Zeszyty czasopisma

Tom 15 (2022): Zeszyt 1 (January 2022)

Tom 14 (2021): Zeszyt 1 (January 2021)

Tom 13 (2020): Zeszyt 1 (January 2020)

Tom 12 (2019): Zeszyt 1 (January 2019)

Tom 11 (2018): Zeszyt 1 (January 2018)

Tom 10 (2017): Zeszyt 5 (January 2017)

Tom 10 (2017): Zeszyt 4 (January 2017)

Tom 10 (2017): Zeszyt 3 (January 2017)

Tom 10 (2017): Zeszyt 2 (January 2017)

Tom 10 (2017): Zeszyt 1 (January 2017)

Tom 9 (2016): Zeszyt 4 (January 2016)

Tom 9 (2016): Zeszyt 3 (January 2016)

Tom 9 (2016): Zeszyt 2 (January 2016)

Tom 9 (2016): Zeszyt 1 (January 2016)

Tom 8 (2015): Zeszyt 4 (January 2015)

Tom 8 (2015): Zeszyt 3 (January 2015)

Tom 8 (2015): Zeszyt 2 (January 2015)

Tom 8 (2015): Zeszyt 1 (January 2015)

Tom 7 (2014): Zeszyt 5 (January 2014)

Tom 7 (2014): Zeszyt 4 (January 2014)

Tom 7 (2022): Zeszyt 3 (January 2022)

Tom 7 (2022): Zeszyt 2 (January 2022)

Tom 7 (2014): Zeszyt 1 (January 2014)

Tom 6 (2013): Zeszyt 5 (January 2013)

Tom 6 (2013): Zeszyt 4 (January 2013)

Tom 6 (2013): Zeszyt 3 (January 2013)

Tom 6 (2013): Zeszyt 2 (January 2013)

Tom 6 (2013): Zeszyt 1 (January 2013)

Tom 5 (2012): Zeszyt 4 (January 2012)

Tom 5 (2012): Zeszyt 3 (January 2012)

Tom 5 (2012): Zeszyt 2 (January 2012)

Tom 5 (2012): Zeszyt 1 (January 2012)

Tom 4 (2011): Zeszyt 4 (January 2011)

Tom 4 (2011): Zeszyt 3 (January 2011)

Tom 4 (2011): Zeszyt 2 (January 2011)

Tom 4 (2011): Zeszyt 1 (January 2011)

Tom 3 (2010): Zeszyt 4 (January 2010)

Tom 3 (2010): Zeszyt 3 (January 2010)

Tom 3 (2010): Zeszyt 2 (January 2010)

Tom 3 (2010): Zeszyt 1 (January 2010)

Tom 2 (2009): Zeszyt 4 (January 2009)

Tom 2 (2009): Zeszyt 3 (January 2009)

Tom 2 (2009): Zeszyt 2 (January 2009)

Tom 2 (2009): Zeszyt 1 (January 2009)

Tom 1 (2008): Zeszyt 4 (January 2008)

Tom 1 (2008): Zeszyt 3 (January 2008)

Tom 1 (2008): Zeszyt 2 (January 2008)

Tom 1 (2008): Zeszyt 1 (January 2008)

Informacje o czasopiśmie
Format
Czasopismo
eISSN
1178-5608
Pierwsze wydanie
01 Jan 2008
Częstotliwość wydawania
1 raz w roku
Języki
Angielski

Wyszukiwanie

Tom 10 (2017): Zeszyt 5 (January 2017)

Informacje o czasopiśmie
Format
Czasopismo
eISSN
1178-5608
Pierwsze wydanie
01 Jan 2008
Częstotliwość wydawania
1 raz w roku
Języki
Angielski

Wyszukiwanie

42 Artykułów
Otwarty dostęp

Hybrid Data Approach for Selecting Effective test Cases During the Regression Testing

Data publikacji: 01 Sep 2017
Zakres stron: 1 - 24

Abstrakt

Abstract

In the software industry, software testing becomes more important in the entire software development life cycle. Software testing is one of the fundamental components of software quality assurances. Software Testing Life Cycle (STLC)is a process involved in testing the complete software, which includes Regression Testing, Unit Testing, Smoke Testing, Integration Testing, Interface Testing, System Testing & etc. In the STLC of Regression testing, test case selection is one of the most important concerns for effective testing as well as cost of the testing process. During the Regression testing, executing all the test cases from existing test suite is not possible because that takes more time to test the modified software. This paper proposes new Hybrid approach that consists of modified Greedy approach for handling the test case selection and Genetic Algorithm uses effective parameter like Initial Population, Fitness Value, Test Case Combination, Test Case Crossover and Test Case Mutation for optimizing the tied test suite. By doing this, effective test cases are selected and minimized the tied test suite to reduce the cost of the testing process. Finally the result of proposed approach compared with conventional greedy approach and proved that our approach is more effective than other existing approach.

Index terms

  • Software Testing
  • Regression Testing
  • Test Reduction
  • Test Optimization
  • Test Data Generation
Otwarty dostęp

Performance Evalution of Video Surveillance Using Mete, Melt and Nidc Technique

Data publikacji: 01 Sep 2017
Zakres stron: 25 - 45

Abstrakt

Abstract

To evaluate multi-target video tracking results, one needs to quantify the accuracy of the estimated target-size and the Cardinality error as the well as measure the frequency of occurrence of ID changes. By surveying existing multi-target tracking performance scores and, after discussing their limitations, the work proposes three parameter-independent measures for evaluating multi target video tracking. The measures consider target-size variations, combine accuracy and cardinality errors, quantify long-term tracking accuracy at different accuracy levels, and evaluate ID changes relative to the duration of the track in which they occur. The work conduct an extensive experimental validation of the proposed measures by comparing them with existing ones and by evaluating four state-of-the-art trackers on challenging real world Publicly-available data sets. The software implementing the proposed measures is made available online to facilitate their use by the research community.

Index terms

  • Multi-TargetTrack-Before-Detect(MT-TBD)
  • Single Particle Tracking (SPT)
  • Multiple Extended Target Lost Track Ratio(MELT)
Otwarty dostęp

Efficient Approaches for Designing the Logical Reversibility of Computation

Data publikacji: 01 Sep 2017
Zakres stron: 46 - 61

Abstrakt

Abstract

The work demonstrates about the reversible logic synthesis for the 2 to 4 decoder, the circuits are designed using reversible fault tolerant toffoli gates. Thus the entire scheme inherently becomes fault tolerant. In addition, several lower bounds on the number of constant inputs, garbage outputs and quantum cost of the reversible fault tolerant decoder have been proposed. Transistor simulations of the proposed decoder power consumption have been reduced than the existing approach without decreasing the speed, which proved the functional correctness of the proposed Decoder. The comparative results show that the proposed design is much better in terms of quantum cost, delay, hardware complexity and has significantly better scalability. Tanner software is the advanced industrial tool that is growing up in trend. So the proposed decoder is designed in Tanner EDA after completion of the circuit in DSCH and Microwind. This shows the power dissipation and power consumption at each nook and corner to re-design with low power consumption possible.

Index terms

  • Fast Fourier Transform (FFT)
  • Reversible Logic Synthesis(RLS)
Otwarty dostęp

An Anti-Emulation Structure for Internet Despository Using Secured Image Validation Scheme

Data publikacji: 01 Sep 2017
Zakres stron: 62 - 68

Abstrakt

Abstract

Emulation attack is an effort by an individual or a group to steal personal confidential information such as passwords, credit card information etc, New approach called visual secret sharing scheme (VSS) for cloning websites classification to solve the problem of Phishing attack. The novel system is developed with the things that eradicate the drawbacks of the existing system. The main aim of visual secret sharing scheme is to conserves the solitude of image by decay the original image into two shares that as been stocked in independent database servers such that the authentic image can be revealed only when they are equally gathered. The specific sheet of representation does not declare the status of the original visual image which was generated previously. Once the unique visual image is discovered to the user then that picture can be used as a password for detecting phishing. In the proposed system, privacy enabled secure database is built. The security level is much enhanced from its actual level. The authentication process can be secured by using double level security.

Index terms

  • phishing attack
  • visual secret scheme
  • visual cryptography
  • anti-phishing validation scheme
Otwarty dostęp

Android Based Home Automation and Energy Conservation

Data publikacji: 01 Sep 2017
Zakres stron: 69 - 86

Abstrakt

Abstract

Wireless Sensor Network (WSN) consists of three main components: nodes, gateways, and software. The spatially distributed measurement nodes interface with sensors to monitor assets or their environment. In a WSN network the devices are connected to WSN nodes wherein the entire nodes uses Zigbee network to transfer the status of connected applications to a controller which controls the whole applications but the main drawback of Wireless sensor networks is its high interference, low coverage area and ability to control only low power devices. In order to overcome these drawbacks Android equipped devices are used to control the applications over GPRS network. Android equipped devices allow the user to control various applications over wireless networks. Being an open sourced platform it allows the user to design a custom module which controls the home applications by connecting the android equipped device and its corresponding home applications to an MCU wherein it uses relay circuits to connect the entire applications using GPRS network to connect the application controller and the android device. These devices can be used to control industrial applications, home applications like light, fan etc., and thereby conserving electricity.

Index terms

  • Wireless Sensor Network (WSN)
  • Network Centric Capability(NCC)
  • Data Terminal Equipment ( DTE )
  • Software Defined Radio (SDR)
Otwarty dostęp

Design and Implementation of Dual-Band Circularly Polarized Antennas Using Stacked Patches

Data publikacji: 01 Sep 2017
Zakres stron: 87 - 100

Abstrakt

Abstract

Single and Dual feed Antennas with dual frequencies have been demonstrated. Varactor diodes are used for independent tuning. The PIFA (Planar Inverted F-Antenna) has two frequencies from 0.7 to 1.1 GHz and from 1.7 to 2.3GHz. Impedance match of about -10dB an isolation greater than 13dB is obtained. The single feed antenna can be tuned from 1.2 to 1.6GHz and 1.6 to 2.3 GHz. The antenna volumes are 63x100x3.15 mm3 with relative permittivity is 3.55 substrates. The efficiency varies from 25% to 50% over tuning range. The application areas are in 4G wireless systems.

Index terms

  • Planar inverted F-antenna (PIFA)
  • Voltage Standing Wave Ratio(VSWR)
Otwarty dostęp

A Memory Efficient Hardware Based Pattern Matching and Protein Alignment Schemes for Highly Complex Databases

Data publikacji: 01 Sep 2017
Zakres stron: 101 - 122

Abstrakt

Abstract

Protein sequence alignment to find correlation between different species, or genetic mutations etc. is the most computational intensive task when performing protein comparison. To speed-up the alignment, Systolic Arrays (SAs) have been used. In order to avoid the internal-loop problem which reduces the performance, pipeline interleaving strategy has been presented. This strategy is applied to an SA for Smith Waterman (SW) algorithm which is an alignment algorithm to locally align two proteins. In the proposed system, the above methodology has been extended to implement a memory efficient FPGA-hardware based Network Intrusion Detection System (NIDS) to speed up network processing. The pattern matching in Intrusion Detection Systems (IDS) is done using SNORT to find the pattern of intrusions. A Finite State Machine (FSM) based Processing Elements (PE) unit to achieve minimum number of states for pattern matching and bit wise early intrusion detection to increase the throughput by pipelining is presented.

