Articles


Receipt-Free Multi-Authority Voting system with (2,2) Secret Sharing Based Authentication

Ms. Ashwini Walake, Prof. Ms. Pallavi Chavan

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 02 (2015), 4 February 2015

Election and voting are the important activities in the democratic countries. The traditional voting system becomes inconvenient for the people who cannot visit the polling booth for the vote casting. To overcome the drawback of traditional voting system web based voting systems are introduced. Security is an important issue in the web based voting system. The proposed system provides secured  authentication through the visual secret sharing scheme.

Keywords: Secret Sharing, Visual cryptography, Shares, Authentication.

An Efficient Pseudonymous Authentication Scheme with Strong Privacy Preservation for Vehicular Communications

Mr.K. Kamal Kishore, M. Suvitha

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 02 (2015), 4 February 2015

Now a days people facing many problems because of traffic. To avoid this problem VANET is used here.In this group signature is used in VANETs to realized unauthorized authentication. In the existing system, group signatures is used and its suffers from long delay in the certificate revocation list (CRL) checking and process of signature verification, high message loss. In VANET in which roadside units (RSUs) are responsible for distributing group private keys and to managing vehicles in a localized manner. Then to avoid time consuming, hash message authentication (HMAC) is used here. The proposed work of this project is trinary partitioned black-burst-based broadcast protocol(3P3B) consists of two primary mechanisms. First, a mini distributed interframe space (DIFS) in a medium access control (MAC) sublayer is used to give higher access priority to the time critical emergency message as a higher priority and to communication channel compared with other messages. Second, a trinary is designed to iteratively partition the communication range into small sectors. In 3P3B outperforms benchmarks of the existing broadcast protocols in VANETs in terms of the packet delivery ratio, average message speed, message progress and communication delay.

Index terms—Batch group signature, cooperation, hash message authentication code (HMAC), 3P3B, emergency message(EM)

Assessment of Regulatory Compliances in Diagnostic X-ray Facilities in Tangail District, Bangladesh

S Shill, QMR Nizam, M Haider

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 02 (2015), 4 February 2015

Due to increasing public demand, diagnostic x-ray facilities are expanding from the city to district even at rural areas faster than ever before in Bangladesh. At the same time radiological safety issues are also becoming the matter of great concern in this area of medical sector. In the present study, a comprehensive investigation is carried out on radiological safety matters in the 34 diagnostic x-ray facilities at Tangail districts in Bangladesh. The main objective of this study is to verify the compliance of regulatory requirements with respect to the radiation safety. The safety parameters are assessed emphasizing particularly on the room size, shielding material at entrance door and control panel and thickness of side walls of x-ray installations. It is very important to investigate the status of regulatory compliance requirements at the stage of designing of an x-ray room. It has been found that 62% facilities maintain the shielding properly and 26% have no shield at all against the radiation. Nearly acceptable room size was found only in the two facilities. Among the facilities few of them use old and non-calibrated x-ray machine. To some extent unexpected dose variation with room size is also observed. The present study on radiological safety status of diagnostic x-ray installations may be a reasonably good presentation of the situation in the country as a whole. The study can contribute significantly to the improvement of radiological safety in near future.

Keywords: Radiological safety, Compliance requirements, Shielding material, Safety parameters, Dose variation, Safety status.

Brain Controlled Robotic Vehicle

Sukrut Kishor Ubale, Siddharth Avinash Telang, Ranjeet Dargude

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 02 (2015), 4 February 2015

Independent mobility is core to being able to perform activities of daily living by oneself. A large number of people who are not comfortable with conventional interfaces, due to various machine dysfunctions, like wiring problems , control inefficiency ,etc. The non–invasive brain– computer interfaces (BCIs) offer a promising solution to these problems.The electrical activity of the brain can be monitored in real– time using an array of electrodes, which are placed on the scalp in a process known as Electroencephalography (EEG). In order to bypass the peripheral nervous system, we need to find some reliable correlates in the brain signals that can be mapped to the intention to perform specific actions. Our brain generates different types of signals, having their respective frequency and amplitude. We can control any device by decoding, processing these signals and digitalizing them, which may further be used as actuating commands. The EEG electrodes provide a medium to acquire the Brain Signals. These signals have very low frequency and amplitude (in  Hz and µV respectively). For signal conditioning, we design a series of high gain amplifiers and specific filters. We then digitalize the signal using ADC and transmit using XBEE transmitter. In the receiver section, a robotic vehicle converts the received signals into actuating commands.

