Efficient Simulation of SoC based on Design Checkpointing for Efficient Debugging
Research Paper | Journal Paper
Vol.5 , Issue.7 , pp.56-60, Jul-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i7.5660
Abstract
As the complexity of SoC design increases, functional verification of full chip takes more time and to verify the complete functionality of the design, many test cases need to be run. Here the simulation of DUT (Design-under-Test) is an important step to perform functional verification, which may require hours or days together for simulation. This can significantly impact on overall development time and time-to-market. The ability to restore regressions from a previously saved state can reduce considerably the development and debug cycle, thereby enhancing the productivity. This paper details a tool based checkpoint methodology for efficient simulation of Industrial SoC designs. This simulation checkpoint technique can greatly impact on reducing the development and debug cycle. Instead of saving the entire simulation state, only essential state of the simulation can be saved and the regressions are restored from that saved point in more dynamic way. It also describes how to avoid initial setup phase (RESET Phase) which is common for all test cases. These Checkpoint-restore techniques have been implemented to speed-up simulation of register-transfer level models and its effect on applying it to industrial SOC designs. In this Proposed work the experimental results on Industrial designs reveals that reset step which consumes approximately 17 hrs. can be restored in 43 minutes, saving almost 16 hrs. of simulation time for each of the testcases.
Key-Words / Index Term
Checkpointing, Save/restore, simulation based functional verification
References
[1] Kyuho Shim, Youngrae Cho, Namdo Kim, Hyuncheol Baik, Kyungkuk Kim, Dusung Kim, Jaebum Kim, Byeongun Min, Kyumyung Choi, Maciej Ciesielski, Seiyang Yang, “A Fast Two-pass HDL Simulation with On-Demand Dump”, in Design Automation Conference, 2008 (ASPDAC 2008) Asia and South Pacific, 21-24 March 2008.
[2] K. Arya, R. Garg, A. Y. Polyakov, and G. Cooperman, “Design and implementation for checkpointing of distributed resources using process level virtualization”, in IEEE Int. Conf. on Cluster Computing (Cluster16). IEEE Press, 2016.
[3] M. Monton, J. Engblom, C. Schrder, J. Carrabina, and M.Burton, “Checkpoint and Restore for SystemC Models” in Advances in Design Methods from Modeling Languages for Embedded Systems and SoCs. Springer, 2010.
[4] Bogdan- Andrei Tabacaru, Moomen Chaari, Wolfgang Ecker, Thomas Kruse, and Cristiano Novello “Efficient Checkpointing-Based SafetyVerification Flow Using Compiled-Code Simulation”, Euromicro Conference on Digital System Design, 2016.
[5] B.A. Tabacaru, M. Chaari, W. Ecker, T. Kruse, and C. Novello, “Comparison of Different Fault-Injection Methods into TLM Models”, Resiliency in Embedded Electronic Systems (REES), 1st International ESWEEK Workshop on, pp. 16, 2015.
Citation
Nikhil K.M., Veena M.B., "Efficient Simulation of SoC based on Design Checkpointing for Efficient Debugging," International Journal of Computer Sciences and Engineering, Vol.5, Issue.7, pp.56-60, 2017.
Content Caching and Multicasting of 5G Hetrogeneous Cellular Wireless Networks
Research Paper | Journal Paper
Vol.5 , Issue.7 , pp.61-66, Jul-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i7.6166
Abstract
D2D correspondence engine helped by a phone network brings the advantage of the vicinity of wireless devices to support reusing assets amongst D2D and cell UEs, and bestows any prizes of bounce pick up. 3GPP began a review thing on vicinity based administrations in D2D. SAE plan for a D2D network, which joins the center and get to, the protocol stack for D2D correspondence and totally extraordinary readying circumstances, style parts of D2D correspondence, control administration and direct measuring routes in D2D correspondence and totally unique building obstructs for D2D correspondence that are compulsory though fitting the D2D session, and, additionally, develops the use cases, business, and chances of uses that exist. In this paper introducing some concept to improve energy efficiency of 5G little bit more. That performance improvement satisfy demand on mobile data with minimal energy expenditures. This excellent development is achieved by combine the concept of caching and multicast. Caching procedure is based on the idea of storing the popular content at the Small-cell Base Stations via backhaul links. Multicast is used to reduce energy and bandwidth consumption of wireless network by serving concurrent user requests for the same content via common multicast stream. Combination of Cache and multicast is effective when there is occurring repeated requested for a few content files appear over time. It can indeed reduce energy costs. The gains over existing caching schemes are 19% when users tolerate delay of three minutes, increasing further with the sharpness of content access pattern.
