Publications

Share / Export Citation / Email / Print / Text size:

International Journal on Smart Sensing and Intelligent Systems

Professor Subhas Chandra Mukhopadhyay

Exeley Inc. (New York)

Subject: Computational Science & Engineering , Engineering, Electrical & Electronic

GET ALERTS

eISSN: 1178-5608

DESCRIPTION

FEATURED ARTICLES

Touch fingerprint sensor based on sensor cell isolation technique with pseudo direct signaling
HYBRID DATA APPROACH FOR SELECTING EFFECTIVE TEST CASES DURING THE REGRESSION TESTING
PERFORMANCE AND ANALYSIS OF AUTOMATIC LICENSE PLATE LOCALIZATION AND RECOGNITION FROM VIDEO SEQUENCES

VOLUME 10 , ISSUE 5 (December 2017) - List of articles

Special Issue

PERFORMANCE AND ANALYSIS OF LOW POWER, AREAEFFICIENT AND HIGH SPEED CARRYFAST ADDER

M. AntoBennet/ S. Sankaranarayanan/ V. BanuPriya/ PJaya Pretheena/ S. Yamini/ S. Supriya

Carry Select Adder (CSLA) is one of the fastest adders used in many data-processing processors to perform fast arithmetic functions. From the structure of the CSLA, it is clear that there is scope for reducing the area and power consumption in the CSLA. This work uses a simple and efficient gate-level modification to significantly reduce the area and power of the CSLA. Based on this modification 8, 16,32,and 64-bit square-root CSLA (SQRT CSLA) architecture have been developed and compared with t(..)

DOI: 10.21307/ijssis-2017-268

Published Online: 01-September-2017

HYBRID DATA APPROACH FOR SELECTING EFFECTIVE TEST CASES DURING THE REGRESSION TESTING

M. Mohan/ Tarun Shrimali

In the software industry, software testing becomes more important in the entire software development life cycle. Software testing is one of the fundamental components of software quality assurances. Software Testing Life Cycle (STLC)is a process involved in testing the complete software, which includes Regression Testing, Unit Testing, Smoke Testing, Integration Testing, Interface Testing, System Testing & etc. In the STLC of Regression testing, test case selection is one of the most important c(..)

DOI: 10.21307/ijssis-2017-233

Published Online: 01-September-2017

PERFORMANCE EVALUTION OF VIDEO SURVEILLANCE USING METE, MELT AND NIDC TECHNIQUE

M Anto Bennet/ R Srinath/ D Abirami/ S Thilagavathi/ S Soundarya/ R Yuvarani

To evaluate multi-target video tracking results, one needs to quantify the accuracy of the estimated target-size and the Cardinality error as the well as measure the frequency of occurrence of ID changes. By surveying existing multi-target tracking performance scores and, after discussing their limitations, the work proposes three parameter-independent measures for evaluating multi target video tracking. The measures consider target-size variations, combine accuracy and cardinality errors, quant(..)

DOI: 10.21307/ijssis-2017-234

Published Online: 01-September-2017

EFFICIENT APPROACHES FOR DESIGNING THE LOGICAL REVERSIBILITY OF COMPUTATION

M Anto Bennet/ T.Mari Selvi/ S.Mohana Priya/ S Monica/ R. Kanimozhi

The work demonstrates about the reversible logic synthesis for the 2 to 4 decoder, the circuits are designed using reversible fault tolerant toffoli gates. Thus the entire scheme inherently becomes fault tolerant. In addition, several lower bounds on the number of constant inputs, garbage outputs and quantum cost of the reversible fault tolerant decoder have been proposed. Transistor simulations of the proposed decoder power consumption have been reduced than the existing approach without decrea(..)

DOI: 10.21307/ijssis-2017-235

Published Online: 01-September-2017

AN ANTI-EMULATION STRUCTURE FOR INTERNET DESPOSITORY USING SECURED IMAGE VALIDATION SCHEME

Anupriyan K/ Santhosh Kumar C/ Nagaraj N

Emulation attack is an effort by an individual or a group to steal personal confidential information such as passwords, credit card information etc, New approach called visual secret sharing scheme (VSS) for cloning websites classification to solve the problem of Phishing attack. The novel system is developed with the things that eradicate the drawbacks of the existing system. The main aim of visual secret sharing scheme is to conserves the solitude of image by decay the original image into two (..)

