Loading...

Proceedings of

International Conference on Advances in Computer, Electronics and Electrical Engineering CEEE 2013

Date
28-Apr-2013
Location
Mumbai , India
Authors
101
ISBN
978-981-07-6260-5

42 Articles Published

1. SMART HOME SAFETY ARRANGEMENT

Authors: DIBYENDU BANERJEE , FARUK BIN POYEN , SANTU GUIN , SOUMYA ROY

Abstract: Security is of prime importance in day-to-day life. Population is increasing at an alarming rate, which instigates robber, theft and other criminal activities. Therefore, security is required everywhere, in industries, banks, offices homes and all other worthy places. Many activities have already been started in this field to improve even the best possible security with affordable cost. Internet has already grown to such an extent that it is available in almost every corner of the world. It can be used and is getting used to provide the best possible security even to toughest of the places from remote places. This paper describes an internet based security system viz. Hi-Tech Security System, to satisfy the security demands for affordable multipurpose security aspects.

Keywords: Security System, EPABX, Remote Control, Sensor Systems, Webcam Surveillance.

Pages: 1 - 5 | DOI: 10.15224/978-981-07-6260-5-01

2. ASTERISK TEXT STEGANOGRAPHY TOOL A HIGHLY SECURE TEXT STEGANOGRAPHY APPROACH

Authors: ABHIJIT SHARAD THAKKER

Abstract: Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. Steganography can be used to hide a message intended for later retrieval by a specific individual or group. In this case the aim is to prevent the message being detected by any other party. Steganography and encryption are both used to ensure data confidentiality. Steganography hides the existence of secret message and in the best case nobody can see that both parties are communicating in secret. This text steganography tool will help quick, efficient and highly secure text message transfers.

Keywords: Steganography, Text Steganography, Text Steganography tool, Secure Text Message transfer, Asterisk Algorithm, Asterisk Text Steganography Tool

Pages: 6 - 9 | DOI: 10.15224/978-981-07-6260-5-02

3. SAW SENSOR ARRAY DATA FUSION FOR CHEMICAL CLASS RECOGNITION OF VOLATILE ORGANIC COMPOUNDS

Authors: KENSHI HAYASHI , SUNIL K. JHA

Abstract: Present study deals the development of data fusion based artificial intelligence unit for the chemical sensor array based electronic nose (E-Nose) system. We focus particularly on feature level fusion of model surface acoustic wave (SAW) sensor array response for chemical class identification of volatile organic compounds (VOCs). Three methods are used for feature extraction namely: principal component analysis (PCA); independent component analysis (ICA) and kernel principal component analysis (KPCA). Fused features are generated with three unsupervised fusion schemes and validated in combination with support vector machine (SVM) classifier. Study is concluded by the analysis of 12 model SAW sensor array data sets. It suggests that amongst the three feature fusion schemes; feature fusion by summation result highest class recognition rate of VOCs.

Keywords: data fusion, saw sensor, electronic nose, chemical class recognition

Pages: 10 - 13 | DOI: 10.15224/978-981-07-6260-5-03

4. OPTIMIZATION OF RESONANT FREQUENCY IN CO-AXIAL PROBE FEED MICROSTRIP PATCH ANTENNA USING DIFFERENTIAL EVOLUTION (DE) ALGORITHM

Authors: SHASHANK GUPTA

Abstract: An optimization technique of Resonant Frequency for co-axial probe feed microstrip patch antenna using Differential Evolution (DE) Optimization Algorithm is presented in this paper. The DE program for optimization of resonant frequency is developed and executed in C language and finally the optimized antenna parameters are simulated in Zeeland IE3D software. The superiority of convergence in DE algorithm over other optimization technique is also shown in this paper. “3dplotter.swf”-software is used for graphical representation of different optimized geometrical parameters of the patch antenna. Co-axial probe feed rectangular microstrip antenna is a popular type of microstrip patch antenna and has applications in communication and radar system. Differential Evolution (DE) optimization is also a popular optimization algorithm and recently it is used for design optimization of microstrip patch antennas. The investigation is made at different microwave frequencies ranging between 3 GHz to

Keywords: Co-axial probe feed rectangular microstrip antenna; Differential Evolution (DE); patch length (L); patch width (W); feed position (feedp).

Pages: 14 - 18 | DOI: 10.15224/978-981-07-6260-5-04

5. A CONCEPTUAL METHOD FOR SEARCHING A POSITIVE INTEGER SEARCHING ALGORITHM

Authors: MOHAMMAD HAMID RAFIQUE SHAIKH

Abstract: In this paper I proposed searching technique for positive integer number. In which time complexity is depends on the number of digit of search element (i.e. if searching number is 141 than time complexity will depends on 3) despite of number of elements a list contain.

Keywords: Time complexity, List

Pages: 19 - 20 | DOI: 10.15224/978-981-07-6260-5-05

6. SURVEY OF IMPLEMENTED ROUTING PROTOCOL WITH FUZZY

Authors: DEEPAK MOTWANI , PRITI RAJAWAT

Abstract: An ad-hoc wireless network consist of a set of mobile nodes i.e. hosts that are connected by wireless links. The network topology (the physical connectivity of the communication network may keep changing randomly. routing protocols that find a path to be followed by data packets from the source node to a destination node used traditional wired networks cannot be directly applied in ad hoc wireless networks due to their highly dynamic topology ,absence of established infrastructure for the centralized administration .In this paper, have to studied about the proposed routing protocol with fuzzy system and their different parameter. The main purpose of this paper is to provide with latest implementation in different routing protocol with fuzzy system.

