International Journal of Engineering and Techniques
IJET -Volume 3, Issue 4 , July - August 2017
S.No
|
Title/Author Name
|
Serial No
|
1 |
Analytics of Market Place Report and Accuracy Using Big-Data Applications
- P.Karthik
Abstract
In this paper, we discuss security issues for cloud computing in business side environment. The important views on security issues in cloud computing that are structural relationship (association) with big data. The Big data usages are a good used to organizations, business, companies and many large and small scale industries. We discuss various possible solutions for the problems in cloud computing security. Cloud computing security is developing at a fast pace which includes personal system security(self), network security, information security, and data privacy. Cloud computing plays a very main role in protecting data, applications and the related infrastructure with the help of policies, technologies, controls, and big data tools. Forever, cloud computing, big data and its tools, advantages are likely to represent the most promising new frontiers in the world. Keyword: Market, analysis, accuracy.× P.Karthik , " Analytics of Market Place Report and Accuracy Using Big-Data Applications " Vol. 3 - Issue 4 ( 1 - 5 ) - July - August 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I4P1 |
2 |
Bluetooth Security Threats: A Survey
- Rajendra kumar , Namrata Dhanda
Abstract
Bluetooth technology has part of this modern society. The availability of different mobile phones, game controllers, Personal Digital Assistant (PDA) and other personal computers has made Bluetooth a popular technology for small distance wireless communication. However, as the Bluetooth technology becomes widespread, security protocols are increasing which can be dangerous to the privacy of a user’s personal information. The security issues of Bluetooth have been worked on for the last few years. This paper presents security protocols of this technology along with some past security threats reported in the literatures which have been surveyed and summarized in this paper. It also presents some tips that end-users can implement immediately to become more cautious about their private information and future security enhancements that can be implemented in the Bluetooth standard. Keyword: Bluetooth, encryption, security protocols, security threats, Bluetooth advantages.× Rajendra kumar , Namrata Dhanda , " Bluetooth Security Threats: A Survey " Vol. 3 - Issue 4 ( 6 - 9 ) - July - August 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I4P2 |
3 |
Some Studies on Gain Spectra Optimization of Multi Pumped Th3+ - Er3+ (Thulium Erbium) Doped Hybrid Optical Amplifier
- Karan Singh , Karamdeep Singh , Shivinder Devra , Gagandeep Kaur
Abstract
In Optical fiber communication signal degradation occur hence we use Optical Amplifiers which have advantages over regenerators as it does not require to do any reshaping, retiming, retransmitting or any costly O-E-O conversions. Limitation of Optical Amplifiers arises when non-linear effects occur. So, there is demand of optical amplifiers which provide better performance (in term of transient performance, gain flatness, larger gain bandwidth etc.) for DWDM systems. To minimize the impairments due to fiber nonlinearities and to enhance the gain bandwidth and/or gain flatnesshybrid optical amplifier is a promising technique for future DWDM multi-terabit systems. In this paper many hybrid optical amplifications like EDFA, TDFA, FOPA, OPCPA, TDFA-FOPA and TDFA-RAMAN are surveyed to carry work on TDFA-EDFA hybrid amplifier. Methods of implementing hybrid amplifiers and types of hybrid models that are available for use are surveyed. Comprehensive gain characteristics of TDFA, EDFA and hybrid amplifiers (TDFA-EDFA) connected in cascaded and parallel configurations are reported. TDFA and EDFA are simulated using multiple pumping scheme at variable lengths in order to optimise the gain spectra.. Keyword: Thulium Doped Fiber Amplifier (TDFA), Hybrid Optical Amplifier (HOA), Erbium Doped Fiber Amplifier (EDFA),Dense Wavelength Division Multiplexing (DWDM).× Karan Singh , Karamdeep Singh , Shivinder Devra , Gagandeep Kaur , " Some Studies on Gain Spectra Optimization of Multi Pumped Th3+ - Er3+ (Thulium Erbium) Doped Hybrid Optical Amplifier " Vol. 3 - Issue 4 ( 10 - 17 ) - July - August 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I4P3 |
4 |
Evaluation of Security Aspects of Some Optical Code Division Multiple Access (OCDMA) Systems
- Karambir Singh , Karamdeep Singh , Shivinder Devra , Gagandeep Kaur
Abstract
Optical Code Division Multiple Access (OCDMA) is an attractive multiple accessing technique that is used in fiber optics network. As the data being transmitted can be analysed be the eavesdroppers. Therefore, security is a major concern in OCDMA. We have analysed and examined different modulation schemes for three dimensional Single Pulse per plane for direct detection in case of On-Off Keying or differential detection in case of Code Shift Keying and Differential Phase Shift Keying to deduce which of these techniques are best suited against eavesdroppers. Keyword: Optical Fiber Communication, Optical Code Division Multiplexing (OCDMA), On-Off Keying (OOK), Code Shift Keying (CSK), Differential Phase Shift Keying (DPSK), Four Wave Mixing (FWM).× Karambir Singh , Karamdeep Singh , Shivinder Devra , Gagandeep Kaur , " Evaluation of Security Aspects of Some Optical Code Division Multiple Access (OCDMA) Systems " Vol. 3 - Issue 4 ( 18 - 25 ) - July - August 2017 , International Journal of Engineering and Techniques (IJET) , ISSN:2395 - 1303 , www.ijetjournal.org × |
