|Research Topic||Paper ID|
| Cuckoo based Energy Effective Routing in Wireless Sensor Network
Gurpreet Kaur Bhatti , Jatinder Pal Singh Raina
Abstract: Energy efficiency is the most required quality in a sensor network where each node consumes some energy with each transmission over the network. Energy efficiency is required to improve the network life. In this work we will move in the direction to improve the network life. The presented work is about to perform the energy effective routing so that the network life and network throughput will be improved. In this work the opportunistic routing will be defined to optimize the networks on the basis of Cuckoo Search. Also, modification is made in the PEGASIS(Power Efficient Gathering in Sensor Information System) protocol using fuzzy system. This work is done to improve the network throughput as well as the network lifetime. The presented work is about to define an energy effective routing over the sensor network so that effective communication will be performed without increasing the congestion over the network. We have defined opportunistic routing to identify the effective path based on the energy analysis, load analysis and the delay analysis.
|Distributive Reprograming of wireless sensor nodes with secure Data Transmission
| Adopting web semantics with representational state transfer
Pavithra K, Dr.S.Gunasekaran
Abstract: Representational State Transfer (ReST) is an abstract model of web architecture. Restful web services are alternative to the traditional SOAP web services in WEB 2.0. The ReST based methodologies paves the way to align semantic data with web architecture. Adding semantics to ReSTful web services helps to overcome the search problem of locating the desired web services. The syntactic and semantic descriptions allow search engines to support a similarity search for ReSTful web services.
| VHDL Implementation of Merge Sort Algorithm
Abstract: Designing Digital Circuits is a broad and an interesting field of study. Implementation of digital circuit design to various real world scenarios may solve many day to day problems. VHDL (VHSIC Hardware Description Language) has become a useful tool in software implementation of digital Circuits. This paper presents the implementation of Merge Sort Algorithm using VHDL. The implementation and functionality test of the algorithm is done using ModelSim Edition 10.3 tool and the circuit model is synthesized using Xilinx 14.5.
| An Enhanced Approach for Synchronization in WSN
Sanjay Madaan, Dinesh Kumar
Abstract: Small, low cost, low power and multifunctional sensor are developed as a result of improvement in micro-electromechanical (MEMS) technology. Sensor’s are connected via wireless medium and are used to observe various aspects of the physical world. Data sensed by these nodes needs to be ag-glomerated using data fusion, which requires clocks of nodes to be synchronized with each other. Existing approaches of clock synchronization are not designed keeping wireless sensor networks in mind. So there is a need to extend or redesign and develop a new way to synchronize the wireless sensor networks that is best suited to the specific needs of a sensor-network application. In this paper, we introduced a new approach of synchronization of nodes in WSN by enhancing the CSMA/CA protocol (slotted ALOHA). A Master Node, which is assumed to be synchronized with GPS (Global positioning System), deployed in the network. The nodes in a cluter synchronized their local clock with master node using NTP. The proposed solution features minimal energy consumption, minimal packet loss and achieve better throughput.
| A Review of Lehman’s Laws in Open Source Software Systems
Taranjeet Kaur, Nisha Ratti, Parminder Kaur
Abstract: The characteristic of a software system to easily accommodate changes over the time is referred as software evolution. The study of open source software system is interesting because such systems are evolved in a strict development process .In this paper a survey of past studies related to Open Source Software (OSS) are presented. The objective of this study is to obtain an overview of existing studies related to OSS evolution and Lehman laws of software evolution.
| Migration of Application Schema to Windows Azure Clouds
Amandeep Singh, Karandeep Singh
Abstract: Schema migration involves the migration of application schema to clouds. Presently various script generaion techniques are there which are used for schema migration, which also sometimes require the application architecture to be changed to make it compatible with cloud platform. This paper shows an approach using user templates for capturing the schema structure and access control mechanism for migration of application schema without using script generation tools. Further it gives the necessary algorithm to show the feasibility of its implementation.
| TCP Traffic Based Performance Comparison of MANET Routing Protocol
Dinesh Kumar, Anil Yadav, Dr. Mukesh Sharma
Abstract: In Mobile Ad hoc network (MANETS), no fixed infrastructure is available. Different wireless hosts are free to move from one location to another without any centralized administration, so, the topology changes rapidly or unpredictably. Every node operates as router as well as an end system. Routing in MANETs has been a challenging task ever since the wireless networks came into existence. The major reason for this is continues changes in network topology because of high degree of node mobility. The MANET routing protocols have mainly two classes: Proactive routing (or table-driven routing) protocols and Reactive routing (or on-demand routing) protocols. In this paper, we have analyzed various Random based mobility models: Random Waypoint model, Random Walk model, Random Direction model and Probabilistic Random Walk model using AODV and DSDV protocols in Network Simulator (NS 2.35). The performance comparison of MANET mobility models have been analyzed by varying number of nodes, type of traffic (CBR, TCP) and maximum speed of nodes. The comparative conclusions are drawn on the basis of various performance metrics such as: Routing Overhead (packets), Packet Delivery Fraction (%), Normalized Routing Load, Average End-to-End Delay (milliseconds) and Packet Loss (%).