Keywords: MANETs, AODV, DSDV, DSR, fuzzy System

Pages: 21 - 25 | DOI: 10.15224/978-981-07-6260-5-06

7. A NOVEL DWT BASED ENCRYPTED WATERMARKING

Authors: MANOJ KUMAR RAMAIYA , MONIKA SHARMA , NAVEEN HEMRAJANI , NIRUPMA TIWARI

Abstract: Digital watermarking is emerging as effective technique to protect copyrights. The propose paper present a novel technique to protect digital data by embedding encrypted watermark. In this technique discrete wavelet transform is used to embed the watermark image. Each pixel value is encrypted by using stream cipher and the key used is same for encryption and decryption. Key security is essential to protect digital data from unauthorized access. Experimental results verify that the proposed technique performs better and it can withstand compression attack.

Keywords: Grey image, DWT, Image encryption. Stream cipher, digital water marking

Pages: 35 - 38 | DOI: 10.15224/978-981-07-6260-5-09

8. VERTICAL HANDOFF ALGORITHMS USING NEURAL NETWORKS

Authors: ABHIJIT BIJWE , C.G.DETHE

Abstract: 4G systems are expected to rely on multiple wireless networks.These wireless network can be cellular,WLAN,WiMax etc. For switching amongst these different networks, vertical handoff is crucial .Integration of these multiple networks can be done using vertical handoff. Basically, handoff will be keeping the connection alive when the mobile terminal moves from one network to another.In this paper, algorithms on artificialneural networks (ANN)are discussed. To achieve vertical handoff ,ANN is one of the tool which is explored. ANN helps in taking the handoff decision based on RSS(received signal strength), bandwidth, cost, network delay etc. ANN consists of input layer, hidden layer, output layer.In Proposed method mobile terminal performs periodical measurement of RSS and bandwidth samples of two different networks (e.g.:- cellular, WLAN) andvertical handoff decision is taken. Performance of ANN is measured in terms of mean squared error. More appropriate vertical handoff decision is tak

Keywords: input layer, hidden layer, output layer, mobile terminal

Pages: 39 - 42 | DOI: 10.15224/978-981-07-6260-5-10

9. SURVEY ON SEMANTIC CACHING AND QUERY PROCESSING IN DATABASES

Authors: J.VAIDEESWARAN , P.MOHAN KUMAR , T.K.DAS

Abstract: Data caching mechanism for query processing in database turned the researchers due to its performance such as minimum access of latency time, reduced network traffic ,pre fetched data etc, As extension with semantic data caching further made interest among not only the database researchers but also the design and developers even at application level ,due to the existence of data along with its description, pre-processed result which drastically improved the processing speed and user convenience, irrespective of the area such as semantic cache based query processing over peer to peer network, web environment, parallel distributed database,artigficial intelligence,fuzzysets ,mining and cloud. In this paper with this significance a survey is made based on efficiency of query processing as well as pros and cons of existing caching techniques and presented as amending assistance for the database people for enhancement of real world application.

Keywords: semantic caching, query processing

Pages: 43 - 47 | DOI: 10.15224/978-981-07-6260-5-11

10. A REGENERATIVE FEEDBACK APPROACH TO GREEN COMPUTING

Authors: SHREYAS SRINATH

Abstract: n the present world we are facing lot of electricity problem, lack of natural substances, depletion of fossil fuels etc., hence we should think of acquiring maximum with the limited energy resources. Green computing is the term used to denote efficient use of resources in computing .This paper mainly deals with a regenerative approach towards green computing, to enhance the power backup of battery in the laptops. This paper also throws light on regenerative technique (the heat generated by the processor is utilized) and made to harness energy

Keywords: Amplifier, Green computing, Piezomaterial, Sensors.

Pages: 48 - 51 | DOI: 10.15224/978-981-07-6260-5-12

11. DIGITAL SYSTEM ANALYSIS USING XILINX CHIPSCOPE LOGIC ANALYZER

Authors: P. K. GIAIKWAD

Abstract: The present research paper depicts a technique to debug FPGA based systems by merely viewing internal signals pertaining to real time processes. There are established techniques prevailing in this domain based on Logic Analyzer that facilitates display of 16 to 32 simultaneous signals. However, the main bottleneck comes when monitoring of the internal signals of reconfigurable devices like Field Programmable Gate Array (FPGA) is concerned; especially when it is not practically possible to bring them out at I/O pins for the purpose of monitoring. Through the present paper author showcases an EDA tool, ChipScope-Pro from Xilinx Inc., for viewing signals inside the FPGA. For that, a prototype of data acquisition system has been technologically advanced using serial Analogue to Digital Convertor (ADC) and different Soft Intellectual Property (IP) Cores developed in Very High Speed Integrated Circuit Hardware Description Language (VHDL) and implemented in the Xilinx FPGA. A physical paramet

Keywords: ChipScope, FPGA, Vitrex-5, internal signals, ICON, ILA, Core Generator, JTAG

