Wind results from air in motion. Air in motion arises from a pressure gradient. Wind can be proadly classified as “planetary” & “local”. Planetary winds are caused by greater solar heating of the earth`s surface near the equator than near the northern or southern poles. This cause warm tropical air to rise and flow through the upper atmosphere towards the poles & cold air from the poles to flow back to the equator nearer to earth’s surface. The direction of motion of planetary winds with respect to the earth is affected by the rotation of the earth. The wam air moving toward the poles in the upper atmosphere assumes an easterly direction that results in prevailing westerlies. The westerlies controls events between the 300 & 600 latitudes. Because the earth`s axis is inclined to its orbital plane around the sun.
Local winds are caused by two mechanisms. The first is differential heating of land & water. So far insulation during the day is readily converted to sensible energy of the land surface but is partly absorbed in layers below the water surface and partly consumed in evaporating some of that water. This is the mechanism of shore breezes. At night, the direction of the breezes is reversed because the land mass cods to the sky more rapidly than the water assuming the clear sky. The second mechanism of local wind is caused by bills & mountain sides. The air above the slop side heats up during the days & cools down at night, move rapidly than the air above the low lands. This causes heated air during the day to rise along the slopes & relatively cool heavy air to flow down at night.
In India the interest in the wind mills was shown in the last fifties & sixties. An wind, in India are relatively low and very appreciably with the seasons. Data quoted by some scientists that for India wind speed value lies between 5 km/hr to 15-20 km/hr.
Download Electrical Engineering/Power engineering project for submission of final year engineering,master of electrical engineering.
Long extra high voltage (EHV) ac lines cannot be loaded to their thermal limits in order to keep sufficient margin against transient instability. With the scheme proposed in this project, it is possible to load these lines very close to their thermal limits. The conductors are allowed to carry usual ac along with dc superimposed on it.
The added dc power flow does not cause any transient instability. This project gives the feasibility of converting a double circuit ac line into composite ac–dc power transmission line to get the advantages of parallel ac–dc transmission to improve stability and damping out oscillations. Simulation and experimental studies are carried out for the coordinated control as well as independent control of ac and dc power transmissions. No alterations of conductors, insulator strings, and towers of the original line are needed. Substantial gain in the load ability of the line is obtained. Master current controller senses ac current and regulates the dc current orders for converters online such that conductor current never exceeds its thermal limit.
free Download Electrical Engineering Project on
"POWER UPGRADING OF TRANSMISSION LINE BY COMBINING AC–DC TRANSMISSION" from enggroom.com.
Scalable and Secure Sharing of Personal Health
Records in Cloud Computing using
Attribute-based Encryption
Abstract
Personal health record (PHR) is an emerging patient-centric model of
health information exchange, which is often outsourced to be stored at a third party, such
as cloud providers. However, there have been wide privacy concerns as personal health
information could be exposed to those third party servers and to unauthorized parties. To
assure the patients’ control over access to their own PHRs, it is a promising method to
encrypt the PHRs before outsourcing. Yet, issues such as risks of privacy exposure,
scalability in key management, flexible access and efficient user revocation, have
remained the most important challenges toward achieving fine-grained, cryptographically
enforced data access control. In this paper, we propose a novel patient-centric framework
and a suite of mechanisms for data access control to PHRs stored in semi-trusted servers.
To achieve fine-grained and scalable data access control for PHRs, we leverage attribute
based encryption (ABE) techniques to encrypt each patient’s PHR file. Different from
previous works in secure data outsourcing, we focus on the multiple data owner scenario,
and divide the users in the PHR system into multiple security domains that greatly
reduces the key management complexity for owners and users. A high degree of patient
privacy is guaranteed simultaneously by exploiting multi-authority ABE. Our scheme
also enables dynamic modification of access policies or file attributes, supports efficient
on-demand user/attribute revocation and break-glass access under emergency scenarios.
Extensive analytical and experimental results are presented which show the security,
scalability and efficiency of our proposed scheme.
Architecture
Existing System
In Existing system a PHR system model, there are multiple owners
who may encrypt according to their own ways, possibly using different sets
of cryptographic keys. Letting each user obtain keys from every owner who’s
PHR she wants to read would limit the accessibility since patients are not
always online. An alternative is to employ a central authority (CA) to do the
key management on behalf of all PHR owners, but this requires too much
trust on a single authority (i.e., cause the key escrow problem).
Key escrow (also known as a “fair” cryptosystem) is an
arrangement in which the keys needed to decrypt encrypted data are held in
escrow so that, under certain circumstances, an authorized third party may
gain access to those keys. These third parties may include businesses, who
may want access to employees' private communications, or governments,
who may wish to be able to view the contents of encrypted communications.
Proposed System
We endeavor to study the patient centric, secure sharing of PHRs stored on
semi-trusted servers, and focus on addressing the complicated and challenging key
management issues. In order to protect the personal health data stored on a semitrusted
server, we adopt attribute-based encryption (ABE) as the main encryption
primitive.
Using ABE, access policies are expressed based on the attributes of users or
data, which enables a patient to selectively share her PHR among a set of users by
encrypting the file under a set of attributes, without the need to know a complete list
of users.
The complexities per encryption, key generation and decryption are only
linear with the number of attributes involved.
