Vous êtes sur la page 1sur 4

VISVESVARAYA TECHNOLOGICAL UNIVERSITY,

BELGAUM

A PROJECT REPORT ON
SOLID WASTE MANAGEMENT AND SEARCH FOR
ALTERNATE PROCEDURES OF WASTE TREATMENT,
RECYCLING AND MANAGEMENT
Submitted in fulfillment of the requirements for the award of

BACHELOR OF ENGINEERING
DEGREE
IN
CIVIL ENGINEERING
Submitted By:

PROJECT ASSOCIATES
I.KARTHIK
GOPAL REDDY.H
KRISHNA KUMAR.K
SUSHANT .S .JEEVANGOUDAR

3VC10CV020
3VC08CV007
3VC08CV010
3VC10CV052

Under the Guidance of


Prof. M.R.VIJAYA KUMAR ,B.E (CIVIL),M.Tech(ENV)

DEPARTMENT OF CIVIL ENGINEERING

RAO BAHADUR Y MAHABALESHWARAPPA ENGINEERING


COLLEGE

(Affilated To Visvesvaraya Technological University, Belgaum & Approved By AICTE, New Delhi)
(Formerly VIJAYANAGAR ENGINEERING COLLEGE, BELLARY)
CANTONMENT, BELLARY-583 104 (KARNATAKA)

V.V.SANGHAS

RAO BAHADUR Y MAHABALESHWARAPPA


ENGINEERING COLLEGE
DEPARTMENT OF CIVIL ENGINEERING
(Accredited by National Board of Accreditation and Certified ISO 9001:2000)

CERTIFICATE
This is to certify that the Project Work entitled SOLID WASTE MANAGEMENT
AND SEARCH FOR ALTERNATE PROCEDURES OF WASTE TREATMENT, RECYCLING
AND
MANAGEMENT
is a bonafide work carried out byI.KARTHIK
3VC10CV020 ,GOPAL REDDY.H 3VC08CV007 , KRISHNA KUMAR.K 3VC08CV010, SUSHANT
.S . JEEVANGOUDAR 3VC10CV052 in partial fulfillment for the Award of degree of

Bachelor of Engineering in Computer Science and Engineering from Visvesvaraya


Technological University, Belgaum during the year 2013-2014. It is certified that all
corrections/suggestions indicated for Internal Assessment have been incorporated in the
report deposited in the departmental library. The project report has been approved as it
satisfies the academic requirements in respect of project work prescribed for the said
Degree.
Signature of Project guide

Signature of HOD

_______________________

___________________

Prof. M.R.VIJAYA KUMAR

Prof.T.H.PATEL

Signature of Principal
________________________

Dr. K.VEERESH
Name of the Examiners:

Signature with date:

1.

2.

ACKNOWLEDGEMENT
With great respect and gratitude,
We would like to express our regards and acknowledgement to all those who
helped in making this project possible. The satisfaction that accompanies the successful
culmination of any task would be incomplete without mentioning those who made it
possible because success is the epitome of hard work, determination, concentration and
dedication.
Firstly we would like to thank our beloved Parents whose everlasting guidance
and support is incredible in completing this project successfully.We are grateful to the
Principal Dr.K.VEERESH for providing facilities and untiring zeal, which
constantly inspired us towards the attainment of everlasting knowledge throughout the
course.We are deeply indebted to our beloved HOD T.H.PATEL for the valuable
suggestions and constant encouragement provided for the successful completion of our
project.
We would like to thank our guide Prof. M.R.VIJAYA KUMAR for the
constant guidance in the successful completion of our project. Finally, we would like to
thank all the staff members of our Department Computer Science and Engineering for
their guidance and support. We are also thankful to our friends who continue in giving
this best support.

PROJECT ASSOCIATES
I.KARTHIK
GOPAL REDDY.H
KRISHNA KUMAR.K
SUSHANT .S .JEEVANGOUDAR

3VC10CV020
3VC08CV007
3VC08CV010
3VC10CV052

ABSTRACT
Open nature of peer-to-peer systems exposes them to malicious activity.
Building trust relationships among peers can mitigate attacks of malicious peers. This
paper presents distributed algorithms that enable a peer to reason about trustworthiness
of other peers based on past interactions and recommendations. Peers create their own
trust network in their proximity by using local information available and do not try to
learn global trust information. Two contexts of trust, service, and recommendation
contexts, are defined to measure trustworthiness in providing services and giving
recommendations. Interactions and recommendations are evaluated based on
importance, recentness, and peer satisfaction parameters. Additionally, recommenders
trustworthiness and confidence about a recommendation are considered while evaluating
recommendations. Simulation experiments on a file sharing application show that the
proposed model can mitigate attacks on 16 different malicious behavior models. In the
experiments, good peers were able to form trust relationships in their proximity and
isolate malicious peers.

Vous aimerez peut-être aussi