Pages: 52 - 55 | DOI: 10.15224/978-981-07-6260-5-13

12. AN APPROACH TO PANCREATIC CANCER DETECTION USING ARTIFICIAL NEURAL NETWORK

Authors: SUJIT DAS , TANAYA SEN

Abstract: Cancer is a class of diseases characterized by out-of-control cell growth and pancreatic cancer (PC) occurs when this uncontrolled cell growth begins in the pancreas. If it is malignant and not detected at early stages, it may cause death. The aim of this paper is to present artificial neural network in pancreatic disease diagnosis based on a set of symptoms. The real procedure of medical diagnosis which usually is employed by physicians was analyzed and converted to a machine implementable format. This paper presents an approach to detect the various stages of pancreatic cancer affected patients. Outcome suggests the effectiveness of using neural network over manual detection procedure

Keywords: Neural network, fuzzy logic, medical diagnosis, pancreatic cancer, literature review

Pages: 56 - 60 | DOI: 10.15224/978-981-07-6260-5-14

13. REDUCING CYBER THREATS : VIA A MULTIMODAL BIOMETRIC SYSTEM

Authors: APARNA NARAYANAN , GUNJAN CHHABRA

Abstract: This era of Information Technology and Computing has provided us with various emerging trends in every field of our life. One of its blessings is in the field of cyber world which allows easy communication and transfer of information and data.As cyber demands increases, related issues also come under play like hacking, cyber wars, etc. As the communicated data is very crucial, everyone tries to keep it secure or transfer it securely. Some security techniques use human body characteristics known as biometrics. In this paper we have tried to highlight the various methods of reducing cyber threats by using the emerging technology of biometric systems. We have further described its classification and usage as a multimodal biometric system for a secure cyber world.

Keywords: Cyber Security, Biometric, Multimodal System, Heart beat pattern.

Pages: 61 - 65 | DOI: 10.15224/978-981-07-6260-5-15

14. SECURITY METRIC FRAMEWORK FOR THE SOFTWARE ARCHITECTURE AND DESIGN LEVEL AN EMPIRICAL EVALUATION

Authors: IRSHAD AHMAD MIR , S.M.K QUADRI

Abstract: The field of security metric and security evaluation is multifaceted and multidimensional in nature, which needs great care and systematic approach to evaluate. The security evaluation is a continuous process that should be carried out throughout the different software development stages and also in the operational phases. In practice the secure software development is based upon the guidelines and rules for secure design and coding. Even if the secure software development process and guidelines are to be followed, the resultant level of security remains unknown to the development team. A security evaluation framework that can be applied at the early system development stages,the derived metrics that act as indicators of security level of the system and point out the most critical component of the system , in order to provide the basis for the system developers to take the design decisions regarding security is the foremost requirement of secure software development. In this study we h

Keywords: Software architecture, Security Metrics, Security Evaluation

Pages: 70 - 81 | DOI: 10.15224/978-981-07-6260-5-17

15. NAIVE BAYESIAN CLASSIFIER FOR UNCERTAIN DATA USING EXPONENTIAL DISTRIBUTION

Authors: NAGAMANI CHIPPADA , NAGARAJU DEVARAKONDA , SHAIK SUBHANI

Abstract: Most real databases contain data whose correctness is uncertain. In order to work with such data, there is a need to quantify the integrity of the data. This is achieved by using probabilistic databases. Data uncertain is common in real world applications. The uncertainty can be controlled very prudently. In this paper, we are using probabilistic models on uncertain data and develop a novel method to calculate conditional probabilities for uncertain numerical attributes. Based on that, we propose a Naive Bayesian classifier algorithm for uncertain data(NBCU) using exponential distribution. The ultimate aim is determine the uncertainty of multiple attributes using our proposed approach (NBCU).The experimental results show that the proposed method classifies uncertain data with potentially higher accuracy.

Keywords: Uncertainity, Exponential Distribution, Naïve Bayesian classifier, conditional probability

Pages: 82 - 86 | DOI: 10.15224/978-981-07-6260-5-18

16. CHUNK BASED APPROACH FOR VIDEO STREAMING IN PEER TO PEER NETWORK

Authors: D. A. PHALKE , NILAM S. PATIL

Abstract: Peer-to-Peer system has emerged as a promising technology to provide video-on-demand service. Several P2P-VoD systems have been deployed and attracted a large population of viewers. However, it is challenging to design P2P media streaming networks because of the stringent time constraints on the delivered media streams, which require more efficient and resilient overlay architectures. Compared with existing client server system model, where the single server must have enough resources to support all simultaneous clients. Proposed system focuses on design of P2P media streaming networks, which requires the fast distribution of multimedia content to clients. Proposed algorithm is described as 1)serial and parallel scheduling of chunks correctly switched to get required quality of service 2)dynamic nature of peers is considered 3)fault tolerance is provided in case of peer failure

Keywords: Peer to Peer System, Video on Demand (VoD), Content Delivery Network, Overlay Network, Bittorrent, File sharing network.

Pages: 66 - 69 | DOI: 10.15224/978-981-07-6260-5-16

17. EFFICIENT ROUTING ALGORITHM FOR MOBILE AD HOC NETWORKS

Authors: AAMIR MOHAMMED , PALLAVI KHATRI

Abstract: A mobile ad hoc network is a multi hop wireless network formed by a group of mobile nodes that have wireless capabilities. Connections in MANET (Mobile Ad hoc Networks) are established and revoked dynamically as the network is dynamic. The entities in the network can join and leave the network anytime. Transmission of data becomes challenging in such networks where the position of a node is not fixed nor is the link joining the two nodes permanent. Efficient routing algorithms are required for efficiently transmitting data in the network. Research in the area of designing an efficient algorithm is an upcoming area, the expected outcome of which is an efficient algorithm which can help in better performance. This work proposes improved AODV (Ad hoc On demand Distance Vector) routing algorithm named as AODV - BL which helps in quick rebuilding of the broken links from source to destination. Protocol maintains a backup list at the source node containing all the possible routes from source

Keywords: AODV, Link Break, Backup Lists.

