This document discusses location-based encryption in GSM cellular networks. It proposes using a mobile station's location information, determined through cell ID, sector ID, and timing advance, to generate encryption keys. This adds an additional layer of security beyond conventional GSM encryption by only allowing decryption in authorized locations. The document reviews GSM security structures and positioning methods. It then presents a new key generation method that incorporates location to strengthen security compared to relying only on SIM card parameters for key generation.
IRJET- I-Share: A Secure Way to Share ImagesIRJET Journal
This document presents a secure method called "I-Share" for sharing encrypted images over a public network like the internet. It uses Quick Response (QR) codes to encrypt images using an optical encryption method called Double Random Phase Encoding (DRPE) that adds speckle noise. The proposed method converts images to binary data, cuts it into segments to fit into QR codes, encrypts the QR codes using DRPE, then decrypts and reconstructs the original image from the decrypted QR codes without speckle noise. This provides enhanced security compared to traditional DRPE by separating the encrypted data from the speckle noise using the QR codes. The method was designed for an Android application to securely transfer encrypted images over networks.
The document discusses security mechanisms in GSM networks. It first outlines the goals of security for operators and customers. It then describes the four main security principles of GSM: user authentication, ciphering of data and signals, confidentiality of user identity, and use of the SIM as a security module. The document reviews two papers on vehicle security and anti-theft systems using GSM and GPS. It compares the papers and identifies some shortcomings of such systems, such as weaker connectivity in rural areas. Finally, it concludes the systems can help reduce vehicle theft if implemented widely.
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...IRJET Journal
This document proposes a visual secret sharing scheme to encode secret QR codes into shares to improve security. The secret message is first encrypted then divided into shares that are encoded as valid QR codes. Only by recombining an authorized set of shares can the secret be recovered. This approach aims to resist attacks while maintaining the readability of QR codes. The proposed scheme is experimentally proven to be feasible and low cost. It could enhance the security of transmitting private information via QR codes.
This document summarizes an article from the International Journal of Computer Engineering and Technology. The article proposes using an FPGA-based hardware dongle to securely implement RSA cryptography and prevent secret software information from being extracted. It describes using the FPGA to perform half of the RSA encryption process, with the other half decrypted on the software side. The document provides details on the RSA encryption algorithm, FPGA programming, a design for interfacing between a computer and the FPGA dongle, and results of encrypting data with the proposed system. It concludes the approach provides a way to wrap the RSA layer and restrict applications from running without a connected dongle.
IRJET - Image Watermarking using QR CodeIRJET Journal
This document presents a technique for digital image watermarking using QR codes. It aims to provide copyright protection and authentication of digital images. The technique works by encrypting an image using AES encryption and embedding the encrypted data in a QR code. The QR code is then hidden behind a cover image using steganography. This makes it difficult for unauthorized users to detect the hidden watermark or tamper with the encrypted image data. The document discusses related work on image watermarking and steganography techniques. It also provides details of the proposed system architecture, classification of digital watermarking techniques, the AES encryption algorithm used, and potential applications of the presented image watermarking approach.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
This document summarizes a research paper that designed and implemented a Zigbee-based theft monitoring system. The system uses Zigbee modules for wireless data transmission between sensors and a PIC microcontroller. When an object is detected by an IR sensor, the PIC notifies a PC via RS-232. The PC identifies the area using a database and sends an SMS alert to an authorized person via GSM while capturing video of the area with a camera. The system was tested with over 100 Zigbee modules and was able to quickly detect theft occurrences wirelessly.
This basic presentation / video looks at SIM (Subscriber Identity Module) card, its evolution and what is the relation between SIM and UICC (Universal Integrated Circuit Card). It also explains different form factors like 2FF, 3FF, 4FF and MFF2 and UICC contents briefly.
Finally, we look at embedded SIM (eSIM), integrated SIM (iSIM), eUICC Profiles and profile switching via remote provisioning functions.
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
5G Page: https://www.3g4g.co.uk/5G/
Free TrainingVideos: https://www.3g4g.co.uk/Training/
We at Pantech ProEd provide assistance in academic projects based on IEEE standard journals and transactions. Our services cater to all the domains belonging to Circuit branches and Information and Communication engineering branches.
Our methodology of execution and delivery is state - of -art, in essence a professionally designed, intensively tested, work flow model is applied.
Our Project support services caters to the following courses,
1) B.E / B.Tech (EEE/ECE/CSE/IT)
2) M.E (Power Systems)
3) M.E (Power Electronics & Drives)
4) M.E (High Voltage Engineering)
5) M.E (Electrical Drives & Embedded Control)
6) M.E (Control & Instrumentation Engineering)
7) M.E (Embedded System Technologies)
8) M.E (Applied Electronics)
9) M.E (Communication Systems)
10) M.E (VLSI Design)
11) M.E (Medical Electronics)
12) M.E (CSE)
13) M.E (Software Engineering)
14) M.E (Multimedia Technology)
15) M.Tech (Information Technology)
16) M.C.A
17) M.E (Systems Engineering and Operations Research)
18) M.E (Communication and Networking)
19) M.E (Avionics)
20) M.E. (Mobile Pervasive and Computing)
21) M.E. (Network Engineering)
22) M.E (Computer & Communication)
IRJET- I-Share: A Secure Way to Share ImagesIRJET Journal
This document presents a secure method called "I-Share" for sharing encrypted images over a public network like the internet. It uses Quick Response (QR) codes to encrypt images using an optical encryption method called Double Random Phase Encoding (DRPE) that adds speckle noise. The proposed method converts images to binary data, cuts it into segments to fit into QR codes, encrypts the QR codes using DRPE, then decrypts and reconstructs the original image from the decrypted QR codes without speckle noise. This provides enhanced security compared to traditional DRPE by separating the encrypted data from the speckle noise using the QR codes. The method was designed for an Android application to securely transfer encrypted images over networks.
The document discusses security mechanisms in GSM networks. It first outlines the goals of security for operators and customers. It then describes the four main security principles of GSM: user authentication, ciphering of data and signals, confidentiality of user identity, and use of the SIM as a security module. The document reviews two papers on vehicle security and anti-theft systems using GSM and GPS. It compares the papers and identifies some shortcomings of such systems, such as weaker connectivity in rural areas. Finally, it concludes the systems can help reduce vehicle theft if implemented widely.
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...IRJET Journal
This document proposes a visual secret sharing scheme to encode secret QR codes into shares to improve security. The secret message is first encrypted then divided into shares that are encoded as valid QR codes. Only by recombining an authorized set of shares can the secret be recovered. This approach aims to resist attacks while maintaining the readability of QR codes. The proposed scheme is experimentally proven to be feasible and low cost. It could enhance the security of transmitting private information via QR codes.
This document summarizes an article from the International Journal of Computer Engineering and Technology. The article proposes using an FPGA-based hardware dongle to securely implement RSA cryptography and prevent secret software information from being extracted. It describes using the FPGA to perform half of the RSA encryption process, with the other half decrypted on the software side. The document provides details on the RSA encryption algorithm, FPGA programming, a design for interfacing between a computer and the FPGA dongle, and results of encrypting data with the proposed system. It concludes the approach provides a way to wrap the RSA layer and restrict applications from running without a connected dongle.
IRJET - Image Watermarking using QR CodeIRJET Journal
This document presents a technique for digital image watermarking using QR codes. It aims to provide copyright protection and authentication of digital images. The technique works by encrypting an image using AES encryption and embedding the encrypted data in a QR code. The QR code is then hidden behind a cover image using steganography. This makes it difficult for unauthorized users to detect the hidden watermark or tamper with the encrypted image data. The document discusses related work on image watermarking and steganography techniques. It also provides details of the proposed system architecture, classification of digital watermarking techniques, the AES encryption algorithm used, and potential applications of the presented image watermarking approach.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
This document summarizes a research paper that designed and implemented a Zigbee-based theft monitoring system. The system uses Zigbee modules for wireless data transmission between sensors and a PIC microcontroller. When an object is detected by an IR sensor, the PIC notifies a PC via RS-232. The PC identifies the area using a database and sends an SMS alert to an authorized person via GSM while capturing video of the area with a camera. The system was tested with over 100 Zigbee modules and was able to quickly detect theft occurrences wirelessly.
