Dynamic spectrum sensing is a challenging and necessary task in Cognitive Radio Networks (CRN). It can detect presence of primary user (PU) who is having legacy right on licensed spectrum. Secondary User (SU) continuously or periodically senses the PU’s spectrum and when it finds the spectrum idle it starts transmitting its own data. When the SU detects presence of the PU in the spectrum it stops transmission or switches to another idle frequency spectrum. The SU must maintain its transmission parameters like power level, frequency band used for data transmission etc., in such a way that it must not cause any interference in PU’s transmission. The spectrum utilization efficiency and throughput performance of SUs depend on robustness and accuracy of spectrum sensing algorithms. Hence, in this paper a survey of spectrum sensing algorithms for Cognitive Radio (CR) is presented with their merits and limitations. To improve spectrum sensing performance and accuracy, some cooperative sensing techniques have been developed where many SUs share their detected information. The cooperative sensing techniques also reduce shadowing and fading effects on spectrum sensing.
- Page(s): 01-09
- Date of Publication: January 2015
- O. P. MeenaDepartment of Electronics and Communication Engineering, Maulana Azad National Institute of Technology, Bhopal-462051, India
- Ajay SomkuwarDepartment of Electronics and Communication Engineering, Maulana Azad National Institute of Technology, Bhopal-462051, India
References
[1] Ian F. Akyildiz, Won-Yeol Lee, Mehmet C. Vuran ―NeXt generation/ dynamic spectrum access/ cognitive radio wireless networks: A survey‖, Computer Networks 50, 2006, pp.2127-2159. [2] J. Mitola, ―Cognitive radio: an integrated agent architecture for software defined radio,‖ Doctor of Technology, Royal Inst. Technol. (KTH), Stockholm, Sweden, 2000. [3] Kolodzy, P. Avoidance, Spectrum policy task force, Federal Communication Commission, Washington, DC, 2002, report ET Docket No. 02-135. [4] Federal Communications Commission, ―Second Report and Order, FCC 08-260,‖ Nov. 2008. [5] Tevfik Yucek, Huseyin Arslan ―A survey of spectrum sensing algorithms for cognitive radio Applications‖, IEEE communications survey & tutorials, vol. 11, no. 1, 2009, pp. 116-129. [6] Erik Axell, Greet Leus, Erik G. Larsson, H. Vincent Poor, ―Spectrum Sensing for Cognitive Radio‖, IEEE signal Processing Magazine, 2012, pp. 101-116. [7] Qun Yu, ―A survey of Cooperative Games for Cognitive Radio Networks‖, Springer, 2013. [8] Lei Yang, Zhe Chen, Fuliang Yin ―Cyclo-energy detector for spectrum sensing in cognitive radio‖, International Journal of Electronics and Communications (AEÜ), 66 (2012), pp. 89-92. [9] Husheng Li and Zhu Han, ―Catch Me if You Can: An Abnormality Detection Approach for Collaborative Spectrum Sensing in Cognitive Radio Networks ‖, IEEE Transaction on wireless communications, Vol. 9, No.11, 2010, pp.3554-3565. [10] Yunfei Chen, ―Analytical Performance of Collaborative Spectrum Sensing Using Censored Energy Detection‖, IEEE Transaction on wireless communications, Vol. 9, No.12, 2010, pp.3856-3865. [11] Edward C. Y. Peh, Ying-Chang Liang,Yong Liang Guan, Yonghong Zeng, ―Cooperative Spectrum Sensing in Cognitive Radio Networks with Weighted Decision Fusion Schemes‖, IEEE Transaction on wireless communications, Vol. 9, No.12, 2010, pp.3838-3847. [12] Saman Atapattu, Chintha Tellambura, Hai Jiang, ―Energy Detection Based Cooperative Spectrum Sensing in Cognitive Radio Networks‖, IEEE Transaction on wireless communications, Vol. 10, No.4, 2011, pp.1232-1241. [13] Wei Yuan, Henry Leung, Wenqing Cheng, Siyue Cheng, Bokan Chen, ―Participation in Repeated Cooperative Spectrum Sensing: A Game-Theoretic Perspective‖, IEEE Transaction on wireless communications, Vol. 11, No.3, 2012, pp.1000-1011. [14] Adam Noel, Robert Schober, ―Convex Sensing-Reporting Optimization for Cooperative Spectrum Sensing‖, IEEE Transaction on wireless communications, Vol. 11, No.5, 2012, pp.1900-1910. [15] Ghurumuruhan Ganesan, Ye (Geoffery) Li ―Cooperative Spectrum Sensing in Cognitive Radio, Part I: Two user networks‖ IEEE Transaction on wireless communications, Vol. 6, No. 6, 2007, pp. 2204-2212. [16] Ghurumuruhan Ganesan, Ye (Geoffery) Li ―Cooperative Spectrum Sensing in Cognitive Radio, Part II: Multiuser networks‖ IEEE Transaction on wireless communications, Vol. 6, No. 6, 2007, pp.2214-2222. [17] Wei Zhang, Khaled Ben Letaief, ―Cooperative Spectrum Sensing with Transmit and Relay Diversity in Cognitive Radio Networks‖, IEEE Transaction on wireless communications, Vol. 7, No. 12, 2008, pp.4761-4766. [18] Jun Ma, Guodong Zhao, Ye (Geoffrey) Li, ―Soft Combination and Detection for Cooperative Spectrum Sensing in Cognitive Radio Networks‖ IEEE Transaction on wireless communications, Vol. 7, No. 11, 2008, pp.4502-4507. [19] F. Gómez-Cuba, R. Asorey-Cacheda, F. J. González-Castaño, H. Huang, ―Application of Cooperative Diversity to Cognitive Radio Leasing: Model and Analytical Characterization of Resource Gains ‖, IEEE Transaction on wireless communications, Vol. 12, No.1, 2013, pp.40-49. [20] Rongfei Fan and Hai Jiang, ―Optimal Multi-Channel Cooperative Sensing in Cognitive Radio Networks‖, IEEE Transaction on wireless communications, Vol. 9, No.3, 2010, pp.1128-1138. [21] Husheng Li, Huaiyu Dai, Chengzhi Li ―Collaborative Quickest Spectrum Sensing via Random Broadcast in Cognitive Radio Systems‖, IEEE Transaction on wireless communications, Vol. 9, No.7, 2010, pp.2338-2348. [22] Praveen Kaligineedi, Majid Khabbazian, Vijay K. Bhargava, ―Malicious User Detection in a Cognitive Radio Cooperative Sensing System‖, IEEE Transaction on wireless communications, Vol. 9, No.8, 2010, pp.2488-2497. [23] Wei Zhang, Ranjan K. Mallik, Khaled Ben Letaief, ‖ Optimization of Cooperative Spectrum Sensing with Energy Detection in Cognitive Radio Networks‖, IEEE Transaction on wireless communications, Vol. 8, No.12, 2009, pp.5761-5766. [24] S. H. Song, K. Hamdi, K. B. Letaief, ―Spectrum Sensing with Active Cognitive Systems‖, IEEE Transaction on wireless communications, Vol. 9, No.6, 2010, pp.1849-1854. [25] Stergios Stotas, Arumugam Nallanathan, ―On the Throughput and Spectrum Sensing Enhancement of Opportunistic Spectrum Access Cognitive Radio Networks‖, IEEE Transaction on wireless communications, Vol. 11, No.6, 2012, pp.2148-2159. [26] Weijia Han, Jiandong Li, Zhi Tian, and Yan Zhang ―Efficient Cooperative Spectrum Sensing with Minimum Overhead in Cognitive Radio‖, IEEE Transaction on wireless communications, Vol. 9, No.10, 2010, pp.3006-3011. [27] Ying-Chang Liang, Yonghong Zeng, Edward C.Y. Peh, Anh Tuan Hoang, ―Sensing-Throughput Tradeoff for Cognitive Radio Networks‖, IEEE Transaction on wireless communications, Vol. 7, No.4, 2008, pp.1326-1337. [28] Wenshan Yin, Pinyi Ren, Member IEEE, Qinghe Du, Member IEEE, and Yichen Wang, ―Delay and Throughput Oriented Continuous Spectrum Sensing Schemes in Cognitive Radio Networks ‖, IEEE Transaction on wireless communications, Vol. 11, No.6, 2012, pp.2148-2159. [29] Qihui Wu, Guoru Ding, Jinlong Wang,Yu-Dong Yao, ―Spatial-Temporal Opportunity Detection for Spectrum-Heterogeneous Cognitive Radio Networks: Two-Dimensional Sensing‖ IEEE Transaction on wireless communications, Vol. 12, No.2, 2013, pp.516-526. [30] Jun Wang, Jianshu Chen, Danijela Cabric, ―Cramer-Rao Bounds for Joint RSS/DoA-Based Primary-User Localization in Cognitive Radio Networks‖, IEEE Transaction on wireless communications, Vol. 12, No.3,2013, pp.1363-1375. [31] S. Senthuran, A. Anpalagan, O. Das, ―Throughput Analysis of Opportunistic Access Strategies in Hybrid Underlay–Overlay Cognitive Radio Networks‖, IEEE Transaction on wireless communications, Vol. 11, No.6, 2012,pp.2024-2035. [32] Mario Bkassiny, Sudharman K. Jayaweera, Yang Li, Keith A. Avery, ―Wideband Spectrum Sensing and Non-Parametric Signal Classification for Autonomous Self-Learning Cognitive Radios‖ IEEE Transaction on wireless communications, Vol. 11, No.7, 2012, pp.2596-2605. [33] Won-Yeol Lee, Ian. F. Akyildiz, ―Optimal Spectrum Sensing Framework for Cognitive Radio Networks‖, IEEE Transaction on wireless communications, Vol. 7, No.10,2008, pp.3845-3857. [34] Aleksandar Neskovic, Natasa Neskovic, ―Microcell electric field strength prediction model based upon artificial neural networks‖, International Journal of Electronics and Communications (AEÜ), 64 (2010), pp.733-738. [35] Wei-Ho Chung, ―Sequential Likelihood Ratio Test under Incomplete Signal Model for Spectrum Sensing‖, IEEE Transaction on wireless communications, Vol. 12, No.2, 2013, pp.494-503. [36] Abbas Taherpour, Masoumeh Nasiri-Kenari, Saeed Gazor, ―Multiple Antenna Spectrum Sensing in Cognitive Radios‖, IEEE Transaction on wireless communications, Vol. 9, No.2, 2010, pp.814-823. [37] Haiquan Wang, En-hui Yang, Zhijin Zhao, Wei Zhang, ―Spectrum Sensing in Cognitive Radio Using Goodness of Fit Testing‖, IEEE Transaction on wireless communications, Vol. 8, No.11, 2009, pp.5427-5430. [38] Nhan Nguyen-Thanh, Thuc Kieu-Xuan, and Insoo Koo ―Comments on ―Spectrum Sensing in Cognitive Radio Using Goodness-of-Fit Testing‖, IEEE Transaction on wireless communications, Vol. 11, No.10, 2012, pp.3409-3411. [39] Hou-Shin Chen, Wen Gao, David G. Daut, ―Spectrum Sensing for OFDM Systems Employing Pilot Tones‖, IEEE Transaction on wireless communications, Vol. 8, No.12, 2009, pp.5862-5870. [40] Jaeweon Kim, Jeffrey G. Andrews, ―Sensitive White Space Detection with Spectral Covariance Sensing‖, IEEE Transaction on wireless communications, Vol. 9, No.9, 2010, pp.2945-2955. [41] Narendar Madhavan∗, A.P. Vinod, A.S. Madhukumar, Anoop Kumar Krishna, ―Spectrum sensing and modulation classification for cognitive radios using cumulants based on fractional lower order statistics‖, International Journal of Electronics and Communications (AEÜ), 67 (2013), pp.479-490. [42] Yang Li, Sudharman K. Jayaweera, Mario Bkassiny, and Keith A. Avery, ―Optimal Myopic Sensing and Dynamic Spectrum Access in Cognitive Radio Networks with Low-Complexity Implementations‖, IEEE Transaction on wireless communications, Vol. 11, No.7, 2012, pp.2412-2423. [43] Xiaolei Hao, Man Hon Cheung, Vincent W. S. Wong, Victor C. M. Leung, ―Hedonic Coalition Formation Game for Cooperative Spectrum Sensing and Channel Access in Cognitive Radio Networks‖, IEEE Transaction on wireless communications, Vol. 11, No.11, 2012, pp.3968-3979. [44] Kenta Umebayashi, Janne J. Lehtomäki, Takanao Yazawa, Yasuo Suzuki, ―Efficient Decision Fusion for Cooperative Spectrum Sensing Based on OR-rule‖, IEEE Transaction on wireless communications, Vol. 11, No.7, 2012, pp.2585-2595. [45] Farzad Moghimi, Ranjan K. Mallik, Robert Schober, ―Sensing Time and Power Optimization in MIMO Cognitive Radio Networks‖, IEEE Transaction on wireless communications, VOL. 