Pub Date : 2019-01-01DOI: 10.31838/ijccts/03.01.02
{"title":"Active Low Energy Outlay Routing Algorithm for Wireless Ad Hoc Network ","authors":"","doi":"10.31838/ijccts/03.01.02","DOIUrl":"https://doi.org/10.31838/ijccts/03.01.02","url":null,"abstract":"","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128187203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.31838/ijccts/07.sp01.09
S. Jegandiravianath, A. Ajith, S. DharaniramT, M. Gokulnath, T. Balaji
The main objective of the project is to monitor and control the components that are being carried over the belt conveyers using PLC, SCADA and Android Mobile Application. The conveyer is controlled through the PLC programming for its control processes. SCADA and MOBILE APPLICATION are used to monitor the completed component that is passed through the conveyer at any specified time. Power reduction and energy utilization is minimized using Efficient PLC Programming. The entire process is Monitored and Controlled remotely using SCADA. The Report generation for the Conveyer process is programmed in SCADA like Conveyer Cycle time, Conveyer Idle Time and these data can be automatically saved in the Excel Data format (Data Logging Process). The whole process can be controlled using the Android mobile application in which the conveyer is controlled wireless in a Particular region of the Industry. The controllable range of the conveyor using the mobile application can also be extended to a wide range (apart from the industry premises) using multiple LAN connections. Where older automated conveyor systems would use in PLC and SCADA.
{"title":"Monitoring and Control of Component Transfer and Packing through Conveyors Using PLC, SCADA and Mobile Application","authors":"S. Jegandiravianath, A. Ajith, S. DharaniramT, M. Gokulnath, T. Balaji","doi":"10.31838/ijccts/07.sp01.09","DOIUrl":"https://doi.org/10.31838/ijccts/07.sp01.09","url":null,"abstract":"The main objective of the project is to monitor and control the components that are being carried over the belt \u0000conveyers using PLC, SCADA and Android Mobile Application. The conveyer is controlled through the PLC \u0000programming for its control processes. SCADA and MOBILE APPLICATION are used to monitor the completed \u0000component that is passed through the conveyer at any specified time. Power reduction and energy utilization is \u0000minimized using Efficient PLC Programming. The entire process is Monitored and Controlled remotely using \u0000SCADA. The Report generation for the Conveyer process is programmed in SCADA like Conveyer Cycle time, \u0000Conveyer Idle Time and these data can be automatically saved in the Excel Data format (Data Logging Process). \u0000The whole process can be controlled using the Android mobile application in which the conveyer is controlled \u0000wireless in a Particular region of the Industry. The controllable range of the conveyor using the mobile application \u0000can also be extended to a wide range (apart from the industry premises) using multiple LAN connections. Where \u0000older automated conveyor systems would use in PLC and SCADA.","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128115972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.31838/ijccts/01.02.09
K. Srivastava, Avinash Tripathi, Anjnesh Kumar Tiwari
Secure Information exchange in a network of mobile and wireless nodes without any infrastructure support such networks are called as adhoc networks. A Mobile adhoc network (MANET) is multi-hop, mobile, infrastructure less wireless network which is capable of independent operation. In this paper we have been discussing some of the basic routing protocols in MANET like Destination Sequenced Distance Vector(DSDV), Dynamic Source Routing(DSR), Adhoc On Demand Distance Vector(AODV) and Zone Routing Protocol(ZRP). Security is one of the principal issue in MANETs as they are infrastructure-less and independent. Therefore, in manet having security needs, there must be two considerations kept in mind: one to make a data transmission. Our endeavour in this paper would focus on achieving the routing and secure data exchange. In this course, we have designed the Ad Hoc on Demand Routing Protocol (AODV) using asymmetric cryptographic algorithm such as RSA . Which is more efficient as well as we have implemented the security technique so that we can prevent the data loss at the time of transmission. KeywordsAdhoc network, key management, mobile adhoc network, routing protocol, security.