This basic presentation / video looks at SIM (Subscriber Identity Module) card, its evolution and what is the relation between SIM and UICC (Universal Integrated Circuit Card). It also explains different form factors like 2FF, 3FF, 4FF and MFF2 and UICC contents briefly.
Finally, we look at embedded SIM (eSIM), integrated SIM (iSIM), eUICC Profiles and profile switching via remote provisioning functions.
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
5G Page: https://www.3g4g.co.uk/5G/
Free TrainingVideos: https://www.3g4g.co.uk/Training/
We at Pantech ProEd provide assistance in academic projects based on IEEE standard journals and transactions. Our services cater to all the domains belonging to Circuit branches and Information and Communication engineering branches.
Our methodology of execution and delivery is state - of -art, in essence a professionally designed, intensively tested, work flow model is applied.
Our Project support services caters to the following courses,
1) B.E / B.Tech (EEE/ECE/CSE/IT)
2) M.E (Power Systems)
3) M.E (Power Electronics & Drives)
4) M.E (High Voltage Engineering)
5) M.E (Electrical Drives & Embedded Control)
6) M.E (Control & Instrumentation Engineering)
7) M.E (Embedded System Technologies)
8) M.E (Applied Electronics)
9) M.E (Communication Systems)
10) M.E (VLSI Design)
11) M.E (Medical Electronics)
12) M.E (CSE)
13) M.E (Software Engineering)
14) M.E (Multimedia Technology)
15) M.Tech (Information Technology)
16) M.C.A
17) M.E (Systems Engineering and Operations Research)
18) M.E (Communication and Networking)
19) M.E (Avionics)
20) M.E. (Mobile Pervasive and Computing)
21) M.E. (Network Engineering)
22) M.E (Computer & Communication)
We at Pantech ProEd provide assistance in academic projects based on IEEE standard journals and transactions. Our services cater to all the domains belonging to Circuit branches and Information and Communication engineering branches.
Our methodology of execution and delivery is state - of -art, in essence a professionally designed, intensively tested, work flow model is applied.
Our Project support services caters to the following courses,
1) B.E / B.Tech (EEE/ECE/CSE/IT)
2) M.E (Power Systems)
3) M.E (Power Electronics & Drives)
4) M.E (High Voltage Engineering)
5) M.E (Electrical Drives & Embedded Control)
6) M.E (Control & Instrumentation Engineering)
7) M.E (Embedded System Technologies)
8) M.E (Applied Electronics)
9) M.E (Communication Systems)
10) M.E (VLSI Design)
11) M.E (Medical Electronics)
12) M.E (CSE)
13) M.E (Software Engineering)
14) M.E (Multimedia Technology)
15) M.Tech (Information Technology)
16) M.C.A
17) M.E (Systems Engineering and Operations Research)
18) M.E (Communication and Networking)
19) M.E (Avionics)
20) M.E. (Mobile Pervasive and Computing)
21) M.E. (Network Engineering)
22) M.E (Computer & Communication)
This document describes a method for identifying vulnerable or cheating anchor nodes in a wireless sensor network using trilateration and maximum likelihood expectation. Trilateration is used to localize anchor nodes based on distance measurements, which can identify potential cheating nodes. The localized nodes are then analyzed using maximum likelihood expectation to determine the most probable nodes and validate if identified nodes are legitimate or cheating with high accuracy. The method was tested through simulation in ns-3, and was able to significantly reduce localization errors compared to other techniques.
We at Pantech ProEd provide assistance in academic projects based on IEEE standard journals and transactions. Our services cater to all the domains belonging to Circuit branches and Information and Communication engineering branches.
Our methodology of execution and delivery is state - of -art, in essence a professionally designed, intensively tested, work flow model is applied.
Our Project support services caters to the following courses,
1) B.E / B.Tech (EEE/ECE/CSE/IT)
2) M.E (Power Systems)
3) M.E (Power Electronics & Drives)
4) M.E (High Voltage Engineering)
5) M.E (Electrical Drives & Embedded Control)
6) M.E (Control & Instrumentation Engineering)
7) M.E (Embedded System Technologies)
8) M.E (Applied Electronics)
9) M.E (Communication Systems)
10) M.E (VLSI Design)
11) M.E (Medical Electronics)
12) M.E (CSE)
13) M.E (Software Engineering)
14) M.E (Multimedia Technology)
15) M.Tech (Information Technology)
16) M.C.A
17) M.E (Systems Engineering and Operations Research)
18) M.E (Communication and Networking)
19) M.E (Avionics)
20) M.E. (Mobile Pervasive and Computing)
21) M.E. (Network Engineering)
22) M.E (Computer & Communication)
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...IRJET Journal
This document proposes a hybrid security model for securing medical image data that integrates steganography and cryptography techniques. The system first enhances the cover image and encrypts the secret medical image using a modified Secure Force algorithm and AES encryption. It then embeds the encrypted secret image into the enhanced cover image using JSteg and LSB coding steganography. This provides a double layer of security by encrypting the data and hiding its existence. The performance of the system is evaluated based on metrics like PSNR, SSIM and correlation to analyze the quality and security of the stego-image.
We at Pantech ProEd provide assistance in academic projects based on IEEE standard journals and transactions. Our services cater to all the domains belonging to Circuit branches and Information and Communication engineering branches.
Our methodology of execution and delivery is state - of -art, in essence a professionally designed, intensively tested, work flow model is applied.
Our Project support services caters to the following courses,
1) B.E / B.Tech (EEE/ECE/CSE/IT)
2) M.E (Power Systems)
3) M.E (Power Electronics & Drives)
4) M.E (High Voltage Engineering)
5) M.E (Electrical Drives & Embedded Control)
6) M.E (Control & Instrumentation Engineering)
7) M.E (Embedded System Technologies)
8) M.E (Applied Electronics)
9) M.E (Communication Systems)
10) M.E (VLSI Design)
11) M.E (Medical Electronics)
12) M.E (CSE)
13) M.E (Software Engineering)
14) M.E (Multimedia Technology)
15) M.Tech (Information Technology)
16) M.C.A
17) M.E (Systems Engineering and Operations Research)
18) M.E (Communication and Networking)
19) M.E (Avionics)
20) M.E. (Mobile Pervasive and Computing)
21) M.E. (Network Engineering)
22) M.E (Computer & Communication)
This document summarizes an article that discusses various approaches to partial image encryption. It begins by defining partial image encryption as encrypting only a portion of an image to reduce computational costs while still providing security. It then outlines several performance parameters for evaluating partial encryption techniques, such as tunability, visual degradation, compression friendliness, and encryption ratio. The document proceeds to review some existing partial encryption methods and analyze their security.
Gagner Technologies provides IEEE projects and final year projects for students in various domains including data mining, distributed systems, mobile computing, networking, cloud computing, and network security. It is located in Chennai, India and offers projects at reasonable costs along with personality development training and placement assistance.
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...IRJET Journal
This document proposes a new approach called anti-phishing image captcha validation using visual cryptography to detect and prevent phishing. It uses the concept of image processing and visual cryptography to encrypt an image captcha into two shares stored on separate servers. When both shares are available simultaneously, the original image captcha is revealed for the user as a password. This scheme aims to preserve the privacy of the image captcha. The document provides background on phishing, visual cryptography, and related works before describing the proposed system which uses a (2,2) visual cryptography threshold scheme to encrypt the image captcha into two shares.
