USRP 2901 Based MIMO-OFDM Transciever in Virtual and Remote Laboratory
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.1033-1040, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.10331040
Abstract
OFDM has developed into a popular scheme for wideband digital communication, used in different applications such as digital television and audio broadcasting, Internet access, wireless networks and 4G mobile communications etc. SDR has become a universal platform for implementing any type of waveform in software. We use Universal Software Radio Peripheral (NI USRP-2901) as SDR to transmit and receive the OFDM signal with MIMO configuration. MIMO- OFDM Transceiver is implemented using USRP devices and data is transmitted in terms of bits as shown in the front panel output and input. The data is transmitted with the help of VERTO antennas. The VI Snippets of both transmitter and receiver are explained step by step and results are shown in the front panel in the LabVIEW software. The number of bits received and transmitted is also shown with transmitting frequency and receiving frequency in the screen shot.
Key-Words / Index Term
OFDM, MIMO, USRP, SDR, LabVIEW
References
B. R. Ballal, A. Chadha and N. Satam, “Orthogonal Frequency Division Multiplexing and its Applications”, International Journal of Science and Research, Vol. 2 Issue 1, pp 325-328, 2013.
[2] C.Poongodi, P.Ramya ,A. Shanmugam, “BER Analysis of MIMO OFDM System using M-QAM over Rayleigh Fading Channel” Proceedings of the International Conference on Communication and Computational Intelligence. 2010.
[3] Dr.JayaKumari.J,(2010) “MIMO OFDM for 4G Wireless Systems”, International Journal of Engineering Science and Technology, Vol .2, no 7, 2010.
[4] Pallavi Bhatnagar,Jaikaran Singh,Mukesh Tiwari“ Performance of MIMO-OFDM System for Rayleigh fading channel” International Journal of Science and Advanced Technology, Vol. 3, 2011.
[5] PuLi,Haibin Zhang, Job Oostveen, Erik Fledderus, “MIMO OFDM Performance in Relation to Wideband Channel Properties” The Netherlands 21 st IEEE International Symposium on Personal,Indoor and Mobile Radio Communications , 2010.
[6] Telagam, Nagarjuna, Nehru Kandasamy, and Menakadevi Nanjundan. "Smart Sensor Network Based High Quality Air Pollution Monitoring System Using Labview." International Journal of Online Engineering (iJOE), Vol. 13, no.08, pp 79-87, 2017.
[7] Telagam, N., Nanjundan, M., Kandasamy, N., & Naidu, S. “Cruise Control of Phase Irrigation Motor Using SparkFun Sensor”, International Journal of Online Engineering (iJOE), vol.13, no 08, pp 192-198, 2017.
[8] Gantala, A., Nehru, K., Telagam, N., Anjaneyulu, P., & Swathi, D. “Human Tracking System using Beagle Board-xM”. International Journal of Applied Engineering Research, vol 12, no 16, pp 5665-5669, 2017.
[9] Nehru Kandasamy, Firdous Ahmad, Shashikanth Reddy, Nagarjuna Telagam, Somanaidu Utlapalli. “Performance evolution of 4-b bit MAC unit using hybrid GDI and transmission gate based adder and multiplier circuits in 180 and 90 nm technology,” Microprocessors and Microsystems, vol 59, pp 15-28, 2018.
[10] Telagam, N., & Kandasamy, N. “Low Power Delay Product 8-bit ALU Design using Decoder and Data Selector.” Majlesi Journal of Electrical Engineering, vol 12, no.1, pp103-108, 2018.
[11] Anil Gantala, Nagarjuna Telagam, G.Vijay kumar, P. Anjaneyulu, R.Murali Prasad, “content-based image retrieval using genetic algorithm retrieval effectiveness in terms of precision and recall”, journal of advanced research in dynamical and control systems, vol 12, pp 2020-2028, 2017.
[12] Telagam, N., Kandasamy, N., Nanjundan, M., & Arulanandth, T. S. “Smart Sensor Network based Industrial Parameters Monitoring in IOT Environment using Virtual Instrumentation Server” International Journal of Online Engineering (iJOE), vol 13, no.11, pp 111-119, 2017.
[13] Kandasamy, N., Telagam, N., VR, S. R., & Arulananth, T. S. “Simulation of Analog Modulation and Demodulation Techniques in Virtual Instrumentation and Remote Lab” International Journal of Online Engineering (iJOE), vol 13, no.10, pp 140-147, 2017.
[14] Nehru, K., Nagarjuna, T., & Vijay, G. “Comparative Analysis of CNTFET and CMOS Logic based Arithmetic Logic Unit”, Journal of nano- and electronic physics, vol 9, no.4, pp 140-147, 2017.
[15] Khadir, Mohammad, K. Nehru, T. Nagarjuna, and G. Shruthi. “Investigation and analysis of low power modified 14t adder and 20t adder circuits”, Far East journal of electronics and communications, vol 17, no.2, pp 389-397, 2017.
[16] Nagarjuna, T., K. Nehru, A. Usharani, and L. Raviteja. “Design and Development of Coded OFDM based Digital Audio Broadcasting System using Concatenated Convolutional Turbo Codes”, International Journal of Engineering and Technology, vol 9, no.1, pp 77-84, 2017.
[17] Gantala, Anil, G. Vijaykumar, Nagarjuna Telagam, and P. Anjaneyulu. "Design of Smart Sensor Using Linux-2.6. 29 Kernel." International Journal of Applied Engineering Research vol 12, no. 18, pp 7891-7896, 2017.