Index terms

  • Systolic Arrays (SAs)
  • Intrusion Detection Systems (IDS)
  • Network Intrusion Detection System (NIDS)
  • protein Data Bases (DBs)
Otwarty dostęp

Instance Vehicle Monitoring and Tracking with Internet of Things Using Arduino

Data publikacji: 01 Sep 2017
Zakres stron: 123 - 135

Abstrakt

Abstract

The Vehicle Tracking System has the capability of finding the Vehicle location, Gas Leakages, Vehicle Speed, and Vehicle Accident and at the same time notifies the owners of the vehicle through a GSM network with an SMS alert message. The drivers require their presence to their family or to their respective one’s. The main aim is to design a low cost and an efficient vehicle tracking and vehicle security circuit based on an Arduino microcontroller. This system can be made as a backup sector inside the vehicles to prevent them from stolen and easy to identify the location and prevent from other disaster factors. The main methodology of the device is to monitoring the vehicle speed via Ethernet shield through Internet of things. The protective system is maintained by analysing gas tank through gas sensor which details about the gas leakage. The advantages of this device are alarming the driver when there is any gas leakage in the vehicle and also informs about the speed of the car. A vibrating sensor is used to alert when the vehicle is struck with some accident by sending SMS to the required people via GSM Modem and all the data which can be viewed by the driver can be viewed by the people in home via Ethernet device.

Index terms

  • VibrationSensors
  • MQ2 Gas Sensor
  • IOT
  • Microcontroller
  • Vehicle tracking
  • Vehicle security
Otwarty dostęp

Detecting IP Based Attack On Cloud Server Using Passive IP Traceback

Data publikacji: 01 Sep 2017
Zakres stron: 136 - 146

Abstrakt

Abstract

In computer network security, IP address spoofing plays a major role in the creation of Internet Protocol (IP) packets with a fake or forged source IP address and this may lead to major attacks to cloud centre. When the identities of user information are forged by spoofing or masquerade as another computing system. Whether the basic protocol for sending data in the Internet communication are based on the Internet Protocol (“IP”). In network communication header of each IP packet consist of source and destination address of the packet. The source address contains where the packet was sent origin address. In that IP spoofing can be performed by forging the original header from sender it act like packet is sent from origin with different address, an attacker can make it appear that the packet was sent by a different machine. So that the IP Spoofing attack can be placed to further attacks comes into place of impersonating system. This can avoided by a novel solution, named Passive IP Trace back (PIT), to avoid the challenges in operation. To capture the origins of IP spoofing traffic is difficult to locate. As long as the real locations of spoofing are not identified, they cannot be determined from launching further attacks. Identifying the origins of spoofing traffic can help build a reputation system for network place, which would be helpful to push the corresponding ISPs to verify IP source address.

Index terms

  • IP spoofing
  • cloud center
  • Time To Live (TTL)
  • Passive IP Trace back (PIT)
  • Threshold value
  • network telescope
  • Internet Control Message Protocol (ICMP)
Otwarty dostęp

Detection and Removal of Dust Particles in Pipelines Using 3-D Mems

Data publikacji: 01 Sep 2017
Zakres stron: 147 - 162

Abstrakt

Abstract

Currently, the detection of dust particles is realized through manual sampling. Thus it is desirable to develop an automated online technique. Generally, industries run with the help of pipelines through which liquid can flow. The main aim of the work is to detect the dust particles which are present inside the pipeline when liquid is flowing through it. Distributed Acoustic Sensing (DAS) is a recent addition to the pipeline security world. Opta sense system is designed to prevent the damage in pipeline by providing the advance warning to the concern department and make them alert. The dust particles are detected by using MEMS, which can sense in three axis (Heat, Vibration, Movement). It is identified by the IR sensor. The approach can also be simulated by using MATLAB.

Index terms

  • Micro Electro Mechanical System (MEMS)
  • Distributed Acoustic Sensing (DAS)
  • Renewable Energy Sources (RES)
  • Opta sense interrogator unit (OIU)
Otwarty dostęp

Dynamic Face Recognition and Tracking System Using Machine Learning in Matlab and Bigdata

Data publikacji: 01 Sep 2017
Zakres stron: 163 - 173

Abstrakt

Abstract

Face Recognition being one of the methods in identifying individuals is getting enhanced at a faster rate. This paper demonstrates the process of detection of faces of the individuals through a live monitoring camera using matlab and also aids in tracking them. The large amount of images being collected at each second is stored in big databases like Hadoop-databases(hbase) or Mongodb as they are known for their higher processing speed. The facial features are extracted from all the images and are trained into the databases using machine learning algorithm. The tracking of individuals can be achieved by capturing their images while on the move and comparing them with the values stored in the databases. The detection of facial structure is done with Viola-Jones algorithm which though older is easy and efficient to use and Kanade-Lucas-Tomasi(KLT) algorithm is used for feature extraction . The HOG (Histogram of Oriented Gradients) features are extracted for training.

Index terms

  • Cascade object detector
  • Computer vision
  • Face detection
  • Face recognition
  • Big data
  • Neural networks
Otwarty dostęp

Wireless Zigbee Network Cluster - Capacity Calculation and Secure Data Conveyance Using Indegree

Data publikacji: 01 Sep 2017
Zakres stron: 174 - 185

Abstrakt

Abstract

A tree topology is used to construct to construct a Zigbee networks practices by wireless sensor network for data delivery applications. There are 3 types of nodes in zigbee networks; coordinator, router and mobile end devices. Coordinator performs the initialization and maintenance functions in the network. A router is responsible for routing data between the coordinator and mobile end device. In-order to avoid the delivery failures occurs due to node movements and network topology changes, the existing system collect and analyze data about device movement and gives Zigbee node deployment and tree construction framework, which uses three algorithms ZND(zigbee node deployment), ZCD(zigbee coordinator decision) and ZTC(zigbee tree construction). In the proposed system we improve the data delivery by introducing the capacity calculation. If any two nodes have same number of indegree or out-degree, we select the node with maximum capacity.

Index terms

  • Mobility robustness
  • tree topologies
  • ZigBee wireless networks
  • Network Clusters
Otwarty dostęp

Design of NFC Reader for Enhancement of Mobile Payments

Data publikacji: 01 Sep 2017
Zakres stron: 186 - 197

Abstrakt

Abstract

The NFC concept was mainly based on RFID tags which has the frequency range of 13.56MHz.NFC concept was initially determined to exchange data between two devices at very short distance. RFID uses electromagnetic fields to automatically identify and trace tags attached to objects which contain electronically stored information. The major problem with the RFID tags was their cost and the RFID tags had the possibility to be interfered with metals and liquids when we try to read them. There is a possibility of unauthorized reading of passports and credit cards. NFC readers are more secure and hence the NFC enabled credit cards are much safer than a credit card with magnetic strip. We specially use PIC16F877A for the purpose of matching the details in mobile phone with the information in the NFC reader that are required to make mobile payments.

Index terms

  • Radio Frequency Identification
  • Near Field Communication
  • PIC16F877A
Otwarty dostęp

Hybrid Power Harvester Using Engine Source

Data publikacji: 01 Sep 2017
Zakres stron: 198 - 211

Abstrakt

Abstract

In mainly we present a compact, multisource and battery-free energy harvesting from engine source. This battery free generator captures energy from its environment transient thermal gradients as a main source, and vibration as a secondary source allowing early biasing of the generator and stores this energy in ultracapacitors .In this way, this multi-source architecture benefits from the synergy between energy scavenging and harvesting.

Index terms

  • Multi-source
  • Ultra-capacitors
  • Thermal energy
  • Vibrations
Otwarty dostęp

A Lifi Based Data Transmission for Anti Collision System

Data publikacji: 01 Sep 2017
Zakres stron: 212 - 224

Abstrakt

Abstract

A new way of data transmission between two vehicles using light fidelity technology is proposed in this paper. A best way of avoiding accidents can be achieved by the communication between the vehicles. This system can be simplified by using LED bulbs for data transmission. The previously used data transmission technology can be overcome by the newly proposed LIFI technology. The major objective of this system is to achieve reliable communication between the vehicle using a transmitter and a receiver. The communication methods and the operations are presented in detail.

Index terms

  • Light fidelity
  • Light emitting diode
  • wireless communication
  • visible light communication
Otwarty dostęp

Design of Low Complexity Accumulator Using Finfet for Various Technologies

Data publikacji: 01 Sep 2017
Zakres stron: 225 - 235

Abstrakt

Abstract

FINFET terminological in exactitude process reuses a massive part of well accustomed conventional CMOS process. FINFET is a likely-look alternative to conventional MOSFET which has reached its limit and has too much leakage for too little performance gain. FINFET is being suggested as basics for future IC processes because its power or performance benefits, scalability, superior controls over short channel effort etc., In this paper we propose a outlook for scheming accumulator using FINFET for purpose of minimize number of transistor differentiate to CMOS logic. In circuit level, widely used D flip-flop and at constructional level the full adder cells of FINFET (dual gate transistor) 10T can be used. FINFET is the most propitious double gate transistor, forecast as one of the candidate to restore the epic MOSFET. FINFET technology power consumption is compare with CMOS technology to analyze how the area, delay and power can be reduced.

Index terms

  • FINFET (FIN field effect transistor)
  • CMOS (Complementary Metal oxide semiconductor)
  • accumulator
  • low power consumption
  • reduce delay
Otwarty dostęp

Hardware Implementation of Uwb Radar for Detection of Trapped Victims in Complex Environment

Data publikacji: 01 Sep 2017
Zakres stron: 236 - 258

Abstrakt

Abstract

Ultra-wideband (UWB) radar plays an important role in search and rescue at disaster relief sites. Identifying vital signs and locating buried survivors are two important research contents in this field. In general, it is hard to identify a human’s vital signs (breathing, body temperature, brain waves and heartbeat) in complex environments due to the low signal-to-noise ratio of the vital sign in radar signals. In this paper, advanced signal-processing approaches are used to identify and to extract human vital signs in complex environments. First, we apply Curvelet transform to remove the source–receiver direct coupling wave and background clutters. Next, singular value decomposition is used to de-noise in the life signals. Finally, the results are presented based on FFT and Hilbert-Huang transform to separate and to extract human vital sign frequencies, as well as the micro-Doppler shift characteristics. The proposed processing approach is first tested by a set of synthetic data generated by FDTD simulation for UWB radar detection of two trapped victims under debris at an earthquake site of collapsed buildings.

Index terms

  • Ultra-wideband (UWB)Receiver Signal Strength Indicator(RSSI)
  • Control and Status Register
Otwarty dostęp

Gsm Based Soldier Tracking System and Monitoring Using Wireless Communication

Data publikacji: 01 Sep 2017
Zakres stron: 259 - 270

Abstrakt

Abstract

To design a soldier tracking system using wireless system for monitoring the parameters of soldier are as Body temperature & Temperature. Biomedical sensors: Here to find the health status of soldier we are using a body temp sensor to measure body temperature as well as pulse rate sensor. These parameters are then signal conditioned and will be stored in the memory. One of the fundamental challenges in military operations lays in that the Soldier not able to communicate with control room administrator. In addition, each organization needs to enforce certain administrative and operational work when they interact over the network owned and operated by other organizations. Thus, without careful planning and coordination, one troop cannot communicate with the troops or leverage the communication infrastructure operated by the country troops in the same region. The purpose of this investigation was to test the components of the Soldier Tracking and Performance Measurement System against the statement of requirements as found in the Request for Proposal. Secondary aims of this investigation included gathering data that will allow potential users of the system to understand its capabilities and limitations, as well as allow efficient planning of both time and resources necessary to ensure efficient and productive use of the system for training the solider.