Pages: 87 - 91 | DOI: 10.15224/978-981-07-6260-5-19

18. ANALYSIS OF TWO & THREE LEVEL DIODE CLAMPED MULTILEVEL INVERTER FED PMSM DRIVE USING SPACE VECTOR PULSE WIDTH MODULATION (SVPWM)

Authors: G. SREE LAKSHMI , S. KAMAKSHAIAH , TULASI RAM DAS

Abstract: This paper proposes implementation of Two and Three Level Diode-Clamped Multilevel inverter using IGBT’s fed to both built -in and mathematical model of PMSM drive. The pulses for the inverters have been developed by using Space Vector Pulse Width Modulation Technique (SVPWM). Space Vector Pulse Width Modulation Technique is most prominent PWM technique for three phase voltage source inverters for the control of AC Induction Motors, Brushless DC Motors, Switched Reluctance and Permanent Magnet Synchronous Motors. The output voltages, currents, torque and speed characteristics have studied for two and three-level inverters fed to both mathematical model and built -in model. It has observed that both have same results. Three -level inverter can use more DC link voltage than two- level inverter and also SVPWM Technique utilizes DC bus voltagemore efficiently and generates less harmonics.

Keywords: Diode Clamped Two-level inverter, Three-level inverter, Space Vector Pulse Width Modulation (SVPWM), PMSM.

Pages: 92 - 96 | DOI: 10.15224/978-981-07-6260-5-20

19. A NOVEL APPROACH TO CONSTRUCT ONLINE TESTABLE REVERSIBLE LOGIC

Authors: DEBAJYOTY BANIK

Abstract: Reversible logic is emerging as an important research area having its application in diverse fields. Reversible circuits can be used in the fields of low-power computation, cryptography, digital signal processing, communications and the emerging field of quantum computation. Regardless of the eventual technology adopted, testing is sure to be an important component in any robust implementation. A new approach for automatic conversion of any given reversible circuit into an online testable circuit that can detect online any single-bit errors, including soft error in logic block is described in this paper.

Keywords: Reversible logic; parity preserving reversible gates

Pages: 97 - 100 | DOI: 10.15224/978-981-07-6260-5-21

20. FABRICATION OF AUNPS-BRIDGED NANOGAP ELECTRODES FOR CHEMOSENSITIVE SENSORS

Authors: K. HAYASHI , M. IMAHASHI , M. WATANABE

Abstract: Simple fabricating methods of nanostructures are required for solving many kinds of problems in the field of electronic engineering. The fabrication of novel and functional nanostructures is a promising way toward innovations: low power consuming devices, sensors with higher sensitivity, selectivity, as well as other novel functions. However, various researches are limited in costly, complex and time-consuming methods. We demonstrated a simple way to obtain nanogap electrodes using ordinary photolithographic techniques and electromigration, and its application as chemoresistive gas sensor based on gold nano-particles (AuNPs)-bridging.

Keywords: nanogap electrodes, gold nanoparticles, electromigration, chemiresistors

Pages: 101 - 104 | DOI: 10.15224/978-981-07-6260-5-22

21. DEVELOPMENT OF ENERGY HARVESTING SOURCE FROM PIEZOELECTRIC SHOE

Authors: KAMBLESUSHAMABABURAO

Abstract: Recent advances in energy harvesting have been intensified due to urgent need of portable, wireless electronics with extensive life span. The idea of energy harvesting is applicable to sensors that are placed and operated on some entities for a long time, or embedded into structures or human bodies, in which it is troublesome to replace the sensor module batteries. Such sensors are commonly called “self-powered sensors.”The idea of energy harvesting is applicable to sensors that are placed and operated on some entities for a long time, or embedded into structures or human bodies, in which it is troublesome or detrimental to replace the sensor module batteries. Such sensors are commonly called” self-powered sensors.”The energy harvester devices are capable ofcapturing environmental energy and supplanting the battery in a stand-alone module, or working along with the battery to extend substantially its life. Vibration is considered one of the most high power and efficient among other amb

Keywords: Energy harvesting, power generation, shoe power, dc/dc conversion

Pages: 105 - 110 | DOI: 10.15224/978-981-07-6260-5-23

22. A NOVEL APPROACH FOR DYNAMIC CLASSIFICATION IN CRM USING FUZZY LOGIC

Authors: EKTA PATEL , FALGUNI SONI , KHUSHBU TAPIAWALA , RUTVIJ JHAVERI

Abstract: Customer Relationship Management (CRM) analyzes, classifies, examines and manages customer\'s needs according to their interest. In this paper, we propose an algorithm for grouping customers using fuzzy logic. The term fuzzy means not clear or blurred and fuzzy logic means representing variation or imprecision in logic. We use fuzzy logic, and not other mining and statistical methods, to dynamically classify the customers. As a result, we dynamically classify customers into more than one groups at the same time. The algorithm calculates the customer\'s chance of belonging to a particular group on the basis of probabilities without using any prior information. Fixed number of groups is not given as input because groups are dynamically generated according to the requirement

Keywords: Customer Relationship Management, fuzzy logic, probability, dynamic classification.

