An Energy Minimization Based Approach for Secured Real Time Applications
- Ajitesh Kumar and S. K. Gupta
Contact: patel.ajiteshkumar@gmail.com; guptask_biet@rediffmail.com
Abstract: At present security critical real time applications running over clusters are increasing rapidly. As an application run on clusters they need both timeliness and security, an efficient scheduling approach is needed that has better performance in terms of both number of task accepted and security value received. Real time scheduling algorithm performs badly when used for scheduling security critical real time application. Secure real time scheduling algorithms for scheduling real time applications on cluster are available but they concentrate much on security, which have a quality parameter for any real time system. In this research the approach focuses on essential parameter i.e. Success ratio for a real time system. We have used deferred approach and load balancing to maximize Success ratio for better performance. Further, simulation done in MATLAB (module for Real-time) to measure the performance of modified approach. The approaches are applicable over wide range of applications differing in their requirements and have better performance.
Image Cryptosystem Using Cat and Standard Chaotic Map
- Kamlesh K. Gupta
Contact: kamlesh_rjitbsf@yahoo.co.in
Abstract: Encryption is used to securely transmit data in open networks. Each type of data has its own features; therefore different techniques should be used to protect confidential image data from unauthorized access. The asymmetric cryptography doesn’t fit for transmission of Images, since it takes more time for encryption at the source and likewise for decryption at the destination. We are therefore using hybrid cryptosystem. In this paper, we designed an algorithm to generate diffusion template using 3D standard map and rotated image by using vertically and horizontally red and green plane of the input color image. We then shuffled the red, green, and blue plane by using 3D Cat map and Standard map. Finally the Image is encrypted by performing XOR operation on the shuffled image and diffusion template. The objectives of this new design includes: (1) to efficiently extract good pseudorandom sequences from a cascading of 3D cat and Standard map for color image and (2) to simultaneously perform permutation and diffusion operations for fast encryption.
Efficient Data Compression Approach in Data Warehouse using Lossless Technique
- Nirmal Sharma and S. K. Gupta
Contact: nirmal1709@rediffmail.com; guptask_biet@rediffmail.com
Abstract: Several level and data compression approaches are present in this environment so everyone is best for other one it cannot identify which one is best approach. Main focus of this paper is lossless compression in data warehouse (using all details and attribute information. In this paper permits relocating more data in different field with efficient data compression approach. Data compression has a dominant consequence on Data warehouse for decreasing text and image size and updating request processing. We may decrease the amount of statistics, used to denote data warehouse content deprived of extremely decreasing the excellence of the data content. The paper observes and shows a group of lossless data compression efficient approach of text data. .
Improved VHDL Modeling for Wi-Fi Mac Layer with the Less Energy Consumption
- Priyanka Yadav and Nisha Agarwal
Contact: priya.pari8@gmail.com; nishaagarwal.hitm@sgei.org
Abstract: Mobility and portability is the major advantages that IEEE 802.11 wireless networks offer over their traditional counter- parts, i.e. wired Ethernet networks. However, when nodes are mobile or portable units, power consumption becomes a primary issue since terminals are usually battery driven.
The wireless local area network, WLAN is dominated by IEEE 802.11 standard. It becomes one of the main focuses of the WLAN research. Now most of the ongoing research projects are simulation based as their actual hardware implementation is not cost effective. The main cores of the IEEE 802.1 lb standard are the CSMA/CA, Physical and MAC layers. But only MAC layer for transmitter and receiver are modeled in this paper using the VHDL modeling with the reducing of power consumption.
The VHDL (Very High Speed Hardware Description Language) is defined in IEEE as a tool of creation of electronics system because it supports development, verification, synthesis and testing of hardware design, the communication of hardware design data and the maintenance, modification and procurement of hardware. It is a common language for electronics design and development proto typing The main purpose of the IEEE 802.11 standards are to provide wireless connectivity to devices that require a faster installation, such as Laptops, PDA’s or generally mobile devices inside a WLAN.
Using proposed algorithm, we develop a case study and provide interesting indications to minimize the power consumption of IEEE 802.11 terminals.