DOI: 10.21307/ijssis-2017-236

Published Online: 01-September-2017

ANDROID BASED HOME AUTOMATION AND ENERGY CONSERVATION

M.Anto Bennet/ B Thamilvalluvan/ C.A. Hema Priya/ B. Bhavani/ M. Shalini

Wireless Sensor Network (WSN) consists of three main components: nodes, gateways, and software. The spatially distributed measurement nodes interface with sensors to monitor assets or their environment. In a WSN network the devices are connected to WSN nodes wherein the entire nodes uses Zigbee network to transfer the status of connected applications to a controller which controls the whole applications but the main drawback of Wireless sensor networks is its high interference, low coverage area(..)

DOI: 10.21307/ijssis-2017-237

Published Online: 01-September-2017

DESIGN AND IMPLEMENTATION OF DUAL-BAND CIRCULARLY POLARIZED ANTENNAS USING STACKED PATCHES

S Sankaranarayanan/ M Anto Bennet/ B. Deepa/ A. Banu/ S. Gayathri

Single and Dual feed Antennas with dual frequencies have been demonstrated. Varactor diodes are used for independent tuning. The PIFA (Planar Inverted F-Antenna) has two frequencies from 0.7 to 1.1 GHz and from 1.7 to 2.3GHz. Impedance match of about -10dB an isolation greater than 13dB is obtained. The single feed antenna can be tuned from 1.2 to 1.6GHz and 1.6 to 2.3 GHz. The antenna volumes are 63x100x3.15 mm3 with relative permittivity is 3.55 substrates. The efficiency varies from 25% to 50(..)

DOI: 10.21307/ijssis-2017-238

Published Online: 01-September-2017

A MEMORY EFFICIENT HARDWARE BASED PATTERN MATCHING AND PROTEIN ALIGNMENT SCHEMES FOR HIGHLY COMPLEX DATABASES

M.Anto Bennet/ S. Sankaranarayanan/ M. Deepika/ N. Nanthini/ S. Bhuvaneshwari/ M. Priyanka

Protein sequence alignment to find correlation between different species, or genetic mutations etc. is the most computational intensive task when performing protein comparison. To speed-up the alignment, Systolic Arrays (SAs) have been used. In order to avoid the internal-loop problem which reduces the performance, pipeline interleaving strategy has been presented. This strategy is applied to an SA for Smith Waterman (SW) algorithm which is an alignment algorithm to locally align two proteins. I(..)

DOI: 10.21307/ijssis-2017-239

Published Online: 01-September-2017

INSTANCE VEHICLE MONITORING AND TRACKING WITH INTERNET OF THINGS USING ARDUINO

Dhanalakshmi / A.Ezil Sam Leni

The Vehicle Tracking System has the capability of finding the Vehicle location, Gas Leakages, Vehicle Speed, and Vehicle Accident and at the same time notifies the owners of the vehicle through a GSM network with an SMS alert message. The drivers require their presence to their family or to their respective one’s. The main aim is to design a low cost and an efficient vehicle tracking and vehicle security circuit based on an Arduino microcontroller. This system can be made as a backup sector insi(..)

DOI: 10.21307/ijssis-2017-240

Published Online: 01-September-2017

DETECTING IP BASED ATTACK ON CLOUD SERVER USING PASSIVE IP TRACEBACK

Divakar V/ Vijayarangam S

In computer network security, IP address spoofing plays a major role in the creation of Internet Protocol (IP) packets with a fake or forged source IP address and this may lead to major attacks to cloud centre. When the identities of user information are forged by spoofing or masquerade as another computing system. Whether the basic protocol for sending data in the Internet communication are based on the Internet Protocol ("IP"). In network communication header of each IP packet consist of sourc(..)