Modules
1. Registration
2. Upload files
3. ABE for Fine-grained Data Access Control
4. Setup and Key Distribution
5. Break-glass
Modules Description
Registration
In this module normal registration for the multiple users. There are
multiple owners, multiple AAs, and multiple users. The attribute hierarchy of files
– leaf nodes is atomic file categories while internal nodes are compound
categories. Dark boxes are the categories that a PSD’s data reader has access to.
Two ABE systems are involved: for each PSD the revocable KP-ABE
scheme is adopted for each PUD, our proposed revocable MA-ABE scheme.
_ PUD - public domains
_ PSD - personal domains
_ AA - attribute authority
_ MA-ABE - multi-authority ABE
_ KP-ABE - key policy ABE
Upload files
In this module, users upload their files with secure key probabilities. The
owners upload ABE-encrypted PHR files to the server. Each owner’s PHR file
encrypted both under a certain fine grained model.
ABE for Fine-grained Data Access Control
In this module ABE to realize fine-grained access control for outsourced data
especially, there has been an increasing interest in applying ABE to secure electronic
healthcare records (EHRs). An attribute-based infrastructure for EHR systems, where
each patient’s EHR files are encrypted using a broadcast variant of CP-ABE that
allows direct revocation. However, the cipher text length grows linearly with the
number of un revoked users. In a variant of ABE that allows delegation of access
rights is proposed for encrypted EHRs applied cipher text policy ABE (CP-ABE) to
manage the sharing of PHRs, and introduced the concept of social/professional
domains investigated using ABE to generate self-protecting EMRs, which can either
be stored on cloud servers or cell phones so that EMR could be accessed when the
health provider is offline.
Setup and Key Distribution
In this module the system first defines a common universe of data attributes shared by
every PSD, such as “basic profile”, “medical history”, “allergies”, and “prescriptions”. An
emergency attribute is also defined for break-glass access.
Each PHR owner’s client application generates its corresponding public/master keys.
The public keys can be published via user’s profile in an online healthcare social-network (HSN)
There are two ways for distributing secret keys.
_ First, when first using the PHR service, a PHR owner can specify the access
privilege of a data reader in her PSD, and let her application generate and
distribute corresponding key to the latter, in a way resembling invitations in
GoogleDoc.
_ Second, a reader in PSD could obtain the secret key by sending a request
(indicating which types of files she wants to access) to the PHR owner via HSN,
and the owner will grant her a subset of requested data types. Based on that, the
policy engine of the application automatically derives an access structure, and
runs keygen of KP-ABE to generate the user secret key that embeds her access
structure.
Break-glass module
In this module when an emergency happens, the regular access
policies may no longer be applicable. To handle this situation, break-glass access is
needed to access the victim’s PHR. In our framework, each owner’s PHR’s access
right is also delegated to an emergency department ED to prevent from abuse of
break-glass option, the emergency staff needs to contact the ED to verify her
identity and the emergency situation, and obtain temporary read keys. After the
emergency is over, the patient can revoke the emergent access via the ED.
System Specification
[b]System Requirements:
Hardware Requirements:
•System : Pentium IV 2.4 GHz.
•Hard Disk : 40 GB.
•Floppy Drive : 1.44 Mb.
•Monitor : 15 VGA Colour.
•Mouse : Logitech.
•Ram : 512 Mb.
Software Requirements:
•Operating system : - Windows XP.
•Coding Language : ASP.Net with C#.
•Data Base : SQL Server 2008
[/b]
The main objective of the proposed solution is to be automated the various functions and activities of the bank through Internet. The solution will facilitate to the bank employees and the account holders with the different modules. This solution is very much necessary for the private sector banks and the corporate sector. The banking industry will take a new shape and explore like never before. Using the solution the bankers and account holders can generate various kinds of reports.
BUSINESS REQUIREMENTS:
User friendly:
The solution provides very simple and modified features, which are very easy to view and operate various features. The said project is designed and organized in very simplified manner to suit the current requirements of the account holders of various models such as Saving Bank Account, Current Account, and Recurring Deposit Account.
Transaction Management
The transaction made through either net or manually in bank need to have a consistency with respect to the account details and other related information like transaction details across various databases.
Value Added Service
The solution provides good number of value added services in comparison to the normal banking services.An account holder can issue the instructions to transfer certain amount to any particular account number of the same / different bank. Individual can log on to the site and open new bank account in his name online by following the simplified registration form instructions
Security:
The Online banking deals with a lot of proprietary information for its users, which are confidential. This is also ensures that the data that is put into the system maintains its integrity because malicious or unauthorized individual will not have access to alter them.
Online Library Management System in Java Abstract:-
The project Online Library Management System is Library management software for monitoring and controlling the routine task of library .The project “Library Management System” is developed in java,JSP which mainly focuses on basic operations in a library like adding new member, new books, and updating new information, searching books and members and facility to borrow and return books.
Description : This project is going to be developed in Dot Net and SQL server. In this project a complete database of Uttarakhand employees is going to be created. The total no. of post created, filled, scale wise employees, vacant posts, designation wise etc. reports can be generated with the help of this s/w. Moreover this project also provides the facility of business intelligence . This can be achieved using ASP.NET OlAP Controls ..
Posted by: edizosky - 01-18-2014, 09:23 AM - Forum: Project
- No Replies
AM WORKING ON A PROJECT WHICH PROPOSES A BIOMETRIC STUDENT ATTENDANCE SYSTEM USING FINGERPRINT SCANNER. I WANT TO USE JAVA PROGRAMMING LANGUAGE TO DEVELOP THE SOFTWARE. ANY IDEAS? THANK YOU