An Efficient Code-word Substitution Method for Data Embedding Technique in Encrypted H.264/AVC Video Streams Anisha Jose – PG Scholar,
Anu K Kuriakose – Assistant Professor,
Department of Electronics and Communication,
Federal Institute of Science and Technology, Ernakulam, India
Cryptography technology is a security technique used to change plain text to another shape of data or to
symbols, which is known as the cipher text. Cryptography aims to keep the data secure during its journey
through public networks. Currently, there are many proposed algorithms that provide this service
especially for sensitive data or very important conversations either through mobile or video conferences. In
this paper, an inventive security symmetric algorithm is implemented and evaluated, and its performance is
compared to the AES. The algorithm has four different rounds for each quarter of the key container table,
and each of them serves to shift the table. The algorithm uses the XOR operation, which, being lightweight
and cheap, is very appropriate for use with Real Time Applications. The result shows that the suggested
algorithm spends less time than AES although it has 16 rounds and the numbers used to mix up the table
are big.
Optimization of video steganography with additional compression and encryptionTELKOMNIKA JOURNAL
Currently, data such as text, images and video are very important. Therefore, data must be secured from unauthorized parties. In this paper, we propose a number of security levels, first using compression techniques on the data that will be hidden to reduce the size of the data, second using encryption techniques on data that has been compressed so that data is more secure, third using video steganography techniques on compressed and encrypted data so that unauthorized parties are increasingly difficult to extract data. Measurement of differences in quality of cover-video and stego-video using MSE (Mean Square Error), PSNR (Peak Signal to Noise Ratio), evolution histogram of video tags, and video playback. The results show that the proposed algorithm gives better results than the previous algorithm which has a smaller MSE, larger PSNR, smaller histogram evolution of video tags, and play video without distortion.
Cryptography technology is a security technique used to change plain text to another shape of data or to
symbols, which is known as the cipher text. Cryptography aims to keep the data secure during its journey
through public networks. Currently, there are many proposed algorithms that provide this service
especially for sensitive data or very important conversations either through mobile or video conferences. In
this paper, an inventive security symmetric algorithm is implemented and evaluated, and its performance is
compared to the AES. The algorithm has four different rounds for each quarter of the key container table,
and each of them serves to shift the table. The algorithm uses the XOR operation, which, being lightweight
and cheap, is very appropriate for use with Real Time Applications. The result shows that the suggested
algorithm spends less time than AES although it has 16 rounds and the numbers used to mix up the table
are big.
Optimization of video steganography with additional compression and encryptionTELKOMNIKA JOURNAL
Currently, data such as text, images and video are very important. Therefore, data must be secured from unauthorized parties. In this paper, we propose a number of security levels, first using compression techniques on the data that will be hidden to reduce the size of the data, second using encryption techniques on data that has been compressed so that data is more secure, third using video steganography techniques on compressed and encrypted data so that unauthorized parties are increasingly difficult to extract data. Measurement of differences in quality of cover-video and stego-video using MSE (Mean Square Error), PSNR (Peak Signal to Noise Ratio), evolution histogram of video tags, and video playback. The results show that the proposed algorithm gives better results than the previous algorithm which has a smaller MSE, larger PSNR, smaller histogram evolution of video tags, and play video without distortion.
Prevention of Cheating Message based on Block Cipher using Digital Envelopeiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Internet Protocol Security (IP Security) is a security protocol that serves to secure information in the event of an exchange on the internet. It happens if there is a connection between private IP and public IP. This protocol will exchange packets on the IP layer safely. It provides two types of encryption options, transport, and tunnel. Transport mode will encrypt the data section without changing the packet header. The algorithm used to encrypt data is a symmetric cryptography algorithm. This protocol authenticates and encrypts every packet from a data transmission session. Also, it can generate keys between the sender and the recipient at the first time it is activated and can negotiate the cryptographic keys that will be used during the session. IP Security is an end-to-end cryptosystem that works at the internet layer of the Internet Protocol Suite. The protocol serves to protect the data flow in host-to-host, network-to-network, and network-to-host as well.
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...IAEME Publication
Cryptography is the scientific study of mathematical and algorithmic techniques relating to information security. Cryptographic techniques will help to protect information in cases where an attacker can have physical access to the bits representing the information, ex. When the information has to be sent over a communication channel that can be eaves dropped on by an attacker. Cryptographic primitives are the basic building blocks for constructing cryptographic solutions to information protection problems. A cryptographic primitive consists of one or more algorithms that achieve a number of protection goals. There is no well-agreed upon complete list of cryptographic primitives, nor are all cryptographic primitives independent, it is often possible to realize one primitive using a combination of other primitives.
