Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Preface
Organization
Contents
Wired and Wireless Communication Systems
Properties and Performance of Linearly Extensible Multiprocessor Interconnection Networks
Abstract
1 Introduction
2 Background and Related Work
3 Comparative Study
3.1 Number of Nodes
3.2 Node Degree
3.3 Diameter
3.4 Extensibility
3.5 Cost
4 Performance Evaluation
5 Conclusion
References
An Analysis on Improvement of Lifetime in Wireless Sensor Network
Abstract
1 Introduction
2 Classification of Custer Based Routing Algorithm in WSNs
3 Leach (Low Energy Adaptive Clustering Hierarchical Routing Protocol)
4 Literature Survey
5 Proposed Work
6 Result Analysis
7 Conclusion and Future Scope
References
A Novel Solution for Cloud Enabled E-Governance Using Openstack: Opportunities and Challenges
Abstract
1 Introduction
2 E-Governance
2.1 Models of E-Governance
2.2 Traditional Architecture of E-Governance
2.3 Technical Challenges of Traditional E-Governance
3 Cloud Computing
3.1 Cloud Deployment Models
3.2 Cloud Service Models
4 Openstack Cloud Platform
5 Proposed Openstack Architecture for E-Governance
5.1 Opportunities Provided by Proposed Architecture
5.2 Challenges of Proposed Architecture
6 Conclusion
References
Frequency of Meeting with Node and Visit to Physical Location Based on Mobility Pattern
Abstract
1 Introduction
2 Related Work
3 Key Factors
3.1 Seek and Focus Routing
3.1.1 Randomized Routing
3.1.2 Utility Based Routing
3.1.3 Location Based Forwarding
3.2 MV Forwarding
3.2.1 PROPHET (Probabilistic Routing Protocol Using History of Encounters and Transitivity)
3.2.2 Prioritized Epidemic Routing
4 Experiment and Analysis
5 Working Procedure
5.1 Some Important Key Points
5.2 Experiment and Result
5.2.1 Message Relay v/s Drop v/s Abort
5.2.2 Message Relay v/s Buffered
6 Conclusion
References
A New Lightweight Approach for Multiuser Searchable Encryption in the Cloud
1 Introduction
1.1 Related Work
1.2 Our Contribution
2 Preliminaries
2.1 Definition of Traditional Public Key Encrytion
2.2 Definition of Identity Based Encryption (IBE)
3 Improvement of Rhee's dPEKS Scheme
3.1 Definition
3.2 Security Problem
3.3 Improvement in dPEKS Scheme
4 Proposed Scheme
4.1 Definition
5 Security Models
5.1 Security Models for SC-IND (Searchable Ciphertext Indistinguishability)
5.2 Security Model for TD-IND (Trapdoor Indistinguishablity)
6 The Concrete Scheme
6.1 Security Analysis
7 Experiments
7.1 Complexity
8 Conclusion
References
Performance Evaluation of Multi-functional Defected Ground Structure Embedded with Microstrip Patch Antenna for ISM Band Wireless Communications
Abstract
1 Introduction
2 Patch Antenna Design
3 Application of DGS to Microstrip Patch Antenna
3.1 Antenna Size Reduction
3.2 Higher Order Harmonics Suppression
4 Results and Discussion
5 Conclusion
References
Evaluation of Character Recognition Algorithm Based on Feature Extraction
Abstract
1 Introduction
1.1 Using Techniques
2 Literature Review
3 Propose Work
4 Result Analysis
5 Conclusion
References
A High Performance BPSK Trans Receiver Using Level Converter for Communication Systems
Abstract
1 Introduction
2 Proposed Methodology
3 Results
4 Conclusion
References
Connectivity Analysis of Mobile Ad Hoc Network Using Fuzzy Logic Controller
Abstract
1 Introduction
2 Network Connectivity
2.1 Network Connectivity Issues
2.2 Literature Review
2.3 Definition
3 Fuzzy Logic
3.1 Proposed Work