DOI: 10.21307/ijssis-2017-241

Published Online: 01-September-2017

DETECTION AND REMOVAL OF DUST PARTICLES IN PIPELINES USING 3-D MEMS

B. Thamilvalluvan/ Dr.M.Anto Bennet/ K. Gokulakrishnan/ S. Harrison/ R. Shanmugam/ B. Mangaram

Currently, the detection of dust particles is realized through manual sampling. Thus it is desirable to develop an automated online technique. Generally, industries run with the help of pipelines through which liquid can flow. The main aim of the work is to detect the dust particles which are present inside the pipeline when liquid is flowing through it. Distributed Acoustic Sensing (DAS) is a recent addition to the pipeline security world. Opta sense system is designed to prevent the damage in (..)

DOI: 10.21307/ijssis-2017-242

Published Online: 01-September-2017

DYNAMIC FACE RECOGNITION AND TRACKING SYSTEM USING MACHINE LEARNING IN MATLAB AND BIGDATA

P.J Leo Evenss/ Jennings Mcenroe .S/ A.Prabhu Chakkaravarthy

Face Recognition being one of the methods in identifying individuals is getting enhanced at a faster rate. This paper demonstrates the process of detection of faces of the individuals through a live monitoring camera using matlab and also aids in tracking them. The large amount of images being collected at each second is stored in big databases like Hadoop- databases(hbase) or Mongodb as they are known for their higher processing speed. The facial features are extracted from all the images and a(..)

DOI: 10.21307/ijssis-2017-243

Published Online: 01-September-2017

WIRELESS ZIGBEE NETWORK CLUSTER - CAPACITY CALCULATION AND SECURE DATA CONVEYANCE USING INDEGREE

R. Elankavi/ R. Kalaiprasath/ R. Udayakumar

A tree topology is used to construct to construct a Zigbee networks practices by wireless sensor network for data delivery applications. There are 3 types of nodes in zigbee networks; coordinator, router and mobile end devices. Coordinator performs the initialization and maintenance functions in the network. A router is responsible for routing data between the coordinator and mobile end device. In-order to avoid the delivery failures occurs due to node movements and network topology changes, the(..)

DOI: 10.21307/ijssis-2017-244

Published Online: 01-September-2017

DESIGN OF NFC READER FOR ENHANCEMENT OF MOBILE PAYMENTS

Chakravarthy .P/ Thamizhoviya .K Kavitha.S/ Meena .S

The NFC concept was mainly based on RFID tags which has the frequency range of 13.56MHz.NFC concept was initially determined to exchange data between two devices at very short distance. RFID uses electromagnetic fields to automatically identify and trace tags attached to objects which contain electronically stored information. The major problem with the RFID tags was their cost and the RFID tags had the possibility to be interfered with metals and liquids when we try to read them. There is a pos(..)

DOI: 10.21307/ijssis-2017-245

Published Online: 01-September-2017

HYBRID POWER HARVESTER USING ENGINE SOURCE

A.Ahmed Meeran Mydeen/ Kelwin Inasu/ M. Venkatesh/ C. Suthesh

In mainly we present a compact, multisource and battery-free energy harvesting from engine source. This battery free generator captures energy from its environment transient thermal gradients as a main source, and vibration as a secondary source allowing early biasing of the generator and stores this energy in ultra-capacitors .In this way, this multi-source architecture benefits from the synergy between energy scavenging and harvesting.

DOI: 10.21307/ijssis-2017-246

Published Online: 01-September-2017

A LIFI BASED DATA TRANSMISSION FOR ANTI COLLISION SYSTEM

Lokesh S/ Priya N/ Divyakanni K/ Karthika S

A new way of data transmission between two vehicles using light fidelity technology is proposed in this paper. A best way of avoiding accidents can be achieved by the communication between the vehicles. This system can be simplified by using LED bulbs for data transmission. The previously used data transmission technology can be overcome by the newly proposed LIFI technology. The major objective of this system is to achieve reliable communication between the vehicle using a transmitter and a rec(..)

DOI: 10.21307/ijssis-2017-247

Published Online: 01-September-2017

DESIGN OF LOW COMPLEXITY ACCUMULATOR USING FINFET FOR VARIOUS TECHNOLOGIES

N. Sathya/ Dr.M.Anto Bennet/ M. Mageswari/ M. Priya/ M. Kayalvizhi

FINFET terminological in exactitude process reuses a massive part of well accustomed conventional CMOS process. FINFET is a likely-look alternative to conventional MOSFET which has reached its limit and has too much leakage for too little performance gain. FINFET is being suggested as basics for future IC processes because its power or performance benefits, scalability, superior controls over short channel effort etc., In this paper we propose a outlook for scheming accumulator using FINFET for (..)

