jamming assault and so forth are found in the WIRELESS-SENSOR-NETWORK (WSN) while transmitting the information. A malignant assailant may present more hubs in the system or bargain existing ones. In this manner, guaranteeing more information trust-value is a solid for right basic leadership. Information are provenance keep sign in-development of information about who getting to this data, who alter information, the way from - the information is crossing and so forth information provenance have vital pretend in the assessment of trust-value of data thusly, it is an exceedingly critical to a protected data provenance..............

Keywords: Securities, Sensor-Networks, Packet-drop-Attack, Wireless-Sensor-Network (WSN), Information Attacker Storage.

[1]. SENSOR NETWORKS, 2010, PP. 2–7.
[2]. I. Foster, J. Vockler, M. Wilde, and Y. Zhao, "Chimera: A virtualdata system for representing, querying, and automating data derivation,"in Proc. of the Conf. on Scientific and Statistical DatabasManagement, 2002, pp. 37–46.
[3]. K. Muniswamy-Reddy, D. Holland, U. Braun, and M. Seltzer,"Provenance-aware storage systems," in Proc. of the USENIX Annual Technical Conf., 2006, pp. 4–4.
[4]. Y. Simmhan, B. Plale, and D. Gannon, "A survey of data provenancein e-science," SIGMOD Record, vol. 34, pp. 31–36, 2005.
[5]. R. Hasan, R. Sion, and M. Winslett, "The case of the fake picasso:Preventing history forgery with secure provenance," in Proc. OfFAST, 2009, pp. 1–14.


Paper Type : Research Paper
Title : Computational and User Prefer Privacy Methodology for Resolving Multiparty Privacy Conflicts in Social Media
Country : India
Authors : Seema Phalke || Ashwini Yewale || Priyanka Chavhan || Priya Andhare || Prof. Shaikh T. S.

Abstract: Multiparty privacy is major issue in social media. In today's world, the item shared through the social media may affect more than one user's privacy- e.g. photos that are uploaded, comments on the photos which mention multiple user, event in which users are invited, etc. The absence of multi-party privacy management support in current mainstream Social Media infrastructures makes users unable to properly control to who cowned items are shared. Computational mechanisms that are able to merge the privacy preferences of multiple users into a single policy for these kind of items can help solve this problem. As privacy preferences may conflict, these mechanisms need to consider how users' would actually reach an agreement in order to propose acceptable solutions to the conflicts............

Keywords: Social Media, Privacy, Conflict, Multiparty Privacy, Social Networking Services, Online Social Network, Computational Model, Privacy preserving.

[1]. Resolving Multi-party Privacy Conflict in Social Media. Jose M. Such; Natalia Criado. IEEE transaction on knowledge and data engineering. 2016, volume:28,Issue:7, pages:1851-1863, DOI: 10.1109/TKDE.2016.2539165,Cited by :Papers(1)
[2]. VarshaBhatKukkala,S.R.SIyengary and Jaspal Singh Saini," Secure Multiparty Graph Computation", 8th International Conference on Communication Systems and Networks (COMSNETS).2016
[3]. Hongxin Hu, Gail-JoonAhn and Jan Jorgensen," Multiparty Access Control for Online Social Networks: Model and Mechanisms", ieee transactions on knowledge and data engineering, vol. 25, no. 7, july 2013
[4]. VarshaBhatKukkala, S.R.S Iyengary and Jaspal Singh Saini," Secure Multiparty Computation of a Social Network", International Association for Cryptologic Research (IACR).2012
[5]. Matthew Smith, Christian Szongott, "Big Data Privacy Issues in Public Social Media", 6th IEEE International Conference on 2012


Paper Type : Research Paper
Title : Secure File Handling on Cloud based on Hadoop using HDFS
Country : India
Authors : Tambe Rohini || Pansare Tejashri || Hadawale Megha || Bhor Pooja || Prof. Salunkhe T. R.

