IJSPR: Volume 09 Number 03
Latest News    IJSPR Volume 16, October 2015 Edition Published Successfully.         Call for Papers: November 2015    IJSPR Inviting Original Research Papers for Volume 17, November 2015 Edition.

IJSPR - Volume 09, Number 03

Published On : March 2015
SNo. Paper Title & Authors Page
21
Abstract: Mobile nodes in challenging network scenarios such as military networks are likely suffer from intermittent network connectivity ie., the signals are stopping and starting at regular intervals. Disruption-tolerant network (DTN) technology is used to overcome this problem. It allows accessing the wireless devices and confidential information reliably. The confidential information must be securely retrieved. The key issues are enforcement of authorization policies update for secure data retrieval. The Ciphertext Policy Attribute-Based Encryption (CP-ABE) is the best solution to the access control issues. Privacy and security challenges which include key escrow, attribute revocation can be resolved by using CP-ABE. We propose a secure data retrieval scheme which is based on CP-ABE approach. Our scheme provides flexible fine-grained access control such that the encrypted data can only be accessed by the authorized users. Multiple key authorities manage their attributes independently and the party determines the access policy while data encryption. The encrypted data involves decryption by the user only if the user satisfied the access policy. We express how securely the confidential data is retrieved in disruption tolerant network.
Keywords:Access control, disruption-tolerant networking, secure data retrieval, CP-ABE.
91-96
22
Abstract: Computation of a Text (word, term, label & phrase) statistically with predefined feature/measure is the traditional methodology used in the area of Text Mining. A model which is based on conceptual text mining with new and enhanced features has been introduced in this paper. The concept based model will minimize the demerits of mathematical approach and increase the performance of the text mining system. It computes the text at corpus, document and sentence level. Each term is syntactically analysed and measures are defined based on their conclusions. It computes the frequency of a term conceptually (Cft) and also analysis the Document term frequency (Dft) and Corpus level document frequency (Cdf) using conceptual mining model. Finally, the similarity of a feature/measure is computed by incorporating Multi-pass clustering and classification methodology. The term that identifies the semantics of the text has to be given importance more than the frequency of the term in the corpus/document. The proposed conceptual text mining model has been used on various datasets for analysis and their results are grouped into the text clusters. The experimental outcomes shows significant improvement in quality of clusters formed using the concept based computation on sentence and document level. The comparisons between the conceptual text mining and traditional analysis approach have been done and a result shows the significance of the proposed model.
Keywords:Pre-processing of the text, Concept based Analysis; Concept based Document Similarity, Classification methodology, Clustering Techniques.
97-103
23
Abstract: Hummingbird is a recently proposed ultra-lightweight cryptographic algorithm targeted for low-cost smart devices like RFID tags, smart cards etc. It has a hybrid structure of block cipher and stream cipher and was developed with both lightweight software and lightweight hardware implementations for constrained devices in mind. Lightweight cryptography (LWC) is an emerging research area which has to deal with the trade-off among security, cost, and performance. Moreover, Hummingbird has ability resist common attacks to block ciphers and stream ciphers including differential and linear cryptanalysis, birthday attack, structure attacks, algebraic attacks, cube attacks etc The report presents the algorithms for the encryption as well as decryption process and shows some simulation results performed on Xilinx.
Keywords:Lightweight cryptography, resource constrained devices, Hummingbird.
104-109
24
Abstract: The function of the flywheel is to store excess energy during period of attestation and it supplies energy during period of starvation. The flywheel is massy wheel used in engines and machineries where reciprocal motion is converted into motion of a circular kind. It may provide a mechanical storage of kinetic energy. A flywheel induced high stresses when during high rotational speed. The stress state relies on the flywheel having various parameters like material properties, geometry and rotational speed. On the other hand, the stored kinetic energy relies on the rotational speed and mass moment of inertia. In our project we have studied various structure (cut section, solid, rim, 2rim) of flywheel and by using Finite Element Analysis are utilize to calculate the stored kinetic energy, deformation and stress for the respective flywheel, we can compare the Design and analysis result with existing flywheel and various structure.
Keywords:Flywheel, geometry, FEA, Kinetic Energy.
