Version-4 (Jan-Feb 2018)
- Citation
- Abstract
- Reference
- Full PDF
- Download Cover Page
Paper Type | : | Research Paper |
Title | : | Vedic Swara Recognition System: A Move towards Vedic Chanting |
Country | : | INDIA |
Authors | : | Tapas Sangiri || Kaustav Sanyal |
: | 10.9790/0661-2001040108 |
Abstract: Being one of the oldest among scriptures, Vedic scriptures are considered to be one of the richest creations of mankind. After much demolition and ruins, the Vedic Chanting techniques are still vast and tough to learn. In chanting a Vedic verse the notes used, known as the Swaras are strictly bound by rules. Mistake in implementing one Swara is considered a serious blunder in case of Vedic chanting. The motto of this work is to analyze a Vedic chant in order to get its Swaras and to check the accuracy of the chanting signals afterwards, whether their swara implementation is proper or not. Analyzing the complexity of the chanting signals, we have done the work in two phases using two separate techniques, Mel-Frequency Cepstral Coefficient and Wavelet Transformation. As Swara system is a vast field to study and analyze, this paper has only focused on the Yajurvedic verses that deals with four major swara chanting techniques. This work can be a great advancement in order to move ourselves towards the long forgotten Vedic wisdom.
Keywords: Vedic, Chanting, Swaras, Signals, Wavelets, Signal Processing.
[1]. Ibrahim Patel, Dr. Y.Srinivas Rao, Speech Recognition Using HMM with MFCC- An Analysis Using Frequency Spectral Decomposition Technique, Signal & Image Processing: An International Journal(SIPIJ) Vol.1, No. 2, December 2010.
[2]. Garima Vyas, Malay Kishore Dutta, Hicham Atassi, Radim Burget, "Detection of chorus from an audio clip using dynamic time warping algorithm", Engineering and Computational Sciences (RAECS) 2014 Recent Advances in, pp. 1-6, 2014
[3]. T. R. Jayanthi Kumari, H. S. Jayanna, "Comparison of LPCC and MFCC features and GMM and GMM-UBM modeling for limited data speaker verification", Computational Intelligence and Computing Research (ICCIC) 2014 IEEE International Conference on, pp. 1-6, 2014
[4]. Gill KZ, Purves D (2009) A Biological Rationale for Musical Scales. PLoS ONE 4(12): e8144. doi:10.1371/journal.pone.0008144
[5]. Grinsted Jevrejeva, Riva, Dahl-Jensen (2015), Sea level rise projection for Northern Europe under RCP8.5, doi: 10.3354/cr01309
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Adaptive Trust Model for Network Integration in Dynamic Cloud Data Sharing |
Country | : | INDIA |
Authors | : | T. Aparna |
: | 10.9790/0661-2001040916 |
Abstract: The recent advances in cloud computing have risen various unanticipated security related issues in various parts of cloud situations. Among these, the issue of ensuring secure access to registering assets in the cloud is gathering unique consideration. In this paper, we deliver open issues identified with confide in cloud situations proposing another trust demonstrate for distributed computing which considers a larger amount see cloud assets. A reenactment of trust estimation between the hubs of the mists is performed. The recreation was conceivable to confirm that a hub is solid when it achieves the base file of trust.
Keywords: Cloud Computing; Distributed Computing; Security;Integrity;Confidentiality;Trust and Availability.
[1]. Chen Kang and Zen WeiMing, "Cloud computing: system instance and current research," Journal of Software, pp. 20(5):1337-1347. 2009.
[2]. Minqi Zhou, Rong Zhang, Dadan Zeng, and Weining Qian, "Services in the cloud computing era: a survey," Software Engineering Institute. Universal Communication. Symposium (IUCS), 4th International. IEEE Shanghai, pp. 40-46. China. 978-1-4244-7821-7 (2010).
[3]. A. Marinos and G. Briscoe, "Community cloud computing," in First International Conference Cloud Computing, CloudCom, volume 5931 of Lecture Notes in Computer Science, pp. 472–484. Springer (2009).
[4]. Zhao-xiong Zhou, He Xu, and Suo-ping Wang, "A Novel Weighted Trust Model based on Cloud," AISS: Advances in Information Science and Service Sciences, Vol. 3, No. 3, pp. 115- 124, April 2011.