Abstract: Hadoop is an Apache open-source framework for storing and processing large amount of data across clusters of computers. But processing sensitive or personal data in hadoop framework requires security model. As we know that hadoop was designed without any security model, in this paper we present self-destructing data system that meets this challenge through a novel integration of secure cryptography techniques with active storage techniques based on hadoop. In this system, we present Shamir's secret sharing algorithm against sniffing attacks by using the public key cryptosystem to protect from sniffing operations.

Keywords - Cloud Computing, Hadoop, MapReduce, HDFS, Self Destructing Data, Active Storage .

[1]. Wenfen Liu, Xuexian Hu, "Secure Data sharing in Cloud Computing using Revocable Storage Identity Based Encryption ", IEEE Transactions on Cloud Computing, VOL. 14, NO. 8, AUGUST 2015.
[2]. Shaofeng Zou, Student Member IEEE, Yingbin Liang, "An Information Theoretic Approach to Secret Sharing", IEEE Transactions On Information Theory, VOL. 61, NO. 6, JUNE 2015.
[3]. FU Xiao, WANG Zhi-jian, WU Hao, YANG Jia-qi, WANG Zi-zhao, "How to send a Self-destructing Email", IEEE International Congress on Big Data, 978-1-4799-5057-7/14 2014.
[4]. R.C.Dharmik,Hemlata Dakhore,Vaishali Jadhao,"Sedas: A Self Destructive Active Storage Framework for Data Privacy" ,International Journal of Scientific Engineering and Research,Volume 2,Issue 3,March 2014.
[5]. Ling fang Zeng ,Shibin Chen , Qingsong Wei,"SeDas:A Self-Destructing Data System Based on Active Storage Framework", IEEE Transactions On Magnetics , VOL. 49, NO. 6, JUNE 2013..


Paper Type : Research Paper
Title : Parential Application for Student Security
Country : India
Authors : Sushama Barve || Mayuri Bhujbal || Srushti Kasbe || Priyanka More || Prof. Pinjarkar N. R.

Abstract: As of late many instances of missing youngsters between ages 14 and 17 years are accounted for. Guardians dependably stress over the likelihood of capturing of their kids. In this framework we propose an Android based answer for help guardians to track their youngsters progressively. These days, most cell phones are outfitted with area administrations capacities permitting us to get the gadget's geographic position continuously. The proposed arrangement takes the upside of the area administrations gave by cell phone since the majority of children convey cell phones. The portable application utilize the GPS and SMS administrations found in Android cell phones. It permits the parent to get their youngster's area on a constant guide............

Keywords—Location services, GPS(Global Positioning System), AWD, IR-Square Tree, Android Virtual Device (AVD)

[1]. Rupen Paul V, Adithi Reddy, Sujith PS, Aneesh M, "GPS and Bluetooth Based Object Tracking System" ,International Journal of Advanced Research in Computer and Communication Engineering, January 2016.
[2]. Kurt D. Bollacker, Steve Lawrence, "A System For Automatic Personalized Tracking of Scientific Literature on the Web", International Journal of Advanced Research in Computer and Communication Engineering, January 2013.
[3]. Harshali Rambade,Seema Shah, "Face-to-Face Proximity Estimation Using Bluetooth On Smartphones", Proceedings of 12th IRF International Conference,29th June-2014, Pune, India, ISBN: 978-93-84209-31-5.
[4]. Rupen Paul V1, Adithi Reddy2, Sujith PS3, Aneesh M4, "GPS and Bluetooth Based Object Tracking System" International Journal of Advanced Research in Computer and Communication Engineering Vol. 5, Issue 1, January 2016
[5]. Afshan Mulla, Jaypal Baviskar, Amol Baviskar and niket Bhovad, "GPS Assisted Standard Positioning Service for Navigation and Tracking: Review & Implementation", 2015 International Conference on Pervasive Computing (ICPC)..


Paper Type : Research Paper
Title : Graphical Color Code Password and Facial Recognition Using Net Banking System
Country : India
Authors : Mr.Kawade Kiran || Miss.Mahajan Hemlata || Miss.Mandge Yogita || Miss.Waykar Varsha || Prof.Kandalkar S.A

Abstract: Now days success of online banking, there remains a reluctance to use it primarily because of uncertainty and security concerns. This study evaluates the potential of biometric authentication for online banking (banking) as a way of improving adoption auto base sms gateway and Graphical Color Base Password use of online banking. The biometric is the study of physical or behavioral characteristics of human being used for the identification of a person. These physical characteristics of a person include the features like fingerprints, face, hand geometry, voice, and iris biometric features.............

