......

..

IJCTA-Volume 8 Issue 1 / January-February 2017
S.No
Title/Author Name
Page No
1
Crypto Watermarking for Secure and Robust Transmission of Multispectral Images
-P.Sridhar,R.R.Sathiya
Abstract
An ownership protection of Multispectral images is the leading problem due to insecure channel as data is in spatial domain. The aim of this paper is to provide watermarking-crypto strategy in multispectral images where watermarking is used to preserve the monochrome image and crypto protocol provides ownership protection of multispectral images during transmission through insecure medium. This proposed method combines watermarking based on Arnold transform which creates meaningless image of monochrome image embedded into three level DWT of multispectral image and utilizes modulus-shifting algorithm crypto protocol on multispectral image. It is observed that the proposed scheme increases the security, confidentiality and integrity of multispectral image.
Index-terms - Multispectral images, monochrome image, and discrete wavelet transform, Arnold transform
01-11
PDF
2
Achieving Weighted Fairness in Distributed Systems Using Focal Point Theorem
-Shaon Paul,Uttiya Paul
Abstract
Optimized resource allocation in distributed systems is well investigated. The inherent selfish nature of the users of a distributed LAN system results in conflict of interest among them. Thus, the situation (states of the nature) and the associated consequences can be easily modelled under non-cooperative game theoretic framework. In this paper, we model the resource utilization problem in distributed systems as a game theory problem. It has been found and showed that the number of best strategy profiles (i.e. the Nash Equilibrium) for this non-cooperative game is infinite. Therefore, canonical learning of the focal point theorem can be incorporated in this framework to obtain a unique solution.
Key words: Game Theory, WLAN
12-21
PDF
3
Robust Partial Face Recognition Using Histogram of Gradient and Minimum Distance Classifier
-Suganya S,Deebika R K
Abstract
Face Recognition is the technique to verify whether the entered input or image is exactly similar to the available images present in the databases. This technique comes under the Artificial Intelligence. Many existing technique with updation and also new technique is introduced day by day for face recognition. Different types of facial recognition techniques are finding faces in images with controlled background and finding faces by colour, motion in unconstrained scenes etc. Each and every approach has its different techniques and Subsequently various algorithms are also exist which gives us result based as per our expectation. In existing system a robust point set matching (RPSM) method used for partial face recognition, it discriminatively match these two especially some unconstrained environments, human faces might be occluded by other objects and it is difficult to obtain fully holistic face images for recognition, To address this problem, this paper proposed a scheme implementing Partial face recognition approach by using Viola Jones method, Histogram of Gradient features (HOG) and Minimum Distance Classifier (MDC). The advantage of this algorithm is, it can process partial or incomplete faces also, even if the given input is partially occluded.
22-30
PDF
4
An Efficient Enhancement to Selection Sort
-Mirza Abdulla
Abstract
In this paper we present an efficient selection sort algorithm which is obtained by a series of simple search enhancement of the classical selection sort technique. The idea is to restrict the search only to items where it is more likely to find the minimum from, and the smaller the set the faster the algorithm will run. We obtain 0(n1+1/k) , for constant K>0, worst case time bounds. We show how to improve this bound to 0(n(logn)2) with minor modification, and also explain how to obtain optimal upper bounds.
31-42
PDF
5
Automatic Railway Track Routing using Embedded System
-V.R.Prasad,G.M.Phade
Abstract
Routing of trains on a specified platform at a busiest railway station manually is time consuming processes.Accidents caused due to railway crossing bypassengers near platform is also a big problem in India. This paper proposes a new technique by which automatic routing of train on specified platform with simultaneous shielding of whole platform, that will restrict crossing railway tracks by passengers, when train is arriving on platform. The proposed system consist of ARM7 processor with MODBUS protocol, and Ethernet protocol which is used for communication between all devices and computer monitor, used for supervision purpose. The proposed system will solve manually routing of railway tracks, that will rout train on specified platform. Automatic shield will restrict passengers from crossing tracks when train is arriving, it will avoid delay of train and accidents caused due to overcrowds.
Keywords- Microcontroller,MODBUS Protocol,Ethernet Protoco
43-46
PDF
6
Channel Assignment and Deadline Driven Requests with Flexible Transmission Rates in Hybrid Optical Wireless Mesh Networks
-Shreenidhi.P.L,Puttamadappa.C
Abstract
