Volume 2 Issue 3 March 2013 

Image description

Authors : Naskar Ankita*, Mrs. Mishra Monika R.

Abstract— 

Data security and access control are  the most challenging research work going on, at present, in cloud computing. This is because of the users sending their sensitive data to the cloud providers for acquiring their services. In cloud computing, the data is going to be stored in storage area provided by the service providers. The service providers must have a suitable way to protect their client’s sensitive data, especially to protect the data from unauthorized access. A common method of information privacy protection is to store the client’s data in encrypted form. If the cloud system is responsible for both storage and encryption/decryption of the data, the system administrators may simultaneously obtain encrypted data and the decryption keys. This will allow them to access the information of the client without any authorization. This leads to the risk of sensitive information leak and the method involved of storage and encryption/decryption is costly too. Hence, to overcome these problems, a model (cloud server) has been proposed in this paper which accepts only those data which are required in an encoded form, performs the service opted by the client and sends the result in the encoded format to be understood by the respective client

 

[Download Full Text Article]

Image description

Title : An Unlinkable and Unobservable Secure  Routing with Symmetric Approach for MANETS

Authors : Dr.V.Khanaa, Dr.Krishna Mohanta

 

Abstract

Privacy preserving routing is crucial  for  some ad hoc networks that require stronger privacy  protection. A number  of  schemes  have  been  proposed  to  protect  privacy  in  ad hoc networks. However, none of these schemes offer complete unlinkability or unobservability property since data packets and control  packets  are  still  linkable and  distinguishable in  these schemes. In this paper, define stronger privacy requirements regarding privacy-preserving routing in mobile ad hoc networks. Then propose an unobservable secure routing scheme to offer complete unlinkability and content unobservability for all types of packets. It is efficient as it uses a novel combination of group signature and ID-based encryption for route discovery. Security analysis demonstrates that can well protect user privacy against both inside and outside attackers. Implement it on ns2, and evaluate its performance by comparing with AODV and MASK. The simulation results show that not only  has satisfactory performance compared to AODV, but also achieves stronger privacy protection than existing  schemes like MASK.

 

[Download Full Text Article] 

Image description

Title : Secure And Authenticated Reversible Data Hiding In Encrypted Images

Authors : Dr.V.Khanaa, Dr.Krishna Mohanta

 

Abstract-

Reversible data hiding a novel technique which is used to embed additional information in the encrypted images, applies in military and medical images, which can be recoverable with original media and the hided data without loss. A number of reversible data hiding techniques were proposed in the recent years, but on analysis, all lacks in providing the security and authentication. This project proposes a novel reversible data hiding technique which work is separable, the receiver can extract the original image or extra embedded data or both according to the keys hold by the receiver. On the other hand the receiver can verify the data hided by the data hider, such that the work proposes both security and authentication. This project proposes a novel reversible data hiding technique which poses both security and authentication for additional data stored in the encrypted images. Also proposed work is separable, the receiver can extract the original image or extra embedded data or both according to the keys hold by the receiver. On the other hand the receiver can verify the data hided by the data hider, such that the work proposes both security and authentication.

This work proposes a novel scheme for separable reversible data hiding in encrypted images. In the first phase, a content owner encrypts the original uncompressed image using an encryption key. Then, a

data-hider may compress the least significant bits of the encrypted image using a data-hiding key to create a sparse space to accommodate some additional data. With an encrypted image containing additional data, if a receiver has the data-hiding key, he can extract the additional data though he does not know the image content. If the receiver has the encryption key, he can decrypt the received data to obtain an image similar to the original one, but cannot extract the additional data. If the receiver has both the data-hiding key and the encryption key, he can extract the additional data and recover the original content without any error by exploiting the spatial correlation in natural image when the amount of additional data is not too larg

 

[Download Full Text Article]

Image description

Authors : Nikita Jaiswal , Rajesh Kumar Chakrawarti 

 

Abstract:- 

In most of the shortest path problems like vehicle routing problems and network routing problems, we only need an efficient path between two points—source and destination, and it is not necessary to calculate the shortest path from source to all other nodes. Dijkstra algorithm is called “ Single Source Shortest Path “.This paper  introduces the Dijkstra algorithm in detail, and illustrates the method of implementation of the algorithm and the disadvantages of the algorithm .this algorithm applied on Directed weighted graph to find shortest path between two nodes ,but all weights in the graph should be non negative. In this paper we also discuss about how we can improve this algorithm in terms of finding path according to cost by increasing some no. of nodes

 

[Download Full Text Article]

Image description

Title : QI OPEN WIRELESS CHARGING STANDARD – A WIRELESS TECHNOLOGY FOR THE FUTURE

Authors : P.Manivannan1, S.Bharathiraja2

 

Abstract – 

This paper is used to express the great capabilities of the wireless power transmission techniques. Wireless power transfer allows a convenient, easy to use battery charging of mobile phones and other mobile devices. No hassle with cables and plugs, just place the device on a pad and that’s it. Such a system even has the potential to become a standard charging solution

 

[Download Full Text Article]

Image description

Title : AN EFFICIENT SCHEME TO IMPROVE THE OVERLAPPED TRANSMISSION IN WIRELESS ADHOC NETWORK USING CARRIER SENSE MULTIPLE ACCESS

Authors : R .Vivekanadhan, T.Nalini, Dr.V.Khanaa

 