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUDIAEME Publication
The challenge faced in public cloud computing is to provide privacy and security to the data shared among the group members. In this paper, an enhanced secure group sharing framework has been proposed. As the cloud has a semi-trust relationship it is in need of a security model so that no classified information is being presented to cloud suppliers and aggressors. Another critical variable in giving protection and security is a periodical evacuation of undesirable records which if not done consistently then, might turn into a piece of enthusiasm for assailants and can be abused. By applying the proxy signature procedure, the grouping pioneer can adequately concede the benefit of grouping administration to one or more grouped individuals.
The project proposes the enhancement of security system for secret data
communication through video file using adaptive data hiding with cryptographic
technique. A given input video file is converted into frame sequences and then
Encrypted the video using Chaos Encryption algorithm. And one of frame will be
selected to conceal the secret data for secured data communication. The proposed
technique also uses RC7 Encryption for encrypting a secret text data into cipher text
to avoid data hacking issues. After data encryption, the data hider will conceal the
secret encrypted data into the selected frame using adaptive LSB embedding
algorithm. Although encryption achieves certain security effects, they make the secret
messages unreadable and unnatural or meaningless. These unnatural messages
usually attract some unintended observers’ attention. The data hiding technique uses
the adaptive LSB replacement algorithm for concealing the secret message bits into
the image. In the data extraction module, the secret data will be extracted by using
relevant key for choosing the pixel coefficients and it will be decrypted to get original
data using encryption key. Finally the performance of this proposal in data encryption
and hiding will be analysed based on image and data recovery.
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...EECJOURNAL
Due to vast development of information technology the need of the protection of data also increases for that purpose encryption is done. The security requirements include four major aspect data confidentiality, data integrity, data authentication and data freshness. WSNs have produced enormous enthusiasm among analysts these years in view of their potential utilization in a wide assortment of uses. Sensor hubs are cheap compact gadgets with restricted handling force and vitality assets. Sensor hubs can be utilized to gather data from the earth, locally process this information and transmit the detected information back to the client. For securing that data from attack many algorithms came in existence for cryptography purpose. Be that as it may, the outstanding amongst other existing symmetric security calculation to give information security utilized these days is Advanced encryption standard (AES).
Virtual security gateways at network edge are key to protecting ultra broadba...Paul Stevens
Combined technologies create a virtualized security gateway with real-time processing even for small packets associated with IP voice applications.
The future of wireless is ultra-broadband packet throughput, with 4G/LTE speeds hitting 25 Mbps to 50 Mbps¹ and 5G technologies targeting even faster speeds. But the IP mobile networks that are serving up this throughput have new security risks for MNOs that can negatively impact their infrastructure, operations, customer services, and data.
Utilizing security gateways (SeGW) in every base station and small cell is the proven way to secure the network against hackers. But legacy gateways don’t offer the performance or flexibility to scale for cost-effective deployment at a macrocell or at a small cell. Casa Systems worked with Intel and Intel® Network Builders ecosystem members Advantech and Wind River to build a complete virtual SeGW system with the performance and flexibility for these edge locations—even for demanding IP voice applications that transmit floods of small packets that typically have overwhelmed legacy gateways.
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...ijiert bestjournal
Steganography is the art of covered or hidden text message. The purpose of steganography is covert com munication- to hide the existence of a secret message from a th ird party. This paper is intnded as a high-level te chnical introduction to steganography for those unfamiliar with the field. It is directed at forensic computer examiners who need a practical understanding of steganography wit hout study into the mathematical,although referenc es are provided to many of the ongoing research for the pe rson who needs or wants additional detail covered b y audio- video file. Although in this paper gives a historic al context for steganography,the significance is o n digital applications use anti Forensics technique,focusing on hiding information in online audio and video fi les. Examples for tools of software that employ steganography to hide data inside of audio-video file as well as sof tware to detect such hidden files will also be presented. Suitable algorithm such as LSB is used for image steganograp hy suitable parameter of security and authentication is like PS NR,histogram are obtained at transmitter\sende and receiver side which are exactly identical,hence data security ca n be increased. This paper focus on the idea of com puter anti forensics technique and its use of video steganogra phy in both investigative and security manner.