Image Denoising using Neuro-Fuzzy Median Filter
- Kanika Gupta and Dr. S.K. Gupta
Contact: guptask_biet@rediffmail.com
Abstract: Visual perceptions can be represented in pictorial form which can be in 3D or 2D known as Image pixels. Pixels of collective form constitute a form of Image. Image can be disturbed by various types of noise which can cause blurness and loss of image sharpness details may take place. Thus number of filtering strategies are imposed which preserve the sharpness of image and even edges of images but overall cannot preserve the image details. In these present existing techniques, lots of changes are performed but still denoising in images require improvement. Nowadays techniques of soft computing are used instead of filters for the removal of noise present in images. Fuzzy system rules are imposed for the noise removal but this system has various flaws such as training is not provided by this system. This is overcome by the neural network. This paper focuses on hybrid mixture working of two soft computing techniques fuzzy system and neural network which overcome the flaws of each other. New technique used is named as Neuro-Fuzzy technique. This starategy overcomes the disadvantages of the present filters namely median filter, weighted median filter, switching median filter, recursive median filter, adaptive median filter, averaging median filter and so on. The results are shown on the comparison of various parameters namely PSNR, MSE, RMSE .
Investigation of Electrical and Electrochemical Properties of Reduced Graphene Oxide- Polypyrrole Nanotubes Nanicomposites
- Madhabi Devi and Ashok Kumar
Contact: ask@tezu.ernet.in
Abstract: Reduced graphene oxide (RGO)-polypyrrole nanotubes (PPyNTs) nanocomposites have been synthesized via in-situ reduction of graphene oxide in presence of PPyNTs. The morphology of the samples was investigated by high resolution transmission electron microscope and scanning electron microscope. The chemical composition has been probed by Fourier transform infrared spectroscopy. Current-voltage characteristics of the samples are studied that shows an enhancement in the conductivity of the nanocomposites after incorporation of RGO. The electrochemical properties of the samples were characterized by cyclic voltammetry measurements. A highest specific capacitance of 79.85 F g–1 is obtained for the nanocomposites which indicate the combination of two charge storage mechanisms: electrical double layer (EDL) and pseudocapacitance. With an increment in the RGO loading, more charges are stored at the electrode/electrolyte interface giving rise to EDL capacitance which enhances the specific capacitance in the nanocomposites.
Copy-Move Forgery Detection
Based on PHT and SIFT
- Indu Maurya and S.K. Gupta
Contact: indumaurya42@gmail.com; guptask_biet@rediffmail.com
Abstract: We know that, as a result of powerful image process and much of written material software package, we will simply manipulate and edit of digital image. We can easily add or remove important features from an image without leaving any evident mark of tampering. The need for authenticating digital images, validating their content and detecting forgeries will only increase. Digital image forensics checks the integrity of the images by exploitation many techniques .In particular; we focus on detection of a tampering region. Copy-move is one of the most common methods for image tampering. Tampered region can be determined by many methods. However, it is challenging to notice the tampered regions when they are rotated. The proposed approach is based on to detect the duplication-region forgery with rotation by combining Polar Harmonic Transform (PHT) with Scale-Invariant Feature Transform (SIFT) to extract the features of the circular blocks and subsequently block matching is performed.
Coupled Lucas sequence
- Kiran Singh Sisodiya and Dr. Vandana Gupta
Abstract: In this paper we have introduced interlinked coupled recurrence relation of Lucas second order sequence and deduced some of its properties
Subject Classification MSC (2000) 11B37, 11B39, 11B99
Image Encryption Schemes: A Review
- Kamlesh K. Gupta
Contact: kamlesh_rjitbsf@yahoo.co.in
Abstract: With the rapid development of information technology, the security of image data has become more and more important. But the different properties between text and image data make the traditional text encryption scheme fail to encrypt image data efficiently. This paper attains the objective for review various methods or techniques for image encryption that solve various issue for image encryption.
Fluorescence Properties of Surfactant Molecules: A Review
- Vinayika Singh and Rashmi Tyagi
Contact: vinayikaradha@yahoo.co.in; rashmi.tyagi@juet.ac.in
Abstract: The present review paper provides an appropriate description related to the elementary, essential and fundamental aspects of molecular fluorescence spectroscopy and briefly recapitulate the several fluorescence surfactant properties measured by using fluorescence spectrophotometer. This review article provides explanation on fluorescence introductory part, physical and chemical principles, information available from fluorescence measurements, purpose for instrumentation for molecular fluorescence measurements etc. The surfactant fluorescence studies viz. steady-state fluorescence spectroscopy included critical micelle concentration, aggregation number, micro environment; binding sites (n), free energy of binding are also discussed.
|