Key-Words / Index Term
D2D Communication, 5G Network, WSN, Cache
References
[1] P. Ostovari, A. Khreishah, and J. Wu, “Cache Content Placement Using Triangular Network Coding,” in IEEE, pp. 1375–1380, Apr, 2013.
[2] K. Poularakis, G. Iosifidis, V. Sourlas, and L. Tassiulas, “Multicast-aware caching for small-cell networks,” in IEEE, pp. 2300–2305, Apr. 2014.
[3] M. Dehghan, “On the complexity of optimal routing and content caching in heterogeneous networks,” in IEEE, pp. 936–944, Apr. 2015.
[4] Neelam Yadav, Rajeev Paulus, A.K Jaiswal and Aditi Agrawal, “Analysis the Services of Multicast and Broadcast in Heterogeneous Network using QualNet6.1” in International Journal of Computer Applications, Vol.121, issue-6, pp:0975 – 8887, July 2015.
[5] B.Palguna kumar and B.Purushotham, “Efficient resource allocation for wireless multicast in Heterogeneous Network,” in International Journal of Advanced Research in Computer Science and Software Engineering, Vol.2, Issue-4, pp-387–400, Apr.2012.
[6] Bo Zhou, Ying Cui and Meixia Tao, “Stochastic Content-Centric Multicast Scheduling for Cache-Enabled Heterogeneous Cellular Networks”, IEEE Transactions on Wireless Communications, Vol. 15, Issue- 9 pp- 6284 – 6297 ,2016.
[7] Sheng Zhou, Jie Gong, Zhenyu Zhou, Wei Chen and Zhisheng Niu, “GreenDelivery: Proactive Content Caching and Push with Energy Harvesting-based Small Cells”, IEEE Communications Magazine, Vol.53, Issue: 4, pp-142 – 149, 2015.
[8] Georgios Paschos, Ejder Bastug, Ingmar Land, Merouane Debbah and Giuseppe Caire, “Wireless Caching: Technical Misconceptions and Business Barriers”, in IEEE, Vol.54, Issue-8, pp-16–22, 2016.
[9] N.Choi, K.Guan, D.C.Kilper, and G.Atkinson, “In-network caching effect on optimal energy consumption in content-centric networking,” in Proc. IEEE Int. Conf. Commun., Jun. 2012, pp. 2889–2894.
[10] A. Hayrapetyan, D. Kempe, M. P’al, and Z. Svitkina, “Unbalanced graph cuts,” in Proc. Eur. Symp. Algorithms (ESA), Oct. 2005, pp. 191–202.
[11] C.Jasmin Selvi, G.Sathish Kumar, "An Adaptive Double-Quality-Guaranteed (DQG) Scheme based Quality of Service (QOS) in Heterogeneous Cloud Environment", International Journal of Computer Sciences and Engineering, Vol.4, Issue.4, pp.258-265, 2016.
[12] D.Bertsimas and J.N.Tsitsiklis, Introduction to Linear Optimization. Belmont, MA, USA: Athena Scientific, 1997.
[13] Y. Sun et al., “Trace-driven analysis of ICN caching algorithms on videoon- demand workloads,” in Proc. ACM Int. Conf. Emerging Netw. Exp.Technol. (CoNEXT), Dec. 2014, pp. 363–376.
[14] F. Pantisano, M. Bennis, W. Saad, and M. Debbah, “In-network Caching and Content Placement in Cooperative Small Cell Networks,” in Proc. Int. Conf. 5G Ubiq. Connect. (5GU), Nov. 2014, pp. 128–133.
[15] K. Hamidouche, W. Saad, and M. Debbah, “Many-to-Many Matching Games for Proactive Social-Caching in Wireless Small Cell Networks,” in Proc. Int. Symp. Model. Optim. Mobile Ad Hoc Wireless Netw. (Wiopt), May 2014, pp. 569–574.
[16] H.K. Dandage, V.S. Gaikwad, "Device-to-Device Communication in Wireless Network using mmWave within Small Cells and Exploiting Spatial Reuse", International Journal of Computer Sciences and Engineering, Vol.5, Issue.1, pp.75-79, 2017.
[17] P. Ostovari, A. Khreishah, and J. Wu, “Cache Content Placement Using Triangular Network Coding,” in Proc. IEEE Wireless Commun. Netw.Conf. (WCNC), Apr. 2013, pp. 1375–1380.
[18] A. Kumar and W. Saad, “On the Tradeoff between Energy Harvesting and Caching in Wireless Networks,” in Proc. IEEE Int. Conf. Commun. Workshop (ICCW), Jun. 2015, pp. 1976–1981.
[19] M. Erol-Kantarci, “Content Caching in Small Cells with Optimized Uplink and Caching Power,” in Proc. IEEE Wireless Commun. Netw.Conf. (WCNC), Mar. 2015, pp. 2173–2178.