[18] Tho,takuri, Anuradha, T. Kalyani, Mahendra Vucha, and T. Nagarjuna. "Survey on Robot Vision: Techniques, Tools and Methodologies." International Journal of Applied Engineering Research, vol 12, no. 17, pp 6887-6896, 2017.
[19] N Kandasamy, N Telagam, C Devisupraja, “ design of a low power ALU and synchronous counter using clock gating technique,” progress in advanced computing and intelligent engineering, pp 511-518, 2018.
[20] L.Shruthi, K.Nehru, T.Nagarjuna, “Analysis of DCVS and MODL Logic in CLA,” journal of engineering and applied sciences, vol 13, no.7, 2018.
[21] Konguvel, E., Raja, J., & Kannan, M. “A Low Power VLSI Implementation of 2X2 MIMO OFDM Transceiver with ICI-SC Scheme”. International Journal of Computer Applications, vol 77, no.5, 2013.
[22] Makkar, Jyoti, Himanshu Monga, and Silki Baglha. "Reduction of Inter-Symbol Interference using Artificial Neural Network System in Multicarrier OFDM System." International Journal of Scientific Research in Computer Sciences and Engineering, 2017.
[23] Agrawal, Deepti, and J. S. Yadav. "Investigation of the Effectiveness of Modulation Technique for Wireless Communication with QPSK base Encoding." International Journal of Scientific Research in Computer Sciences and Engineering, 2017.
[24] V.Arun, Md.Abdul Rawoof, A.V.Paramkusam, T.Nagarjuna. “analysis of planar inverted-f antenna using hfss “,International Journal of Mechanical Engineering and Technology, vol 8, no 7, pp 656-661, 2017
Citation
Nagarjuna. Telagam, Shailender. Reddy, Menakadevi. Nanjundan, K.Nehru, "USRP 2901 Based MIMO-OFDM Transciever in Virtual and Remote Laboratory," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1033-1040, 2018.
A.C.P. (ARTIFICIAL CHESS PLAYER), June 2017
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.1041-1051, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.10411051
Abstract
Artificial Chess Player is a chess engine which runs on a Java platform. A ‘chess engine’ refers to a machine which has the ability to play the game of chess against a human subject or another chess engine. The basic functionalities of a chess engine constitute - accepting a move from its opponent, computing the most optimal move within a reasonable degree of approximation and communicate the output back to the opponent and repeat the process with the ultimate goal of winning the game. Out of these, the most significant and also the most challenging part in the construction of a chess engine is enabling it to compute approximately the “best” move to play from a given position of the game and that will be the topic of this paper. The main objective of this paper is to understand the algorithmic rules which help to guide the engine to victory in a limited resource system and also to implement the rules using a high-level language (in this case, Java). The paper will also go through the useful techniques used to implement a chess engine like minimax, alpha beta pruning, board evaluation and understand how to implement them in coding language. Although, chess engine is not a new word in the field of computer science and artificial intelligence, but it is still a field of active research even to this day when machine can beat man at his own game.
Key-Words / Index Term
chess engine, move set, minimax, Alpha-Beta pruning, board evaluating functions, zero-sum game, move ordering, horizon effect, Stockfish
References
[1] Claude E. Shannon, “Programming a Computer for Playing Chess”, Philosophical Magazine, Ser.7, Vol. 41, No. 314 - March 1950
[2] D. Klyushin, K. Kruchinin, “Advanced Search Using Alpha-Beta Pruning, Matematychni Studii. V.25, No.1
Citation
Shalabh Agarwal, Tapadeep Chakraborty, Nikita Dutta, Shenelle Alphonso, "A.C.P. (ARTIFICIAL CHESS PLAYER), June 2017," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1041-1051, 2018.
Review on Machine Learning Techniques for Big Data Management and Open Research Challenges
Review Paper | Journal Paper
Vol.6 , Issue.7 , pp.1052-1055, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.10521055
Abstract
In the recent years, the database on the cloud network is increased exponentially and this enormous volume of data is known as Big Data. The Big Data is described in five V’s known as volume, velocity, variety, Veracity, and Value. Hence, efficient algorithms and architectures are required to process and store the data. In this paper, a review study on machine learning techniques for database management is done. From the study, it is found that machine-learning algorithms provide efficient data processing and storage. In the last research issues are defined which helps the other author to contribute their work in this area.
Key-Words / Index Term
Big Data, Machine Learning, Internet of Things, Database Management
References
[1] Athmaja, S., Hanumanthappa, M. and Kavitha, V, “A survey of machine learning algorithms for big data analytics,” In Innovations in Information, Embedded and Communication Systems (ICIIECS), 2017 International Conference, pp. 1-4, 2017.
[2] Raghupathi, W. and Raghupathi, V., “Big data analytics in healthcare: promise and potential,” Health information science and systems, vol. 2, issue 1, p.3, 2014
[3] Suthaharan, S., “Big data classification: Problems and challenges in network intrusion prediction with machine learning,” ACM SIGMETRICS Performance Evaluation Review, vol. 41, pp.70-73, 2014
[4] Wei Tan, Brian Blake, Iman Saleh, and Schahram Dustar, “Social-Networks-Sourced Big Data Analytics,” IEEE Internet Computing, vol. 17, issue 5, pp.62-69, 2013.
[5] Edosio, U.Z., “Big data Analytics and its Application in E-commerce,” Proceedings E-Commerce Technologies. University of Bradford, 2014.
[6] Singh, S.P. and Jaiswal, U.C., “Machine Learning for Big Data: A New Perspective,” International Journal of Applied Engineering Research, vol. 13, issue 5, pp.2753-2762, 2018.
