IJET -Volume 3, Issue 6 , November - December 2017
S.No
|
Title/Author Name
|
Serial No
|
|
61 |
Configurable Zigbee-Based Control System for People with Multiple Disabilities in Smart Homes
- Boggarapu Kantha Rao,Sayyad Shaheena
Abstract
The greater part of the current brilliant home checking and control frameworks don't oblige unique poor clients to deal with their home apparatuses. A remote sensor organize based framework for shrewd home robotization will be outlined, fabricated and tried to address such missing usefulness. The to be actualized system�s significant commitment is that it is redone to give the uncommon need occupants with instruments and administrations to screen and work home machines remotely. The executed framework gives home occupants incapacities to exploit the progression in innovation. It empowers them to play out their day by day exercises by remotely checking and controlling their home machines without depending on others. The framework will be customized so it can be designed to acclimate to the customer�s incapacity giving them better and helpful way of life. It merits saying that the framework is versatile and can be stretched out to incorporate increasingly and diverse administrations and apparatuses. The framework is convenient, smaller, moderate and simple to utilize. Keyword: smart home; control system; disabilities,compact.× Boggarapu Kantha Rao,Sayyad Shaheena,"Configurable Zigbee-Based Control System for People with Multiple Disabilities in Smart Homes" Vol. 3 - Issue 6 ( 400 - 404 ) - November - December 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I5P61 |
|
62 |
Just-In-Time Manufacturing using Cloud Computing
- Kedar Shiralkar
Abstract
The aim of this paper to show how manufacturing companies can leverage cloud computing technology to achieve Just-In-time manufacturing philosophy. Objective of this paper is to first acquaint the reader with the overall JIT concept in manufacturing. It also explains in detail about cloud computing technology and its various components. Lastly, article discusses about how cloud computing technology can be used to achieve the various goals in Just-In-time manufacturing. Keyword: Just-In-time manufacturing, JIT, Cloud Computing, Supply Chain, IoT.× Kedar Shiralkar,"Just-In-Time Manufacturing using Cloud Computing" Vol. 3 - Issue 6 ( 405 - 408 ) - November - December 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I5P62 |
|
63 |
Improved Elastic Storage of Digital Still Images
- R.Karthikeyan, Husnajabeen A, Ashwini R
Abstract
In this paper, a new method for data hiding has been proposed. Determinant of the designed matrix has been used for the insertion and retrieval of the message. Matrix is designed from the four least significant bits of the selected pixel value. The pixel for insertion and retrieval of the message has been selected by using linear mathematical equation which is shared between sender and receiver. The four least significant bits of selected pixel value are adjusted according to the message bit and the determinant of the designed matrix. The experimental results show that there is very less deflection in the quality of the stego image which cannot be perceived by HVS (Human Visual System). Keyword: ---.× R.Karthikeyan, Husnajabeen A, Ashwini R,"Improved Elastic Storage of Digital Still Images" Vol. 3 - Issue 6 ( 409 - 419 ) - November - December 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I5P63 |
|
64 |
Classified Traffic Volume Study at Ghatekesar Junction
- Meruga Siva Parvathi ,Basavaraj Akki
Abstract
Traffic engineering uses engineering methods and techniques to achieve the safe and time efficient movement of people and goods on roadways. The safe and efficient movement of the people and goods is dependent on traffic flow, which is directly connected to the traffic characteristics. The three main parameters of a traffic flow are volume, speed and density. In the absence of effective planning and traffic management of the city, the current road infrastructure cannot cater the future needs of the city. The current work studies traffic characteristics in the city of Ghatkesar at Railway Junction. In this work emphasis was given on traffic and the analysis was carried out through primary traffic flow surveys at Railway Junction in Ghatkesar. Traffic flow is studied by manual methods. For better understanding of the present status of traffic flow at the Junction, traffic survey is conducted. Calculation of Passenger Car Unit (PCU�s) for different vehicle types was provided by our respected course co-coordinators of the course CE. With the help of the data collection, an attempt has been made to understand the traffic patterns during different time periods. Traffic control at the Junction is also dependent on traffic flow characteristics. Hence the results from the present study are helpful in controlling the traffic at the intersection and also in suggesting some of the remedial measures to improve the traffic safety in the region. Remedial measures such as widening the road, by providing more public transport can be recommended based on the outcomes of the works. Keyword: Volume count, PCU, Railway Junction.× Meruga Siva Parvathi ,Basavaraj Akki,"Classified Traffic Volume Study at Ghatekesar Junction" Vol. 3 - Issue 6 ( 420 - 435 ) - November - December 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I5P64 |