[5]. Wang Han-zhang and Huang Liu-sheng, "An improved trusted cloud computing platform model based on DAA and Privacy CA scheme," IEEE International Conference on Computer Application and System Modeling (ICCASM 2010). 978-1-4244-7235-2. 2010.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: In recent years, along with technological advances such as information and communication technology and convergence, major forms of infrastructure have different characteristics from their predecessors. As the environment surrounding them has changed, new types of risks have emerged which could pose serious security threats. In this paper, we analyze the new threats caused by environmental changes in critical infrastructure, and compare cyber security policy and systems of critical infrastructure of major countries (the US, EU, Japan, and Korea). In order to strengthen the cyber security of such infrastructure, institutional improvement, framework design, and systems sharing is being promoted. This is also required for securing international trust for international cyber security.
Keywords: Critical Infrastructure, Cyber Security Policy, New security threats.
[1]. John D. Moteff(2015), "Critical Infrastructures: Background, Policy, and Implementation", Congressional Research Service, Pages
[2]. 3-4.
[3]. Keith Stouffer, Victoria Pillitteri, Marshall Abrams, Adam Hahn(2015), "Guide to Industrial Control Systems(ICS)
[4]. Security(Revision 2)", NIST, pages 16-20.
[5]. WHITE HOUSE(2013), "Homeland Security Presidential Directive 7: Critical infrastructure identification, prioritization, and protection", www.whitehouse.gov/news/releases/2003/12/20031217-5.html.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Internet banking system facilitates the banking services via internet using web-based application. Here user id and password are the two parameters used for authenticating the user. This paper highlights the technologies used in internet banking and aims for improving the security associated with the internet banking services. In addition to current security, biometric of the user can be used. And this communication can be secured by using Cryptography and Steganography. Cryptography can be implemented by Transpositional pixel by spiral method and Steganography by LSB replacement method..
Keywords: Biometric authentication, Cryptography, LSB, Steganography, Transposition pixel..
[1]. Jebaline, G. Renee, and S. Gomathi. "A novel method to enhance the security of ATM using biometrics." Circuit, Power and Computing Technologies (ICCPCT), 2015 International Conference on. IEEE, 2015
[2]. Singh, Maninder, Shahanaz Ayub, and Raghunath Verma. "Enhancing Security by averaging multiple fingerprint images." Communication Systems and Network Technologies (CSNT), 2013 International Conference on. IEEE, 2013
[3]. Hyder Yahya Atown,"Hide and Encryption Fingerprint Image by using LSB and Transposition Pixel by Spiral Method", ICSJMC
[4]. Bhosale, S. T., and B. S. Sawant. "Security in e-banking via card less biometric atms." International Journal of Advanced Technology & Engineering Research 2.4 (2012): 457-462.
[5]. Bansal, Roli, Priti Sehgal, and Punam Bedi. "Minutiae extraction from fingerprint images-a review." arXiv preprint arXiv:1201.1422 (2011).
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Personalized Mobile Search Engine |
Country | : | INDIA |
Authors | : | G.Niveditha |
: | 10.9790/0661-2001042629 |
Abstract: We have already browser in mobile. Whenever we surf for data in mobile that related links will be displayed in list view. User can click on particular link then go to another page and displayed link related information on that page. So we propose a personalized mobile search engine (PMSE) that captures the users' preferences in the form of concepts by mining their click through data. Surf your favourite data quickly and easily. Every click the website link can be saved automatically. Whenever we launch this app and search for any data, you can avoid the step of each time selecting the web pages to open and then open them one by one. Instead we are personalizing the search data such a way that will be displayed in tabs view and every link have a particular web view below to it. So user can directly view the particular link related information in the below the web view and searched data automatically get stored in the database when we click on the results one by one.
Keywords: Google API, JSON Parsing, search engine.
[1]. We will be using the information collected from websites like
[2]. http://developer.android.com/index.html
[3]. http://www.android-trainer.com/
[4]. http://stackoverflow.com/
[5]. http://www.google.co.in/.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: IEEE 802.11 is a major key technology used in most of the sensor network. Increasing in sensor devices and rise of Internet of Things (IoT) technology allows excessive amount of device communication through Wi-Fi network. Due to open air communication as medium the Wi-Fi frames are prone to attacks such as DDoS, MiTM, Rogue Access Point etc. Most of the DDoS attacks against wireless network is due to deauthentication frames created by the attacker against the legitimate client and AP. This Deauthentication attacks are the major problem of the 802.11 standard. Hence to mitigate the problem, a novel Wireless Intrusion Detection and Prevention System (WIDPS) is designed and developed. The proposed WIDPS is lightweight when compared to state of the art techniques and detects the attack with high accuracy & low false positive rate. The proposed IDPS uses minimalistic technique which can be easily adopted and deployed on any open and encrypted networks.
