A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Vanitha, M.
- Joint Physical-Application Layer Security for Connectionless Multimedia Delivery
Authors
1 Department Of Computer Application, Nandha Engineering College, Perundurai Main Road, Erode-52, IN
Source
Wireless Communication, Vol 7, No 9 (2015), Pagination: 281-284Abstract
In current years, there is necessary to increasing demands for the security of wireless multimedia applications. Due to the broadcast nature of radio propagation, the wireless transmission can be readily overheard by unauthorized users for interception purposes and is thus highly vulnerable to eavesdropping attacks. Comparing wireless network to traditional wired networks, are suffer from malicious attacks. Usually, physical layer information is dynamic in wireless networks, and application layer information is related to wireless multimedia delivery. In this work, we propose a joint frame work involving both the physical and application layer security technologies. The scalable multimedia security service can be achieved without changing the current communication framework. Specifically, by exploiting the security capacity and signal processing technologies at the physical layer and the authentication and watermarking strategies at the application layer, the available network resources can be utilized efficiently. In addition, we proposed a case study of the physical-layer security in cooperative wireless networks with multiple relays. In particular, this joint scheme can be implemented easily with low communication overhead, which facilitates its deployment in large-scale wireless multimedia systems.
- Smart Shopping Experience Based on RFID
Authors
1 Dhanalakshmi College of Engineering, IN
Source
Programmable Device Circuits and Systems, Vol 4, No 12 (2012), Pagination: 678-683Abstract
RFID (radio frequency identification) technology offers the ability to provide many new services and conveniences in the retail environment. Shoppers can be guided electronically to find desired products that are tagged with RFID chips and whose locations are tracked by RFID readers in the store (e.g., smart shelves or other reader systems). Smart shopping carts with electronic displays, in communication with a computer system, can display a map associated with a shopping list downloaded by a shopper to identify a route to obtain the desired items. The smart cart, also equipped with RFID tags, can also verify the purchase of the items as they are placed in the cart and, if desired, communicate with a billing system to automatically bill the shopper for the purchases.Keywords
Dynamic Q Factor Algorithm, RFIDtag, RFIDreader, Transceiver, RFID Technology.- A Novel AES VLSI Architecture with Fully-Sub Pipelined Structure for High Throughput and Area Efficiency
Authors
1 School of Electronics Engineering, VIT University, IN
2 School of Electrical Engineering, VIT University, IN
3 School of Information and Technology, VIT, IN
Source
Programmable Device Circuits and Systems, Vol 1, No 7 (2009), Pagination: 183-188Abstract
This paper presents novel high-speed architectures for the hardware implementation of the Advanced Encryption Standard (AES) algorithm. Unlike previous works which rely on look-up tables to implement the SubBytes and InvSubBytes transformations of the AES algorithm, the proposed design employs combinational logic only. As a direct consequence, the unbreakable delay incurred by look-up tables in the conventional approaches is eliminated, and the advantage of subpipelining can be further explored. Furthermore,composite field arithmetic is employed to reduce the area requirements, and different implementations for the inversion in subfield (24) are compared. The subkeys, required for each round of the Rijndael algorithm, are generated in real-time by the keyscheduler module by expanding the initial secret key, thus reducing the amount of storage for buffering. Moreover, a novel architecture was proposed for the fully sub-pipelining is used after each standard round, and sub-pipelined with in the round states, so throughput was increased double to any pipelined architecture. This AES design was implemented using Verilog HDL and synthesized using TSMC’s 90 nm standard cell library with RTL Compiler, and physical design implementation was done using SOC Encounter and achieved the through put of 38. 4 Gbps after detailed routing.
Keywords
AES Algorithm, Sub-Pipeline, VLSI, Lookup-Table.- Content-Based Image Retrieval Technique–An Overview
Authors
1 Department of Computer Science, J.J. College of Arts and Science, Pudukkottai, IN
2 Department of Computer Science, H.H. the Rajah’s College, Pudukkottai, IN
Source
Digital Image Processing, Vol 5, No 2 (2013), Pagination: 51-57Abstract
Content-based image retrieval (CBIR) is one of the most interesting research area in the subject of computer science and image processing. Much progress has been made over for the last ten years. In this paper a comprehensive review on the content-based image retrieval and its application in medical image diagnosis have been addressed. The present review includes current trend in this field and certain gap of knowledge for the feature development. Research in the field of image retrieval, is active and fast advancing since 1990. A remarkable progress in theoretical as well as system development has been achieved. However still there are many challenging areas in this discipline. This article gives a complete overview of available literature in the field of content based access to medical image those have been published for the last 10 years. Furthermore it gives what is achieved to date? It also deals with the state of art CBIR application in medical domain.
