Pub Date : 2019-01-01DOI: 10.31838/ijccts/01.02.09
K. Srivastava, Avinash Tripathi, Anjnesh Kumar Tiwari
Secure Information exchange in a network of mobile and wireless nodes without any infrastructure support such networks are called as adhoc networks. A Mobile adhoc network (MANET) is multi-hop, mobile, infrastructure less wireless network which is capable of independent operation. In this paper we have been discussing some of the basic routing protocols in MANET like Destination Sequenced Distance Vector(DSDV), Dynamic Source Routing(DSR), Adhoc On Demand Distance Vector(AODV) and Zone Routing Protocol(ZRP). Security is one of the principal issue in MANETs as they are infrastructure-less and independent. Therefore, in manet having security needs, there must be two considerations kept in mind: one to make a data transmission. Our endeavour in this paper would focus on achieving the routing and secure data exchange. In this course, we have designed the Ad Hoc on Demand Routing Protocol (AODV) using asymmetric cryptographic algorithm such as RSA . Which is more efficient as well as we have implemented the security technique so that we can prevent the data loss at the time of transmission. KeywordsAdhoc network, key management, mobile adhoc network, routing protocol, security.
{"title":"Secure Data Transmission In AODV Routing Protocol ","authors":"K. Srivastava, Avinash Tripathi, Anjnesh Kumar Tiwari","doi":"10.31838/ijccts/01.02.09","DOIUrl":"https://doi.org/10.31838/ijccts/01.02.09","url":null,"abstract":"Secure Information exchange in a network of mobile and wireless nodes without any infrastructure support such networks are called as adhoc networks. A Mobile adhoc network (MANET) is multi-hop, mobile, infrastructure less wireless network which is capable of independent operation. In this paper we have been discussing some of the basic routing protocols in MANET like Destination Sequenced Distance Vector(DSDV), Dynamic Source Routing(DSR), Adhoc On Demand Distance Vector(AODV) and Zone Routing Protocol(ZRP). Security is one of the principal issue in MANETs as they are infrastructure-less and independent. Therefore, in manet having security needs, there must be two considerations kept in mind: one to make a data transmission. Our endeavour in this paper would focus on achieving the routing and secure data exchange. In this course, we have designed the Ad Hoc on Demand Routing Protocol (AODV) using asymmetric cryptographic algorithm such as RSA . Which is more efficient as well as we have implemented the security technique so that we can prevent the data loss at the time of transmission. KeywordsAdhoc network, key management, mobile adhoc network, routing protocol, security.","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128531141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.31838/ijccts/05.01.05
Gowshika
LPG is used all over the world even in villages. Because of its versatile nature it is used as a fuel for domestic, industrial, automobile and other purposes. But its security has become a major issue. Constant vigilance is required for the LPG and is done by using Internet of Things (IOT). This design of wireless LPG monitoring system is proposed for home safety. This system detects the status of the regulator and sends notification to the consumer through Wi-Fi module. The user can also switch OFF the LPG regulator if necessary through the android app from any place using the mobile phone. The additional advantage of the system is that it automatically switches off the LPG regulator at the time set by the consumer around. This system ensures safety and prevents explosion due to unnecessary open of regulator. The system is real time, economical, commercial and cost efficient.
{"title":"Smart LPG Monitoring and Controlling System ","authors":"Gowshika","doi":"10.31838/ijccts/05.01.05","DOIUrl":"https://doi.org/10.31838/ijccts/05.01.05","url":null,"abstract":"LPG is used all over the world even in villages. Because of its versatile nature it is used as a fuel for domestic, industrial, automobile and other purposes. But its security has become a major issue. Constant vigilance is required for the LPG and is done by using Internet of Things (IOT). This design of wireless LPG monitoring system is proposed for home safety. This system detects the status of the regulator and sends notification to the consumer through Wi-Fi module. The user can also switch OFF the LPG regulator if necessary through the android app from any place using the mobile phone. The additional advantage of the system is that it automatically switches off the LPG regulator at the time set by the consumer around. This system ensures safety and prevents explosion due to unnecessary open of regulator. The system is real time, economical, commercial and cost efficient.","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125913933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.31838/ijccts/07.sp01.09
S. Jegandiravianath, A. Ajith, S. DharaniramT, M. Gokulnath, T. Balaji
The main objective of the project is to monitor and control the components that are being carried over the belt conveyers using PLC, SCADA and Android Mobile Application. The conveyer is controlled through the PLC programming for its control processes. SCADA and MOBILE APPLICATION are used to monitor the completed component that is passed through the conveyer at any specified time. Power reduction and energy utilization is minimized using Efficient PLC Programming. The entire process is Monitored and Controlled remotely using SCADA. The Report generation for the Conveyer process is programmed in SCADA like Conveyer Cycle time, Conveyer Idle Time and these data can be automatically saved in the Excel Data format (Data Logging Process). The whole process can be controlled using the Android mobile application in which the conveyer is controlled wireless in a Particular region of the Industry. The controllable range of the conveyor using the mobile application can also be extended to a wide range (apart from the industry premises) using multiple LAN connections. Where older automated conveyor systems would use in PLC and SCADA.