11, NO. 9,2012, pp.3398-3408. [46] Sami M. Almalfouh, Gordon L. St¨uber, ― Joint Spectrum-Sensing Design and Power Control in Cognitive Radio Networks: A Stochastic Approach‖, IEEE Transaction on wireless communications, Vol. 11, No.12, 2012,pp.4372-4380. [47] Krishnan Kalimuthu, Ramamoorthy Kumar, ―Capacity maximization in spectrum sensing for Cognitive Radio Networks thru Outage Probability‖, International Journal of Electronics and Communications (AEÜ), 67 (2013), pp.35-39. [48] Haris I. Volos, Member, R. Michael Buehrer,‖ Cognitive Radio Engine Training‖, IEEE Transaction on wireless communications, Vol. 11, No.11,2012, pp.3878-3889. [49] Sungsoo Park, Hyungjong Kim, Daesik Hong, ―Cognitive Radio Networks with Energy Harvesting‖, IEEE Transaction on wireless communications, Vol. 12, No.3, 2013,pp.1386-1397. [50] Xiao Ma, Seddik M. Djouadi, Husheng Li, ―State Estimation over a Semi-Markov Model Based Cognitive Radio System‖, IEEE Transaction on wireless communications, Vol. 11, No.7, 2012, pp.2391-2401. [51] Yanfeng Zhu, Qian Zhang, Zhisheng Niu, Jing Zhu, ―On Optimal QoS-aware Physical Carrier Sensing for IEEE 802.11 Based WLANs: Theoretical Analysis and Protocol Design‖, IEEE Transaction on wireless communications, Vol. 7, No.4, 2008, pp.1369-1378. [52] Bechir Hamdaoui, ―Adaptive Spectrum Assessment for Opportunistic Access in Cognitive Radio Networks‖, IEEE Transaction on wireless communications, Vol. 8, No.2, 2009, pp.922-930. [53] Anh Tuan Hoang, Ying-Chang Liang, David Tung Chong Wong, Yonghong Zeng, and Rui Zhang, ―Opportunistic Spectrum Access for Energy-Constrained Cognitive Radios‖ IEEE Transaction on wireless communications, Vol. 8, No.3, 2009, pp.1206-1211. [54] Hai Jiang, Lifeng Lai, Rongfei Fan, H. Vincent Poor, ―Optimal Selection of Channel Sensing Order in Cognitive Radio‖, IEEE Transaction on wireless communications, Vol. 8, No.1, 2009, pp.297-307.. [55] Nicola Baldo, Alfred Asterjadhi, Michele Zorzi, ―Dynamic Spectrum Access Using aNetwork Coded Cognitive Control Channel‖, IEEE Transaction on wireless communications, Vol. 9, No.8, 2010, pp.2575-2587. [56] Sudhir Srinivasa and Syed Ali Jafar, ―Soft Sensing and Optimal Power Control for Cognitive Radio‖, IEEE Transaction on wireless communications, Vol. 9, No.12, 2010, pp.3638-3649. [57] Yue Wang, Zhi Tian, Chunyan Feng, ―Sparsity Order Estimation and its Application in Compressive Spectrum Sensing for Cognitive Radios‖, IEEE Transaction on wireless communications, Vol. 11, No.6, 2012, pp.2116-2125. [58] Ying-Chang Liang, Yonghong Zeng, Edward C.Y. Peh, Anh Tuan Hoang, ―Sensing-Throughput Tradeoff for Cognitive Radio Networks‖, IEEE Transaction on wireless communications, Vol. 7, No. 4, 2008, pp.1326-1336. [59] Xiaofan He, Huaiyu Dai, Peng Ning, ―A Byzantine Attack Defender in Cognitive Radio Networks: The Conditional Frequency Check‖, IEEE Transaction on wireless communications, Vol. 12, No.5, 2013, pp. 2512-2523 [60] Zhengrui Qin, Qun Li, George Hsieh, ―Defending Against Cooperative Attacks in Cooperative Spectrum Sensing‖, IEEE Transaction on wireless communications, Vol. 12, No.6, 2013, pp.2680-2687. [61] Sesham Srinu, Samrat L. Sabat, ―Cooperative wideband sensing based on cyclostationary features with multiple malicious user elimination‖, International Journal of Electronics and Communications (AEÜ), 67 (2013), pp.702-707. [62] Shu Fang, See Ho Ting, Qiang Li, Ashish Pandharipande, Mehul Motani, ―ARQ-based spectrum sharing with multiple-access secondary system‖, EURASIP Journal on Wireless Communications and Networking, 2013. [63] Sadiq Ali, Gonzalo Seco-Granados, José A López-Salcedo, ―Spectrum sensing with spatial signatures in the presence of noise uncertainty and shadowing‖, EURASIP Journal on Wireless Communications and Networking, 2013. [64] Stergios Stotas, Arumugam Nallanathan, ―‖ IEEE Transaction on wireless communications, Vol. 11, No.1, 2012, pp.97-107. [65] Hamed Sadeghi, Paeiz Azmi ―Cyclostationary-based cooperative spectrum sensing over imperfect reporting channels‖, International Journal of Electronics and Communications (AEÜ), 66 (2012), pp. 833-840. [66] Krishnan K., Ramamoorthy K. ―Capacity maximization in spectrum sensing for Cognitive Radio Networks thru Outage probability‖, International Journal of Electronics and Communications (AEÜ), 67 (2013), pp. 35-39. [67] Jorg Hillenbrand, Timo A. Weiss, Friedrich K. Jondral ―Calculation of Detection and False Probabilities in Spectrum Pooling Systems‖, IEEE Communication Letters, Vol. 9, No.4, 2005, pp. 349-351. [68] Yunfei Chen ―Analytical Performance of Collaborative Spectrum sensing Using Censored Energy Detection‖, IEEE Transaction on wireless communications, Vol. 9, No.12, 2010, pp. 3856-3865. [69] Hang Hu, Hang Zhang, Hong Hu ―Delay QoS guaranteed cooperative spectrum sensing in cognitive radio networks‖, International Journal of Electronics and Communications (AEÜ), 67 (2013), pp. 804-807.
O. P. Meena, Ajay Somkuwar "Spectrum Sensing Methods for Cognitive Radio Networks: A Review" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 1, pp.01-09 2015
From the hydrochemical analysis of 89 representative groundwater samples along coastal Kendrapara district, Odisha, the current research establishes widespread occurrences of moderately hard to hard groundwater within the subsurface water bearing horizons. There exists a distinct belt of moderately hard ground water in both the Mahakalapara and Rajnagar blocks of the district whereas a specific patch of extremely hard water horizon does exist in the former block. The analysis also points to no specific interrelationship between the hardness of groundwater to that of the physical parameters including pH and electrical conductance .
- Page(s): 10-14
- Date of Publication: January 2015
- Prabhu Prasad DasDepartment of Geology, Utkal University, Bhubaneswar, Odisha, India
- H.K.SahooDepartment of Geology, Utkal University, Bhubaneswar, Odisha, India
- P. P. MohapatraDepartment of Earth Sciences, Pondicherry University, Puducherry, India
References
[1] Birdie G.S. and Birdie J.S., (2010), Water Supply and Sanitary Engineering. Eighth Edition. Dhanpat Rai Publishing Company. [2] Boyd, C. E. (2000), Water quality. Kluwer Academic Publishers [3] Todd, D.K., (2001), Ground water hydrology, 2nd edition [4] Garg, S. K. (2009), Water supply engineering. Khanna Publishers [5] Das P. P. and Sahoo H. K., (2014). Designing Representative Groundwater Sampling of Mahakalapara Block, Kedrapara District, Odisha: A Comprehensive Hydro-geologic Analysis by GIS Approach. International Journal of Latest Technology in Engineering, Management and Applied Sciences, Vol. III, Issue X, pp – 63-68. [6] Das P. P. and Sahoo H. K., (2014). A Geospatial Evaluation of SRTM DEM for Representative Groundwater Sampling of Rajnagar Block, Odisha, India. International Journal of Emerging Technology and Advanced Engineering, Vol. 4, Issue 11, pp. 95-103. Sundaray D., Sahoo T., Biswal S., Das P. P. and sahoo. S. (2014), Spatial Interpolation of Iron Contaminationaround the industrial belts of eastern Odisha. International Journal of Latest Technology in Engineering, Management and Applied Sciences, Vol. III, Issue IX, pp – 49-57. [7] Kar, D.K., and Sahoo, H.K., (2012), Hydrogeochemical Evaluation and groundwater pollution studies around Kalinganagar industrial complex, Jajpur District, Odisha, Environmental Geochemistry, Vol -15, No.1, pp 25-30. [8] Edzwald J. K. (1999), Water Quality and Treatment: A handbook of Drinking Water. Sixth edition, McGraw-Hill Companies. [9] U.S. Geological Survey, (1977), National Handbook of Recommended Methods for Water-Data Acquisition. USGS Office of Water Data Coordination, Reston, Virginia. [10] Wood, W. W., (1976), Guidelines for Collection and Field Analysis of Groundwater Samples for Selected Unstable Constituents. In: U.S. Geological Survey Techniques for Water Resources Investigations, Book 1, Chapter D-2. [11] Scalf, M. R., J. F. McNabb, W. J. Dunlap, R. L. Cosby, and J. Fryberger., (1981), Manual of Ground-Water Quality Sampling Procedures. National Water Well Association, Worthington, Ohio. [12] Brass, H. J., M. A. Feige, T. Halloran, J. W. Mellow, D. Munch, and R. F. Thomas., (1977), The National Organic Monitoring Survey: Sampling and Analyses for Purgeable Organic Compounds. In: Drinking Water Quality Enhancement through Source Protection (R.B. Pojasek, cd.), Ann Arbor Science Publishers, Ann Arbor, Michigan. [13] Tinlin, R. M., ed. 1976. Monitoring Groundwater Quality: Illustrative Examples. EPA 600/4-76-036, USEPA, Environmental Monitoring and Support Laboratory, Office of Research and Development, Las Vegas, Nevada. [14] Barcelona M. J., Gibb J. P., Helfrich J. A. and Garske E. E., (1985), Practical Guide for Groundwater Sampling Illinois State Water Survey Champaign, Illinois, ISWS Contract Report 374. [15] Claassen, H. C., (1982), Guidelines and Techniques for Obtaining Water Samples That Accurately Represent the Water Chemistry of an Aquifer. U.S. Geological Survey, Open-File Report 82-1024, Lake, Colorado, 49 pp. [16] https://srtm.csi.cgiar.org/SELECTION/inputCoord.asp [17] Gibb, J. P., R. M. Schuller, and R. A. Griffin., (1981), Procedures for the Collection of Representative Water Quality Data from Monitoring Wells. Cooperative Groundwater Report 7, Illinois state Water Survey and Illinois State Geological Survey, Champaign, Illinois.
Prabhu Prasad Das, H.K.Sahoo, P. P. Mohapatra "Premonsoonal Spatial Distribution of Groundwater Hardness: A Case study in Mahakalapara Block, Kendrapara District, Odisha, India" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 1, pp.10-14 2015
In a wireless sensor network (WSN) environment, a sensor node is extremely constrained in terms of hardware due to factors such as maximizing lifetime and minimizing physical size and overall cost. The different security challenges that may arise in integrating WSN to Internet of Things (IoT) are to be specially focused. High attention, however, is given to the routing protocols since they might differ depending on the application, path selection, network architecture and protocol operation. This paper surveys recent routing protocols for sensor networks and presents a classification for the various approaches pursued based upon the application and the available hardware motes. Enormous survey towards threats, vulnerabilities and various routing protocols has been done and a holistic overview of security requirements and issues for using IETF's RPL routing protocol over 6LoWPAN is given. Along the way, effort has been made towards the classification and analysis of secure routing schemes in literature and the advantages and disadvantages in each category has been discussed. The open research issues in establishing secure routing over 6LoWPAN are envisaged.