Pages: 111 - 115 | DOI: 10.15224/978-981-07-6260-5-24

23. FRAMEWORK FOR CHOOSING BEST INTRUSION DETECTION AND PREVENTION SYSTEM FOR AN ORGANIZATION

Authors: BILAL MAQBOOL BEIGH , MUSHTAQ AHMAD PEER

Abstract: In today’s world, where every organization relay on computer systems and stores it’s all critical information on the computer systems via online and off-line systems. Critical information is being sent via network. But in recent time’s computer system are facing problems in the form of malicious data which can cause different problems such as denial of services, information theft, information lost etc. Till date many detection and prevention techniques are available in market, but how an organization will choose the best security policy for it remains a big issue for researchers and security professionals. In order to solve this issue we are devising a framework in terms of guidelines for choosing best intrusion detection system for your organization. The results of current research are very useful for educational purpose and organization who are interested in intrusion detection systems (IDSs).

Keywords: Intrusion, Malicious, Attack, challenge, critical, information, computer systems, network, denial of service, security, policy, guidelines

Pages: 126 - 131 | DOI: 10.15224/978-981-07-6260-5-27

24. IMPLEMENTATION OF HYBRID ALGORITHM FOR SECURED MULTIMEDIA MESSAGING SERVICE SYSTEM USING ANDROID

Authors: GEETANJALI R. KSHIRSAGAR , SAVITA KULKARNI

Abstract: Design and Implementation of Steganography along with secured message services in Mobile Phones is used to provide security to the data that flows across the mobiles. In this paper encryption and steganography algorithms are implemented using JAVA™ with android platform to provide the security for real time multimedia messaging service system. Establishing hidden communication for mobile has become an important subject of security. One of the methods to provide security is steganography. Steganography is used to hide secret information inside some carrier. Hiding information, especially in images has been an alternative solution for secret communication. To improve the security, encrypted secret data will be hidden inside MMS. The image is made to be hidden into image from MMS which provides more secured transmission than text information embedded into the MMS. The Least Significant Bit (LSB) embedding technique is used to hide the secret information (image). Different sizes of secret

Keywords: Android Platform, Encryption, LSB, MMS, MSE, PSNR, Security, Steganography

Pages: 132 - 137 | DOI: 10.15224/978-981-07-6260-5-28

25. SYNTHESIS OF DIGITALLY CONTROLLED COSECANT SQUARED PATTERN IN TIME-MODULATED LINEAR ANTENNA ARRAYS USING DIFFERENTIAL EVOLUTION

Authors: AAMIR AHMAD , ANANDA KUMAR BEHERA , G. K. MAHANTI , ROWDRA GHATAK , S. K. MANDAL

Abstract: In this paper, the additional dimension ‘time’ is used to synthesize cosecant squared shaped, beam pattern in linear antenna arrays with digitally controlled static amplitude and the phase shift of the array elements. The static amplitude and the phase shift are assumed to be obtained from the output of a five bit digital converter. For the desired shaped beam pattern, normalized on-time duration and the quantized value of the static amplitudes and phase shift are obtained by using Differential evolution (DE) algorithm. The search space of the static amplitudes, phase shift and switch on-time durations are considered as (0.05, 1), (0, 2π) and (0.04, 1) respectively. Thus with relatively low dynamic range ratio of static amplitude and sufficiently high value of on-time duration, the feed network of the antenna array can be designed easily. The proposed approach is demonstrated with a 30 element time modulated linear antenna array (TMLAA) by synthesizing the shaped beam pattern for the a

Keywords: Time modulated Linear Antenna Array (TMLAA), Sideband Level (SBL), Side lobe level (SLL), Cosecant Squared Pattern (CSP), Differential Evolution (DE).

Pages: 138 - 142 | DOI: 10.15224/978-981-07-6260-5-29

26. E-COMMERCE & LAW TRENDS & CHALLENGES

Authors: S.SAI SUSHANTH

Abstract: In the technology era, the traditional way of transacting business is replaced by electronic commerce popularly known as E-commerce. E-Commerce means using of information technology, computers and other electronic means to transact business by and between individuals and entities. E-commerce is one of the significant developments in the International Trade. It has provided many advantages besides many challenges. The Information Technology Act 2000 is one of the primary laws which has promoted e-commerce, e-governance and has provided legal recognition to e-records and e-transactions. Cyber law in India tires to attend these challenges and requires compliance of IT Laws by business houses engaging in e-commerce. The Indian Information Technology Act, 2000 make it mandatory to set up corporate compliance programs including cyber law compliance program.

Keywords: E-Commerce, Cyber law, IT Act, Mobile Commerce, Social Commerce, Data protection.

Pages: 143 - 147 | DOI: 10.15224/978-981-07-6260-5-30

27. ANN BASED CRITICAL CLEARING TIME DETERMINATION FOR IEEE 9 BUS SYSTEM

Authors: MANOJ KUMAR , GANGA AGNIHOTRI , MUKESH KUMAR KIRAR , RENUKA KAMDAR

Abstract: This paper presents Artificial Neural Network based critical clearing time (CCT) calculation for IEEE-9 bus system. The critical clearing time (CCT) at the critical contingency is considered as an index for transient stability. By selecting loads and generators active and reactive power as a input neurons critical clearing time is determined. The modeling and simulation results for load flow and CCT calculations are accomplished using the simulation package ETAP. The ANN training and testing is implemented in MATLAB software.