Keywords - Face Recognition,RGB Color Code, OTP, Color OTP, SMS Gateway,Security, Access controls,SRS

[1]. Data Compression - DEBRA A. LELEWER and DANIEL S. HIRSCHBERG Department of Information and Computer Science, University of California, Irvine, California 92717 – ACM Journal
[2]. Lossless Data compression techniques - Klaus Holtz, Eric Holtz, Omni Dimensional Networks , San Francisco , CA 94109 – IEEE Research Paper
[3]. RGB Coloured Image Encryption Processes Using Several Colored Keys Images - By Rami El Sawda (IEEE senior member) & Habib Hamam (IEEE senior Member) – IEEE Research Paper
[4]. "Data Can Now Be Stored on Paper" (http:/ / www. arabnews. com/?page=4& section=0& article=88962& d=18& m=11& y=2006.
[5]. "Facial Recognition Applications". Animetrics. Retrieved 2008-06-04


Paper Type : Research Paper
Title : Efficient RDIB Technique for Degraded Document Images
Country : India
Authors : Ghodekar Neha || Bodake Shraddha || Kakade Pradnya

Abstract: In this digital world, our entire data is available in the form of soft copies of documents. With this, we can update, store, backup and preserve the soft copies of our documents. This is the case with the latest data, but going towards our old traditional data, which is available only on hard copies of the paper, we come across a lot of problems while preserving such rad copies of data. Most of the papers containing our data get degraded due to lack of attention and improper handling and preservation. Most commonly seen degradation of such papers is interference of the text written on the front and back of the papers...............

Keywords - Adaptive contrast, binarization, image gradient, local image contrast, local threshold

[1] B. Gatos, K. Ntirogiannis, and I. Pratikakis, "ICDAR 2009 document image binarization contest (DIBCO 2009)," in Proc. Int. Conf. Document Anal. Recognit., Jul. 2009, 1375–1382.
[2] I. Pratikakis, B. Gatos, and K. Ntirogiannis, "ICDAR 2011 document image binarization contest (DIBCO 2011)," in Proc. Int. Conf. Document Anal. Recognit., Sep. 2011, 1506–1510.
[3] I. Pratikakis, B. Gatos, and K. Ntirogiannis, "H-DIBCO 2010 handwritten document image binarization competition," in Proc. Int. Conf. Frontiers Handwrit. Recognit. Nov. 2010, 727–732.

[4] S. Lu, B. Su, and C. L. Tan, "Document image binarization using background estimation and stroke edges," Int. J. Document Anal. Recognit. vol. 13, no. 4, Dec. 2010, 303–314.
[5] B. Su, S. Lu, and C. L. Tan, "Binarization of historical handwritten document images using local maximum and minimum filter," in Proc. Int. Workshop Document Anal. Syst., Jun. 2010, 159–166..


Paper Type : Research Paper
Title : Automatic Detection and Notification of Landslide and Earthquake
Country : India
Authors : Sayali Wavhal || Anuradha Ghodake || Pratiksha Gholap || Rajashri Korde

Abstract: In this project we are going to study about landslide and earthquake detection and notification. As landslides are gravitational actions of soil or rock down slopes that could purpose intense harm to environment. Numerous fatalities and structural failure because of landslides have been reported over time consequently, efforts to measure and to monitor capability landslides are crucial to make certain human safety and to guard civil infrastructures. To examine the behavior of slopes, tracking systems have been set up or manual inspections by using human experts have been performed. An earthquake (also known as a tremor or temblor) is the result of a sudden release of energy in the Earth's crust that creates seismic waves. Earthquakes are recorded with a seismometer, also known as a seismograph..............