A brief over overview of steganographical security techniques and how it has been applied, is applied and will continue to be applied in maintaining confidentiality between two communication parties
Wireless communication systems, multi-input multi-output (MIMO) technology has been recognized as the key ingredient to support higher data rate as well as better transmission quality after using this algorithm of a XTEA or MTEA scheme. Modified TEA is used for encryption of the text. Then decryption unit for decrypting the cipher text and convert that to plain text. Key generation unit is to generate 128bit key and these keys are send along with cipher text. Encryption and decryption system ensures the original data are send and received by the users in secured environment. The Received data are retrieving by the authorized users by providing key generation like private keys this Key Pattern generations provide more security to the messages. Extended tiny encryption algorithm or modified tiny encryption algorithm and tiny encryption algorithm are used to enhance the size, speed and security in the system. These algorithms are better compared to configurable joint detection decoding algorithm (CJDD) and valid symbol finder algorithm.
Using the Internet to get people off the Internet Jess Miller
Presentation given by Jess Miller at the Showcase #6 at the Adelaide Convention Centre on December 14, 2015. Hosted by the Department of Premier and Cabinet, SA.
Prevention of Cheating Message based on Block Cipher using Digital Envelopeiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Internet Protocol Security (IP Security) is a security protocol that serves to secure information in the event of an exchange on the internet. It happens if there is a connection between private IP and public IP. This protocol will exchange packets on the IP layer safely. It provides two types of encryption options, transport, and tunnel. Transport mode will encrypt the data section without changing the packet header. The algorithm used to encrypt data is a symmetric cryptography algorithm. This protocol authenticates and encrypts every packet from a data transmission session. Also, it can generate keys between the sender and the recipient at the first time it is activated and can negotiate the cryptographic keys that will be used during the session. IP Security is an end-to-end cryptosystem that works at the internet layer of the Internet Protocol Suite. The protocol serves to protect the data flow in host-to-host, network-to-network, and network-to-host as well.
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...IAEME Publication
Cryptography is the scientific study of mathematical and algorithmic techniques relating to information security. Cryptographic techniques will help to protect information in cases where an attacker can have physical access to the bits representing the information, ex. When the information has to be sent over a communication channel that can be eaves dropped on by an attacker. Cryptographic primitives are the basic building blocks for constructing cryptographic solutions to information protection problems. A cryptographic primitive consists of one or more algorithms that achieve a number of protection goals. There is no well-agreed upon complete list of cryptographic primitives, nor are all cryptographic primitives independent, it is often possible to realize one primitive using a combination of other primitives.
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUDIAEME Publication
The challenge faced in public cloud computing is to provide privacy and security to the data shared among the group members. In this paper, an enhanced secure group sharing framework has been proposed. As the cloud has a semi-trust relationship it is in need of a security model so that no classified information is being presented to cloud suppliers and aggressors. Another critical variable in giving protection and security is a periodical evacuation of undesirable records which if not done consistently then, might turn into a piece of enthusiasm for assailants and can be abused. By applying the proxy signature procedure, the grouping pioneer can adequately concede the benefit of grouping administration to one or more grouped individuals.
The project proposes the enhancement of security system for secret data
communication through video file using adaptive data hiding with cryptographic
technique. A given input video file is converted into frame sequences and then
Encrypted the video using Chaos Encryption algorithm. And one of frame will be
selected to conceal the secret data for secured data communication. The proposed
technique also uses RC7 Encryption for encrypting a secret text data into cipher text
to avoid data hacking issues. After data encryption, the data hider will conceal the
secret encrypted data into the selected frame using adaptive LSB embedding
algorithm. Although encryption achieves certain security effects, they make the secret
messages unreadable and unnatural or meaningless. These unnatural messages
usually attract some unintended observers’ attention. The data hiding technique uses
the adaptive LSB replacement algorithm for concealing the secret message bits into
the image. In the data extraction module, the secret data will be extracted by using
relevant key for choosing the pixel coefficients and it will be decrypted to get original
data using encryption key. Finally the performance of this proposal in data encryption
and hiding will be analysed based on image and data recovery.