A detailed look at 5G security by experts from wenovator, Dr. Anand R. Prasad & Hans Christian Rudolph.
This webinar covers:
(1) 5G security
(2) Private networks security and
(3) Open vRAN security
To learn more about wenovator, visit their website: https://www.wenovator.com/
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
Security Page: https://www.3g4g.co.uk/Security/
5G Page: https://www.3g4g.co.uk/5G/
Security Blog Posts: https://blog.3g4g.co.uk/search/label/Security
Free Training Videos: https://www.3g4g.co.uk/Training/
The document evaluates the security model of 3G wireless networks. It begins with an overview of 1G and 2G wireless technologies and their limitations. It then describes the key security principles of 3G networks, which were designed to address issues with previous generations like weak encryption algorithms and lack of data integrity. The document outlines both the security architecture and new features of 3G, such as network authentication and stronger encryption, that provide improved security compared to earlier standards.
Debugging: Why do mobile networks stop working in case of emergencies?3G4G
Mobile networks can stop working during emergencies like earthquakes due to network congestion. When too many users simultaneously try to make calls or use data, the network becomes overloaded. To prioritize emergency calls, mobile networks implement congestion control through techniques like access class barring that restrict access for most users during congestion while allowing emergency calls to connect. Admission control is also used to only allow call connections when sufficient network resources are available. These measures help ensure emergency calls can connect even when networks face excessive demands in disaster scenarios.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
An improved geo encryption algorithm in location based serviceseSAT Journals
Abstract Wireless technology is used in many applications with location based data encryption techniques to secure the communication. The use of knowledge of the mobile user's location called Geo-encryption, produces more secure systems that can be used in different mobile applications. Location Based Data Encryption Methods (LBDEM) is a technique used to enhance the security of such applications called as Location Based Services (LBS). It collects position, time, latitude coordinates and longitude coordinates of mobile nodes and uses for the encryption and decryption process. Geo-encryption plays an important role to raise the security of LBS. Different Geo-protocols have been developed in the same area to add security with better throughput. The Advanced Encryption Standard in Geo-encryption with Dynamic Tolerance Distance (AES-GEDTD) is an approach which gives higher security with a great throughput. This approach mainly uses the AES algorithm, symmetric key encryption algorithm. But applying this algorithm to more complex data like images, videos, etc. like in Digital Film Distribution, we might face the problem of computational overhead. To overcome this problem, we analyze AES and modify it, to reduce the computational overhead. In the modified AES algorithm (M-AES), we omit the calculation of mix column operations and hence the M-AES-GEDTD is a fast and lightweight algorithm for multimedia data. Keywords: Geo-encryption; LBDEM; LBS, Geo-locked Keys .
Transmitting bulk amount of data in the form of qr code with cbfsc and chunkiIAEME Publication
This document proposes a technique to securely transmit bulk data by encoding it in a QR code and encrypting the QR code using chaos-based feedback stream cipher (CBFSC) encryption. Key points:
- Bulk data is encoded in a QR code for transmission over a network. However, unencrypted QR codes pose security risks.
- The proposed technique chunks the QR code, encrypts each chunk using CBFSC encryption, and transmits the encrypted chunks over the network.
- At the receiving end, the chunks are decrypted and combined to reconstruct the original QR code, providing secure transmission and protecting against cryptanalytic attacks.
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...IJTET Journal
Smart Grid (SG) communication has recently received significant attentions to facilitate intelligent and distributed electric power transmission systems. The advent of the smart grid promises to user in an era that will bring intelligence, efficiency, and optimality to the power grid. Most of these challenges will occur as an Internet-like communications network is super imposed on top of the current power grid using wireless mesh network technologies with the 802.15.4, 802.11 and WiMAX Standards. Each of these will expose the power grid to security threats. Wireless communication offers the benefits of low cost, rapid deployment, shared communication medium, and mobility. It causes many security and privacy challenges. The concept of dynamic secret is applied to design an encryption scheme for smart grid in wireless communication. Between two parties of communication, the previous packets are coded as retransmission sequence, where retransmitted packet is marked as ―1‖ and the other is marked as ―0‖.During the communication, the retransmission sequence is generated at both sides to update the dynamic encryption key. Any missing or misjudging sequence would prevent the adversary from achieving key. A Smart Grid platform is built, employing the ZigBee protocol for wireless communication. The Simulation results show that the retransmission and packet loss in ZigBee communication are inevitable and unpredictable and it is impossible of the adversary to track the updating of dynamic encryption key. Even though the DES scheme can protect the encryption key from attackers, the hackers can obtain the keys some time, due to the block size 64 bits used by DES that makes the adversary (hacker) to hack the data. It introduces vulnerabilities and liner crypt analysis; this can be achieved by using AES scheme. The AES uses 128 bits block size for a single encryption key a data of 256 billion gigabytes can be transmitted thus its provide much more safety to user from hacker and it reduces the end to end delay and increases packet transmission rate.
Performance Analysis of Mobile Security Protocols: Encryption and Authenticat...CSCJournals
Due to extremely high demand of mobile phones among people, over the years there has been a great demand for the support of various applications and security services. 2G and 3G provide two levels of security through: encryption and authentication. This paper presents performance analysis and comparison between the algorithms in terms of time complexity. The parameters considered for comparison are processing power and input size. Security features may have adverse effect on quality of services offered to the end users and the system capacity. The computational cost overhead that the security protocols and algorithms impose on lightweight end users devices is analyzed. The results of analysis reveal the effect of authentication and encryption algorithms of 2G and 3G on system performance defined in terms of throughput which will further help in quantifying the overhead caused due to security.
Design and development of gps-gsm based Tracking system with google map based...IJCSEA Journal
This document describes a GPS-GSM based vehicle tracking system that monitors vehicle location using GPS and sends location data via GSM to a web application. The system hardware includes a GPS module, GSM module, microcontroller and other components. It takes location readings from GPS and sends them via GSM to a server hosting a web application displaying the vehicle's position on a map. The web application allows tracking the vehicle in real-time from any location. The system provides low-cost vehicle monitoring and security against theft.
GSM is a standard for 2G digital cellular networks that was designed to be secure with strong authentication and encryption of over-the-air transmissions. However, due to the ubiquitous wireless medium, GSM networks are more susceptible to security attacks than wired networks. The document discusses GSM security features including encryption algorithms like A5 and key lengths. While GSM provided improvements over analog networks, the encryption used has been broken and more secure algorithms are needed given the hundreds of millions of users.