Keywords - Earthquake , GSM ,Landslide, Seismic Waves, Sensors

[1]. Mr.Rounak,R.Gupta1,Mr.Laxmikant S. Hundikar2,Abhijit G.Ingole3 "Micro-Controller Based EarthquakeDetection Using Sensing Element " ,2013,IJEEMC
[2]. A.Dinagar1, P.Karthick2, K.Karthi3, P.Tamilvanan4, S.Premkumar5"Landslide Monitoring System with GSM Module ",2015,IJIRCCE
[3]. Siti Khairunniza-Bejol, Maria Petrou2t and Athanasios Ganas3, "Landslide Detection Using a Local Similarity Measure", 2006, IEEE.
[4]. Maneesh V. Ramesh, "Real-time Wireless Sensor Network for Landslide Detection", 2009 Third International Conference on Sensor Technologies and Applications.
[5]. Dr. Garima. Krishan , Dr.Anurag.Raii.,and SachinSaxena, "Landslide monitoring and hazards mapping in uttrakhand using Reinforcement learning and neutral network "proceeding of the international journal of advanced research in computer science and Software engineering IJARCSSE all rights reserved, august 8,2013


Paper Type : Research Paper
Title : i-Homes: An Intelligent Home Automation And Security System Using Android and Cloud
Country : India
Authors : Sayyad Wasim || Auti Gauri || Kadam Rutuja

Abstract: Now we are living in the 21st century where automation is playing an important role in human life. Home automation helps us to control household appliances like light, door, fan, AC etc. It also provides home security as well as emergency system to be activated. Home automation not only refers to reduce human the efforts but it is also energy efficient and time saving. This paper puts forwards the design of home automation and security system. The project proposes an efficient implementation for IoT (Internet of Things) used for monitoring and controlling the home appliances via World Wide Web. Home automation system uses the portable devices as a user interface. Here we are using cloud for storing the user threshold values so that the user can access the appliances remotely. The main purpose of this system is to provide security by giving alert alarm or notification to user via email, sms, etc.

Keywords - Cloud, Database, Embedded Systems, Home Automation, Internet of Things, Security, Sensors, Web Server.

[1] Chan, M., Campo, E., Esteve, D., Fourniols, J.Y., Smart homes-current features and future perspectives, Maturitas, vol. 64,issue 2, pp. 90-97, 2009
[2] Gomez, C.,Paradells, J.," Wireless home automation networks: A survey of architectures and technologies," IEEE Communications Magazine, vol. 48, issue 6, pp. 92 – 101, 2010.
[3] Laur, I., Microcontroller based home automation system with security, International Journal of Advanced Computer Science and Applications, vol. 1, no. 6, pp. 60-65, 2010
[4] Das, S.R., Chita, S., Peterson, N., Shirazi, B.A., Bhadkamkar, M., "Home automation and security for mobile devices," IEEE PERCOM Workshops, pp. 141-146, 2011.
[5] R.Piyare, M.Tazil Bluetooth Based Home Automation System Using Cell Phone, 2011 IEEE 15th International Symposium on Electronics..


Paper Type : Research Paper
Title : News App Implementation Based on Cordova Cross-Platform
Country : India
Authors : Jadhav Omkar S. || Awari Hrishikesh A. || Gaikwad Vaibhav V. || Kanase Rajkumar S.

Abstract: Cordova is an open-source mobile application development framework which is used to build the mobile applications using web technologies like HTML5, CSS3 and JavaScript. Cordova is also called as PhoneGap in past few years.Cordova is a software program which is cross platform.Cross platform enables multiple platform with one code basis.It means that we can run this code for multiple platforms without changing the program code. In this paper we implement News Application by using Cordova development framework, to create local Newspaper agency. Peoples of a small community can timely updates all the events going on around them by using this application..............