{"title":"Secure Data Transmission In AODV Routing Protocol ","authors":"K. Srivastava, Avinash Tripathi, Anjnesh Kumar Tiwari","doi":"10.31838/ijccts/01.02.09","DOIUrl":"https://doi.org/10.31838/ijccts/01.02.09","url":null,"abstract":"Secure Information exchange in a network of mobile and wireless nodes without any infrastructure support such networks are called as adhoc networks. A Mobile adhoc network (MANET) is multi-hop, mobile, infrastructure less wireless network which is capable of independent operation. In this paper we have been discussing some of the basic routing protocols in MANET like Destination Sequenced Distance Vector(DSDV), Dynamic Source Routing(DSR), Adhoc On Demand Distance Vector(AODV) and Zone Routing Protocol(ZRP). Security is one of the principal issue in MANETs as they are infrastructure-less and independent. Therefore, in manet having security needs, there must be two considerations kept in mind: one to make a data transmission. Our endeavour in this paper would focus on achieving the routing and secure data exchange. In this course, we have designed the Ad Hoc on Demand Routing Protocol (AODV) using asymmetric cryptographic algorithm such as RSA . Which is more efficient as well as we have implemented the security technique so that we can prevent the data loss at the time of transmission. KeywordsAdhoc network, key management, mobile adhoc network, routing protocol, security.","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128531141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.31838/ijccts/07.01.02
{"title":"An android application for exhibiting Statistical chronicle information ","authors":"","doi":"10.31838/ijccts/07.01.02","DOIUrl":"https://doi.org/10.31838/ijccts/07.01.02","url":null,"abstract":"","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127110606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.31838/ijccts/02.01.04
{"title":"Analyzing Security of Single Sign on System through Advanced Encryption Standard ","authors":"","doi":"10.31838/ijccts/02.01.04","DOIUrl":"https://doi.org/10.31838/ijccts/02.01.04","url":null,"abstract":"","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"339 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134227423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.31838/ijccts/02.02.11
{"title":"Wireless Data Routing with Security Keys ","authors":"","doi":"10.31838/ijccts/02.02.11","DOIUrl":"https://doi.org/10.31838/ijccts/02.02.11","url":null,"abstract":"","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128202942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.31838/ijccts/07.01.03
{"title":"Preterm birth prognostic prediction using Cross domain data fusion ","authors":"","doi":"10.31838/ijccts/07.01.03","DOIUrl":"https://doi.org/10.31838/ijccts/07.01.03","url":null,"abstract":"","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128955415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.31838/ijccts/01.02.04
Senthilkumar.M, Uma.S
Although the DCT-based image compression method using in the JPEG standard has been very successful in the several years, it still has some properties to improvement. A fundamental shift in the image compression approach came after the discrete wavelet transform (DWT) became popular, and it is adopted in the new JPEG 2000 standard So the digital information must be stored and retrieved in an efficient and effective manner, in order for it to be put to practical use. The Discrete Wavelet Transform (DWT) was based on time-scale representation. It provides efficient multi-resolution. DWT has been implemented by convolution method. For Such an implementation it requires a large number of computations and a large storage features that are not suitable for either high-speed or low-power applications. Hence the architecture for a high speed lifting based 3D (DWT) VLSI architecture is proposed. The lifting based DWT architecture has the advantage of lower computational complexities and also requires less memory. This lifting scheme has several advantages, including in-place computation of the DWT, integer-to-integer wavelet transform (IWT), symmetric forward and inverse transform. It uses a combination of 1D-DWT along with a set of memory buffers between the stages. The whole architecture was arranged in efficient way to speed up and achieve higher hardware utilization. It is desirable for high-speed VLSI applications. Keywords— Discrete Wavelet Transform, VLSI architecture, lifting, image compression, High-Speed.