Cyber-Science and Cyber Security

Dr Daruri Venugopal

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 02 (2015), 4 February 2015

In Cyber Science  cyber-security, any one can  evaluate whether there are underlying fundamental principles that would make it possible to adopt a more scientiï¬c approach, identify what is needed in creating a science of cyber-security, and recommend  speciï¬c ways in which scientiï¬c methods can be applied. Our study identiï¬ed several sub-ï¬elds of computer science that are speciï¬cally relevant and also provides some recommendations on further developing the Cyber science. 

 

 

Literature Survey on Establishing Wireless Sensor Networks Using Otway Rees Protocol

Delona James, Jintu J Babu, Sushitha Susan Joseph

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 02 (2015), 4 February 2015

Wireless sensor network has many application such as environment sensing, building safety monitoring, earthquake prediction etc. Security is critical issue in sensor networks. A fundamental security service is to establish pairwise key shared between two sensor nodes, which is basis of other security such as encryption and authentication. The prime problem in key management is to establish secure keys between the sensor nodes. To avoid this pairwise key establishment is used. This scheme consists of two key pools. One key pool is hashed value of keys in another key pool. With the one-way hash function, this scheme can make attackers get less key information from the compromised sensor nodes. Along with this Otway Rees protocol is used to provide integrity and authenticity. If direct path between two sensors are not present, then by using this protocol it is easy to find key with the help of intermediate node.

Keywords- wireless sensor networks; key management;hash function

Temperature Control in HVAC Application using PID and Self-Tuning Adaptive Controller

Swarup D. Ramteke, Bhagsen J. Parvat

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 02 (2015), 4 February 2015

Conventional Proportional Integral Derivative Controllers are used in many industrial applications due to their simplicity and robustness. The parameters of the various industrial processes are subjected to change due to change in the environment. These parameters may be categorized as steam, pressure, temperature of the industrial machinery in use. Various process control techniques are being developed to control these variables. In this paper, the temperature of a boiler is controlled using conventional PID controller and then optimized using Self-Tuning Adaptive controller. The comparative results show the better results when Self-Tuning Adaptive controller is used.

Keywords: HVAC, PID controller, Self-Tuning Adaptive controller-STC

Network Security and Cryptography

Dr. Daruri Venugopal

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 02 (2015), 4 February 2015

Network Security & Cryptography is a complicated and Historically only tackled by Well-trained and experienced experts.  How ever as more and more people become “wiredâ€, an increasing number of people need to understand the basics of security in a networked world. This research was written with the basic computer user and information system manager in mind, explaining the concepts needed to read through the hype in the marketplace.  The hackers and virus writers try to attack the internet and computers connected to the Internet.  The Network Security and Cryptography applications is rapidly becoming crucial to the development of the internet.  The open systems interconnection security architecture provides a systematic framework for defining security attacks, mechanisms, and services.

A New Digital Encryption Scheme: Sub areas Exchange Encryption Approach

N. Hanumantha Rao, A. Sri Nagesh, P. Rambabu, Dr. G.P. Saradhi Varma

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 02 (2015), 4 February 2015

In today’s data communication world info has become a lot of valuable; thence its security is very important and plays a vital role. To produce such security we tend to propose a brand new secret writing mechanism that operates on sixteen computer memory unit blocks of knowledge in 2 stages. Plaintext is split into variety of blocks and within the initial stage inner region swapping is finished on every block followed by key application. Second stages just will outer region swapping wherever 2 haphazardly designated blocks are changed for a few varieties of rounds. The essential advantage of this approach is, it uses straightforward operations and is straightforward to use, perceive and possible to design, evaluate and implement. Application and Data Security provided by this technique is also additionally high as all the operations are done supported randomness evoked by generated random values.