| Efficient and Secure Revocation Protocol For Vehicular Ad hoc Networks
M. Srikanth, S. Saravana Raj, N. Sathish Kumar, Mr. S. Arunmozhivarman, M.L. Alphin Ezhil Manuel
Abstract: Vehicular ad hoc networks (VANETs) adopt the Public Key Infrastructure (PKI) and Certificate Revocation Lists (CRLs) for their security. In any PKI system, the authentication of a received message is performed by checking if the certificate of the sender is included in the current CRL, and verifying the authenticity of the certificate and signature of the sender. In this paper, we propose an Expedite Message Authentication Protocol (EMAP) for VANETs, which replaces the time-consuming CRL checking process by an efficient revocation checking process. The revocation check process in EMAP uses a keyed Hash Message Authentication Code(HMAC), where the key used in calculating theHMAC is shared only between nonrevoked On-Board Units (OBUs). In addition, EMAP uses a novel probabilistic key distribution, which enables nonrevoked OBUs to securely share and update a secret key. EMAP can significantly decrease the message loss ratio due to the message verification delay compared with the conventional authentication methods employing CRL. By conducting security analysis and performance evaluation,EMAP is demonstrated to be secure and efficient..
| Design of User’s Behavior, Pattern Recognition and OTP Generation for ATM Theft Protection
B. Indrani, R. Jayapreethi, M. Arshiya Mobeen, K.Subhashini
Abstract: Today’s location-sensitive service relies on user’s mobile device to determine the current location. This allows malicious users to access a restricted resource or provide bogus alibis by cheating on their locations. One could always think of using advanced techniques like retina scan or fingerprints for ATM purposes, but that will cost more for the banks and ATM vendors quite a fortune to be implemented throughout the network, as hardware enhancement cost is likely to be greater than a software enhancement cost. When accessing the ATM machine the pin number can be easily hacked. The user location can be tracked using GPS. It cannot be used for internal tracking. To address this issue, we propose A Privacy-Preserving Location proof Updating System (APPLAUS) in which collocated Bluetooth enabled mobile devices mutually generate location proofs and send updates to a location proof server.
| Secure Authentication of Multicast protocol for Ad-Hoc Networks
S. Divya Mary, S.J. Gayathri Pillai, B. Devendar Rao
Abstract: Multicast stream authentication and signing is an important and challenging problem.applications such astroop coordination in a combat field, situational awareness, etc.the main challenges are fourfold.first,authenticity must be guaranteed even when only the sender of the data is trusted. Second, unguaranteed connectivity to trusted authorities make known solutions for wired and single hop wireless network inappropriate.we propose an efficient Scheme, Tiered Authentication scheme for Multicast traffic (TAM) for large scale dense ad-hoc networks. TAM combines the advantages of the time asymmetry and the secret information asymmetry paradigms and exploits network clustering to reduce overhead and ensure scalability. Multicast traffic within a cluster employs a one-way hash function chain in order to authenticate the message source. Cross-cluster multicast traffic includes message authentication codes (MACs) that are based on a set of keys. Each cluster uses a unique subset of keys to look for its distinct combination of valid MACs in the message in order to authenticate the source. The simulation and analytical results demonstrate the performance advantage of TAM in terms of bandwidth overhead and delivery delay.
| Multistage Drowsy Driver Detection System Using Machine learning
George Samuel Nishad, Kurapati Michael Sujan
Abstract: There is accumulating evidence that driver drowsiness is a leading cause of vehicle crashes and incidents. The purpose of this paper is to show a method for the non-intrusive and real time detection of distraction or drowsiness using vehicular dynamics data or using the lane data along with traffic information as inputs to classifiers. The use of Artificial Neural Networks (ANN) has been emphasized in this paper.
| Enhanced Iriscode Modelling Using Canny Edge Detection
Subramanian.S, Prabhakaran.S, Siva Kumaran.V
Abstract: Daugman is the most influential iris recognition algorithm.. In this paper we are introduce the new technique bit pair attributes based secure key, its central ray, being a rough representation of the original biometric signal. The central ray is an expected ray and also an optimal ray of an objective function on a group of distributions. This algorithm is derived from geometric properties of a convex polyhedral cone but does not rely on any prior knowledge.These experimental results indicate that, without a thorough security analysis, convex polyhedral cone templates cannot be assumed secure. Additionally, the simplicity of the algorithm implies that even junior hackers without knowledge of advanced image processing and biometric databases can still break into protected templates and reveal relationships among templates produced by different recognition methods. vThe extraordinary market success of IrisCode relies heavily on its computational advantages, including extremely high matching speed for large-scale identification and automatic threshold adjustment based on image quality many methods modified from IrisCode were proposed for iris and user attributes based recognition. This paper refers to these methods as generalized IrisCodes.
|Proposed Method for Image Encryption and Compression Using Symlet Wavelet
Kiranpreet Kaur, Heena Gulati
Abstract: Images can be encrypted in many ways; several techniques have used different encryption methods. In this research, we apply a new modified International SYMLET Wavelet with Data Encryption Algorithm to encrypt the full image in an efficient secure manner and after encryption the original file will be compressed and we get compressed image. Therefore proposed figure encryption technique operated in the prediction error domain is shown to be capable to give a reasonably high level of security. Here also demonstrate that an arithmetic coding-based approach can be exploited to efficiently compress the encrypted figures. In contrast, most of the existing ETC solutions induce significant penalty on the compression efficiency. By Using SYMLET wavelet transform with ETC there is a better compression efficiency.
|Proposed Method for Steganography using Discrete Fourier Transformation
Abstract: The main purpose of steganography is to hide the presence of communication. While most methods in use today are invisible to an observer’s senses, mathematical analysis may reveal statistical anomalies in the stego medium. These discrepancies expose the fact that hidden communication is happening. The goal of steganography is to avoid drawing suspicion to the transmission of a hidden message. If suspicion is raised, then this goal is defeated. Discovering and rendering useless such covert messages is a new art form known as steganalysis. In this Paper, we provide an overview of some characteristics in information hiding methods that direct the steganalyst to the existence of a hidden message and identify where to look for hidden information. Further we In this paper we have proposed a method to combine the features of image enhancement and Steganography. Various still images will be used on which the tests will be implemented.