- Page(s): 15-25
- Date of Publication: January 2015
- Alagumeenaakshi MuthiahDept. of ECE, Kumaraguru College of Technology, Coimbatore, India
- Dr. S. PalaniswamiPrincipalGovernment College of Technology, Bodinayakanur, India
References
[1.] N. Kushalnagar, G. Montenegro, and C. Montenegro,"RFC 4919 - IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement and Goals," Aug. 2007; [2.] N. Kushalnagar, G. Montenegro, J. Hui, and D. Culler, "6LoWPAN: Transmission of IPv6 Packets over IEEE 802.15.4 Networks", RFC 4944, September 2007. [3.] S. Daniel Park, et al, "IPv6 over Low Power WPAN Security Analysis," IETF Internet Draft, Feb. 2008. [4.] K. Kim, et al, "Hierarchical Routing over 6LoWPAN (HiLoW)," IETF Internet Draft, Jun. 2007. [5.] John P. Walters, Zhengqiang Liang, Weisong Shi, and Vipin Chaudhary, “Wireless Sensor Networks Security: A Survey”, book chapter of Security in Distributed, Grid, and Pervasive Computing, Yang Xiao (Eds.), CRC Press, later 2006. [6.] C. Karlof and D. Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures," Elsevier AdHoc Networks Journal, Special Issue on Sensor Network Applications and Protocols, vol. 1, Sep. 2003, p. 293-315. [7.] R. Roman, C. Alcaraz, and J. Lopez, "A survey of cryptographic primitives and implementations for hardware constrained sensor network nodes," Mob. Netw. Appl., vo1.I2,2007, pp. 231-244. [8.] Kemal Akkaya, Mohamed Younis "A survey on routing protocols for wireless sensor networks" Elsevier Ad Hoc Networks Journal 3, 2005, pp.325–349. [9.] Loay Abusalah, Ashfaq Khokhar, and Mohsen Guizani, "A Survey of Secure Mobile Ad Hoc Routing Protocols" IEEE communications surveys & tutorials, vol. 10, no. 4, 2008, pp. 78-93. [10.] Ali Modirkhazeni, Norafida Ithni, Sothman Ibrahiecure, "Multipath Routing Protocols in Wireless Sensor Networks: A Security Survey Analysis", 2010 Second International Conference on Network Applications, Protocols and Services, Vol 1, pp. 228-233. [11.] Rodrigo Roman, Cristina Alcaraz, Javier Lopez, Nicolas Sklavos,”Key management systems for sensor networks in the context of the Internet of Things", Elsevier Computers and Electrical Engineering Journal 37, 2011, pp. 147–159. [12.] Chris Karlof, David Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures” Ad Hoc Networks, Vol. 1, 2003, pp. 293–315 [13.] W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, "Energy-efficient communication protocol for wireless sensor networks," in the Proceeding of the Hawaii International Conference System Sciences, Hawaii, January 2000. [14.] W. Heinzelman, A.P. Chandrakasan, and H. Balakrishnan, "An Application-Specific Protocol Architecture for Wireless Microsensor Networks", IEEE Transactions on Wireless Communications, Vol. 1, No. 4, Oct. 2002, pp.660-670. [15.] A. Manjeshwar and D. P. Agrawal, “TEEN : A Protocol for Enhanced Efficiency in Wireless Sensor Networks," in the Proceedings of the 1st International Workshop on Parallel and Distributed Computing Issues in Wireless Networks and Mobile Computing, San Francisco, CA, April 2001. [16.] A. Manjeshwar and D. P. Agrawal, "APTEEN: A Hybrid Protocol for Efficient Routing and Comprehensive Information Retrieval in Wireless Sensor Networks," in the Proceedings of the 2ndInternational Workshop on Parallel and Distributed Computing Issues in Wireless Networks and Mobile computing, Ft. Lauderdale, FL, April 2002 [17.] S. Lindsey and C. S. Raghavendra, "PEGASIS: Power Efficient GAthering in Sensor Information Systems," in the Proceedings of the IEEE Aerospace Conference, Big Sky, Montana, March 2002. [18.] S. Lindsey, C. S. Raghavendra and K. Sivalingam, "Data Gathering in Sensor Networks using the Energy/Delay Metric", in the Proceedings of the IPDPS Workshop on Issues in Wireless Networks and Mobile Computing, San Francisco, CA, April 2001. [19.] C. E. Perkins and E. M. Royer, “Ad Hoc On-demand Distance Vector Routing,” In Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, LA, February 1999, pp. 90-100. [20.] Wei Ye, John Heidemann , Deborah Estrin, ”An energy efficient MAC protocol for wireless sensor network” 2002. [21.] C. E. Perkins and P. Bhagwat, “Highly Dynamic Destination Sequenced Distance-Vector Routing (DSDV) for Mobile Computers,” SIGCOMM, London, UK, August 1994, pp. 234-244. [22.] D. B. Johnson and D. A. Maltz, “Dynamic Source Routing in Ad-Hoc Ad hoc Networks," Mobile Computing, ed. T. Imielinski and H. Korth, Kluwer Academic Publishers, 1996, pp. 153-181. [23.] Y. Xu, J. Heidemann, and D. Estrin, "Geography informed energy conservation for ad hoc routing", Proceedings of the 7th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom’01), Rome, Italy, July 2001. [24.] C. Perkins, Ad hoc On demand Distance Vector (AODV) routing, IETF Internet draft (1997), https://www.ietf.org/internet-drafts/draftietf-manet-aodv-00.txt [25.] Philippe Jacquet, Paul Muhlethaler, Thomas Clausen, Anis Laouiti, Amir Qayyum, Laurent Viennot, “Optimized Link State Routing Protocol for Ad-Hoc Networks” [26.] V. Rodoplu and T.H. Ming, "Minimum energy mobile wireless networks," IEEE Journal of Selected Areas in Communications, Vol. 17, No. 8, pp. 1333-1344, 1999. [27.] L. Li and J. Y Halpern, “Minimum energy mobile wireless networks revisited,” in the Proceedings of IEEE International Conference on Communications (ICC’01), Helsinki, Finland, June 2001 [28.] Robert Szewczyk, Alan Mainwaring, Joseph Polastre, John Anderson, “An analysis of a large scale habitat monitoring application”, Proceedings of the 2nd international conference on Embedded Networked Sensor Systems, 2004. [29.] Ali Modirkhazen, Norafida Ithnin, Othman Ibrahim “Secure Multipath Routing Protocols in Wireless Sensor Networks: A Security Survey Analysis”, Second International Conference on Network Applications, Protocols and Services, 2010. [30.] Kumar, P.; Cho, S.; Lee, D.S.; Lee, Y.D.; Lee, H.J. “TriSec: A secure data framework for wireless sensor networks using authenticated encryption” Int. J. Marit. Inf. Commun. Sci. (2010), 129-135. [31.] Z. Haas and M. Pearlman, “The Zone Routing Protocol (ZRP) for Ad Hoc Networks”, in IETF MANETS Draft, June 1999. [32.] P. Papadimitratos, and Z. Haas, “Secure link State Routing for Mobile Ad hoc Networks”, IEEE Wksp. Security and Assurance in Ad hoc Networks, 2003. [33.] J.Kulik, W. R. Heinzelman, and H. Balak-rishnan. Negotiation- based protocols for disseminating information in wireless sensor networks [J]. Wireless Networks, 2002, 8(2/3):169-185. [34.] C. Intanagonwiwat, R. Govindan and D. Estrin. Directed Diffusion: a scalable and robust communication paradigm for sensor networks[C]. Boston, Massachusetts, USA. ACM. MOBICOM, 2000.56-67. [35.] A. Buczak and V. Jamalabad, "Self-organization of a Heterogeneous Sensor Network by Genetic Algorithms," Intelligent Engineering Systems Through Artificial Neural Networks, C.H. Dagli, et. (eds.), Vol. 8, pp. 259-264, ASME Press, New York, 1998. [36.] C.R. Lin and M. Gerla, "Adaptive Clustering for Mobile Wireless Networks," IEEE Journal on Selected areas in Communications, Vol. 15, No. 7, September 1997. [37.] M. Younis, M. Youssef and K. Arisha, “Energy-Aware Routing in Cluster-Based Sensor Networks”, in the Proceedings of the 10th IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems.(MASCOTS2002), Fort Worth, TX, October 2002. [38.] L. Subramanian and R. H. Katz, "An Architecture for Building Self Configurable Systems," in the Proceedings of IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing, Boston, MA, August 2000. [39.] Y. Yu, D. Estrin, and R. Govindan, “Geographical and Energy-Aware Routing: A Recursive Data Dissemination Protocol for Wireless Sensor Networks,” UCLA Computer Science Department Technical Report, UCLA-CSD TR-01-0023, May 2001. [40.] D. Ganesan, et al., "Highly Resilient, Energy Efficient Multipath Routing in wireless Sensor Networks," in Mobile Computing and Communications Review (MC2R), Vol. 1., No. 2. 2002.
Alagumeenaakshi Muthiah, Dr. S. Palaniswami "Survey on Security Mechanisms for Routing Over 6LoWPAN " International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 1, pp.15-25 2015
Design, analysis and optimization of shell and tube heat exchanger using Bell Coleman Method and CFD. Design variables: tube outer diameter, tube pitch, tube length, number of tube passes, no of shell, shell head type, shell layout, baffle spacing and baffle cut are taken for optimization. Bell’s method is used to find the heat transfer area for a given design configuration. The optimal analysis be the one tube, sectional one tube and sectional heat exchanger.
- Page(s): 26-30
- Date of Publication: January 2015
- PowarDigvijay DDepartment of Mechanical Engineering Bapuji Institute of Engineering And Technology, Davangere, India
- Dr. G.ManavendraDepartment of Mechanical Engineering Bapuji Institute of Engineering And Technology, Davangere, India
References
PowarDigvijay D, Dr. G.Manavendra "Comparative Thermal Analysis of Shell and Tube Heat Exchanger using Bell Coleman Method and CFD " International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 1, pp.26-30 2015
The science of informatics has transformed the healthcare profession by the extraordinary revolution in information technology, and continues to do so. Oral health profession is no exception to this and the discipline of dental informatics is influencing it in clinical care, education, and research. The scope of dental informatics has not yet been extended to the use of artificial intelligence expert systems in diagnosis and treatment plan, effective tutoring systems, and continuing dental education programmes and research. The exchange of information among different healthcare professionals through networked computing is bringing the world together as a true global village. This can help in improved communication among experts, besides forming an interdisciplinary collaboration. Dental teaching institutions need to reshape the dental curriculum encompassing the science of information technology (IT) and informatics to better equip students in their ability to use IT tools in their training as well as future clinical practice and research endeavours. Dental informatics is of enormous benefit to research in dentistry, which only indicates the tremendous changes it can impart to clinical care as well as educational research. Hence, it is inevitable to continue to embrace dental informatics effectively in all spheres of oral health education, research, and clinical care.
- Page(s): 31-35
- Date of Publication: January 2015
- Kadanakuppe, S.Department of Public Health Dentistry, V. S. Dental College and Hospital, Rajiv Gandhi University of Health Sciences, India.
- Bhat, P.K.Department of Preventive and Community Dentistry, Rajarajeshwari Dental College and Hospital, Rajiv Gandhi University of Health Sciences, India.
- UmeshaDepartment of Central Library, V. S. Dental College and Hospital, Rajiv Gandhi University of Health Sciences, India.
- Nayak S.SCRES, Department of Clinical Research, Rush University, Chicago, IL.
References
[1] Schleyer T. Digital dentistry in the computer age. JADA 1999; 130: 1713-20. [2] Schleyer, T.K., Thyvalikakath, T.P., Spallek, H., Dziabiak, M.P., Johnson, L.A. Information Technology to Informatics: The Information Revolution in Dental Education. J Dent Educ. 2012 January; 76(1): 142–153. [3] en.wikipedia.org/wiki/category:Digital_Revolution [4] Pyle, M.A. New models of dental education and curricular change: their potential impact on dental education. J Dent Educ. 2012; 76(1):89–97. [5] Schleyer, T.K., Corby, P., A. L. Gregg. A preliminary analysis of the dental informatics literature. Adv Dent Res 2003; 17: 20-24. [6] Schleyer, T.K. Dental informatics: a work in progress. Adv Dent Res 2003; 17: 9-15. [7] Schleyer, T. Dental informatics: An emerging biomedical informatics discipline. J Dent Educ 2003; 67(11): 1194-99. [8] Schleyer, T. Dental informatics: A corner stone of dental practice. JADA 2001; 132: 605-612. [9] Schleyer, T., Desari, R. Computer-based oral health records on the World Wide Web. Quintessence Int. 1999; 30: 451-460. [10] Liu, K., Acharya, A., Alai, S., Schleyer, T.K. Using electronic dental record data for research: a data-mapping study. J Dent Res. 2013 Jul;92 (7 Suppl):90S-6S. [11] Dick, R.S., Steen, E.B., editors. Committee on Improving the Patient Record, Division of the Health Care Services, Institute of Medicine. The computer-based patient record: an essential technology for health care. Washington, DC: National Academy Press; 1991. [12] Thompson, T.G., Brailer, D.J. The decade of health information technology: delivering consumer centric and information-rich health care—framework for strategic action. Washington, DC: U.S. Department of Health and Human Services, Office of the National Coordinator for Health Information Technology; 2004. [13] Stead, W.W., Lin, H.S., editors. Computational technology for effective health care: immediate steps and strategic directions. Washington, DC: National Academies Press; 2009. [14] Umar, H. Clinical decision-making using computers: opportunities and limitations. Dent Clin N Am 2002; 46(3): 521-38. [15] White, S. Decision-support systems in dentistry. J Dent Educ 1996; 60(1): 47-63. [16] Nwigbo, Stella and Agbo, Okechuku Chuks, Expert system: a catalyst in educational development in Nigeria. Proceedings of the 1st International Technology, Education and Environment Conference (c) African Society for Scientific Research (ASSR). Co-Published By: Human Resource Management Academic Research Society). [17] Schleyer, T. et al. Is the Internet useful for clinical practice? JADA 1999; 130: 1501-1511. [18] Schleyer, T., Spallek, H., Butler, B.S., Subramanian, S., Weiss, D., Poythress, M.L., Rattanathikun, P., Mueller, G. Facebook for scientists: requirements and services for optimizing how scientific collaborations are established. J Med Internet Res. 2008 Aug 13;10 (3):e24. [19] Sciubba, J. Improving detection of precancerous and cancerous lesions. JADA 1999; 130:1445-57. [20] Johnson, L. Biomedical informatics training for dental researchers. Adv Dent Res 2003; 17: 29-33. [21] Anusavice, K.J. Informatics systems to assess and apply clinical research on dental restorative materials. Adv DentRes 2003; 17: 43-8. [22] Iacopino, A. The role of ―Research non-intensive‖ institutions within global framework. J Dent Res 2004; 83(4): 276-77). [23] Johnson, L. et al. Dental interactive simulations corporations (DISC): simulations for education, continuing education, and assessment. J Dent Educ 1998; 62(11): 919-2. [24] Johnson, L. et al. Geriatric patient simulations for dental hygiene. J Dent Educ 1997; 61(8): 667-77. [25] MacPherson, B., Brueckner, J. Enhancing the dental histology curriculum using computer technology. J Den Educ March 2003; 67(3): 359-64. [26] Hendricson, W.D. Changes in educational methodologies in predoctoral dental education: finding the perfect intersection.J Dent Educ. 2012 Jan; 76(1):118-41. [27] Schleyer, T., Mattsson, U., NíRíordáin, R., Brailo, V., Glick, M., Zain, R.B., Jontell, M. Advancing oral medicine through informaticsand information technology: a proposed framework and strategy.Oral Dis. 2011 Apr; 17Suppl 1:85-94. [28] Bauer, J., Brown, W. The digital transformation of oral health care. JADA, 2001; 132(2): 204-9. [29] Schleyer, T., Eaton, K.A., Mock, D., Barac'h, V. Comparison of dental licensure, specialization and continuing education in five countries. Eur J Dent Educ. 2002 Nov; 6 (4): 153-61. [30] Spallek, H., Pilcher, E., Lee, J.Y., Schleyer, T. Evaluation of web-based dental CE courses. J Dent Educ. 2002 Mar; 66 (3): 393-404. [31] Crowley, R.S., Legowski, E., Medvedeva, O., Tseytlin, E., Roh, E., Jukic, D. Evaluation of an intelligent tutoring system in pathology: effects of external representation on performance gains, metacognition, and acceptance. J Am Med Inform Assoc. 2007; 14(2):182–190. [32] Holmes, R.G., Blalock, J.S., Parker, M.H., Haywood, V.B. Student accuracy and evaluation of a computer-based audience response system. J Dent Educ. 2006; 70(12):1355–1361. [33] Boynton, J.R., Johnson, L.A., Nainar, S.M., Hu, J.C. Portable digital video instruction in predoctoral education of child behavior management. J Dent Educ. 2007; 71(4):545–549. [34] Haig, A., Dozier, M. BEME Guide No. 3: systematic searching for evidence in medical education— Part 1: sources of information. Med Teach. 2003; 25(4):352–363. [35] Schleyer, T.K., Johnson, L.A. Evaluation of educational software. J Dent Educ. 2003; 67(11):1221– 1228. [36] Greenwood, S.R., Grigg, P.A., Vowles, R.V., Stephens, C.D. Clinical informatics and the dental curriculum. A review of the impact of informatics in dental care, its implications for dental education. Eur J Dent Educ. 1997 Nov; 1(4):153-61. [37] Iacopino, A.M. The influence of "new science" on dental education: current concepts, trends, and models for the future. J Dent Educ. 2007 Apr; 71 (4): 450-62. [38] Archer, N., Fevrier-Thomas, U., Lokker, C., McKibbon, K.A., Straus, S.E.J. Personal health records: a scoping review. Am Med Inform Assoc 2011; 18:515e522. doi:10.1136/amiajnl-2011-000105.