[7] Zhou, L., Pan, S., Wang, J. and Vasilakos, A.V., “Machine learning on big data: Opportunities and challenges,” Neurocomputing, vol. 237, pp.350-361, 2017.
[8] Swathi, R. and Seshadri, R., “Systematic survey on evolution of machine learning for big data,” In Intelligent Computing and Control Systems (ICICCS), 2017 International Conference on, pp. 204-209, 2017.
[9] Zhou, L., Pan, S., Wang, J. and Vasilakos, A.V., Machine learning on big data: Opportunities and challenges. Neurocomputing, vol. 237, pp.350-361, 2017.
[10] Varatharajan, R., Manogaran, G. and Priyan, M.K., “A big data classification approach using LDA with an enhanced SVM method for ECG signals in cloud computing,” Multimedia Tools and Applications, vol. 77, issue 8 , pp.10195-10215, 2018.
[11] Maillo, J., Ramírez, S., Triguero, I. and Herrera, F.,. “KNN-IS: An Iterative Spark-based design of the k-Nearest Neighbors classifier for big data,” Knowledge-Based Systems, vol. 117, pp.3-15, 2017.
[12] Chen, M., Hao, Y., Hwang, K., Wang, L. and Wang, L.,. “Disease prediction by machine learning over big data from healthcare communities,” IEEE Access, vol. 5, pp.8869-8879, 2017
[13] Sun, F., Huang, G.B., Wu, Q.J., Song, S. and Wunsch II, D.C.,. “Efficient and rapid machine learning algorithms for big data and dynamic varying systems,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 47, issue 10, pp.2625-2626, 2017.
[14] Le, L.V., Sinh, D., Tung, L.P. and Lin, B.S.P., “A practical model for traffic forecasting based on big data, machine-learning, and network KPIs,” In Consumer Communications & Networking Conference (CCNC), 2018 15th IEEE Annual, pp. 1-4, 2018.
[15] Li, P., Chen, Z., Yang, L.T., Zhang, Q. and Deen, M.J., “Deep convolutional computation model for feature learning on big data in Internet of Things” IEEE Transactions on Industrial Informatics, vol. 14, issue 2, pp.790-798, 2018.
[16] Shen, Y., Han, T., Yang, Q., Yang, X., Wang, Y., Li, F. and Wen, H., “CS-CNN: Enabling Robust and Efficient Convolutional Neural Networks Inference for Internet-of-Things Applications,” IEEE Access, vol. 6, pp.13439-13448, 2018.
[17] Lakshmanaprabu, S.K., Shankar, K., Khanna, A., Gupta, D., Rodrigues, J.J., Pinheiro, P.R. and De Albuquerque, V.H.C., “Effective Features to Classify Big Data Using Social Internet of Things,” IEEE Access, vol. 6, pp.24196-24204, 2018.
Citation
Gagandeep Kaur, Jasvir Singh, "Review on Machine Learning Techniques for Big Data Management and Open Research Challenges," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1052-1055, 2018.
An Id-based Authentication Scheme With A Focus On Impersonation And Modification Attack On VANET
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.1056-1060, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.10561060
Abstract
VANETs (Vehicular Ad Hoc Networks), are similar to MANETs (Mobile Ad Hoc Networks) in which the nodes are vehicles. The vehicles exchange messages among themselves and these messages could be regarding the traffic status on road or the condition of the vehicle. The messages could get tampered by an adversary who wishes to gain the information regarding the vehicle. He could also track the vehicle which would violate the driver’s privacy. Hence these messages have to be secured. The adversary could modify the messages which could vary the exact information sent by the vehicle; also he could impersonate as an authorized user and tamper the information. The aim is to protect the vehicle against the two attacks; modification attack and impersonation attack. The energy consumed by the source node to send it towards the destination is calculated.
Key-Words / Index Term
VANET, modification, impersonation, energy
References
T. W. Chim, S. M. Yiu, L. C. K. Hui, and V. O. K. Li, “SPECS: Secure and privacy enhancing communications schemes for VANETs,” Ad Hoc Netw., vol. 9, no. 2, pp. 189–203, 2011.
[2] S. Zeadally, R. Hunt, Y.-S. Chen, A. Irwin, and A. Hassan, “Vehicular ad hoc networks (VANETs): Status, results, and challenges,” Telecommun. Syst., vol. 50, no. 4, pp. 217–241, 2012.
[3] M. Ghosh, A. Varghese, A. Gupta, A. A. Kherani, and S. N. Muthaiah, “Detecting misbehaviors in VANET with integrated root-cause analysis,” Ad Hoc Netw., vol. 8, no. 7, pp. 778–790, 2010.
[4] Y. Toor, P. Muhlethaler, and A. Laouiti, “Vehicle ad hoc networks: Applications and related technical issues,” IEEE Commun. Surveys Tuts., vol. 10, no. 3, pp. 74–87, Sep. 2008.
[5] A. Boukerche, H. A. B. FOliveira, E. F. Nakamura, and A. A. F. Loureiro, “Vehicular ad hoc networks: A new challenge for localization-based systems,” Comput. Commun., vol. 31, no. 12, pp. 2838–2849, 2008.
[6] IEEE Trial-Use Standard for Wireless Access in Vehicular Environment—Security Services for Applications and Management Messages, IEEE Standard 1609.2-2006, Jul. 2006.
[7] M. Raya, P. Papadimitratos, and J.-P. Hubaux, “Securing vehicular communications,” IEEE Wireless Commun., vol. 13, no. 5, pp. 8–15, Oct. 2006.