Keywords: Wireless Intrusion Detection and Prevention System, DDoS, MiTM, 802.11 frames, Wi-Fi, IoT..
[1]. R. Mohan, V. Vaidehi, Ajay Krishna A, Mahalakshmi M and S. S. Chakkaravarthy, "Complex Event Processing based Hybrid Intrusion Detection System," 2015 3rd International Conference on Signal Processing, Communication and Networking (ICSCN), Chennai, 2015, pp. 1-6.
[2]. Ethala, K., Sheshadri, R., & Chakkaravarthy, S. S. (2014). WIDS Real-Time Intrusion Detection System Using Entrophical Approach. Advances in Intelligent Systems and Computing Artificial Intelligence and Evolutionary Algorithms in Engineering Systems, 73-79. doi:10.1007/978-81-322-2126-5_9
[3]. S.Sibi Chakkaravarthy, V.Vaidehi; "Behavior based anomaly detection model for. detecting wireless covert attacks in Wi-Fi", Security and Privacy Symposium, 2015, IIITD, February 13-14,2015.
[4]. J. Milliken, V. Selis, K. M. Yap and A. Marshall, "Impact of Metric Selection on Wireless DeAuthentication DoS Attack Performance," in IEEE Wireless Communications Letters, vol. 2, no. 5, pp. 571-574, October 2013.
[5]. K. El-Khatib, "Impact of Feature Reduction on the Efficiency of Wireless Intrusion Detection Systems," in IEEE Transactions on Parallel and Distributed Systems, vol. 21, no. 8, pp. 1143-1149, Aug. 2010..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Practical Qkd For Both Bb84 And Sarg04 Protocols |
Country | : | Saudi Arabia |
Authors | : | Majdi Abdellatief || Sellami Ali || Mohammed A Alanezi |
: | 10.9790/0661-2001043747 |
Abstract:A decoy state method based on one decoy state protocol has been derived for both BB84 and SARG04. This method can give a different lower bound of the fraction of single-photon counts ( ) 1 y and the fraction of two-photon counts ( ) 2 y , the upper bound QBER of single-photon pulses( 1 e ), the upper bound QBER of two-photon pulses( 2 e ), and the lower bound of the key generation rate for both BB84 and SARG04. The estimations have demonstrated that a decoy state protocol with only one decoy state ( v0 ) can approach the theoretical limit, and the estimations have provided an optimal key generation rate, which is the same as having an infinite number of decoy states for BB84 and SARG04.This finding has led to the introduction..........
Keywords: Quantum cryptography, Quantum key distribution, Decoy state protocol and Optical communication.
[1]. C.H. Bennett and G. Brassard, in : Proc. IEEE Int. Conf. on Computers, systems, and signal processing, Bangalore (IEEE, New York,
1984) p.175.
[2]. D. Mayer, J. Assoc. Comput. Mach. 48, 351 (2001). Its preliminary version appeared in"Advances in Cryptology-Proc. Crypto'96, Vol.
1109 of Lecture Notes in Computer Science,Ed. N. Koblitz, Springer-Verlag, New York, 1996, p. 343.
[3]. P.W. Shor and J. Preskill, Phys. Rev. Lett. 85, 441 (2000).
[4]. A.K. Ekert, Phys. Rev. Lett. 67, 661 (1991), C.H. Bennett, D.P. DiVincenzo, J.A. Smolin,and W.K. Wootters, Phys. Rev. A 54, 3824
(1996); A.K. Ekert, Phys. Rev. Lett. 67, 661(1991), C.H. Bennett, D.P. DiVincenzo, J.A. Smolin, and W.K. Wootters, Phys. Rev. A
54,3824 (1996).
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Nowadays the amount of data on the web is persistently growing. Due to the enormous amount of data available on the World Wide Web, the processing cannot be done manually. As data have been primary resource, how to manage and make use of big data superior has attracted much consideration. In particular, with the development of the internet of things (IOT), the processing of the enormous amount of real-time data has become a significant challenge in research and applications. In this context, Apache Flink is an open-source system for processing streaming and batch data. The Flink is a big data processing framework that permits programmers to process the enormous amount of data in a very scalable and dexterous manner............
