IJSPR: Volume 10 Number 01
Latest News    IJSPR Volume 16, October 2015 Edition Published Successfully.         Call for Papers: November 2015    IJSPR Inviting Original Research Papers for Volume 17, November 2015 Edition.

IJSPR - Volume 10, Number 01

Published On : April 2015
SNo. Paper Title & Authors Page
1
Abstract: Networks are used in various fields. Network’s popularity has motivated the development of mobile Ad-Hoc networks (MANETs). A mobile Ad-Hoc network is a kind of decentralized wireless system which creates a fast changing network. The inherent characteristics of MANET such as wireless medium, highly dynamic topology, distributed cooperation, resource constrained capability, and limited physical security poses number of nontrivial security challenges to the network. Hence, enforcement of security through secure routing protocol becomes an extremely critical task Mobile Ad-Hoc network has various kinds of security concern problems, which are caused by their nature of collaborative and open systems and by limited availability of assets. There are various Routing protocols in Mobile Ad-Hoc network but the Ad-Hoc on demand distance vector (AODV) is most popular widely used as it has many attributes. In this paper, we propose a solution to the black hole attack in one of the most prominent routing algorithm, Ad-Hoc on demand distance vector (AODV) routing, for the MANETs. The proposed method uses promiscuous mode to detect malicious node (black hole) and propagates the information of malicious node to all the other nodes in the network. The simulation results show the efficacy of the proposed method as throughput of the network does not deteriorate in presence of the back holes.
Keywords:Component; formatting; style, styling.
1-6
2
Abstract: In this paper to shows the model of human presence sensing of pyrometric sensor. Security is main purpose of this system. This system used to secure human life, this system fixed on movable object. The sensor detect the IR radiations which is emitted by human body. It is the inputs of pryrometric sensor and it generate the high pulse and generate the high pulse at the output so that any object can be detected. The main advantage of this system is to be alert with the help of the object so that we can take the preventive action towards it.
Keywords:Pyrometric sensor, Scanning, Detector.
7-10
3
Abstract: Digital watermarking is an effective approach to afford copyright fortification. Watermark transparency is obligatory primarily for copyright protection. By using the characteristics of human visual structure, the just noticeable distortion (JND) can substantiate the transparency condition. This paper aims at developing a hybrid image watermarking technique which satisfies both imperceptibility and robustness requirements. To achieve objectives we used singular values of Transformation’s (DWT-DCT) sub bands to insert watermark. Further to increase and control the strength of the watermark, this work used an efficient JND model. An optimal watermark embedding method is developed to achieve minimum watermarking distortion. Experimental results are provided in terms of Peak signal to noise ratio (PSNR), Mean Squared Error (MSE), Correlation and Weighted Peak signal to noise ratio (WPSNR) to demonstrate the effectiveness of the proposed technique.
Keywords:Just Noticeable Distortion; Digital Watermarking; multi-scale embedding; Wavelet subspaces; Singular Value Decomposition; Discrete Wavelet transform; Discrete Cosine Transform.
11-20
4
Abstract: The watermarking process is performing arts of hiding a message related to a digital signal (i.e. an audio, video and image) within the signal itself. Watermarking applications are copyright control, broadcast monitoring and device control. The image authentications are classified into two types. They are signature-based and fragile watermarking schemes. Signature-based schemes are the host image which is applied to the hash function and hashed result is encoded using a public key cryptosystem to produce the output signature. The fragile-based scheme present watermark bits which are embedded into the host image in order to check the integrity and authenticity without the need to store additional data. The projected scheme is present a secure Semi-Fragile Watermarking for color images against geometric attacks. The color image transformation is done to HSV color space, suiting to the corresponding color band. Each color band channel is divided into 4×4 non-overlapping blocks and each 2×2 sub block is selected. The actions for color image watermarking are embedding, verification and recovery. The semi-fragile watermark distribution is done with a private key to have a secure mapping of blocks. This method handled subjective and objective Perceptron for watermark images and geometric attacks. The performance measure of proposed semi fragile watermarking on color images are done with following metrics are watermark image size, original image size, geometric transformation rate, PSNR of watermarked images and average mean square error rate.
Keywords:Semi-Fragile Watermark, Color Image Watermark, Geometric Attacks.
21-25
5
Abstract: Quality of construction materials as well as construction process directly influences strength, durability parameters and vulnerability of structure. IS 456 2000 regulates the quality as well as construction standards for construction materials (i.e. concrete, reinforcing steel, etc.) and construction process (i.e. shuttering of RC members, concreting, cover to reinforcement and curing of concrete).Ensuring desired strength of structural elements while construction, is very important step to make overall structure safe. Under gravity loading, normally structure becomes safe due to structural redundancy, safety factors and loading less than anticipated. Though structure may stand by overcoming all deficiencies, but earthquake exposes all errors in construction and may results in life-threatening damage to structure. Present work devoted to study the deficiencies in RC structure due to poor quality control and the evidence of failure from past earthquake studies. Comparative photos of some defects and failure due to similar deficiencies has been incorporated to visuals its importance. Quality control gives second chance to strengthen the weaknesses as well as correcting or repairing examined deficiencies. This is an effort to highlight importance of quality control during RC construction, deficiencies arises during construction and susceptibility towards failure.