IJET-V3I4P4 |
5 |
A Evaluation of OSI Reference model and Comparison with TCP/IP Model
- Rajendra kumar, Namrata Dhanda
Abstract
OSI (Open Systems Interconnection) layered model was created by the International Organization for Standardization (ISO). OSI model is designed to be a reference model for describing the functions of a communication system. It has seven layers, with each layer describing a different function of data traveling through a network. A reference model is a conceptual blueprint of how communication should take place. It addresses every process which is required for effective communication and divides it’s into logical grouping called layers. When a communication system is designed in this manner, it is known as layered architecture. Keyword: Open System Interconnection (OSI), TCP/IP protocol, Benefits, Comparisons.× Rajendra kumar, Namrata Dhanda , " A Evaluation of OSI Reference model and Comparison with TCP/IP Model " Vol. 3 - Issue 4 ( 26 - 29 ) - July - August 2017 , International Journal of Engineering and Techniques (IJET) , ISSN:2395 - 1303 , www.ijetjournal.org × |
IJET-V3I4P5 |
6 |
Automated Vehicle Collision Avoidance and Navigation Using Raspberry Pi
- R.Surya Kumar , P.Kingston Stanley, A.Sanjeevi Gandhi
Abstract
This paper presents vehicle detection and road detection is done which are adopted in intelligent vehicles. Vehicle detection and tracking is done using the Haar cascade method to identify the vehicles which are present on road. This detects the stationary as well as the movable vehicles on road. Haar like features are implemented in the system to get a clear edge of the vehicle ahead. The road detection is the free space estimation on the road in which the system in the vehicle provides a safer path to navigate. HSV method is mainly used for colour extraction. The road detection uses HSV colour space algorithm to track the real-time changes on the road. In this research vehicle detection and road detection is done at the sane time. The research process is on-going and many algorithms are being found to reduce the problems faced on road today. Keyword: obstacle detection, raspberry pi, camera, ultrasonic sensor.× R.Surya Kumar , P.Kingston Stanley, A.Sanjeevi Gandhi , " Automated Vehicle Collision Avoidance and Navigation Using Raspberry Pi " Vol. 3 - Issue 4 ( 30 - 35 ) - July - August 2017 , International Journal of Engineering and Techniques (IJET) , ISSN:2395 - 1303 , www.ijetjournal.org × |
IJET-V3I4P6 |
7 |
Performance Analysis of Solar Thermal Cooling System for an Office Building in Indian Climates using Flat Plate Collector
- B.L.Gupta , Naveen Jha , Dhawal Vyas , Amit Daiya
Abstract
Wind energy is the great spectacular, clean and economical energy source among all the renewables. Since last few years this energy has been most commercialized in the worldwide and many portion of the nations have begun their projections on this area. The nations like China, USA, Germany, India and Spain have leaded by the installation capacities of wind energy in the international markets. During the last decade, India shared the fourth highest wind energy capacities in the world. India government has been providing the attractive policies for the resident wind energy manufacturing companies with the developers. This paper presents an exhaustive compressive overview on current developments of wind energy, potentials. The contributions of wind manufacturers and developers, mismatching between the generating power and installed capacities, policies and its impacts and future prospectus of wind energy developments in India and worldwide has also been presented. Keyword: Solar thermal, Solar Fraction, Primary Energy Savings.× B.L.Gupta , Naveen Jha , Dhawal Vyas , Amit Daiya , " Performance Analysis of Solar Thermal Cooling System for an Office Building in Indian Climates using Flat Plate Collector " Vol. 3 - Issue 4 ( 36 - 40 ) - July - August 2017 , International Journal of Engineering and Techniques (IJET) , ISSN:2395 - 1303 , www.ijetjournal.org × |
IJET-V3I4P7 |
8 |
An all-optical CSNRZ, DBNRZ& MDBNRZ to NRZ Format Conversion Strategy Based on a Single Mach-Zehnder Delayed Interferometer (MZ-DI)
- Mamta Bhatti, Karamdeep Singh , Shivinder Devra , Gagandeep Kaur
Abstract