PLNOG20 - Piotr Gruszczyński - Bezpieczeństwo sieci komórkowejPROIDEA
W związku z tym, że na PLNOG coraz częściej goszczą sieci komórkowe przy okazji tematów związanych z ich bezpieczeństwem, chciałbym przedstawić zebraną wiedzę dotyczącą tego zagadnienia (zaczynając do architektury). Bezpieczeństwo sieci mobilnych należy rozpatrywać w dwóch aspektach: radiowej i sieciowej. Część radiowa dotyczy komunikacji terminali z siecią, gdzie najważniejszą będzie informacja przed czym kolejne generacje sieci komórkowych nas, użytkowników, chronią, a przed czym nie. Omówione zostaną najważniejsze procedury związane z autoryzacją i szyfrowaniem. Druga część omawia bezpieczeństwo sieci szkieletowej operatora, w szczególności w związku ze współpracą między operatorami i koniecznymi punktami styku między nimi. Świat operatorów komórkowych przestawił się mocno na IP, co mocno przybliżyło go do zagrożeń związanych z Internetem. Warto więc zaprząc Wiresharka, i zobaczyć co w protokołach widać, jak nasze dane i dane o nas wędrują po świecie. Najwazniejsze pojęcia ujęte w prezentacji: IMSI/GPRS/LTE Attach, security vector (RAND/SRES/XRES/Kc/Kasme), SS7 (BSSAP/RANAP/MAP), DIAMETER (DRA, DEA), GTP, roaming: home routing, local breakout
This document proposes a mobile safety system for automobiles that uses Android operating system. The system has two main components: a safety device and an automobile base unit. The safety device allows users to monitor the vehicle's location on a map, check its status, and control functions remotely. It communicates with the base unit in the vehicle using GPRS. The base unit collects data from sensors, determines the vehicle's GPS location, and can execute control commands like activating the brakes or switching off the engine. The document provides details on the design and algorithms of both components and includes examples of Java code implementation. The goal is to create an intelligent, secure and easy-to-use mobile safety system for vehicles using embedded systems and Android
This document proposes a mobile safety system for automobiles that uses Android operating system. The system has two main components: a safety device and an automobile base unit. The safety device allows users to monitor the vehicle's location on a map, check its status, and control functions remotely. It communicates with the base unit in the vehicle using GPRS. The base unit collects data from sensors, determines the vehicle's GPS location, and can execute control commands like activating the brakes or switching off the engine. The document provides details on the design and algorithms of both components and includes examples of Java code implementation. The goal is to create an intelligent, secure and easy-to-use mobile safety system for vehicles using embedded systems and Android
We at Pantech ProEd provide assistance in academic projects based on IEEE standard journals and transactions. Our services cater to all the domains belonging to Circuit branches and Information and Communication engineering branches.
Our methodology of execution and delivery is state - of -art, in essence a professionally designed, intensively tested, work flow model is applied.
Our Project support services caters to the following courses,
1) B.E / B.Tech (EEE/ECE/CSE/IT)
2) M.E (Power Systems)
3) M.E (Power Electronics & Drives)
4) M.E (High Voltage Engineering)
5) M.E (Electrical Drives & Embedded Control)
6) M.E (Control & Instrumentation Engineering)
7) M.E (Embedded System Technologies)
8) M.E (Applied Electronics)
9) M.E (Communication Systems)
10) M.E (VLSI Design)
11) M.E (Medical Electronics)
12) M.E (CSE)
13) M.E (Software Engineering)
14) M.E (Multimedia Technology)
15) M.Tech (Information Technology)
16) M.C.A
17) M.E (Systems Engineering and Operations Research)
18) M.E (Communication and Networking)
19) M.E (Avionics)
20) M.E. (Mobile Pervasive and Computing)
21) M.E. (Network Engineering)
22) M.E (Computer & Communication)
This document describes a method for identifying vulnerable or cheating anchor nodes in a wireless sensor network using trilateration and maximum likelihood expectation. Trilateration is used to localize anchor nodes based on distance measurements, which can identify potential cheating nodes. The localized nodes are then analyzed using maximum likelihood expectation to determine the most probable nodes and validate if identified nodes are legitimate or cheating with high accuracy. The method was tested through simulation in ns-3, and was able to significantly reduce localization errors compared to other techniques.
We at Pantech ProEd provide assistance in academic projects based on IEEE standard journals and transactions. Our services cater to all the domains belonging to Circuit branches and Information and Communication engineering branches.
Our methodology of execution and delivery is state - of -art, in essence a professionally designed, intensively tested, work flow model is applied.
Our Project support services caters to the following courses,
1) B.E / B.Tech (EEE/ECE/CSE/IT)
2) M.E (Power Systems)
3) M.E (Power Electronics & Drives)
4) M.E (High Voltage Engineering)
5) M.E (Electrical Drives & Embedded Control)
6) M.E (Control & Instrumentation Engineering)
7) M.E (Embedded System Technologies)
8) M.E (Applied Electronics)
9) M.E (Communication Systems)
10) M.E (VLSI Design)
11) M.E (Medical Electronics)
12) M.E (CSE)
13) M.E (Software Engineering)
14) M.E (Multimedia Technology)
15) M.Tech (Information Technology)
16) M.C.A
17) M.E (Systems Engineering and Operations Research)
18) M.E (Communication and Networking)
19) M.E (Avionics)
20) M.E. (Mobile Pervasive and Computing)
21) M.E. (Network Engineering)
22) M.E (Computer & Communication)
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...IRJET Journal
This document proposes a hybrid security model for securing medical image data that integrates steganography and cryptography techniques. The system first enhances the cover image and encrypts the secret medical image using a modified Secure Force algorithm and AES encryption. It then embeds the encrypted secret image into the enhanced cover image using JSteg and LSB coding steganography. This provides a double layer of security by encrypting the data and hiding its existence. The performance of the system is evaluated based on metrics like PSNR, SSIM and correlation to analyze the quality and security of the stego-image.
We at Pantech ProEd provide assistance in academic projects based on IEEE standard journals and transactions. Our services cater to all the domains belonging to Circuit branches and Information and Communication engineering branches.
Our methodology of execution and delivery is state - of -art, in essence a professionally designed, intensively tested, work flow model is applied.
Our Project support services caters to the following courses,
1) B.E / B.Tech (EEE/ECE/CSE/IT)
2) M.E (Power Systems)
3) M.E (Power Electronics & Drives)
4) M.E (High Voltage Engineering)
5) M.E (Electrical Drives & Embedded Control)
6) M.E (Control & Instrumentation Engineering)
7) M.E (Embedded System Technologies)
8) M.E (Applied Electronics)
9) M.E (Communication Systems)
10) M.E (VLSI Design)
11) M.E (Medical Electronics)
12) M.E (CSE)
13) M.E (Software Engineering)
14) M.E (Multimedia Technology)
15) M.Tech (Information Technology)
16) M.C.A
17) M.E (Systems Engineering and Operations Research)
18) M.E (Communication and Networking)
19) M.E (Avionics)
20) M.E. (Mobile Pervasive and Computing)
21) M.E. (Network Engineering)
22) M.E (Computer & Communication)
This document summarizes an article that discusses various approaches to partial image encryption. It begins by defining partial image encryption as encrypting only a portion of an image to reduce computational costs while still providing security. It then outlines several performance parameters for evaluating partial encryption techniques, such as tunability, visual degradation, compression friendliness, and encryption ratio. The document proceeds to review some existing partial encryption methods and analyze their security.
Gagner Technologies provides IEEE projects and final year projects for students in various domains including data mining, distributed systems, mobile computing, networking, cloud computing, and network security. It is located in Chennai, India and offers projects at reasonable costs along with personality development training and placement assistance.
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...IRJET Journal
This document proposes a new approach called anti-phishing image captcha validation using visual cryptography to detect and prevent phishing. It uses the concept of image processing and visual cryptography to encrypt an image captcha into two shares stored on separate servers. When both shares are available simultaneously, the original image captcha is revealed for the user as a password. This scheme aims to preserve the privacy of the image captcha. The document provides background on phishing, visual cryptography, and related works before describing the proposed system which uses a (2,2) visual cryptography threshold scheme to encrypt the image captcha into two shares.
A detailed look at 5G security by experts from wenovator, Dr. Anand R. Prasad & Hans Christian Rudolph.
This webinar covers:
(1) 5G security
(2) Private networks security and
(3) Open vRAN security
To learn more about wenovator, visit their website: https://www.wenovator.com/
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
Security Page: https://www.3g4g.co.uk/Security/
5G Page: https://www.3g4g.co.uk/5G/
Security Blog Posts: https://blog.3g4g.co.uk/search/label/Security
Free Training Videos: https://www.3g4g.co.uk/Training/
The document evaluates the security model of 3G wireless networks. It begins with an overview of 1G and 2G wireless technologies and their limitations. It then describes the key security principles of 3G networks, which were designed to address issues with previous generations like weak encryption algorithms and lack of data integrity. The document outlines both the security architecture and new features of 3G, such as network authentication and stronger encryption, that provide improved security compared to earlier standards.