Kadanakuppe S., Bhat P.K., Umesha, Nayak S.S "Digital Revolution: Informatics for Oral Healthcare Profession" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 1, pp.31-35 2015
Assignment problem is a special case of transportation problem, in which the objective is to minimized total cost by assigning ‘m’ jobs to ‘n’ machines. By using MATLAB coding and some modification in ROA method, optimal solution can be trace for assignment problem within seconds. MATLAB coding result has given for various orders of illustrations.
- Page(s): 36-39
- Date of Publication: January 2015
- Ghadle Kirtiwant PDepartment of Mathematics, Dr. Babasaheb Ambedkar Marathwada University, Aurangabad -431004 (INDIA)
- Muley Yogesh MDepartment of Mathematics, Dr. Babasaheb Ambedkar Marathwada University, Aurangabad -431004 (INDIA)
References
[1] Dimitri. P. Bertsekas., A New Algorithm for the Assignment Problem, Mathematical Programming, 21 (1981), 152-171. [2] Ghadle Kirtiwant P, Muley Yogesh M, Revised Ones Assignment Method for Solving Assignment Problem, Journal of Statistics and Mathematics, ISSN: 0976-8807 & E-ISSN: 0976-8815, Volume 4, Issue 1 (2013), 147-150. [3] Hadi Basirzadeh, Ones Assignment Method for solving Assignment Problems, Applied Mathematical Sciences, Vol. 6, 2012, No. 47 (2012), 2345-2355. [4] M.B. Wright, Speeding up the Hungarian Algorithm, Computers Opns Res., Vol.17, No.1(1990), 95-96. [5] M.L. Balinski, R.E. Gomory., A Primal Method for the Assignment and Transportation Problems, Management Science, Vol.10 (1964), No.3. [6] Ming.S. Hung, Walter. O. Rom., Solving Assignment Problem by Relaxation, Operation Research, Vol.28, No.4 (1980), 969-982. [7] Roy Jonker, Ton Volgenant., Improving the Hungarian Assignment Algorithm, Operation Research letters, Volume 5 (1986), Number 4. [8] Amous Gilat,MATLAB: An Introduction with Applications, John Wiley & Sons, Inc.(2004). [9] Stormy Attaway, MATLAB: A Practical Introduction to Programming and Problem Solving, Elsevier, Inc (2009).
Ghadle Kirtiwant P, Muley Yogesh M "New Approach to Solve Assignment Problem using MATLAB" International Journal of Latest Technology in Engineering,Management & Applied Science-IJLTEMAS vol.4 issue 1, pp.36-39 2015
Vehicular networking has become a significant research area due to its specific features and applications such as standardization, efficient traffic management, road safety. Vehicles are expected to carry relatively more communication systems, on board computing facilities, storage and increased sensing power. Hence, several technologies have been deployed to maintain and promote Intelligent Transportation Systems (ITS). Recently, a number of solutions were proposed to address the challenges and issues of vehicular networks. Vehicular Cloud Computing (VCC) is one of the solutions. VCC is a new hybrid technology that has a remarkable impact on traffic management and road safety by instantly using vehicular resources, such as computing, storage and internet for decision making. The main contribution of this work is to identify a number of security challenges and potential privacy threats in VCs.
- Page(s): 40-42
- Date of Publication: January 2015
- Bindushree M RPG student, M Tech, CNE, Dr.AIT, Bangalore, India
- Vijayalaxshmi R PatiAssistant Professor, Dr. AIT, Bangalore, India
References
[1.] Gongjun Yan, Ding Wen, Stephan Olariu, and Michele C. Weigle” Security Challenges in Vehicular Cloud Computing” IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, VOL. 14, NO. 1, MARCH 2013 [2.] S. Olariu, M. Eltoweissy, and M. Younis, “Toward autonomous vehicular clouds,” ICST Trans. Mobile Commun. Comput., vol. 11, no. 7–9, pp. 1–11, Jul.–Sep. 2011. [3.] Whaiduzzaman M, et al. A survey on vehicular cloud computing. Journal of Network and Computer Applications (2013),https://dx.doi.org/10.1016/j.jnca.2013.08.004 [4.] Mario Gerla Computer Science Department, UCLA Los Angeles, CA 90095 gerla@cs.ucla.edu, “Vehicular Cloud Computing” [5.] SIRIT-Technologies, White paper. DSRC technology and the DSRC industry consortium (DIC) prototype team. [6.] Jin Wang, Tinghuai Ma, Jinsong Cho, Sungyoung Lee “Real Time Services for Future Cloud Computing Enabled Vehicle Networks”, Kyung Hee University, Computer Engineering Department, Korea.
Bindushree M R, Vijayalaxshmi R Pati "Vehicular Cloud Computing and Its Security Challenges " International Journal of Latest Technology in Engineering,Management & Applied Science-IJLTEMAS vol.4 issue 1, pp.40-42 2015
Network is increasing rapidly so, security is a major problem in networks. Internet attacks are growing, and there have been several attack approaches, consequently. Attack detection systems are using various data mining techniques to detect intrusions. In information security, attack detection is necessary because they attempt to compromise the privacy, reliability or availability of a resource. One of the primary challenges for intrusion detection is the problem of misjudgement, mis-detection and lack of real time response to the attack. In this paper, experiment results are calculated at the kddcup99 data set. Feature selection of the data set is executed using Information Gain (IG) and clear dissimilarity between normal and attack data is observed by using C4.5 decision tree algorithm.
- Page(s): 43-47
- Date of Publication: January 2015
- Chandrakant Rajpoot, M.Tech Scholar Department of CSE SRCEM, Banmore, India.
- Nirupma TiwariAssistant Professor Department of CSE SRCEM, Banmore, India.
References
[1.] L. Breiman, ―Random Forests‖, Machine Learning 45(1):5–32, 2001. [2.] T. Bhavani et al., ―Data Mining for Security Applications,‖Proceedings of the 2008 IEEE/IFIP International Conference onEmbedded and Ubiquitous Computing - Volume 02, IEEE ComputerSociety, 2008. [3.] Ming Xue and Changjun Zhu ―Applied Research on Data MiningAlgorithm in Network Intrusion Detection‖ International jointConference on Artificial Intelligence ,IEEE,978-0-7695-3615-6/09 ©2009. [4.] Mohammadreza Ektefa , Sara Memar, Fatimah Sidi ,Lilly SurianiAffendey ―Intrusion Detection Using Data Mining Techniques‖ IEEE978- 1-4244-5651-2/10 © 2010. [5.] Shu Wu and Shengrui Wang, ―Information-Theoretic OutlierDetection for Large-Scale Categorical Data‖, IEEETRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERINGVOL. 25, NO. 3, MARCH 2013. [6.] Ashish Kumar, Shrikant Chandak ,Rita Dewanjee, ―Recent Advancesin Intrusion Detection Systems: An Analytical Evaluation andComparative Study ‖ ,International Journal of Computer Applications(0975 – 8887) Volume 86 – No 4, January 2014 [7.] Prabhjeet Kaur , Amit Kumar Sharma, Sudesh Kumar Prajapat―MADAM ID FOR INTRUSION DETECTION USING DATAMINING‖ IJRIM Volume 2, Issue 2 (ISSN 2231-4334) (February2012). [8.] Yogendra Kumar jain and Upendra ―An Efficient Intrusion DetectionBased on Decision Tree Classifier Using Feature Reduction ‖International Jornal of Scientific and Research Publications, ISSN2250-3153,Volume 2,Issue 1,January 2012. [9.] Namita Shrivastava and Vineet Richariya ‖ Ant Colony Optimizationwith Classification Algorithms used for IntrusionDetection‖ ,International Journal of computational Engineering &Management Volume 15 Issue 1,January 2012. [10.] A.M. Chandrasekhar and K. Raghuveer ,‖ Intrusion DetectionTechnique by using K-means,Fuzzy Neural Network and SVMclassifiers‖, International Conference on Computer Communicationand Informatics(ICCCI-2013), IEEE Jan. 04 06,2013,Coimbatore,INDIA. [11.] MIT Lincoln Laboratory. DARPA Intrusion Detection Evaluation DataSets. Available athttps://www.ll.mit.edu/mission/communications/ist/corpora/ideval/data/index.html,1999. [12.] https://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html. [13.] T. Lappas and K. P. ,"Data Mining Techniques for (Network) IntrusionDetection System," January 2007. [14.] S. Sun, Y. Wang, "A Weighted Support Vector Clustering Algorithmand its Application in Network Intrusion Detection," etcs, vol. 1, pp.352-355, 2009 First International Workshop on Education Technologyand Computer Science, 2009. [15.] S. Wu, E. Yen. ―Data mining-based intrusion detectors,‖ ElsevierComputer Network, 2009. [16.] E. Bloedorn et al, ‖Data Mining for Network Intrusion Detection: Howto Get Started,‖ Technical paper, 2001.
Chandrakant Rajpoot, Nirupma Tiwari "Efficient Attack Detection using Information Gain, C4.5 and Decision Tree Algorithm" International Journal of Latest Technology in Engineering,Management & Applied Science-IJLTEMAS vol.4 issue 1, pp.43-47 2015
The aim of this paper is to study the symmetry of solutions of nonlinear elliptic differential equations of type Δu + V(|x|)eu = 0 in R3, which arise in geometry and various branches of physics. Symmetry of solutions is proved by applying method of moving planes.
- Page(s): 48-53
- Date of Publication: January 2015
- D. B. DhaigudeDepartment of Mathematics Dr. Babasaheb Ambedkar Marathwada University, Aurangabad, India
- D. P. PatilArt’s, Sci, and Com. College Saikheda Tal Niphad Dist Nasik.(M. S.) India
References
[1] S. Chanillo and M. Kiessling. Rotational symmetry of solutions of some nonlinear problems in statistical mechanics and in geometry , Comm. Math. Phys. 160,(1994), 217-238. [2] W. Chen and C. Li, Methods of nonlinear elliptic equations, SPIN AIMS international project monogaraph, Sept. 2-2008. [3] W. Chen and C. Li, Classification of solutions of some nonlinear elliptic equations, Duck Math. J. 63, (1991), 615-622. [4] W. Chen and C. Li, Qualitative properties of solutions to some nonlinear elliptic equations in R2, Duck Math. J. 71, (1993), 427-439. [5] D. B. Dhaigude, and D. P. Patil, (2013), “Symmetry properties of solutions of nonlinear elliptic equations”, International journal of Advances in Management, Technology and engineering Sciences, Vol.II , 10(11), pp. 24 – 28 [6] D .B .Dhaigude ,and D. P. Patil, (2014),Symmetry of solutions of system of nonlinear elliptic boundary value problems, Journal of Global research in Mathematical Archives, Vol., 2 No 4, April 2014. [7] D .B .Dhaigude ,and D. P. Patil, (2015),, “Radial symmetry of positive solutions of nonlinear elliptic boundary value problems, Malaya Journal of Mathematics, 3(1)(2015) 23–29. [8] B. Gidas, W. Ni and L. Nirenberg, Symmetry and related properties via the maximum principle, Comm. Math. Phys. 68, (1979), 209-243. [9] B. Gidas, W. Ni and L. Nirenberg, Symmetry of positive solutions of non linear elliptic equations in $R^{n}$, Mathematical Analysis and Applications Part A, ed. by L. Nachbin, adv. Math. Suppl. Stud. 7, Academic Press, New York, 1981, 369-402. [10] D. Gilbarg, N.S. Trudinger; Elliptic partial differential equations of second order, Springer-Verlag, Berlin, 2001. [11] Z. Guo and J. Wei, Symmetry of nonnegative solutions of a semilinear elliptic equation with singular nonlinearity, Proceedings of the Royal Society of Edinburgh, 137A, (20007) 983 - 994. [12] H. Hopf, Differential Geometry in the large, Lecture notes in in Mathematics, Vol 1000, Springer Verlag, 1983. [13] Y. Li and W Ni, On the asymptotic behavior and radial symmetry of positive solutions of semilinear elliptic equations in Rn, I Asymptotic behavior, Arch. Rational Mech. Anal. 118 (1992) 195-222. [14] Y. Naito, A note on radial symmetry of positive solutions for semi linear equations in $R^{n}$, Differential and integral equations 11, (1998), 835-845. [15] Y. Naito, Symmetry results for semilinear elliptic equations in $R^{2}$; Nonlinear Analysis 47, (2001), 3661-3670. [16] M. Protter and H. Weinberger, Maximum principles in Differential equations, Prentice-Hall, Englewood Cliffs, N.J. 1967. [17] J. Serrin, A symmetry problem in potential theory, Arch. Rational Mech. Anal 43, (1971), 304-318.
D. B. Dhaigude, D. P. Patil "On Symmetric Solutions of Elliptic Boundary Value Problems" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 1, pp.48-53 2015
Cloud storage provides online storage where data stored in form of virtualized pool that is usually hosted by third parties the partitioning method is proposed for the data storage which avoids local copy and reduces load on server. This method ensures high cloud storage integrity, security. To achieve this, remote data integrity checking concept is used to enhance the performance of cloud storage. To maintain this data efficiently, there is a necessity of data recovery services. We use a smart remote data backup algorithm, Seed Block Algorithm (SBA). The objective of proposed algorithm is to recover data ; first it help the users to collect information from any remote location in the absence of network connectivity and second to recover the files in case of the file deletion or if the cloud gets destroyed due to any reason.