Keywords: Big Data, Apache Flink, Hadoop, Flink Ecosystem, YARN, Flink Architecture, Data Processing.
[1]. Prof. Dr. Philippe Cudré-Mauroux, "An Introduction to BIG DATA", June 6, 2013 Alliance EPFL, www.alliance-tt.ch/manifestations/24/docs/
[2]. Dr. Yusuf Perwej, "An Experiential Study of the Big Data,"International Transaction of Electrical and Computer Engineers System (ITECES), USA, ISSN (Print): 2373-1273 ISSN (Online): 2373-1281, Vol. 4, No. 1, page 14-25, March 2017.DOI:10.12691/iteces-4-1-3.
[3]. "Apache Hadoop," Apache. [Online]. Available: http://hadoop.apache.org/. [Accessed: 18-Feb-2015].
[4]. NikhatAkhtar, FirojParwej, Dr. Yusuf Perwej, "A Perusal Of Big Data Classification And Hadoop Technology," for published in the International Transaction of Electrical and Computer Engineers System (ITECES), USA, ISSN (Print): 2373-1273 ISSN (Online): 2373-1281, Vol. 4, No. 1, page 26-38, May 2017, DOI:10.12691/iteces-4-1-4.
[5]. Lee, D., Kim, J.-S., &Maeng, S. "Large-scale incremental processing with MapReduce", Future Generation Computer Systems, 36, pp66–79, (2014), doi:10.1016/j.future.2013.09.010.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Terrorist groups like ISIS and Jihadist are spreading their propaganda online using various forms of social networks like Facebook, Twitter, and YouTube. Best way to stop these groups is to suspend accounts that spread propaganda to harm living being and hurt any religious place or monuments. This can be done by analysts manually read and analyze an enormous amount of information on social media. Our proposed methodology is to attempt an automatically detect radical content that is released by jihadist and Terrorist groups on Twitter. We are using a branch of Artificial Intelligence i.e. Machine learning to classify a tweet as radical or non-radical and generate results which indicate that an automated approach to aid analysts detecting radical content on social media.
Keywords: Twitter, YouTube, Facebook, Machine Learning, Text Classification, NLP,and Naïve Bayes.
[1]. http://ieeexplore.ieee.org/document/7842262/
[2]. https://www.sciencedirect.com/science/article/pii/S2090447914000550
[3]. http://uu.diva-portal.org/smash/get/diva2:846343/FULLTEXT01.pdf
[4]. Devin R Springer. Islamic radicalism and global jihad. Georgetown University Press, 2009.
[5]. Security Council Adopts Resolution 2170. http://www.un.org/press/en/2014/sc11520.doc.htm, 2014. [Online; accessed 20-June-2015].
[6]. Mujahideen. http://terrorism.about.com/od/m/g/Mujahideen.htm. [Online; accessed 10-June-2015].
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Recognition of Objects using SVM |
Country | : | INDIA |
Authors | : | Himanshu Bhusan Mohapatra || Manas Ranjan Sethi |
: | 10.9790/0661-2001046370 |
Abstract:In this paper Object Recognition technique is proposed, that produce the best idea to recognize the
object from the given input image and it is implemented in MATLAB tool. The past few years, SVM has been
applied and estimated only as pixel-based image classifiers. Recently pixel based process moving towards
object recognition technique. In an analysis, the SVMs performances are compared with some other classifiers
such that BPN classifier and KNN classifier. This technique is obtained by extracting the energies from wave
atom transform. The extracted features are given to the SVM classifier as an input and recognize the
corresponding image in an object. Finally the experimental results are shown for COIL-100 database. The
result of our proposed method is evaluated to increasing the rate of recognition accuracy and correct
recognition rate..
Keywords: Object Recognition, Wave Atom Transform, SVM Classifier, Classification Rate, Feature Extraction
[1] Shailedra Kumar Shrivastava, Sanjay S. Gharde. Support Vector Machine for Handwritten Devanagari Numeral Recognition.
International Journal of Computer Applications (0975– 8887) Volume 7– No.11, October 2010.
[2] Hitoshi Sakano, Naoki Mukawa, and Taichi Nakamura, Electronics and Communications in Japan, Part 2, Vol. 88, No. 6, 2005.