Debugging: Why do mobile networks stop working in case of emergencies?3G4G
Mobile networks can stop working during emergencies like earthquakes due to network congestion. When too many users simultaneously try to make calls or use data, the network becomes overloaded. To prioritize emergency calls, mobile networks implement congestion control through techniques like access class barring that restrict access for most users during congestion while allowing emergency calls to connect. Admission control is also used to only allow call connections when sufficient network resources are available. These measures help ensure emergency calls can connect even when networks face excessive demands in disaster scenarios.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
An improved geo encryption algorithm in location based serviceseSAT Journals
Abstract Wireless technology is used in many applications with location based data encryption techniques to secure the communication. The use of knowledge of the mobile user's location called Geo-encryption, produces more secure systems that can be used in different mobile applications. Location Based Data Encryption Methods (LBDEM) is a technique used to enhance the security of such applications called as Location Based Services (LBS). It collects position, time, latitude coordinates and longitude coordinates of mobile nodes and uses for the encryption and decryption process. Geo-encryption plays an important role to raise the security of LBS. Different Geo-protocols have been developed in the same area to add security with better throughput. The Advanced Encryption Standard in Geo-encryption with Dynamic Tolerance Distance (AES-GEDTD) is an approach which gives higher security with a great throughput. This approach mainly uses the AES algorithm, symmetric key encryption algorithm. But applying this algorithm to more complex data like images, videos, etc. like in Digital Film Distribution, we might face the problem of computational overhead. To overcome this problem, we analyze AES and modify it, to reduce the computational overhead. In the modified AES algorithm (M-AES), we omit the calculation of mix column operations and hence the M-AES-GEDTD is a fast and lightweight algorithm for multimedia data. Keywords: Geo-encryption; LBDEM; LBS, Geo-locked Keys .
Transmitting bulk amount of data in the form of qr code with cbfsc and chunkiIAEME Publication
This document proposes a technique to securely transmit bulk data by encoding it in a QR code and encrypting the QR code using chaos-based feedback stream cipher (CBFSC) encryption. Key points:
- Bulk data is encoded in a QR code for transmission over a network. However, unencrypted QR codes pose security risks.
- The proposed technique chunks the QR code, encrypts each chunk using CBFSC encryption, and transmits the encrypted chunks over the network.
- At the receiving end, the chunks are decrypted and combined to reconstruct the original QR code, providing secure transmission and protecting against cryptanalytic attacks.
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...IJTET Journal
Smart Grid (SG) communication has recently received significant attentions to facilitate intelligent and distributed electric power transmission systems. The advent of the smart grid promises to user in an era that will bring intelligence, efficiency, and optimality to the power grid. Most of these challenges will occur as an Internet-like communications network is super imposed on top of the current power grid using wireless mesh network technologies with the 802.15.4, 802.11 and WiMAX Standards. Each of these will expose the power grid to security threats. Wireless communication offers the benefits of low cost, rapid deployment, shared communication medium, and mobility. It causes many security and privacy challenges. The concept of dynamic secret is applied to design an encryption scheme for smart grid in wireless communication. Between two parties of communication, the previous packets are coded as retransmission sequence, where retransmitted packet is marked as ―1‖ and the other is marked as ―0‖.During the communication, the retransmission sequence is generated at both sides to update the dynamic encryption key. Any missing or misjudging sequence would prevent the adversary from achieving key. A Smart Grid platform is built, employing the ZigBee protocol for wireless communication. The Simulation results show that the retransmission and packet loss in ZigBee communication are inevitable and unpredictable and it is impossible of the adversary to track the updating of dynamic encryption key. Even though the DES scheme can protect the encryption key from attackers, the hackers can obtain the keys some time, due to the block size 64 bits used by DES that makes the adversary (hacker) to hack the data. It introduces vulnerabilities and liner crypt analysis; this can be achieved by using AES scheme. The AES uses 128 bits block size for a single encryption key a data of 256 billion gigabytes can be transmitted thus its provide much more safety to user from hacker and it reduces the end to end delay and increases packet transmission rate.
Performance Analysis of Mobile Security Protocols: Encryption and Authenticat...CSCJournals
Due to extremely high demand of mobile phones among people, over the years there has been a great demand for the support of various applications and security services. 2G and 3G provide two levels of security through: encryption and authentication. This paper presents performance analysis and comparison between the algorithms in terms of time complexity. The parameters considered for comparison are processing power and input size. Security features may have adverse effect on quality of services offered to the end users and the system capacity. The computational cost overhead that the security protocols and algorithms impose on lightweight end users devices is analyzed. The results of analysis reveal the effect of authentication and encryption algorithms of 2G and 3G on system performance defined in terms of throughput which will further help in quantifying the overhead caused due to security.
Design and development of gps-gsm based Tracking system with google map based...IJCSEA Journal
This document describes a GPS-GSM based vehicle tracking system that monitors vehicle location using GPS and sends location data via GSM to a web application. The system hardware includes a GPS module, GSM module, microcontroller and other components. It takes location readings from GPS and sends them via GSM to a server hosting a web application displaying the vehicle's position on a map. The web application allows tracking the vehicle in real-time from any location. The system provides low-cost vehicle monitoring and security against theft.
GSM is a standard for 2G digital cellular networks that was designed to be secure with strong authentication and encryption of over-the-air transmissions. However, due to the ubiquitous wireless medium, GSM networks are more susceptible to security attacks than wired networks. The document discusses GSM security features including encryption algorithms like A5 and key lengths. While GSM provided improvements over analog networks, the encryption used has been broken and more secure algorithms are needed given the hundreds of millions of users.
PLNOG20 - Piotr Gruszczyński - Bezpieczeństwo sieci komórkowejPROIDEA
W związku z tym, że na PLNOG coraz częściej goszczą sieci komórkowe przy okazji tematów związanych z ich bezpieczeństwem, chciałbym przedstawić zebraną wiedzę dotyczącą tego zagadnienia (zaczynając do architektury). Bezpieczeństwo sieci mobilnych należy rozpatrywać w dwóch aspektach: radiowej i sieciowej. Część radiowa dotyczy komunikacji terminali z siecią, gdzie najważniejszą będzie informacja przed czym kolejne generacje sieci komórkowych nas, użytkowników, chronią, a przed czym nie. Omówione zostaną najważniejsze procedury związane z autoryzacją i szyfrowaniem. Druga część omawia bezpieczeństwo sieci szkieletowej operatora, w szczególności w związku ze współpracą między operatorami i koniecznymi punktami styku między nimi. Świat operatorów komórkowych przestawił się mocno na IP, co mocno przybliżyło go do zagrożeń związanych z Internetem. Warto więc zaprząc Wiresharka, i zobaczyć co w protokołach widać, jak nasze dane i dane o nas wędrują po świecie. Najwazniejsze pojęcia ujęte w prezentacji: IMSI/GPRS/LTE Attach, security vector (RAND/SRES/XRES/Kc/Kasme), SS7 (BSSAP/RANAP/MAP), DIAMETER (DRA, DEA), GTP, roaming: home routing, local breakout
This document proposes a mobile safety system for automobiles that uses Android operating system. The system has two main components: a safety device and an automobile base unit. The safety device allows users to monitor the vehicle's location on a map, check its status, and control functions remotely. It communicates with the base unit in the vehicle using GPRS. The base unit collects data from sensors, determines the vehicle's GPS location, and can execute control commands like activating the brakes or switching off the engine. The document provides details on the design and algorithms of both components and includes examples of Java code implementation. The goal is to create an intelligent, secure and easy-to-use mobile safety system for vehicles using embedded systems and Android
This document proposes a mobile safety system for automobiles that uses Android operating system. The system has two main components: a safety device and an automobile base unit. The safety device allows users to monitor the vehicle's location on a map, check its status, and control functions remotely. It communicates with the base unit in the vehicle using GPRS. The base unit collects data from sensors, determines the vehicle's GPS location, and can execute control commands like activating the brakes or switching off the engine. The document provides details on the design and algorithms of both components and includes examples of Java code implementation. The goal is to create an intelligent, secure and easy-to-use mobile safety system for vehicles using embedded systems and Android
This document summarizes security in cellular systems, including GSM and UMTS. It covers security goals, elements of security like authentication and encryption protocols, algorithmic background of techniques like AKA, flaws in early GSM security and solutions in later standards, and challenges in implementation security across networks.
SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...IAEME Publication
A smart grid represents a straightforward improvement of a power grid, which effectively hands over electricity from suppliers to clients. It generally uses a two-way digital communication with an eye on managing the devices at client households. They are also competent to conserve energy, scale down overhead costs and to enhance consistency and lucidity. It is home to smart meters, which pave the way for communication with the main central system. As against home energy monitors, smart meters are capable of collecting data for distant reporting. The distribution or receipt of the data is very safely carried out to safeguard the confidentiality of the client power utilization and also to ensure continuous power distribution. Therefore, the cryptography technique is effectively used for increasing the safety and for furnishing the consistent power supply for the uninterrupted power distribution.
ADVANCED BIKE SECURITY SYSTEM USING GSM AND GPSEG TECHNOLOGIES
This document describes the design and development of an advanced bike security system using GSM and GPS technologies. The system is intended to prevent bike theft by tracking the location of a stolen bike and allowing the owner to remotely lock the engine. It consists of a microcontroller interfaced with a GSM module and GPS receiver. When a theft occurs, the GPS module sends the bike's coordinates via SMS to the owner's phone. The owner can then send a message to lock the engine. The system provides bike tracking, theft notification, and remote immobilization in a simple, low-cost package.
This document describes a vehicle security system that uses GPS and GSM technologies to provide theft identification and accident notification functions. The system is composed of a GPS receiver, microcontroller, and GSM modem. The GPS receiver obtains location information that is processed by the microcontroller and sent to the user via the GSM modem. It can track the vehicle's location if stolen and immediately alert emergency services if an accident is detected. The system works by switching between the GPS and GSM modules using a microcontroller to get the vehicle's position and send SMS messages to authorized phone numbers with the location. This provides security against theft and helps reduce accident fatalities through quick emergency response.
Vehicle Theft Detection and Tracking Based on GSM and GPSIRJET Journal
This document summarizes a vehicle theft detection and tracking system that uses GPS and GSM technologies. The system continuously monitors the location of a vehicle using GPS and reports it to an authorized user via GSM upon request or if theft is detected. When theft is detected, the user can send an SMS message to stop the vehicle engine. To restart the engine, the authorized user must send a password to the microcontroller via SMS. This provides secure, reliable, and low-cost vehicle tracking and theft prevention.
Review on Tunnel Field Effect Transistors (TFET)IRJET Journal
This document summarizes a vehicle theft detection and tracking system that uses GPS and GSM technologies. The system constantly monitors the location of a vehicle using GPS and reports the status to an authorized user via GSM upon request. If a theft is detected, the user can send an SMS message to the microcontroller to stop the engine. To restart the vehicle, the authorized user must send a password to the microcontroller via SMS. The system provides vehicle tracking, theft prevention and retrieval at a low cost.
Conceptual design of edge adaptive steganography scheme based on advanced lsb...IAEME Publication
This document summarizes a research article that proposes a new edge adaptive steganography scheme based on an advanced LSB algorithm. The scheme adaptively selects edge regions in an image for data embedding based on the size of the secret message. For smaller messages, sharper edge regions are selected, while larger messages use more edge regions. It uses LSB matching revisited to embed bits while considering the relationship between image region characteristics and message size. The goal is to preserve higher visual quality in the stego image. Experimental results show the proposed technique achieves higher data hiding capacity and better image quality than some existing techniques.
Anti-Theft Protection of Vehicle by GSM & GPS with Fingerprint VerificationIJAEMSJORNAL
This paper focuses on preventing car theft using microcontrollers and GSM modules. We are generating the results with better accuracy and proficiency. It can be helpful to those people who want better and more advanced security in their vehicle.
Similar to Location based encryption in gsm cellular network (20)
Submission Deadline: 30th September 2022
Acceptance Notification: Within Three Days’ time period
Online Publication: Within 24 Hrs. time Period
Expected Date of Dispatch of Printed Journal: 5th October 2022
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
White layer thickness (WLT) formed and surface roughness in wire electric discharge turning (WEDT) of tungsten carbide composite has been made to model through response surface methodology (RSM). A Taguchi’s standard Design of experiments involving five input variables with three levels has been employed to establish a mathematical model between input parameters and responses. Percentage of cobalt content, spindle speed, Pulse on-time, wire feed and pulse off-time were changed during the experimental tests based on the Taguchi’s orthogonal array L27 (3^13). Analysis of variance (ANOVA) revealed that the mathematical models obtained can adequately describe performance within the parameters of the factors considered. There was a good agreement between the experimental and predicted values in this study.
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
The study explores the reasons for a transgender to become entrepreneurs. In this study transgender entrepreneur was taken as independent variable and reasons to become as dependent variable. Data were collected through a structured questionnaire containing a five point Likert Scale. The study examined the data of 30 transgender entrepreneurs in Salem Municipal Corporation of Tamil Nadu State, India. Simple Random sampling technique was used. Garrett Ranking Technique (Percentile Position, Mean Scores) was used as the analysis for the present study to identify the top 13 stimulus factors for establishment of trans entrepreneurial venture. Economic advancement of a nation is governed upon the upshot of a resolute entrepreneurial doings. The conception of entrepreneurship has stretched and materialized to the socially deflated uncharted sections of transgender community. Presently transgenders have smashed their stereotypes and are making recent headlines of achievements in various fields of our Indian society. The trans-community is gradually being observed in a new light and has been trying to achieve prospective growth in entrepreneurship. The findings of the research revealed that the optimistic changes are taking place to change affirmative societal outlook of the transgender for entrepreneurial ventureship. It also laid emphasis on other transgenders to renovate their traditional living. The paper also highlights that legislators, supervisory body should endorse an impartial canons and reforms in Tamil Nadu Transgender Welfare Board Association.
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
Since ages gender difference is always a debatable theme whether caused by nature, evolution or environment. The birth of a transgender is dreadful not only for the child but also for their parents. The pain of living in the wrong physique and treated as second class victimized citizen is outrageous and fully harboured with vicious baseless negative scruples. For so long, social exclusion had perpetuated inequality and deprivation experiencing ingrained malign stigma and besieged victims of crime or violence across their life spans. They are pushed into the murky way of life with a source of eternal disgust, bereft sexual potency and perennial fear. Although they are highly visible but very little is known about them. The common public needs to comprehend the ravaged arrogance on these insensitive souls and assist in integrating them into the mainstream by offering equal opportunity, treat with humanity and respect their dignity. Entrepreneurship in the current age is endorsing the gender fairness movement. Unstable careers and economic inadequacy had inclined one of the gender variant people called Transgender to become entrepreneurs. These tiny budding entrepreneurs resulted in economic transition by means of employment, free from the clutches of stereotype jobs, raised standard of living and handful of financial empowerment. Besides all these inhibitions, they were able to witness a platform for skill set development that ignited them to enter into entrepreneurial domain. This paper epitomizes skill sets involved in trans-entrepreneurs of Thoothukudi Municipal Corporation of Tamil Nadu State and is a groundbreaking determination to sightsee various skills incorporated and the impact on entrepreneurship.