4 Simulation Environment and Parameters
5 Results and Analysis
6 Conclusion
References
Improved Election of Cluster Head Using CH-PSO for Different Scenarios in VANET
Abstract
1 Introduction
1.1 Clustering
1.2 Routing Protocols in VANETS
1.2.1 Proactive Routing Protocol
1.2.2 Reactive Routing Protocol
1.2.3 Hybrid Routing Protocol
1.3 Intelligent Transportation Systems
1.4 Particle Swarm Optimization
2 Related Work
3 Proposed Work
4 Result and Analysis
5 Conclusion
References
Utilizing Clustering Techniques for Improving the Boxplots
Abstract
1 Introduction
2 Related Work
2.1 Variations of the Boxplot
2.2 Alternatives of the Boxplot
3 Methodology
3.1 Boxplot
3.2 Boxplot Generation Using K-Means Clustering
3.3 Boxplot Generation Using DBSCAN Clustering
4 Experiments, Results and Discussions
5 Comparison Explanation
6 Impact of the Presented Techniques
7 Conclusion and Future Directions
References
Mathematical Model for Sink Mobility (MMSM) in Wireless Sensor Networks to Improve Network Lifetime
Abstract
1 Introduction
2 Related Work
3 Proposed Mathematical Model
4 Sink Site Determination Experiments
5 Conclusion
References
Detection of High Transmission Power Based Wormhole Attack Using Received Signal Strength Indicator (RSSI)
Abstract
1 Introduction
2 Wormhole Attack
2.1 Modes of Wormhole Attack
2.1.1 Packet Encapsulation
2.1.2 Out of Band Channel
2.1.3 Packet Relay
2.1.4 High Transmission Power
3 Received Signal Strength Indicator (RSSI) Model
4 Proposed Model
4.1 Attack Scenario
4.2 Proposed Methodology
5 Simulation and Results
5.1 Presence of Only Normal Nodes in Homogeneous Network
5.2 Presence of Malicious Node in Homogeneous Network
6 Conclusion and Future Directions
References
Effective Data Storage Security with Efficient Computing in Cloud
Abstract
1 Introduction
2 Motivation
3 Resource Scheduling
4 Security Analysis
5 Proposed Work
5.1 System Model
5.2 Modified Cuckoo Search
5.3 Data Storage Security
6 Conclusion
References
Privacy Preserving Multi Keyword Ranked Search with Context Sensitive Synonyms over the Encrypted Cloud Data
Abstract
1 Introduction
2 Problem Formulation
2.1 Problem
2.2 System Model
2.3 Threat Model
2.4 Notations and Preliminaries
3 Encrypted Query Click Logs in CSMRS
4 Important Notion
4.1 Word Vectors
4.2 Table
4.3 Encrypted Query Click Logs
5 Proposed CSMRS Overview
6 Proposed CSMRS Framework
6.1 Build_Index()
6.2 Dictionaries
6.3 Search
7 Experimental Results
8 Functionality and Efficiency
8.1 Index Generation
9 Search over Encrypted Data
9.1 Search Efficiency
9.2 Synonym Quality
10 Conclusion
References
.26em plus .1em minus .1emAn Optimized High Gain Microstrip Patch Array Antenna for Sensor Networks
1 Introduction
2 Design Procedure
3 A 2x2 Microstrip Patch Array Antenna
4 EM Simulation Results
5 Measurement Results
6 Conclusion
References
An Efficient Data Aggregation Algorithm with Gossiping for Smart Transportation System
Abstract
1 Introduction
2 Related Work
3 Preliminaries
3.1 Assumptions
3.2 Network Topology
4 Routing in Smart Transportation System
4.1 Data Aggregation
4.2 Routing of Aggregated Data
4.3 Proposed Algorithm
5 Simulation Results
5.1 Relayed Packets
5.2 Average Latency
6 Conclusion
References
Lane Change in Roundabout for Reduced Trip Time
Abstract
1 Introduction
2 Roundabout Traffic Control Management System
3 Algorithm for Lane Change in Roundabout
3.1 Collision Avoidance at Roundabout Algorithm-CARA