Index terms

  • temperature sensor
  • pulse rate sensor
  • Soldier Tracking
  • Performance Measurement System
Otwarty dostęp

Multi_level Secure From Web Intrusion and Query Attacks on Web Database

Data publikacji: 01 Sep 2017
Zakres stron: 271 - 283

Abstrakt

Abstract

Most data frameworks and business applications assembled these days have a web frontend and they should be generally accessible to customers, representatives and accomplices around the globe, as the computerized economy is turning out to be increasingly pervasive in the worldwide economy. Strategy and a model instrument to assess web application security components. In this paper, we along these lines propose to make trusted equipment a top notch national in the safe information administration field. Additionally, we trust that cost-driven bits of knowledge and compositional standards will generally change the way frameworks and calculations are planned. We present an outsourced database model that permits customers to execute SQL questions with security and under administrative consistence imperatives by utilizing server-facilitated, sealed trusted equipment in basic inquiry preparing stages, along these lines expelling any confinements on the kind of bolstered inquiries.

Index terms

  • Automatic protection
  • data mining
  • false positives
  • input validation vulnerabilities
  • software security
  • source code static analysis
  • web applications
Otwarty dostęp

Design of Low Power Carry Skip Adder Using Dtcmos

Data publikacji: 01 Sep 2017
Zakres stron: 284 - 294

Abstrakt

Abstract

In the domain of VLSI design, the adders are always meant to be the most fundamental requirements for processors of high performance and other multicore devices. It is found that power dissipation is a major problem in the electronic devices. Power management integrated circuit (PMIC) is emphasized as battery-powered portable electronics such as smart phone are commonly used. In this paper we are designing a carry skip adder which consumes less power than the other conventional adders using dynamic threshold complementary metal oxide semiconductor (DTCMOS).Tthe circuit is designed using tanner EDA simulator of 32nm technology. Also the circuit is compared with the CMOS technology methods.

Index terms

  • Carry skip adder
  • low power consumption
  • high performance
  • speed
  • delay parameters
Otwarty dostęp

Design of Sram Architecture with Low Power without Affecting Speed Using Finfet

Data publikacji: 01 Sep 2017
Zakres stron: 295 - 310

Abstrakt

Abstract

In average 8T SRAM Architecture, it requires maximum number of transistor counts and does not need any write back scheme. To achieve the higher word line (WL) Voltage, the bit line (BL) is connected to the gate of the read buffer SRAM Architecture. That boosted voltage is not used when the threshold voltage is high. Its leads to the reduction of read stability of the SRAM Design. In that case, the gate terminal of the SRAM Architecture is not connected to the buffer results a large delay. To overcome the disadvantage of the average 8T SRAM architecture, the 6T SRAM Design is proposed. In proposed 6T SRAM Design, the number of transistor counts and Power is reduced than the existing design. Various factors of the proposed SRAM Architecture, which stores multiple bits in terms of power and transistor counts. The simulation of 6T SRAM design is carried out in S-Edit and the synthesized in T-Spice.

Index terms

  • Static random access memory (SRAM)
  • Low voltage operation
  • Low power consumption
Otwarty dostęp

Learning to Rank and Classification of Bug Reports Using SVM and Feature Evaluation

Data publikacji: 01 Sep 2017
Zakres stron: 311 - 329

Abstrakt

Abstract

When a new bug report is received, developers usually need to reproduce the bug and perform code reviews to find the cause, a process that can be tedious and time consuming. A tool for ranking all the source files with respect to how likely they are to contain the cause of the bug would enable developers to narrow down their search and improve productivity. This project introduces an adaptive ranking approach that leverages project knowledge through functional decomposition of source code, API descriptions of library components, the bugfixing history, the code change history, and the file dependency graph. Given a bug report, the ranking score of each source file is computed as a weighted combination of an array of features, where the weights are trained automatically on previously solved bug reports using a learning-to-rank technique. I applied SVM (Support Virtual Machine) to classify the bug reports to identify, which category the bug belongs to. It helps to fix the critical defects early. The ranking system evaluated on six large scale open source Java projects, using the beforefix version of the project for every bug report. The experimental results show that the learning-to-rank approach outperforms three recent state-of-the-art methods. In particular, proposed method makes correct recommendations within the top 10 ranked source files for over 70 percent of the bug reports in the Eclipse Platform and Tomcat projects.

Index terms

  • Learning to rank
  • SVM
  • Preprocessing
  • CF(collaborative Filtering)
Otwarty dostęp

Performance and Analysis of Automatic License Plate Localization and Recognition from Video Sequences

Data publikacji: 01 Sep 2017
Zakres stron: 330 - 343

Abstrakt

Abstract

The works presents license plate recognition system using connected component analysis and template matching model for accurate identification. Automatic license plate recognition (ALPR) is the extraction of vehicle license plate information from an image. The system model uses already captured images for this recognition process. First the recognition system starts with character identification based on number plate extraction, Splitting characters and template matching. ALPR as a real life application has to quickly and successfully process license plates under different environmental conditions, such as indoors, outdoors, day or night time. It plays an important role in numerous real-life applications, such as automatic toll collection, traffic law enforcement, parking lot access control, and road traffic monitoring. The system uses different templates for identifying the characters from input image. After character recognition, an identified group of characters will be compared with database number plates for authentication. The proposed model has low complexity and less time consuming interms of number plate segmentation and character recognition. This can improve the system performance and make the system more efficient by taking relevant sample.

Index terms

  • Plate Recognition (LPR)
  • Automatic license plate recognition (ALPR)
  • Optical Character Recognition(OCR)
Otwarty dostęp

Design of Low Leakage Current Average Power CMOS Current Comparator Using SVL Technique With Pseudo NMOS and Transmission Gate Logics

Data publikacji: 01 Sep 2017
Zakres stron: 344 - 357

Abstrakt

Abstract

Comparatorare most widely used second electronic components after operational amplifier. For ADC circuit we have to use the high speed and low power consumption based comparator. SVL circuit is used tom reduce the offset voltage which requires high voltage gain. A SVL circuit can supply maximum DC voltage to an active load circuit on request or can decrease the DC voltage supplied to a load circuit in the standby mode was developed. SVL circuit is used with comparator which reduce the power consumption from 258.6μw to 156.7μw. Pseudo nmos logic and transmission gate logic is used with the SVL based current comparator which further reduce the power consumption in the standby mode. This technique based comparator is fabricated on the tanner tool of 45nm technology.SVL technique is mostly recommended for CMOS logic.

Index terms

  • current comparator
  • SVL circuit
  • pseudo nmos
  • transmission gate
  • low power consumption
  • standby mode
Otwarty dostęp

Performance Evaluation of Efficient and Reliable Routing Protocol Algorithm

Data publikacji: 01 Sep 2017
Zakres stron: 358 - 373

Abstrakt

Abstract

Fixed-power wireless sensor networks are prevalent and cost-effective. However, they face mote failures, RF interference from environmental noise and energy constraints. Routing protocols for such networks must overcome these problems to achieve reliability, energy efficiency and scalability in message delivery. Achievement of these requirements, however, poses conflicting demands. In this work, we propose an efficient and reliable routing protocol (EAR) that achieves reliable and scalable performance with minimal compromise of energy efficiency. The routing design of EAR is based on four parameters expected path length and a weighted combination of distance traversed, energy levels and link transmission success history, to dynamically determine and maintain the best routes. Simulation experiments of EAR with four existing protocols demonstrate that a design based on a combination of routing parameters exhibits collectively better performance than protocols based on just hop-count and energy or those using flooding.

Index terms

  • Efficient And Reliable routing protocol (EAR)
  • Route Request (RREQ)
  • Route Reply (RREP) packet
  • Network Animator(NAM)
Otwarty dostęp

Specific Absorption Rate Assessment on Human Head Due to Radiations by Mobile Phone Antenna

Data publikacji: 01 Sep 2017
Zakres stron: 374 - 394

Abstrakt

Abstract

Development of mobile phone communication infrastructure in the world has promoted which lead public concern over possible health effect exposure to radio frequency electromagnetic energy (RFEME) emanating from mobile phone antenna. The Micro-strip patch antenna plays an important role in electromagnetic energy transmitting and receiving phenomena in mobile phone. This paper makes an effort to assess the mobile radiation exposure effect on 4 years child, 8years child and an adult head model. Hand held device model having micro-strip antenna is used for human interaction. The software simulation performed by Computer simulation technique (CST) software based on Finite difference Time Domain Technique yields specific absorption rate and 3D-thermal distribution on spherical human head.

Index terms

  • Radio Frequency ElectroMagnetic Energy (RFEME)
  • Computer Simulation Technique (CST)
  • Specific Absorption Rate (SAR)
  • Magnetic Resonance Imaging (MRI)
Otwarty dostęp

Cluster Head Election Mechanism-Based on Fuzzy Logic (Chef) with TDMA in WSN

Data publikacji: 01 Sep 2017
Zakres stron: 395 - 413

Abstrakt

Abstract

Wireless sensor networks (WSN) are being used for huge range of applications where the traditional infrastructure based network is mostly infeasible. The most challenging aspect of WSN is that they are energy resource-constrained and that energy cannot be replenish. the wireless sensor network of power limited sensing devices called sensor deployed in a region to sense various types physical information from the environment, when these sensors sense and transmit data to other sensors present in the network, even the cluster head is elected according to check their residual energy considerable amount of energy will drain automatically to overcome this drawback by considering the protocol a fuzzy logic approach is used to elect the cluster head based on three descriptors-energy, centrality & distance and second CH is elected according to TDMA to overcome the data lost during energy drain occur in the CH .NS-2 simulation shows that proposed protocol provides higher energy efficiency. This paper proposes the mechanism or device is capable of utilizing its own system of control simply called as self-configurable clustering mechanism to detect the disordered CHs and replace them with other nodes. And results have been derived from simulator ns-2 to show the better performance.

Index terms

  • WSN
  • CH
  • fuzzy logic;
  • DMA
  • NS-2 simulator
  • base station
Otwarty dostęp

An Intelligence Super Mart Billling System

Data publikacji: 01 Sep 2017
Zakres stron: 414 - 425

Abstrakt

Abstract

Currently embedded systems be mainly based on microcontroller’s i.e. CPUs in the company of included reminiscence the same as well as tangential interface except ordinary microprocessors by means of external chips for memory and peripheral interface circuits are common, especially in technology may not only be useful for streamlining category and supply chains. Nowadays it is rare to see people getting keen in online shopping through e-commerce websites but still the shopping centers are popular. We come across many types of carts used for shopping in malls and shopping center. The major purpose of this effort is reducing delays in foremost supermarkets or shopping center via income of an electronic smart cart method which will introduce an cognitive approach to billing system during RFID technology. Zigbee is base scheduled an IEEE 802.15 ordinary. Zigbee devices a group of pass on data more than longer space by transient data through transitional devices to make more distances ones, create a interconnect network. Purchasing product during a RFID reader going on shopping cart, suggest while product information resolve be stored into EEPROM close to it and EEPROM data spirit send in the direction of central billing system throughout Zigbee module. The anticipated method will survive helpful for avoiding queues in shopping malls for billing. Hence the shopping becomes easy and enjoyable.

Index terms

  • Product Identification Device EEPROM
  • RFID Reader
  • RFID Tag
  • Smart Shopping
Otwarty dostęp

Secure Route Discovery for Dynamic Source Routing in Manets

Data publikacji: 01 Sep 2017
Zakres stron: 426 - 445

Abstrakt

Abstract

Mobile ad hoc networks (MANETs) are collections of wireless mobile devices with restricted broadcast range and resources and no fixed infrastructure. Communication is achieved by communicating data along suitable routes that are dynamically discovered and maintained through association between the nodes. Discovery of such routes is a major task both from good organization and security points of view. Recently a security model tailored to the specific requirements of MANETs. A novel route discovery algorithm called endairA is also proposed together with a claimed security proof within the same model. In this paper we show the security proof for the route discovery algorithm endairA is malfunctioning and moreover this algorithm is vulnerable to a hidden channel attack. We also analyze the security framework that is used for route discovery and argue the compos ability is an essential feature for ubiquitous applications. We conclude by discussing some of the major security challenges for route discovery in MANETs.