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
The banking and financial services industries are experiencing increased technology penetration. Among them, the banking industry has made technological advancements to better serve the general populace. The economy focused on transforming the banking sector's system into a cashless, paperless, and faceless one. The researcher wants to evaluate the user's intention for utilising a mobile banking application. The study also examines the variables affecting the user's behaviour intention when selecting specific applications for financial transactions. The researcher employed a well-structured questionnaire and a descriptive study methodology to gather the respondents' primary data utilising the snowball sampling technique. The study includes variables like performance expectations, effort expectations, social impact, enabling circumstances, and perceived risk. Each of the aforementioned variables has a major impact on how users utilise mobile banking applications. The outcome will assist the service provider in comprehending the user's history with mobile banking applications.
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
Technology upgradation in banking sector took the economy to view that payment mode towards online transactions using mobile applications. This system enabled connectivity between banks, Merchant and user in a convenient mode. there are various applications used for online transactions such as Google pay, Paytm, freecharge, mobikiwi, oxygen, phonepe and so on and it also includes mobile banking applications. The study aimed at evaluating the predilection of the user in adopting digital transaction. The study is descriptive in nature. The researcher used random sample techniques to collect the data. The findings reveal that mobile applications differ with the quality of service rendered by Gpay and Phonepe. The researcher suggest the Phonepe application should focus on implementing the application should be user friendly interface and Gpay on motivating the users to feel the importance of request for money and modes of payments in the application.
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
The prototype of a voice-based ATM for visually impaired using Arduino is to help people who are blind. This uses RFID cards which contain users fingerprint encrypted on it and interacts with the users through voice commands. ATM operates when sensor detects the presence of one person in the cabin. After scanning the RFID card, it will ask to select the mode like –normal or blind. User can select the respective mode through voice input, if blind mode is selected the balance check or cash withdraw can be done through voice input. Normal mode procedure is same as the existing ATM.
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
There is increasing acceptability of emotional intelligence as a major factor in personality assessment and effective human resource management. Emotional intelligence as the ability to build capacity, empathize, co-operate, motivate and develop others cannot be divorced from both effective performance and human resource management systems. The human person is crucial in defining organizational leadership and fortunes in terms of challenges and opportunities and walking across both multinational and bilateral relationships. The growing complexity of the business world requires a great deal of self-confidence, integrity, communication, conflict and diversity management to keep the global enterprise within the paths of productivity and sustainability. Using the exploratory research design and 255 participants the result of this original study indicates strong positive correlation between emotional intelligence and effective human resource management. The paper offers suggestions on further studies between emotional intelligence and human capital development and recommends for conflict management as an integral part of effective human resource management.
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
Our life journey, in general, is closely defined by the way we understand the meaning of why we coexist and deal with its challenges. As we develop the "inspiration economy", we could say that nearly all of the challenges we have faced are opportunities that help us to discover the rest of our journey. In this note paper, we explore how being faced with the opportunity of being a close carer for an aging parent with dementia brought intangible discoveries that changed our insight of the meaning of the rest of our life journey.
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
The main objective of this study is to analyze the impact of aspects of Organizational Culture on the Effectiveness of the Performance Management System (PMS) in the Health Care Organization at Thanjavur. Organizational Culture and PMS play a crucial role in present-day organizations in achieving their objectives. PMS needs employees’ cooperation to achieve its intended objectives. Employees' cooperation depends upon the organization’s culture. The present study uses exploratory research to examine the relationship between the Organization's culture and the Effectiveness of the Performance Management System. The study uses a Structured Questionnaire to collect the primary data. For this study, Thirty-six non-clinical employees were selected from twelve randomly selected Health Care organizations at Thanjavur. Thirty-two fully completed questionnaires were received.
Living in 21st century in itself reminds all of us the necessity of police and its administration. As more and more we are entering into the modern society and culture, the more we require the services of the so called ‘Khaki Worthy’ men i.e., the police personnel. Whether we talk of Indian police or the other nation’s police, they all have the same recognition as they have in India. But as already mentioned, their services and requirements are different after the like 26th November, 2008 incidents, where they without saving their own lives has sacrificed themselves without any hitch and without caring about their respective family members and wards. In other words, they are like our heroes and mentors who can guide us from the darkness of fear, militancy, corruption and other dark sides of life and so on. Now the question arises, if Gandhi would have been alive today, what would have been his reaction/opinion to the police and its functioning? Would he have some thing different in his mind now what he had been in his mind before the partition or would he be going to start some Satyagraha in the form of some improvement in the functioning of the police administration? Really these questions or rather night mares can come to any one’s mind, when there is too much confusion is prevailing in our minds, when there is too much corruption in the society and when the polices working is also in the questioning because of one or the other case throughout the India. It is matter of great concern that we have to thing over our administration and our practical approach because the police personals are also like us, they are part and parcel of our society and among one of us, so why we all are pin pointing towards them.
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
The goal of this study was to see how talent management affected employee retention in the selected IT organizations in Chennai. The fundamental issue was the difficulty to attract, hire, and retain talented personnel who perform well and the gap between supply and demand of talent acquisition and retaining them within the firms. The study's main goals were to determine the impact of talent management on employee retention in IT companies in Chennai, investigate talent management strategies that IT companies could use to improve talent acquisition, performance management, career planning and formulate retention strategies that the IT firms could use. The respondents were given a structured close-ended questionnaire with the 5 Point Likert Scale as part of the study's quantitative research design. The target population consisted of 289 IT professionals. The questionnaires were distributed and collected by the researcher directly. The Statistical Package for Social Sciences (SPSS) was used to collect and analyse the questionnaire responses. Hypotheses that were formulated for the various areas of the study were tested using a variety of statistical tests. The key findings of the study suggested that talent management had an impact on employee retention. The studies also found that there is a clear link between the implementation of talent management and retention measures. Management should provide enough training and development for employees, clarify job responsibilities, provide adequate remuneration packages, and recognise employees for exceptional performance.
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
Globally, Millions of dollars were spent by the organizations for employing skilled Information Technology (IT) professionals. It is costly to replace unskilled employees with IT professionals possessing technical skills and competencies that aid in interconnecting the business processes. The organization’s employment tactics were forced to alter by globalization along with technological innovations as they consistently diminish to remain lean, outsource to concentrate on core competencies along with restructuring/reallocate personnel to gather efficiency. As other jobs, organizations or professions have become reasonably more appropriate in a shifting employment landscape, the above alterations trigger both involuntary as well as voluntary turnover. The employee view on jobs is also afflicted by the COVID-19 pandemic along with the employee-driven labour market. So, having effective strategies is necessary to tackle the withdrawal rate of employees. By associating Emotional Intelligence (EI) along with Talent Management (TM) in the IT industry, the rise in attrition rate was analyzed in this study. Only 303 respondents were collected out of 350 participants to whom questionnaires were distributed. From the employees of IT organizations located in Bangalore (India), the data were congregated. A simple random sampling methodology was employed to congregate data as of the respondents. Generating the hypothesis along with testing is eventuated. The effect of EI and TM along with regression analysis between TM and EI was analyzed. The outcomes indicated that employee and Organizational Performance (OP) were elevated by effective EI along with TM.
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
By implementing talent management strategy, organizations would have the option to retain their skilled professionals while additionally working on their overall performance. It is the course of appropriately utilizing the ideal individuals, setting them up for future top positions, exploring and dealing with their performance, and holding them back from leaving the organization. It is employee performance that determines the success of every organization. The firm quickly obtains an upper hand over its rivals in the event that its employees having particular skills that cannot be duplicated by the competitors. Thus, firms are centred on creating successful talent management practices and processes to deal with the unique human resources. Firms are additionally endeavouring to keep their top/key staff since on the off chance that they leave; the whole store of information leaves the firm's hands. The study's objective was to determine the impact of talent management on organizational performance among the selected IT organizations in Chennai. The study recommends that talent management limitedly affects performance. On the off chance that this talent is appropriately management and implemented properly, organizations might benefit as much as possible from their maintained assets to support development and productivity, both monetarily and non-monetarily.
