IJCST 8.2 (April-June 2017) | International journal of computer science and information technology

International Journal of Computer Science and Technology
IJCST 8.2 (April-June 2017)

S.No. Research Topic Paper ID Download

An Evaluation on Algae as Biomass for the Production of Biofuels

Satheesha Kumar K, Srinidhi Rao. P


The need for fuels of renewable origin is very essential for the countries that are in the development stages. The present condition is that the power generation is purely based on the fossil fuel thermal power plants which share a major source. Next to that is the nuclear power plant, which has its own limitations and problems associated to it. In the field of biofuels, various attempts has been carried out to blend a certain percentage of biofuels obtained from crops such as jathropa, cotton seed and many other varieties. In this review, a possibility of using Algae for the production of biofuels is discussed.
Full Paper


Secure Signature Generation for Dynamic Audit Services in Cloud Data Storage

Madasu Kalpana, Vakamalla Siva Sankar Reddy


Maintaining data determined quality in public cloud acts an essential measure in cloud computing. Cloud storage auditing settles the multifaceted nature of data dependability in public cloud. In advance auditing protocols are all standard on the announcement that the customer’s private key for auditing is totally secured. Nonetheless, such proclamation most likely won’t for untouched be seized, in light of the presumably weak rationale of insurance or potentially low security settings at the customer. In the event that such a mystery key for auditing is\ revealed, almost every one of the current auditing protocols would unquestionably form into unable toward effort. In this paper, we meeting point happening this new part of cloud storage auditing. We analyze how to diminish harm of the customer’s key scope in cloud storage auditing, and give the essential sensible answer for this unique trouble setting. We commend the significance and the shelter model of auditing convention with key-scope adaptability and propose such a convention. In our arrangement, we use the preorder traversal method and the twofold tree structure to illuminate the private keys for the buyer. Not with standing grow a novel authenticator structure to maintain the forward security and the advantages of lump less obviousness. The asylum verification and the presentation examination demonstrate that our proposed convention is sheltered and capable.
Full Paper


Survey of Cryptographic Hashing Algorithms for Message Signing

Ankit Kumar Jain, Rohit Jones, Puru Joshi


In the world of computing, there is always a need for unique values to be generated for numerous applications. Various methods exist with the most common being reliant on an instance of time. But when we need to generate a unique value, based on an input factor such that the exact same value is generated, every time the input factor is the same, cryptographic hashing functions get the job done. Cryptographic hashing functions have many uses like digital signatures, message authentication, checksum generation, digital fingerprinting and securing passwords in a database. In this paper, we review and compare multiple hashing algorithms by different criteria with emphasis on message authentication.
Full Paper


Bicubic Interpolation Algorithm Implementation for Image Appearance Enhancement

Prachi R Rajarapollu, Vijay R Mankar


Aliasing is a typical antique in low-resolution (LR) pictures produced by a down sampling procedure. Recuperating the first high-determination picture from its LR partner while in the meantime evacuating the associating ancient rarities is a testing picture introduction issue. Since a characteristic picture ordinarily contains repetitive comparable patches, the benefits of missing pixels can be accessible at composition applicable LR pixels. In light of this, the paper proposes an iterative multiscale bicubic interpolation technique that can successfully address the associating issue. The proposed technique appraises each missing pixel from an arrangement of surface pertinent semilocal LR pixels with the composition closeness iteratively measured from a succession of patches of differing sizes. In particular, in every emphasis, top surface significant LR pixels are utilized to build an information constancy term in a most extreme a posteriori estimation, and a respective aggregate variety is utilized as the regularization term. Exploratory results contrasted and existing interjection strategies exhibit that our strategy can considerably reduce the associating issue as well as produce better results over an extensive variety of scenes both as far as quantitative assessment and subjective visual quality.
Full Paper