Citation
P. Charanya, A. Pavithra, "Content Caching and Multicasting of 5G Hetrogeneous Cellular Wireless Networks," International Journal of Computer Sciences and Engineering, Vol.5, Issue.7, pp.61-66, 2017.
Simulation Survey of RSA and Its Variants
Survey Paper | Journal Paper
Vol.5 , Issue.7 , pp.67-70, Jul-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i7.6770
Abstract
Cryptography is used in securing data transmission over insecure networks. The selection of algorithm requires the condition of fulfillment of authentication, confidentiality, integrity and non-repudiation. Among all public key encryption algorithms, RSA is globally accepted encryption algorithm due to its hardness against various possible attacks. In this paper, we studied RSA, enhanced RSA, Elgamal, chinese remainder theorem (CRT) based RSA, multi-power RSA, three-prime RSA and Elgamal-RSA cryptosystem.
Key-Words / Index Term
CRT, Elgamal, Multi-prime RSA, Security, Three-prime RSA
References
[1] Sarika Khatarkar and Rachana Kamble, "Encrypted RSA Public Key Sharing By Using Image Pixel Color Value", International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.231-235, 2015.
[2] A. Menezes, P. van Oorschot and S. Vanstone, “Handbook of applied cryptography”, CRC Press, 1996.
[3] Cetin Kaya Koc, “High speed RSA implementation”, Technical Report, RSA Laboratories, California, 1994.
[4] T. Takagi., “Fast RSA-type cryptosystem modulo pkq”, In the Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO 1998), Santa Barbara, California, USA, pp.318-326, 1998.
[5] Yonghong Yang, Z. Abid and Wei Wang, “CRT-based three-prime RSA with immunity against hardware fault attack”, In the Proceedings of the 4th IEEE International Workshop on System-on-Chip for Real-Time Applications (IWSOC 2004), Banff, Alta., Canada, pp.73-76, 2004.
[6] Anand Krishnamurthy, Yiyan Tang, Cathy Xu and Yuke Wang, “An efficient implementation of multi-prime RSA on DSP processor”, In Proceedings of the 2003 IEEE lnternational Conference on Acoustics, Speech and Signal Processing (ICASSP 2003), Hong Kong, China, pp.413-416, 2003.
[7] Al-Hamami, A. H., Aldariesh, I. A., “Enhanced method for RSA cryptosystem algorithm”, In the Proceedings of IEEE Advanced Computer Science Applications and Technologies (ACSAT), Kuala Lumpur, Malaysia, pp.402-408, 2012.
[8] S. Mewada, P. Sharma and S. S. Gautam, "Exploration of efficient symmetric algorithms," 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), India, pp. 663-666, 2016.
[9] Rashmi Singh and Shiv Kumar, “Elgamal’s algorithm in cryptography”, International Journal of Scientific and Engineering Research, Vol.3(12), pp.1-4, 2012.
[10] Ahmed, J. M. and Ali, Z. M, “The enhancement of computation technique by combining RSA and Elgamal cryptosystems”, In the Proceedings of IEEE Electrical Engineering and Informatics (ICEEI 2011), Bandung, Indonesia, pp.1-5, 2011.
[11] Mini Malhotra, “A new encryption scheme based on enhanced RSA and Elgamal”, International Journal of Emerging Technologies in Computational and Applied Sciences, Vol.14(336), pp.138-142, 2014.
[12] Cay S. Hostmann and Gary Cornell, “Core Java,” Volume 1-Fundamentals, Nineth Edition, Prentice Hall, USA, 2013.
[13] Cay S. Hostmann and Gary Cornell, “Core Java,” Volume 2-Advanced Features, Nineth Edition, Prentice Hall, USA, 2013.
Citation
R. Kumar, A.K. Jain, "Simulation Survey of RSA and Its Variants," International Journal of Computer Sciences and Engineering, Vol.5, Issue.7, pp.67-70, 2017.
CNN Based Handwritten Devanagari Digits Recognition
Review Paper | Journal Paper
Vol.5 , Issue.7 , pp.71-74, Jul-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i7.7174
Abstract
Handwritten Digit Recognition has huge demand in commercial, administrative and academic domains. In recent years lot of good work has been done to improve accuracy of Handwritten Digit Recognition System but accuracy of such systems depend on large datasets. Deep Convolutional Neural Network have shown superior results to traditional shallow net-works in many recognition task. In this paper, a convolutional neural network (CNN) based Devanagari digit recognition system is highlighted. The dataset contains 21969 hand written 28x28 size images. The result of proposed system showed 99.07% accuracy on our dataset.
