IJSPR: Volume 02 Number 01
Latest News    IJSPR Volume 16, October 2015 Edition Published Successfully.         Call for Papers: November 2015    IJSPR Inviting Original Research Papers for Volume 17, November 2015 Edition.

IJSPR - Volume 02, Number 01

Published On : Aug 2014
SNo. Paper Title & Authors Page
1
Abstract Visual Cryptography (VC), proposed by Naor and Shamir, has numerous uses, including visual authentication and identification, image encryption and steganography for security purpose, and. In this paper Contrast the visual information based on pseudo randomization and pixel reversal using sigmoid function is also proposed.
Keywords— Information hiding, Information Security, Halftone image, Visual cryptography, Secret share.
1-3
2
Abstract In this paper we are using new method called “A fast–locking digital DPLL using integrator and diffentiator controlling with Matlab. This method reduces the locking Time and improves performance of DPLL. In the Previous method the fast locking DPLL operation Reduces the lock time by a factor about 4.40 Compared to its conventional DPLL counterpart. But this method more effective to reduce locking time with few nano second. It has less computational complexity compare to the previous method.
Keywords-DPLL, fast-locking phase tracking, lock time, HPF, LPF, CP.
4-7
3
Abstract Digital images are electronic snapshots taken of a scene or scanned from documents, such as photographs, printed texts, manuscripts, and artwork. The digital image is sampled and mapped as a grid of dots or picture elements (pixels). Each pixel is assigned a tonal value (black, white, shades of gray or colour), which is represented in binary code (zeros and ones). The binary digits ("bits") for each pixel are stored in a sequence by a computer and often reduced to a mathematical representation (compressed). The bits are interpreted and read by the computer to produce an analog version for display or printing. Some time these images can be needed to make them clearer. The brightness preservation is one of the techniques so that image can enhance quality. This paper is a review on these approaches of image processing.
Keywords: Digital Image Brightness Preservation histogram.
8-11
4
Abstract In this paper we design a reliable home surveillance system based on embedded system and multiple sensors to enhance the system efficiency and reliability. We use simple and reliable security system as a watch dog by installing the sensing loops around building. You have to stretch the loop wires two feet above the ground to sense the unauthorised entry into your premises which makes next way or door to lock automatically. Also other sensor modules are observing activities in surveillance area i.e. PIR (pyro-electric infrared) sensor used for motion detection and ultrasonic sensor for detection any person pass through surveillance area by spreading frequency at beam angle which is construct by using multiple sensors.
Keywords—Embedded Surveillance System, Sensing Loops, Automatic Door Latch, Majority Voting Mechanism, PIR Sensor and Ultrasonic Sensor.
12-15
5
Abstract A fin is a surface which extends from a surface to increase the rate of heat transfer to the environment by increasing convection. The IC Engine fins are made from Aluminum alloy and it is provided for better cooling effect. The cooling mechanism of the air cooled IC engine is generally dependent on the fin design of the cylinder, cross-section area of fin, pitch of the fin, thickness of fin, air velocity, air exposed angle and weather conditions. In this research paper first experimental readings were taken in form of temperature of existing fin of air cooled IC engine. These readings were validated with ANSYS model. After validation fin was modified with same volume, again analysis of modified fin done by ANSYS software. By comparing the result, we can get the clear idea about the fin performance.
Keywords: IC engine, heat transfer, fin, FEA, ANSYS
16-21
6
Abstract Leakage power dissipation increases exponentially with technology scaling and degrade the performance of IC. Multi threshold CMOS technique which is called as Power gating is a well-known way to reduce leakage current but abrupt transitions from sleep to active mode introduces Ground Bounce Noise appear which effects normal working of circuit and reduces the reliability of circuit. An effective technique is proposed here to deal with ground bounce noise and leakage problem in the circuit. For that an additional wait mode is added in the circuit to reduce the ground bounce noise and to reduce leakage, ultra-low power diode technique is used. A comparison between existing techniques is done on 45nm technology node which shows that the proposed technique reduces leak age by 54.68% and ground bounce noise by 30.72%.
Keywords— Leakage current, Ground Bounce Noise, Ultra Low Power Diode, Forward Body biasing, Reverse Body Biasing.
22-27
7
Abstract The general approaches to association rule mining focus on inducting rule by using correlation among data and finding frequent occurring patterns. The main technique (A priori) uses support and confidence measures for generating rules. But since the data have become more complex today, it’s a requisite to find solution that deals with such problems. There are certain constructive approaches that have already ameliorated ARM. The purpose of this paper is to review such existing presumption that have been used to increase the effectiveness of ARM by using the uncertainty, vagueness, approximation, and imprecision theories and what other measures could be called for.