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...EECJOURNAL
Due to vast development of information technology the need of the protection of data also increases for that purpose encryption is done. The security requirements include four major aspect data confidentiality, data integrity, data authentication and data freshness. WSNs have produced enormous enthusiasm among analysts these years in view of their potential utilization in a wide assortment of uses. Sensor hubs are cheap compact gadgets with restricted handling force and vitality assets. Sensor hubs can be utilized to gather data from the earth, locally process this information and transmit the detected information back to the client. For securing that data from attack many algorithms came in existence for cryptography purpose. Be that as it may, the outstanding amongst other existing symmetric security calculation to give information security utilized these days is Advanced encryption standard (AES).
Virtual security gateways at network edge are key to protecting ultra broadba...Paul Stevens
Combined technologies create a virtualized security gateway with real-time processing even for small packets associated with IP voice applications.
The future of wireless is ultra-broadband packet throughput, with 4G/LTE speeds hitting 25 Mbps to 50 Mbps¹ and 5G technologies targeting even faster speeds. But the IP mobile networks that are serving up this throughput have new security risks for MNOs that can negatively impact their infrastructure, operations, customer services, and data.
Utilizing security gateways (SeGW) in every base station and small cell is the proven way to secure the network against hackers. But legacy gateways don’t offer the performance or flexibility to scale for cost-effective deployment at a macrocell or at a small cell. Casa Systems worked with Intel and Intel® Network Builders ecosystem members Advantech and Wind River to build a complete virtual SeGW system with the performance and flexibility for these edge locations—even for demanding IP voice applications that transmit floods of small packets that typically have overwhelmed legacy gateways.
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...ijiert bestjournal
Steganography is the art of covered or hidden text message. The purpose of steganography is covert com munication- to hide the existence of a secret message from a th ird party. This paper is intnded as a high-level te chnical introduction to steganography for those unfamiliar with the field. It is directed at forensic computer examiners who need a practical understanding of steganography wit hout study into the mathematical,although referenc es are provided to many of the ongoing research for the pe rson who needs or wants additional detail covered b y audio- video file. Although in this paper gives a historic al context for steganography,the significance is o n digital applications use anti Forensics technique,focusing on hiding information in online audio and video fi les. Examples for tools of software that employ steganography to hide data inside of audio-video file as well as sof tware to detect such hidden files will also be presented. Suitable algorithm such as LSB is used for image steganograp hy suitable parameter of security and authentication is like PS NR,histogram are obtained at transmitter\sende and receiver side which are exactly identical,hence data security ca n be increased. This paper focus on the idea of com puter anti forensics technique and its use of video steganogra phy in both investigative and security manner.
A brief over overview of steganographical security techniques and how it has been applied, is applied and will continue to be applied in maintaining confidentiality between two communication parties
Wireless communication systems, multi-input multi-output (MIMO) technology has been recognized as the key ingredient to support higher data rate as well as better transmission quality after using this algorithm of a XTEA or MTEA scheme. Modified TEA is used for encryption of the text. Then decryption unit for decrypting the cipher text and convert that to plain text. Key generation unit is to generate 128bit key and these keys are send along with cipher text. Encryption and decryption system ensures the original data are send and received by the users in secured environment. The Received data are retrieving by the authorized users by providing key generation like private keys this Key Pattern generations provide more security to the messages. Extended tiny encryption algorithm or modified tiny encryption algorithm and tiny encryption algorithm are used to enhance the size, speed and security in the system. These algorithms are better compared to configurable joint detection decoding algorithm (CJDD) and valid symbol finder algorithm.
Using the Internet to get people off the Internet Jess Miller
Presentation given by Jess Miller at the Showcase #6 at the Adelaide Convention Centre on December 14, 2015. Hosted by the Department of Premier and Cabinet, SA.
International Refereed Journal of Engineering and Science (IRJES)irjes
International Refereed Journal of Engineering and Science (IRJES) is a leading international journal for publication of new ideas, the state of the art research results and fundamental advances in all aspects of Engineering and Science. IRJES is a open access, peer reviewed international journal with a primary objective to provide the academic community and industry for the submission of half of original research and applications.
Novel lightweight video encryption method based on ChaCha20 stream cipher an...IJECEIAES
In the recent years, an increasing demand for securing visual resourceconstrained devices become a challenging problem due to the characteristics of these devices. Visual resource-constrained devices are suffered from limited storage space and lower power for computation such as wireless sensors, internet protocol (IP) camera and smart cards. Consequently, to support and preserve the video privacy in video surveillance system, lightweight security methods are required instead of the existing traditional encryption methods. In this paper, a new light weight stream cipher method is presented and investigated for video encryption based on hybrid chaotic map and ChaCha20 algorithm. Two chaotic maps are employed for keys generation process in order to achieve permutation and encryption tasks, respectively. The frames sequences are encrypted-decrypted based on symmetric scheme with assist of ChaCha20 algorithm. The proposed lightweight stream cipher method has been tested on several video samples to confirm suitability and validation in term of encryption–decryption procedures. The performance evaluation metrics include visual test, histogram analysis, information entropy, correlation analysis and differential analysis. From the experimental results, the proposed lightweight encryption method exhibited a higher security with lower computation time compared with state-of-the-art encryption methods.