Key-Words / Index Term
Devanagri Digits, CNN, SVM, KNN, CUDA, GPU,Tensorflow
References
[1] N. Matic, I. Guyon, J. Denker and V. Vapnik, "Writer-adaptation for on-line handwritten character recognition," Document Analysis and Recognition, 1993., Proceedings of the Second International Conference on, Tsukuba Science City, 1993, pp. 187-191.
[2] C. Wu, W. Fan, Y. He, J. Sun and S. Naoi, "Handwritten Character Recognition by Alternately Trained Relaxation Convolutional Neural Network," 2014 14th International Conference on Frontiers in Handwriting Recognition, Heraklion, 2014, pp. 291-296.
[3] Sreedharamurthy S K and H.R.Sudarshana Reddy, "Feature Subset Selection Using Genetic Algorithms for Handwritten Kannada Alphabets Recognition", International Journal of Computer Sciences and Engineering, Vol.3, Issue.6, pp.94-99, 201
[4] Loc Thanh Huynh, Hung Thang Phung andToai QuangTon, "Using Convolutional Neural Network to Recognize Handwritten Digits", International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.203-206, 2015.
[5] S.U. Bohra, P.V. Ingole , "Review on Neural Network Based Approach Towards English Handwritten Alphanumeric Characters Recognition", International Journal of Computer Sciences and Engineering, Vol.1, Issue.3, pp.22-25, 2013.
[6] Mohd. Aquib Ansari, Diksha Kurchaniya, Manish Dixit, Punit Kumar Johari, "An Effective Approach to an Image Retrieval using SVM Classifier", International Journal of Computer Sciences and Engineering, Vol.5, Issue.6, pp.62-72, 2017.
[7] S. Lee, S. J. Son, J. Oh and N. Kwak, "Handwritten Music Symbol Classification Using Deep Convolutional Neural Networks," 2016 International Conference on Information Science and Security (ICISS), Pattaya, 2016, pp. 1-5.
[8] A. Mowlaei and K. Faez, "Recognition of isolated handwritten Persian/Arabic characters and numerals using support vector machines," 2003 IEEE XIII Workshop on Neural Networks for Signal Processing (IEEE Cat. No.03TH8718), 2003, pp. 547-554.
[9] A. M. S. Chowdhury and M. S. Rahman, "Towards optimal convolutional neural network parameters for bengali handwritten numerals recognition," 2016 19th International Conference on Computer and Information Technology (ICCIT), Dhaka, 2016, pp. 431-436.
Citation
Gaurav Kumar, Sachin Kumar, "CNN Based Handwritten Devanagari Digits Recognition," International Journal of Computer Sciences and Engineering, Vol.5, Issue.7, pp.71-74, 2017.
Sentiment Analysis using Naïve bayes Algorithm
Review Paper | Journal Paper
Vol.5 , Issue.7 , pp.75-77, Jul-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i7.7577
Abstract
Sentiment analysis is trending topic of research which works on data which is got from review websites, social networks. Today users having common platforms like Blogs, micro blogs, review sites, twitter and other social networks through which they can post their feedbacks. Organizations use Sentiment Analysis to understand user’s reviews and feedbacks about the product which they have released. In this project development of a Sentiment analysis using a generic method which can be applied for sentiment analysis as well as Emotional Analysis, product reviews is done based on Naïve Bayes classifier method. Naive bayes Classifier is the better choice for Sentiment Analysis as it is more efficient and gives Quick results compared to other techniques such as Support Vector Machine and Maximum Entropy.
Key-Words / Index Term
Sentiment Analysis, Modified k means, NLP, Opinion Mining
References
[1]. O. Coban and B. O. and G. T. Ozyer, “A Comparison of Similarity Metrics for Sentiment Analysis on Turkish Twitter Feeds,” 2015 IEEE International Conference on Smart City /SocialCom /SustainCom (SmartCity), Dec. 2015.
[2]. Pablo Gamallo, CITIUS, Univ. de Santiago de Compostela Citius: “A Naive-Bayes Strategy for Sentiment Analysis on English Tweets” Proceedings of the 8th International Workshop on Semantic Evaluation(SemEval 2014), pages 171–175, Dublin, Ireland, 2014
[3]. Shakhy P S and Vidya K S, "A Survey on KASR for Big Data Applications", International Journal of Computer Sciences and Engineering, Vol.3, Issue.4, pp.85-89, 2015.
[4]. Ashish Shukla, Rahul Mishra, “Sentiment Classification and Analysis using Modified K-means and naïve Bayes Algorithm” International journal of Advanced Research in computer science and Software Engineering. Volume 5, Issue 8, August 2015.
[5]. J. Kaur, S.S. Sehra, S.K. Sehra, "A Systematic Literature Review of Sentiment Analysis Techniques", International Journal of Computer Sciences and Engineering, Vol.5, Issue.4, pp.22-28, 2017.