Keywords
A Comprehensive Account on CBIR, Present Trend of CBIR, Review of CBIR in Medical Image Processing.- Textural Analysis for the Accuracy in Diagnosis of Medical Scan/CT Images
Authors
1 Mother Teresa University, Kodaikannel, IN
2 EBET Knowledge Park, Tirupur, IN
Source
Digital Image Processing, Vol 2, No 5 (2010), Pagination: 157-160Abstract
To determine the accuracy of normal tissue scan images from the abnormal cases, the GLCM (Grey-Level Co-occurrence matrix) and their derived parameters such as homogeneity of the images and energy level calculations were approached. These structural and textural parameters were calculated by using mathematical formulae. In each case 20 abdominal scan images of both normal and abnormal patients were employed. The data generated out of this present investigation was tabulated and statistically analyzed. The analysis for energy level on the images disclosed that there was a clear distinguish between normal tissue and abnormal tissue. The above results are discussed with relation to the accuracy.Keywords
Textural Features of CT Images, Statistical Design For Image Studies, Medical Image Textural Analysis.- Preventing Mobility Device Intrusion and Information Theft Using Biometric Fingerprint Recognition
Authors
1 K.S. Rangasamy College of Technology, Tiruchengode, IN
Source
Biometrics and Bioinformatics, Vol 6, No 2 (2014), Pagination:Abstract
Fingerprint based authentication system project is used to more secured your system compare to all other security device which uses biometric reader. In the project data from the finger print is send to the system through port and fingerprint reader is used to read the data from port and validate the data with your data. If the validation output success then the user would be allowed else it blocks the user to allow. The system have to use third party component to read or send the data through the serial port. In the project implementation you have to enter your data (user id and password) after register finger print, so data for the validation could be catch directly from finger print through the serial port. After read the data from serial port using third party component in biometric database FVC2004, it checks whether the entered by the user and reading data’s are match or not. After your successful validation (match) you can move ahead for further works else you can’t. In an existing system we secure the system through check whether the user id and password match with data’s in database or not, but it’s possible to steal the data from the database. So it’s not highly secured so go for the implementation of fingerprint based authentication system project. Fingerprint based authentication system project is more secured compare to all other securities, because you can’t stole any user information due to high security. Information stored in fingerprint is only known by the user so even through unknown person uses the fingerprint they can’t enter the correct data while we checking. If the third person uses fake finger print to access the system, which is also recognized and block the user to use. Finally we conclude no way to steal the user’s data and we can maintain the user’s information safely and securely, so fingerprint based authentication system is more secured compare to all other security device or system.
Keywords
Biometric Database, User Identification, Security, Fingerprint, Matching.- A New Efficient Hybrid Approach for Economic Dispatch with Valve Point Loading Effect
Authors
1 Coimbatore Institute of Engineering and Technology, Coimbatore, IN
2 Akshaya College of Engineering and Technology, Kinathukadavu, Coimbatore, IN
Source
Artificial Intelligent Systems and Machine Learning, Vol 3, No 12 (2011), Pagination: 726-731Abstract
Economic dispatch (ED) is an important optimization task in power system operation for allocating generation among the committed units. This paper presents a novel optimization technique to determine the feasible optimal solution of the economic dispatch problem considering valve-point effect. The proposed PSODE-SA method combines the Particle Swarm Optimization (PSO) algorithm and Differential Evolution (DE) with Simulated Annealing (SA) technique to optimize the performance of ED problems. The combined methodology and its variants are validated for a test system consisting of 40 thermal units whose fuel cost function takes into account the valve-point loading effects. Thus the proposed method is one of the state-of-the-art algorithms in solving load dispatch problems with the valve-point effect.Keywords
Differential Evolution, Economic Dispatch, Particle Swarm Optimization, Simulated Annealing.- Low Leakage Power Vedic Multiplier using Standard Cell Design
Authors
1 School of Electronics Engineering, Vellore - 632014, Tamil Nadu, IN
2 School of Information and Technology, Vellore - 632014, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 24 (2015), Pagination:Abstract
The work proposed in this paper is to reduce the leakage power by using Gate Length Biasing (GLB) technique in a Vedic multiplier. The Gate Length Biasing Technique (GLB) is used to reduce the leakage power by increasing the channel length marginally which in turn increases the delay linearly. As the leakage power reduces a small amount of delay increases which can be ignored. Here Gate Length Biasing (GLB) technique is implemented on a standard cell i.e., NOR standard cell. Then the results are compared with GLB and without GLB. The standard cell with GLB is implemented on digital circuit for application purpose. The digital circuit in which the NOR standard cell is implemented is the 8x8 bit Vedic multiplier. The leakage power with Gate Length Biasing is found to be lesser than the leakage power without gate length biasing technique.Keywords
Gate Length Biasing Technique, Leakage Power, Standard Cell, Vedic Multiplier- Epileptic Seizure Prediction in EEG Records using Parallel Tree Based Learning and Feature Extraction
Authors
1 Bharathidasan University, Trichy – 620024, Tamilnadu, IN
2 Department of Computer Applications, Alagappa University, Karaikudi – 630003, Tamilnadu, IN