Keywords: component, formatting, style, styling, insert

Pages: 220 - 225 | DOI: 10.15224/978-981-07-6260-5-45

28. SECURITY FRAMEWORK FOR EHEALTH SERVICES: A STUDY

Authors: SHILPA SHRIVASTAVA

Abstract: E-health services are subjected to same security threats as other online services. This paper emphasizes the requirement of a strong framework in e-health domain for reliable delivery of medical data over the internet. The paper recognizes current and future technological solutions in this regard. The solutions includes the authorization and authentication techniques and cryptography for the data transmission . Recent initiatives in Indian scenarios have also been analyzed. It further suggests the application of SOAP for building a secured framework.

Keywords: authorization and authentication, cryptography, SOAP.

Pages: 215 - 219 | DOI: 10.15224/978-981-07-6260-5-44

29. AN EFFICIENT BISD SCHEME FOR DIAGNOSIS OF COUPLING FAULTS

Authors: DEEPAK AGARWAL , KIRTISOVA BEHERA , MANOJIT PANDA

Abstract: As the use and density of memories in electronic circuits is growing more and more, testing of memories and diagnosing various faults present in them are becoming more and more prominent now-a-days. In this paper, two new types of hardware BISD circuits are designed for bit oriented memories. The proposed BISD circuits can not only detect the coupling faults but also locate the address of the victim cell as well as that of the aggressor cell in the presence of a coupling fault. Above all this circuit is very simple, easy to design and is expected to reduce the testing time compared to the software based testing methodologies.

Keywords: Memory, fault model, March Test, BISD

Pages: 209 - 214 | DOI: 10.15224/978-981-07-6260-5-43

30. DESIGN OF A DELAY BLOCK FOR LOW FREQUENCY SWITCH-CAPACITOR CIRCUITS

Authors: ASHISH KUMAR MAL , BOLLIPELLI SRIKANTH , RISHI TODANI , SANDEEP KUMAR DASH

Abstract: Switch-capacitor (SC) circuits are one of the most popular methods for implementing signal processing blocks such as Integrator, Filters, ADC in CMOS technology. This is primarily due to accurate time constant realization over a wide temperature and process corners. Beside good voltage linearity SC circuits occupies less area than continuous time circuits. Non-overlapping clock (NOC) generator is one of the important blocks of any SC circuit. In standard NOC design, simple CMOS inverters are connected in cascade to implement delay blocks. As technology scales, number of inverter increases affecting the area and power budget of the design. In this work, it is proposed to use two numbers of inverted CMOS inverters and one current starved inverter in cascade as a delay block, to achieve a larger delay for a given area. The proposed delay block is used to realize a ring oscillator and a voltage controlled NOC generator. Simulation result shows that proposed delay block exhibits a larger de

Keywords: Switch-capacitor circuits, delay block, ring oscillator, NOC generator, Switch-capacitor Integrator, GPDK 90nm, Inverted inverter.

Pages: 203 - 204 | DOI: 10.15224/978-981-07-6260-5-42

31. SHORT CIRCUIT ANALYSIS OF AN INDUSTRIAL DISTRIBUTION SYSTEM

Authors: MANOJ KUMAR , GANGA AGNIHOTRI , MUKESH KUMAR KIRAR , RENUKA KAMDAR

Abstract: The power system studies are required to evaluate the performance of the system at planning stage as well as running conditions. This paper presents short circuit analysis of an industrial electrical power distribution system in compliance to IEC 60909. Short-circuit studies can be performed at the planning and design stage in order to help finalize the system layout, determine voltage levels, protection equipments, switchgears, and cables size, transformers, grounding and earthing. The industrial distribution system is simulated on ETAP software and different fault study is performed.

Keywords: ETAP, IEC 60909, Short circuit analysis

Pages: 199 - 202 | DOI: 10.15224/978-981-07-6260-5-41

32. SHORT CIRCUIT ANALYSIS OF AN INDUSTRIAL DISTRIBUTION SYSTEM

Authors: MANOJ KUMAR , GANGA AGNIHOTRI , MUKESH KUMAR KIRAR , RENUKA KAMDAR

Abstract: The power system studies are required to evaluate the performance of the system at planning stage as well as running conditions. This paper presents short circuit analysis of an industrial electrical power distribution system in compliance to IEC 60909. Short-circuit studies can be performed at the planning and design stage in order to help finalize the system layout, determine voltage levels, protection equipments, switchgears, and cables size, transformers, grounding and earthing. The industrial distribution system is simulated on ETAP software and different fault study is performed.

Keywords: ETAP, IEC 60909, Short circuit analysis

Pages: 199 - 202 | DOI: 10.15224/978-981-07-6260-5-41

33. CAMPUS SECURITY USING HONEYPOT

Authors: AHER NISHA N

Abstract: Now a day the number of computer and network security incidents has been increasing remarkably in the past few years the importance of networks security and services at higher education institutions has never been higher than it is now. Users and institutions are demanding more and more network services and the exchange of more potentially sensitive information within these services. This has various impacts on the campus, ranging from the so-called Denial-Of-Service (DOS) to virus infection on end-users\' desktop / notebook computers. Therefore, the issue of network security has become a priority to campus network management, While using network services in campus network it can be more easily attacked. This paper presents a new technology called honeypot whose purpose is to detect and learn from attacks and use that information to improve security. A network administrator obtains first-hand information about the current threats on his network. Undiscovered security holes can be prote

Keywords: users, desktop, notebook, computers.