A variety of solutions have been proposed to mitigate the reduction in mobility due to VI.
A variety of solutions have been proposed to mitigate the reduction in mobility due to VI.
Nowadays, the demands of real-time video communication are increased rapidly. Search and rescue (SAR) applications like earthquake rescue, avalanche victims, wildfire monitoring in addition to highway surveillance are considered examples of real-time applications. In which, communication time is considered the most important metric to be optimized to ensure support for victims lives. Thus finding a simple and time efficient encryption technique for securing the transmitted data become mandatory. In this paper, we present an efficient encryption technique which has low computation complexity, low processing time and highly chaotic encrypted videos. The proposed technique is based on CABAC where the bin-string of Intra-Prediction Mode is encrypted with chaotic signals and the sign of MVD is toggled randomly. For residue coefficients the sign of the AC coefficients are flipped randomly and the first value of DC coefficients is encrypted by XORing the bin-string with random stream. All random streams are generated with chaotic systems using Logistic map. The experimental results shows that the proposed technique is highly effective for real-time application and robust against different types of attacks.
The proposed scheme embedded the watermark during the differential pulse code modulation process and extracted through decoding the entropy details. This technique utilize the moving picture expert groups standard (MPEG-2) in which discrete cosine transform coefficients are adjusted from selected instantaneous decoder refresh frames for watermarking purpose. The subsets of frames as candidate I-frames are chosen to achieve better perceptibility and robustness. A secret key based cryptographic technique is used to select the candidate frames. Three more keys are required to extract the watermark whereas one of the key is used to stop the extraction process and the remaining two are used to display the scrambled watermark. The toughness is evaluated by testing spatial and temporal synchronization attacks. High sturdiness is achieved against video specific attacks frequently occurs in the real world. Even a single frame can accommodate thousand of watermark bits which reflect that high watermark capacity can be obtained.
A Survey on Video Watermarking Technologies based on Copyright Protection and...Editor IJCATR
Digital Watermark is class of marker or symbol secretly embedded in a multimedia signal such as Audio, Image or Video. It
is used to identify the ownership of the multimedia signal. Video watermarking is an emerging area for various applications like copy
control broadcast monitoring, video authentication, copyright protection and enhanced video coding. The main objective of this paper
is to present survey and comparisons of various available techniques on video watermarking based on copyright protection and
identification. Comparative study of various technologies gives the significant information about the PSNR, payload, quality factor
and also the various attacks used in video watermarking techniques. The best techniques in various scenarios are discussed in this
paper which will help the research scholars in field of video watermarking.
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...Editor IJMTER
Due to the increasing popularity of video services application in recent days, it is
undesirable to prevent the content leakage on the trusted video delivery and piracy prevention has
been indeed, become critical. In order to preserve content leakage and prevent piracy,
conventional system addressed the issue by proposing the method based on the observation of
streamed traffic throughout the network .Also piracy has hindered the use of open peer to peer
networks for commercial content delivery. Hence the basic idea is to propose an enhanced
dynamic content leakage detection scheme that is robust to the variation of the video lengths. It
enhances the detection performances even in the environment subjected to variation in length of
videos. To detect pirates, identity-based signature and time stamped token have been generated. It
helps to solve piracy without affecting P2P clients so that colluder cannot download the secured
videos. The advantage lies mainly in advanced content availability, low cost and copyright
agreements in protecting the secured videos.
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMijcisjournal
Cryptography technology is a security technique used to change plain text to another shape of data or to symbols, which is known as the cipher text. Cryptography aims to keep the data secure during its journey through public networks. Currently, there are many proposed algorithms that provide this service especially for sensitive data or very important conversations either through mobile or video conferences. In this paper, an inventive security symmetric algorithm is implemented and evaluated, and its performance is compared to the AES. The algorithm has four different rounds for each quarter of the key container table, and each of them serves to shift the table. The algorithm uses the XOR operation, which, being lightweight and cheap, is very appropriate for use with Real Time Applications. The result shows that the suggested algorithm spends less time than AES although it has 16 rounds and the numbers used to mix up the table are big.