Abstract— 

Wireless network refers to any type of computer network that is not connected by cables of any kind. Wireless network is divided into multiple types such as Wireless LAN, Wireless MAN, Cellular networks and Ad-hoc networks etc. In wireless ad-hoc networks, interference is one of the major impairments that reduce the performance of a network. To reduce this interference, we have been using a technique called Interference Cancellation(IC). Instead of this Interference Cancellation some of the techniques such as Multi User Detection (MUD), Multi Packet Reception (MPR) has been used in networks. However MPR is typically requires a very complicated hardware. As well as it is not suitable without knowing a interfering signals. Therefore we moved to Overlapped Transmission technique. In this overlapped transmission technique, a multiple transmission can occur in the same network. These techniques have much lower signal processing demand than the Multi Packet Reception. Overlapped Carrier Sense Multiple Access (OCSMA) protocol can be used to improve the performance of overlapped transmission technique. We develop a MAC protocol based on the IEEE 802.11 standard to support the overlapped transmission in networks. And we investigate the impact of overlapped transmission on the performance of Transmission Control Protocol in wireless ad-hoc MIMO networks using directional antennas.

 

[Download Full Text Article]

Image description

Title : A SOC TROJAN VIRUS DETECTOR AND CORRECTOR USING  MULTIPLE MONITORING SCHEMES

Authors : R .Vivekanadhan, T.Nalini, Dr.V.Khanaa

 

Abstract-

A design of 16 bit processor is programmed in VHDL. The processor module is added with extra hardware logic calle d Trojan.A fault bit pattern is injected into the circuit along with the processor clock. The fault bit patterns triggers the extra hardware hidden in the processor that can be detected by verifying the output result from memory and CPU.

 

[Download Full text Article]

Image description

Title : A SURVEY ON 3D INTERNET IN WEB 3.0

Authors : Mrs.G.Sumalatha1 & Mr.S.Bharathiraja2

 

Abstract- 

This paper presents the study of 3D Internet in web 3.0 and analyze how it is used in present and future. 3D internet also known as virtual worlds is a powerful new way for you to reach consumers, business customers, co-workers, partners, and students. It combines the immediacy of television, the versatile content of the Web, and the relationship-building strengths of social networking sites like Face book. Yet unlike the passive experience of television, the 3D Internet is inherently interactive and engaging. Virtual worlds provide immersive 3D experiences that replicate (and in some cases exceed) real life.

Second Life is one such resource which is implementing the concept of the 3D Internet in its applications. And off late this application has been a great success in the United States and is expected to affect the internet usage in a drastic way. This paper is for anyone who may have recently heard the term "3D Internet in web3.0" for the first time and needs to know what it is and how it helps them.

 

[Download Full Text Article]

Image description

Title : INTER SECURE WEBPORTAL SOLUTION

Author : K.Anitha, Manjula.R, Sukila.S, Thiyagarajan.k, Vinothkumar.M, Mrs.G.Padmapriya

 

Abstract:- 

This paper provides security that has to be implemented in the network path. The vital part of this can be effectively programmed so that the data are sent in encrypted form. Among the fool proof algorithms that are in existence we chose RSA to be implement . The factoring challenge was intended to track the cutting edge in integer factorization. A primary application is for choosing the key length of the RSA encryption scheme. Progress in this challenge should give an insight into which key sizes are still safe and for how long. Two thousand forty eight bit is used for security purposes. Web portal give access to multiple users. Security is provided by allowing only authenticated users for accessing websites and files. Authenticated users can be determined by checking against database with the user name and password. The path security can be provided by encrypting the client request using 2048 bit key and can be decrypted by the server with the help of private key which is known only to the server. The accessed detail of every client has been seen in session viewer.

 

[Download Full Text Article]

Image description

Title : REDUCING ATTACK FREQUENCY IN MANET ROUTING

Authors : Janaranjani.C, Kavieyanchale.R, Muthusamy.A, Nataraj.S, Krishnakumar.R, Mrs.V.Sharmila

 

Abstract

Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. Even though there exist several intrusion response techniques to mitigate such critical attacks, existing solutions typically attempt to isolate malicious nodes based on binary or naıve fuzzy response decisions. However, binary responses may result in the unexpected network partition, causing additional damages to the network infrastructure, and naıve fuzzy responses could lead to uncertainty in countering routing attacks in MANET. In this paper, we propose a risk-aware response mechanism to systematically cope with the identified routing attacks. Our risk-aware approach is based on an extended Dempster-Shafer mathematical theory of evidence introducing a notion of importance factors. In addition, our experiments demonstrate the effectiveness of our approach with the consideration of several performance metrics

 

[Download Full Text Article]

Image description

Title : PERSISTENT AND CONCURRENT SERVER FOR RELIABLE TRANSACTON

Authors : Gokulakannan R, Indhumathi M, Kalpana P, karthick.S, Mr.C.Thirumalaiselvan

 

Abstract:- 

This paper provides Reliability that has to be implemented in the Client –Server communication in a network .The most important thing in client server communication is the reliability of data. In an online transaction all the data is transferred over the network there are several factors like hardware crisis or unavailability of network which prevent the total reliability factor. For this purpose it is required that the data should have a backup. Not only the data but the webserver can have these problem.Inorder to overcome these problems we merge the concept of mirroring of data with the help of a primary and secondary webserver. Each webserver runs independently on a different machine. The machine will have two NIC(NETWORK INTERFACE CARD) cards. In the  server1 the first NIC card will be configured to the static ip which will be accessed by the client. In a point of failure the second NICin the primary server will be in communication with the first NICin the  server2. When the query from the First NIC in  server2 fails it assigns the static ip to the second NICin the  server2. By this mechanism the client will have uninterrupted usage of the server even when the server2 fails.Another key aspect of this project is that it will take regular backup of the data in the database server to the secondary database server in which RAID 10 concept is used. This process will occur for a small interval of time as decided by the user. This paper use the RSA Algorithm to provide the Security to the client data during backup.