- Page(s): 54-59
- Date of Publication: January 2015
- Minaaz ShaikhDepartment of Computer Engineering SKN-Sinhgad Institute of Technology and Science, Lonavala, Maharashtra, India
- Aiswarya AcharyDepartment of Computer Engineering SKN-Sinhgad Institute of Technology and Science, Lonavala, Maharashtra, India
- Sneha MenonDepartment of Computer Engineering SKN-Sinhgad Institute of Technology and Science, Lonavala, Maharashtra, India
- Nambirajan KonarDepartment of Computer Engineering SKN-Sinhgad Institute of Technology and Science, Lonavala, Maharashtra, India
References
[1.] C. Selvakumar; G. Jeeva Rathanam; M. R. Sumalatha; “PDDS - Improving Cloud Data Storage Security Using Data Partitioning Technique” 2013 3rd IEEE International Advance Computing Conference (IACC), Dec 2013. [2.] Ms. Kruti Sharma; Prof. Kavita R Singh;“Seed Block Algorithm: A Remote Smart Data Back-up Technique for Cloud Computing” 2013 International Conference on Communication Systems and Network Technologies, Dec 2013. [3.] Zhiguo Wan; Jun'e Liu; Deng, R.H.; "HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing," Information Forensics and Security, IEEE Transactions on, vol.7, no.2, pp.743-754, April 2012. [4.] Mr. Prashant Rewagad; Ms.Yogita Pawar; “Use of Digital Signature with Diffie Hellman Key Exchange and AES Encryption Algorithm to Enhance Data Security in Cloud Computing” 2013 International Conference on Communication Systems and Network Technologies, Dec 2013 11. William A. Arbaugh, Narendar Shankar and Y.C.Justin Wan, “Your 802.11 Wireless Network has No Clothes”, University of Maryland, March 2001. [5.] “Data Partitioning Technique to Improve Cloud Data Storage Security” ,.Swapnil V.Khedkar , A.D.Gawande Information Technology, Computer Science, SGBAU University Amravati, Maharashtra, India, Swapnil V.Khedkar (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (3), 2014, 3347-3350
Minaaz Shaikh, Aiswarya Achary, Sneha Menon, Nambirajan Konar "Improving Cloud Data Storage using Data Partitioning and Data Recovery using Seed Block Algorithm" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 1, pp.54-59 2015
In current scenario,a computer system has been taken as the most efficient system to detect and overcome the limitations in any technical field.In this survey paper,object tracking is taken into consideration. As the number of cameras used in the wide area video surveillance increases, multi-camera object tracking plays a more important role in understanding and analyzing the scenes. It is challenging problem.An object tracking is simply a problem of finding the different positions of the object in each frame of a video. Object tracking quality usually depends on video scene conditions.If we are able to detect and find the solution to the limitations,object tracking process will be successful without any lacunas.
- Page(s): 60-68
- Date of Publication: January 2015
- Monica PradhanKIIT University, Bhubaneswar, Odisha, India
- Sidharth Swarup RautarayAsst. Professor KIIT University, Bhubaneswar, Odisha, India
References
[1] P. Salesmbier, L. Torres, F. Meyer and C. Gu, "Region-based Video Coding Using Mathematical Morphology," Proc. of the IEEE, Vol. 83, No. 6,pp. 843-857, 1995. Harris C. & Stennett C. "Rapid - A Video Rate Object Tracker", Proc. British Machine Vision Conference, BMVC-90, Oxford, pp.73-77, 1990. [2] A. Yilmaz, X. Li, and M. Shah. Object tracking: A survey.ACM J. Computing Surveys, 2006.X.G.Wang, K.Tieu, and W.E.L.Grimson. Correspondencefree activity analysis and scene modeling in multiple camera views. TPAMI, 32(1):56-71, 2010 [3] B.K.P. Horn, B.G. Schunck, Determining optical flow, Artificial Intelligence 17 (1_3) (1981) 185_203.B.D. Lukas, T. Kanade, An iterative image registration technique with an application to stereovision, in: Proceedings of Imaging Understanding Workshop, 1981, pp. 121_130. [4] J. Allen, R. Xu, J. Jin, Mean shift object tracking for a SIMD computer, in: Proc. Int. Conference on Information Technology and Applications, Sydney,Australia, 2005, pp. 692–697. E. Amer, E. Dubois, A. Mitiche, Real-time system for high-level video representations: application to video surveillance, in: SPIE International Symposium on Electronic Imaging, 2003, pp. 530–541. [5] A.Yilmaz, and O.Javed, and M.Shah, ―Object Tracking –A Survey,‖ACM computer surveys, vol. 38, No. 4, pp. 1-45, 2006. L.Wang, W.hu, and T.Tan,‖ Recent Development in human motion analysis,‖pattern recognition,vol. 36, no. 3, pp.585-601, 2003. [6] Zhiyu Zhou, KaikaiLuo, Yaming Wang, Jianxin Zhang,‖Object Tracking based on Multi-feature Fusion and Motion Prediction‖, Journal of Computational Information Systems 7: 16 (2011) 5940-5947D. Comaniciu, V. Ramesh and P. Meer, ―Kernel-based object tracking‖, IEEE Trans Patt. Anal. Mach. Intell. 25(5) (2003) 564–575. [7] A. Senior, et al. ―Appearance Models for Occlusion Handling‖, In Second International workshop on Performance Evaluation of Tracking and Surveillance systems, 2001. T. Yang, S. Z. Li, Q. Pan, J. Li, ―real-time multiple objects tracking with occlusion handling in dynamic scenes‖, In Proc. IEEE Conference on Computer Vision and Pattern Recognition, 2005. [8] M. J. Black and A. D. Jepson. Eigentracking: Robust matching and tracking of articulated objects using a view-based representation. International Journal of Computer Vision, Vo1.26, No.1, pp.63-S4, 1995.M. Isard and A. Blake. CONDENSATIONConditional Density Propagation for Visual Tracking.International Journal of Computer Vision, Vo1.29, No.1, pp.5-2S, 1995 [9] Hanna Goszczynska, Object Tracking, Intech publication. R. Collins, A. Lipton, T. Kanade, H. Fujiyoshi, D. Duggins, Y. Tsin,D. Tolliver, N. Enamoto, and Hasegawa, ‖System for Video Surveillance and monitoring, Technical Report CMU-RI-TR-00-12,‖ Robotics Institute, Carneige Mellon University, 2000. [10] T.J. Olson, F.Z. Brill, Moving object detection and event recognition algorithm for smart cameras, Proceedings of DARPA Image Understanding Workshop, 1997, pp. 159–175. D. Conte, P. Foggia, C. Guidobaldi, A. Limongiello, M. Vento, An object tracking algorithm combining different cost functions, Lecture in Computer Science, vol. 3212, Springer, Berlin, 2004, pp. 614–622 [11] J.P. Mammen, S. Chaudhuri, T. Agrawal, Hierarchical recognition of dynamic hand gestures for telerobotic application, IETE Journal of Research Special Issue on Visual Media Processing 48 (3/4) (2002)245–252.J.B. Martinkauppi, M.N. Soriano, M.H. Laaksonen, Behaviour of skin color under varying illumination seen by different cameras at different color spaces, in: M.A. Hunt (Ed.), Proceedings of the SPIE, Machine Vision in Industrial Inspection IX, vol. 4301, San Jose, CA, 2001, pp. 102–113. [12] E. Trucco, K. Plakas, Video tracking: A concise survey, IEEE Journal of Oceanic Engineering 31 (2) (2006) 520–529. C¸ .E. Erdem, A.M. Tekalp, B. Sankur, Video object tracking with feedback of performance measures, IEEE Transactions on Circuits and Systems for Video Technology 13 (4) (2003) 310–324. [13] S.D. Cochran, G. Medioni, 3-D surface description from binocular stereo, IEEE Transactions on Pattern Analysis and Machine Intelligence 14 (10) (1992)981_994.E. Parrilla, J. Riera, M.H. Giménez, J.R. Torregrosa, J.L. Hueso, Cálculo de velocidades mediante un sistema estereoscópico y algoritmos de flujo óptico,Congreso de Ecuaciones Diferenciales y Aplicaciones (2005). [14] W. Hu, T. Tan, L. Wang, S. Maybank, A survey on visual surveillance of object motion and behaviors,, IEEE Transactions on Systems, Man, and Cybernetics,Part C: Applications and Reviews 34 (2004) 334–352. M. Liu, C. Wu, Y. Zhang, A review of traffic visual tracking technology, in:Proceedings of the International Conference on Audio, Language and Image Processing ICALIP, 2008, pp. 1016–1020
Monica Pradhan, Sidharth Swarup Rautaray "Current Scenario of Object Tracking: A Survey " International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 1, pp.60-68 2015
This paper examines the benefits and cost of improving residential structures in middle-income developing countries such that they are less vulnerable to hazards during their lifetime. Since the challenges for cost benefit analysis are to express avoided losses in probabilistic terms, evaluate and assess risk, direct and indirect benefits, land use and climate. In detail, we examineearthquake risk. The purpose in undertaking these analyses is to shed light another benefits and costs over time, recognizing the bounds of the analysis, and to demonstrate a systematic probabilistic approach for evaluating alternative risk reducing measures.
- Page(s): 69-72
- Date of Publication: January 2015
- Gaurav Chandrakant VisputeDepartment of Civil Engineering, Dr. D.Y. Patil School of Engineering & Technology, Dr. D.Y. Patil Knowledge City, Charoli (BK), Lohegaon, Pune-412105 Maharashtra, India
- Pranay Raju KhareDepartment of Civil Engineering, Dr. D.Y. Patil School of Engineering & Technology, Dr. D.Y. Patil Knowledge City, Charoli (BK), Lohegaon, Pune-412105 Maharashtra, India
References
[1] Barnett B.J., C.B. Barrett, and J.R.Skees (2008). ―Poverty Traps and Index-Based Risk Transfer Products.‖ World Development Vol.36,pp. 1766-1785. [2] Benson C. and J. Twigg. (2004). ―Measuring mitigation: Methodologies for assessing natural hazard risks and the net benefits of mitigation - A scoping study.‖ Geneva: International Federation of Red Cross and Red Crescent societies / ProVention Consortium. Vol. 21(1), pp. 141-160 [3] Dixit, A., A. Pokhrel, and M. Moench. 2009. ―Qualitative Assessment of the Costs and Benefits of Flood Mitigation.‖ Catalyzing Climate and Disaster Resilience. Kathmandu: ISET. Vol.95(3), pp. 5-29 [4] Linnerooth-Bayer, J., R. Mechler and G. P flug. (2005). ―Refocusing Disaster Aid.‖ Science. Vol (309), pp. 1044-1046. [5] Cavallo, E. and I. Noy. (2010). ―The Economics of Natural Disasters.‖ A Survey. IDB working paper series 124. Washington, DC: Inter-American Development Bank.Vol. 124, pp. 302-306. [6] Cropper, M. and S. Sahin. (2008). ―Valuing Mortality and Morbidity in the Context of Disaster Risks.‖ Background paper for the joint World Bank – UN assessment on disaster risk reduction. Washington, D.C: World Bank. Vol. 26(4), pp. 56-61.
Gaurav Chandrakant Vispute, Pranay Raju Khare "Economic Analysis of Residential Building Using Cost Benefit Ratio" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 1, pp.69-72 2015
This paper presents a ZCS/ZVS Push Pull DC /DC converter. The purposed converter that converts a value of direct current to another value of direct current that can produce 250V output voltage from 12V input voltage. Some of the components that use in this paper is a high frequency transformer, and full bridge rectifier. The MATLAB simulation implementation also usesMOSFETs as a switching device due to its high power rating and high switching speed. Consequently, the design circuit will deliver accurate output value with low power losses and small output ripples because this converter has its own filter. The voltage across primary side device is independent of duty cycle with varying input voltage and output power and clamped at rather low reflected output voltage enabling the use of low voltage semiconductor devices. Analysis, design, and simulation results are presented.
