Volume 1 Issue 1 oct 2012

1. Cryptography And Network Security Principles And Practices

Prashant singh, Pratik kr. Sharma, Tanuj kr. Aggarwal


The field of network and Internet security consists of measures to deter, prevent, detect, and correct security violations that involve the transmission of information. That is a broad statement that covers a host of possibilities. To give you a feel for the areas covered in this paper, consider the following examples of security violations:

1. User A transmits a file to user B. The file contains sensitive information (e.g., payroll records) that is to be protected from disclosure. User C, who is not authorized to read the file, is able to monitor the transmission and capture a copy of the file during its transmission.This book focuses on two broad areas: cryptographic algorithms and protocols, which have a broad range of applications; and network and Internet security, which rely heavily on cryptographic techniques.

Cryptographic algorithms and protocols can be grouped into four main areas:

• Symmetric encryption: Used to conceal the contents of blocks or streams of data of any size, including messages, files, encryption keys, and passwords.

• Asymmetric encryption: Used to conceal small blocks of data, such as encryption keys and hash function values, which are used in digital signatures.

• Data integrity algorithms: Used to protect blocks of data, such as messages, from alteration.

• Authentication protocols: These are schemes based on the use of  cryptographicalgorithms designed to authenticate the identity of entities.

Computer and network security can be described as the protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources (includes hardware, software, firmware, information/ data, and telecommunications).


View Full Text Article

2.Art of Hiding: An Introduction to Steganography

Maninder Singh Rana1, Bhupender Singh Sangwan2, Jitendra Singh Jangir3



Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exists a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points. Different applications have different requirements of the steganography technique used. For example, some applications may require absolute invisibility of the secret information, while others require a larger secret message to be hidden.. This paper in tends to give an overview of image steganography, its use sand techniques. It also attempts to identify the requirements of a good steganographical go rithmand briefly reflectson which steganographic techniques are more suitable for which applications.


View Full Text Article

3. Review of Single Step Techniques for Production of ACNT’s

Mr.Asad Suhail Farooqi



The perpendicular orientation of carbon nanotubes to a substrate are vertically aligned carbon nanotubes (VACNT), and parallel to the substrate are horizontally aligned CNT’s. Their proper and dense alignment along with outstanding physical and chemical properties enables ACNT to be used to may various fields. The most common single step methods to produced aligned carbon nanotubes (ACNT’s) are Thermal pyrolysis and flame synthesis, and both are relatively simple. This review explore different methods used for ACNT growth, the process parameter determine the morphology ACNT and the application of structured ACNT’s.

View Full Text Article

4. Design Of High Speed Uart For Programming Fpga

Hazim Kamal Ansari, Asad Suhail Farooqi



FPGA (Field Programmable gate Array) devices are one of the modern technologies that are changing the electronic industry. They are riding the same integrated circuit process curves as processors and memories and keep getting larger, faster, and cheaper and are now common in low and mid volume embedded products With the advances of FPGA technology, many engineers now have the opportunity to do medium scale digital design. They can be found in primary and secondary surveillance radar, satellite communication, automotive, manufacturing, and many other types of products. Time triggered communication within FPGA is enhanced with the help of UART (Universal Asynchronous Receiver Transmitter).It translates between serial and parallel bits of data. The device changes incoming parallel information to serial data which can be sent on a communication line. A second UART can be used to receive the information. The UART performs all the tasks, timing, parity checking, etc. needed for the communication. UART is designed in VHDL. The design process involves converting the requirements into a format that represents the desired digital function(s).


View Full Text Article

5. A Study On Spatial Data Clustering Algorithms In Data Mining

Sundararajan S, Dr.Karthikeyan S



The enormous amount of hidden data in large databases has produced incredible interests in the area of data mining. Clustering is an indispensable task in data mining to cluster data into significant subsets to obtain useful information. Clustering spatial data is a significant issue that has been broadly investigated to discover hidden patterns or useful sub-groups and has several applications like satellite imagery, geographic information systems, medical image analysis, etc. The spatial clustering approach is supposed to satisfy the necessities of the application for which the investigation is carried out. In addition the same clustering approach should be very efficient in processing data along with noise and outliers, since they are inherently present in spatial data. In recent times, several commercial data mining clustering approaches have been developed and their practice is increasing enormously to realize desired objective. Researchers are attempting their best efforts to accomplish the fast and effective algorithm for the abstraction of spatial data, which are clearly discussed in the literature. Each individual clustering approach has its own merits and demerits for processing multidimensional data and consequently in spatial clustering


View Full Text Article

6. Mind Control Using Psycotronics

Titu kumar , Rohit kumar jha, Sitanshu Mohan Ray



This paper deals with the mind control using  psychotronics as a directed energy weapons & its relevant uses in human life in present day. These device works on the principle of squad(ssss) or e.m wave.

We are very thankful Prof. Sitanshu Ray for his tireless support and  his lucid way of explaining us the salient points really helped us to write this paper.


View Full Text Article

7. Cyber Crime And Thier Solution

Titu kumar,Rohit kumar jha,Sitanshu Mohan Ray



This paper deals with the cyber crime & its realistic facts which blocked our working capability, efficiency & revealed the privacy of victims.  This paper also deals with the futuristic cyber crime & its prevention.

We are very thankful to Prof. Sitanshu Ray for his tireless support and  his lucid way of explaining us the salient points really helped us to write this paper.


View Full Text Article

8. Network Security – How to Defend an Infinitely Expanding Frontier

Titu kumar , Rohit kumar jha, Sitanshu Mohan Ray



This paper is all about the network security, how to save your network from various type of attack. I am very thankful to all my friends and teacher who help me to write this kind of article.


View Full Text Article



About Us

The“International Journal of Engineering  and computer science”(IJECS™) is an international online journal in English published monthly. The aim of IJECS is to publish peer reviewed research and review articles in rapidly developing field of engineering science and technology


Address : LIG 73 megdoot Nagar Mandsaur

State : Madhya Pradesh

Country : INDIA

Phone :+91 (822) 260 24 694

Email: editor@ijecs.in

Go to top