110-113
25
Abstract: The Government of Rajasthan has spent millions of rupees on poverty alleviation programs through its various development schemes. Most schemes are hijacked by contractors and middle-men or they fall prey to corruption. The impact of these schemes is not visible and the poor face many hardships and struggle to gain access to the benefits offered by such schemes. In Governance, transparency and accountability are often desired. But to ensure the same designing appropriate systems and institutionalizing them has always been a challenge and many a times neglected. The beneficiaries (poor) are rarely made aware of the objectives, their rights and entitlements under the schemes. Hence streamlining service delivery systems and ensuring that transparency and accountability are intrinsic part of governance is very important. In this paper Social Audits have been introduced in the MGNREGS – Rajasthan, wherein the primary stake holders (laborers) actively participate in the social audit. The process of the social audit starts with the filing of applications for information of relevant official records pertaining to the program, by trained civil society activists who then identify literate youth. The youth are trained in the processes and go into the villages and cross check official records through a door to door verification of muster rolls and physical identification of the works. The labourer’s should be aware regarding the rights and entitlements through focus group discussions is an integral part of the social audit process. And on a pre-notified date the reports along with the findings of the social audit are readout in public meetings attended by the labors, Officers politicians and the media. The officials respond to the issues which are read out in public and take corrective action.
Keywords:MGNREGS, Social audit, Implementation, Transparency, Accountability.
114-119
26
Abstract: The response of metal oxide semiconductor (MOS) gas sensors are affected by change in temperature as the kinetics between the gaseous components and the sensor surface are temperature dependent. Temperature modulation of MOS gas sensors have been used widely for extracting features of gaseous component. However modulation of the heater voltage following a proper pattern may lead to easier and fast discrimination of gases. This paper presents results of the response of gas sensor array, as the sensor surface temperature is modulated by different waveform pattern. Principal component analysis (PCA) is applied to the response of the sensor to four different volatile components. The results indicate that the classification of the gaseous component is possible from their signature responses.
Keywords:Gas Sensor, Metal Oxide Semiconductor, Microcontroller, Principal Component Analysis, Pulse Width Modulation, Temperature Modulation.
120-124
27
Abstract: The conventional CBIR is not perfectly suitable for retrieving the images from the large image dataset. The basic problem is generated from conventional CBIR method are: First, Whenever users perform the image search on Google since unnatural and unsupported data is retrieve from www. Second, it is very time consuming, due to this reason perfect result is not obtained in given time duration. Basically Content-based image retrieval is use for retrieving the similar images from image dataset on basis of sample query image. To overcome the above problem, the proposed scheme improved the performance of image classification and retrieval accuracy of images. The ACOGA method is used to optimize the feature of image dataset. These feature is reflects texture level of various images. Optimize the feature descriptor in the ROI (region of interest) of Images using ACOGA (Ant Colony Optimization with Genetic Approach) Technique. Optimize image descriptors are classified in different classes of image dataset using support vector machine. SVM is use for image retrieval for maintain accuracy. This supervised learning approach use the concept of image optimizer for improves the performance of retrieved images. The performance of proposed method SVM-ACOGA (Support Vector Machine – Ant Colony Optimization with Genetic Approach) method is improved instead of comparable CBIR method.
Keywords:Support Vector Machine, Ant Colony Optimization, Genetic Approach, Feature Descriptors.
125-130
28
Abstract: In previous systems there was lot of burden for computing security tasks such as storage of data and encryption and decryption of data files. Which was more time consuming for processing of data in cloud environment? This is the main drawback of previous or earlier systems. In addition there was no facility for controlling the data by data owner. Again for verification of attributes with their own data is also having more computational and storage overheads. We proposed a system which solves these earlier security threats, we are using data encryption technique for individual data blocks with key rotation using 128 bit symmetric key. In addition users of particular data can demand for data and do operations on their data such as add, change, and remove etc. very easily. We have use the two standard algorithms AES and SHA1 .The main purpose behind of these two algorithms is data security. Advance Encryption Standard algorithm is used for encryption and decryption of data and for hashing SHA1 is used. we have designed three modules which are TTPA ,CSP and Data Owner . Because of this we are achieving the better result that is strong data security in cloud systems. In our system there is provision of time based access control for providing security to file access if multiple clients are connected via LAN in network that means files access is restricted to authorized users only. The time span is defined by the data owner who is having all the authorities over his data.
Keywords:data storage; data owner; verification of attributes;third party auditor; encryption and decryption of data; cloud service provider,AES algorithm, SHA1 Algorithm.
131-134
29
Abstract: Now a day’s everything is gone wireless to increase the usability of human being keeping in mind the most basic and most important function of today’s era i.e. controlling the home appliance via wireless. This system is known as wireless home appliances control via wireless remote which works on RF. to increase the reliability of the system. I have made the system without microcontroller. So, no need to program it. To increase the efficiency of control I have used the touch sensors instead of push button or any other kinds of switching system. In modern days, we must use various high-tech machineries and equipments to get our jobs done and make the life tremendous. These Appliances should be controlled from any location as the homeowner might be away from home at workplace or travelling in a different place. Thus a system of remote monitoring and controlling are very important. Smart home is one of these types of system equipped with home appliances which we want to control smartly.
Keywords:RF controller, wireless home appliance control, wireless transceiver.
135-137
Papers are being uploaded...