- Page(s): 73-79
- Date of Publication: January 2015
- Veeresh HAssistant Professor, EE Dept, A.M.G.O.I, Kolhapur, Maharastra, India
- Dr. Ashok KusagurrAssociate Professor,UBDTCE, Davangere, Karnataka, India
References
[1.] A. Khaligh and Z. Li, “Battery, ultracapacitor, fuel cell, and hybrid energy storage systems for electric, hybrid electric, fuel cell, and plug-in hybrid electric vehicles: State of the art”, IEEE Trans. on Vehicular Technology, vol. 59, no. 6, pp. 2806- 2814, Oct. 2009. [2.] A. Emadi, and S. S. Williamson, “Fuel cell vehicles: opportunities and challenges,” in Proc. IEEE PES, 2004, pp. 1640-1645. [3.] K. Rajashekhara, “Power conversion and control strategies for fuel cell vehicles,” in Proc. IEEE IECON, 2003, pp. 2865-2870. [4.] A. Emadi, S. S. Williamson, and A. Khaligh, “Power electronics intensive solutions for advanced electric, hybrid electric, and fuel cell vehicular power systems,” IEEE Trans. Power Electron., vol. 21, no. 3, pp. 567–577, May. 2006. [5.] A. Emadi, K. Rajashekara, S. S. Williamson, and S. M. Lukic, “Topological overview of hybrid electric and fuel cell vehicular power system architectures and configurations” IEEE Trans. on Vehicular Technology, vol. 54, no. 3, pp. 763–770, May. 2005. [6.] T.-F. Wu, Y.-C.Chen, J.-G.Yang, and C.-L. Kuo, “Isolated bidirectional full-bridge DC–DC converter with a flyback snubber,” IEEE Trans. Power Electron., vol. 25, no. 7, pp. 1915–1922, Jul. 2010. [7.] Y. Kim; I. Lee; I.Cho; G. Moon, “Hybrid dual full-bridge DC–DC converter with reduced circulating current, output filter, and conduction loss of rectifier stage for RF power generator application," IEEE Trans. Power Electron., vol.29, no.3, pp.1069-1081, March 2014 [8.] Corradini, L.,Seltzer, D., Bloomquist, D., Zane, R., Maksimović, D., Jacobson, B., "Minimum Current Operation of Bidirectional Dual-BridgeSeries Resonant DC/DC Converters", IEEE Trans. Power Electron.,vol. 27, no.7, pp.3266-3276, July 2012. [9.] X. Li and A. K. S. Bhat, “Analysis and design of high-frequency isolated dual-bridge series resonant DC/DC converter,” IEEE Trans. Power Electron., vol. 25, no. 4, pp. 850–862, Apr. 2010 [10.] R.-J. Wai, C.-Y.Lin, and Y.-R. Chang, “High step-up bidirectional isolated converter with two input power sources,” IEEE Trans. Ind. Electron., vol. 56, no. 7, pp. 2629–2643, Jul. 2009. [11.] Lizhi Zhu, “A Novel Soft-Commutating Isolated Boost Full-bridge ZVS-PWM DC-DC Converter for Bi-directional High Power Applications,” IEEE Trans. Power Electron., vol. 21, no. 2, pp. 422–429, Mar. 2006. [12.] P. Xuewei and A. K. Rathore, “Novel Interleaved Bidirectional Snubberless Soft-switching Current-fed Full-bridge Voltage Doubler for Fuel Cell Vehicles,” IEEE Transactions on Power Electronics, vol. 28, no. 12, Dec. 2013, pp. 5355-5546. [13.] A. K. Rathore and U. R. Prasanna, “Analysis, Design, and Experimental Results of Novel Snubberless Bidirectional Naturally Clamped ZCS/ZVS Current-fed Half-bridge Dc/Dc Converter for Fuel Cell Vehicles,” IEEE Trans. Ind. Electron., no.99, Aug. 2012. [14.] S. J. Jang, C. Y. Won, B. K. Lee and J. Hur, “Fuel cell generation system with a new active clamping current-fed half-bridge converter,” IEEE Trans. on Energy Conversion, vol. 22, no.2, pp. 332-340, June 2007. [15.] S. Han, H. Yoon, G. Moon, M. Youn, Y. Kim, and K. Lee, “A new active clamping zero-voltage switching PWM current-fed half bridge converter,” IEEE Trans. Power Electron., vol.20, no.6, pp 1271-1279, Nov.2006. [16.] Tsai-Fu Wu, Jin-Chyuan Hung, Jeng-Tsuen Tsai, Cheng-Tao Tsai, and Yaow-Ming Chen, “An active-clamp push-pull converter for battery sourcing application,” IEEE Trans. Industry Application., vol.44, no.1, pp.196-204, Jan.2008. [17.] C.L. Chu and C.H. Li, “Analysis and design of a current-fed zero-voltage-switching and zero-current-switching CL-resonant push-pull dc-dc converter,” IET Power Electron., vol. 2, no. 4, pp. 456–465, Jul. 2009. [18.] R. Y. Chen, R. L. Lin, T. J. Liang, J. F. Chen, and K. C. Tseng, “Current-fed full-bridge boost converter with zero current switching for high voltage applications,” Fourtieth IAS Annual Meeting. Conference Record of the 2005 Industry Applications Conference, 2005, pp. 2000-2006. [19.] Stanislaw Jalbrzykowski and TadeuszCitko, “Current-Fed Resonant Full-Bridge Boost DC/AC/DC Converter,” IEEE Trans. Ind. Electron., vol. 55, no.3 ,pp.1198-1205, March 2008. [20.] Tsorng-Juu Liang; Ren-Yi Chen; Jiann-Fuh Chen; Wei-Jin Tzeng; , "Buck-type current-fed push-pull converter with ZCS for high voltage applications," TENCON 2007 - 2007 IEEE Region 10 Conference, Oct. 30 2007-Nov. 2 2007, pp.1-4. [21.] F. Krismer, J. Biela, and J.W. Kolar, “A comparative evaluation of isolated bi-directional DC/DC converters with wide input and output voltage range,” Fourtieth IAS Annual Meeting in Industry Applications Conference, 2005, pp.599-606. [22.] M. Mohr and F.-W. Fuchs, “Voltage fed and current fed full bridge converter for the use in three phase grid connected fuel cell systems,” in Proc. IEEE Int. Power Electron. Motion Control Conf., 2006, pp. 1–7. [23.] Akshay K Rathore and Prasanna UR, “Comparison of soft-switching voltage-fed and current-fed bi-directional isolated Dc/Dc converters for fuel cell vehicles,” in Proc. IEEE ISIE, May 2012, pp. 252-257. [24.] Kunrong Wang, Fred C. Lee, and Jason Lai, “Operation Principles of Bi-directional Full-bridge DC/DC Converter with Unified Soft switching Scheme and Soft-starting Capability,” in Proc. IEEE APEC, 2000. pp.111-118. [25.] G. Chen. Y. Lee, S. Hui. D. Xu, and Y. Wang, “Actively clamped bi-directional flyback convener," IEEE Trans Ind. Electron., vol. 47, no. 4, pp. 770-779, Aug. 2000 [26.] Ahmad Mousavi, Pritam Das, and Gerry Moschopoulos, “ A comparative study of a new ZCS DC–DC full-bridge boost converter with a ZVS active-clamp converter,” IEEE Trans. Power Electron., vol. 27, no. 3, pp. 1347–1358, Mar. 2012. [27.] S. W. Leung, H. S. H. Chung, and T. Chan, “A ZCS isolated full-bridge boost converter with multiple inputs,” in Proc. IEEE Power Electron. Spec. Conf. (PESC), 2007, pp. 2542–2548. [28.] A. Averberg, K. R. Meyer, and A. Mertens, “Current-fed full bridge converter for fuel cell systems,” in Proc. IEEE Power Electron. Spec. Conf. (PESC), 2008, pp. 866–872. [29.] T. Reimann, S. Szeponik, G. Berger, and J. Petzoldt, “A novel control principle of bidirectional dc–dc power conversion,” in Proc. IEEE PESC’97 Conf., 1997, pp. 978–984. [30.] Udupi R. Prasanna, Akshay K. Rathore, and Sudip K. Mazumder, “Novel Zero-Current-Switching Current-Fed Half-Bridge Isolated DC/DC Converter for Fuel-Cell-Based Applications,” IEEE Trans. Industry Application., vol.49, no.4, pp.1658-1668, July, 2013 [31.] Z.Wang and H. Li, “A soft switching three-phase current-fed bidirectional DC-DC converter with high efficiency over a wide input voltage range,” IEEE Trans. Power Electron., vol. 27, no. 2, pp. 669–684, Feb. 2012.
Veeresh H, Dr. Ashok Kusagur "ZCS/ZVS Push Pull DC/DC Converter" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 1, pp.73-79 2015
Customers and sellers enter a business relationship over a period of time. Relationships are assumed to grow, deteriorate, and dissolve as a consequence of many interactions. Loyalty develops in the relationship owing to number of repeated transactions. Today, concept of loyalty is a key factor in business relationship. This paper tries to presents brief idea of loyalty in customer seller relationship. It focuses on what exactly loyalty is in customer seller relationship. It presents an economic perspective of loyalty. This is an attempt to contribute to a better understanding of how loyalty in customer seller relationship emerges, reasons for it and under what conditions, customer and seller move away from loyalty. Present paper firstly proposes an economic perspective of loyalty in customer seller relationship, then dynamics of loyalty is discussed followed by a virtuous cycle of customer value enhancement through loyalty then thresholds of loyalty and at the end it state reasons for moving away from loyalty.
- Page(s): 80-83
- Date of Publication: January 2015
- Dr. Prafulla A. PawarProfessor, Department of Management Sciences (PUMBA), Savitribai Phule Pune University, Pune - 411007, (M.S.) India
- Paresh P. PandeResearch Fellow, Department of Management Sciences (PUMBA),Savitribai Phule Pune University, Pune- 411007, (M.S.) India
References
[1] Bejou, D. (1997). Relationship marketing: Evolution, present state, and future. Psychology & Marketing, 14, 727–735. [2] Bodet, G., & Bernache-Assollant, I. (2011). Consumer loyalty in sport spectatorship services: The relationships with consumer satisfaction and team identification. Psychology & Marketing, 28, 781–802. [3] Brunner, T. A., St¨ocklin, M., & Opwis, K. (2006). Satisfaction, image and loyalty: New versus experienced customers. European Journal of Marketing, 42, 1095–1105. [4] Cox, A. E., & Walker, O. C. (1997). Reactions to disappointing performance in manufacturer-distributor relationships: The role of escalation and resource commitments. Psychology & Marketing, 14, 791–821. [5] Dick, A., & Basu, K. (1994). Customer Loyalty Toward an Integrated Conceptual Framework. Journal of the Academy of Marketing Science , 12, 99-103. [6] Gr¨onroos, C. (1994). From marketing mix to relationship marketing: Towards a paradigm shift in marketing. Management Decision, 32, 4–20. [7] Hunt, S. D., Arnett, D. B., & Madhavaram, S. (2006). The explanatory foundations of relationship marketing theory. Journal of Business & Industrial Marketing, 21, 72– 87. [8] Johnson, M. D., & Selnes, F. (2004). Customer portfolio management: Toward a dynamic theory of exchange relationships. Journal of Marketing, 68, 1–17. [9] Lacey, R. (2009). Limited Influence of Loyalty Program Membership on Relational Outcomes. Journal of Consumer Marketing , 392-402. [10] Mohr, J., Fisher, R. J., & Nevin, J. R. (1996). Collaborative communication in interfirm relationships: Moderating effects of integration and control. Journal of Marketing, 60,103–115 [11] Mohr, J., & Nevin, J. R. (1990). Communication strategies in marketing channels: A theoretical perspective. Journal of Marketing, 54, 36–52 [12] Morgan, R. M, & Hunt, S. D. (1994). The commitment-trust theory of relationshipMarketing. Journal of Marketing, 58, 20–38 [13] Oliver, R. (1999). Whence consumer Loyalty? Journal of Marketing , 33-44. [14] Pahariya, R. (2013). Loyalty 3.0 How BIG DATA and GAMIFICATION Are Revolutionizing Customer and Employee Engagement. New York: McGrawHill Education. [15] Palmatier, R. W. (2008). Interfirm relational drivers of customer value. Journal of Marketing, 72, 76–89. [16] Peterson, R. A. (1995). Relationship marketing and the consumer. Journal of the Academy of Marketing Science, 23, 278–281 [17] Reichheld, F. (2003). The One Number You Need to Grow. Harvard Business Review , 11, 1-11. [18] Sheth, J. N., & Parvatiyar, A. (1995). Relationship marketing in consumer markets: Antecedents and consequences. Journal of the Academy of Marketing Science, 23, 255–271. [19] Vargo, S. L.,&Lusch, R. F. (2004). Evolving to a new dominant logic for marketing. Journal of Marketing, 68, 1–17. [20] Vyas, P., & Sinha, P. (2008). Loyalty Programmes: Practices, Avenues and Challenges. [21] Ward, T., & Dagger, T. S. (2007). The complexity of relationship marketing for service customers. Journal of Services Marketing, 21, 281–290.
Dr. Prafulla A. Pawar, Paresh P. Pande "Enhancing Total-Value Creation through Loyalty in Customer-Seller Relationships" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 1, pp.80-83 2015
The fast increasing power of personal mobiledevices (Smartphone,Tabletsetc) provides social interaction to users in early life. Recently many mobile entertaining or media application have been launched but most popular apps like Facebook,Twitter,Youtube have larger demand among users. But these media application are limited by the unstable wireless connectivity & limited battery lifetime of mobile devices due to this problem a quality of service encountered by the users. To avoid these problems Cloud Computing technology has been used. In this paper we discuss the design of Cloud based novel Mobile Social TV (CloudMOV) which utilizes both PaaS(Platform-as-a-Service) and IaaS(Infrastructure-as-a-Service) cloud services to offers the living room experience of video streaming site like Youtube etc and invite their friends or family for watch video simultaneously. They can also chatting and social interaction with each other while watching the video.
- Page(s): 84-87
- Date of Publication: January 2015
- SanapSandip M.Department of Computer Engineering ShriChhatrapatiShivaji College of Engineering, Shrishivajinagar, India
- Avhad Vinay S.Department of Computer Engineering, ShriChhatrapatiShivaji College of Engineering, Shrishivajinagar, India
- Shewale Yogesh B.Department of Computer Engineering, ShriChhatrapatiShivaji College of Engineering, Shrishivajinagar, India
- Doke Sagar G.Department of Computer Engineering,ShriChhatrapatiShivaji College of Engineering, Shrishivajinagar, India
- Ware RajendraDepartment of Computer Engineering, ShriChhatrapatiShivaji College of Engineering, Shrishivajinagar, India
References
[1] Yu Wu, Zhizhong Zhang, Chuan Wu, Member,IEEE, Zongpeng Li, and Francis C. M. Lau” Cloud Mov: Cloud-Based Mobile Social TV”, IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 15, NO. 4, JUNE 2013 [2] M. Satyanarayanan, P. Bahl, R. Caceres, and N. Davies, “The case for VM-based Cloudlets in mobile computing,” IEEE Pervasive Comput., vol. 8, pp. 14–23, 2009. [3] S. Kosta, A. Aucinas, P. Hui, R. Mortier, and X. Zhang, “Thinkair: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading,” in Proc. IEEE INFOCOM, 2012. [4] Z. Huang, C. Mei, L. E. Li, and T. Woo, “Cloudstream: Delivering high-quality streaming videos through a cloud-based SVC proxy,” in Proc. INFOCOM’11, 2011, pp. 201–205. [5] T. Coppens, L. Trappeniners, and M. Godon, “AmigoTV: Towards a social TV experience,” in Proc. EuroITV, 2004. [6] N. Ducheneaut, R. J. Moore, L. Oehlberg, J. D. Thornton, and E. Nickell, “Social TV: Designing for distributed, sociable television viewing,” Int. J. Human-Comput. Interaction, vol. 24, no. 2, pp. 136–154, 2008
SanapSandip M. , Avhad Vinay S., Shewale Yogesh B., Doke Sagar G., Ware Rajendra "CloudMOV: Cloud Based Mobile Social TV" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 1, pp.84-87 2015
In this paper, a robust substitution technique is used to implement proposed work of audio steganography. Steganography is an art and science methodology of writing hidden messages such a way that no one apart from the intended reciever knows the existence of the secret message data. This technique resolves the various inherent issues ,after that it increases the data hiding capacity while being also achieve robustness from various intentional as well as unintentional hacking attacks.like this it provides privacy to data. The strength of our algorithm is depend on the segment size and its used to achieve very high embedding capacity for different data type that can reach up to 25% from the input audio file size.We are developing two novel approaches of substitution technique of audio steganography that improves the capacity of cover audio which for embedds additional data. Using these methods, messages are embedded into multiple LSB bits. This technique utilizes up to 7 LSBs for embedding data. Results show that both these techniques improve data hiding capacity of cover audio by 25% to 85% These latest approaches for increasing capacity show better results as compared to the existing techniques.
