International Journal of Engineering and Techniques
IJET -Volume 3, Issue 2, March - April 2017
S.No
|
Title/Author Name
|
Serial No
|
1
|
Mitigation of Power Interruption in Radial and Grid Feeder Schemes and Safety of Equipment's
- T. Kannan , M. Mahendran
Abstract
The Continuity of power supply that is reliability of power supply is highly essential for the development of the country. The electric power is distributed to the consumers through electrical network. The study involves the analysis of various obstacles for reliable power supply, interruption in electric power distribution due to defects in relays and circuit. Cost benefit by the prevention and reliability in power supply. Keyword: Reliability of power, Mitigation of Interruption, Radial feeders, power transformer and grid feeders. × T. Kannan , M. Mahendran, "Mitigation of Power Interruption in Radial and Grid Feeder Schemes and Safety of Equipment's " Vol. 3 - Issue (1-9)- March - April 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I2P1 |
2
|
Multilevel Wrapper Verification System
- U.Bhuvaneshwari , R.Lavanya, V.Vaneeswari
Abstract
The previous research has focused on quick and efficient generation of wrappers; the development of tools for wrapper maintenance has received less attention. This is an important research problem because Web sources often change in ways that prevent the wrappers from extracting data correctly. Present an efficient algorithm that extract unstructured data to structural data from web. The wrapper verification system detects when a wrapper is not extracting correct data, usually because the Web source has changed its format. The Verification framework automatically recovers data using Dimension Reduction Techniques from changes in the Web source by identifying data on Web pages. After apply wrapped data to One Class Classification in Numerical features for avoid classification problem. Finally, the result data apply in Top-K query for provide best rank based on probabilities scores. Wrapper verification system relies on one-class classification techniques to beat previous weaknesses to identify the problem by analysing both the signature and the classifier . Keyword: Mave, Wrapper, One Class Classification, Numerical features. × U.Bhuvaneshwari , R.Lavanya, V.Vaneeswari, "Multilevel Wrapper Verification System" Vol. 3 - Issue 1 (10-13) - March - April 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I2P2 |
3
|
Group Secret Key Generation in Wireless Networks: Algorithms and Rate Optimization
- V.Rekha , A.Kiruthika , R.Kavinila
Abstract
A group key generation algorithm investigates group secret key generation problems for different types of wireless networks, by exploiting physical layer characteristics of wireless channels. A new group key generation strategy with low complexity is proposed, which combines the well-established point-to-point pair wise key generation technique, the multisegment scheme, and the onetime pad. In particular, this group key generation process is studied for three types of communication networks: 1) A three-node network; 2) A multi node ring network; and 3) A multi node mesh network. Three group key generation algorithms are developed for these communication networks, respectively. The analysis8 shows that the first two algorithms yield optimal group key rates, whereas the third algorithm achieves the optimal multiplexing gain. Next, for the first two types of networks, we address the time allocation problem in the channel estimation step to maximize the group key rates. This non-convex max – min time allocation problem is first reformulated into a series of geometric programming, and then, a single-condensation method based iterative algorithm is proposed. Numerical results are also provided to validate the performance of the proposed key generation algorithms and the time allocation algorithm. Keyword: - -. × V.Rekha , A.Kiruthika , R.Kavinila , "Group Secret Key Generation in Wireless Networks: Algorithms and Rate Optimization" Vol. 3 - Issue 1( 14-17 ) - March - April 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I2P3 |
4
|
Automated Decision Support System for Pathology of Diabetic Retinopathy from OCT
- Catherine Todd , Paola Salvetti , Katy Naylor, Chisom Nnorom
Abstract