Improved method for image security based on chaotic-shuffle and chaotic-diffu...IJECEIAES
In this paper, we propose to enhance the security performance of the color image encryption algorithm which depends on multi-chaotic systems. The current cryptosystem utilized a pixel-chaotic-shuffle system to encode images, in which the time of shuffling is autonomous to the plain-image. Thus, it neglects to the picked plaintext and known-plaintext attacks. Also, the statistical features of the cryptosystem are not up to the standard. Along these lines, the security changes are encircled to make the above attacks infeasible and upgrade the statistical features also. It is accomplished by altering the pixel-chaotic-shuffle component and including another pixel-chaotic-diffusion system to it. The keys for diffusion of pixels are extracted from the same chaotic arrangements created in the past stage. The renovation investigations and studies are performed to exhibit that the refreshed version of cryptosystem has better statistical features and invulnerable to the picked plaintext and known plaintext attacks than the current algorithm.
A New Bit Split and Interleaved Channel Coding for MIMO DecoderIJARBEST JOURNAL
Authors:-C. Amar Singh Feroz1, S. Karthikeyan2, K. Mala3
Abstract– In wireless communications, the use of multiple antennas at both the
transmitter and receiver is a key technology to enable high data transmission without
additional bandwidth or transmit power. MIMO schemes are widely used in many
wireless standards, allowing higher throughput using spatial multiplexing techniques.
Bit split mapping based on JDD is designed. Here ETI coding is used for encoding and
Viterbi is used for decoding. Experimental results for 16-QAM and 64 QAM with the
code rate of ½ and 1/3 codes are shown to verify the proposed approach and to elucidate
the design tradeoffs in terms the BER performance. This bit split mapping based JDD
algorithm can greatly improve BER performance with different system settings.
Segmentation and Automatic Counting of Red Blood Cells Using Hough TransformIJARBEST JOURNAL
Authors:- V. Antony Asir Daniel1, J. Surendiran2, K. Kalaiselvi3
Abstract- Red blood cells are specialized as oxygen carrier RBC plays a crucial role in
medical diagnosis and pathological study. The blood samples are collected using the smear
glass slide. These samples are taken under the test using the image of the blood. Filtering
process are carries out to remove the noise. Morphological operation are applied on the
blood image and using Hough transform method the RBC are counted which is the
effective segmentation process.
Performance Analysis of PAPR Reduction in MIMO-OFDMIJARBEST JOURNAL
Authors: Jayaraman.G1, VeeraKumar K2, Selvakani.S3
Abstract— In communication system, it is aimed to provide highest possible
transmission rate at the lowest possible power and with the least possible noise. MIMOOFDM
has been chosen for high data rate communications and widely deployed in many
wireless communication standards. The major drawback in OFDM signal transmission is
high PAPR. In previous, use clipping technique to tackle this problem. In this paper, use
EM-GAMP algorithm to reduce PAPR in considerable amount.
High Speed and Low Power ASIC Using Threshold LogicIJARBEST JOURNAL
Authors : Navaneetha Velammal M1, Sharanabasaveshwar G. Hiremath2, R.Prem Ananth3, Rama S4
In this paper, a new circuit architecture of a differential threshold logic gate
called PNAND is proposed. The main purpose of this work to reduce the leakage, power
and area of standard ASIC Circuits. By predicting the performance comparison of some
electrical quantity such as charge, voltage or current, the implementation of threshold
logic gates (TLG) is considered in this paper. Next a hybridization technique is done by
replacing the flipflops and parts of their clocks with PNAND cells is Proposed. At last the
proposed PNAND cell is hybridized with conventional logic cells, which will result in
lower power consumption, leakage and area. This paper is proposed using Cadence®
Virtuoso Schematic Editor at 180nm technology. Several design circuit methodologies
such as retiming and asynchronous circuit design can used by the proposed threshold
logic gate effectively.
Multipath routing protocol for effective local route recoveryIJARBEST JOURNAL
In mobile Ad hoc network, frequent mobility during the data transmission of data
causes route failure which results in route discovery. In this we propose multipath routing protocol
for effective local route recovery in mobile Ad hoc networks. In this protocol each source and
destination pair establishes multiple paths in single route discovery and they are cached in their route
caches. The cached routes are sorted on the basis of their bandwidth availability. In case of route
failure in the primary route, a recovery node which is an over heading neighbor, detects it and
establishes a local recovery path with maximum bandwidth from its route cache. This proposed
technique improves network performance and it prevents frequent collision.