[8] J. T. Isaac, S. Zeadally, and J. S. Camara, “Security attacks and solutions for vehicular ad hoc networks,” IET Commun. J., vol. 4, no. 7, pp. 894–903, 2010.
[9] J. P. Hubaux, S. Capkun, and J. Luo, “The security and privacy of smart vehicles,” IEEE Security Privacy, vol. 2, no. 3, pp. 49–55, May/Jun. 2004.
[10] C. Gamage, B. Gras, B. Crispo, and A. S. Tanenbaum, “An identitybased ring signature scheme with enhanced privacy,” in Proc. Securecomm Workshops, 2006, pp. 1–5.
[11] M. Raya and J.-P. Hubaux, “Securing vehicular ad hoc networks,” J. Comput. Secur., vol. 15, no. 1, pp. 39–68, 2007.
[12] R. Lu, X. Lin, H. Zhu, P.-H. Ho, and X. Shen, “ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications,” in Proc. 27th Conf. IEEE INFOCOM, Apr. 2008, pp. 1903– 1911.
Citation
Nischitha. S.B, Shubha Bhat, "An Id-based Authentication Scheme With A Focus On Impersonation And Modification Attack On VANET," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1056-1060, 2018.
Development of Android Application with Effective User Interface
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.1061-1063, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.10611063
Abstract
This paper introduces development of effective user interface (UI) for android users. Various applications explored in this paper that contains the best features of android including Repackaging Detection Technique, Language Studies, Personalized Sightseeing Tours using GPS Technique, Vision Measure Application using Snellen’s Chart and Sleep Analysis Application using Tracking System. Effective user interface (UI) is the basic need for mobile users. Android provides various features to create elegant UI using Cascading Style Sheet (CSS), Hyper Text Markup Language (HTML) and Extensible Markup Language (XML). The development for an android application is mainly considered by its UI. Android is a platform that consists of an operating system and a Software Development Kit (SDK) for handheld devices. Anyone can use the Android SDK to develop application to run on the Android OS because it is an open system, simple and easy to use. Android smart devices have become an essential part of our daily life because of its smart UI design.
Key-Words / Index Term
Mobile Application Development, SDK, User Interface, API, XML, HTML, CSS
References
[1] B.B. Gupta, “Android Applications Repackaging Detection Techniques for Smartphone Device”, Science Direct,Vol.78, pp.26-32, 2016.
[2] Xing Liu, “Development of Android Application for Language Studies”, ScienceDirect, Vol.4, pp.8-16, 2013.
[3] Ricardo Anacleto, “Mobile application to provide personalized sightseeing tours”, Journal of Network and Computer Applications, Vol.41, pp.56-64, 2014.
[4] Aakash Agarwal, “Dr. Eye: An Android Application to Calculate the Vision Acuity,” ScienceDirect, Vol.54, pp.697-702, 2015.
[5] Adrian A. Ong, “Overview of smartphone applications for sleep analysis,” World Journal of Otorhinolaryngology-Head and Neck Surgery, Vol.2, Issue.1, pp.45-49, 2016.
Citation
Vandana, Bornali Purkayastha, Anil Kumar, "Development of Android Application with Effective User Interface," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1061-1063, 2018.
Implementing Electronic Dissemination of Documents Using Three Layers of Security
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.1064-1069, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.10641069
Abstract
Cyber-crime and data breach has been growing exponentially in present world. In this scenario, it is important for any organization to have a robust method for the transactions of confidential data through the internet. The primary purpose of this study is to develop a completely safe and secure application that enables an organisation to disseminate electronic documents over the internet to their subordinate bodies. The current study is implemented in a university for disseminating the examination question papers to its affiliated colleges and examination centres during the examination season using a safe, secure and robust application. In this application there are three layers of security techniques are proposed. Documents can be sent to multiple centers simultaneously and are secured with Advanced Encryption Standard technique. This application involves Automated Interface Module which is used to encrypt the documents at university end and then decrypt them at examination center. This system also provides a feature for scheduling the process of dissemination of documents. This system uses RSA and AES Encryption methods and SHA-512 hashing algorithm for ensuring security as well as privacy of documents to reduce threats of attackers and maintain the confidentiality of this system. In the existing traditional delivery system, delivering a question paper from a university in real time is a challenging task due to involvement of logistics and lack of traceability. Through the empirical review of the existing traditional delivery system, the proposed system eliminates the risk of data breach and even impacts on the financial level by using proactive and pragmatic methods that seeks both security and consistency.
Key-Words / Index Term
Hashing, Dissemination, Security, Examination, Document, Encryption, Scheduling, AES, RSA
References
[1] M. A. Sadikin, R. W. Wardhani, "Implementation of RSA 2048-bit and AES 256-bit with digital signature for secure electronic health record application" in ISITIA, Lombok:IEEE, pp. 387-392, 2016.
[2] R.L. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems”, Communications of the ACM. 21 (2): pp. 120–126, 1977. doi:10.1145/359340.359342.
[3] Eman Salim Ibrahim Harba, “Secure Data Encryption Through a Combination of AES, RSA and HMAC”, Engineering, Technology & Applied Science Research Vol. 7, No. 4, 2017, pp. 1781-1785.
[4] M. S. Abutaha, A. A. Amro, “Using AES, RSA, SHA1 for Securing Cloud”, International Conference on Communication, Internet and Information Technology, Madrid, Spain, 2014.
[5] Daemen, Joan, Rijmen, Vincent. (March 9,), “AES Proposal: Rijndael”. National Institute of Standards and Technology 2003; pp. 1. Retrieved 21 February 2013.