Pages: 153 - 156 | DOI: 10.15224/978-981-07-6260-5-32

34. MATRIX FORMULATION OF NTRU ALGORITHM USING MULTIPLE PUBLIC KEYS FROM MATRIX DATA BANK FOR HIGH DEGREE POLYNOMIALS

Authors: D. GOSH , MOHAN RAO MAMDIKAR , VINAY KUMAR

Abstract: In many business sectors sending secure information over public channels has become a challenging task. Data encryption is not the most efficient method to counter attacks for adversaries. One form of encryption called the symmetric key encryption uses the same key for encryption at sender’s end and for decryption at the receiver’s end. World-wide encryption standards such as DES and AES are used in Government and public domains. However symmetric key encryptions are prone to attacks by intruders. Asymmetric key encryption has been proposed in the Jofferey et al. [4] wherein the key to be used to send a message to R is made public and R uses his own private key to decrypt the encrypted message. NTRU is one such Public key Cryptosystem (PKCS), which is based on polynomial Ring Theory. The security of NTRU depends on the lattices. Several studies have suggested that it is difficult to know whether a polynomial is invertible or not. Nayak et al.[2] introduced a new method as a matrix solu

Keywords: NTRU, Private Key, Public Key, Encryption, Decryption, Modular Operation, matrix databank.

Pages: 191 - 198 | DOI: 10.15224/978-981-07-6260-5-40

35. REGION SPECIFIC CROP YIELD ANALYSIS A DATA MINING APPROACH

Authors: B VISHNU VARDHAN , D RAMESH

Abstract: Indian Gross Domestic Product (GDP) is largely depends on agricultural production. Agricultural production is the product of cultivated area and average yield per unit area. Its impact on the welfare of the country is much greater and nearly 70% of the working population depends on agricultural activities for their livelihood. Agrarian sector in India is facing a severe problem to maximize crop productivity. More than 60 % of the crop in India still depends solely on monsoon rainfall (Central Statistical Organization, 2008). An analysis of past climatic variations and its impact on agricultural production is presented in this paper to get the climate variability on agriculture. Recent development in Information Technology enabled new methods to adopt in agriculture sector. High end servers and the latest software in analytics are useful for predicting certain crop production. Clustering approach is used for estimating the future year’s rice production based on average rain fall of spec

Keywords: Agrarian Sector, Clustering , Data Mining, Gross Domestic Product, Multiple Linear Regression

Pages: 187 - 190 | DOI: 10.15224/978-981-07-6260-5-39

36. SIGNIFCANCE RESEARCH REVIEW ON REAL TIME DIGITAL VIDEO WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION

Authors: A. H. KARODE , ASHISH S. BHAISARE , S. R. SURALKAR

Abstract: The main objective of this paper is to describe an efficient hardware-based concept of a digital video WM system which features low power consumption, efficient and low cost implementation, high processing speed, reliability and invisible, semi-fragile watermarking in compressed video streams. The presented WM system can be integrated with video compressor unit and it achieves performance that matches complex software algorithms within a simple efficient hardware implementation. The system also features minimum video quality degradation and can withstand certain potential attacks i.e. cover-up attack, cropping, segment removal on video sequences. The proposed WM system is implemented using Verilog hardware description language (HDL) synthesized into a field programming gate array (FPGA) and then experimented using a custom versatile breadboard for performance evaluation is describe through various research papers which give a vital review related to digital video watermarking system fo

Keywords: Complex software algorithms, Semi-fragile watermarking, FPGA,VHDL

Pages: 161 - 166 | DOI: 10.15224/978-981-07-6260-5-34

37. DECOUPLING CAPACITOR INDUCED BANDWIDTH AND DELAY EXPRESSIONS FOR ON-CHIP RLC GLOBAL INTERCONNECTS

Authors: MRIGENDRA KUMAR , NIVEDITA ROUT , SANDEEP KUMAR DASH , SANTOSH KU CHHOTRAY

Abstract: Continuously scaling down devices is the main goal in deep sub-micron (DSM) technology. Though using DSM technology we are achieving many advantages. But circuit performances are badly affected because of secondary effects like crosstalk noise. According to International Technical Roadmap for Semiconductors(ITRS) 2011 report today’s DSM technology outsmarted Moore’s law to work in a new industrial trend called “More than Moore” (MtM). To accomplish this, it is necessary to analyze the timing behavior of the interconnect. Decoupling capacitor can have significant effect on principal characteristics of an integrated circuit (IC) i.e. speed, cost and power. So by including a decoupling capacitor intentionally can control secondary effects in very deep sub-micron (VDSM) technology. But inserting a decoupling capacitor affects delay and bandwidth of the interconnect. So while inserting decoupling capacitor we have to check for the disturbances in delay and bandwidth. Here in this paper two

Keywords: Decoupling capacitor, interconnects, Bandwidth, Delay

Pages: 182 - 186 | DOI: 10.15224/978-981-07-6260-5-38

38. DIGITAL WATERMARKING AND MODULATION TECHNIQUES USED BY CTS FOR SECURE TRANSMISSION OF BANK CHEQUES IMAGES

Authors: ASHOK A.GHATOL, , SUDHANSHU SUHAS GONGE

Abstract: Data Communication is the exchange of data between the two devices via some form of transmission medium such as a wire cable. However in 21st century, Data communication can be done by using various networks such as, LAN, MAN, WAN etc. The Information may be in any form i.e. text, audio, vedio or in image form. To transmit the data in different format for long distance, it is going to use modulation Technique and its security can be provide by using various techniques such as Steganography,Encryption and Decryption, Digital Watermarking etc. In this paper, it is going to discuss with “combination of Modulation and Digital Watermarking Technique used for Secure Transmission of Bank Cheques Images.