Diabetic retinopathy is a complication of diabetes causing progressive damage to the retina, located at the back of the eye, potentially leading to clouded vision or blindness. Disease signs may be visualized by Optical Coherence Tomography (OCT) and include formation of new and weaker blood vessels, fluid accumulation, exudates and changes to Retinal Vascular Geometry (RVG). Presence of these indicators can provide information as to the stage of the disease. Image-processing strategies are applied for the automated detection, segmentation, extraction, classification toward likelihood estimation of progression of diabetic retinopathy to visual biomarkers present in OCT, using time-sequenced data in the early stages of the disease. Gabor and Savitsky-Golay filtering enables extraction of the vessel map and fuzzy control for segmentation of hard exudates. Feature data are extracted using bounding boxes, vector map and connected component methodology for binary decision tree classifier construction, training and testing. Feature values comprising classifier nodes include: exudate features of compactness, area, convexity and form factor, in addition to vessel features: width, elongation, bifurcation angles, form factor and solidity. Classifier accuracy is 93.3%, with 6.7% misclassification and 0% false-negative classification. Automated image processing of diabetic retinopathy is achieved with high classification accuracy for the extraction of vessel map and hard exudate biomarkers from OCT. Application of smoothing algorithms and removal of vessel map shadows may further improve classification accuracy. Keyword: Retinopathy, Medical Image Processing, Pathological Progression, Vessel Map Segmentation, Hard Exudate Extraction, Image ClassificationRetinopathy, Medical Image Processing, Pathological Progression, Vessel Map Segmentation, Hard Exudate Extraction, Image Classification. × Catherine Todd , Paola Salvetti , Katy Naylor, Chisom Nnorom , "Automated Decision Support System for Pathology of Diabetic Retinopathy from OCT" Vol. 3 - Issue 1( 18-30 ) - March - April 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I2P4 |
5
|
Smart ATM center with bring along mechanism for card and cash retrieval after transaction
- Swathika. M., Sundari. I., Vanmathi. R., Parthiban. S
Abstract
This paper describes an ATM with a currency dispenser includes a contactless card reader. The contactless card reader can read data from an RFID tag of a customer’s ATM card. The contactless card reader, such as an RFID tag reader, can be located so as to provide additional space for another transaction component. The contactless card reader can also be used in conjunction with a magnetic stripe card reader. The ATM includes a housing for the RFID tag reader that is adapted to prevent interception of radio signals. The ATM is able to prevent the missing of the ATM card and dispensed money by the customer inside the ATM centre after the transaction. Keyword: IR Sensor, RFID Card Reader, PIC Microcontroller. × Swathika. M., Sundari. I., Vanmathi. R., Parthiban. S , "Smart ATM center with bring along mechanism for card and cash retrieval after transaction" Vol. 3 - Issue 1( 31-35 ) - March - April 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I2P5 |
6
|
An Accurate Classifier for Detecting the Ecosystem of Malicious Application on Online Social Network using MADE
- Parivallal K, Praful Kumar .S, Santhosh Raj M ,G. Pushpa Antanet Sheeba
Abstract
Third-party apps are a major reason for the popularity and addictiveness of Online Social Network. However little is understood about the characteristics of malicious apps and how they operate. Malicious apps are much more likely to share names with other apps, and they typically request fewer permissions than benign apps. We will propose MADE – a Malicious Application Detector and Evaluator that will do two major things. Firstly, we will find the malicious apps often share names with other apps, and they typically request fewer permissions than benign apps. Secondly, leveraging these distinguishing features, we show that MADE can detect malicious apps with certain accuracy. We will also highlight the emergence of app-nets and will keep continue to dig deeper. Keyword: Facebook apps, malicious, online social networks, spam. × Parivallal K, Praful Kumar .S, Santhosh Raj M ,G. Pushpa Antanet Sheeba , "An Accurate Classifier for Detecting the Ecosystem of Malicious Application on Online Social Network using MADE" Vol. 3 - Issue 1( 36-42 ) - March - April 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I2P6 |
7
|
Mechanical Engineering in Ancient Egypt, Part 43: Statues of Horse, Leopard, Turtle and Frog
- Galal Ali Hassaan
Abstract
This paper is the 43rd research paper in a series investigating the evolution of mechanical engineering in ancient Egypt. It tries to achieve this purpose through investigating the production of ancient Egyptians horse, leopard, turtle and frog statues during the era from Predynastic to Late Period. Each statue is presented chronically with present location if known and with engineering analysis showing its creativity. The innovation in the designs is outlined and the main concepts of mechanical design methodology in ancient Egypt are outlined. Keyword: Mechanical engineering; ancient Egypt; horse, leopard, turtle and frog statues. × Galal Ali Hassaan, "Mechanical Engineering in Ancient Egypt, Part 43: Statues of Horse, Leopard, Turtle and Frog" Vol. 3 - Issue 1( 43-53 ) - March - April 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I2P7 |