{"title":"Monitoring and Control of Component Transfer and Packing through Conveyors Using PLC, SCADA and Mobile Application","authors":"S. Jegandiravianath, A. Ajith, S. DharaniramT, M. Gokulnath, T. Balaji","doi":"10.31838/ijccts/07.sp01.09","DOIUrl":"https://doi.org/10.31838/ijccts/07.sp01.09","url":null,"abstract":"The main objective of the project is to monitor and control the components that are being carried over the belt \u0000conveyers using PLC, SCADA and Android Mobile Application. The conveyer is controlled through the PLC \u0000programming for its control processes. SCADA and MOBILE APPLICATION are used to monitor the completed \u0000component that is passed through the conveyer at any specified time. Power reduction and energy utilization is \u0000minimized using Efficient PLC Programming. The entire process is Monitored and Controlled remotely using \u0000SCADA. The Report generation for the Conveyer process is programmed in SCADA like Conveyer Cycle time, \u0000Conveyer Idle Time and these data can be automatically saved in the Excel Data format (Data Logging Process). \u0000The whole process can be controlled using the Android mobile application in which the conveyer is controlled \u0000wireless in a Particular region of the Industry. The controllable range of the conveyor using the mobile application \u0000can also be extended to a wide range (apart from the industry premises) using multiple LAN connections. Where \u0000older automated conveyor systems would use in PLC and SCADA.","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128115972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.31838/ijccts/03.01.02
{"title":"Active Low Energy Outlay Routing Algorithm for Wireless Ad Hoc Network ","authors":"","doi":"10.31838/ijccts/03.01.02","DOIUrl":"https://doi.org/10.31838/ijccts/03.01.02","url":null,"abstract":"","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128187203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.31838/ijccts/02.01.04
{"title":"Analyzing Security of Single Sign on System through Advanced Encryption Standard ","authors":"","doi":"10.31838/ijccts/02.01.04","DOIUrl":"https://doi.org/10.31838/ijccts/02.01.04","url":null,"abstract":"","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"339 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134227423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.31838/ijccts/04.01.02
{"title":"A chaos based image encryption algorithm using Shimizu-Morioka system ","authors":"","doi":"10.31838/ijccts/04.01.02","DOIUrl":"https://doi.org/10.31838/ijccts/04.01.02","url":null,"abstract":"","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121758109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.31838/ijccts/01.02.04
Senthilkumar.M, Uma.S
Although the DCT-based image compression method using in the JPEG standard has been very successful in the several years, it still has some properties to improvement. A fundamental shift in the image compression approach came after the discrete wavelet transform (DWT) became popular, and it is adopted in the new JPEG 2000 standard So the digital information must be stored and retrieved in an efficient and effective manner, in order for it to be put to practical use. The Discrete Wavelet Transform (DWT) was based on time-scale representation. It provides efficient multi-resolution. DWT has been implemented by convolution method. For Such an implementation it requires a large number of computations and a large storage features that are not suitable for either high-speed or low-power applications. Hence the architecture for a high speed lifting based 3D (DWT) VLSI architecture is proposed. The lifting based DWT architecture has the advantage of lower computational complexities and also requires less memory. This lifting scheme has several advantages, including in-place computation of the DWT, integer-to-integer wavelet transform (IWT), symmetric forward and inverse transform. It uses a combination of 1D-DWT along with a set of memory buffers between the stages. The whole architecture was arranged in efficient way to speed up and achieve higher hardware utilization. It is desirable for high-speed VLSI applications. Keywords— Discrete Wavelet Transform, VLSI architecture, lifting, image compression, High-Speed.