3.2 Message Set (Prioritised List)
4 Modeling and Simulator
4.1 RoundSim
4.2 Experimental Setup for RoundSim
5 Result and Analysis
6 Conclusion and Future Work
References
High Dimensional Data Representation and Processing
Fundamental Survey of Map Reduce in Bigdata with Hadoop Environment
Abstract
1 Introduction
2 Hadoop Features and Characteristics
3 Functionality of Map-Reduce
4 Proposed Algorithm
4.1 Example
5 Conclusion
Acknowledgement
References
Improve Tampered Image Using Watermarking Apply the Distance Matrix
Abstract
1 Introduction
1.1 Image Tampering
1.2 Using Distance Matrix
2 Literature Survey
3 Proposed Work
4 Result Analysis
5 Conclusion
References
A Novel Approach for Image Fusion with Guided Filter Based on Feature Transform
Abstract
1 Introduction
1.1 Image Feature Descriptor
1.2 Problem Identification
2 Previous Work
3 Methodology
4 Experimental Works
5 Result and Analysis
6 Conclusion
References
Networks and Information Security
Man in the Middle Attack on NTRU Key Exchange
Abstract
1 Introduction
1.1 Lattices
1.2 Fundamental Domain
1.3 Problems with Lattices
2 Related Work
2.1 Diffie-Hellman Key Exchange
2.2 Elliptic Curve Diffie-Hellman Key Exchange
2.3 Ring-LWE Based Diffie-Hellman Key Exchange
3 Mathematical Background
4 NTRU Encryption
4.1 Key Generation
4.2 Encryption
4.3 Decryption
5 Our Contribution
6 NTRU Key Exchange
7 MITM Attack on NTRU-KE
8 Zero Knowledge Proof and Man in the Middle Attack
8.1 Diffie-Hellman Key Exchange Using Zero Knowledge Proof
8.2 Zero Knowledge Proof with NTRU Key Exchange
9 Conclusion
References
Information Theoretic Analysis of Privacy in a Multiple Query-Response Based Differentially Private Framework
Abstract
1 Introduction
2 Background Prerequisites
2.1 Information Theoretic Basis of Privacy
2.2 Differential Privacy
3 Development of Proposed Frameworks
3.1 System Model
3.2 Adversarial Model
3.3 Query Model
3.4 Main Framework
3.5 Information Theoretic Establishment of Privacy
4 Results and Discussions
4.1 Database
4.2 Query Set Structure
4.3 Framework Analysis
5 Conclusion and Future Works
References
Security in MQTT and CoAP Protocols of IOT’s Application Layer
Abstract
1 Introduction
2 IOT Architecture
3 MQTT (Message Queueing and Transport Protocol)
3.1 Architecture
3.2 MQTT Vulnerabilities
3.3 MQTT Security
3.4 Securing MQTT Server
3.5 Creating the MQTT Server Certificate
4 CoAP (Constrained Application Protocol)
4.1 DTLS for CoAP Security
4.2 DTLS over CoAP (CoAPs)
5 Experiment Results
6 Conclusion
References
Forensic Analysis of a Virtual Android Phone
Abstract
1 Introduction
2 Literature Survey
3 Experimental Setup
3.1 Step 1
3.2 Step 2
3.3 Step 3
3.4 Step 4
4 Simulation Results and Discussion
4.1 Experiment I
4.2 Experiment II
5 Conclusion and Future Work
Acknowledgments
References
Implementation of Security Algorithm and Achieving Energy Efficiency for Increasing Lifetime of Wireless Sensor Network
Abstract
1 Introduction
1.1 The Characteristics of Wireless Sensor Network
1.2 Important Ways to Save the Energy/Power of WSN
2 Security
3 Proposed Mechanism
3.1 Cluster Head Selection
3.2 Objective Function
3.3 Reducing Length of Data Packet
3.4 Node State Switching Mechanism
3.5 Implementation of Security Algorithm
3.5.1 Implementation
3.5.2 Encryption Time
4 Conclusion
References
Secure Portable Storage Drive: Secure Information Storage
Abstract
1 Introduction
2 Related Work