[6]. U. Aggarwal, G. Aggarwal, "Sentiment Analysis : A Survey", International Journal of Computer Sciences and Engineering, Vol.5, Issue.5, pp.222-225, 2017.
[7]. D.M. Blei, A.Y. Ng, and M.I. Jordan, “Latent Dirichlet Allocation,” J. Machine Learning Research, vol. 3, pp. 993-1022, 2003.
[8]. C.P. Robert and G. Casella, “Monte Carlo Statistical Methods, second ed. Springer Publisher 2005.
[9]. S. Morinaga, K. Yamanishi, K. Tateishi, and T. Fuku-shinna, “Mining Product Reputations on the Web,” Proc. Eighth ACM SIGKDDInt’l Conf. Knowledge Discovery and Data Mining (SIGKDD ’02), pp. 341-349, 2002.
[10]. [10] M. Hu and B. Liu, “Mining and Summarizing Customer Reviews,” Proc. 10th ACM SIGKDD Int’l Conf. Knowledge Discovery and Data Mining (SIGKDD ’04), pp. 168-177, 2004.
Citation
Pramod M. Mathapati, A.S. Shahapurkar, K.D. Hanabaratti , "Sentiment Analysis using Naïve bayes Algorithm," International Journal of Computer Sciences and Engineering, Vol.5, Issue.7, pp.75-77, 2017.
A Review on Voice Control Home Environment to Ease of Use for Disabled Persons
Review Paper | Journal Paper
Vol.5 , Issue.7 , pp.78-81, Jul-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i7.7881
Abstract
This era is famous for digital automations which turned our lives more comfortable and effective. Almost every home appliances control through remote device or automatic accordingly. It’s very easy to put remote aside and use when required but for disabled person whose life is not easy as we have. They survives in their daily lives which indeed harder than normal people. So, we require more intelligent systems which may control through voice command with high level of accuracy which turn their life easier. We have so many home appliances which require turning off or on timely to aware from any casualty. This paper proposed an intelligent system which is able to turn home appliances control through voice commands. This paper also reviewed the existing systems which are based on voice control feature.
Key-Words / Index Term
Voice Control, Automations, Digital, Disabled Person,Speech Recognition, Arduino, etc
References
[1] M. A. Khalid et al., "Design and development of low cost voice control smart home device in the South Pacific," Asia-Pacific World Congress on Computer Science and Engineering, Nadi, 2014, pp. 1-6.
[2] N. bt Aripin and M. B. Othman, "Voice control of home appliances using Android," 2014 Electrical Power, Electronics, Communicatons, Control and Informatics Seminar (EECCIS), Malang, 2014, pp. 142-146
[3] S. A. F. Manssor, A. A. Osman and S. D. Awadalkareem, "Controlling home devices for handicapped people via voice command techniques," 2015 International Conference on Computing, Control, Networking, Electronics and Embedded Systems Engineering (ICCNEEE), Khartoum, 2015, pp. 374-378.
[4] S. Kumar and S. S. Solanki, "Voice and touch control home automation," 2016 3rd International Conference on Recent Advances in Information Technology (RAIT), Dhanbad, 2016, pp. 495-498. doi: 10.1109/RAIT.2016.7507951
[5] A. A. Arriany and M. S. Musbah, “Applying voice recognition technology for smart home networks,” 2016 International Conference on Engineering & MIS (ICEMIS), Sep. 2016.
[6] M. A. Iqbal, S. K. Asrafuzzaman, M. M. Arifin, and S. K. A. Hossain, “Smart home appliance control system for physically disabled people using kinect and X10,” 2016 5th International Conference on Informatics, Electronics and Vision (ICIEV), May 2016.
[7] J. Cabrera, M. Mena, A. Parra, and E. Pinos, “Intelligent assistant to control home power network,” 2016 IEEE International Autumn Meeting on Power, Electronics and Computing (ROPEC), Nov. 2016.
Citation
Anjali Malakar, Anubha Prajapati, "A Review on Voice Control Home Environment to Ease of Use for Disabled Persons," International Journal of Computer Sciences and Engineering, Vol.5, Issue.7, pp.78-81, 2017.