 

[Download Full Text Article]

Image description

Title : LITERATURE SURVEY ON ALGORITHMIC AND NON- ALGORITHMIC MODELS FOR SOFTWARE DEVELOPMENT EFFORT ESTIMATION

Authors : K.Ramesh1 P.Karunanidhi2,

 

Abstract :-

The effort invested in a software project is probably one of the most important and most analyzed variables in recent years in the process of project management. Computing techniques is a consortium of methodologies centering in fuzzy logic, artificial neural networks, and evolutionary computation. It is important, to mention here, that these methodologies are complementary and synergistic, rather than competitive. They provide in one form or another flexible information processing capability for handling real life ambiguous situations. These methodologies are currently used for reliable and accurate estimate of software development effort. The aim of this study is to analyze algorithmic modes and non-algorithmic models  in the existing models and to provide in depth review of software and project estimation techniques existing in industry and literature based on the different test datasets along with their advantages and disadvantages.

 

[Download Full Text Article]

Image description

Title : AUTOMATIC SPEECH RECOGNITION - AN OVERVIEW

Authors :Geetha.K *, Dr.Chandra.E**

 

Abstract:- 

In Automatic Speech Recognition (ASR), there is consistent growth since past five decades. ASR has been developed in many spoken languages.   This paper gives an overview of speech recognition system and its applications.

 

[Download Full Text Article ]

Image description

Title : INCREASE IN CACHE PERFORMANCE USE OF SIZE AS FACTOR IN REPLACEMENT ALGORITHM

Authors : Nandnee Jain, Rajesh kumar chakrawarti

Abstract— 

The main requirement of any programmer is unlimited amount of fast memory. But the speed of memory is directly proportional to the cost of memory. But our goal is to achieve more speed in less cost, for these we have introduce memory hierarchy. At the top of this hierachy is small but very fast and costly cache memory. As cache is small memory so it contain only some part of data at any given time. If some new data is to be placed in cache than we have to replace the existing data (in case when cache is packed with data) using some strategies. LRU (Least Recently Used) is one such strategies. In this paper we have a new extension to LRU depending on the size of the block to be replaced.

 

[Download Full Text Article]

Image description

Authors : CherukuriSai Gowtham1 and BobbaVeeramallu2

 

Abstract - 

Networks are protected using many firewalls andencryption software’s. But many of them are not sufficient andeffective. Most intrusion detection systems for mobile ad hocnetworks are focusing on either routing protocols or itsefficiency, but it fails to address the security issues. Some of thenodes may be selfish, for example, by not forwarding the packetsto the destination, thereby saving the battery power. Someothers may act malicious by launching security attacks likedenial of service or hack the information. The ultimate goal ofthe security solutions for wireless networks is to providesecurity services, such as authentication, confidentiality,integrity,anonymity, and availability, to mobile users. Thispaper incorporates agents and data mining techniques toprevent anomaly intrusion in mobile adhoc networks. Homeagents present in each system collects the data from its ownsystem and using data mining techniques to observed the localanomalies. The Mobile agents monitoring the neighboring nodesand collect the information from neighboring home agents todetermine the correlation among the observed anomalouspatterns before it will send the data. This system was able to stopall of the successful attacks in an adhoc networks and reduce thefalse alarm positives.

 

[Download Full Text Article]

Image description

Title : ADAPTIVE WEB BASED APPLICATION DEVELOPMENT

Authors : Annan Naidu Paidi

 

Abstract:-

The World Wide Web has had an extremely significant impact on access to information and information services. Web-based applications are influencing many domains such as business, commerce, banking and learning. The Web has simplified access to information and information services, enabling a variety of users with different backgrounds, social situations, and so on to participate. The increasing complexity of such applications calls for engineering methods for  developing efficient high quality software applications with all the appropriate performance, features and services which are required. Applications and information which are provided on the Web according to the ‘one size fits all’ approach are not appropriate to such a heterogeneous environment. Adaptive Web-based applications are an alternative to the traditional “one-size fits-all” static approach in the development of applications. Thus a distinctive feature of such an adaptive application is its ability to adapt itself to certain conditions 

 

[Download Full Text Article]

Image description

Title : ANDROPAY- M-COMMERCE APPLICATION FOR PROCUREMENT OF PRODUCTS ENABLED WITH BARCODE THROUGH MOBILES

Authors : Sindhu.M 1, Panneer Selvam.N2, Sabarish.S 3

 

Abstract— 

Modern hand held devices like smart phones and PDA’s have became increasingly powerful in recent years. The extra features added to these devices made them very popular. In particular most cell phones include cameras, processors equal to PC and internet access. As mobile devices became very popular in our day to day life they tend to replace the PC. They will replace the objects like mp3 players, cameras, planners, chequebooks, etc. In short, we will be using them to accomplish our task. One application that falls into that category is ANDROPAY developed for the Google Play- android phones.