DOI: 10.21307/ijssis-2017-248

Published Online: 01-September-2017

HARDWARE IMPLEMENTATION OF UWB RADAR FOR DETECTION OF TRAPPED VICTIMS IN COMPLEX ENVIRONMENT

M.Anto Bennet/ J. Narmatha/ B. Pavithra/ P. Suvetha/ A. Sandhyalakshmi

Ultra-wideband (UWB) radar plays an important role in search and rescue at disaster relief sites. Identifying vital signs and locating buried survivors are two important research contents in this field. In general, it is hard to identify a human’s vital signs (breathing, body temperature, brain waves and heartbeat) in complex environments due to the low signal-to-noise ratio of the vital sign in radar signals. In this paper, advanced signal-processing approaches are used to identify and to extra(..)

DOI: 10.21307/ijssis-2017-249

Published Online: 01-September-2017

GSM BASED SOLDIER TRACKING SYSTEM AND MONITORING USING WIRELESS COMMUNICATION

P. Chakravarth/ S. Natarajan/ M. Anto Bennet

To design a soldier tracking system using wireless system for monitoring the parameters of soldier are as Body temperature & Temperature. Biomedical sensors: Here to find the health status of soldier we are using a body temp sensor to measure body temperature as well as pulse rate sensor. These parameters are then signal conditioned and will be stored in the memory. One of the fundamental challenges in military operations lays in that the Soldier not able to communicate with control room adminis(..)

DOI: 10.21307/ijssis-2017-250

Published Online: 01-September-2017

MULTI_LEVEL SECURE FROM WEB INTRUSION AND QUERY ATTACKS ON WEB DATABASE

Nirmala Kumari R/ Mala V

Most data frameworks and business applications assembled these days have a web frontend and they should be generally accessible to customers, representatives and accomplices around the globe, as the computerized economy is turning out to be increasingly pervasive in the worldwide economy. Strategy and a model instrument to assess web application security components. In this paper, we along these lines propose to make trusted equipment a top notch national in the safe information administration f(..)

DOI: 10.21307/ijssis-2017-251

Published Online: 01-September-2017

DESIGN OF LOW POWER CARRY SKIP ADDER USING DTCMOS

T.R.Dinesh Kumar/ K.Mohana Sundaram/ M.Anto Bennet/ Aruna .R/ Meena .B/ M. Mohanapriya

In the domain of VLSI design, the adders are always meant to be the most fundamental requirements for processors of high performance and other multicore devices. It is found that power dissipation is a major problem in the electronic devices. Power management integrated circuit (PMIC) is emphasized as battery-powered portable electronics such as smart phone are commonly used. In this paper we are designing a carry skip adder which consumes less power than the other conventional adders using dyna(..)

DOI: 10.21307/ijssis-2017-252

Published Online: 01-September-2017

DESIGN OF SRAM ARCHITECTURE WITH LOW POWER WITHOUT AFFECTING SPEED USING FINFET

Mr.S.Mohammed Sulaiman/ B. Jaison/ M.Anto Bennet/ M. Vijay/ V.Pandi Selvam/ P. Anandakumar

In average 8T SRAM Architecture, it requires maximum number of transistor counts and does not need any write back scheme. To achieve the higher word line (WL) Voltage, the bit line (BL) is connected to the gate of the read buffer SRAM Architecture. That boosted voltage is not used when the threshold voltage is high. Its leads to the reduction of read stability of the SRAM Design. In that case, the gate terminal of the SRAM Architecture is not connected to the buffer results a large delay. To ove(..)

DOI: 10.21307/ijssis-2017-253

Published Online: 01-September-2017

LEARNING TO RANK AND CLASSIFICATION OF BUG REPORTS USING SVM AND FEATURE EVALUATION

S. Rajeswari/ S. Sharavanan/ R. Vijai/ RM. Balajee

When a new bug report is received, developers usually need to reproduce the bug and perform code reviews to find the cause, a process that can be tedious and time consuming. A tool for ranking all the source files with respect to how likely they are to contain the cause of the bug would enable developers to narrow down their search and improve productivity. This project introduces an adaptive ranking approach that leverages project knowledge through functional decomposition of source code, API d(..)