Index terms

  • Fast Mobile ad hoc networks (MANETs)
  • Message Authentication Codes(MACs)
  • Source Routing Protocol(SRP)
Otwarty dostęp

A Wearable Multiparameter Medical Monitoring and Alert System with First Aid

Data publikacji: 01 Sep 2017
Zakres stron: 446 - 458

Abstrakt

Abstract

The main aim of the paper is biomedical monitoring of human being. Biomedical values are heart rate ,blood pressure ,body temperature and here we use a GPRS module and biomedical monitoring sensor and data from these sensor are updated to the web server and in addition to that we use an automated external defibrillator(AED) which automatically diagnosis the cardiac arrhythmia of ventricular fibrillation, and pulse less ventricular tachycardia and is able to deal them with an defibrillation, the requisition of electrical therapy which stops arrhythmia , allowing the heart to reestablish the normal rhythm when compare to regular defibrillator it require minimal training to use. Biomedical monitoring promises to give an overview of cardiovascular system non -invasively and this will be easy to use and operate without hospitalization.

Index terms

  • heart rate
  • monitoring sensor
  • GPRS
  • Automated External Defibrillator
Otwarty dostęp

Patrol Inspection and Time Study to Improve Quality

Data publikacji: 01 Sep 2017
Zakres stron: 459 - 470

Abstrakt

Abstract

This project is concerned to analyze and increase the efficiency of patrol inspection and thus reduces time consumption for inspection. Inspection is the process of checking whether the specification of the product meet the standard specification provided by the customer. Inspector takes more time for checking the parameter that meet the specification at all time than Checking the parameters that does not satisfy the customer specification which leads to rejection .Thus the inspector should inspect the parameter that increase the rejection or rework with more attention .on the whole this concept helps the inspector to improve the quality of the product by inspecting more components according to the frequency of the component.

Index terms

  • Patrol Inspection
  • standard specification
Otwarty dostęp

Unmanned Fire Extinguisher Using Quadcopter

Data publikacji: 01 Sep 2017
Zakres stron: 471 - 481

Abstrakt

Abstract

Quadcopters are unmanned Ariel Vehicle (UAV), generally small helicopter that is lifted and propelled by four rotors. Initially they were used as toys, later they gained importance and recent research on multi-copters have received growing attention for military, agriculture, photography, surveillance, news, sports, search/rescue missions and much more. The widespread use of unmanned vehicles and its growing applications in various domains can be attributed to their ability to operate in inaccessible areas, thus decreasing the human loss in major accidents, and making access easy to dangerous conditions. We have proposed an idea about how quadcopter can be used for the application of fire detecting and extinguishing. The target of this paper is to explain briefly to prepare a quadcopter so that it could be used for firefighting and can help our society.

Index terms

  • Unmanned Ariel Vehicle (UAV)
  • Vertical Take-off and Landing (VTOL)
  • remotely piloted vehicles (RPV)
  • clockwise (CW)
  • counter-clockwise (CCW)
Otwarty dostęp

Cloud Security and Compliance - A Semantic Approach in End to End Security

Data publikacji: 01 Sep 2017
Zakres stron: 482 - 494

Abstrakt

Abstract

The Cloud services are becoming an essential part of many organizations. Cloud providers have to adhere to security and privacy policies to ensure their users’ data remains confidential and secure. Though there are some ongoing efforts on developing cloud security standards, most cloud providers are implementing a mishmash of security and privacy controls. This has led to confusion among cloud consumers as to what security measures they should expect from the cloud services, and whether these measures would comply with their security and compliance requirements. We have conducted a comprehensive study to review the potential threats faced by cloud consumers and have determined the compliance models and security controls that should be in place to manage the risk. Based on this study, we have developed an ontology describing the cloud security controls, threats and compliances. We have also developed an application that classifies the security threats faced by cloud users and automatically determines the high level security and compliance policy controls that have to be activated for each threat. The application also displays existing cloud providers that support these security policies. Cloud consumers can use our system to formulate their security policies and find compliant providers even if they are not familiar with the underlying technology.

Index terms

  • Cloud computing
  • cloud security
  • Security compliance models
  • Cloud security models
Otwarty dostęp

Temporal Query Processig Using Sql Server

Data publikacji: 01 Sep 2017
Zakres stron: 495 - 505

Abstrakt

Abstract

Most data sources in real-life are not static but change their information in time. This evolution of data in time can give valuable insights to business analysts. Temporal data refers to data, where changes over time or temporal aspects play a central role. Temporal data denotes the evaluation of object characteristics over time. One of the main unresolved problems that arise during the data mining process is treating data that contains temporal information. Temporal queries on time evolving data are at the heart of a broad range of business and network intelligence applications ranging from consumer behaviour analysis, trend analysis, temporal pattern mining, and sentiment analysis on social media, cyber security, and network monitoring. Social networks (SN) such as Facebook, twitter, LinkedIn contains huge amount of temporal information. Social media forms a dynamic and evolving environment. Similar to real-world friendships, social media interactions evolve over time. People join or leave groups; groups expand, shrink, dissolve, or split over time. Studying the temporal behaviour of communities is necessary for a deep understanding of communities in social media(SM). In this paper we focus on the use of temporal data and temporal data mining in social networks.

Index terms

  • temporal data
  • social networks
  • temporal database
  • data mining
  • Temporal query processing
  • time stamp using SQL Server
Otwarty dostęp

Computation of Field Programmable Cyclic Redundancy Checks Circuit Architecture

Data publikacji: 01 Sep 2017
Zakres stron: 506 - 521

Abstrakt

Abstract

In this work we are going to simulate a field programmable cyclic redundancy check circuit architecture. The transmitted data or stored data must be free from error. The increased use of error correction techniques by digital communications designers has created a demand for tools to evaluate and exercise error correction coding approaches before they are committed to expensive ASICs or firmware. Cyclic redundancy check is an error detection method but it can be used only for a specific application. A field programmable circuit is one which enables a wide range of polynomial width and input port width to be used with in the same circuit. The parameters are reprogrammable and it is fully flexible. The circuit also consists of an embedded configuration controller that reduces the programming time and complexity. The hardware cost is reduced and the line speed is increased. The primary tool used is modelsim 6.1a.

Index terms

  • Cyclic Redundancy Check (CRC)
  • Application Specific Integrated Circuit
  • ASIC
Otwarty dostęp

Performance and Analysis of Low Power, Areaefficient and High Speed Carryfast Adder

Data publikacji: 01 Sep 2017
Zakres stron: 522 - 538

Abstrakt

Abstract

Carry Select Adder (CSLA) is one of the fastest adders used in many data-processing processors to perform fast arithmetic functions. From the structure of the CSLA, it is clear that there is scope for reducing the area and power consumption in the CSLA. This work uses a simple and efficient gate-level modification to significantly reduce the area and power of the CSLA. Based on this modification 8, 16,32,and 64-bit square-root CSLA (SQRT CSLA) architecture have been developed and compared with the regular SQRT CSLA architecture. The proposed design has reduced area and power as compared with the regular SQRT CSLA with only a slight increase in the delay. This work evaluates the performance of the proposed designs in terms of delay, area, power. Binary to Excess-1 Converter (BEC) instead of RCA with the regular CSLA to achieve lower area and power consumption. The main advantage of this BEC logic comes from the lesser number of logic gates than the n-bit Full Adder structure. The delay and area evaluation methodology of the basic adder blocks. The SQRT CSLA has been chosen for comparison with the proposed design as it has a more balanced delay, and requires lower power and area. Reducing the area and power consumption in the CSLA. Efficient gate-level modification to significantly reduce the area and powerof the CSLA.

Index terms

  • Carry Select Adder (CSLA)
  • Binary to Excess-1 Converter (BEC)
  • Carry-propagation adder (CPA)
Otwarty dostęp

A Multi-Keyword Ranked Search Scheme Over Encrypted Based on Hierarchical Clustering Index

Data publikacji: 01 Sep 2017
Zakres stron: 539 - 559

Abstrakt

Abstract

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data Due to the increasing popularity of cloud computing, more and more data owners are motivated to outsource their data to cloud servers for great convenience and reduced cost in data management. In this project, present a secure multi-keyword ranked search scheme over encrypted cloud data, which simultaneously supports dynamic update operations like deletion and insertion of documents. Specifically, the vector space model and the widely-used TFIDF model are combined in the index construction and query generation. The proposed hierarchical approach clusters the documents based on the minimum relevance threshold, and then partitions the resulting clusters into sub-clusters until the constraint on the maximum size of cluster is reached. In the search phase, this approach can reach a linear computational complexity against an exponential size increase of document collection. In order to verify the authenticity of search results, a structure called minimum hash sub-tree is designed in this paper. Due to the use of our special tree-based index structure, the proposed scheme can achieve sub-linear search time and deal with the deletion and insertion of documents flexibly. Extensive experiments are conducted to demonstrate the efficiency of the proposed scheme.

Index terms

  • Searchable encryption
  • multi-keyword ranked search
  • dynamic update
  • cloud computing
Otwarty dostęp

Data Mining with Big Data Revolution Hybrid

Data publikacji: 01 Sep 2017
Zakres stron: 560 - 573

Abstrakt

Abstract

Big Data concern large-volume, complex, growing data sets with multiple, autonomous sources. With the fast development of networking, data storage, and the data collection capacity, Big Data are now rapidly expanding in all science and engineering domains, including physical, biological and biomedical sciences. This paper presents a HACE theorem that characterizes the features of the Big Data revolution, and proposes a Big Data processing model, from the data mining perspective. This data-driven model involves demand-driven aggregation of information sources, mining and analysis, user interest modeling, and security and privacy considerations. We analyze the challenging issues in the data-driven model and also in the Big Data revolution.

Index terms

  • HACE
  • demand-driven
  • data storage
Otwarty dostęp

Machine Vision Based Missing Fastener Detection in Rail Track Images Using SVM Classifier

Data publikacji: 01 Sep 2017
Zakres stron: 574 - 589

Abstrakt

Abstract

Missing fastener detection is a critical task due to its similar characteristics with surrounding environments. In this paper, a machine vision based fully automatic detection and classification of missing fastener detection system is proposed using Support Vector Machine (SVM) classifier. This proposed system consists of preprocessing, transformation, feature extraction and classifications. Image resizing is performed as preprocessing step and Gabor transform is used as transformation technique. Grey Level Cooccurence Matrix (GLCM) features, Local Binary Pattern (LBP) features and Discrete Wavelet Transform (DWT) are used as features in this paper. SVM classifier is used as classifier in order to classify the test rail track image into either track image with fastener or track image without fastener.

Index terms

  • Fastener
  • classifier
  • features
  • track image
  • transformation
Otwarty dostęp

Authentication Scheme for Session Passwords Using Color and Image

Data publikacji: 01 Sep 2017
Zakres stron: 590 - 603

Abstrakt

Abstract

Graphical passwords are believed to be more secure than traditional textual passwords, but the authentications are usually complex and boring for users. Furthermore, most of the existing graphical password schemes are vulnerable to spyware and shoulder surfing. A novel graphical password scheme ColorLogin is proposed in this paper. ColorLogin is implemented in an interesting game way to weaken the boring feelings of the authentication. ColorLogin uses background color, a method not previously considered, to decrease login time greatly. Multiple colors are used to confuse the peepers, while not burdening the legitimate users. Meanwhile, the scheme is resistant to shoulder surfing and intersection attack to a certain extent. Experiments illustrate the effectiveness of ColorLogin.