 

[Download Full Text Article]

Image description

Title : STRATEGIC ENVIRONMENTAL ASSESSMENT (SEA) OF MULTIMODAL TRANSPORT ON NH-9 IN HYDERABAD CITY USING REMOTE SENSING AND GIS

Authors : Ishita Roy * Vijaya Lakshmi T.**Anji Reddy M***

 

Abstract:- 

The paper describes the work of the Strategic Environmental Assessment on the National Highway No- 9 connecting Hyderabad and Pune junction which has been deliberately worked and surveyed in the recent past as multi modal transport corridor to construct the elevated Metro rails in near future.

The study purpose is to provide a multi - modal land- use and transport designed to lead to a preferred environmental and development strategy corridor. The study was intended to be strategic, both in its identification of options and in its assessment of impacts. It is to look forward over a 25 year planning period, and the focus was to be on quick movements, comfortable and environment friendly traffic. The paper briefly describes the present results in terms of impacts on travel, land- use and the environment.

While the study successfully demonstrated a methodology for strategic environmental assessment, further, work on the land- use and transport strategy is required before firm conclusions can be drawn and the broad outline strategy can be converted into specific policies or plans. The key appraisal framework tools for the study are,

a)      The Transport model and

b)       The Land- use model.

GIS has played a vital role in the study of Transport and the Land use Models for determining the Strategic Environmental Assessment for any long term project .It is one of the fastest growing technologies of present time. It has emerged as powerful and sophisticated means to manage vast amounts of geographic data. This paper also enhances the key roles played by GIS and Remote Sensing in various application maps and understanding of the Environmental issues with respect to the corridors.

 

[Download Full Text Article]

Image description

Title : SURVEY ON ARGO UML TOOL

Authors : Tincy Rani1, Manisha Sanyal2, Sushil Garg3

 

Abstract— 

ArgoUML is an UML diagramming application written in Java and released under the open source Eclipse Public License. By virtue of being a Java application, it is available on any platform supported by Java. Within the open-source community, ArgoUML represents a major cooperative effort for the development of a UML development environment, ArgoUML is still under development, and processing errors arise periodically

 

[Download Full Text Article]

Image description

Title : IMPLEMENTATION AND CONTROL OF AN HYBRID MULTILEVEL CONVERTER WITH FLOATING DC-LINKS FOR CURRENT WAVEFORM IMPROVEMENT

Authors : Swapna.Rikka, M.Divya Charitha, T. Naveen Kumar

 

Abstract :-

Multilevel converters offer advantages in terms of the output waveform quality due to the increased number of levels used in the output voltage modulation. This advantage is particularly true for cascaded H-bridge converters that can be built to produce a large number of levels thanks to their modular structure. Nevertheless, this advantage comes at the cost of multiple DC-links supplied by independent rectifiers through the use of a multi-output transformer for inverters. This frontend complicates the implementation of converters that have a high number of levels. An alternative method of using lower voltage cells with floating dc-links to compensate only for voltage distortion of an NPC converter is considered for active rectifier applications. The analogy between the floating H-bridges and series active filters is used to develop a strategy for harmonic compensation of the NPC output voltage and the control of the floating dc-link voltages. This simplifies the current control scheme and increases its bandwidth. Experimental results with a low power prototype that show the good performance of the proposed modulation technique and the resulting improvement in the output waveform are provided.

 

[Download Full Text Article]

Image description

Title : MODELING AND SIMULATION OF NON-GRID-CONNECTED  WIND ENERGY CONVERSION SYSTEM

Authors : K.Shravankumar, D.R.K.Mahesh, K.Ravishanker

 

Abstract-  

Method for wind turbine controller design and test in laboratory still remains a problem. This paper presents a real time simulator of non-grid-connected wind energy conversion system suitable for controller design and test. The simulation model, which is composed of a fixed-pitch wind turbine, a permanent magnet synchronous generator with PWM voltage source vector control and DC-DC converter with peak current control, is especially suitable for electrochemical industries. High energy efficiency can be achieved by adjusting the rotor speed according to the wind speed. Simulation results show the validity of system modeling and control strategy.

 

[Downlload Full Text Artilce] 

Image description

Title : STUDY OF DIFFERENT ATTACKS ON NETWORK & TRANSPORT LAYER

Authors : Deepti Rajwal,  Deepali Band,  Prof. Atul Yadav

 

 

Abstract— 

this paper represents Network attacks generally adopt computer networks as transportation media to convey the intrusion or even attack the communication system itself. We will put our focus mainly on the network attacks happened around the TCP/IP (Transmission Control Protocol/Internet Protocol) protocol suite, which are the most widely used communication protocol and the de facto standard among the Internet society.

 

[Download Full Text Article]

Image description

Title : AN AUTONOMOUS FRAMEWORK FOR CLASSIFIER SELECTION IN WEKA

Authors : Phil Antony Mingo, Rafidha Rehiman K A, Kannan Balakrishnan

 

Abstract

Automating Classifier selection is an interesting task in Data Mining. In this paper we describe a framework for automatic Classifier selection integrated into Weka for identifying a model for effective classification for user’s dataset. With this Framework we can easily achieve the expected result at extremely fast learning speed. It automatically selects the parameters based on algorithms present in Weka and determines the best model for the input dataset. Also the lists of available classifiers are open to the users, allowing them to choose depending on the dataset.