Keywords-- Cipher Text, Plain Text, Enciphering, Deciphering, Symmetric and Asymmetric key

Network Security Cryptographic Protocols and Lattice Problems

Dr Daruri Venugopal

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 02 (2015), 4 February 2015

We present a new protocol for electronic cash which is designed to function on hardware with limited computing power. The scheme has provable security properties and low computational requirements, but it still gives a fair amount of privacy. Another feature of the system is that there is no master secret that could be used for counterfeiting money if stolen.  We introduce the notion of hierarchical group signatures. This is a proper generalization of group signatures, which allows multiple group managers organized in a tree with the signers as leaves. For a signer that is a leaf of the sub tree of a group manager, the group manager learns which of its children that (perhaps indirectly) manages the signer.

Keywords: electronic cash; security properties; counterfeiting ; computational; hierarchical

NFC Enabled Smartphone Application for Mundane Activities

S Pavithra, Kayalvizhi Jayavel

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 02 (2015), 4 February 2015

People persistently attempt to enhance their personal satisfaction and advances, have an imperative part on it. Money transactions between mobile phones is exhausted and a troublesome operation to perform following there is not a straightforward and safe approach to do it. Near field communication (NFC) is another secure short range remote wireless connectivity technology, that can play an imperative part on this sort of issues, and it is not difficult to utilize. The NFC innovation can offer a vital commitment to rearrange some day by day operations, for example, payments and mobile transactions. NFC innovation is utilized with a basic motion that triggers a considerable measure of background operations. The paper concentrates on NFC innovation and proposes a distributed based application that exhibits the use of NFC and Bluetooth advances for money transactions between mobile phones and embedded device. The principle applications concentrating in our work is moment pay at nourishment court/shopping centers. A system will be proposed, assessed and exhibited in Android mobile phone with NFC implicit.

Behavior of Steel Fiber Reinforced Concrete for M-25 Grade

S.G. Jeurkar, K.S. Upase

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 02 (2015), 4 February 2015

It is now well established that one of the important properties of steel fibre reinforced concrete (SFRC) is its superior resistance to cracking and crack propagation. As a result of this ability to arrest cracks, fibre composites possess increased extensibility and tensile strength, both at first crack and at ultimate, particular under flexural loading; and the fibres are able to hold the matrix together even after extensive cracking. The net result of all these is to impart to the fibre composite pronounced post – cracking ductility which is unheard of in ordinary concrete.

In this paper, the mechanic properties i.e. Compressive, Flexural and split tensile strength of SFRC are discussed.

Keywords: Steel fiber, concrete, properties, crack.

Design 24x7 Water supply scheme for Tarabai Park E.S.R. Zone

G.B. Birajdar, R.A. Panke

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 02 (2015), 4 February 2015

This paper deals with details study of design of 24 x 7 water supply scheme.Water is most vital resource for life and is consider as essence of life, in our plant earth 97% of water lies in oceans, 2% is frozen ice state and remaining 1% is fresh water. History of human civilization reveals us that water supply and civilization are almost synonymous.

Therefore, in order to ensure the availability of sufficient quantity of good quality water if become almost imperative in a modern society, to plan and build suitable water supply schemes. The provision of such a scheme shall ensure a constant ad a reliable water supply to that section of people for which it has been designed. The existence of such a water supply scheme supply scheme shall further help in attracting industries and thereby helping in industrialization and modernization of society such schemes shall, therefore, help in promoting wealth and welfare of the entire humanity as a whole.

Basic requirements 24 x 7 water supply scheme are availability water at source metered water supply water tariffs, Adequacy of systems for design demands preventive maintenance control.

From different case studies it is revealed that, by reducing unaccounted for water, 100% metering commotions, effective design O & M and by increasing public awareness regarding water conservation, the intermittent type of water supply scheme can be converted from intermittent to 24 x 7 water supply scheme. 

Chemical By Azoxystrobin Against Moisisures Citrus Fruit Fight

Khaled ATTRASSI, Alain BADOC

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 02 (2015), 4 February 2015

The study of the effect of two culture media on the development of six fungal genera (Penicillium, Rhizopus, Aspergillus, Alternaria, Fusarium and Moniliella) isolated from two citrus (orange and dark orange clementine oranges) Conservation showed that media based on PDA medium apple and favor the development of these fungi. On PDA medium, the mycelial growth is 25 ° C maximum.