[6] Sourabh Chandraa, Bidisha Mandalb, Sk. Safikul Alamc, Siddhartha Bhattacharyya, “Content based double encryption algorithm using symmetric key cryptography”, in International Conference on Recent Trends in Computing (2015).
[7] Sachin sharma1, Jeevan Singh Bisht, “Performance Analysis of Data Encryption Algorithms”, in International Journal of Scientific Research in Network Security and Communication Volume-3, Issue-1, 2015, pp. 1-5.
[8] V. Kapoor, “Data Encryption and Decryption Using Modified RSA Cryptography Based on Multiple Public Keys and ‘n’prime Number”, in International Journal of Scientific Research in Network Security and Communication Volume-1, Issue-2, 2013, pp. 35-38.
[9] G. van Rossum, “Python tutorial”, Technical Report CS-R9526, Centrum voor Wiskunde en Informatica (CWI), Amsterdam, May 1995, pp 1-71.
[10] Behrouz A. Forouzan, “Cryptography and Network Security”, the Mc-Graw Hil Companies, USA, pp. 293-336, 2007.
[11] Stalling, W., “Cryptography and Network Security: Principles and Practice”, 6th ed.; Prentice Hall, Inc.: Upper Saddle River, NJ, USA, pp. 327-361, 2014.
Citation
Banoth Thirumal, R. U. V. N. Satish, M. Vivekananda Swamy, "Implementing Electronic Dissemination of Documents Using Three Layers of Security," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1064-1069, 2018.
Steganography in HTML Files Using ROT-N Algorithm
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.1070-1073, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.10701073
Abstract
In this modern era, the importance of information security has gained a special importance. Steganography is the art and science of invisible communication. This is accomplished through hiding information in other information, thus hiding the existence of the communicated information. Steganography techniques can be applied to text file,HTML file,XML file, images, a video file or an audio file. This paper intends to give an overview of web steganography techniques.It proposes a new idea to hide information in web pages which includes using ROT-N algorithm and thereby, acquiring the extra security. The experimental results show that the proposed method has high security than other existing methods. The suggested method is implemented by using Java language.
Key-Words / Index Term
Steganography, Cryptography, Security, HTML, ROT-N Algorithm
References
[1] B.S. Reddy,K.S. Kuppusamy,T. Sivakumar “Towards Web Page Steganography with Attribute Truth Table”, 2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS -2016), Jan. 22 – 23, 2016, Coimbatore, INDIA
[2] X. Yong, L. Juan, and Z. Yilai, “A High Capacity Information Hiding Method for Webpage Based on Tag,” 2012 Third Int. Conf. Digit. Manuf. Autom., pp. 62–65, 2012.
[3] R.K. Singh , B. Alankar, ”A Novel Approach For Data Hiding In Web Page Steganography Using Encryption With Compression Based Technique” ,IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 3, Ver. III (May-Jun. 2016)
[4] C. Dhanani, K. Panchal,”HTML Steganography using Relative links & Multi web-page Embedment” IJEDR | Volume 2, Issue 2 | ISSN: 2321-9939, 2014.
[5] M. Garg, “A Novel Text steganography Technique Based on HTML Document”, International Journal of advanced Science and Technology Vol. 35, October 2011.
[6]Arora, K., & Gandhi, G. “A Review of Approaches for Steganography”. International Journal of Computer Sciences and Engineering, 2(5), 118-122,2014.
[7] Y. C. Chou and H. C. Liao, “A Webpage Data Hiding Method by Using Tag and CSS Attribute Setting,” 2014 Tenth Int. Conf. Intell. Inf. Hiding Multimed. Signal Process., pp. 122–125, 2014.
[8] I. Lee and W. Tsai, “Secret Communication through Web Pages Using Special Space Codes in HTML Files,” Int. J., pp. 141–149, 2008.
[9] D. V Dhawase and P. S. Chavan, “WEBPAGE INFORMATION HIDING USING PAGE CONTENTS,” vol. 3, no. 1, pp. 182–186, 2014.
[10] X. Guo, G. Cheng, C. Zhu, A. Zhou, W. Pan, and D. Truong, “Make Your Webpage Carry Abundant Secret Information Unawarely,” 2013 IEEE 10th Int. Conf. High Perform. Comput. Commun. 2013 IEEE Int. Conf. Embed. Ubiquitous Comput., pp. 541–548, 2013.
[11] S. Dey, H. Al-Qaheri, and S. Sanyal, “Embedding Secret Data in Html Web Page,” arXiv Prepr. arXiv1004.0459, pp. 1–10, 2010.
[12] Mohammad Shirali Shahreza, “A New Method for Steganogrpahy in HTML Files”, Advance in computer, Information and System Science & Engineering , 247-251, 2006 Springer.
[13]Rao, B. R., Kumar, P. A., Rao, K. R. M., & Nagu, M. “A Novel Information Security Scheme using Cryptic Steganography”. Indian Journal of Computer Science and Engineering, 1(4), 327-332.,2010.
Citation
N.K. Gupta, B. Paul, "Steganography in HTML Files Using ROT-N Algorithm," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1070-1073, 2018.
Recent Trends in Image 2D to 3D: Binocular Depth Cues
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.1074-1081, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.10741081
Abstract
As 3D images and videos are grabbing more attention of people these days, it became very important concern for researchers. Recent area of interest growing in converting 2D images into 3D images. Many researchers have worked upon different methods to bridge this gap. This paper addresses various methodologies and recent trends in Image from 2D to 3D conversion. We have bestow on Binocular Depth Cues Techniques like binocular Disparity Motion, Focus, Defocus, silhouette and other concepts based on several aspects and considerations. This paper also discusses strength and limitations of these algorithms to give a broader review on which various techniques to be used in different cases.