 

[Download Full Text Article]

Image description

Athors : Arjun Solanki , Rajesh kumar chakrawarti

 

Abstract

In wireless network to protect the sensitive data Security has become one of the major issues for data communication over wired and wireless networks. Different from the past work on the designs of cryptography algorithms and system infrastructures,we will propose a concept of confirmation of secured data by host name . The dynamic routing provides to avoid two consecutive packets on the same link and updates the routing information from neighbours of the router in the network. In this main object of this paper is a provide strong security from many a organizations to a head of the organization, such as Banks, Colleges, Companies, Universities which is a need for strongest security for data communication from one organization to other, because any one is a hacking their data information of the organizations again have to recollect data information, so this paper main issue of a strongest security and less time for data transmission from the clients to a server.  If  host name or IP Address of each such node (at first hop) is printed along with the data packet delivered through it, the receiver can ensure that the received data is transmitted in a secured manner. In this paper we are also  going to use dynamic routing and evaluating vulnerable node as well as vulnerable path, which will increase the security. And will reduce time delay and computation

 

[Download Full Text Article]

Image description

Title : COMPARATIVE STUDY OF REACTIVE ROUTING PROTOCOL (AODV, DSR, ABR AND TORA) IN MANET

Authors : Mr. L Raja 1, Capt. Dr. S Santhosh Baboo2

 

Abstract- 

A mobile ad hoc network (MANET) is a collection of wireless mobile nodes dynamically forming a network topology without the use of any existing network infrastructure or centralized administration. Routing is the process which transmitting the data packets from a source node to a given destination. The main classes of routing protocols are Proactive, Reactive and Hybrid. A Reactive (on-demand) routing strategy is a popular routing category for wireless ad hoc routing. In this paper work an attempt has been made to compare the four Reactive (on-demand) routing protocols for MANETs: - Ad hoc On Demand Distance Vector (AODV), Dynamic Source Routing (DSR) protocols, Temporally Ordered Routing Algorithm (TORA) and Associativity Based Routing (ABR) protocol.

 

[Download Full Text Article]

Image description

Title : BROADCASTING OF URBAN-STATISTICS VIA VEHICULAR INTELLECT DIAS

Authors : Vinothini.R, Sugapriya.M,Sudha.S, Srisakthi.C

 

Abstract

We present the boomerang protocol to efficiently retain information at a particular geographic location in a sparse network of highly mobile nodes without using infrastructure networks. To retain information around certain physical location, each mobile device passing that location will carry the information for a short while. This approach can become challenging for remote locations around which only few nodes pass by. To address this challenge, the boomerang protocol, similar to delay-tolerant communication, first allows a mobile node to carry packets away from their location of origin and periodically returns them to the anchor location. A unique feature of this protocol is that it records the geographical trajectory while moving away from the origin and exploits the recorded trajectory to optimize the return path. Simulations using automotive traffic traces for a southern New Jersey region show that the boomerang protocol improves packet return rate by 70 percent compared to a baseline shortest path routing protocol. This performance gain can become even more significant when the road map is less connected. Finally, we look at adaptive protocols that can return information within specified time limits. Index Terms—Geocache, GPS, mobile, location-aware information, infrastructureless data management.

 

[Download Full Text Article]

Image description

Title : EFFECT OF GLOBAL THRESHOLDING ON TUMOR-BEARING BRAIN MRI IMAGES

Authors : Tirpude NN* , Welekar RR

 

Abstract- 

Modern Science has found a special place for the field of Medical Imaging and Bio-medical image processing. With the advent of advanced imaging modalities like Magnetic Resonance Imaging (MRI), Computerised Tomography (CT), Mammography, UltraSonography (USG), it is now possible to look inside into the internal structure of the ailing body. Thus, it helps to diagnose, monitor and track the abnormality, if any. This paper provides us with the results and effects of two standard thresholding techniques applied to tumor-bearing MRI images of brain. The two standard techniques implemented are the basic global thresholding method and the standard Otsu’s thresholding method. This paper studies the poor results obtained after applying these two techniques to MRI images of tumor-bearing brain and analyzes the reasons for the same.

 

[Download Full Text Article]

Image description

Title : MULTIPLE KEY GENERATION USING ELLIPTIC CURVE CRYPTOGRAPHY FUSION ALGORITHM FOR BIOMETRIC SOURCE

Authors : Joju John,  Mr T. Rajesh

 

Abstract

The biometric data are stored in the template in which various techniques are used to protect it against privacy and security threats. The binary vector derived from biometric samples provide a great portion of template protection technique. For the same template protection system it is observed that there is a large variation on its key length. It determine the analytical relationship between the classification performance of the fuzzy commitment scheme and theoretical maximum key size given as input on Gaussian biometric source. The number of enrolment, verification sample, features component and biometric source capacity. It shows features of estimated maximum key size and classification performance are interdependent in analysis of the work. Both the theoretical analysis, as well as an experimental evaluation showed that feature interdependencies have a large impact on performance and key size estimates

 

[Download Full Text Article]

Image description

Title : HUMAN BODY AS A MEDIUM FOR COMMUNICATION

Authors : P.Lakshmi Narayana1, B.Meena Bharghava2, P.Lakshman kumar3

 

Abstract-

Technology is making many things easier. We can say that this concept is standing example for that. So far we have seen LAN, MAN, WAN, INTERNET & many more but here is new concept of  “ RED TACTON ” which  makes the human body  as a  communication  network  by  name HAN (Human Area Network). Red Tacton is a new Human Area networking technology that uses the surface of the human body as a safe, high speed network transmission path. Red Tacton uses the minute electric field generated by human body as medium for transmitting the data. The chips which will be embedded in various devices contain transmitter and receiver built to send and accept data in digital format.  In this paper we will discuss about red tacton, and its working states, and applications of red tacton various fields. And we will compare our red tacton with the other technology for data transmission and know about human area network