DOI: 10.21307/ijssis-2017-254

Published Online: 01-September-2017

PERFORMANCE AND ANALYSIS OF AUTOMATIC LICENSE PLATE LOCALIZATION AND RECOGNITION FROM VIDEO SEQUENCES

M.Anto Bennet/ B. Thamilvalluvan/ Priyanka Paree Alphonse/ D.R. Thendralarasi/ K. Sujithra

The works presents license plate recognition system using connected component analysis and template matching model for accurate identification. Automatic license plate recognition (ALPR) is the extraction of vehicle license plate information from an image. The system model uses already captured images for this recognition process. First the recognition system starts with character identification based on number plate extraction, Splitting characters and template matching. ALPR as a real life app(..)

DOI: 10.21307/ijssis-2017-255

Published Online: 01-September-2017

DESIGN OF LOW LEAKAGE CURRENT AVERAGE POWER CMOS CURRENT COMPARATOR USING SVL TECHNIQUE WITH PSEUDO NMOS AND TRANSMISSION GATE LOGICS

T.R. Dinesh Kumar/ K.Mohana Sundaram/ M.Anto Bennet/ M. Pooja/ A.P. Kokila

Comparatorare most widely used second electronic components after operational amplifier. For ADC circuit we have to use the high speed and low power consumption based comparator. SVL circuit is used tom reduce the offset voltage which requires high voltage gain. A SVL circuit can supply maximum DC voltage to an active load circuit on request or can decrease the DC voltage supplied to a load circuit in the standby mode was developed. SVL circuit is used with comparator which reduce the power cons(..)

DOI: 10.21307/ijssis-2017-256

Published Online: 01-September-2017

PERFORMANCE EVALUATION OF EFFICIENT AND RELIABLE ROUTING PROTOCOL ALGORITHM

B. Sathyasri/ Dr.E. N.Ganesh/ Dr. P. Senthil Kumar/ S. Rathna/ R. Jaishree Bai/ G. Nalini

Fixed-power wireless sensor networks are prevalent and cost-effective. However, they face mote failures, RF interference from environmental noise and energy constraints. Routing protocols for such networks must overcome these problems to achieve reliability, energy efficiency and scalability in message delivery. Achievement of these requirements, however, poses conflicting demands. In this work, we propose an efficient and reliable routing protocol (EAR) that achieves reliable and scalable perfo(..)

DOI: 10.21307/ijssis-2017-257

Published Online: 01-September-2017

SPECIFIC ABSORPTION RATE ASSESSMENT ON HUMAN HEAD DUE TO RADIATIONS BY MOBILE PHONE ANTENNA

M. Anto Bennet/ J. Surekha Poomathi/ C. Kalpana/ S. Sariga Priya

Development of mobile phone communication infrastructure in the world has promoted which lead public concern over possible health effect exposure to radio frequency electromagnetic energy (RFEME) emanating from mobile phone antenna. The Micro-strip patch antenna plays an important role in electromagnetic energy transmitting and receiving phenomena in mobile phone. This paper makes an effort to assess the mobile radiation exposure effect on 4 years child, 8years child and an adult head model. Han(..)

DOI: 10.21307/ijssis-2017-258

Published Online: 01-September-2017

CLUSTER HEAD ELECTION MECHANISM-BASED ON FUZZY LOGIC (CHEF) WITH TDMA IN WSN

G Vijayalakshmi/ M.Anto Bennet/ P. Shenbagavalli/ M. Vijayalakshmi/ S. Saranya

Wireless sensor networks (WSN) are being used for huge range of applications where the traditional infrastructure based network is mostly infeasible. The most challenging aspect of WSN is that they are energy resource-constrained and that energy cannot be replenish. the wireless sensor network of power limited sensing devices called sensor deployed in a region to sense various types physical information from the environment, when these sensors sense and transmit data to other sensors present in (..)