Probabilistic B-Tree Based Clustering Algorithm for Vehicular Ad-Hoc Network with Data Aggregation
Research Paper | Journal Paper
Vol.5 , Issue.7 , pp.82-87, Jul-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i7.8287
Abstract
Vehicular ad hoc network (VANET) is a kind of ad hoc network, where the wireless communication has been established between the moving vehicles. Recently, the clustering scheme is suggested as an effective solution to handle the fast topology changes of vehicular ad hoc networks. However, the stability of the existing clustering approaches shows poor performances due to highly dynamic scenario of VANET. Thus this paper proposes a probabilistic B-Tree based multi-hop clustering scheme for VANET. A probabilistic density function is computed based on the velocity, speed and acceleration of the vehicles in order to select the cluster head (Designated Node (DN)) and the Backup Designated Node (BDN).The clustering will be performed using the direction of vehicles. A B-tree has been constructed for each cluster and each node will keep and maintain the entire topology structure. Once the DN failed, the BDN will be the DN and new BDN will be selected and the B-tree will be rearranged, where the proposed scheme enables the faster convergence. Furthermore the data aggregation will be performed at the designated nodes to reduce data transmission and that makes the effective bandwidth utilization. The NS2 simulation has been used to evaluate the performance of the proposed scheme and identified that the scheme performs better than the existing clustering schemes in terms of packet delivery ratio, cluster stability, routing overhead.
Key-Words / Index Term
VANET, multi hop cluster, probabilistic density function, B-Tree, data aggregation
References
[1]. A. F. Santamaria, C. Sottile, and P. Fazio, “PAMTree: Partitioned Multicast Tree Protocol for Efficient Data Dissemination in a VANET Environment,” International Journal of Distributed Sensor Networks, vol. 11, no. 5, p. 431492, Jan. 2015.
[2]. Mohamed Hadded, RachidZagrouba, AnisLaouiti, Paul Muhlethalery and Leila AzouzSaidane, “A Multi-Objectif Genetic Algorithm-Based Adaptive Weighted Clustering Protocol in VANET”, Congress on Evolutionary Computation (CEC), IEEE, Sendai, pp. 994-1002.
[3]. Mukunthan B, “A Neural Network Approach for Precise Pattern Identification of Human DNA”, International Journal of Neural Networks and Applications, Vol. 5, Issue 1, pp.21-27, 2012.
[4]. Zaydoun Y Rawashdeh and Syed Masud Mahmud, “A novel algorithm to form stable clusters in vehicular ad hoc networks on highways”, EURASIP Journal on Wireless Communications and Networking, Vol. 1, Issue. 15, 2012, doi.org /10.1186 /1687-1499-2012-15.
[5]. Daeinabi A, Rahbar AGP, Khademzadeh, “A. VWCA: An efficient clustering algorithm in vehicular ad hoc networks”, Journal of Network and Computer Applications, Vol. 34, Issue. 1, pp.207–222, 2011.
[6]. Obulapu Hiteshreddy, Pardeep Singh and Siddharth Chahuan, "A Review on Cluster Based Data Aggregation Protocols in Wireless Sensor Network", International Journal of Computer Sciences and Engineering, Vol.3, Issue.8, pp.37-45, 2015.
[7].Mukunthan. B and Pushpalatha. A, “Automation of DNA Finger Printing for Precise Pattern Identification using Neural-Fuzzy Mapping Approach”, International Journal of Computer Applications, Vol. 13, Issue. 3, pp.16-24, 2011.
[8]. Atul Rana, Manju Bala and Varsha , "Review Paper on MSEEC: Energy Efficient Clustering Protocol in HWSN", International Journal of Computer Sciences and Engineering, Vol.4, Issue.5, pp.71-75, 2016.
[9]. Neeraj Kumar, Naveen Chilamkurti and Jong Hyuk Park, “ALCA: agent learningbased clustering algorithm in vehicular ad hoc networks”, International journal on Personal and Ubiquitous Computing, Vol. 17, Issue .8, pp. 1683-1692, 2013.
[10]. Fan Yang, Zhijian Lin, Yuliang Tang, 2014, “A Traffic Flow Based Clustering Scheme for VANETs”, Sensors & Transducers, Vol. 180, Issue 10, pp. 110-116, 2014.
[11]. Zhigang Wang, Lichuan Liu, MengChu Zhou, and Nirwan Ansari, 2008, “A Position-Based Clustering Technique for Ad Hoc Intervehicle Communication”, Transactions On Systems, Man, And Cybernetics, IEEE, Vol. 38, Issue .2,pp.201-208,2008.
[12] Mukunthan. B and Nagaveni. N, “Identification of Unique Repeated Patterns, Location of Mutation in DNA Finger Printing Using Artificial Intelligence Technique”, International Journal of Bioinformatics Research and Applications, Vol. 10, Issue. 2, pp. 157-176, 2014, doi.org: 10.1504/IJBRA.2014.059516.
[13] Manish B.Giri, Ravi Singh Pippal, “Agricultural Environmental Sensing Application Using Wireless Sensor Network forAutomated Drip Irigation”, International Journal of Computer Sciences and Engineering, vol.4, Issue .7,pp. 133-137, 2016.