[3] Le Hoang Thai. Image Classification using Support Vector Machine and Artificial Neural Network. I.J. Information Technology
and Computer Science, 2012, vol.5, pp.32-38.
[4] Patrik KAMENCAY, Martina ZACHARIASOVA, Robert HUDEC, Roman JARINA, Miroslav BENCO, Jan HLUBIK. A Novel
Approach to Face Recognition using Image Segmentation Based on SPCA-KNN Method. Radio Engineering, VOL. 22, NO. 1,
APRIL 2013.
[5] Luis Malago´n-Borja, Olac Fuentes. Object detection using image reconstruction with PCA. Image and Vision Computing,
ELSEVIER. 2007.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | The usage of Monopole antenna in Airborne activity |
Country | : | INDIA |
Authors | : | Vikas Ranjan || Monalisa Samal |
: | 10.9790/0661-2001047176 |
Abstract:AcompactprintedwidebandantennaoperatinginVHFbandwithsimplegeometry and nearly omni
directional radiation characteristics is presented for airborne applications. The monopole antennas used in
VHF airborne communications have height constraints as well as ground plane size constraints. This Letter
proposes a printed monopole antenna with very compact size for airborne application which overcomes the
ground plane size constraints of monopole antennas. The size of the proposed antennais 0.063λ0 X0.118λ0, and
the groundplanesizeis0.025λ0X0.132λ0 where λ0 is the free space wavelength at lowest frequency of operation.
The antenna achievesaheightreductionof75%comparedtoaconventionalquarterwavemonopole antenna. It also
exhibits a 3:1 VSWR bandwidth of 32% in VHFband.....
Keywords: Airborne, Compact, Reduced Ground Plane, VHF, Wideband Antenna
[1] Thereza M. Macnamara, Introduction to antenna placement and installation John Wiley& Sons, Ltd. United Kingdom,2010.
[2] Weiner,M.,Monopoleelementatthecenterofacirculargroundplanewhoseradiusissmall or comparable to a wavelength, IEEE
Transactions on Antennas and Propagation, May. 1987 Vol.35, Issue 5, pp. 488-495, DOI:10.1109/TAP.1987.1144136
[3] James WIcLean, Marta Lcuvano, and Heinrich Foltz, Reduced-size, folded ground plane forusewithlowprofile,
broadbandmonopoleantennas,RadioandWirelessConference,August 1999. DOI: 10.1109/RAWCON.1999.810974
[4] Spencer Collins, Yahia M.M. Antar, Antenna with a reduced ground plane size, IEEE Antennas and Propagation Society
International Symposium, 2002, Vol.1, pp 6-9. DOI: 10.1109/APS.2002.1016238
[5] S.Liml,R.L. Rogers2andH.Ling,Groundplanesizereductioninmonopoleantennasfor ground wave transmission, IEEE Antennas and
Propagation Society International Symposium, 2005, Vol.1B, pp 406-409. DOI:10.1109/APS.2005.1551578
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Vehicle Navigation System using ANDROID |
Country | : | INDIA |
Authors | : | Ipsita Samal || Pallavi Priyadarshini |
: | 10.9790/0661-2001047780 |
Abstract:The main contribution of this research is an enhanced level of reliability in the navigation solutions of
GPS-denied environments. The research on aiding navigation applications is a very important topic nowadays
due to the enormous need for reliable navigation solution that account for different applications. The developed
map aided, low-cost, user-friendly navigation system can be used in many systems such as in- vehicle navigation
or smartphone location-based tools
Keywords: Android, GPS and GIS
[1] Deepesh Namdev, S. Mangal, M.Singh, ImageProcessing with GIS and ERDAS, LAMBERT Academic publishing, 2012
[2] "Global Positioning System, Hereafter Referred to as GPS, is A Space-Based Radio Navigation System Owned by The United
States Government (USG) and Operated by The United States Air Force(USAF)."
[3] "GPS: Global Positioning System (or Navstar Global Positioning System)" Wide Area Augmentation System (WAAS) Performance
Standard, Section B.3, Abbreviations and Acronyms.
[4] J.B. Bullock, E.J. Krakiwsky, Analysis of The Use of Digital Road Maps In Vehicle Navigation The 1994 IEEE Position Location
and Navigation Symposium, Las Vegas, 1994.
[5] J.Parthasarathy, International Archives of the Photogrammetry, Remote Sensing and Spatial Information Science, Tokyo Japan2006