A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Vijayakumar, P.
- N Level Unicode Position Character Length Cipher for Securing Smart Card
Authors
1 Department of EEE, Karpagam College of Engineering, Coimbatore, IN
2 Department of IT, Velalar College of Engineering and Technology, Erode, IN
3 Sri Sivasubramaniya Nadar College of Engineering, Chennai, IN
4 Velalar College of Engineering and Technology, Erode, IN
5 Velalar College of Engineering and Technology, Erode, ID
Source
Networking and Communication Engineering, Vol 2, No 7 (2010), Pagination: 153-158Abstract
In day to day life, Smart card plays an important role. Open your wallet! See at least 20 to 25 cards in it. Wondering?? Today, the world is fully in the hands of smart cards since it is easy to carry and even if it is stolen, it is secure. But due to the increase in hackers today, Smart cards are becoming insecure now. Even the Encrypted PIN can be easily stolen by the cryptanalysts. So it is time now to secure the Smart card. In our previous paper [1], we have considered all the vulnerabilities of the Smart card and have provided various ways to overcome it. Still we feel that my algorithm is suffering from forgery attack. In this paper, we have applied a new encryption and a new hash algorithm to keep the information secure in Smart cards and to overcome forgery attack. The main advantage of this paper is, on an average, even the supercomputer will take 101084 years to decrypt, which is 42.2% higher than the previous proposals.
Keywords
Cryptographic Algorithms, Low Cost Smart Cards, Smart Cards, Brand New Hash.- Renewable Energy System Optimization of Two Different Locations
Authors
1 Electrical and Electronics from the Karpagam University, Coimbatore, IN
2 Kathir College of Engineering, Coimbatore, IN
Source
Automation and Autonomous Systems, Vol 5, No 2 (2013), Pagination: 47-50Abstract
The quick reduction of fossil fuel resources and natural concerns has given attentiveness on generation of renewable energy resources. Among the various renewable resources, hybrid solar and wind energy seems to be hopeful solutions to provide reliable power supply with improved system effectiveness and reduced storage requirements. The decentralized hybrid system based on renewable energy system with back up generation improves system reliability. The paper proposes optimum planning of Hybrid Renewable Electric System for daily load demand of two different locations with HOMER. The HOMER (Hybrid Optimization Model for Electric Renewable), developed by the National Renewable Energy Laboratory (NREL) which is the renewable energy based optimization tool for stand-alone hybrid electric renewable energy system. The model can analyze all the available power technologies individually and in hybrid configurations to identify least-cost solutions to energy requirements. The hybrid of solar, wind, generator and battery as back-up is the basis of estimation. The hybrid system also reduces the Co2 emission from the fuel based generation system. The system configuration of the hybrid is derived based on a household load at two different locations in India, to find the optimum combination and sizing of components.Keywords
Renewable Energy System, Modeling, Hybrid System, HOMER, Optimization.- VANET and its Security Aspects: A Review
Authors
1 School of Electronics Engineering ,VIT University, Chennai Campus, Chennai – 600127, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 44 (2016), Pagination:Abstract
Objectives: This paper reviews research on various routing protocols used in Vehicular Adhoc Network (VANET), with the aim to 1. examine the newly emerged routing strategies, 2. to identify the security aspect of these routing strategies, 3. to explore security importance to users and 4. to investigate the research direction for security in VANET. Methods/Statistical Analysis: This paper focuses on two major aspects which includes literature survey and review along with a conceptual analysis of VANET security aspects. For this 20 security in VANET related papers have compared and analyzed along with some basic paper on VANET and routing to provide security in vehicular adhoc network. Findings: The survey of this paper indicates that the security aspect for VANET secured communication requires successful accomplishment of all aspects. However, the recent survey concludes that there is still further scope for research in security aspects like integrity, non-repudiation, availability. Application/Improvements: This study (review) tries to suggest that understanding the approach of routing and will help to implement a better intelligent transport system with security.Keywords
Routing Protocol, Security Study, Vehicular Adhoc Network.- Real-Time Ambience Sensing and Image Authentication using Internet of Things (IOT) in a Fleet Tracking System
Authors
1 Department of ECE, SRM University, Kattankulathur - 603203, Chennai, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 33 (2016), Pagination:Abstract
Background/Objectives: To create a comprehensive fleet tracking system using Internet Of Things (IOT). A fleet tracking system generally provides information on the route that is being used by the vehicle. Other general information like source, destination and driver information can be fed into the system beforehand. Methods/Statistical Analysis: For Intelligent Transportation System (ITS) applications, it becomes necessary to provide several real-time data such as temperature, pressure and humidity to ensure that the transported perishable goods are in good condition. In this paper, the parameters are monitored using a Raspberry-pi and a Sense Hat. Findings: This paper also aims to provide a security feature that can identify authorised personnel who can get access to the transported goods, using Raspberry pi and a Raspberry pi Camera with night vision to provide the real-time information and security alerts using image processing technology. These data are then fed to a server to provide access to drivers, administrators, vendors and management teams for efficient handling of the services. Applications/Improvements: With the boom in online shopping sector and an increase in demand in the freight transportation services, a security feature that can identify authorised personnel can go a long way in improving security.Keywords
IoT, ITS, Raspberry pi, Sense Hat- Hybrid Classifier based Content based Image Retrieval
Authors
1 ECE Department, SRM University, Chennai – 600001, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 46 (2016), Pagination:Abstract