[14] Krishnakumar K.G, Dr.B.Mukunthan, “Cross Layer Based Adaptive Routing Approach for VANET”, International Journal of Control Theory and Applications, vol .9, Issue 40, pp. 161-169, 2016
Citation
B. Mukunthan, B. Radha, S. Govindaraju, "Probabilistic B-Tree Based Clustering Algorithm for Vehicular Ad-Hoc Network with Data Aggregation," International Journal of Computer Sciences and Engineering, Vol.5, Issue.7, pp.82-87, 2017.
A Review on Touch-less Biometric Fingerprint Authentication
Review Paper | Journal Paper
Vol.5 , Issue.7 , pp.88-91, Jul-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i7.8891
Abstract
In recent years, there is new technique which has been introduced i.e. touch-less fingerprint authentication system which may replaces the biometric device or scanner which is considered as unhygienic as well as costly. As we know that authentication system possess by a combination of username and password and this combination may be hacked because anyone of your friends or relative may perform brute force attack by guessing your password which may related to your personal details. But fingerprint cannot be stolen or copied that is why fingerprint authentication is the best authentication system. Everyone has distinct fingerprint and no one can authenticate or unauthorized access without your existence. So, on having this feature biometric device or scanner has been introduced in past years and now it is to be replaced by the touch-less fingerprint authentication or recognition system. This recognition can be perform either by webcam or by hand held device i.e. mobile. The purpose of this paper is to review the existing touch-less fingerprint systems and how much they are reliable and effective as compare to their results.
Key-Words / Index Term
Touch-less, Fingerprint, Mobile, Minutiae, Authentication
References
[1] R. Lathwal, V.K. Saroha, "A Study on Biometric Technology and Access Control System: Network Security", International Journal of Computer Sciences and Engineering, Vol.2, Issue.7, pp.31-35, 2014.
[2] A.K. Bhatia, H. Kaur, "Security and Privacy in Biometrics: A Review", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.2, pp.33-35, 2013.
[3] N. Liu, “Research and Application of Fingerprint Recognition Based on MATLAB,” The Open Automation and Control Systems Journal, vol. 7, no. 1, pp. 1107–1111, Sep. 2015.
[4] R. Donida Labati, A. Genovese, V. Piuri, and F. Scotti, “Toward Unconstrained Fingerprint Recognition: A Fully Touchless 3-D System Based on Two Views on the Move,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 46, no. 2, pp. 202–219, Feb. 2016.
[5] K. Tiwari and P. Gupta, “A touch-less fingerphoto recognition system for mobile hand-held devices,” 2015 International Conference on Biometrics (ICB), May 2015.
Citation
Anushri Chourasiya, Rakesh Pandey, "A Review on Touch-less Biometric Fingerprint Authentication," International Journal of Computer Sciences and Engineering, Vol.5, Issue.7, pp.88-91, 2017.
Smart Automatic Fish Feeder
Review Paper | Journal Paper
Vol.5 , Issue.7 , pp.92-95, Jul-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i7.9295
Abstract
This paper deals with the design of smart fish feeder system for the application of home aquarium. An automatic fish feeder is a device/product which provides the right amount of fish food at a predetermined time and it helps the aquarist to feed their pet fish when on a vacation or too busy to maintain a regular feeding schedule. It also ensures their pet fishes are fed in healthy way and on time. The aquarist can set the daily feeding time, feeding amount, number of repetition with time delay and also other optional limits. It can repeat its task accurately on daily basis. Further, the system is smartly monitored for the feed level and details are send to the aquarist via Short Message Service (SMS). The whole process uses electro mechanical feeding and feedback control mechanism with PIC microcontroller incorporated with Global System for Mobile Communication Modem (GSM) and a miniature seed sprayer model, an ultrasonic sensor-warning system. This mechanism is actuated by relay with gear motor.
Key-Words / Index Term
Electro Mechanical Feeding system, Speed sprayer, ultrasonic sensor, RTC and GSM module
References
[1]. Ismail, A. D., “Design Fish Feeder Spreader Mechanism (Doctoral dissertation, Universiti Teknologi Tun Hussein Onn Malaysia)” 2009.
[2]. A Victor Suresh “Developement of the aqua feeding dud try in India”. FAO Fisheries Technical paper, 2007.
[3]. Chang, C.M., Fang, W., Jao, R.C., Shyu, C.Z. And Liao, I.C., “Development of an intelligent feeding controller for indoor intensive culturing of Eel”,2005.
[4]. Siti Aisyah, Binti Saahri, “Design and fabrication of an automatic fish feeding system for home aquarium”, 2015.