Wireless mesh networks are considered in the category of wireless ad-hoc network. This type of networks i.e. wireless mesh networks are configured in a specific structure which provides flexibility in deployment of the wireless mesh networks. Moreover, this flexibility in network configuration helps to obtain a cost effective and dynamic solution for the mesh network based wireless communication in a particular geographical area where the network is deployed. In today’s communication scenario, demand of multi-media applications has noticed a drastic increment. These multimedia applications such as video streaming, voice streaming or Voice over IP demands for higher bandwidth which improves the overall quality of wireless communication in terms of end-to-end throughput. The main advantage of higher throughput in WMN is used for providing support to other users which are running different applications. Moreover, Wireless mesh networks are capable to improve the performance and these networks don’t affect the current topology of the network i.e. without changing the current communication topology, performance can be improved by using wireless mesh networks.
47-59
PDF
7
Game On: An Android Application For E-sports
-Romil Shah,Lokesh Shanbhag,Saurabh Raval,Prof. Nasim Shah
Abstract
Android is the widely used operating system which is open source and used in most of mobile devices and tablets. The proposed system mainly focuses on connecting various cyber athletes and e-sports players under one roof. The proposed system also provides unique platform for gaming cafes to advertise themselves and create awareness about the growth of the e-sports industry in India. Gaming Cafe can register on the proposed application to get facilities like online booking, online login and remote access to the server pc using application. The players can register on the app and can find the nearby gaming cafes and can see the schedule of the respective gaming cafe. It also provides the latest news related to ongoing and upcoming tournaments related to e-sports.
Keywords— e-sports; gaming cafe; cyber athletes; news; online booking; tournaments; remote access
60-63
PDF
8
Classification based Conjunctive Query generator For Mining Uncertain Data
-M.Kalavathi,Dr.P.Suresh
Abstract
Mining uncertain data is a major concern in data management due to the indefinite nature of the data. To evaluate the more specific conjunctive queries containing stable equation and additional optimizations techniques. Dynamic programming algorithm classifies extraction of IQ queries but fails to compute responsibility for mixture of conjunctive queries. General optimal route query based on backward and forward search adapted to answer a variant of the optimal route queries but scalability issue arises on the optimal route query. Decision tree classifier on uncertain data comprises instability in CPU utilization. In order to overcome these issues in uncertain data mining, Classification based Conjunctive Query Generator (CCQG) is developed over a simple subclass of conjunctive queries. The proposed CCQG is processed with two phase. Initially, CCQG generates all frequent simple conjunctive queries. Consequently, first phaseperforms the candidate generation process, then collection of a simple conjunctive query used for computing responsibility of equalities among attributes.In second phase, self-assured classifier rules over frequent queries are generated with lesser CPU utilization. After that, each created simple conjunctive query calculates its hold up for pairing simple conjunctive queries in the uncertain data. For every generated simple conjunctive query, the support value is measured in the database. The self assured classifier rule generation is simply combining the already generated queries. Then the confidence value for each generated queries are measured to obtain the high confidence rules by reducing the candidate subsequence generation and improving the performance significantly. An experimental result shows that the CCQG improves the CPU utilization, execution time for generating the conjunctive queries and Scalability.
Keywords - Classification, Conjunctive Query Generator, self-assured classifier rule generation, support, confidence, CPU utilization, scalability.
64-81
PDF
9
Cell Phone Viruses and Security
-Pratiksha Kadam,Mahesh Bhosale
Abstract
As cell phones become a part and parcel of our life so do the threats imposed to them is also on the increase. Like the internet, cell phones are going online with the technologies like the GPRS etc. This online network of cell phones has exposed to the high risks caused by malwares viruses, worms and Trojans. The security threat caused by these malwares. The time would soon come that the hackers could infect mobile phones with malicious software that will delete any personal data also can run up a victims phone bill by making toll calls. All these can lead to overload in mobile networks, which can eventually lead them to crash and then the financial data stealing which poises risk factors for smart phones. As the mobile technology is comparatively new and still on the developing stages compared to that of internet technology, the anti virus companies along with the vendors of phones and mobile operating systems have intensified the research and development activities on this growing threat, with a more serious perspective.
Keywords- Symbian, pocketPC, payload, ratelimiting, GPRS, MMS
82-87
PDF
     
     
IJCTA © Copyrights 2015| All Rights Reserved.

This work is licensed under a Creative Commons Attribution 2.5 India License.