IJSPR: Volume 03 Number 02
Latest News    IJSPR Volume 16, October 2015 Edition Published Successfully.         Call for Papers: November 2015    IJSPR Inviting Original Research Papers for Volume 17, November 2015 Edition.

IJSPR - Volume 03, Number 02

Published On : Sep 2014
SNo. Paper Title & Authors Page
1
Abstract: This paper presents a “design of high order digital phase locked loop”. This paper also present novel approach to overcome these difficulties by allowing high order loops to be viewed as a natural extension of lower order ones. This is accomplished by adding nested first-order feedback loops around a basic first-order Loop Filter. In the Previous method the fast locking DPLL operation Reduces the lock time by a factor about 4.40 Compared to its conventional DPLL counterpart. But this method more effective model presented has been implemented and tested in Simulink®.
Keywords— Analog Signal Processing, Feedback Systems, Loop Filters, Phase-Locked Loops.
1-5
2
Abstract: Digital watermarking techniques have been developed to protect the copyright of digital media. In image watermarking, the hidden information is embedded into cover media to prove ownership. Copyright abuse is the motivating factor in developing new encryption technologies. The focus of this paper aims to provide a detailed review and background about the watermarking definition, concept and the main contributions in this field. We can classify the techniques according various categories such as host signal, perceptivity, robustness, watermark type, necessary data for extraction, processing domain, and applications.
Keywords— digital watermarking, Robust, Attacks, PSNR, DCT, DWT.
6-15
3
Abstract: With increasing demand for applications in biometric security and privacy, the field of fingerprint recognition attracts many researchers. Accomplishment of reduced verification error rate while higher security and privacy is needful in the present demanding environment. Many applications are demanding for less probability to reveal person’s identity, faster and good verification results for fingerprint. In this paper, authors have reviewed abundant attempts made by researchers to fulfill the requirement of fingerprint authentication and security. One of the best choices for fingerprint recognition was devices which having specific quality to capture images which are fused together that replaced by decomposition algorithm. Authors have presented state of art for various methods in fingerprint recognition area. With the advancement in research in the fields namely mixing fingerprint to latent person’s identity and algorithm in all aspects.
Keywords— Minutiae, feature extraction, continuous and spiral component.
16-21
4
Abstract: All previous methods embed data by reversibly vacating room from the encrypted images, which may be result into some errors on data extraction and/or image restoration. In proposed project, We do Secure and Separable data hiding into encrypted images with TCP Steganography. The purpose of Separation is to transfer data and images without lossing of original cover of image Separately as per requirement. In order to this, we are following technique that is Reversible Data Hiding (RDH). RDH is mainly used for the medical imagery, military imagery and low forensics in that the original image should not distort. For this Purpose, We are going to implement the main two algorithms- Advanced Encryption Standard (AES) and Bit Plane Complexity Segmentation (BPCS). These Two algorithms requires TCP/IP Header for key passing and for transmission of respective data and image. AES is used for the data encryption and Image Encryption & BPCS is used to increase the payload capacity and embed encrypted data into the images also transmission of image. In the BPCS algorithm we used one more technique that is gamma for controlling Quality of Image, which helps to recover image near to 100%.By combining these modules, We are achieving the phenomenon result that user can extract the image and data separately which is transmitted over untrusted network with TCP Steganography.
Keywords— Encryption of Image and data; data hiding and Extraction of data and image; LSB technique, AES algorithm, BPCS Algorithm and TCP/IP header.
22-27
5
Abstract: In this paper CFD analysis of economizer is done to locate the velocity peaks near the U bends of the tube of economizer and efforts are made to reduce the velocity magnitude near these bends. Thermal Power Stations all over the world are facing the problem of boiler tube leakage frequently. It was also found from the trends of failure that the economizer is the zone where the leakages are found more. The maximum number of cause of failure in economizer unit is due to flue gas erosion. The past failure details revels that erosion is more in U-bend areas of Economizer Unit because of increase in flue gas velocity near these bends. In the previous published work arrester was provided in the path of flue gas near U bends. By provision of arrester velocity near U bends can be minimized but flow of flue gas will also be reduced. This reduction of flue gases near these bend areas may affect the heat transfer rate and may cause drop in feed water temperature by few degrees. In the present work CFD analysis of economizer is performed with horizontal arrester and 45° inclined metal shields. Metal shield allows the flue gas to pass through it and while passing through it velocity of flue gas gets reduced. Erosion chance is more in U bends of the the tube because the flue gas velocity exceeds the inlet velocity in these bends, if velocity of flue gas near U bends is limited close to inlet velocity then erosion rate of U bends will reduce. In the previous published work the flue gas velocity was taken 2.3 m/s at inlet and reduced up to 0.8155 m/s near U bends which may affect the heat transfer, as heat transfer rate decreases by the decrease of flue gas velocity. In this paper is attempted to suggest a probable solution for reduction of erosion in economizer zone by the provision of metal shields in the path of flow of flue gas near U bends without affecting the performance of economizer. It is observed that velocity of flue gas increases in lower bends in comparison of upper bends, thus two metal shields one above another are used to maintain uniform velocity near U bends. Combination of metal shields which allows maximum flow of flue gas near U bends and maintains velocity magnitude between 2.3 m/s to 2 m/s is recommended as a result of the study.
Keywords— Erosion, Metal Shield, CFD analysis of economizer.
28-38
6
Abstract: One of the basic issues these days on the social networking site is that our walls get spammed easily by spammer. Spam being unwanted advertisements, Vulgar messages, etc.Keeping these issues in mind we propose a system which gives OSN users direct control over the messages being posted on their walls. We attain this by obtaining the dataset of users details and putting this dataset through TF-IDF and NLP parser, based on machine learning concepts which automatically labels the posts as spam, Vulgar or legit.
Keywords— Machine Learning Techniques (MLT), Online Social Network (OSN), Term Frequency -Inverse Document Frequency, Natural Language Processing, Spam, Filtering Wall, Data Set.
39-42
7
Abstract: Here during this research work, strategies for forming a communications link between Wireless detector Networks (WSNs) by sanctioning every WSN to act as a wise antenna area unit conferred. Every WSN is simulated as a collection of willy-nilly placed detector nodes inside a plate like space. The most important distinction from the previous works is within the organization of array that is random as just in case of sensible WSNs. The planned technique involves a looking out WSN, a receiving WSN and a link allow establishing the link. The looking out WSN has the task of transmittal a probe beam so as to search out adjacent WSNs. sort of a beacon light this can be drained a rotating beam vogue search victimization the detector nodes as AN nonperiodic array. Results show that for a random array, we are able to win a particular beamwidth and gain. We have a tendency to additionally demonstrate that for a given needed gain level we are able to spatially skinny the array while not important loss of gain or the consequences of grating lobes. The receiving WSN uses a selection spectrum based mostly area division multiple access (SDMA) receiver. This receiver is simulated to work out the direction of arrival from the looking out WSN and to extract the situation info from the looking out WSN’s signal in additive white Gaussian noise. From the calculation of direction of arrival and therefore the location info inside the arrival signal, the WSN has comfortable data to retort to the question of the looking out WSN and kind the communications link. The network fashioned could be a suburbanized network.
Keywords— Antenna array; multiple access; smart antenna; wireless sensor networks.
43-48