Key-Words / Index Term
Binocular Depth Cues, 2D to 3D Images, Strength, Limitations, Conversion Algorithms.
References
[1] M. Galabov, Research Conference In Technical Disciplines, 2D to 3D conversion algorithms, November, 2014
[2] T-Ying Kuo, Y-Chung Lo, and C Lin, ICASSP IEEE 2012 2D-TO-3D CONVERSION FOR SINGLE-VIEW IMAGE BASED ON CAMERA PROJECTION MODEL AND DARK CHANNEL MODEL,March, 2012
[3] M. Galabov , IJESIT Volume4, Issue 1,A Real Time 2D to 3D Image Conversion Techniques, January, 2015
[4] D.Mohini Pathak, Tanya Mathur, IJEDR, Volume 5, Issue 2, Recent trends in image 2D to 3D: Monocular depth cues, May 2017
[5] Scott Squires.” 2D to 3D Conversions”, http://effectscorner.blogspot.in/2011/08/2d-to-3d-conversions.html#.WUNpxohEmUk, August, 2011
[6] Q. Wei, “Research Assignment for Master Program Media and Knowledge Engineering of Delft University of Technology” , Converting 2D to 3D: A Survey, December,2005
[7] Xue Tu, Youn-sik Kang and Murali Subbarao, “Article Proceedings of SPIE - The International Society for Optical Engineering”, Depth and Focused Image Recovery from Defocused Images for Cameras Operating in Macro Mode,Sep 2007
[8] A. N. Rajagopalan and S. Chaudhuri,” IEEE trans image process”, A recursive algorithm for maximum likelihood-based identification of blur from multiple observations,1998
[9] A. N. Rajagopalan and S. Chaudhuri,” ICCV, pp. 1047–1052” , Optimal recovery of depth from defocused images using an MRF model, 1998.
[10] Y. Xiong and S. Shafer, “DARPA93, pp. 967” ,Depth from focusing and defocusing,1993.
[11] M. Watanabe and S. Nayar, “Tech. Rep. CUCS-035-95, Dept. of Computer Science, Columbia University “, Rational filters for passive depth from defocus, Sept. 1995.
[12] M. Subbarao and G. Surya, “IJCV 13, pp. 271–294” , Depth from defocus: A spatial domain approach,December 1994.
[13] D. Ziou and F. Deschenes, “Computer Vision and Image Understanding : CVIU 81(2), pp. 143–165”, Depth from defocus estimation in spatial domain, 2001.
[14] Pentland, A. P. “IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 9, No.4, Page(s) 523-531”, Depth of Scene from Depth of Field”, 1987
[15] Spring, K.H., and Stiles, W.S. “Br. J. Ophthalmol. 32, 340–346 “,Variation of pupil size with change in the angle at which the light stimulus strikes the retina, 1948
[16] R. T. Held,1,* A. Cooper,2 and S. Banks,” Current Biology 22, 426–431, March 6, 2012 ª2012 Elsevier Ltd All rights reserved DOI 10.1016/j.cub.2012.01.033”, Blur and Disparity Are Complementary Cues to Depth, March, 2012.
[17] WIKIPEDIA, “Depth of Focus” https://en.wikipedia.org/wiki/Depth_of_focus#cite_ref-Larmore1965p167_1-0
[18] Nayar, S.K.; Nakagawa, Y, “Pattern Analysis and Machine Intelligence, IEEE Transactions on Volume 16, Issue 8, Page(s): 824 – 831”, Shape from Focus, 1994
[19] T. M Naoki Asada, H. Fujiwara, “International Journal of Computer Vision, 28(2):153–163”,
Edge and depth from focus, 1998.
[20] S.W. Hasinoff and K.N. Kutulakos.” In Proc. Ninth European Conference on Computer Vision, pages 620–634”, Confocal stereo. May 2006.
[21] Matsuyama, T. “Informatics Research for Development of Knowledge Society Infrastructure, ICKS 2004, International Conference, Page(s) 7-14”,Exploitation of 3D video technologies ”,2004
[22] K. Cheung, S. Baker and T. Kanade, ”International Journal of Computer Vision, May 2005 , Volume 62, Issue 3, pp 221–247”, Shape-From-Silhouette Across Time, May 2005.
[23] Michel B., “La Stéréoscopie Numérique,Eyrolles, Chapter 5”, La conversion 2D–3D”,2011.
[24] Scharstein, D.; Szeliski, R, “International Journal of Computer Vision 47(1/2/3), 2002,7-42”,
A Taxonomy and Evaluation of Dense Two-Frame Stereo Correspondence Algorithms, 2002
[25]DA SILVA V.,“Depth image based stereoscopic view rendering forMATLAB”,http://www.mathworks.com/matlabcentral/fileexchange/27538-depthimage-
based-stereoscopic-view-rendering, 2010.
[26] Guan-Ming Su, Yu-Chi Lai, Andres Kwasinski and Haohong Wang,” First Edition, Published by John Wiley &Sons, Ltd”, 3D Visual Communications, 2013.
[27] Matsuyama, T. “Informatics Research for Development of Knowledge Society Infrastructure, ICKS 2004, International Conference, 2004, Page(s) 7-14”,Exploitation of 3D video technologies, 2004
[28] Wong, K.T.; Ernst, F., “Single Image Depth-from-Defocus”, Master thesis, Delft university of Technology & Philips Natlab Research,Eindhoven, The Netherlands, 2004.