Keywords:Durability parameters, Vulnerability of structure, Deficiencies.
26-30
6
Abstract: Problem Statement: Ergonomics is an important aspect in a manufacturing industry. The ergonomics factors play an important role in the effective running of a company, so these factors are to be seriously. High demand for products in the manufacturing sector had driven the operator to work and faster and adapt to their un-ergonomically workstation. Observation were made and recorded with respect to working postures practiced while performing the operator activities. Now, manufactures found that instead of investing lots of money on man, machine, material, method (4m), improving ergonomics of workplace is cost saving. Ergonomics found great need when customers demand is high and manufactures need more output within short period. To improve the productivity by reducing the back pain, shoulder injury, fatigue etc. Musculoskeletal disorders (MSDs) continue to be a tremendous burden in industry with back injury and shoulder disorders being among the most common and costly disorders because of not having proper workstation. The ergonomics problem will affect the worker in a negative way; this will leads to decrease in productivity, non-achievement of target value, etc.
Approach: This was conducted at a Rane Madras Pvt. Ltd, Mysore. The main objective of this study is to find out the ergonomics problem that is dominant in a sector and to give a suggestion to overcome this problem. So for considering this factor operator about the working condition provided by the industry needs proper arrangement such that their problems regarding the MSDs can be reduced and productivity will increase.
Keywords:Ergonomic Evaluation, Musculoskeletal Disorder, RULA, Workplace Layout, Reliability Checking, Flexible Workstation.
31-36
7
Abstract: The paper proposes a DC-DC converter dedicated for PMDC motor drive applications. Converter proposed is intended to aid in the speed control of the PMDC motor. PI controller is used for this purpose. The proposed converter ensures power conversion at high efficiency. This is attained by minimizing the switching losses. ZCS technique is applied here. Voltage stress are further reduced by using voltage divider circuits.
Keywords:Soft switching DC-DC converter, Zero Current Switching, PI controller. PMDC motor.
37-40
8
Abstract: This paper seeks to evaluate a careful analysis of various food chains prevailing in India with special focus in MP region. The analysis and comparison is based upon certain critical factors such as cost, quality, agility and responsiveness. After the careful analysis these measure helps to improve the various loopholes in the existing structure. The tool used is the surveying tool which includes various surveying methodologies, adopted such as cold canvassing, public reviews, questionnaire, personal one to one interview and the feedback from the end user to make the understanding of the problem even better.
Keywords:Akshay Patra, Food Chains, Performance analysis, sample size.
41-43
9
Abstract: Performance based seismal Engineering is that the fashionable approach to earthquake resistant style. It's associate degree experiment to predict the buildings with inevitable seismal performance. The main objective of study is to perform performance based analysis by that we will acquire performance levels of buildings for the long run earthquake & additionally perceive building’s collapse mechanism just in case of in depth harm additionally to check however the shear wall location affects the all building behaviour throughout earthquake. For these differing types of building Analysis is finished and result's compared. Work is split into following parts: 1) Analysis of building with steel plate Shear Wall at totally different location, 2) Static Non linear analysis of building with SPSW at numerous locations, 3)Pushover analysis of building with steel plate Shear Wall at numerous locations.
Keywords:Structural performance and non-functional performance level of the building are as follows: Immediate Occupancy, control, Life Safety, restricted Safety, Structural Stability, Operational, Reduced Hazards.
44-46
10
Abstract: We live in the era of social media where everybody is socially connected. But recently Online Social Network [3] is vulnerable to mass spam incidence as well as users data theft such as financial credential, user system data and user trends for exploitation purposes. Recent trend of spam incidents is causing a very serious threat to Social Networking World which has in turn become an important means of interaction and communication between socially online users. It is not only dangerous to the socially online users, but it also occupies large portion of the traffic on networks. Majority of current spam filters in use are based on the metadata, subject and content of emails and other social networking sites such as Facebook, twitter etc. Social Networking Services also provide great possibilities to take advantage of user identification and other social graph-dependent features to improve classification. In this paper, our system uses machine learning [1] approach for spam detection based on features extracted from social networks constructed from social networking site message metadata and logs. Email subject headers are used to verify spam email, spam on Social networking Sites is often accompanied by a wealth of data on the sender, user messages, posts, content can be used to build more relevant detection mechanisms. System uses these terminologies to choose features that best differentiate spammers from the legitimate users. In this technique system flag user system or message as spam and non-spam messages. Legitimacy credential are assigned to senders based on their possibility of being a legitimate user or spammer. Also, proposed System also explores various spam filtering techniques and possibilities.
Keywords:Machine Learning, SNS (Social Networking Sites), OSN (Online Social Network), tf-idf (Term Frequency-Inverse Document Frequency).
47-49