In vitro, azoxystrobin was more effective on mycelial growth. In vivo, reducing mold two important citrus were at 4 ° C and 25 ° C average except for Aspergillus and Moniliella.

Key-words: citrus fruits, fungi, mycelial growth, struggle with azoxystrobin

Optimum Hierarchical Modulations for OFDM Systems and Uplink Virtual MIMO Systems

V.S. Suresh Kumar, Dr. K. Ravi Kumar

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 02 (2015), 4 February 2015

A fast linear minimum mean sq. error (LMMSE) channel estimation methodology has been planned for Orthogonal Frequency Division Multiplexing (OFDM) systems as compared with the standard LMMSE channel estimation, numerical results show that the NMSE of the planned methodology is very close to that of the standard LMMSE methodology that\'s in addition verified by hypothesis. in addition, hypothesis shows that the performance of the planned methodology is type of identical thereupon of the standard LMMSE methodology in terms of bit error rate (BER).

In mobile worldwide ability for microwave access (WiMAX) or third Generation partnership project long evolution (3GPP-LTE), transmission virtual multiple input multiple output (MIMO) technology is adopted to perform abstraction  multiple access with two movable subscriber stations (PSSs), where each PSS has associate antenna. As two PSSs transmit at an equivalent time on identical orthogonal frequency division multiple access (OFDMA) resource blocks, the transmission capability square measure doubled.

Index Terms— Mobile TV, turbo code, Frequency-Division Multiplexing Access  pilot signal , broadcast cellular system. 

A Review on Privacy Preserving Data Mining

Jyoti, Divya Rana

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 02 (2015), 4 February 2015

Most data mining applications operate under the assumption that all the data is available at a single central repository, called a data warehouse. This poses a huge privacy problem because violating only a single repository’s security exposes all the data. Although people might trust some entities with some of their data, they don’t trust anyone with all their data. With the extensive amount of data stored in

databases and other repositories it is very important to develop a powerful and effective mean for analysis and interpretation of such data for extracting the interesting and useful knowledge that could help in decision making. Data mining is such a technique which extracts the useful information from the large

repositories. Knowledge discovery in database (KDD) is another name of data mining. Privacy preserving data mining techniques are introduced with the aim of extract the relevant knowledge from the large amount of data while protecting the sensible information at the same time. In this paper we review on the various privacy preserving data mining techniques like data modification and secure multiparty computation based on the different aspects. We also analyze the comparative study of all

Techniques followed by the future research work

Length-weight relationship and condition of Mystus cavasius (Hamilton) from lower Indus River at Thatta District, Sindh, Southern Pakistan

Anila Naz Soomro1,Wazir Ali Baloch1, Zulfiqar Ali Laghari3, Zameer ali Palh1, Khalid Hussain Lashar1, Ghulam Murtaza Mastoi4 , Shagufta Saddozai2

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 02 (2015), 4 February 2015

Mystus cavasius a Bagirid catfish is one of the commercially important fish. Paper presents the first report on any biological aspect of this important catfish. Studies on Length-weight relationship and condition factor of M. cavasius at downstream of Indus River near Thatta District were carried out from March to July 2013. A total of 391 specimens including 177 male and 214 female were used for the study. The total length of male population ranged between 7.5 to 18.5 cm and in female population ranged 7.8 to 23.5 cm. The female population dominated over the male in the number, and it also attains larger size than male. The exponent b values of male, female and combined population were calculated as 2.51, 2.57 and 2.54 respectively, that indicate the negative allometric growth. This research reports the first study on Length-weight relationship of M. cavasius from Indus River.

Keywords: Mystus cavasius, Catfish, Length-weight relationship, condition factor, Indus River.

A Survey on Spectrum Sensing Techniques for Cognitive Radio Networks

Akshatha Preeth P, Dr. Sunil Kumar S Manvi

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 02 (2015), 4 February 2015

Cognitive Radio has derived the attention of researchers for the simple reason of optimum utilization of available spectrum of wireless communication in the recent scenario. The spectrum sensing problem has gained new aspects with cognitive radio and opportunistic spectrum access concepts. It is one of the most challenging issues in cognitive radio systems. In this paper, a survey of spectrum sensing methodologies for cognitive radio is presented. Various aspects of spectrum sensing problem are studied from a cognitive radio perspective and challenges associated with spectrum sensing are given and enabling spectrum sensing methods are reviewed and  most common spectrum sensing techniques in the cognitive radio literature are explained.