[29] Battiato, S. ; Curti, S. ; La Cascia, M.; Tortora, M.; Scordato, E. “SPIE Proc. Vol 5302, EI2004
conference „Threedimensional image capture and applications VI”, Depth map generation by image classification”, 2004.
[30] Han, M; Kanade, T. “IEEE Transactions on Pattern Analysis and Machine Intelligence, Volume 25, Issue 7, 2003, Page(s): 884 – 894”, Multiple Motion Scene Reconstruction with Uncalibrated Cameras, 2003
[31] Franke, U.; Rabe, C., “Intelligent Vehicles Symposium, Proceedings. IEEE, 2005, Page(s): 181 – 186”, Kalman filter based depth from motion with fast Convergence, 2005.
[32] Kao, M.A., Shen, T.C. “IDW`09, p. 203, 2009”, A novel real time 2D to 3D conversion technique using depth based rendering, 2009
[33] Bleyer M., Gelautz M., “Proceedings of the 6th International Symposium on Image and Signal Processing and Analysis (ISPA),Salzburg, pp. 383–387, 16–18”, Temporally consistent disparity maps from uncalibrated stereo videos”, September 2009.
[34] XU F., LAM K.M., DAI Q., “Image and Vision Computing Journal, vol. 29, no. 2–3, pp. 190–205”, Video-object segmentation and 3Dtrajectory estimation for monocular video sequences, 2011.
[35] Kang, G; Gan, C.; Ren, W., “, International Conference on Machine Learning and Cybernetics, Volume 8, 2005, Page(s): 5165 – 5169”,Shape from Shading Based on Finite- Element,2005
[36] Loh, A.M.; Hartley, R., “Proceedings, the British Machine Vision Conference”,Shape from Non-Homogeneous, Non- Stationary, Anisotropic, Perspective texture, 2005.
[37] Shimshoni, I.; Moses, Y.; Lindenbaumlpr, M.,“ Proceedings, International Conference on Image Analysis and Processing, 1999, Page(s): 76 – 81“, Shape reconstruction of 3D bilaterally symmetric surfaces”, 1999
[38] Redert, A., “Creating a Depth Map”, Royal Philips Electronics, the Netherlands, Patent ID: WO2005091221 A1, 2005.
[39] V.P. Namboodiri, “Novel diffusion based techniques for depth estimation and image restoration from defocused images.” Doctor of Philosophy thesis, IIT, Bombay, India, 2008
[40] N. Qian,” Neuron, Vol. 18, 359–368, March, 1997, Copyright ã1997 by Cell Press”, Binocular Disparity Review and the Perception of Depth, 1997.
Citation
Disha Mohini Pathak, Swati Chauhan, Dayanand, "Recent Trends in Image 2D to 3D: Binocular Depth Cues," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1074-1081, 2018.
ZIGBEE Controlled Industrial Robot for Controlling the Fire in a Sensitive Way
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.1082-1084, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.10821084
Abstract
In Smart industries, there are varieties of robots performing different tasks. They are controlled via a networked socket application or by its own teach pendant. However, to monitor the status or make minor changes to the programming of the robot, chord less sensor network is used. The node of the sensor consists of data processing, sensing and communication components. It connected with Wireless sensor network base on effort of a large no. of nodes. This paper introduces a Zigbee platform that communicates with robots over a Fast transmission. Wireless networks which has a capability of navigation enable mobile devices to both determine their current position and also for communication. The limitation of individual technologies can beat the multiplicity steering, especially when operating in harsh environments such as indoors. In human side a physical human robot interaction in the context of a human, physically guiding a robot through the desired set of motions. Both the robot and human starts the movement at the same (low response time). The results show that the system allows the intuitive way of control for an industrial robot.
Key-Words / Index Term
Zigbee Transmitter, Wireless Sensor Networks, Service Robot
References
[1]. Wang Huiyong, Wang Jingyang, “Building a smart home system using WSN”2012.
[2]. Andrea conti, Davide Dardari, Matteo Guerra,“Experimental characterization of diversity navigation, 2013.
[3]. T. Song, J. Park, S. Jung, and J. Jeon, “The development of interface device for human robot interaction”, Control, Automation and Systems,2007.
[4]. P. Neto, J. Pires, and A. Moreira, “Accelerometer-based control of an industrial robotic arm”, Robot and Human Interactive Communication,2009.
[5]. Z. Wang, L. Liu, and M. Zhou. “Protocols and Applications of Ad-hoc Robot Wireless Communication Networks: An Overview,” The International Journal of Intelligent Control Systems, vol. 10(4), pp. 296-303, 2005.
[6]. C.Connolly, “KUKA robotics open architecture allows wireless control Industrial Robot,”: An International Journal,2008.
[7]. LI Li, LIU Yuan-an, TANG Bi-hua: SNMS “ An intelligent transportation system network architecture based on WSN and P2P network,” The Journal of China universities of posts and telecommunications, 2007, 14(1) pp. 65-70.
[8]. Arora .P ,Dutta,”A wireless sensor network for target detection and tracking”,2004.
[9]. Soares, S.G., Tak a o, T.B., da Rocha, A., Ara u jo, R.A.M., and Barbosa, T.A.: Building Distributed Soft Sensors, International Journal of Computer Information Systems and Industrial Management Applications, 2011, 3, pp. 202-209.
[10]. Sharma, U., and Reddy, S.: “Design of Home/Office Automation using Wireless Sensor Network”, International Journal of Computer Applications, 2012, 43(22), pp. 46-52.