3 Materials and Methods/Our Approach
3.1 Basic Working
3.2 Development Environment
3.3 Secure Authentication Protocol Password Management
3.4 Separation of Critical and Non-critical Data Area
3.5 Encryption over SD Card
3.6 Design and Implementation of One Touch Erasure Mechanism
3.7 Results
4 Conclusions and Future Work
References
Performance Evaluation of Facenet on Low Resolution Face Images
Abstract
1 Introduction
2 Literature Survey
3 The Role of Deep Learning in Face Recognition
4 Face Recognition Using Facenet
5 Facenet Performance Evaluation on Low Resolution Images of LFW Dataset
5.1 Experiment Results
6 Conclusion
References
Computing Techniques for Efficient Networks Design
Grading and Defect Detection in Potatoes Using Deep Learning
Abstract
1 Introduction
2 Literature Review
3 Segmentation
3.1 Binarization Using U-Net
3.2 Distance Transformation and Watershed
3.3 Contouring and Measurement
4 Final Grading
5 Defect Classification
6 CNN Defect Classifier
6.1 Transfer Learning Defect Classifier
7 Conclusion
References
Rough Fuzzy Technique for Giant Cell Tumor Detection
Abstract
1 Introduction
2 Rough Fuzzy Technique
3 Proposed Methodology
3.1 Preprocessing
3.2 Image Segmentation (Clustering Technique)
3.3 Tumor Identification
3.4 Detection of Tumor Using MATLAB Function
4 Performance Evaluation Using Measure Analysis
5 Future Enhancement and Conclusion
References
Face Recognition in Surveillance Video for Criminal Investigations: A Review
Abstract
1 Introduction
2 Literature Review
2.1 Forensic Sketch Recognition
2.2 Restoring Partially Occluded Face
2.3 Pose and Expression
2.4 Performance Evaluation Techniques
3 Existing Datasets
4 Challenges
5 Conclusion
References
Prototype to Control a Robot by Android System Remote Controller
Abstract
1 Introduction
2 Proposed Model
2.1 Model
2.2 Components Used
2.2.1 Android Device
2.2.2 Arduino Uno
2.2.3 L298N DC Motor Driver
2.2.4 Vehicle Bluetooth Module
2.3 Software and Hardware Setup
2.4 Program Code
2.5 Trial and Error, and Debugging
2.5.1 Bluetooth TX RX Pin Problem
2.5.2 Improper Movement Problem
2.5.3 Sudden Connection Drops
2.5.4 Uneven DC Motor RPM Problem
3 Conclusion
Acknowledgement
References
Plane-Wise Encryption Based Progressive Visual Cryptography for Gray Image
Abstract
1 Introduction
2 Progressive Visual Cryptography
3 Progressive Visual Cryptography Scheme for Gray Image
3.1 Codebook Generation
3.2 Bit-Planes for Gray Image
3.3 Proposed Scheme
3.4 Decryption Process
4 Experimental Results
4.1 Comparison with State-of-the-Art Approaches
5 Conclusion
Acknowledgment
References
An Advanced Throttled (ATH) Algorithm and Its Performance Analysis with Different Variants of Cloud Computing Load Balancing Algorithm
Abstract
1 Introduction
2 Load Balancing Algorithms
3 Parameters
4 Results
4.1 Response Time
4.2 Data Center Request Service Time
4.3 Processing Cost
5 Conclusion
References
Role of Cache Replacement Policies in High Performance Computing Systems: A Survey
Abstract
1 Introduction
2 Cache Organization
3 The Basic Concept of Replacement Policies
3.1 Traditional Replacement Policies
3.2 Issues with Traditional Replacement Policies
4 Improved Replacement Policies
4.1 Adaptive Replacement Policies
4.2 Cache Partitioning
4.3 Global Replacement Policies
5 Current Issues with Replacement Policies
6 Procedure for Experimental Analysis
7 Conclusion
References
Edge Detection Techniques in Dental Radiographs (Sobel, T1FLS & IT2FLS)