|
65 |
Connectivity Based Secure Cooperative Localization Scheme for Wireless Sensor Network
- Deepak Prashar, Kiran Jyoti, Dilip Kumar
Abstract
Localization is one of the important areas of concern in wireless sensor networks. Effectiveness of any localization approach is based on the accuracy in determining the position of the nodes that are unaware about their position in the area of their deployment. One of the prime factors that play its part is the security of the localization approach so that it reduces or diminishes the effect of various attacks on the localization process. So this paper conveys a new approach for secure localization based on the authentication of the nodes that assists in location determination along with the consideration of mobility of nodes as one of the prime factor. Keyword: AOA, Elgamal, GPS, RSSI, TOA, TDOA, Trilateration.× Deepak Prashar, Kiran Jyoti, Dilip Kumar,"Connectivity Based Secure Cooperative Localization Scheme for Wireless Sensor Network" Vol. 3 - Issue 6 ( 436 - 439 ) - November - December 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I5P65 |
|
66 |
Evolving Stream Data Clustering and TCV Rank Summarization
- P.Damodharan, Dr.C.S.Ravichandran
Abstract
Tweet are being created short text message and shared for both users and data analysts. Twitter which receives over 400 million tweets per day has emerged as an invaluable source of news, blogs, opinions and more. Our proposed work consists three components tweet stream clustering to cluster tweet using k-means cluster algorithm and second tweet cluster vector technique to generate rank summarization using greedy algorithm, therefore requires functionality which significantly differ from traditional summarization . in general, tweet summarization and third to detect and monitors the summary-based and volume based variation to produce timeline automatically from tweet stream. Implementing continuous tweet stream reducing a text document is however not an simple task, since a huge number of tweets are worthless, unrelated and raucous in nature, due to the social nature of tweeting. Further, tweets are strongly correlated with their posted instance and up-to-the-minute tweets tend to arrive at a very fast rate. Efficiency�tweet streams are always very big in level, hence the summarization algorithm should be greatly capable; Flexibility�it should provide tweet summaries of random moment durations. (3) Topic evolution�it should routinely detect sub-topic changes and the moments that they happen. Keyword: Tweet Stream, summarization, Timeline, Topic evolution, summary.× P.Damodharan, Dr.C.S.Ravichandran,"Evolving Stream Data Clustering and TCV Rank Summarization" Vol. 3 - Issue 6 ( 440 - 444 ) - November - December 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I5P66 |
|
67 |
VLSI Design of Non-Redundant Radix-4 Signed-Digit Encoding for Pre-Encoded Multipliers
- Kalpana Kparaboina, Pabbaraju Padmaja ,N.Chandrashekhar
Abstract
In this paper, we show an outline of pre-encoded multipliers for cutting edge hail dealing with applications in perspective of separated encoding of coefficients. To this extend, the Non-Redundant radix-4 Signed-Digit (NR4SD) encoding system, which uses the digit regards f1; 0; �1; �2g or f2; 1; 0; �1g, is proposed provoking a multiplier plot with less personality boggling fragmentary things execution. Wide exploratory examination affirms that the proposed pre-encoded NR4SD multipliers, including the coefficients memory, are more zone and power profitable than the consistent Modified Booth plot. Keyword: Modified booth Algorithm, Pre-Encoded Multiplier,Conventional MBMultiplier,Pre Encoded MB Multiplier,VLSI Design.× Kalpana Kparaboina,Pabbaraju Padmaja ,N.Chandrashekhar,"VLSI Design of Non-Redundant Radix-4 Signed-Digit Encoding for Pre-Encoded Multipliers" Vol. 3 - Issue 6 ( 445 - 449 ) - November - December 2017, International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I5P67 |
|
68 |
A New Approach for Exactness Agriculture Monitoring Using IOT&ESP8266
- Shaik Jakir Sharif , Rajesh Kanuganti
Abstract