Objectives: Nowadays, the capacity of digital image information is rapidly surging. The computational complexity of retrieving images from database also increases. Methods/Statistical Analysis: Texture and colour are the most important components of visual information which can be used effectively to reduce the complexity. This paper presents Content- Based Image Retrieval System (CBIR) based on texture and colour similarity. The RGB colour space and the colour histogram are used as the colour feature of each image. The texture of each image is obtained by applying gray level co-occurrence matrix. Findings: Based on the similarity between image features CBIR methods retrieve images accurately from the image database. But the traditional system will work well only for the data set which has more dissimilarity. In this study, based on combining the Gaussian Mixture Model (GMM) with k-means clustering algorithm, a new hybrid algorithm for clustering is proposed. A one to one matching scheme is used to compare the query and target image on the basis of all the features extracted. This hybrid Gaussian mixture model will provide more accurate retrieval in the case of the dissimilarity between the image data set is very low. The proposed system is capable of working fewer dissimilarity data set as well more dissimilarity data. Applications/Improvements: The proposed hybrid retrieval method provide more accurate retrieval with the precision measures of 98% and also more robustness with retrieval of 95%.Keywords
Content-Based Image Retrieval (CBIR), Co-occurrence Matrix, Expectation-Maximization (EM) Algorithm, Feature Extraction, Gaussian Mixture Model (GMM), K-Means Clustering Algorithm.- Reconfigurable Filter Bank Multicarrier Modulation for Cognitive Radio Spectrum Sharing - A SDR Implementation
Authors
1 ECE Department, SRM University, Chennai - 603203, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 6 (2016), Pagination:Abstract
Background/Objectives: Cognitive radio is used as promising technologies for dynamic spectrum access and optimization of wireless resources. Under dynamic spectrum access to provide the ability of working any band of frequency based on need, the reconfigurable cognitive radio is designed. Methods/Statistical Analysis: Multicarrier modulation is the feasible method to share the spectrum without interference. OFDM is one of the efficient multicarrier techniques available for the system design. One of the problems in OFDM for spectral sharing is the side band leakage that will inject interference from secondary radio sub carrier to primary radio sub carrier. To avoid this, in this work a Filter Bank based Multi Carrier (FBMC) modulation is used. Findings: Few simulation works are reported for the interference free spectrum sharing by using FBMC. But this work analyzes the real time practical implementation of the interference free dynamic spectrum sharing. Reconfigurable is another important aspect of the implementation which is provided by the Kintex 7 FPGA implementation of the reconfigurable filter bank multicarrier modulation using NI USRP 2943R SDR platform. This FBMC based Transceiver is implemented by using fast Xilink IP cores of FFT and systolic array based FIR filter IP core. The transceiver is realized to produce output for every clock after a fixed latency 240 clocks or 6 microsecond for 40Mz clock rate. This performance is achieved using single clock loop architecture of LABVIEW FPGA tool and the parallel, pipelined architecture realization of IP cores and other building blocks. Applications/Improvements: Experimental study shows that the BER of primary user for the implemented system is better than the OFDM system by the factor of 10-1.Keywords
Cognitive Radio, Dynamic Spectrum Sharing, Multi Carrier Modulation, OFDM Reconfigurable, SDR- A Hybrid Multilevel Security Scheme using DNA Computing based Color Code and Elliptic Curve Cryptography
Authors
1 School of Electronics Engineeirng, VIT University Chennai – 600048, Tamil Nadu, IN
2 ECE, GKM College of Engineering and Technology, Chennai - 600 063, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 10 (2016), Pagination:Abstract
Background/Objectives: The terrorism threat caused by terrorist who posses forged passport and identities due to insecure environment which could be more serious imminent. Traditional scheme and techniques available to protect the information from unauthorized user is not enough for the current environment. Methods/Statistical analysis: So, a hybrid multilevel DNA computing based Color Code Cryptographic scheme combined with Elliptic Curve Cryptography is proposed to protect the passport data from the eavesdropper. Proposed data encryption algorithm consists of two level of security, first level of security is provided by convert the personal details (plaintext) of the customer into Unicode and RGB color code, and then map the color code with DNA nucleotide. The mapped DNA molecules converted into ASCII values for encryption process. DNA molecules help to store enormous amount of data intended to allow more number of user to access the system. Second level of security is provided by encrypt the ASCII values using Elliptic Curve Cryptography techniques which require very less key size compared with traditional schemes. Resultant ciphertext is hidden in the personal image of the customer using LSB steganographic method. Findings: Compared with traditional scheme, proposed scheme provides multilevel of security with less communication and computational overhead due to its lesser key size. ECC-80 bit key size based encryption scheme provides same level of security as RSA-1024 scheme with less number of operations involved in the passport verification system. Applications/Improvements: Since the proposed scheme require very less key size, consumes very less power, it will be more suitable for power constrained devices such as smart card, sensors, mobile phones, PDA's, RFID tags, etc.,
Keywords
ASCII Values, Color Code Cryptography, DNA Cryptography, Elliptic Curve Cryptography, Steganography, Unicode- Text Mining Preprocessing Techniques and its Significance based on the Dataset
Authors
1 Department of Computer Applications Velalar College of Engineering and Technology, Erode, Tamilnadu, IN
Source
Fuzzy Systems, Vol 12, No 1 (2020), Pagination: 13-15Abstract
Social Network can be termed as a network of social interactions and personal relationships. The most popular social networks include Facebook, Google+ and Twitter. The content shared in such networks is usually unstructured text. Nowadays, various algorithms are being generated and analyzed to understand and extract meaningful inferences from such unstructured data. In this survey, we have the tendency to review the text mining techniques and analyze combination of those techniques to get varied textual patterns from the social networking sites. Here are some of the techniques used in preprocessing.