Keywords —Data Mining, Association Rule Mining, Fuzzy Set Theory, Rough Sets, Vague Sets, Soft Sets.
28-32
8
Abstract Wireless Communication is one of the major aspects of life. The progression in age and its growing demands, there has been rapid development in the field of communication. For better transmission system single carrier waves are being replaced by multi carrier waves techniques as MIMO OFDM is implemented now days. As increasing the demand for high performance wireless is enabled by using the multiple antennas at both base station and users ends. Multiple antenna technology enables high capacity especially for internet and multimedia services it also increases range and reliability. In the Multiple Inputs Multiple Outputs OFDM system, Peak – to Average Power Ratio (PAPR) of these signal have some undesirable effects on the system performance. In this research paper we have reviewed the various PAPR reduction technologies for achieving the optimum system performance of MIMO OFDM Transmission.
Keywords: MIMO OFDM, IDFT, PAPR, Cyclic Prefix, Amplitude Clipping & Filtering.
33-36
9
Abstract WiMAX is introduced by the Institute of Electrical and Electronic Engineers (IEEE) which is standard designated 802.16d-2004 (implemented in fixed wireless applications) and 802.16e in 2005 (mobile wireless comm.) to provide a worldwide interoperability for microwave access. Presently, telecommunication industries are highly concerned with the wireless transmission of data which can use various transmission methods, from point- to-multipoint links. Here it contains full mobile internet access. Many applications have already been applied so far using WiMAX, as option to 3G mobile systems in developing countries, Wireless Digital Subscriber Line (WDSL), Wireless Local Loop (WLL). IEEE 802.16e-2005 has been developed for mobile wireless communication. In this paper, we studied a simulation model based on 802.16e and demonstrated in different simulation scenarios with different modulation techniques such as BPSK, QPSK and QAM to find the performance of physical layer for WiMAX Mobile. The noise channel AWGN, Rayleigh fading. The review study has been concluded based on BER, SNR through MATLAB Simulation.
Keywords: Worldwide Interoperability for Microwaves Access (WiMAX), Physical Layer (PHY), Additive White Gaussian Noise (AWGN), Bit Error Rate (BER).
37-42
10
Abstract In this paper, we review a roll forward error recovery technique based on scan-chains for TMR system, called SMERTMR i.e. Multiple Error Recovery Technique for Triple Modular Redundancy systems (SMERTMR). This technique uses scan-chain flip-flops used to detect and correct faulty modules in the presence of single or multiple transient faults. In this technique, the errors at the output of voter are detected, while the latent faults at the input of modules are detected by comparing the internal states of the TMR modules. When any mismatch is detected between the modules, the system will locate the faulty modules and the state of a fault-free module is copied into the faulty modules. When the permanent fault is detected, the system is degraded to a master/checker configuration. Experiment result reveals that SMERTMR has the 100% error detection and recovery coverage of single faulty module and 99.7% error detection and recovery coverage of two faulty modules, with improved performance and negligible area overheads on as compare to traditional TMR systems.
Keywords - roll-forward error recovery, scan chain TMR (ScTMR), triple modular redundancy (TMR).
43-48
11
AbstractWith the increase in the internet facility to the common people the chance of digital data sharing with piracy has been increase. This cause great affect on the digital media provider company as passing and translating data is very easy. So protect the originality of the data one has to put some watermark in the digital data so it act as the boon. Now a days different watermarking techniques is present having different limitation and benefits. So this paper focus on the study of variety of functionality of the watermarking techniques. Major drawbacks which embedding or extraction method of watermarking need to take care for protecting from the attacks need to take care. Specify the various features and there requirement for the same.
Keywords - Image segmentation , Digital Watermarking.
49-54
12
Abstract Cloud computing may be a approach of computing wherever service is provided across the web mistreatment the models and levels of abstraction. Several analysis problems area unit needed to be absolutely addressed in cloud like Fault tolerance, advancement management, advancement programming, security, etc. Fault Tolerance in cloud may be a major concern to ensure the supply and dependability of essential services further as application execution. So as to attenuate failure impact on the system and application execution, failures ought to be anticipated and proactively handled. The task of providing fault tolerance as a service needs the service supplier to appreciate generic fault tolerance mechanisms specified the client’s applications deployed in virtual machine instances will transparently get fault tolerance properties. To this aim, we tend to outline ft−unit because the basic module that applies a coherent fault tolerance mechanism to a continual system failure at the graininess of a VM instance. The notion of ft−unit is predicated on the observation that the impact of hardware failures on client’s applications will be handled by applying fault tolerance mechanisms directly at the virtualization layer than the applying itself.
Keywords – Cloud Computing, Cloud design, Virtualization, Distributed Computing.
55-61