- Page(s): 88-91
- Date of Publication: January 2015
- Pooja KengaleB.E Final Year,Sinhgad Institute of Technology, Lonavala, Maharashtra, India Jaipur, Rajasthan
- Rakhi KadamB.E Final Year, Sinhgad Institute of Technology, Lonavala, Maharashtra, India Jaipur, Rajasthan
- Rajkumar ChaudhariB.E Final Year, Sinhgad Institute of Technology, Lonavala, Maharashtra, India Jaipur, Rajasthan
- Prof. Sagare SirB.E Final Year, Sinhgad Institute of Technology, Lonavala, Maharashtra, India Jaipur, Rajasthan
References
[1] Zamani M., Ahmad R.B., Manaf A.B.A., Zeki A.M., “An Approach to Improve the Robustness of Substitution Techniques of Audio Steganography”, in Proc. IEEE International Conference on Computer Science an Information Technology, ICCSIT pp: 5-9, 2009. [2] Zaidoon Kh. A.A.Zaidan, B.B.Zaidan and Hamdan . O.Alanazi, Overview: Main Fundamentals for Steganography, journal of computing, volume 2, issue 3, march 2010, ISSN 2151-9617. [3] Sos S. Agaian, David Akopian and Sunil A. DÆSouzaö” TWO ALGORITHMS IN DIGITAL AUDIO STEGANOGRAPHY USING QUANTIZED FREQUENCY DOMAIN EMBEDDING AND REVERSIBLE INTEGER TRANSFORMS” Non-linear Signal Processing Lab, University of Texas at SanAntonio,Texas 78249, USA [4] Ashwini Mane, Gajanan Galshetwar and Amutha Jeyakumar,”DATA HIDING TECHNIQUE: AUDIOSTEGANOGRAPHYUSING LSB TECHNIQUE” International Journal of Engineering Research and Applications (IJERA),Vol. 2, Issue 3, May-Jun 2012, pp.1123-1125 [5] Neil Jenkins, Jean Everson Martina ,ö Steganography in Audioö Anais do IX Simp≤sio Brasileiro em Seguranτa da Informaτπo e de Sistemas Computacionais page: 269-278,2007 [6] Gruhl D, Lu A, Bender W. Echo hiding. Lecture Notes in Computer Science, 1996, 1174: 295-315. [7] Dumitrescu S, Wu Xiaolin, Wang Zhe. Detection of LSB steganography via sample pair analysis. IEEE Transactions on Signal Processing, 2003, 51(7): 1995-2007. [8] R SRIDEVI, DR. A DAMODARAM, DR. SV L.NARASIMHAM, " E f f i c i e n t M e t h o d o f A u d i o Steganography by Modified LSB Algorithm and Strong Encryption Key with Enhanced Security", in Proc. J A TIT PP:768-77 1,2005-2009. [9] Gopalan, K. and S. Wenndt, Audio Steganography for Covert Data Transmission by imperceptible Tone Insertion. in Proc. The IASTED International Conference on Communication Systems and Application (CSA 2004), Banff, Canada, July 8-10, 2004. [10] Bret Dunbar, "A Detailed Look at Steganographic Systems and their Use in Open-Systems Environment" in SANS Institute I n f o s e c R e a d i n g r o o m , A u g u s t 0 I , 2002,url:https://www.sans.org/readingroom/whitepapers/co vertldetailed-steganographic-techniques-open-systemsenvironment- 677 [11] Neil Jenkins, Jean Everson Martina ,ö Steganography in Audioö Anais do IX Simp≤sio Brasileiro em Seguranτa da Informaτπo e de Sistemas Computacionais page: 269-278,2007 [12] Zamani M., Ahmad R.B., Manaf A.B.A., Zeki A.M., ôAn Approach to Improve the Robustness of Substitution Techniques of Audio Steganographyö, in Proc. IEEE International Conference on Computer Science and Information Technology, ICCSIT pp: 5-9, 2009. [13] ôaudio steg : overviewö, Internet publication on www.snotmonkey.com https://www.snotmonkey.com/work/school/405/overview.html. [14] Nedeljko Cvejic , Algorithms for audio watermarking and Steganography http//herkules.oulu.fi/isbn9514273842/isbn9514273842.pdf.
Pooja Kengale, Rakhi Kadam, Rajkumar Chaudhari, Prof. Sagare Sir "Data Hiding In Audio by Using Audio Steganography" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 1, pp.88-91 2015
Unmanned Aerial Vehical (UAV) is an aircraft with no pilot onboard.UAV have great potential as a platform for acquiring very high resolution aerial imagery for disaster management. This paper presents the objectives to provide a summary of the current commercial, open source on UAV. It also describes the intelligence, reconnaissance, surveillances and real time applications of UAV in recent times.
- Page(s): 92-95
- Date of Publication: January 2015
- Deepika . S Final Year, Dept. of ECE, GSSSIETW, Mysore, India
- Lavanya . GFinal Year, Dept. of ECE, GSSSIETW, Mysore, India
References
[1.] HaiYang Chao, YongCan Cao, and YangQuan Chen, International Journal of Control, Automation, and Systems (2010) [2.] Andrea. S. Laliberte, Jornada Experimental Range, New Mexico State University, Las Cruces, New Mexico 88003 [3.] Albert Rango, USDA-Agricultural Research Service, Jornada Experimental Range, Las Cruces, New Mexico 88003,R H Wilde and C M Trotter, Landcare Research Private Bag 11-052New Zealand.. [4.] Vince Ambrosia, CA. State University-Monterey Bay, NASA-Ames. [5.] "Air Force officials announce remotely piloted aircraft pilot training pipeline", www.af.mil, June 9, 2010. [6.] Jump up^ Pir Zubair Shah (June 18, 2009). "Pakistan Says U.S. Drone Kills 13". New York Times. [7.] Jump up^ Tice, Brian P. (Spring 1991). "Unmanned Aerial Vehicles – The Force Multiplier of the 1990s" [8.] Azoulai, Yuval (October 24, 2011). "Unmanned combat vehicles shaping future warfare". Globes. [9.] Jump up^ Levinson, Charles (January 13, 2010). "Israeli Robots Remake Battlefield".The Wall Street Journal. p. A10. Retrieved January 13, 2010.
Deepika . S, Lavanya . G "Unmanned Aerial Vehicles and Applications using Image Processing" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 1, pp.92-95 2015
Text password is commonly used for the user authentication on websites due to its convenience and simplicity. However, users’ passwords are easily hack . Firstly, users often select weak passwords and reuse the same passwords across different websites. User continuously use same password causes a domino effect, when we will use one password, she will exploit it to gain access to more websites. Second, typing passwords into untrusted computers suffers password thief threat. An adversary can launch several password stealing attacks to snatch passwords, such as phishing, keyloggers and malware. We design a user authentication protocol named oPass which leverages a user’s cellphone and short message service to thwart password stealing and password reuse attacks. oPass only requires each participating own phone number, and involves a telecommunication service provider in registration and recovery phases. Through oPass, users only need to remember a long-term password for login on all websites.
- Page(s): 96-99
- Date of Publication: January 2015
- Amol GaykarDepartment of Computer Engineering University of Pune, Shri ChhtrapatiShivaji College of Engineering, Rahuri, Shrishivajinagar, India
- Prasad NikamDepartment of Computer Engineering University of Pune, Shri ChhtrapatiShivaji College of Engineering, Rahuri, Shrishivajinagar, India
- Abhijit VelhalDepartment of Computer Engineering University of Pune, Shri ChhtrapatiShivaji College of Engineering, Rahuri, Shrishivajinagar, India
- Avinash KharadeDepartment of Computer Engineering University of Pune, Shri ChhtrapatiShivaji College of Engineering, Rahuri, Shrishivajinagar, India
- Prof. M.S.DigheDepartment of Computer Engineering University of Pune, Shri ChhtrapatiShivaji College of Engineering, Rahuri, Shrishivajinagar, India
References
[1] IEEE Transactions On Information Forensics And Security, Vol. 7, No. 2, APRIL 2012 :oPass: A User Authentication Protocol Resistant To password Stealing And Password Reuse Attacks. [2] Industrial Engineering And Engineering Management, 2008. IEEM 2008. IEEE International Conference On " An Application Of OR And IE Technology In Bank Service System Improvement”. [3] Wireless Communications, Networking And Mobile Computing, 2007. Wicom 2007. International Conference On: “Study On Anti-money Laundering Service System Of Online Payment Based On Union-bank Mode” . [4] www.wikipedia.com Bank services security
Amol Gaykar, Prasad Nikam, Abhijit Velhal, Avinash Kharade., Prof. M.S.Dighe. "Real Time Application Security by Using Opass Security Algorithm." International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 1, pp.96-99 2015
This paper presents a business model for cloud computing on a separate encryption and decryption service. Cloud Computing is evolving and considered next generation architecture for computing. Typically cloud computing is a combination of computing resources accessible via internet. Historically the client or organizations store data in data centers with firewall and other security techniques used to protect data against intrudes to access the data. Since the data was confined to data centers in limits of organization, the control over the data was more and well defined procedures could be used for accessing its own data. However in cloud computing, since the data is stored anywhere across the globe, the client organizations have less control over the stored data. To build the trust for the growth of cloud computing the cloud providers must protect the user data from unauthorized access and disclosure. One technique could be encrypting the data on client side before storing it in cloud storage. Divide and rule can be one of the techniques, meaning dividing the responsibilities among different cloud services providers can benefits the client. Storing the data in encrypted form is a common method of information privacy protection. If a cloud system is responsible for both tasks on storage and encryption/decryption of data, the system administrators may simultaneously obtain encrypted data and decryption keys. This allows them to access information without authorization and thus poses a risk to information privacy. This study proposes a business model for cloud computing based on the concept of separating the encryption and decryption service from the storage service. Furthermore, the party responsible for the data storage system must not store data in plain text, and the party responsible for data encryption and decryption must delete all data upon the computation on encryption or decryption is complete.
- Page(s): 100-103
- Date of Publication: January 2015
- Shishir A. VermaComputer Engineering, Pune University, Shri Chhattrapati Shivaji College of Engineering, India
- Mayur D. PatilComputer Engineering, Pune University, Shri Chhattrapati Shivaji College of Engineering, India
- Mangesh M. SatheComputer Engineering, Pune University, Shri Chhattrapati Shivaji College of Engineering, India
- Thakare D. ChetanComputer Engineering, Pune University, Shri Chhattrapati Shivaji College of Engineering, India
- Prof. Mohit DigheComputer Engineering, Pune University, Shri Chhattrapati Shivaji College of Engineering, India
References
[1] Gargee Sharma, Prakriti Trivedi, “A Model for Data Protection Based on the Concept of Secure Cloud” Computing,Volome:2, Issue: 3,March 2012. [2] Vishakha Lokhand ,Prasanna Kumari P. “Efficient Encryption and Decryption Services for Cloud Computing”, Vol I Issue 2 December 2012. [3] Jing-Jang Hwang and Hung-kai Chuang, Yi-Chang Hsu and Chein-Hsing Wu,”A Business Model for Cloud Computing Based on a Separate Encryption and Decryption Service”, 978-1-4244-9224-a/11/2011 IEEE. [4] Mrs.I.Golda Selia, S.K. Madhumithaa, “CRM system in Cloud Computing with Different Service Providers”, ISSN:2250-3005. [5] Rajiv R Bhandari, Prof. Nitin Mishra Cloud Computing A CRM Service Based on Separate Encryption and Decryption Usinf Blowfish Algorithm, volume: 1,issue: 4, ISSN 2321-8169.
Shishir A. Verma, Mayur D. Patil, Mangesh M. Sathe , Thakare D. Chetan, Prof.Mohit Dighe "A Business Model for Cloud Computing on a Separate Encryption and Decryption Service" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 1, pp.100-103 2015
This paper presents designing a Color Barcode for Mobile Applications, 2D barcodes have gained popularity as one of the key pervasive technologies for mobile applications on smart phones. They can be used as shortcuts to URL links, a means to store contact information for easy transfer admission tickets or boarding passes and tokens for retrieving digital information, such as public transportation timetables or fresh produce production information, either directly from the barcode itself or through a networked database server. Most mobile applications use black-and-white 2D barcodes that carry only a limited amount of encoded data. A color barcode framework for mobile phone applications by exploiting the spectral diversity aborted by the cyan (C), magenta (M), and yellow (Y) print colorant channels commonly used for color printing and the complementary red (R),green (G), and blue (B) channels, respectively, used for capturing color images. Specifically, we exploit this spectral diversity to realize a three-fold increase in the data rate by encoding independent data in the C, M, and Y print colorant channels and decoding the data from the complementary R, G and B channels captured via a mobile phone camera. To mitigate the effect of cross-channel interference among the printcolorant and capture color channels, we develop an algorithm for interference cancellation. To estimate the model parameters required for crosschannel interference cancellation, we propose two alternative methodologies: a pilot block approach that uses suitable selections of colors for the synchronization blocks and an expectation maximization approach that estimates the parameters from regions encoding the data.