Index terms

  • Graphical Passwords
  • Shoulder-Surfing
  • Intersection Attack
Otwarty dostęp

A New Approach for Cloud Data Security: From Single to Cloud-of-Clouds

Data publikacji: 01 Sep 2017
Zakres stron: 604 - 613

Abstrakt

Abstract

In the corporate world, a large number of people store their data on clouds. For doing this they need to give their confidential data in the hands of the third party, commonly known as service providers. These cloud service providers cannot be trusted since the complete data is stored in one single cloud. This increases security risks to the user’s sensitive data. Due to this issue of data integrity risk and service availability failure, the concept of “Cloud-of-Clouds” comes into picture. Cloud-of-clouds are also known as “inter-clouds” or “multi-clouds”. Use of cloud-of-clouds provides a higher level of security to the user’s confidential data. The aim of this paper is to secure the user’s data by using cloud-of clouds.

Index terms

  • Software Cloud Computing
  • Cloud-Of-Clouds
  • Inter-Clouds
  • Multi-Clouds
  • Security
  • Confidential Data
  • Data Integrity
Otwarty dostęp

Recent Research in Network Security

Data publikacji: 01 Sep 2017
Zakres stron: 1 - 2

Abstrakt

Abstract

Network security and Data analytics is an important to present society where information technology and services pass through each facet of our lives. However, it is demanding to achieve, as technology is changing at rapid speed and our systems turn into ever more complex. We are gradually more dependent upon such information and communications infrastructures, and the threats we face are organized and exploit our dependency by the attackers or cyber criminals. Moreover, cyber space is considered as fifth battlefield after land, air, water and space. The focal objective of the Special Issue on “Recent research in network security” is to provide insight mechanisms while handling data; provide conceptual understanding of network security issues, challenges and mechanisms; develop basic skills of secure network architecture and explain the theory behind the security of networks, analytics and different cryptographic algorithms. It is to present the most recent challenges and developments in data analytics and networks. It also provides a forum for researchers, practitioners and educators to present and discuss the most recent innovations, trends, and concerns, practical challenges encountered and the solutions adopted in these fields.

42 Artykułów
Otwarty dostęp

Hybrid Data Approach for Selecting Effective test Cases During the Regression Testing

Data publikacji: 01 Sep 2017
Zakres stron: 1 - 24

Abstrakt

Abstract

In the software industry, software testing becomes more important in the entire software development life cycle. Software testing is one of the fundamental components of software quality assurances. Software Testing Life Cycle (STLC)is a process involved in testing the complete software, which includes Regression Testing, Unit Testing, Smoke Testing, Integration Testing, Interface Testing, System Testing & etc. In the STLC of Regression testing, test case selection is one of the most important concerns for effective testing as well as cost of the testing process. During the Regression testing, executing all the test cases from existing test suite is not possible because that takes more time to test the modified software. This paper proposes new Hybrid approach that consists of modified Greedy approach for handling the test case selection and Genetic Algorithm uses effective parameter like Initial Population, Fitness Value, Test Case Combination, Test Case Crossover and Test Case Mutation for optimizing the tied test suite. By doing this, effective test cases are selected and minimized the tied test suite to reduce the cost of the testing process. Finally the result of proposed approach compared with conventional greedy approach and proved that our approach is more effective than other existing approach.

Index terms

  • Software Testing
  • Regression Testing
  • Test Reduction
  • Test Optimization
  • Test Data Generation
Otwarty dostęp

Performance Evalution of Video Surveillance Using Mete, Melt and Nidc Technique

Data publikacji: 01 Sep 2017
Zakres stron: 25 - 45

Abstrakt

Abstract

To evaluate multi-target video tracking results, one needs to quantify the accuracy of the estimated target-size and the Cardinality error as the well as measure the frequency of occurrence of ID changes. By surveying existing multi-target tracking performance scores and, after discussing their limitations, the work proposes three parameter-independent measures for evaluating multi target video tracking. The measures consider target-size variations, combine accuracy and cardinality errors, quantify long-term tracking accuracy at different accuracy levels, and evaluate ID changes relative to the duration of the track in which they occur. The work conduct an extensive experimental validation of the proposed measures by comparing them with existing ones and by evaluating four state-of-the-art trackers on challenging real world Publicly-available data sets. The software implementing the proposed measures is made available online to facilitate their use by the research community.

Index terms

  • Multi-TargetTrack-Before-Detect(MT-TBD)
  • Single Particle Tracking (SPT)
  • Multiple Extended Target Lost Track Ratio(MELT)
Otwarty dostęp

Efficient Approaches for Designing the Logical Reversibility of Computation

Data publikacji: 01 Sep 2017
Zakres stron: 46 - 61

Abstrakt

Abstract

The work demonstrates about the reversible logic synthesis for the 2 to 4 decoder, the circuits are designed using reversible fault tolerant toffoli gates. Thus the entire scheme inherently becomes fault tolerant. In addition, several lower bounds on the number of constant inputs, garbage outputs and quantum cost of the reversible fault tolerant decoder have been proposed. Transistor simulations of the proposed decoder power consumption have been reduced than the existing approach without decreasing the speed, which proved the functional correctness of the proposed Decoder. The comparative results show that the proposed design is much better in terms of quantum cost, delay, hardware complexity and has significantly better scalability. Tanner software is the advanced industrial tool that is growing up in trend. So the proposed decoder is designed in Tanner EDA after completion of the circuit in DSCH and Microwind. This shows the power dissipation and power consumption at each nook and corner to re-design with low power consumption possible.

Index terms

  • Fast Fourier Transform (FFT)
  • Reversible Logic Synthesis(RLS)
Otwarty dostęp

An Anti-Emulation Structure for Internet Despository Using Secured Image Validation Scheme

Data publikacji: 01 Sep 2017
Zakres stron: 62 - 68

Abstrakt

Abstract

Emulation attack is an effort by an individual or a group to steal personal confidential information such as passwords, credit card information etc, New approach called visual secret sharing scheme (VSS) for cloning websites classification to solve the problem of Phishing attack. The novel system is developed with the things that eradicate the drawbacks of the existing system. The main aim of visual secret sharing scheme is to conserves the solitude of image by decay the original image into two shares that as been stocked in independent database servers such that the authentic image can be revealed only when they are equally gathered. The specific sheet of representation does not declare the status of the original visual image which was generated previously. Once the unique visual image is discovered to the user then that picture can be used as a password for detecting phishing. In the proposed system, privacy enabled secure database is built. The security level is much enhanced from its actual level. The authentication process can be secured by using double level security.

Index terms

  • phishing attack
  • visual secret scheme
  • visual cryptography
  • anti-phishing validation scheme
Otwarty dostęp

Android Based Home Automation and Energy Conservation

Data publikacji: 01 Sep 2017
Zakres stron: 69 - 86

Abstrakt

Abstract

Wireless Sensor Network (WSN) consists of three main components: nodes, gateways, and software. The spatially distributed measurement nodes interface with sensors to monitor assets or their environment. In a WSN network the devices are connected to WSN nodes wherein the entire nodes uses Zigbee network to transfer the status of connected applications to a controller which controls the whole applications but the main drawback of Wireless sensor networks is its high interference, low coverage area and ability to control only low power devices. In order to overcome these drawbacks Android equipped devices are used to control the applications over GPRS network. Android equipped devices allow the user to control various applications over wireless networks. Being an open sourced platform it allows the user to design a custom module which controls the home applications by connecting the android equipped device and its corresponding home applications to an MCU wherein it uses relay circuits to connect the entire applications using GPRS network to connect the application controller and the android device. These devices can be used to control industrial applications, home applications like light, fan etc., and thereby conserving electricity.

Index terms

  • Wireless Sensor Network (WSN)
  • Network Centric Capability(NCC)
  • Data Terminal Equipment ( DTE )
  • Software Defined Radio (SDR)
Otwarty dostęp

Design and Implementation of Dual-Band Circularly Polarized Antennas Using Stacked Patches

Data publikacji: 01 Sep 2017
Zakres stron: 87 - 100

Abstrakt

Abstract

Single and Dual feed Antennas with dual frequencies have been demonstrated. Varactor diodes are used for independent tuning. The PIFA (Planar Inverted F-Antenna) has two frequencies from 0.7 to 1.1 GHz and from 1.7 to 2.3GHz. Impedance match of about -10dB an isolation greater than 13dB is obtained. The single feed antenna can be tuned from 1.2 to 1.6GHz and 1.6 to 2.3 GHz. The antenna volumes are 63x100x3.15 mm3 with relative permittivity is 3.55 substrates. The efficiency varies from 25% to 50% over tuning range. The application areas are in 4G wireless systems.

Index terms

  • Planar inverted F-antenna (PIFA)
  • Voltage Standing Wave Ratio(VSWR)
Otwarty dostęp

A Memory Efficient Hardware Based Pattern Matching and Protein Alignment Schemes for Highly Complex Databases

Data publikacji: 01 Sep 2017
Zakres stron: 101 - 122

Abstrakt

Abstract

Protein sequence alignment to find correlation between different species, or genetic mutations etc. is the most computational intensive task when performing protein comparison. To speed-up the alignment, Systolic Arrays (SAs) have been used. In order to avoid the internal-loop problem which reduces the performance, pipeline interleaving strategy has been presented. This strategy is applied to an SA for Smith Waterman (SW) algorithm which is an alignment algorithm to locally align two proteins. In the proposed system, the above methodology has been extended to implement a memory efficient FPGA-hardware based Network Intrusion Detection System (NIDS) to speed up network processing. The pattern matching in Intrusion Detection Systems (IDS) is done using SNORT to find the pattern of intrusions. A Finite State Machine (FSM) based Processing Elements (PE) unit to achieve minimum number of states for pattern matching and bit wise early intrusion detection to increase the throughput by pipelining is presented.

Index terms

  • Systolic Arrays (SAs)
  • Intrusion Detection Systems (IDS)
  • Network Intrusion Detection System (NIDS)
  • protein Data Bases (DBs)
Otwarty dostęp

Instance Vehicle Monitoring and Tracking with Internet of Things Using Arduino

Data publikacji: 01 Sep 2017
Zakres stron: 123 - 135

Abstrakt

Abstract

The Vehicle Tracking System has the capability of finding the Vehicle location, Gas Leakages, Vehicle Speed, and Vehicle Accident and at the same time notifies the owners of the vehicle through a GSM network with an SMS alert message. The drivers require their presence to their family or to their respective one’s. The main aim is to design a low cost and an efficient vehicle tracking and vehicle security circuit based on an Arduino microcontroller. This system can be made as a backup sector inside the vehicles to prevent them from stolen and easy to identify the location and prevent from other disaster factors. The main methodology of the device is to monitoring the vehicle speed via Ethernet shield through Internet of things. The protective system is maintained by analysing gas tank through gas sensor which details about the gas leakage. The advantages of this device are alarming the driver when there is any gas leakage in the vehicle and also informs about the speed of the car. A vibrating sensor is used to alert when the vehicle is struck with some accident by sending SMS to the required people via GSM Modem and all the data which can be viewed by the driver can be viewed by the people in home via Ethernet device.

Index terms

  • VibrationSensors
  • MQ2 Gas Sensor
  • IOT
  • Microcontroller
  • Vehicle tracking
  • Vehicle security
Otwarty dostęp

Detecting IP Based Attack On Cloud Server Using Passive IP Traceback

Data publikacji: 01 Sep 2017
Zakres stron: 136 - 146

Abstrakt

Abstract

In computer network security, IP address spoofing plays a major role in the creation of Internet Protocol (IP) packets with a fake or forged source IP address and this may lead to major attacks to cloud centre. When the identities of user information are forged by spoofing or masquerade as another computing system. Whether the basic protocol for sending data in the Internet communication are based on the Internet Protocol (“IP”). In network communication header of each IP packet consist of source and destination address of the packet. The source address contains where the packet was sent origin address. In that IP spoofing can be performed by forging the original header from sender it act like packet is sent from origin with different address, an attacker can make it appear that the packet was sent by a different machine. So that the IP Spoofing attack can be placed to further attacks comes into place of impersonating system. This can avoided by a novel solution, named Passive IP Trace back (PIT), to avoid the challenges in operation. To capture the origins of IP spoofing traffic is difficult to locate. As long as the real locations of spoofing are not identified, they cannot be determined from launching further attacks. Identifying the origins of spoofing traffic can help build a reputation system for network place, which would be helpful to push the corresponding ISPs to verify IP source address.