 

[Download Full Text Article] 

Image description

Title : VIRTUAL, ALL TOO VIRTUAL -THE VIRTUAL TRANSACTION AND THE END OF POSTMODERNISM 

Authors : Rawaa Mahmoud Hussain

 

Abstract:

Virtualism is a new style of thinking and acting that human kind began moving toward it. Reducing time and nearing place in virtual space produce new patterns of thinking and acting. My article aims to two things; first: it wants to understand the overall global transformation to virtual system, reality and language. Second: then to indicate that philosophical system imposed by philosophers of postmodernism on the scene of world philosophy may has been rotted as a result to the changing in cultural structure.  

 

[DownLoad Full Text Article]

Image description

Title : INFORMATION RETRIEVAL FROM WEB DOCUMENT USING CLUSTERING TECHNIQUES

Authors : Mr..Keole.Ranjit R * Dr..Karde.Pravin.P

 

Abstract -

With more than two billion pages created by millions of Web page authors and organizations, the World Wide Web is a tremendously rich knowledge base. The knowledge comes not only from the content of the pages themselves, but also from the unique characteristics of the Web, such as its hyperlink structure and its diversity of content and languages. A considerably large portion of information present on the world wide web (www) today is in the form of unstructured or semi-structured text data bases. It becomes tedious for the user to manually extract real required information from this material. Large document collections, such as those delivered by Internet search engines, are difficult and time-consuming for users to read and analyze. The detection of common and distinctive topics within a document set, together with the generation of multi-document summaries, can greatly ease the burden of information management. Clustering is useful technique in the field of textual data mining. Cluster analysis divides objects into meaningful groups based on similarity between objects. This paper focus on this problem of mining the useful information from the collected web documents using clustering techniques of the text collected from the downloaded web documents.

 

[Download Full Text Article]

Image description

Title : REDUCE THE FALSE POSITIVE AND FALSE NEGATIVE FROM REAL TRAFFIC WITH INTRUSION DETECTION

 Authors : Vivek.A, Anbazhagan.K, Sathish kumar.P 

 

Abstract – 

Typically the traffic through the network is heterogeneous and it flows from multiple utilities and applications.Considering todays threats in network there is yet not a single solution to solve all the issues because the traditional methods of port-based and payload-based with machine learning algorithm suffers from dynamic ports and encrypted application.Many international network equipment manufactures like cisco, juniper also working to reduce these issues in the hardware side.Here this paper presents a new approach considering the idea based  on SOTC.This method adapts the current approaches with new idea based on service-oriented traffic classification(SOTC) and it can be used as an efficient alternate to existing methods to reduce the false positive and false negative traffic and to reduce computation and memory requirements.By evaluating the results on real traffic it confirm that this method is effective in improving the accuracy of traffic classification considerably,and promise to suits for a large number of applications.Finally, it is also possible to adopt a service database built offline, possibly provided by a third party and modeled after the signature database of antivirus programs,which in term reduce the work of training procedure and overfitting of parameters in case of parameteric classifier of supervised traffic classification.

 

[Download Full Text Article]

Image description

Authors : P.SuveethaDhanaselvam, Dr.N.B.Balamurugan, N.BasheerAhamed

 

Abstract--

In this paper total charge of multigate MOSFET is calculated by using centroid model. Analytical modeling of total inversion charge is computed using self consistent model. The total Charge is analyzed for various value of gate to source voltage and results are discussed. The model is based on charge quantisation within the channel and it includes overshoot velocity effects

 

 

[Download Full Text Article]

Image description

Title : PREDICTIVE MODEL OF STROKE DISEASE USING HYBRID NEURO-GENETIC APPROACH

Authors : K.Priya,T.Manju,R.Chitra

 

Abstract-

Stroke is a major life threatening disease to cause of death and it has a serious long term disability. The time taken to recover from stroke disease depends on patient’s severity. Number of work has been carried out for predicting various diseases by comparing the performance of predictive data mining. In the proposed work MLFFNN with back propagation algorithm is used. The number of hidden neurons is optimized by genetic algorithm. This work demonstrates about ANN based prediction of stroke disease by improving the accuracy with higher consistent rat using optimized hidden neurons. In this algorithm determines the attributes involving more towards the prediction of stroke disease and predicts whether the patient is suffering from stroke disease. The data is collected from 300 patients. Among that 180 patients having disease .In the proposed work 196 data are used for training and 104 data is used to test the performance of the system. 

 

[Download Full Text Article]

Image description

Authors : Ashwini D. waghmare,  A.D. Kapse

 

Abstract-

This work aims to present the main characteristics of the biometric technology related to iris gratitude used currently in the control of physical access, therefore the biometry is known as the measurement technique more assurance currently in the identification of a person. Iris localization is one of the most essential steps in iris gratitude system and determines the accuracy of harmonizing. In this, efficient techniques for iris  localization are proposed and explain how iris is providing high security in restricted & unrestricted sectors. Biometrics itself a science of establishing human distinctiveness by using corporeal or behavioral persona such as face, fingerprints, palm prints, iris, hand geometry, and voice. The control of the physical entrance in computerized safekeeping systems, like banks, ports, airports and military areas, is vital to pledge the economical security of the institutions and to thwart to the possibility of accomplishment of uncompromising acts. To this, a lot of technologies used in security systems can be used, but the choice of a technology depends on some factors, as the level of security related with the economical value to be sheltered, the entailed cost to the technology carrying out related to the level of security presented, and the physical characteristics to the proper installation.