- Page(s): 104-107
- Date of Publication: January 2015
- Gadhave Ashwini VUniversity of Pune, Shri ChhatrapatiShivaji College of Engineering, Rahuri Factory. (Shrishivajinagar), India
- Patil Bhagyashri DUniversity of Pune, Shri ChhatrapatiShivaji College of Engineering, Rahuri Factory. (Shrishivajinagar), India
- Surve Priyanka RUniversity of Pune, Shri ChhatrapatiShivaji College of Engineering, Rahuri Factory. (Shrishivajinagar), India
- Patil Sneha B.University of Pune, Shri ChhatrapatiShivaji College of Engineering, Rahuri Factory. (Shrishivajinagar), India
- Prof. S.J.GhuleUniversity of Pune, Shri ChhatrapatiShivaji College of Engineering, Rahuri Factory. (Shrishivajinagar), India
References
[1] Henryk Blasinski, Student Member, IEEE, Orhan Bulan, and Gaurav Sharma, Fellow, \Per-Colorant-Channel Color Barcodes for Mobile Applica tions: An Interference Cancellation Framework ", IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 22, NO.4, APRIL 2013. [2] Keng T. Tan Hong Kong Baptist University Douglas Chai, Hiroko Kato, and Siong Khai Ong, \Proceedings of the International Multiconference on Computer Science", 1536-1268/12/31.00 2012 Edith Cowan University [3] Marco Querini and Giuseppe F. Italiano H. Kato and K. T. Tan, 2D barcodes for camera phone applications ", vol.6, no.4, pp.7685, Oct. Dec. 2007. [4] Antonio Grillo, Alessandro Lentini , Marco Querini and Giuseppe F. Italiano, \High Capacity Colored Two Dimensional Codes ", 709?716 ISBN 978-83-60810-27-9,2013 Email: grillo;lentini;italiano@disp. [5] Homayoun Bagherinia,\A Theory of Color Barcodes", Depart- ment of Electrical Engineering University of California, Santa Cruz hbagheri@soe.ucsc.edu [6] Hao Wang, and Yanming Zou, \2D Bar Codes Reading: Solutions for Camera Phones", World Academy of Science, Engineering and Technology International Journal of Computer, Information, Systems and Control Engineering Vol:1 No:6, 2007 [7] Lekshmi JV, Ajusha AL, \QR Barcode tilt correction and recognition based on image processing", ANALYSIS QR BARCODE Indian Journal of Engineering, Volume 4, Number 9, July 2013 [8] Priyanka Gaur, Shamik Tiwari, \2D QR Barcode Recognition Using Texture Features and Neural Network", International Journal of Research in Advent Technology, Vol.2, No.5, May 2014 E-ISSN: 2321-9637.
Gadhave Ashwini V., Patil Bhagyashri D., Surve Priyanka R., Patil Sneha B., Prof. S.J.Ghule "Designing a 2D Color Barcode for Mobile Application" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 1, pp.104-107 2015
Nowadays, Smartphones are very powerful, and many its applications use wireless multimedia communications. The prevention from the outside dangers (threats) has become a big concern nowadays for the experts. Android operating system has become one of the most popular operating system for Smartphone; Android security has become a big problem nowadays. Because of the free application it provides and the feature which makes it very easy for anyone to develop it. However, there are many systems proposed to provide the security by number of researchers working to solve this problem. In this article, we focus on security issues related to Android Smartphone. Specifically, we discuss several new attacks that are based on the use of phone. We implement the attacks on real phones, and demonstrate the feasibility and effectiveness of these kinds of attacks. Furthermore, we implemented a simple defense scheme that can effectively detect these attacks.
- Page(s): 108-110
- Date of Publication: January 2015
- Prof. Ghule SheetalDepartment of Computer Engineering, University of Pune, Shri ChhatrapatiShivaji College of Engineering, Rahuri Factory. (Shrishivajinagar), India
- Ambre VijayaDepartment of Computer Engineering, University of Pune, Shri ChhatrapatiShivaji College of Engineering, Rahuri Factory. (Shrishivajinagar), India
- More PritiDepartment of Computer Engineering, University of Pune, Shri ChhatrapatiShivaji College of Engineering, Rahuri Factory. (Shrishivajinagar), India
- Tiwari UtkarshDepartment of Computer Engineering, University of Pune, Shri ChhatrapatiShivaji College of Engineering, Rahuri Factory. (Shrishivajinagar), India
- Yadav ManojDepartment of Computer Engineering, University of Pune, Shri ChhatrapatiShivaji College of Engineering, Rahuri Factory. (Shrishivajinagar), India
References
[1] “Security Threats to Mobile Multimedia Applications: Camera-Based Attacks on Mobile Phones”, Longfei Wu and Xiaojiang Du, Temple University and Xinwen Fu, University of Massachusetts Lowell, March 2014 IEEE Communication Magazine [2] R. Schlegel et al., “Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smart phones,” NDSS, 2011, pp. 17–33 [3] N. Xuet al., “Stealthy Video Capturer: A New Video-Based Spyware in 3g Smartphones,” Proc. 2nd ACM Conf. Wireless Network Security, 2009, pp. 69–78. [4] F. Maggi, et al.,“A Fast Eavesdropping Attack against Touchscreens,” 7th Int’l. Conference .Info. Assurance and Security, 2011, pp. 320–25. [5] R. Raguramet al., “ispy: Automatic Reconstruction of Typed Input from Compromising Reflections,” Proc. 18th ACM Conf. Computer and Communication Security, 2011, pp. 527–36.
Prof. Ghule Sheetal, Ambre Vijaya, More Priti, Tiwari Utkarsh, Yadav Manoj "Permission Manager: Application to secure the Smartphone" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 1, pp. 108-110 2015
Adsorption is one of the preferred techniques in recent years to remove the color and inorganics from waste water. Activated carbon derived from the agricultural byproduct, acts as an effective adsorbent for the removal of dyes from waste water. The removal of dyes and metal ions at different, contact time, adsorbent dosage, pH, initial dye concentration, column diameter, bed height, flow rate and temperature by different agriculture based adsorbent has been studied. The result shows that among the compared adsorbents, moringa oleifera derived adsorbent is effective for waste treatment. The adsorption data were well fitted by Freundlich isotherm model. Kinetic data were best described by pseudo-second order model.
- Page(s): 111-115
- Date of Publication: January 2015
- Muthukumaran K.Professor., Department of Industrial Biotechnology, Government College of Technology, Coimbatore, India
- Kamal B.P.G Students., Department of Environmental Engineering, Government College of Technology, Coimbatore, India
- Sugumar S.P.G Students., Department of Environmental Engineering, Government College of Technology, Coimbatore, India
- Gokulkarthik RP.G Students., Department of Environmental Engineering,Government College of Technology, Coimbatore, India
- Kaviyarasu DP.G Students., Department of Environmental Engineering, Government College of Technology, Coimbatore, India
References
[1] V.Yesuratnam, Deepameghavathu, R. Padma sree “Removal of methyleneblue from aqueous solution using coconut shell powder”. January 2012. [2] Y.C. Wong,M.S.R.Senan and N.A. Atiqah “Removal of Methylene blue andMalachite Green Dye using different form of Coconut Fiber as Absorbent”. Journal of basic & Applied Sciences,2013,9,172-177. [3] C. NamasivayamS.Sumithra “Adsorptive removal of phenols byFe(III/Cr(III) hydroxide, an industrial solid waste”. Clean TechnEnviron Policy (2007) 9:215-223.Published online:22 February 2007. [4] Sachin M.Kanwade and R.W.Gailkwad “Removal of Dyes from Dye Effluent by using Sugarcane Bagasse ASH as an Adsorbent”. International Journal of Chemical Engineering and Applications,Vol.2, No.3,June 2011. [5] Peter Papoh Ndibewu, Robert L.Mnisi, Sharon N.Mokgalaka and Rob 1.McCrindle “Heavy Metal Removal in Aqueous Systems Using Moringaoleifera” A review. Journal of MaterialsScience and Engineering B 1(2011)843-853. Formerly part of Journal of Materials Science and Engineering, ISSN 1934-8959. [6] Rozaini C.A., Jain k., Oo c. W.Tan K.W., Tan L.S, Azraa A. and Tong K.S. “Optimization of Nickel and Copper Ions Removal by Modified Mangrove Barks”. International Journal of Chemical Engineering and Applications, Vol.1 June 2010 ISSN: 2010-0221. [7] George Z. Kyzas, Jie Fu and Kostas A. “MatisThe change from past to Future for Adsorbent Materials in Treatment of Dyeing Wastewaters”. Materials 2013,6, 5131-5158;doi:10.3390/ma6115131. [8] Ramesh Dod, Goutam Banerjee, and S.Saini: Adsorbent of Methylene Blue Using Green PEA Peels (Pisumsativum) “A Cost-effective Option for Dye-based Wastewater treatment”. Biotechnology and Bioprocess Engineering 17:862-874(2012) DOI 10.1007/s12257-011-0614-5 [9] Zohra Belala, Mejdi Jeguirium, Meriem Belhachemi, Fatima Addoun, GwenaelleTrouve “Biosorption of copper from aqueous solutions by date stones and palm-trees waste”. Environ Chemlet(2011) 9:65-69. DOI 10.1007/s10311-009-0247 [10] Farhana masher. Abdul ghaffar, Ammara arooj and mudassara Iqbal “Studies of biosorption of heavy metals in soil by using rice straw”. Asian Journal of Chemistry; Vol.24, No.6(2012), 2425-2432. [11] S.Sugashini, K.M. Meera Sheriffa Begum “Optimization using central composite design (CCD) for the biosorption of Cr(VI) ions by cross linked chitosan carbonized rice husk (CCACR)”. Clean techn Environ Policy (2013) 15:293-302 DOI 10.1007/s10098-012-0512-3. [12] Suantak Kamsonlian, S.Suresh, C.B,Majumder, S.Chand “Bio sorption of As(V) from contaminated water onto tea waste biomass: sorption parameters optimization, equilibrium and thermodynamic studies”. I-manger’s Journal on Future Engineering & Technology, Vol.71 No.1 August-October 2011. [13] M.Rajeswari, Pushpa Agarwal, S.Pavithra, Priya, G.R. Sandhya, and G.M.Pavithra “Continuous Biosorption of Cadmium by MoringaOlefera in a packed column”. Biotechnology and bioprocess Engineering 18:321-325(2013) DOI 10.1007/s12257-012-0424-4. [14] Ackmez Mudho, Viond K. Garg, Shaobin Wang “Removal of heavy metals by biosorption”. Environ Chem Lett (2012) 10:109-117 DOI 10.1007/s 10311-011-0342-2. [15] Rohama Gill, Anum Mahamood, Rabia Nazir, “Biosorption potential and kinetic studies of vegetable waste mixture for the removal of Nickel(II)”. J. Mater Cycles waste Manag (2013) 15-115-121. DOI10.1007/s10163-012-0079-4. [16] P.Kalpana, and P.King “Biosorption of malachite green dye onto araucaria cookil bark: optimization using response surface methodology”. Asain Journal of Chemistry; Vol.26, No. 1(2014), 75-81. [17] Kumar Rohit Raj, Abhishek Kardam, Jyoti Kumar Arora, ShaliniSrivastava, M.M. Srivastava “Adsorption behavior of dyes from aqueous solution using agricultural Waste; modelling approach”. Clean Techn Environ Policy(2013) 15:73-80. DOI 10.1007/s10098-012-0480-7. [18] M. Jamshaid Iqbal, Farhan cecil, Khalil ahmad, Munawar Iqbal, M.Mushtaq, M.N. Naveem and T.H. Bokhari “Kinetic study of Cr(III) and Cr(VI) biosorption using rosa damascene phytomass: A rose waste biomass. AsainJounal of Chemistry” Vol.25, No.4(2013), 2099-2103. [19] V.Vadivelan, K.Vasanth Kumar “Equilibrium, kinetics, mechanism, and process design for the sorption of methylene blue onto rice husk”. Journal of Colloid and Interface Science 286(2005)90-100. [20] 20.Venkat S.Mane, Indra Deo Mall, Vimal Chandra Srivastava “Kinetic and equilibrium isotherm studies for the adsorptive removal of Brilliant Green DYE from aqueous solution by rice husk”. Journal of Environmental Management 84(2007) 390-400. [21] Uma R. Lakshmi, Vimal Chandra Srivastava, IndraDeo Mall, Dilip H. Latye “Rice husk ash as an effective adsorbent: Evalution of adsorptive characteristics for Indigo Carmine dye”. Journal of Environmental Management 90(2009) 710e720. [22] Upendra Kumar, ManasBandyopathyay: “Sorption of cadmium from aqueous solution using pretreated rice husk”. Bioresource Technology 97(2006)104-109. [23] Long Lin, Shang-RuZhai, Zuo-Yi Xiao, Yusong, Qing-Da An, Xiao-Wei Song: “Dye adsorption of mesoporous activated carbons produced from NaOH-pretreated rice husks”. Bio resource technology 136 (2013)437-443. [24] Yun Chen, Shang-Ru Zhai, Na Liu, Yu Song, Qing-DA An, Xiao-Wei song: “Dye removal of activated carbons prepared from NaOH-pretreated rice husks by low-temperature solution- processed carbonization and H3PO4 activation”. Bio resource Technology 144(2013)401-409. [25] Mohamed Mokhtar Mohamed “Acid dye removal: Comparison of surfactant-modified mesoporous FSM-16 with activated carbon derived from rice husk”. Journal of Colloid and Interface Science 272(2004)28-34. [26] Mike A. Acheampong, Kannan Pakshirajan, Ajit P. Annachhatre, Piet N.L. Lens “Removal of Cu (II) by biosorption onto coconut shell in fixed-bed column systems”. Journal of Industrial and Engineering Chemistry 19(2013)841-848. [27] S.Sugashini, K.M.Meera sheriff Begum “Optimization using central composite design (CCD) for the biosorption of Cr (VI) ions by cross Linked chitosan carbonized rice husk (CCACR)”. Clean Techn Environ Policy (2013)15:293-302. [28] Natarajan Saravanan, Tiruvenkadam kannadasan, Chiya Ahmed, BashaanaVeerasamy Manivasagam, (2013). [29] Ozdemir.G, Ozturk.T, Ceyhan.N, Isler.R, and Cosar.T “Heavy metal biosorption by biomass of Ochrobactrumanthropiproducingexoplysaccharide in activated sludge”. Bioresourc. Technol, 90:71-74(2003) [30] Ho,Y.S., and Mckay.G.,2000 “The kinetics of sorption of divalent metal ions onto sphagnum moss peat”. Water Res, 34:735-742.
Muthukumaran K., Kamal B., Sugumar S. , Gokulkarthik R., Kaviyarasu D. "Agricultural Based Low Cost Absorbents" International Journal of Latest Technology in Engineering,Management & Applied Science-IJLTEMAS vol.4 issue 1, pp.111-115 2015