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
Banking regulations act of India, 1949 defines banking as “acceptance of deposits for the purpose of lending or investment from the public, repayment on demand or otherwise and withdrawable through cheques, drafts order or otherwise”, the major participants of the Indian financial system are commercial banks, the financial institution encompassing term lending institutions. Investments institutions, specialized financial institution and the state level development banks, non banking financial companies (NBFC) and other market intermediaries such has the stock brokers and money lenders are among the oldest of the certain variants of NBFC and the oldest market participants. The asset quality of banks is one of the most important indicators of their financial health. The Indian banking sector has been facing severe problems of increasing Non- Performing Assets (NPAs). The NPAs growth directly and indirectly affects the quality of assets and profitability of banks. It also shows the efficiency of banks credit risk management and the recovery effectiveness. NPA do not generate any income, whereas, the bank is required to make provisions for such as assets that why is a double edge weapon. This paper outlines the concept of quality of bank loans of different types like Housing, Agriculture and MSME loans in state Haryana of selected public and private sector banks. This study is highlighting problems associated with the role of commercial bank in financing Small and Medium Scale Enterprises (SME). The overall objective of the research was to assess the effect of the financing provisions existing for the setting up and operations of MSMEs in the country and to generate recommendations for more robust financing mechanisms for successful operation of the MSMEs, in turn understanding the impact of MSME loans on financial institutions due to NPA. There are many research conducted on the topic of Non- Performing Assets (NPA) Management, concerning particular bank, comparative study of public and private banks etc. In this paper the researcher is considering the aggregate data of selected public sector and private sector banks and attempts to compare the NPA of Housing, Agriculture and MSME loans in state Haryana of public and private sector banks. The tools used in the study are average and Anova test and variance. The findings reveal that NPA is common problem for both public and private sector banks and is associated with all types of loans either that is housing loans, agriculture loans and loans to SMES. NPAs of both public and private sector banks show the increasing trend. In 2010-11 GNPA of public and private sector were at same level it was 2% but after 2010-11 it increased in many fold and at present there is GNPA in some more than 15%. It shows the dark area of Indian banking sector.
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
An experiment conducted in this study found that BaSO4 changed Nylon 6's mechanical properties. By changing the weight ratios, BaSO4 was used to make Nylon 6. This Researcher looked into how hard Nylon-6/BaSO4 composites are and how well they wear. Experiments were done based on Taguchi design L9. Nylon-6/BaSO4 composites can be tested for their hardness number using a Rockwell hardness testing apparatus. On Nylon/BaSO4, the wear behavior was measured by a wear monitor, pinon-disc friction by varying reinforcement, sliding speed, and sliding distance, and the microstructure of the crack surfaces was observed by SEM. This study provides significant contributions to ultimate strength by increasing BaSO4 content up to 16% in the composites, and sliding speed contributes 72.45% to the wear rate
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
The majority of the population in India lives in villages. The village is the back bone of the country. Village or rural industries play an important role in the national economy, particularly in the rural development. Developing the rural economy is one of the key indicators towards a country’s success. Whether it be the need to look after the welfare of the farmers or invest in rural infrastructure, Governments have to ensure that rural development isn’t compromised. The economic development of our country largely depends on the progress of rural areas and the standard of living of rural masses. Village or rural industries play an important role in the national economy, particularly in the rural development. Rural entrepreneurship is based on stimulating local entrepreneurial talent and the subsequent growth of indigenous enterprises. It recognizes opportunity in the rural areas and accelerates a unique blend of resources either inside or outside of agriculture. Rural entrepreneurship brings an economic value to the rural sector by creating new methods of production, new markets, new products and generate employment opportunities thereby ensuring continuous rural development. Social Entrepreneurship has the direct and primary objective of serving the society along with the earning profits. So, social entrepreneurship is different from the economic entrepreneurship as its basic objective is not to earn profits but for providing innovative solutions to meet the society needs which are not taken care by majority of the entrepreneurs as they are in the business for profit making as a sole objective. So, the Social Entrepreneurs have the huge growth potential particularly in the developing countries like India where we have huge societal disparities in terms of the financial positions of the population. Still 22 percent of the Indian population is below the poverty line and also there is disparity among the rural & urban population in terms of families living under BPL. 25.7 percent of the rural population & 13.7 percent of the urban population is under BPL which clearly shows the disparity of the poor people in the rural and urban areas. The need to develop social entrepreneurship in agriculture is dictated by a large number of social problems. Such problems include low living standards, unemployment, and social tension. The reasons that led to the emergence of the practice of social entrepreneurship are the above factors. The research problem lays upon disclosing the importance of role of social entrepreneurship in rural development of India. The paper the tendencies of social entrepreneurship in India, to present successful examples of such business for providing recommendations how to improve situation in rural areas in terms of social entrepreneurship development. Indian government has made some steps towards development of social enterprises, social entrepreneurship, and social in- novation, but a lot remains to be improved.
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
Distribution system is a critical link between the electric power distributor and the consumers. Most of the distribution networks commonly used by the electric utility is the radial distribution network. However in this type of network, it has technical issues such as enormous power losses which affect the quality of the supply. Nowadays, the introduction of Distributed Generation (DG) units in the system help improve and support the voltage profile of the network as well as the performance of the system components through power loss mitigation. In this study network reconfiguration was done using two meta-heuristic algorithms Particle Swarm Optimization and Gravitational Search Algorithm (PSO-GSA) to enhance power quality and voltage profile in the system when simultaneously applied with the DG units. Backward/Forward Sweep Method was used in the load flow analysis and simulated using the MATLAB program. Five cases were considered in the Reconfiguration based on the contribution of DG units. The proposed method was tested using IEEE 33 bus system. Based on the results, there was a voltage profile improvement in the system from 0.9038 p.u. to 0.9594 p.u.. The integration of DG in the network also reduced power losses from 210.98 kW to 69.3963 kW. Simulated results are drawn to show the performance of each case.
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
Manufacturing industries have witnessed an outburst in productivity. For productivity improvement manufacturing industries are taking various initiatives by using lean tools and techniques. However, in different manufacturing industries, frugal approach is applied in product design and services as a tool for improvement. Frugal approach contributed to prove less is more and seems indirectly contributing to improve productivity. Hence, there is need to understand status of frugal approach application in manufacturing industries. All manufacturing industries are trying hard and putting continuous efforts for competitive existence. For productivity improvements, manufacturing industries are coming up with different effective and efficient solutions in manufacturing processes and operations. To overcome current challenges, manufacturing industries have started using frugal approach in product design and services. For this study, methodology adopted with both primary and secondary sources of data. For primary source interview and observation technique is used and for secondary source review has done based on available literatures in website, printed magazines, manual etc. An attempt has made for understanding application of frugal approach with the study of manufacturing industry project. Manufacturing industry selected for this project study is Mahindra and Mahindra Ltd. This paper will help researcher to find the connections between the two concepts productivity improvement and frugal approach. This paper will help to understand significance of frugal approach for productivity improvement in manufacturing industry. This will also help to understand current scenario of frugal approach in manufacturing industry. In manufacturing industries various process are involved to deliver the final product. In the process of converting input in to output through manufacturing process productivity plays very critical role. Hence this study will help to evolve status of frugal approach in productivity improvement programme. The notion of frugal can be viewed as an approach towards productivity improvement in manufacturing industries.
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
In this paper, we investigated a queuing model of fuzzy environment-based a multiple channel queuing model (M/M/C) ( /FCFS) and study its performance under realistic conditions. It applies a nonagonal fuzzy number to analyse the relevant performance of a multiple channel queuing model (M/M/C) ( /FCFS). Based on the sub interval average ranking method for nonagonal fuzzy number, we convert fuzzy number to crisp one. Numerical results reveal that the efficiency of this method. Intuitively, the fuzzy environment adapts well to a multiple channel queuing models (M/M/C) ( /FCFS) are very well.