Abstract
1 Introduction
2 Sobel Edge Detection
3 Edge Detection with Type-1 Fuzzy Logic System (T1FLS)
3.1 Input to T1FLS
3.2 Input and Output Membership Functions
4 Edge Detection with Interval Type-2 Fuzzy Logic System (IT2FLS)
4.1 Input and Output Membership Functions
4.2 Fuzzy Inference Rules
5 Results and Discussion
6 Conclusion
Acknowledgments
References
Review of Deep Learning Techniques for Object Detection and Classification
Abstract
1 Introduction
2 Related Work
3 Deep Learning Models
3.1 AlexNet
3.2 GoogLeNet
3.3 VGG
3.4 ResNet
4 Experimental Results
5 Conclusion
References
Improved Symmetric Key Technique Using Randomization
Abstract
1 Introduction
2 Literature Review
3 Security Analysis of Existing Proposals
4 Proposed Technique
4.1 Encryption
4.2 Decryption
4.3 Simulation of Text Encryption and Decryption
5 Performance Comparison
5.1 Encryption and Decryption Time
5.2 Time Complexity and Cryptanalyis
6 Conclusion
References
An Interpretable SVM Based Model for Cancer Prediction in Mammograms
Abstract
1 Introduction
2 Problem Description
3 Proposed Methodology
3.1 Pre-processing
3.2 Training and Testing of SVMs
3.3 RoI Highlighting
4 Results and Discussion
5 Conclusion
References
DPVO: Design Pattern Detection Using Vertex Ordering a Case Study in JHotDraw with Documentation to Improve Reusability
Abstract
1 Introduction
2 Methodology
2.1 Rules for Vertex Ordering of Design Pattern Graph
2.2 Rules of Graph Matching Algorithm
3 Example
3.1 Implementation of Vertex Ordering of Design Pattern Graph
3.2 Implementation of Graph Matching Algorithm
4 Case Study
4.1 Outcomes of Vertex Ordering Algorithm
4.2 Outcomes of Graph Matching Algorithm
4.2.1 Documentation for Location of Design Pattern in JHotDraw Software
5 Related Work
6 Conclusion
References
Intelligent Aggregation for Ensemble LSTM
Abstract
1 Introduction
2 Problem Description
3 Aggregation of Ensemble Thinned LSTMs
3.1 Long Short Term Memory
3.2 Ensemble LSTM
3.3 Intelligent Aggregation
4 Result and Analysis
5 Conclusion
References
Optimal Low Rank Tensor Factorization for Deep Learning
Abstract
1 Introduction
2 Proposed Methodology
2.1 Tensor
2.2 Neural Learning
3 Discussion and Analysis
3.1 Implementation Details
3.2 Experimental Results
4 Conclusion
References
Performance Analysis of Naive Bayes Computing Algorithm for Blood Donors Classification Problem
Abstract
1 Introduction
1.1 Genetic Algorithm
1.2 Neural Networks
1.3 Support Vector Machine
1.4 Fuzzy Logic
1.5 Rough Sets
2 Literature Review
3 Proposed Methodology
3.1 Working Methodology of the Naive Bayes Classifier
4 Experimental Evaluation
5 Conclusion
References
Electronic Circuits for Communication Systems
Design of a Single-Ended 8T SRAM Cell for Low Power Applications
Abstract
1 Introduction
2 Proposed 8T SRAM Cell
2.1 Read Operation
2.2 Write Operation
2.3 Hold Mode
3 Simulation Results and Discussion
3.1 Hold Stability
3.2 Read Stability
3.3 Write Ability
3.4 Read/Write Delay
3.5 Read/Write Power
3.6 Leakage Power
3.7 Area
References
Y-Shaped Cantilever Beam RF MEMS Switch for Lower the Actuation Voltage
Abstract
1 Introduction
2 Proposed Design
3 Mathematical Modeling
3.1 Static Analysis
3.2 Dynamic Analysis
4 Fabrication Process
5 Simulations and Results
6 Conclusion
References
Concentric Circular Ring Arc Antenna at Dual Band for Ku Band Applications
Abstract
1 Introduction
2 CCAP Antenna Design