DOI: 10.21307/ijssis-2017-259

Published Online: 01-September-2017

AN INTELLIGENCE SUPER MART BILLLING SYSTEM

S. Mekala/ M. Thanagaraj/ M. Chandranath/ K.K.Vasanta Kumaran

Currently embedded systems be mainly based on microcontroller’s i.e. CPUs in the company of included reminiscence the same as well as tangential interface except ordinary microprocessors by means of external chips for memory and peripheral interface circuits are common, especially in technology may not only be useful for streamlining category and supply chains. Nowadays it is rare to see people getting keen in online shopping through e-commerce websites but still the shopping centers are popular(..)

DOI: 10.21307/ijssis-2017-260

Published Online: 01-September-2017

SECURE ROUTE DISCOVERY FOR DYNAMIC SOURCE ROUTING IN MANETs

M. Anto Bennet/ G. Vijayalakshmi/ P. Shenbagavalli/ M. Vijayalakshmi/ S. Saranya

Mobile ad hoc networks (MANETs) are collections of wireless mobile devices with restricted broadcast range and resources and no fixed infrastructure. Communication is achieved by communicating data along suitable routes that are dynamically discovered and maintained through association between the nodes. Discovery of such routes is a major task both from good organization and security points of view. Recently a security model tailored to the specific requirements of MANETs. A novel route discove(..)

DOI: 10.21307/ijssis-2017-261

Published Online: 01-September-2017

A WEARABLE MULTIPARAMETER MEDICAL MONITORING AND ALERT SYSTEM WITH FIRST AID

M. Manimaraboopathy/ S. Vijayalakshmi/ D. Hemavathy/ A . Priya

The main aim of the paper is biomedical monitoring of human being. Biomedical values are heart rate ,blood pressure ,body temperature and here we use a GPRS module and biomedical monitoring sensor and data from these sensor are updated to the web server and in addition to that we use an automated external defibrillator(AED) which automatically diagnosis the cardiac arrhythmia of ventricular fibrillation, and pulse less ventricular tachycardia and is able to deal them with an defibrillation, the (..)

DOI: 10.21307/ijssis-2017-262

Published Online: 01-September-2017

PATROL INSPECTION AND TIME STUDY TO IMPROVE QUALITY

R. Vijayan/ P. Karthikeyan/ J. Bharanichandar/ R. Palanisamy/ T.Thanka Geetha

This project is concerned to analyze and increase the efficiency of patrol inspection and thus reduces time consumption for inspection. Inspection is the process of checking whether the specification of the product meet the standard specification provided by the customer. Inspector takes more time for checking the parameter that meet the specification at all time than Checking the parameters that does not satisfy the customer specification which leads to rejection .Thus the inspector should insp(..)

DOI: 10.21307/ijssis-2017-263

Published Online: 01-September-2017

UNMANNED FIRE EXTINGUISHER USING QUADCOPTER

M. Manimaraboopathy/ H. S. Vivin Christopher/ S. Vignesh/ P. Tamil selvan

Quadcopters are unmanned Ariel Vehicle (UAV), generally small helicopter that is lifted and propelled by four rotors. Initially they were used as toys, later they gained importance and recent research on multi-copters have received growing attention for military, agriculture, photography, surveillance, news, sports, search/rescue missions and much more. The widespread use of unmanned vehicles and its growing applications in various domains can be attributed to their ability to operate in inacces(..)

DOI: 10.21307/ijssis-2017-264

Published Online: 01-September-2017

CLOUD SECURITY AND COMPLIANCE - A SEMANTIC APPROACH IN END TO END SECURITY

R. Kalaiprasath/ R. Elankavi/ R. Udayakumar

The Cloud services are becoming an essential part of many organizations. Cloud providers have to adhere to security and privacy policies to ensure their users' data remains confidential and secure. Though there are some ongoing efforts on developing cloud security standards, most cloud providers are implementing a mish-mash of security and privacy controls. This has led to confusion among cloud consumers as to what security measures they should expect from the cloud services, and whether these m(..)

DOI: 10.21307/ijssis-2017-265

Published Online: 01-September-2017

TEMPORAL QUERY PROCESSIG USING SQL SERVER

Mastan Vali Shaik/ P Sujatha

Most data sources in real-life are not static but change their information in time. This evolution of data in time can give valuable insights to business analysts. Temporal data refers to data, where changes over time or temporal aspects play a central role. Temporal data denotes the evaluation of object characteristics over time. One of the main unresolved problems that arise during the data mining process is treating data that contains temporal information. Temporal queries on time evolving da(..)

