S.No. |
||
1. |
Author: Mulugeta Tadesse Abstract: - Drying is the oldest mechanism to preserve crops, fruit, vegetables, and cooked food for long time usually by using direct sun drying as well as solar drying by using solar collectors. Onion and related vegetables are need drying to preserve them for the required time before its use to avoid its contact spoilage. In this project v-grooved parallel double pass solar collector selected for its high efficiency and high mass flow rate of hot dry air to dry 30 kg sample onions. For preservation of onion it is needed to evaporate 5.16 kg moisture from its total moisture content. The mass of dry air required to evaporate the given mass of moisture is 565.88 m³ dry-airs at a least 20 oC temperature difference. The overall efficiency of the selected type solar collector which required supplying the required amount of hot dry air is calculated based on the initial its model is 41.79%. The output temperature to the mass flow rate of working fluid, output temperature to flow contact area, and overall efficiency of the collector to mass flow rate of the working fluid is relation simulation made by using math lab software. Keywords: - Dehydration, Dry chamber, Onion Preservation, V-grooved solar collector, working fluid [1] Sarsavadia PN, Sawhney RL, Pangavhane DR, Singh SP. “Drying behavior of brined onion slices”. J Food Eng. 1999;40:219–226. doi: 10.1016/S0260-8774(99)00058-8 [2] McLean KA. “Drying and storage of combinable crops”. Suffolk Farm Press, 1980. [3] Ekechukwu OV. “Experimental studies of integral-type naturalcirculation solar-energy tropical crop dryers”. Kingdom, 1987. [4] Arinze EA, Schoenau G, Bigsby FW. “Solar-energy absorption properties of some agricultural products”. ASAE paper, no. 79-3071, 1979. [5] Brooker DB, Bakker-Arkema FW, Hall CW. “Drying cereal grains”. Westport AVI, 1974. [6] O.V. Ekechukwu, B. Norton, “Review of solar-energy drying systems II: an overview of solar drying technology”. Energy Research Centre, University of Nigeria, Nsukka, Nigeria 1997 [7] M.A. Karim and Z.M. Amin, “Mathematical Modeling and Performance Analysis of Different Solar Air Collectors”. IIUM Engineering Journal, Vol. 16, No. 2, 2015 [8] Ong KS. (1995), “Thermal performance of solar air heaters: Mathematical model and solution procedure”. Solar Energy, 55:93- 109. [9] Mudafer kareem Abdullah and Ahmed Abed Gatea, “Performance evaluation of a v-groove solar air collector for drying maize (Zea mays) in lraq”. January, 2011 |
1-12 |
2. |
A Review on Cloud Data Security using Frequency Variation and Hard Logarithmic based Algorithm Authors: Ankur Jain, Dr. L. K. Vishwamitra Abstract- Offering real-time data security for Peta-bytes of data is important for Cloud Computing. A recent survey on cloud security states that the security of users’ data has the highest priority as well as concern. I have reviewed paper “Towards achieving Data Security with the Cloud Computing Adoption Framework” and found that this paper is using multilayered architecture for data security. There are three lyres in this paper : 1. firewall and access control; 2. identity management and intrusion prevention and 3. convergent encryption This paper has developed a framework known as Cloud Computing Adoption Framework (CCAF) which has been customized for securing cloud data. This paper explains the overview, rationale and components in the CCAF to protect data security. CCAF is illustrated by the system design based on the requirements and the implementation demonstrated by the CCAF multi-layered security. This paper has undertaken two sets of ethical-hacking experiments involved with penetration testing with 10,000 Trojans and viruses. The CCAF multi-layered security can block 9,919 viruses and Trojans which can be destroyed in seconds and the remaining ones can be quarantined or isolated. The experiments show although the percentage of blocking can decrease for continuous injection of viruses and Trojans, 97.43% of them can be quarantined. Our CCAF multi-layered security has an average of 20% better performance than the single-layered approach which could only block 7,438 viruses and Trojans. References- [1] John Reumann. GooPS: Pub/Sub at Google, Lecture & Personal Communications at EuroSys & CANOE Summer School. 2009. [2] G. Loukas, and ¨G. Oke, “Protection against denial of service attacks: A survey.” Computer. Journal. 53, pages-1020–1037. (2010) [3] M. H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita “Surveying port scans and their detection methodologies.” Computer. Journal., 54, Pages-1565–1581,(2011) [4] H. J. Kashyap, and D. K. Bhattacharyya “,ADDoS attack detection mechanism based on protocol specific traffic features.”, Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology, Coimbatore, India, 26-28 October, pp. 194–200. ACM. , (2012). [5] Eddy, W. TCP SYN flooding Attacks and Common Mitigations. http://tools.ietf.org/html/rfc4987. RFC 4987, IETF published document, 2007. [6] IP Flow Based Technology”, Arbor Networks, http://www.arbornetworks.com, 2010. [7] C.Patrikakis, M. Masikos, and O. Zouraraki, “Distributed Denial of Service Attacks,” The Internet Protocol J., vol. 7, no. 4, pp. 13-35, 2004. [8] T. Peng, C. Leckie, and K. Rama mohanarao, “Survey of NetworkBased Defense Mechanisms Countering the DoS and DDoS Problems,” ACM Computing Surveys, vol. 39, no. 1, p. 3, 2007. [9] Christian Esposito, Massimo Ficco, Francesco Palmieri, Aniello Castiglione, “Interconnecting Federated Clouds by Using PublishSubscribe Service” Cluster Comput (2013) 16:887–903 [10] I. Goiri, J. Guitart, and J. Torres, “Economic model of a cloud provider operating in a federated cloud,” Information Systems Frontiers, vol. 14, no. 4, pp. 827–843, 2011.
|
13-18 |