[5]. Noor MZH, Hussain AK, Saad MF, Ali MSAM, Zolkap M ., “The design and development of automatic fish feeder system using PIC microcontroller”, Control and System Graduate Research Colloquium (ICSGRC), 2012 IEEE
[6]. Anyadike CC,Eze M, Ajah .G.N., “Development of an automatic fish feeder. Journal of Agricultural Engineering and Technology” 18: 29-36,2009.
[7]. Ogunlela AO* and Adebayo AA., “Development and Performance Evaluation of an Automatic Fish Feeder”, Journal of Aquaculture Research & Development 7:2, 2016.
Citation
K. Premalatha, P. Maithili, J.J. Nandhini, "Smart Automatic Fish Feeder," International Journal of Computer Sciences and Engineering, Vol.5, Issue.7, pp.92-95, 2017.
Secured Cloud Storage via Attribute-based Encryption
Research Paper | Journal Paper
Vol.5 , Issue.7 , pp.96-100, Jul-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i7.96100
Abstract
Cloud storage services have become increasingly popular. Because of the importance of privacy, many cloud storage encryption schemes have been struggle to protect data from the attackers. All of that schemes assumed that cloud storage providers are safe and it won’t be target by the attackers; however, in practice, some government (i.e., coercers) may force cloud storage providers to expose user secrets or private data on the cloud, thus altogether avoid storage encryption schemes. In this paper, we present our design for a new cloud storage encryption scheme that enables cloud storage providers to create authentic fake user secrets to protect user privacy. By utilizing our systems scrambled information can be up to confidential regardless of the possibility that the capacity server is endowed; in addition, our techniques are secure against agreement assaults. Since coercers can`t reveal if got privileged insights are valid or not, the distributed storage suppliers guarantee that client protection is still safely ensured. And we are also providing secret key mechanism which is aspired by KDC (Key distribution Center) one of the module and also authentication for each user to make the more secured and confidential. Were also captured the unauthorized attackers’ information also.
Key-Words / Index Term
Encryption, Attribute Based Encryption, Cloud Storage
References
[1] Shreeraghav kulkarni, Sujata Terdal, "Ttpse- Trusted Third Party With Symmetric Encryption Towards Secured Cloud Storage", International Journal of Computer Sciences and Engineering, Vol.5, Issue.5, pp.47-51, 2017.
[2] V. Kapoor, "Data Encryption and Decryption Using Modified RSA Cryptography Based on Multiple Public Keys and ‘n’prime Number", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.2, pp.35-38, 2013.
[3] A. Sharma, RS Thakur, S. Jaloree, "Investigation of Efficient Cryptic Algorithm for image files Encryption in Cloud", International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.5, pp.5-11, 2016.
[4] S. Mewada, P. Sharma, and S. S. Gautam, “Investigation of Efficient Cryptic Algorithm for Text using SM Crypter”, International Journal of Information Science and Computing, vol. 3, no. 2, p. 99, 2016.
[5] A. Sahai, H. Seyalioglu, and B. Waters, “Dynamic credentials and ciphertext delegation for attribute-based encryption”, in Crypto, 2012, pp. 199–217.
[6] S. Hohenberger and B. Waters, “Attribute-based encryption with fast decryption”, in Public Key Cryptography, 2013, pp. 162–179.
[7] P. K. Tysowski and M. A. Hasan, “Hybrid attribute and reencryption based key manage-ment for secure and scalable mobile app-lications in clouds”, IEEE T. Cloud Computing, pp. 172–186, 2013.
[8] D. Bradbury, “Can we make email secure?”, Network Security, vol. 2014, no. 3, pp. 13–16, Mar. 2014.
[9] P.-W. Chi and C.-L. Lei, “Audit-Free Cloud Storage via Deniable Attribute-based Encryption”, IEEE Transactions on Cloud Computing, pp. 1–1, 2015.
[10] R. F. Anda, A. Butchart, V. J. Felitti, and D. W. Brown, “Building a Framework for Global Surveillance of the Public Health Implications of Adverse Childhood Experiences”, American Journal of Preventive Medicine, vol. 39, no. 1, pp. 93–98, Jul. 2010.
[11] Surbhi Sharma, "Embedding more security in digital signature system by using combination of public key cryptography and secret sharing scheme", International Journal of Computer Sciences and Engineering, Vol.4, Issue.3, pp.111-115, 2016.
[12] P.Gasti, G.Ateniese, and M. Blanton, “Deniable cloud storage: sharing files via public-key deniability”, Proceedings of the 9th annual ACM workshop on Privacy in the electronic society, pp. 31– 42, 2010.
Citation
B. Sowmya, K. Madhavi, "Secured Cloud Storage via Attribute-based Encryption," International Journal of Computer Sciences and Engineering, Vol.5, Issue.7, pp.96-100, 2017.