2.1 Antenna Configuration
3 Results and Discussion
3.1 Parametric Analysis and Radiation Patterns of CCAP Antenna
3.2 Field Distributions of CCAP Antenna
3.3 Maximum Gain
4 Conclusion
References
Design of Spider Shaped Microstrip Patch Antenna for IoT Application
Abstract
1 Introduction
2 Antenna Design
3 Simulation Results and Discussion
4 Conclusion
References
Design of Microstrip Polygon Shaped Patch Antenna for IoT Applications
Abstract
1 Introduction
2 Antenna Design
3 Simulation Results and Discussion
4 Conclusion
References
A Novel Microstrip Patch Antenna with Single Elliptical CSRR for Multiband Applications
Abstract
1 Introduction
2 Antenna Design
3 Simulation Results and Discussion
4 Conclusion
References
Analysis of Circular Ring Patch Antenna for Enhancement of Wide Bandwidth with Defected Ground Structure
Abstract
1 Introduction
2 Antenna Design
3 Results and Discussion
3.1 Parametric Analysis
3.2 Effect of R3 = R4
3.3 Radiation Patterns
3.4 Field Distributions and Maximum Gain of Proposed Antenna
4 Conclusion
References
The Analysis of U Slotted Rectangular Patch with Geometric Series DGS for Triple Band Applications
Abstract
1 Introduction
2 Antenna Design
3 Results and Discussion
3.1 Parametric Analysis
3.2 Effect of S1
3.3 Effect of D1
3.4 Radiation Patterns
3.5 Field Distributions of Proposed Antenna
3.6 Maximum Gain
4 Conclusion
References
A Dual Band Coplanar Concentric Ring Patch Antenna for Ku Band Applications
Abstract
1 Introduction
2 Antenna Design
2.1 Antenna Configuration
3 Results and Discussion
3.1 Parametric Analysis
3.2 Radiation Patterns and Field Distributions of CCAP Antenna
3.3 Maximum Gain
4 Conclusion
References
Optimal Design of CMOS Amplifier Circuits Using Whale Optimization Algorithm
Abstract
1 Introduction
2 Whale Optimization Algorithm
3 Design of Analog Circuits
4 Simulation Results
5 Conclusion
Appendix: A
References
Reliability Analysis of Comparator: NBTI, PBTI, HCI, AGEING
Abstract
1 Introduction
2 Impact of PBTI on MOSFET
3 Impact of NBTI on MOSFET
4 Impact of HCI on MOSFET
5 Simulated Reliability Graphs and Results
5.1 Effect in PMOS Due to NBTI
5.2 Effect in PMOS Due to HCI
5.3 Effect in NMOS Due to HCI
6 Conclusion
Acknowledgment
References
Sag Calculations in Transmission Line with Different Case Studies
Abstract
1 Introduction
2 Factors Affecting the Sag
2.1 Weight of Conductor
2.2 Span
2.3 Conductor Tension
3 Case Studies and Problem Formulation
3.1 Case1: Sag Calculation Without Any Load for Supports at the Same Level at Given Span
3.2 Case 2: Sag Calculation in India’s I Wind Zone (Wind Pressure Is ≤100 Kg/M2 for Tower Height 30 m or Less)
3.3 Case 3: Sag Calculation in India’s II Wind Zone
3.4 Case 4: Sag Calculation in India’s III Wind Zone
3.5 Case 5: Sag Calculation Considering the Parameters like Young’s Modulus of Elasticity and Ultimate Tensile Strength with Temperature Change
4 Conclusions
References
Dual Band Slotted Patch Microstrip Antenna Array Design for K Band Application
Abstract
1 Introduction
2 Antenna Design
3 Result and Discussion
4 Conclusion
References
A 6-Bit Low Power SAR ADC
Abstract
1 Introduction
2 Successive Approximation Register ADC Architecture
3 System Implementation
3.1 Sample and Hold Circuit
3.2 Comparator Circuit
3.3 6-Bit Digital to Analog Converter Circuit Using Transmission Gates
4 Simulation Results
5 Conclusion
References
Author Index
← Prev
Back
Next →
← Prev
Back
Next →