 

[Download Full Text Article]

Image description

Title :TRANSFORMATION OF UML ACTIVITY DIAGRAMS INTO PETRI NETS FOR VERIFICATION PURPOSES

Author : Bhawana Agarwal

 

Abstract- 

In the software engineering world, modeling has a rich tradition, dating back to the earliest days of programming. The most recent innovations have focused on notations and tools that allow users to express system perspectives of value to software architects and developers in ways that are readily mapped into the programming language code that can be compiled for a particular operating system platform. The current state of this practice employs the Unified Modeling Language (UML) as the primary modeling notation. The UML allows development teams to capture a variety of important characteristics of a system in corresponding models. Transformations among these models are primarily manual. However, potential faults that violate desired properties of the software system might still be introduced during the process. Verification technique is well-known for its ability to assure the correctness of models and uncover design problems before implementation. This paper presents a set of rules that allows Software engineers to transform the behavior described by a UML 2.0 Activity Diagram (AD) into a Petri Net (PN). The main purpose of the transformation to Petri nets is to use the theoretical results in the Petri nets domain to analyze the equivalent Petri nets and infer properties of the original workflow. Furthermore, we implement a tool to support the transformation process.

 

[Download Full Text Article] 

Image description

Title : ODA : PROCESSING MODEL  DESIGN FOR LINKING DOCUMENT

Authors : R. N. Jugele*, Dr. V. N. Chavan

 

Abstract-

Designers of  systems have always been deeply concerned about their systems demise. The idea address some thoughts on the implementation of ODA Link systems, particularly with respect to processing design platform that remain malleable and stable through periods of experimentation and radical change.

When documents are to be accessed the link structure of the documents should be employed. The structures also form the basis for the presentation of the content of the document to the user. The content of document is not just text but a highly structured collection of text fragments and figures.

The model defines link to capture relations and consists of specifications of its starting point and its ending point. The link context structure defines that the displayed component should only be replaced when it is not the component the activated link is pointing to.

 

[Download Full Text Article]

Image description

Title : WEATHER TEMPERATURE COMPUTATION USING DISCRETE FOURIER TRANSFORMATION TOOLS

Authors : A.A. Mohit1Md. Jashim Uddin2, M. Shohidul Islam3

 

Abstract-

The weather temperature computation procedure has been discussed. This paper presents an application of Discrete Fourier Transformation (DFT) technique for weather temperature computation. This temperature computation is based on the previous daily maximum temperature. The experimental result of the temperature computed can found to be in good agreement with the data obtained from Bangladesh Meteorological Department.

 

 

[Download Full Text Article]

Image description

Title : PERFORMANCE EVALUATION OF ALAMOUTI SPACE-TIME BLOCK CODED MULTI-USER W-CDMA WIRELESS COMMUNICATION SYSTEM

Authors : M.M. Rahman1, S.E.Ullah2, S.M.A. Rahim1* Md. Jashim Uddin

 

Abstract-

In this paper, we made a comprehensive simulation study to evaluate the performance of a multi-user Wideband CDMA wireless communication system. The 2-by-1 spatially multiplexed ½-rated Convolutionally encoded system under investigation incorporates Alamouti space-time block coding scheme with utilization of Walsh Hadamard codes and various digital modulations (BPSK, DPSK, QAM, QPSK and 8PSK). In our study, MATLAB based computer programs have been developed to process the synthetically generated multi-user bit streams and text messages under Additive white Gaussian noise (AWGN) and Raleigh fading channels. The simulation results elucidate that a significant improvement of system performance is achieved with BPSK digital modulation scheme at a comparatively low signal to noise ratios. It has been anticipated from the simulation study that the implementation of Walsh Hadamard is highly effective to discriminate the data (Synthetically generated/text) of individual users.

 

[Download Full Text Article]

Image description

Title : COMPARATIVE STUDY BETWEEN MFCC AND LP-MEL BASED FRONT-ENDS FOR NOISY SPEECH RECOGNITION USING HMM

Authors : Md. Jashim Uddin*, 2S.M.A. Rahim, 3Md. Abdul Al Mohit, 4M. Shohidul Islam

 

Abstract-

Since the parameterization in the perceptually relevant aspects of short-term speech spectra in ASR front-end is advantageous for speech recognition, such as Mel-LPC, LPC-Mel, MFCC etc., in this paper, MFCC and LP-Mel based front-ends have been designed for automatic speech recognition (ASR). The speech classifier of the developed ASR is based on Hidden Markov Model (HMM) as it can successfully cope with acoustic variation and lack of word boundaries of speech signal. The performance of the developed system has been evaluated on test set A of Aurora-2 database both for MFCC and LP-Mel based front-ends. It has been found that the MFCC based front-end is more effective for noise type subway, babble, car and exhibition. The average word accuracy for MFCC has been found to be 59.21%, while for LPC-Mel, it has been 54.45%.