Index terms

  • IP spoofing
  • cloud center
  • Time To Live (TTL)
  • Passive IP Trace back (PIT)
  • Threshold value
  • network telescope
  • Internet Control Message Protocol (ICMP)
Otwarty dostęp

Detection and Removal of Dust Particles in Pipelines Using 3-D Mems

Data publikacji: 01 Sep 2017
Zakres stron: 147 - 162

Abstrakt

Abstract

Currently, the detection of dust particles is realized through manual sampling. Thus it is desirable to develop an automated online technique. Generally, industries run with the help of pipelines through which liquid can flow. The main aim of the work is to detect the dust particles which are present inside the pipeline when liquid is flowing through it. Distributed Acoustic Sensing (DAS) is a recent addition to the pipeline security world. Opta sense system is designed to prevent the damage in pipeline by providing the advance warning to the concern department and make them alert. The dust particles are detected by using MEMS, which can sense in three axis (Heat, Vibration, Movement). It is identified by the IR sensor. The approach can also be simulated by using MATLAB.

Index terms

  • Micro Electro Mechanical System (MEMS)
  • Distributed Acoustic Sensing (DAS)
  • Renewable Energy Sources (RES)
  • Opta sense interrogator unit (OIU)
Otwarty dostęp

Dynamic Face Recognition and Tracking System Using Machine Learning in Matlab and Bigdata

Data publikacji: 01 Sep 2017
Zakres stron: 163 - 173

Abstrakt

Abstract

Face Recognition being one of the methods in identifying individuals is getting enhanced at a faster rate. This paper demonstrates the process of detection of faces of the individuals through a live monitoring camera using matlab and also aids in tracking them. The large amount of images being collected at each second is stored in big databases like Hadoop-databases(hbase) or Mongodb as they are known for their higher processing speed. The facial features are extracted from all the images and are trained into the databases using machine learning algorithm. The tracking of individuals can be achieved by capturing their images while on the move and comparing them with the values stored in the databases. The detection of facial structure is done with Viola-Jones algorithm which though older is easy and efficient to use and Kanade-Lucas-Tomasi(KLT) algorithm is used for feature extraction . The HOG (Histogram of Oriented Gradients) features are extracted for training.

Index terms

  • Cascade object detector
  • Computer vision
  • Face detection
  • Face recognition
  • Big data
  • Neural networks
Otwarty dostęp

Wireless Zigbee Network Cluster - Capacity Calculation and Secure Data Conveyance Using Indegree

Data publikacji: 01 Sep 2017
Zakres stron: 174 - 185

Abstrakt

Abstract

A tree topology is used to construct to construct a Zigbee networks practices by wireless sensor network for data delivery applications. There are 3 types of nodes in zigbee networks; coordinator, router and mobile end devices. Coordinator performs the initialization and maintenance functions in the network. A router is responsible for routing data between the coordinator and mobile end device. In-order to avoid the delivery failures occurs due to node movements and network topology changes, the existing system collect and analyze data about device movement and gives Zigbee node deployment and tree construction framework, which uses three algorithms ZND(zigbee node deployment), ZCD(zigbee coordinator decision) and ZTC(zigbee tree construction). In the proposed system we improve the data delivery by introducing the capacity calculation. If any two nodes have same number of indegree or out-degree, we select the node with maximum capacity.

Index terms

  • Mobility robustness
  • tree topologies
  • ZigBee wireless networks
  • Network Clusters
Otwarty dostęp

Design of NFC Reader for Enhancement of Mobile Payments

Data publikacji: 01 Sep 2017
Zakres stron: 186 - 197

Abstrakt

Abstract

The NFC concept was mainly based on RFID tags which has the frequency range of 13.56MHz.NFC concept was initially determined to exchange data between two devices at very short distance. RFID uses electromagnetic fields to automatically identify and trace tags attached to objects which contain electronically stored information. The major problem with the RFID tags was their cost and the RFID tags had the possibility to be interfered with metals and liquids when we try to read them. There is a possibility of unauthorized reading of passports and credit cards. NFC readers are more secure and hence the NFC enabled credit cards are much safer than a credit card with magnetic strip. We specially use PIC16F877A for the purpose of matching the details in mobile phone with the information in the NFC reader that are required to make mobile payments.

Index terms

  • Radio Frequency Identification
  • Near Field Communication
  • PIC16F877A
Otwarty dostęp

Hybrid Power Harvester Using Engine Source

Data publikacji: 01 Sep 2017
Zakres stron: 198 - 211

Abstrakt

Abstract

In mainly we present a compact, multisource and battery-free energy harvesting from engine source. This battery free generator captures energy from its environment transient thermal gradients as a main source, and vibration as a secondary source allowing early biasing of the generator and stores this energy in ultracapacitors .In this way, this multi-source architecture benefits from the synergy between energy scavenging and harvesting.

Index terms

  • Multi-source
  • Ultra-capacitors
  • Thermal energy
  • Vibrations
Otwarty dostęp

A Lifi Based Data Transmission for Anti Collision System

Data publikacji: 01 Sep 2017
Zakres stron: 212 - 224

Abstrakt

Abstract

A new way of data transmission between two vehicles using light fidelity technology is proposed in this paper. A best way of avoiding accidents can be achieved by the communication between the vehicles. This system can be simplified by using LED bulbs for data transmission. The previously used data transmission technology can be overcome by the newly proposed LIFI technology. The major objective of this system is to achieve reliable communication between the vehicle using a transmitter and a receiver. The communication methods and the operations are presented in detail.

Index terms

  • Light fidelity
  • Light emitting diode
  • wireless communication
  • visible light communication
Otwarty dostęp

Design of Low Complexity Accumulator Using Finfet for Various Technologies

Data publikacji: 01 Sep 2017
Zakres stron: 225 - 235

Abstrakt

Abstract

FINFET terminological in exactitude process reuses a massive part of well accustomed conventional CMOS process. FINFET is a likely-look alternative to conventional MOSFET which has reached its limit and has too much leakage for too little performance gain. FINFET is being suggested as basics for future IC processes because its power or performance benefits, scalability, superior controls over short channel effort etc., In this paper we propose a outlook for scheming accumulator using FINFET for purpose of minimize number of transistor differentiate to CMOS logic. In circuit level, widely used D flip-flop and at constructional level the full adder cells of FINFET (dual gate transistor) 10T can be used. FINFET is the most propitious double gate transistor, forecast as one of the candidate to restore the epic MOSFET. FINFET technology power consumption is compare with CMOS technology to analyze how the area, delay and power can be reduced.

Index terms

  • FINFET (FIN field effect transistor)
  • CMOS (Complementary Metal oxide semiconductor)
  • accumulator
  • low power consumption
  • reduce delay
Otwarty dostęp

Hardware Implementation of Uwb Radar for Detection of Trapped Victims in Complex Environment

Data publikacji: 01 Sep 2017
Zakres stron: 236 - 258

Abstrakt

Abstract

Ultra-wideband (UWB) radar plays an important role in search and rescue at disaster relief sites. Identifying vital signs and locating buried survivors are two important research contents in this field. In general, it is hard to identify a human’s vital signs (breathing, body temperature, brain waves and heartbeat) in complex environments due to the low signal-to-noise ratio of the vital sign in radar signals. In this paper, advanced signal-processing approaches are used to identify and to extract human vital signs in complex environments. First, we apply Curvelet transform to remove the source–receiver direct coupling wave and background clutters. Next, singular value decomposition is used to de-noise in the life signals. Finally, the results are presented based on FFT and Hilbert-Huang transform to separate and to extract human vital sign frequencies, as well as the micro-Doppler shift characteristics. The proposed processing approach is first tested by a set of synthetic data generated by FDTD simulation for UWB radar detection of two trapped victims under debris at an earthquake site of collapsed buildings.

Index terms

  • Ultra-wideband (UWB)Receiver Signal Strength Indicator(RSSI)
  • Control and Status Register
Otwarty dostęp

Gsm Based Soldier Tracking System and Monitoring Using Wireless Communication

Data publikacji: 01 Sep 2017
Zakres stron: 259 - 270

Abstrakt

Abstract

To design a soldier tracking system using wireless system for monitoring the parameters of soldier are as Body temperature & Temperature. Biomedical sensors: Here to find the health status of soldier we are using a body temp sensor to measure body temperature as well as pulse rate sensor. These parameters are then signal conditioned and will be stored in the memory. One of the fundamental challenges in military operations lays in that the Soldier not able to communicate with control room administrator. In addition, each organization needs to enforce certain administrative and operational work when they interact over the network owned and operated by other organizations. Thus, without careful planning and coordination, one troop cannot communicate with the troops or leverage the communication infrastructure operated by the country troops in the same region. The purpose of this investigation was to test the components of the Soldier Tracking and Performance Measurement System against the statement of requirements as found in the Request for Proposal. Secondary aims of this investigation included gathering data that will allow potential users of the system to understand its capabilities and limitations, as well as allow efficient planning of both time and resources necessary to ensure efficient and productive use of the system for training the solider.

Index terms

  • temperature sensor
  • pulse rate sensor
  • Soldier Tracking
  • Performance Measurement System
Otwarty dostęp

Multi_level Secure From Web Intrusion and Query Attacks on Web Database

Data publikacji: 01 Sep 2017
Zakres stron: 271 - 283

Abstrakt

Abstract

Most data frameworks and business applications assembled these days have a web frontend and they should be generally accessible to customers, representatives and accomplices around the globe, as the computerized economy is turning out to be increasingly pervasive in the worldwide economy. Strategy and a model instrument to assess web application security components. In this paper, we along these lines propose to make trusted equipment a top notch national in the safe information administration field. Additionally, we trust that cost-driven bits of knowledge and compositional standards will generally change the way frameworks and calculations are planned. We present an outsourced database model that permits customers to execute SQL questions with security and under administrative consistence imperatives by utilizing server-facilitated, sealed trusted equipment in basic inquiry preparing stages, along these lines expelling any confinements on the kind of bolstered inquiries.

Index terms

  • Automatic protection
  • data mining
  • false positives
  • input validation vulnerabilities
  • software security
  • source code static analysis
  • web applications
Otwarty dostęp

Design of Low Power Carry Skip Adder Using Dtcmos

Data publikacji: 01 Sep 2017
Zakres stron: 284 - 294

Abstrakt

Abstract

In the domain of VLSI design, the adders are always meant to be the most fundamental requirements for processors of high performance and other multicore devices. It is found that power dissipation is a major problem in the electronic devices. Power management integrated circuit (PMIC) is emphasized as battery-powered portable electronics such as smart phone are commonly used. In this paper we are designing a carry skip adder which consumes less power than the other conventional adders using dynamic threshold complementary metal oxide semiconductor (DTCMOS).Tthe circuit is designed using tanner EDA simulator of 32nm technology. Also the circuit is compared with the CMOS technology methods.