DOI: 10.21307/ijssis-2017-266

Published Online: 01-September-2017

COMPUTATION OF FIELD PROGRAMMABLE CYCLIC REDUNDANCY CHECKS CIRCUIT ARCHITECTURE

M.Anto Bennet/ Lakshmi Ravali/ T.R. Sughapriya/ J. Jenitta/ K. Vaishnavi/ Priyanka Paree Alphonse

In this work we are going to simulate a field programmable cyclic redundancy check circuit architecture. The transmitted data or stored data must be free from error. The increased use of error correction techniques by digital communications designers has created a demand for tools to evaluate and exercise error correction coding approaches before they are committed to expensive ASICs or firmware. Cyclic redundancy check is an error detection method but it can be used only for a specific applicat(..)

DOI: 10.21307/ijssis-2017-267

Published Online: 01-September-2017

A MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED BASED ON HIERARCHICAL CLUSTERING INDEX

A. Indhuja/ T.P.Udaya shankar/ R.M Balajee Mastan Vali Shaik/ P Sujatha

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data Due to the increasing popularity of cloud computing, more and more data owners are motivated to outsource their data to cloud servers for great convenience and reduced cost in data management. In this project, present a secure multi-keyword ranked search scheme over encrypted cloud data, which simultaneously supports dynamic update operations like deletion and insertion of documents. Specifically, the vector space (..)

DOI: 10.21307/ijssis-2017-269

Published Online: 01-September-2017

DATA MINING WITH BIG DATA REVOLUTION HYBRID

R. Elankavi/ R. Kalaiprasath/ R. Udayakumar

Big Data concern large-volume, complex, growing data sets with multiple, autonomous sources. With the fast development of networking, data storage, and the data collection capacity, Big Data are now rapidly expanding in all science and engineering domains, including physical, biological and biomedical sciences. This paper presents a HACE theorem that characterizes the features of the Big Data revolution, and proposes a Big Data processing model, from the data mining perspective. This data-driven(..)

DOI: 10.21307/ijssis-2017-270

Published Online: 01-September-2017

MACHINE VISION BASED MISSING FASTENER DETECTION IN RAIL TRACK IMAGES USING SVM CLASSIFIER

R. Manikandan/ M. Balasubramanian/ S. Palanivel

Missing fastener detection is a critical task due to its similar characteristics with surrounding environments. In this paper, a machine vision based fully automatic detection and classification of missing fastener detection system is proposed using Support Vector Machine (SVM) classifier. This proposed system consists of preprocessing, transformation, feature extraction and classifications. Image resizing is performed as preprocessing step and Gabor transform is used as transformation technique(..)

DOI: 10.21307/ijssis-2017-271

Published Online: 01-September-2017

AUTHENTICATION SCHEME FOR SESSION PASSWORDS USING COLOR AND IMAGE

P. Saranya/ S. Sharavanan/ R. Vijai/ RM. Balajee

Graphical passwords are believed to be more secure than traditional textual passwords, but the authentications are usually complex and boring for users. Furthermore, most of the existing graphical password schemes are vulnerable to spyware and shoulder surfing. A novel graphical password scheme ColorLogin is proposed in this paper. ColorLogin is implemented in an interesting game way to weaken the boring feelings of the authentication. ColorLogin uses background color, a method not previously co(..)

DOI: 10.21307/ijssis-2017-272

Published Online: 01-September-2017

A NEW APPROACH FOR CLOUD DATA SECURITY: FROM SINGLE TO CLOUD-OF-CLOUDS

R. Kalaiprasath/ R. Elankavi/ Dr. R. Udayakumar

In the corporate world, a large number of people store their data on clouds. For doing this they need to give their confidential data in the hands of the third party, commonly known as service providers. These cloud service providers cannot be trusted since the complete data is stored in one single cloud. This increases security risks to the user’s sensitive data. Due to this issue of data integrity risk and service availability failure, the concept of “Cloud-of-Clouds” comes into picture. Cloud(..)

DOI: 10.21307/ijssis-2017-273

Published Online: 01-September-2017

No Record Found..
Page Actions