8
|
A Threshold Multi-Authority Access Control System
- Immanuel Joshua Paul, B.Prashanth ,V.Kameshwaran,Ezhil Dyana
Abstract
Bit-Exchange Encryption is the cryptographic conducting tool to assurance data owners enduring control above their data in public cloud storage. The earlier ABE plans include one and only power (Authority) to keep up the entire trait (Key) set, which can carry a solitary (single) point bottleneck on both safety and execution. In this way, some multi- power (Multi-Authority) plans are proposed, in which various powers independently keep up disjoint attribute subsets. In any case, the single-point bottleneck issue stays unsolved. In this paper, from another point of view, we conduct a threshold multi-authority CP- ABE access control plan for open distributed storage, named TMACS, in which various powers together deal with a uniform characteristic set. In [9] TMACS, taking advantage of (t; n) limit mystery sharing, the expert (Master) key can be shared among numerous powers, and a legitimate client can produce his/her mystery (Private) key by cooperating with any t powers. Security and execution investigation results demonstrate that system is not just undeniable secure when not as much as t powers are traded off, additionally dynamic when no not as a great deal as t powers are alive in the framework. Besides, by proficiently joining the customary multi-power plan with system, we build hybrid one, which fulfils the attributes originating from various authorities and accomplishing security. Keyword: Bit-Exchange based encryption; Attribute Based Encryption(ABE); Threshold Secret Sharing(t,n). . × Immanuel Joshua Paul, B.Prashanth ,V.Kameshwaran,Ezhil Dyana, "A Threshold Multi-Authority Access Control System" Vol. 3 - Issue 1( 54-57 ) - March - April 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I2P8 |
9
|
DWT and EMD for Deghosting of Seismic Signals Analysing Vibration and Geomagnetic Anomalies
- Haridha.V, Priyanka.S, Dr.Sujatha Jamuna Anand, Alice Christy.M
Abstract
Bit-Exchange Encryption is the cryptographic conducting tool to assurance data owners enduring control above their data in public cloud storage. The earlier ABE plans include one and only power (Authority) to keep up the entire trait (Key) set, which can carry a solitary (single) point bottleneck on both safety and execution. In this way, some multi- power (Multi-Authority) plans are proposed, in which various powers independently keep up disjoint attribute subsets. In any case, the single-point bottleneck issue stays unsolved. In this paper, from another point of view, we conduct a threshold multi-authority CP- ABE access control plan for open distributed storage, named TMACS, in which various powers together deal with a uniform characteristic set. In [9] TMACS, taking advantage of (t; n) limit mystery sharing, the expert (Master) key can be shared among numerous powers, and a legitimate client can produce his/her mystery (Private) key by cooperating with any t powers. Security and execution investigation results demonstrate that system is not just undeniable secure when not as much as t powers are traded off, additionally dynamic when no not as a great deal as t powers are alive in the framework. Besides, by proficiently joining the customary multi-power plan with system, we build hybrid one, which fulfils the attributes originating from various authorities and accomplishing security. Keyword: Bit-Exchange based encryption; Attribute Based Encryption(ABE); Threshold Secret Sharing(t,n). . × Haridha.V, Priyanka.S, Dr.Sujatha Jamuna Anand, Alice Christy.M, "DWT and EMD for Deghosting of Seismic Signals Analysing Vibration and Geomagnetic Anomalies" Vol. 3 - Issue 1( 58-62 ) - March - April 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I2P9 |
10
|
Secured Data Communication Protocol Based Modern Patient Health Monitoring System
- K. Dinesh kumar ,S. Steve revanth ,R. Subin ,Antony Robert
Abstract
The body area network (BAN) technology is one of the core technologies of IOT developments in healthcare system, where a patient can be monitored using a collection of tiny-powered and lightweight sensor nodes. However, the development of this new technology in healthcare applications without considering security makes patient privacy vulnerable. In this paper, at first, we highlight the major security requirements in BSN-based modern healthcare system. Subsequently, we propose a secure IoT-based healthcare system using BSN, called BSN-Care, which can efficiently accomplish those Requirements. Keyword: Body Area Network (BAN); Attribute Based Encryption (ABE); Internet of Things (IOT). × K. Dinesh kumar ,S. Steve revanth ,R. Subin ,Antony Robert, "Secured Data Communication Protocol Based Modern Patient Health Monitoring System" Vol. 3 - Issue 1( 63-67 ) - March - April 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I2P10 |