Keywords:-Cognitive radio, cognitive, radio networks, spectrum sensing, energy detection, matched filter, cooperative sensing

A Study on Consumer buying behaviour of Cosmetic Product in Jaffna District

Mr. E. Ratnam

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 02 (2015), 4 February 2015

The consumer buying behaviour of cosmetic product in Jaffna District was analyzed through the conceptualization by using the concepts of 4Ps includes product, price, place and promotion, and also External Stimuli of cultural, social, personal and psychological factor. In this research, 200 respondents were selected from users of cosmetic products to analyze the consumer buying behaviour of cosmetic products. This project would identify the marketing mix status of the cosmetic product and External Stimuli of the product in Jaffna District. There are many DS division in Jaffna district such as Delft(Delft), Islands north (Kayts), Islands South (Velanai), Jaffna, Karainakar, Nallur, Thenmarachi (Chavakacheri), Vadamarachi East(Maruthankerny), Vadamarachi North(Point Pedro), Vadamarachi South west(Karavedy), Valikamam East(Kopay), Valikamam North(Tellippalai), Valikamam South(Uduvil), Valikamam Southwest (Sandilipay), Valikamam West(Chanakanai), but the majority of the Cosmetic users are obtain in Kopay and Nallur. I have selected Jaffna, Nallur, Kopay, Uduvil, Sandilipay, Chankanai and Karainakar where all type of users of cosmetic product. This study on consumer buying behaviour tends to expose the status of the cosmetic users characteristics and marketing present condition. The recommendations of the project would also be given the awareness to cosmetic users and marketers to guide them in their future activities.

Keywords: buying behavior, cosmetic products, 4Ps and External Stimuli.

Web Operating System

Jo S Chirakadavil, Muhammed Haffis V H, Deepa Merin Jose

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 02 (2015), 4 February 2015

Web based operating system consists of some improved set of applications needed for the future enhancement. We aim on the current attention towards the web operating systems. As we know that the existing operating systems has some limitations, we have improved those with some additional facilities in our Web operating system. Although, this gains attention from the people who directly are involved in the field of internet OS. Many additional applications have been added with extra means of improvement.

Classification of Clustering with Frequent item-sets

Z.Sunitha Bai, D.R.N.Sravana Lakshmi

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 02 (2015), 4 February 2015

Data mining is having techniques like clustering, classification and algorithm like frequent itemset mining algorithms. In this we discuss about clustering and classification techniques with its applications and frequent itemset mining algorithm with its applications.

Cluster is the process for set of objects in cluster that objects are nearer to the center of cluster and far to other cluster and clustering is used to place the data elements into groups. Classification is the collection of records as training set and each record is having attributes. Frequent itemset algorithms are used for mining the frequent items of the transactions of the databases.

Index Terms— Data Mining, Clustering, Classification, Frequent itemset mining, Data Mining Applications.

Improved Technique by Integrating AHP-TOPSIS for Prioritization

Anitha M, Mrs. Sathiya

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 02 (2015), 4 February 2015

Requirements prioritization is used to minimize risk during development of the software project, so that the most important requirements are implemented first. There are many prioritization techniques are available to prioritize the requirements, but  the problem relies on choosing an appropriate technique that are suitable for people to prioritize medium to large numbers of requirements. Value Based Requirement Prioritization (VBRP) is one of the most widely used technique in the industry since it yields an accurate result and requires less sum of instance. To execute VBRP, the method of arrange Preference by Similarity to Ideal Solution (TOPSIS) is used as a framework. The project may contain hundreds or even thousands of requirements. Generally, all the requirements do not contain equal user satisfaction. The requirement prioritization is the process of managing the relative importance and urgency of different requirement based on the multi-criteria decision making method. In this project multi-criteria decision making techniques through the integration of Real-code population –based incremental learning (RPBIL) algorithm with AHP and TOPSIS. In which the weights of each criteria are calculated by analytical hierarchical process (AHP) and the final ranking is achieved by Technique For Order Preference By Similarity To An Ideal Solution (TOPSIS)