Index terms

  • Carry skip adder
  • low power consumption
  • high performance
  • speed
  • delay parameters
Otwarty dostęp

Design of Sram Architecture with Low Power without Affecting Speed Using Finfet

Data publikacji: 01 Sep 2017
Zakres stron: 295 - 310

Abstrakt

Abstract

In average 8T SRAM Architecture, it requires maximum number of transistor counts and does not need any write back scheme. To achieve the higher word line (WL) Voltage, the bit line (BL) is connected to the gate of the read buffer SRAM Architecture. That boosted voltage is not used when the threshold voltage is high. Its leads to the reduction of read stability of the SRAM Design. In that case, the gate terminal of the SRAM Architecture is not connected to the buffer results a large delay. To overcome the disadvantage of the average 8T SRAM architecture, the 6T SRAM Design is proposed. In proposed 6T SRAM Design, the number of transistor counts and Power is reduced than the existing design. Various factors of the proposed SRAM Architecture, which stores multiple bits in terms of power and transistor counts. The simulation of 6T SRAM design is carried out in S-Edit and the synthesized in T-Spice.

Index terms

  • Static random access memory (SRAM)
  • Low voltage operation
  • Low power consumption
Otwarty dostęp

Learning to Rank and Classification of Bug Reports Using SVM and Feature Evaluation

Data publikacji: 01 Sep 2017
Zakres stron: 311 - 329

Abstrakt

Abstract

When a new bug report is received, developers usually need to reproduce the bug and perform code reviews to find the cause, a process that can be tedious and time consuming. A tool for ranking all the source files with respect to how likely they are to contain the cause of the bug would enable developers to narrow down their search and improve productivity. This project introduces an adaptive ranking approach that leverages project knowledge through functional decomposition of source code, API descriptions of library components, the bugfixing history, the code change history, and the file dependency graph. Given a bug report, the ranking score of each source file is computed as a weighted combination of an array of features, where the weights are trained automatically on previously solved bug reports using a learning-to-rank technique. I applied SVM (Support Virtual Machine) to classify the bug reports to identify, which category the bug belongs to. It helps to fix the critical defects early. The ranking system evaluated on six large scale open source Java projects, using the beforefix version of the project for every bug report. The experimental results show that the learning-to-rank approach outperforms three recent state-of-the-art methods. In particular, proposed method makes correct recommendations within the top 10 ranked source files for over 70 percent of the bug reports in the Eclipse Platform and Tomcat projects.

Index terms

  • Learning to rank
  • SVM
  • Preprocessing
  • CF(collaborative Filtering)
Otwarty dostęp

Performance and Analysis of Automatic License Plate Localization and Recognition from Video Sequences

Data publikacji: 01 Sep 2017
Zakres stron: 330 - 343

Abstrakt

Abstract

The works presents license plate recognition system using connected component analysis and template matching model for accurate identification. Automatic license plate recognition (ALPR) is the extraction of vehicle license plate information from an image. The system model uses already captured images for this recognition process. First the recognition system starts with character identification based on number plate extraction, Splitting characters and template matching. ALPR as a real life application has to quickly and successfully process license plates under different environmental conditions, such as indoors, outdoors, day or night time. It plays an important role in numerous real-life applications, such as automatic toll collection, traffic law enforcement, parking lot access control, and road traffic monitoring. The system uses different templates for identifying the characters from input image. After character recognition, an identified group of characters will be compared with database number plates for authentication. The proposed model has low complexity and less time consuming interms of number plate segmentation and character recognition. This can improve the system performance and make the system more efficient by taking relevant sample.

Index terms

  • Plate Recognition (LPR)
  • Automatic license plate recognition (ALPR)
  • Optical Character Recognition(OCR)
Otwarty dostęp

Design of Low Leakage Current Average Power CMOS Current Comparator Using SVL Technique With Pseudo NMOS and Transmission Gate Logics

Data publikacji: 01 Sep 2017
Zakres stron: 344 - 357

Abstrakt

Abstract

Comparatorare most widely used second electronic components after operational amplifier. For ADC circuit we have to use the high speed and low power consumption based comparator. SVL circuit is used tom reduce the offset voltage which requires high voltage gain. A SVL circuit can supply maximum DC voltage to an active load circuit on request or can decrease the DC voltage supplied to a load circuit in the standby mode was developed. SVL circuit is used with comparator which reduce the power consumption from 258.6μw to 156.7μw. Pseudo nmos logic and transmission gate logic is used with the SVL based current comparator which further reduce the power consumption in the standby mode. This technique based comparator is fabricated on the tanner tool of 45nm technology.SVL technique is mostly recommended for CMOS logic.

Index terms

  • current comparator
  • SVL circuit
  • pseudo nmos
  • transmission gate
  • low power consumption
  • standby mode
Otwarty dostęp

Performance Evaluation of Efficient and Reliable Routing Protocol Algorithm

Data publikacji: 01 Sep 2017
Zakres stron: 358 - 373

Abstrakt

Abstract

Fixed-power wireless sensor networks are prevalent and cost-effective. However, they face mote failures, RF interference from environmental noise and energy constraints. Routing protocols for such networks must overcome these problems to achieve reliability, energy efficiency and scalability in message delivery. Achievement of these requirements, however, poses conflicting demands. In this work, we propose an efficient and reliable routing protocol (EAR) that achieves reliable and scalable performance with minimal compromise of energy efficiency. The routing design of EAR is based on four parameters expected path length and a weighted combination of distance traversed, energy levels and link transmission success history, to dynamically determine and maintain the best routes. Simulation experiments of EAR with four existing protocols demonstrate that a design based on a combination of routing parameters exhibits collectively better performance than protocols based on just hop-count and energy or those using flooding.

Index terms

  • Efficient And Reliable routing protocol (EAR)
  • Route Request (RREQ)
  • Route Reply (RREP) packet
  • Network Animator(NAM)
Otwarty dostęp

Specific Absorption Rate Assessment on Human Head Due to Radiations by Mobile Phone Antenna

Data publikacji: 01 Sep 2017
Zakres stron: 374 - 394

Abstrakt

Abstract

Development of mobile phone communication infrastructure in the world has promoted which lead public concern over possible health effect exposure to radio frequency electromagnetic energy (RFEME) emanating from mobile phone antenna. The Micro-strip patch antenna plays an important role in electromagnetic energy transmitting and receiving phenomena in mobile phone. This paper makes an effort to assess the mobile radiation exposure effect on 4 years child, 8years child and an adult head model. Hand held device model having micro-strip antenna is used for human interaction. The software simulation performed by Computer simulation technique (CST) software based on Finite difference Time Domain Technique yields specific absorption rate and 3D-thermal distribution on spherical human head.

Index terms

  • Radio Frequency ElectroMagnetic Energy (RFEME)
  • Computer Simulation Technique (CST)
  • Specific Absorption Rate (SAR)
  • Magnetic Resonance Imaging (MRI)
Otwarty dostęp

Cluster Head Election Mechanism-Based on Fuzzy Logic (Chef) with TDMA in WSN

Data publikacji: 01 Sep 2017
Zakres stron: 395 - 413

Abstrakt

Abstract

Wireless sensor networks (WSN) are being used for huge range of applications where the traditional infrastructure based network is mostly infeasible. The most challenging aspect of WSN is that they are energy resource-constrained and that energy cannot be replenish. the wireless sensor network of power limited sensing devices called sensor deployed in a region to sense various types physical information from the environment, when these sensors sense and transmit data to other sensors present in the network, even the cluster head is elected according to check their residual energy considerable amount of energy will drain automatically to overcome this drawback by considering the protocol a fuzzy logic approach is used to elect the cluster head based on three descriptors-energy, centrality & distance and second CH is elected according to TDMA to overcome the data lost during energy drain occur in the CH .NS-2 simulation shows that proposed protocol provides higher energy efficiency. This paper proposes the mechanism or device is capable of utilizing its own system of control simply called as self-configurable clustering mechanism to detect the disordered CHs and replace them with other nodes. And results have been derived from simulator ns-2 to show the better performance.

Index terms

  • WSN
  • CH
  • fuzzy logic;
  • DMA
  • NS-2 simulator
  • base station
Otwarty dostęp

An Intelligence Super Mart Billling System

Data publikacji: 01 Sep 2017
Zakres stron: 414 - 425

Abstrakt

Abstract

Currently embedded systems be mainly based on microcontroller’s i.e. CPUs in the company of included reminiscence the same as well as tangential interface except ordinary microprocessors by means of external chips for memory and peripheral interface circuits are common, especially in technology may not only be useful for streamlining category and supply chains. Nowadays it is rare to see people getting keen in online shopping through e-commerce websites but still the shopping centers are popular. We come across many types of carts used for shopping in malls and shopping center. The major purpose of this effort is reducing delays in foremost supermarkets or shopping center via income of an electronic smart cart method which will introduce an cognitive approach to billing system during RFID technology. Zigbee is base scheduled an IEEE 802.15 ordinary. Zigbee devices a group of pass on data more than longer space by transient data through transitional devices to make more distances ones, create a interconnect network. Purchasing product during a RFID reader going on shopping cart, suggest while product information resolve be stored into EEPROM close to it and EEPROM data spirit send in the direction of central billing system throughout Zigbee module. The anticipated method will survive helpful for avoiding queues in shopping malls for billing. Hence the shopping becomes easy and enjoyable.

Index terms

  • Product Identification Device EEPROM
  • RFID Reader
  • RFID Tag
  • Smart Shopping
Otwarty dostęp

Secure Route Discovery for Dynamic Source Routing in Manets

Data publikacji: 01 Sep 2017
Zakres stron: 426 - 445

Abstrakt

Abstract

Mobile ad hoc networks (MANETs) are collections of wireless mobile devices with restricted broadcast range and resources and no fixed infrastructure. Communication is achieved by communicating data along suitable routes that are dynamically discovered and maintained through association between the nodes. Discovery of such routes is a major task both from good organization and security points of view. Recently a security model tailored to the specific requirements of MANETs. A novel route discovery algorithm called endairA is also proposed together with a claimed security proof within the same model. In this paper we show the security proof for the route discovery algorithm endairA is malfunctioning and moreover this algorithm is vulnerable to a hidden channel attack. We also analyze the security framework that is used for route discovery and argue the compos ability is an essential feature for ubiquitous applications. We conclude by discussing some of the major security challenges for route discovery in MANETs.

Index terms

  • Fast Mobile ad hoc networks (MANETs)
  • Message Authentication Codes(MACs)
  • Source Routing Protocol(SRP)
Otwarty dostęp

A Wearable Multiparameter Medical Monitoring and Alert System with First Aid

Data publikacji: 01 Sep 2017
Zakres stron: 446 - 458

Abstrakt

Abstract

The main aim of the paper is biomedical monitoring of human being. Biomedical values are heart rate ,blood pressure ,body temperature and here we use a GPRS module and biomedical monitoring sensor and data from these sensor are updated to the web server and in addition to that we use an automated external defibrillator(AED) which automatically diagnosis the cardiac arrhythmia of ventricular fibrillation, and pulse less ventricular tachycardia and is able to deal them with an defibrillation, the requisition of electrical therapy which stops arrhythmia , allowing the heart to reestablish the normal rhythm when compare to regular defibrillator it require minimal training to use. Biomedical monitoring promises to give an overview of cardiovascular system non -invasively and this will be easy to use and operate without hospitalization.

Index terms

  • heart rate
  • monitoring sensor
  • GPRS
  • Automated External Defibrillator
Otwarty dostęp

Patrol Inspection and Time Study to Improve Quality

Data publikacji: 01 Sep 2017
Zakres stron: 459 - 470

Abstrakt

Abstract

This project is concerned to analyze and increase the efficiency of patrol inspection and thus reduces time consumption for inspection. Inspection is the process of checking whether the specification of the product meet the standard specification provided by the customer. Inspector takes more time for checking the parameter that meet the specification at all time than Checking the parameters that does not satisfy the customer specification which leads to rejection .Thus the inspector should inspect the parameter that increase the rejection or rework with more attention .on the whole this concept helps the inspector to improve the quality of the product by inspecting more components according to the frequency of the component.