Simulation of an adaptive digital beamformer using matlabIJARBEST JOURNAL
Beam forming is the process of combining the weighted signals received on an array of
sensors to improve the directionality. Adaptive beamforming is the ability of the beamformer to
receive the signal only from the desired direction and to reject all other signals from undesired
directions. The weight vector for the adaptive beamformer continuously changes based on some
adaptive algorithm. Therefore, adaptive digital beam formers can point the antenna to the signal
direction without changing the physical architecture of the array antenna. The beam pointing
direction can be varied electronically with this technique. This paper focuses on Least Mean
Square (LMS) adaptive algorithm.
Quantification of rate of air pollution by means ofIJARBEST JOURNAL
To develop efficient strategies for pollution control, it is essential to assess
both the costs of control and the benefits that may result. These benefits will often include
improvements in public health, including reductions in both morbidity and premature
mortality. Until recently, there has been little guidance about how to calculate the benefits
of air pollution controls and how to use those estimates to assign priorities to different air
pollution control strategies. In this work, a method is described for quantifying the benefits
of reduced ambient concentrations of pollutants (such as ozone and particulate matter)
typically found in urban areas worldwide. The method applies the data on Jakara, Indonesia,
an area characterized by little wind, high population density (8 million people), congested
roads, and ambient air pollution. The magnitude of the benefits of pollution control depends
on the level of air pollution, the expected effects on health of the pollutants (dose-response),
the size of the population affected, and the economic value of these effects. In the case of
Jakarta, the methodology suggests that reducing exposure to lead and nitrogen dioxide
should also be a high priority. An important consequence of ambient lead pollution is a
reduction in learning abilities for children, measured as I.Q. loss. Apart from that, reducing
the proportion of respirable particles can reduce the amount of illness and premature
mortality.
Simulation and Implementation of Electric Bicycle employing BLDC DriveIJARBEST JOURNAL
Electric Bicycles have been gaining attention as an efficient and clean means of
transportation. This paper focuses on the design and implementation of a hybrid powered
electric bicycle employing a dc-dc power converter. Two DC sources are used: battery and
super capacitor. The super capacitor is connected in parallel to the battery and a dc-dc
converter is designed in closed loop which arbitrates power between the battery and super
capacitor. The purpose of employing super capacitor is to drive the vehicle during the peak
power required by the load. The main components of the proposed electric bicycle are:
battery, super capacitors, dc-dc converter, controller and BLDC motor. These components
are modeled in MATLAB. Three topologies of dc-dc converter are investigated for the
electric bicycle and they are compared in terms of ripple at the input and the output and
from the results it is found that the modified boost converter results in reduced ripple. The
lead acid battery and super capacitor are modeled in SIMULINK to obtain the voltage and
current waveform. A prototype of the proposed dc-dc converter is built alongwith
controller and it is tested. A real-time working model of electric bicycle is built and the
performance of the sources and the power converter are analyzed and the results are
verified.
Review of Integrated Power Factor Correction (PFC) Boost converter topologies...IJARBEST JOURNAL
This paper provides a review of various Power Factor Correction (PFC) boost
converter topologies suitable for telecoms. A novel integrated PFC topology is proposed which acts
as a backup power supply for telecommunication systems. The advantage of the proposed circuit is
that it operates based on soft switching principle thereby reducing the switching losses in the
converter. The topologies analyzed in this paper are conventional average current mode control
boost PFC, bridgeless boost PFC, semi-bridgeless boost PFC, totem-pole bridgeless boost PFC and
proposed integrated boost PFC. All these topology studies are investigated by carrying out the
simulation of the converter circuits using PSIM software. A detailed comparison of all the
topologies have been done and they are compared in terms of supply power factor, supply current
THD and displacement factor. From the results, it is inferred that the proposed integrated PFC
provides a reduced supply current THD and improved power factor. The results are validated.