 

[Download Full Text Article]

Image description

Title : ENSURING DATA STORAGE SECURITY IN CLOUD COMPUTING

Authors: Rampal Singh, Sawan Kumar, Shani Kumar Agrahari

 

Abstract-

Cloud computing provides convenient on-demand network access to a shared pool of configurable computing resources. The resources can be rapidly deployed with great efficiency and minimal management overhead. Cloud is an insecure computing platform from the view point of the cloud users, the system must design mechanisms that not only protect sensitive information by enabling computations with encrypted data, but also protect users from malicious behaviours by enabling the validation of the computation result. In this paper, we propose a new data encoding scheme called layered interleaving, designed for time-sensitive packet recovery in the presence of bursty loss. It is high-speed data recovery scheme with minimal loss probability and using a forward error correction scheme to handle bursty loss. The proposed approach is highly efficient in recovering the singleton losses almost immediately and from bursty data losses.

 

[Download Full Text Article]

Image description

Authors : M.Karthi, S.Nachiyappan

 

Abstract – 

In Cloud computing, the information is permanently stored in servers in the internet. From there, the Cloud consumers utilize resources using Virtual Servers and they are charged based on pay-per-use basis. For this, Cloud provider offer two type of provisioning plans, namely On-demand and Reservation plan. They are also called as Short-term and Long-term planning. In general, the reservation plan has minimum cost than on-demand plan. Although the reservation offers the discounted usage price, this option could result in over provisioning and under provisioning problems due to demand uncertainty.  There are many kinds of resource provisioning options available in cloud environment to reduce the total paying cost and better utilizing cloud resources. However, the best advance reservation of resources is difficult to be achieved due to uncertainty of consumer’s future demand and providers’ resource prices. In this paper survey the different provisioning options and algorithm. Compare the existing provisioning algorithms with analysis based on cost, availability, uncertainty parameters.

 

[Download Full Text Article]

Image description

Title : AN IMPROVED TECHNIQUE FOR ENRICHING THE QUALITY OF IMAGE USING ENHANCED NL MEANS APPROACH

Authors : Mr. Anuj Kumar1, Mr. Harvinder Singh2, Mr. Prateek Bansal3

 

Absract-Over the years a variety of methods have been introduced to remove noise from digital images, such as Gaussian filtering, anisotropic filtering, and Total Variation minimization. However, many of these algorithms remove the fine details and structure of the image in addition to the noise because of assumptions made about the frequency content of the image. The non-local means algorithm does not make these assumptions, but instead assumes that the image contains an extensive amount of redundancy. These redundancies can then be exploited to remove the noise in the image. In this paper, we are trying to reduce the redundancies so that the quality of the image can be improved and enhanced.

 

[Download Full Text Article]

Image description

Title : RF ID TAGS BASED ENERGY AUTOMATION SYSTEM USING EMBEDDED TECHNOLOGY

Author : G.Karthikeyan1, J.DineshKumar2, S.Kannadhasan3

 

Abstract--

Energy is a key factor in the development of any country. The energy needs are increasing day by day. Both for economical and environmental reasons, efficient use of the electrical energy is the need of hour. In our project, we developed one circuit, which will control the utilization of electrical energy in the economical way, especially in the case of energy saving and power management services. An RFID (Radio Frequency Identification) tag consist of a small integrated circuit attached to a small antenna, capable of transmitting a unique serial number a distance of several meters to reading device in response to a query. This RFID tags are passive, these are battery less and obtain the power necessary to operate form the query signal itself. The main heart of the circuit is microcontroller chip, interfaced with different sensing circuit. In our project the energy saving is achieved in RFID based automatic electricity control using embedded technology. This tag has used to access the secured areas. User can display the particular RFID tag to this RFID reader it read this serial number and it also check with its internal serial number when this card serial number is matched it automatically open this door. Then it automatically turn on the special devices AC and light and fan when this person enter the this RFID tag against to this RFID reader then it automatically close the locker and turn off the special devices. Otherwise this card serial number is not matched then it does not allowed this secured room. When the manager has enter the RFID tag into this reader then it automatically turn on this manager special electrical appliance like AC and water heater etc. in this same manner when this employ has come to enter this room enter the tag into the RFID reader then it allow to turn on the person allowed electrical devices like Fan, and TV also. When this corresponding person leaves that particular office then it automatically switches of those particular special devices. So this projects achieved energy saving and avoid the miss usage of electrical appliances.

 

[Download Full Text Article]

Call For Paper

VOLUME 06. ISSUE 04 [April 2017]

IJECS invites authors to submit manuscripts Reporting original engineering research, computer science , original article, research article, case report, systematic reviews, or educational Innovations for publication for the Current issues. Types of manuscripts suitable for IJECS include: Engineering Science, Computer Science, Educational Innovation, Brief Report, Reviews on Teaching In keeping with high quality scholarship

Read More

Online Submission

If any difficulty you can also submit to: This email address is being protected from spambots. You need JavaScript enabled to view it..in

ace.pngarx.pngcit.pngcomp.pngcross.pngdoaj.pngicn.pngino.pngres.pngresbib.pngsci.pngscic.pngscics.pngulrich.pngur.png

FaceBook

About Us

The“International Journal of Engineering  and computer science”(IJECS™) is an international online journal in English published monthly. The aim of IJECS is to publish peer reviewed research and review articles in rapidly developing field of engineering science and technology

Address

Address : 20 manglam vihar Mandsaur

State : Madhya Pradesh

Country : INDIA

Phone :+91 (777) 189 36 00

Email: editor@ijecs.in

Go to top