The net of issues (IoT) development is specially framing great reasons for human life. Exactness agribusiness is most of the standards which could use the IoT purposes important to enhance the advancement affectivity and consistency over the cultivation fields, replace the no longer too awful of the harvests, and decline the negative commonplace effect. In this paper, we favoring IoT configuration apparently created for exactness cultivating purposes. The proposed 3-layer structure accumulates the specified studying and exchanges it to a cloud-advanced again general the place it's handled and separated. Recommendations enhancements masterminded at the examined records will in like way be dispatched again to the route quit center points. We evolved a model of the proposed constructing to demonstrate its efficiency authority. Keyword: WSN, soil moisture, soil temperature, humidity etc.× Shaik Jakir Sharif ,Rajesh Kanuganti,"A New Approach for Exactness Agriculture Monitoring Using IOT&ESP8266" Vol. 3 - Issue 6 ( 450 - 454 ) - November - December 2017, International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I5P68 |
|
69 |
Wireless Body Area Networks onsecure Based Communications Andencrypt Protocol Data
- A.Madhavi, Ganta Ashok Kumar
Abstract
The WBANs (Wireless Body Area Networks) getting to be plainly captivating examination space for some analysts because of its augmenting use in various genuine time situations, for example, medicinal services frameworks, therapeutic frameworks and so on. WBAN is made out of remote sensor organizes by comprising of moment minute sensor contraptions and remote evices for remote individual body observing exercises and related condition. [1] Consequently WBAN is turning into the captivating strategy for credible time remote observing of physiological human body motions keeping in mind the end goal to brace social insurance framework related applications. WBAN is having two fundamental issues or difficulties to deal with for specialists, for example, vitality effective and security. In this paper we audit distinctive security systems in WBAN. We displayed the writing review on strategies for security like biometric predicated security, circular bend predicated security, TinySec predicated security and equipment encryption predicated techniques. In WBAN, security is required to learn the dependable and reliable patients individual wellbeing data collections. Keyword: WBAN, Biometric, Elliptical bend, ECC, TinySec, ECG, SPINS.× A.Madhavi, Ganta Ashok Kumar," Wireless Body Area Networks onsecure Based Communications Andencrypt Protocol Data " Vol. 3 - Issue 6 ( 450 - 454 ) - November - December 2017, International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I5P69 |
|
70 |
Prevention of SQL Injection with Two Fold Secured Authenticated System using Text Based Graphical Password
- Dr. Velmayil G , Preethika S
Abstract
Textual password is the most typical methodology used for password authentication. Users are acquainted with textual password method. Textual passwords are vulnerable to various attacks like eavesdropping, dictionary, SQL injection, brute force, denial of service attacks, shoulder surfing and key loggers. Several authentication systems like biometric authentications, token based authentications and graphical based authentications are used to overcome these attacks. Existing methods are insecure, have high failure rate and not enough to meet out economically. Graphical passwords are also vulnerable to shoulder surfing. None of the recall-based based techniques are considered should-surfing resistant. At this point, only a few recognition-based techniques are designed to resist shoulder-surfing which open up the need for a research solution. This paper proposes the prevention of SQL injection with two-fold secured authenticated system using text based graphical password. It consolidates the utilization of plain content accreditations that are cryptographically hashed at runtime with text based graphical login accreditations. The two factor authentication of formula password is implemented to enhance the authentication system. The passwords are stored in different database to secure from the hackers. The objective is to dependably ensure access to a client account not withstanding when such record is under attack while in the meantime guaranteeing helpful and secure login encounter by real clients. This is accomplished by blocking the illegitimate user as black list once login failed consecutive three times. Keyword: SQL injection, cryptographic salt, hash, attacks, graphical password, two factor authentication.× Dr. Velmayil G , Preethika S,"Prevention of SQL Injection with Two Fold Secured Authenticated System using Text Based Graphical Password" Vol. 3 - Issue 6 ( 455 - 465 ) - November - December 2017, International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I5P70 |
|