Analysis of Modulation Strategies for Two-Stage Interleaved Voltage Source In...IJARBEST JOURNAL
This paper deals with the investigation of interleaved voltage source inverter for
photovoltaic applications. This topology focuses on the reduction of inductor current ripple
content, total harmonic distortion (THD) of the proposed topology. In addition, the filter size is
reduced when compared to single-stage voltage source inverter. The design of filter for the
proposed topology is highlighted. The paper discusses the different modulation strategies for the
proposed topology with different values of modulation index. A comparison made between the
different strategies is reported. And comparison is done between single-stage and two-stage
voltage source inverter with chosen modulation strategies. Simulation studies of the proposed VSI
are carried out in MATLAB/SIMULINK.
A SURVEY ON QUESTION AND ANSWER SYSTEM BY RETRIEVING THE DESCRIPTIONS USING L...IJARBEST JOURNAL
Question answering is a modern type of data recovery described by data needs
are at any rate somewhat communicated as normal dialect articulations or addresses, and
standout amongst the most regular types of human PC cooperation. This article gives an exten
and relative review of Question Answering Technology (QAT). Question retrieval in cur
community-based question answering (CQA) administrations does not, all in all, func
admirably for long and complex inquiries. This paper introduces the quality question and an
(QA) sets amassed as thorough information bases of human knowledge. It helps clients to look
exact data by acquiring right answers straightforwardly, as opposed to skimming thro
substantial ranked arrangements of results. Hence to retrieve relevant questions and t
corresponding answers becomes an important task for information acquisition. This p
discusses different focus of the QA task which is transformed from answer extraction, an
matching and answer ranking to searching for relevant questions with good ready answers.
Fermentation Process for Manufacturing of Wine from Emblica officinalis fruitsIJARBEST JOURNAL
Amla fruits can be used as a valuable ingredient for
the production of an amla wine with all the important properties
of wine having medicinal characteristics of amla fruits. A
fermenting strain of Saccharomyces cerevisiae was utilized for
alcoholic fermentation using sugarcane molasses. Temperature
is one of the major constraints that determine the ethanol
production. The fermentation process was carried out at 25, 30,
35 and 40°C with 20% initial sugar concentration. It was
concluded that an increase in alcohol concentration,
productivity as well as efficiency with an increase in pH (4.0-5.0)
and it was also found that this optimum pH range was suitable
for S. cerevisiae strain. The fermentation process using S.
cerevisiae under optimized conditions i.e. pH 6, sugar
concentration 20% and temperature 30°C revealed an increase
in ethanol production i.e. 8.9 % (v/v) with good fermentation
efficiency
The Performance Tuning of Seven Level Diode Clamped Multi Level Inverter Mr.M.Madhivhanan
PG Scholar,
Department of Electrical and Electronics Engineering,
Arignar Anna Institute of Science and Technology, Chennai
E-mail: madhivhanan@gmail.com
Prevention of Cybercrime by Suspicious URL Detection in Social Networks Using Enhanced DBSCAN Algorithm R. Ravi,
Department of Computer Science & Engineering,
Francis Xavier Engineering College, Tamil Nadu, India
Dr. Beulah Shekhar,
Department of Criminology,
Manonmanium Sundaranar University, Tamil Nadu, India
SQL Vulnerability Prevention in Cybercrime using Dynamic Evaluation of Shell and Remote File Injection Attacks R. Ravi,
Department of Computer Science & Engineering,
Francis Xavier Engineering College, Tamil Nadu, India
Dr. Beulah Shekhar,
Department of Criminology,
Manonmanium Sundaranar University, Tamil Nadu, India
Parametric Blur Estimation Using Modified Radon Transform for Natural Images Restoration Vedhapriya Vadhana R – Associate Professor,
Department of ECE,
Maheswari E – PG scholar,
VLSI DESIGN,
Francis Xavier Engineering College, Tirunelveli,India
A Novel Visual Cryptographic Scheme Using Floyd Steinberg Half Toning and Block Replacement Algorithms Nisha Menon K – PG Scholar,
Minu Kuriakose – Assistant Professor,
Department of Electronics and Communication,
Federal Institute of Science and Technology, Ernakulam, India
An Equipped Sensorized Glove with Bent Sensor for Measuring Finger Flexion Selvi K – PG Scholar,
Embedded System and Technologies,
Rajeswari S – Assistant Professor,
Department of ECE,
PSN college of Engineering and Technology, Tirunelveli, India
Multiple Hazard Detection in Mine Using Embedded System Chithra P S – PG Scholar,
Embedded System Technologies,
Jenifer Darling Rosita P – Assistant Professor,
Department of ECE,
RAJAS International Institute of Technology for Women, Nagercoil, India
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.