{"title":"High Speed 3d DWT VlSI Architecture for Image Processing Using Lifting Based Wavelet Transform ","authors":"Senthilkumar.M, Uma.S","doi":"10.31838/ijccts/01.02.04","DOIUrl":"https://doi.org/10.31838/ijccts/01.02.04","url":null,"abstract":"Although the DCT-based image compression method using in the JPEG standard has been very successful in the several years, it still has some properties to improvement. A fundamental shift in the image compression approach came after the discrete wavelet transform (DWT) became popular, and it is adopted in the new JPEG 2000 standard So the digital information must be stored and retrieved in an efficient and effective manner, in order for it to be put to practical use. The Discrete Wavelet Transform (DWT) was based on time-scale representation. It provides efficient multi-resolution. DWT has been implemented by convolution method. For Such an implementation it requires a large number of computations and a large storage features that are not suitable for either high-speed or low-power applications. Hence the architecture for a high speed lifting based 3D (DWT) VLSI architecture is proposed. The lifting based DWT architecture has the advantage of lower computational complexities and also requires less memory. This lifting scheme has several advantages, including in-place computation of the DWT, integer-to-integer wavelet transform (IWT), symmetric forward and inverse transform. It uses a combination of 1D-DWT along with a set of memory buffers between the stages. The whole architecture was arranged in efficient way to speed up and achieve higher hardware utilization. It is desirable for high-speed VLSI applications. Keywords— Discrete Wavelet Transform, VLSI architecture, lifting, image compression, High-Speed.","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121378864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.31838/ijccts/04.01.02
{"title":"A chaos based image encryption algorithm using Shimizu-Morioka system ","authors":"","doi":"10.31838/ijccts/04.01.02","DOIUrl":"https://doi.org/10.31838/ijccts/04.01.02","url":null,"abstract":"","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121758109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.31838/ijccts/05.01.03
E.Sowmiya Dr.V.Chandrasekaran, Thindal, Erode
In these days, the application of Wireless Sensor Networks (WSNs) have been increased .Advance in microelectronic fabrication technology also reduces the manufacturing cost. Detecting node failures in Wireless Sensor Networks is very challenging because the network topology can be highly dynamic, the network may not always connected and the resources are limited . It becomes trend to deploy the large number of portable wireless sensors in Wireless Sensor Networks, in order to increase the Quality of Service (QoS). The QoS is mainly affected by the failure of sensor node .The sensor node failure increases with the increase in number of sensors in Wireless Sensor Networks. In order to maintain better QoS in such failure condition, Identifying and Detaching such faults are essential. In the proposed method the faulty sensor node is detected by measuring the Round Trip Delay (RTD) time of Discrete Round Trip paths and comparing them with threshold value. In proposed method, Scalability is verified by simulating the WSNs with large numbers of sensor nodes in NS2. The RTD time results derived in hardware and software implementation are almost equal, justifying the real time applicability of the investigated method.
{"title":"SENSOR NODE FAILURE DETECTION USING ROUND TRIP DELAY IN WIRELESS SENSOR NETWORK ","authors":"E.Sowmiya Dr.V.Chandrasekaran, Thindal, Erode","doi":"10.31838/ijccts/05.01.03","DOIUrl":"https://doi.org/10.31838/ijccts/05.01.03","url":null,"abstract":"In these days, the application of Wireless Sensor Networks (WSNs) have been increased .Advance in microelectronic fabrication technology also reduces the manufacturing cost. Detecting node failures in Wireless Sensor Networks is very challenging because the network topology can be highly dynamic, the network may not always connected and the resources are limited . It becomes trend to deploy the large number of portable wireless sensors in Wireless Sensor Networks, in order to increase the Quality of Service (QoS). The QoS is mainly affected by the failure of sensor node .The sensor node failure increases with the increase in number of sensors in Wireless Sensor Networks. In order to maintain better QoS in such failure condition, Identifying and Detaching such faults are essential. In the proposed method the faulty sensor node is detected by measuring the Round Trip Delay (RTD) time of Discrete Round Trip paths and comparing them with threshold value. In proposed method, Scalability is verified by simulating the WSNs with large numbers of sensor nodes in NS2. The RTD time results derived in hardware and software implementation are almost equal, justifying the real time applicability of the investigated method.","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123413274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}