Keywords - Cross-platforms, Cordova , Native applications

[1]. Zhao Qing Li Ying , Pan Gao Yuan , Lv Zhi Sheng , Music Player Based on the Cordova Cross-Platform ,School of Computer Science, Communication University of China
[2]. Zhi-hong pan, wei-bin luo, willow blue.Based on the research and practice of HTML 5 cross-platform mobile applications. Brain knowledge and technology, 2013, 6:3992-3995
[3]. https://en.wikipedia.org/wiki/Mobile_operating_system
[4]. https://cordova.apache.org/docs/en/3.0.0/guide/cli/
[5]. https://cordova.apache.org/docs/en/latest/guide/hybrid/plugins


Paper Type : Research Paper
Title : Certificate-less Key Generation and Agreement Protocol for ad-hoc network through ID-PKC
Country : India
Authors : Mr. Bhamare V B || Prof. Gawande RM

Abstract: Virtual Private Network is a network that provides inter-connectivity to exchange information between the nodes that belongs to the network. A Virtual private network possesses all the features of the private network and is built on existing network, but they suffer severe security problems, particularly authentication problem. This paper introduces an authenticated key agreement protocol based on certificate-less cryptography to authenticate users to establish a secure session between them. The proposed protocol attempts to mitigate the man-in-middle and key compromise impersonation attacks. It is found to be more efficient protocol.

Keywords -Authenticated key agreement, Certificate-less Key Generation, ID-PKC, VPN

[1] P. Arora, P.Vemuganti, P. Allani,2001. Comparison of VPN Protocols IPSec, PPTP, and L2TP, George Mason University.
[2] R. Oppliger, Internet and Intranet Security, 2nd Edition, 2002.
[3] R.Younglove, "Public key infrastructure. how it works," Computing & Control Engineering Journal, vol. 12, pp. 99–102, 2001.
[4] A. Shamir, "Identity-based cryptosystems and signature schemes," in Proc. CRYPTO 84 on Advances in cryptology. New York, NY, USA: Springer-Verlag New York, Inc., 1985, p. 47–53.
[5] C.Gentry, "Certificate-based encryption and the certificate.


Paper Type : Research Paper
Title : Design and Development of Simulation Existing Plant Layout
Country : India
Authors : Mahesh R. Korde || Dr. Achal Shahare || Dr. A. R. Sahu

Abstract: The goal of this painting is to analyse the mangeable improvements in the blanking plant layout that manufactures automotive factors. For this the systematic format arising with principle (SLP) is hired. all through this study, wiper pivot plate generating technique turned into studied. The problematic examine of the plant format consists of, operation approach simulation in flexsim software gadget has been investigated. the brand new plant layout changed into designed and simulated on flexsim to healthy effects stated underneath. as compared with this plant layout, the new plant format drastically shrivelled the gap of cloth drift, that has direct effect on material cost, personnel management and manufacturing consistent with day / Shift.

Keywords -flexsim, Roller, systematic layout planning, wiper pivot plate

[1]. Hari Prasad.Na, Rajyalakshmi.Gb, Sreenivasulu Reddy, ―A Typical Manufacturing Plant Layout Design Using CRAFT Algorithm‖ 12th GLOBAL CONGRESS ON MANUFACTURING AND MANAGEMENT, GCMM 2014, (2014) 1808 – 1814.
[2]. J G Barberenaa*, A Mutuberria Larrayoza, M Sáncheza, A Bernardosa, ―State-of-the-art of heliostat field layout algorithms and their comparison‖, Africa-EU Renewable Energy Research and Innovation Symposium, RERIS 2016, 8-10 March 2016, Tlemcen, Algeria (2016) 31 – 38.
[3]. Yosra Ojaghia, Alireza Khademia, Noordin Mohd Yusofa, Nafiseh Ghorbani Renania, Syed Ahmad Helmi bin Syed Hassana, ―Production Layout Optimization for Small and Medium Scale Food Industry‖ 12th Global Conference on Sustainable Manufacturing, Procedia CIRP 26 (2015 ) 247 – 251.
[4]. David Gyulaia, b, A da´m Szallerb, Zsolt Ja´nos Viharosa, c, ―Simulation-based Flexible Layout Planning Considering Stochastic Effects‖, 49th CIRP Conference on Manufacturing Systems (CIRP-CMS 2016), Procedia CIRP 57 ( 2016 ) 177 – 182.
[5]. Jose Antonio Diego-Mas a, *, Rocio Poveda-Bautista b, Diana Garzon-Leal c, ―Using RGB-D sensors and evolutionary algorithms for the optimization of workstation layouts‖ Applied Ergonomics 2017.