Index terms

  • Patrol Inspection
  • standard specification
Otwarty dostęp

Unmanned Fire Extinguisher Using Quadcopter

Data publikacji: 01 Sep 2017
Zakres stron: 471 - 481

Abstrakt

Abstract

Quadcopters are unmanned Ariel Vehicle (UAV), generally small helicopter that is lifted and propelled by four rotors. Initially they were used as toys, later they gained importance and recent research on multi-copters have received growing attention for military, agriculture, photography, surveillance, news, sports, search/rescue missions and much more. The widespread use of unmanned vehicles and its growing applications in various domains can be attributed to their ability to operate in inaccessible areas, thus decreasing the human loss in major accidents, and making access easy to dangerous conditions. We have proposed an idea about how quadcopter can be used for the application of fire detecting and extinguishing. The target of this paper is to explain briefly to prepare a quadcopter so that it could be used for firefighting and can help our society.

Index terms

  • Unmanned Ariel Vehicle (UAV)
  • Vertical Take-off and Landing (VTOL)
  • remotely piloted vehicles (RPV)
  • clockwise (CW)
  • counter-clockwise (CCW)
Otwarty dostęp

Cloud Security and Compliance - A Semantic Approach in End to End Security

Data publikacji: 01 Sep 2017
Zakres stron: 482 - 494

Abstrakt

Abstract

The Cloud services are becoming an essential part of many organizations. Cloud providers have to adhere to security and privacy policies to ensure their users’ data remains confidential and secure. Though there are some ongoing efforts on developing cloud security standards, most cloud providers are implementing a mishmash of security and privacy controls. This has led to confusion among cloud consumers as to what security measures they should expect from the cloud services, and whether these measures would comply with their security and compliance requirements. We have conducted a comprehensive study to review the potential threats faced by cloud consumers and have determined the compliance models and security controls that should be in place to manage the risk. Based on this study, we have developed an ontology describing the cloud security controls, threats and compliances. We have also developed an application that classifies the security threats faced by cloud users and automatically determines the high level security and compliance policy controls that have to be activated for each threat. The application also displays existing cloud providers that support these security policies. Cloud consumers can use our system to formulate their security policies and find compliant providers even if they are not familiar with the underlying technology.

Index terms

  • Cloud computing
  • cloud security
  • Security compliance models
  • Cloud security models
Otwarty dostęp

Temporal Query Processig Using Sql Server

Data publikacji: 01 Sep 2017
Zakres stron: 495 - 505

Abstrakt

Abstract

Most data sources in real-life are not static but change their information in time. This evolution of data in time can give valuable insights to business analysts. Temporal data refers to data, where changes over time or temporal aspects play a central role. Temporal data denotes the evaluation of object characteristics over time. One of the main unresolved problems that arise during the data mining process is treating data that contains temporal information. Temporal queries on time evolving data are at the heart of a broad range of business and network intelligence applications ranging from consumer behaviour analysis, trend analysis, temporal pattern mining, and sentiment analysis on social media, cyber security, and network monitoring. Social networks (SN) such as Facebook, twitter, LinkedIn contains huge amount of temporal information. Social media forms a dynamic and evolving environment. Similar to real-world friendships, social media interactions evolve over time. People join or leave groups; groups expand, shrink, dissolve, or split over time. Studying the temporal behaviour of communities is necessary for a deep understanding of communities in social media(SM). In this paper we focus on the use of temporal data and temporal data mining in social networks.

Index terms

  • temporal data
  • social networks
  • temporal database
  • data mining
  • Temporal query processing
  • time stamp using SQL Server
Otwarty dostęp

Computation of Field Programmable Cyclic Redundancy Checks Circuit Architecture

Data publikacji: 01 Sep 2017
Zakres stron: 506 - 521

Abstrakt

Abstract

In this work we are going to simulate a field programmable cyclic redundancy check circuit architecture. The transmitted data or stored data must be free from error. The increased use of error correction techniques by digital communications designers has created a demand for tools to evaluate and exercise error correction coding approaches before they are committed to expensive ASICs or firmware. Cyclic redundancy check is an error detection method but it can be used only for a specific application. A field programmable circuit is one which enables a wide range of polynomial width and input port width to be used with in the same circuit. The parameters are reprogrammable and it is fully flexible. The circuit also consists of an embedded configuration controller that reduces the programming time and complexity. The hardware cost is reduced and the line speed is increased. The primary tool used is modelsim 6.1a.

Index terms

  • Cyclic Redundancy Check (CRC)
  • Application Specific Integrated Circuit
  • ASIC
Otwarty dostęp

Performance and Analysis of Low Power, Areaefficient and High Speed Carryfast Adder

Data publikacji: 01 Sep 2017
Zakres stron: 522 - 538

Abstrakt

Abstract

Carry Select Adder (CSLA) is one of the fastest adders used in many data-processing processors to perform fast arithmetic functions. From the structure of the CSLA, it is clear that there is scope for reducing the area and power consumption in the CSLA. This work uses a simple and efficient gate-level modification to significantly reduce the area and power of the CSLA. Based on this modification 8, 16,32,and 64-bit square-root CSLA (SQRT CSLA) architecture have been developed and compared with the regular SQRT CSLA architecture. The proposed design has reduced area and power as compared with the regular SQRT CSLA with only a slight increase in the delay. This work evaluates the performance of the proposed designs in terms of delay, area, power. Binary to Excess-1 Converter (BEC) instead of RCA with the regular CSLA to achieve lower area and power consumption. The main advantage of this BEC logic comes from the lesser number of logic gates than the n-bit Full Adder structure. The delay and area evaluation methodology of the basic adder blocks. The SQRT CSLA has been chosen for comparison with the proposed design as it has a more balanced delay, and requires lower power and area. Reducing the area and power consumption in the CSLA. Efficient gate-level modification to significantly reduce the area and powerof the CSLA.

Index terms

  • Carry Select Adder (CSLA)
  • Binary to Excess-1 Converter (BEC)
  • Carry-propagation adder (CPA)
Otwarty dostęp

A Multi-Keyword Ranked Search Scheme Over Encrypted Based on Hierarchical Clustering Index

Data publikacji: 01 Sep 2017
Zakres stron: 539 - 559

Abstrakt

Abstract

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data Due to the increasing popularity of cloud computing, more and more data owners are motivated to outsource their data to cloud servers for great convenience and reduced cost in data management. In this project, present a secure multi-keyword ranked search scheme over encrypted cloud data, which simultaneously supports dynamic update operations like deletion and insertion of documents. Specifically, the vector space model and the widely-used TFIDF model are combined in the index construction and query generation. The proposed hierarchical approach clusters the documents based on the minimum relevance threshold, and then partitions the resulting clusters into sub-clusters until the constraint on the maximum size of cluster is reached. In the search phase, this approach can reach a linear computational complexity against an exponential size increase of document collection. In order to verify the authenticity of search results, a structure called minimum hash sub-tree is designed in this paper. Due to the use of our special tree-based index structure, the proposed scheme can achieve sub-linear search time and deal with the deletion and insertion of documents flexibly. Extensive experiments are conducted to demonstrate the efficiency of the proposed scheme.

Index terms

  • Searchable encryption
  • multi-keyword ranked search
  • dynamic update
  • cloud computing
Otwarty dostęp

Data Mining with Big Data Revolution Hybrid

Data publikacji: 01 Sep 2017
Zakres stron: 560 - 573

Abstrakt

Abstract

Big Data concern large-volume, complex, growing data sets with multiple, autonomous sources. With the fast development of networking, data storage, and the data collection capacity, Big Data are now rapidly expanding in all science and engineering domains, including physical, biological and biomedical sciences. This paper presents a HACE theorem that characterizes the features of the Big Data revolution, and proposes a Big Data processing model, from the data mining perspective. This data-driven model involves demand-driven aggregation of information sources, mining and analysis, user interest modeling, and security and privacy considerations. We analyze the challenging issues in the data-driven model and also in the Big Data revolution.

Index terms

  • HACE
  • demand-driven
  • data storage
Otwarty dostęp

Machine Vision Based Missing Fastener Detection in Rail Track Images Using SVM Classifier

Data publikacji: 01 Sep 2017
Zakres stron: 574 - 589

Abstrakt

Abstract

Missing fastener detection is a critical task due to its similar characteristics with surrounding environments. In this paper, a machine vision based fully automatic detection and classification of missing fastener detection system is proposed using Support Vector Machine (SVM) classifier. This proposed system consists of preprocessing, transformation, feature extraction and classifications. Image resizing is performed as preprocessing step and Gabor transform is used as transformation technique. Grey Level Cooccurence Matrix (GLCM) features, Local Binary Pattern (LBP) features and Discrete Wavelet Transform (DWT) are used as features in this paper. SVM classifier is used as classifier in order to classify the test rail track image into either track image with fastener or track image without fastener.

Index terms

  • Fastener
  • classifier
  • features
  • track image
  • transformation
Otwarty dostęp

Authentication Scheme for Session Passwords Using Color and Image

Data publikacji: 01 Sep 2017
Zakres stron: 590 - 603

Abstrakt

Abstract

Graphical passwords are believed to be more secure than traditional textual passwords, but the authentications are usually complex and boring for users. Furthermore, most of the existing graphical password schemes are vulnerable to spyware and shoulder surfing. A novel graphical password scheme ColorLogin is proposed in this paper. ColorLogin is implemented in an interesting game way to weaken the boring feelings of the authentication. ColorLogin uses background color, a method not previously considered, to decrease login time greatly. Multiple colors are used to confuse the peepers, while not burdening the legitimate users. Meanwhile, the scheme is resistant to shoulder surfing and intersection attack to a certain extent. Experiments illustrate the effectiveness of ColorLogin.

Index terms

  • Graphical Passwords
  • Shoulder-Surfing
  • Intersection Attack
Otwarty dostęp

A New Approach for Cloud Data Security: From Single to Cloud-of-Clouds

Data publikacji: 01 Sep 2017
Zakres stron: 604 - 613

Abstrakt

Abstract

In the corporate world, a large number of people store their data on clouds. For doing this they need to give their confidential data in the hands of the third party, commonly known as service providers. These cloud service providers cannot be trusted since the complete data is stored in one single cloud. This increases security risks to the user’s sensitive data. Due to this issue of data integrity risk and service availability failure, the concept of “Cloud-of-Clouds” comes into picture. Cloud-of-clouds are also known as “inter-clouds” or “multi-clouds”. Use of cloud-of-clouds provides a higher level of security to the user’s confidential data. The aim of this paper is to secure the user’s data by using cloud-of clouds.

Index terms

  • Software Cloud Computing
  • Cloud-Of-Clouds
  • Inter-Clouds
  • Multi-Clouds
  • Security
  • Confidential Data
  • Data Integrity
Otwarty dostęp

Recent Research in Network Security

Data publikacji: 01 Sep 2017
Zakres stron: 1 - 2

Abstrakt

Abstract

Network security and Data analytics is an important to present society where information technology and services pass through each facet of our lives. However, it is demanding to achieve, as technology is changing at rapid speed and our systems turn into ever more complex. We are gradually more dependent upon such information and communications infrastructures, and the threats we face are organized and exploit our dependency by the attackers or cyber criminals. Moreover, cyber space is considered as fifth battlefield after land, air, water and space. The focal objective of the Special Issue on “Recent research in network security” is to provide insight mechanisms while handling data; provide conceptual understanding of network security issues, challenges and mechanisms; develop basic skills of secure network architecture and explain the theory behind the security of networks, analytics and different cryptographic algorithms. It is to present the most recent challenges and developments in data analytics and networks. It also provides a forum for researchers, practitioners and educators to present and discuss the most recent innovations, trends, and concerns, practical challenges encountered and the solutions adopted in these fields.

Zaplanuj zdalną konferencję ze Sciendo