Keywords: transforms, modulation techniques, watermark, digital watermarking techniques.

Pages: 167 - 170 | DOI: 10.15224/978-981-07-6260-5-35

39. TAMIL BRAILLE SYSTEM: A CONVERSION METHODOLOGY OF TAMIL INTO CONTRACTED BRAILLE SCRIPT (GRADE2)

Authors: S. SANTHOSH BABOO , V.AJANTHA DEVI

Abstract: Different countries of the world have adopted the Braille System to suits their language. The main focus of the paper is the conversion of Tamil to Braille Conversion System. The paper provides a detail description of a system for Tamil Braille and different grades of Braille contraction. The Tamil Braille is designed to facilitate Tamil-speaking visually impaired people interaction with computers, as well as helping sighted users to communicate with the visually impaired person.

Keywords: Braille System, Grades of Braille, Tamil Braille Scipt, Tamil to Braille Conversion System.

Pages: 171 - 175 | DOI: 10.15224/978-981-07-6260-5-36

40. DIGITAL WATERMARKING AND MODULATION TECHNIQUES USED BY CTS FOR SECURE TRANSMISSION OF BANK CHEQUES IMAGES

Authors: ASHOK A.GHATOL, , SUDHANSHU SUHAS GONGE

Abstract: Data Communication is the exchange of data between the two devices via some form of transmission medium such as a wire cable. However in 21st century, Data communication can be done by using various networks such as, LAN, MAN, WAN etc. The Information may be in any form i.e. text, audio, vedio or in image form. To transmit the data in different format for long distance, it is going to use modulation Technique and its security can be provide by using various techniques such as Steganography, Encryption and Decryption, Digital Watermarking etc. In this paper, it is going to discuss with “combination of Modulation and Digital Watermarking Technique used for Secure Transmission of Bank Cheques Images.

Keywords: transforms, modulation techniques, watermark, digital watermarking techniques.

Pages: 167 - 170 | DOI: 10.15224/978-981-07-6260-5-35

41. TAMIL BRAILLE SYSTEM: A CONVERSION METHODOLOGY OF TAMIL INTO CONTRACTED BRAILLE SCRIPT

Authors: S. SANTHOSH BABOO , V.AJANTHA DEVI

Abstract: Different countries of the world have adopted the Braille System to suits their language. The main focus of the paper is the conversion of Tamil to Braille Conversion System. The paper provides a detail description of a system for Tamil Braille and different grades of Braille contraction. The Tamil Braille is designed to facilitate Tamil-speaking visually impaired people interaction with computers, as well as helping sighted users to communicate with the visually impaired person.

Keywords: Braille System, Grades of Braille, Tamil Braille Scipt, Tamil to Braille Conversion System.

Pages: 171 - 175 | DOI: 10.15224/978-981-07-6260-5-36

42. SIGNIFICANCE RESEARCH REVIEW ON REAL TIME DIGITAL VIDEO WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION

Authors: A. H. KARODE , ASHISH S. BHAISARE , S. R. SURALKAR

Abstract: The main objective of this paper is to describe an efficient hardware-based concept of a digital video WM system which features low power consumption, efficient and low cost implementation, high processing speed, reliability and invisible, semi-fragile watermarking in compressed video streams. The presented WM system can be integrated with video compressor unit and it achieves performance that matches complex software algorithms within a simple efficient hardware implementation. The system also features minimum video quality degradation and can withstand certain potential attacks i.e. cover-up attack, cropping, segment removal on video sequences. The proposed WM system is implemented using Verilog hardware description language (HDL) synthesized into a field programming gate array (FPGA) and then experimented using a custom versatile breadboard for performance evaluation is describe through various research papers which give a vital review related to digital video watermarking system fo

Keywords: Complex software algorithms, Semi-fragile watermarking, FPGA,VHDL

Pages: 161 - 166 | DOI: 10.15224/978-981-07-6260-5-34

Popular Proceedings

ICETM 2023

9th International E-Conference on Engineering, Technology and Management

ESSHBS 2017

7th International Conference On Advances In Economics, Social Science and Human Behaviour Study

ASET 2017

7th International Conference on Advances in Applied Science and Environmental Technology

ACSM 2017

7th International Conference on Advances in Civil, Structural and Mechanical Engineering

CSM 2017

5th International Conference on Advances in Civil, Structural and Mechanical Engineering

SEM 2017

5th International Conference on Advances in Social, Economics and Management

ICETM 2022

8th International E- conference on Engineering, Technology and Management

ACSEE 2019

8th International Conference on Advances in Civil, Structural and Environmental Engineering