Paper Type : Research Paper
Title : Automated Multi Party Privacy Conflict Detection and Resolution in Social Media
Country : India
Authors : Dipali Dube || Prof. Kurhe B. S

Abstract: Multiparty privacy is major issue in social media. In today's world, the item shared through the social media may affect more than one user's privacy- e.g. photos that are uploaded, comments on the photos which mention multiple user, event in which users are invited, etc. The absence of multi-party privacy management support in current mainstream Social Media infrastructures makes users unable to properly control to who cowned items are shared. Computational mechanisms that are able to merge the privacy preferences of multiple users into a single policy for these kind of items can help solve this problem. As privacy preferences may conflict, these mechanisms need to consider how users' would actually reach an agreement in order to propose acceptable solutions to the conflicts..

Keywords -Social Media, Privacy, Conflict, Multiparty Privacy, Social Networking Services, Online Social Network, Computational Model, Privacy preserving.

[1] Resolving Multi-party Privacy Conflict in Social Media. Jose M. Such; Natalia Criado. IEEE transaction on knowledge and data engineering. 2016, volume:28,Issue:7, pages:1851-1863, DOI: 10.1109/TKDE.2016.2539165,Cited by :Papers(1)
[2] VarshaBhatKukkala,S.R.SIyengary and Jaspal Singh Saini," Secure Multiparty Graph Computation", 8th International Conference on Communication Systems and Networks (COMSNETS).2016
[3] Hongxin Hu, Gail-JoonAhn and Jan Jorgensen," Multiparty Access Control for Online Social Networks: Model and Mechanisms", ieee transactions on knowledge and data engineering, vol. 25, no. 7, july 2013
[4] VarshaBhatKukkala, S.R.S Iyengary and Jaspal Singh Saini," Secure Multiparty Computation of a Social Network", International Association for Cryptologic Research (IACR).2012
[5] Matthew Smith, Christian Szongott, "Big Data Privacy Issues in Public Social Media", 6th IEEE International Conference on 2012..


Paper Type : Research Paper
Title : Review: Design, Analysis and Optimization of 4-Cyliner Diesel Engine Crankshaft using Aluminum Alloy
Country : India
Authors : Randhavan B M || Galhe D S

Abstract: Crankshaft is an important component in an engine assembly. Crankshaft consists of two web sections and one crankpin, which converts the reciprocating displacement of the piston to a rotary motion with a four link mechanism. This paper is related to design and finite element analysis of crankshaft of 4 cylinder diesel engine of heavy vehicle like truck. Engine capacity is 3785.1cc. The finite element analysis in ANSYS software by using three materials based on their composition viz. FG260, FG300 and Aluminum based alloy material. The parameter like von misses stress, deformation; maximum and minimum principal stress & strain were obtained from analysis software. The results of Finite element shows that the Aluminum based composite material is best material among all. Finally the results are validated through experimentation on Izod-Charpy impact testing, Pin on disc Wear test and Metallurgical Microscope.

Keywords -Crankshaft, Finite Element Analysis, Wear Test, Aluminum Alloy, von misses stress.

[1]. Wei Li, Qing Yan, Jianhua Xue, "Analysis of a crankshaft fatigue failure", Engineering Failure Analysis 55 (2015) 139–147.
[2]. M. Fonte, P. Duarte, V. Anes, M. Freitas, L. Reis, "On the assessment of fatigue life of marine diesel engine Crankshafts", Engineering Failure Analysis (2015).
[3]. M. Fonte, V. Anes, P. Duarte, L. Reis, M. Freitas, "Crankshaft failure analysis of a boxer diesel motor", Engineering Failure Analysis (2015).
[4]. M. Fonte, P. Duarte, L. Reis, M. Freitas, V. Infante, "Failure mode analysis of two crankshafts of a single cylinder diesel engine", Engineering Failure Analysis (2015).
[5]. B. Kareem, "Evaluation of failures in mechanical crankshafts of automobile based on expert opinion", Case Studies in Engineering Failure Analysis 3 (2015) 25–33..



IOSR Journals are published both in online and print versions.