We proposed and demonstrated an all-optical format conversion strategy which has the capability to convert following modulation formats: carrier suppressed non-return to-zero (CSNRZ) to non-return to zero (NRZ), Duobinary non-return to zero (DBNRZ) to NRZ, Modified Duobinary non-return to zero MDBNRZ to NRZ, by exploiting cross-phase modulation (XPM) in a mach-Zehnder delayed interferometer (MZ-DI). It has been shown that proposed scheme exhibits fine performance upto 20 Gbps line rates. Further, in order to formulate optimum delay in MZ-DI structure, investigations have been carried out by varying delay of MZI-DI from 1 to 20 ps, and variations in Quality factor and Eye-opening factor (%) have been noticed at transmission port (T-port) of MZI-DI. Further, a comparison has been made in order to identify the most suitable input modulation format for the proposed format converter among CSNRZ, DBNRZ & MDBNRZ that yields best performance in terms of Q-factor, ER and EO (%) at the T-Port.It has been from observed from performance analysisthat CSNRZ is more suitable input format as compared to DBNRZ, MDBNRZ while converting to NRZ format all-optically utilizing the proposed MZ-DI scheme. Keyword: Non-linear optics, carrier suppressed non-return to-zero (CSNRZ), Duobinary non-return to zero (DBNRZ), Modified Duobinary non-return to zero (MDBNRZ), mach-Zehnder delayed interferometer (MZ-DI), cross-phase modulation (XPM), Format Conversion..× Mamta Bhatti, Karamdeep Singh , Shivinder Devra , Gagandeep Kaur , " An all-optical CSNRZ, DBNRZ& MDBNRZ to NRZ Format Conversion Strategy Based on a Single Mach-Zehnder Delayed Interferometer (MZ-DI) " Vol. 3 - Issue 4 ( 41 - 54 ) - July - August 2017 , International Journal of Engineering and Techniques (IJET) , ISSN:2395 - 1303 , www.ijetjournal.org × |
IJET-V3I4P8 |
9 |
A Study on Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds
- A. Senthil Kumar, S.Abirami
Abstract
An electronic health (e-health) record system is a novel application that will bring great convenience in healthcare. The privacy and security of the sensitive personal information are the major concerns of the users, which could hinder further development and widely adoption of the systems. The searchable encryption (SE) scheme is a technology to incorporate security protection and favourable operability functions together, which can play an important role in the e-health record system. In this paper, we introduce a novel cryptographic primitive named as conjunctive keyword search with designated tester and timing enabled proxy re-encryption function (Re-dtPECK), which is a kind of a time-dependent SE scheme. It could enable patients to delegate partial access rights to others to operate search functions over their records in a limited time period. The length of the time period for the delegate to search and decrypt the delegator’s encrypted documents can be controlled. Moreover, the delegate could be automatically deprived of the access and search authority after a specified period of effective time. It can also support the conjunctive keywords search and resist the keyword guessing attacks. By the solution, only the designated tester is able to test the existence of certain keywords. We formulate a system model and a security model for the proposed Re-dtPECK scheme to show that it is an efficient scheme proved secure in the standard model. The comparison and extensive simulations demonstrate that it has a low computation and storage overhead. Keyword: Searchable Encryption; Time Control, E-health.× A. Senthil Kumar, S.Abirami , " A Study on Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds " Vol. 3 - Issue 4 ( 55 - 58 ) - July - August 2017 , International Journal of Engineering and Techniques (IJET) , ISSN:2395 - 1303 , www.ijetjournal.org × |
IJET-V3I4P9 |
10 |
Performance optimization of a wireless multimedia transmission system based on the reduction of PAPR
- Sara Riahi
Abstract
Communication systems have evolved in recent years, especially wireless systems, and more and more the need to use a large data transmission speed is needed. But existing technology are constraints to monitor progress of the necessary transmission speed; several methods and techniques have been developed to address this problem. Orthogonal frequency division multiplexing (OFDM) is an alternative due to its robustness against selective frequency fading and its resistance to inter-symbol interference (ISI).The latter (ISI) is a problem in high-speed data communication. The emission for long range wireless systems requires the use of power amplifiers, but the use of OFDM systems, among others, exhibits high amplitude peaks of the modulated signal envelope and therefore variations Important in instantaneous power. For OFDM systems, the Peak-to-Average Power Ratio (PAPR) parameter which has a direct influence on the power amplifier must be taken into consideration. PAPR reduction techniques include techniques for processing the signal prior to transmission. These methods are usually simple to implement. In this work, we talk about different methods of reducing PAPR. Keyword: Multi-carrier systems, OFDM, clipping, PAPR, Tone reservation, selective mapping.× Sara Riahi , " Performance optimization of a wireless multimedia transmission system based on the reduction of PAPR " Vol. 3 - Issue 4 ( 59 - 72 ) - July - August 2017 , International Journal of Engineering and Techniques (IJET) , ISSN:2395 - 1303 , www.ijetjournal.org × |
IJET-V3I4P10 |