{"title":"High Speed 3d DWT VlSI Architecture for Image Processing Using Lifting Based Wavelet Transform ","authors":"Senthilkumar.M, Uma.S","doi":"10.31838/ijccts/01.02.04","DOIUrl":"https://doi.org/10.31838/ijccts/01.02.04","url":null,"abstract":"Although the DCT-based image compression method using in the JPEG standard has been very successful in the several years, it still has some properties to improvement. A fundamental shift in the image compression approach came after the discrete wavelet transform (DWT) became popular, and it is adopted in the new JPEG 2000 standard So the digital information must be stored and retrieved in an efficient and effective manner, in order for it to be put to practical use. The Discrete Wavelet Transform (DWT) was based on time-scale representation. It provides efficient multi-resolution. DWT has been implemented by convolution method. For Such an implementation it requires a large number of computations and a large storage features that are not suitable for either high-speed or low-power applications. Hence the architecture for a high speed lifting based 3D (DWT) VLSI architecture is proposed. The lifting based DWT architecture has the advantage of lower computational complexities and also requires less memory. This lifting scheme has several advantages, including in-place computation of the DWT, integer-to-integer wavelet transform (IWT), symmetric forward and inverse transform. It uses a combination of 1D-DWT along with a set of memory buffers between the stages. The whole architecture was arranged in efficient way to speed up and achieve higher hardware utilization. It is desirable for high-speed VLSI applications. Keywords— Discrete Wavelet Transform, VLSI architecture, lifting, image compression, High-Speed.","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121378864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.31838/ijccts/01.01.06
M. Nithya
Network security has always been an important issue and its application is ready to perform powerful pattern matching to protect against virus attacks, spam and Trojan horses. However, attacks such as spam, spyware, worms, viruses, and phishing target the application layer rather than the network layer. Therefore, traditional firewalls no longer provide enough protection. However, the solutions in the literature for firewalls are not scalable, and they do not address the difficulty of an antivirus. The goal is to provide a systematic virus detection software solution for network security for computer systems. Instead of placing entire matching patterns on a chip, our solution is based on an antivirus processor that works as much of the filtering information as possible onto a reference memory. The infrequently accessing off-reference data to make the matching mechanism scalable to large pattern sets. In the first stage, the filtering engine can filter out more than 93.1% of data as safe, using a merged shift table. Only 6.9% or less of potentially unsafe data must be precisely checked in the second stage by the exact-matching engine from off-reference memory. In addition to that Dual port BITCAM processing program is used along with the Exact Matching Engine and Bloom Filter process. This Dual port BITCAM processes next to the exact matching engine and bloom filter process. This Dual port BITCAM process is placed exclusively for obtaining higher throughput. To reduce the memory gap and to improve the performance, we also propose three algorithms are used: 1) a skipping algorithm; 2) a cache method; and 3) a prefetching mechanism.
{"title":"ADVANCE VIRUS DETECTION USING COMBINED TECHNIQUES OF PATTERN MATCHING AND DYNAMIC INSTRUCTION SEQUENCES ","authors":"M. Nithya","doi":"10.31838/ijccts/01.01.06","DOIUrl":"https://doi.org/10.31838/ijccts/01.01.06","url":null,"abstract":"Network security has always been an important issue and its application is ready to perform powerful pattern matching to protect against virus attacks, spam and Trojan horses. However, attacks such as spam, spyware, worms, viruses, and phishing target the application layer rather than the network layer. Therefore, traditional firewalls no longer provide enough protection. However, the solutions in the literature for firewalls are not scalable, and they do not address the difficulty of an antivirus. The goal is to provide a systematic virus detection software solution for network security for computer systems. Instead of placing entire matching patterns on a chip, our solution is based on an antivirus processor that works as much of the filtering information as possible onto a reference memory. The infrequently accessing off-reference data to make the matching mechanism scalable to large pattern sets. In the first stage, the filtering engine can filter out more than 93.1% of data as safe, using a merged shift table. Only 6.9% or less of potentially unsafe data must be precisely checked in the second stage by the exact-matching engine from off-reference memory. In addition to that Dual port BITCAM processing program is used along with the Exact Matching Engine and Bloom Filter process. This Dual port BITCAM processes next to the exact matching engine and bloom filter process. This Dual port BITCAM process is placed exclusively for obtaining higher throughput. To reduce the memory gap and to improve the performance, we also propose three algorithms are used: 1) a skipping algorithm; 2) a cache method; and 3) a prefetching mechanism.","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129793150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.31838/ijccts/07.01.03
{"title":"Preterm birth prognostic prediction using Cross domain data fusion ","authors":"","doi":"10.31838/ijccts/07.01.03","DOIUrl":"https://doi.org/10.31838/ijccts/07.01.03","url":null,"abstract":"","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128955415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}