[11]. Wilson, A. Redfern, P. Wright, “A Wireless Sensor Network and Incident Command Interface for Urban Firefighting. Mobile and Ubiquitous Systems,” Networking & Services, Volume ws00. 2007: IEEE Computer Society Washington, DC, USA.
[12]. Iniewski, K., Siu, C., Kilambi, S., Khan, S., Crowley, B., Mercier, P., and Schlegel, C.: Ultra-low power circuit and system design tradeoffs for smart sensor network applications, in Editor (Ed.) Ultra-low power circuit and system design trade-offs for smart sensor network applications,2005, pp. 309-321.
Citation
A. Saravanan, A. Subhashini, "ZIGBEE Controlled Industrial Robot for Controlling the Fire in a Sensitive Way," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1082-1084, 2018.
Controlling Distributed Denial-of-Service Attacks through Dynamic Path Identifiers
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.1085-1093, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.10851093
Abstract
A Distributed Denial of Service flooding attack in the network performed implicitly and as well as explicitly by the attacker or victim. This attempt is performed to overload the server, generate malicious traffic or interrupting the service. This issue crashes the host and the host’s service will be unavailable to the legitimate users. The enterprise, employment, and assessment of D-PID, a basis that uses PIDs transferred between adjacent domains as inter-domain routing objects. In DPID, the PID of an inter-domain path linking two domains is reserved clandestine and changes animatedly. We label in part how neighbouring domains negotiate PIDs, how to uphold constant communications when PIDs change. We shape a 42-node sample comprised by six domains to prove D-PID’s possibility and demeanour widespread admirations to gauge its efficacy and charge.
Key-Words / Index Term
Inter-domain routing, security, Distributed Denail-of-Service (DDoS), path identifiers
References
[1]Francois, I. Aib, and R. Boutaba, “Firecol: a Collaborative Protection Network for the Detection of Flooding ddos Attacks,” IEEE/ACM Trans.on Netw., vol. 20, no. 6, Dec. 2012, pp. 1828-1841.
[2] OVH hosting suffers 1Tbps DDoS attack: largest Internet has ever seen. [Online] Available: https: //www.hackread.com/ovh-hostingsuffers- 1tbps- ddos-attack/.
[3] 602 Gbps! This May Have Been the Largest DDoS AttackinHistory.http://thehackernews.com/2016/01/biggest-ddos-attack.html.
[4] S. T. Zargar, J. Joshi, D. Tipper, “A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks,” IEEECommun. Surv. & Tut., vol. 15, no. 4, pp. 2046 - 2069, Nov. 2013.
[5] P. Ferguson and D. Senie, “Network Ingress Filtering: Defeating Denial of Service Attacks that Employ IP Source Address Spoofing,” IETF Internet RFC 2827, May 2000.
[6] K. Park and H. Lee, “On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets,” In Proc. SIGCOMM’01, Aug. 2001, San Diego, CA, USA.
[7] A. Yaar, A. Perrig, D. Song, “StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense,” IEEE J. on Sel. Areas in Commun., vol. 24, no. 10, pp. 1853 - 1863, Oct. 2006.
[8] H. Wang, C. Jin, K. G. Shin, “Defense Against Spoofed IP Traffic Using Hop-Count Filtering,” IEEE/ACM Trans. on Netw., vol. 15, no. 1, pp. 40 - 53, Feb. 2007.
[9] Z. Duan, X. Yuan, J. Chandrashekar, “Controlling IP Spoofing through Interdomain Packet Filters,” IEEE Trans. on Depend. and Secure Computing, vol. 5, no. 1, pp. 22 - 36, Feb. 2008.
[10] S. Savage, D. Wetherall, A. Karlin, and T. Anderson, “Practical Network Support for IP Traceback,” In Proc. SIGCOMM’00, Aug. 2000, Stockholm, Sweden.
[11] A. C. Snoeren, C. Partridge, L. Sanchez, C. E. Jones, F. Tchakountio, S. T. Kent, and W. T. Strayer, “Hash-Based IP Traceback,” In Proc.SIGCOMM’01, Aug. 2001, San Diego, CA, USA.
[12] M. Sung, J. Xu, “IP traceback-based intelligent packet filtering: a novel technique for defending against Internet DDoS attacks,” IEEE Trans. OnParall. and Distr. Sys., vol. 14, no. 9, pp. 861 - 872, Sep. 2003.
[13] M. Sung, J. Xu, J. Li, L. Li, “Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Information-Theoretic Foundation,” IEEE/ACM Trans. on Netw., vol. 16, no. 6, pp. 1253 - 1266, Dec. 2008.
[14] Y. Xiang, K. Li, W. Zhou, “Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics,” IEEE Trans. on Inf.Foren. and Sec., vol. 6, no. 2, pp. 426 - 437, May 2011.
[15] H. Ballani, Y. Chawathe, S. Ratnasamy, T. Roscoe, S. Shenker, “Off by default!,” In Proc. HotNets-IV, Nov. 2005, College Park, MD, USA.
[16] A. Yaar, A. Perrig, and D. Song, “SIFF: a stateless internet flow filter to mitigate DDoS flooding attacks,” In Proc. IEEE Symposium on Securityand Privacy, May 2004, Oakland, CA, USA.
[17] B. Parno, D. Wendlandt, E. Shi, A. Perrig, B. Maggs, and Y. Hu, “Portcullis: Protecting connection setup from denial-of-capability attacks,” In Proc. SIGCOMM’07, Aug.2007, Kyoto, Japan.
[18] X. Yang, D. Wetherall, and T. Anderson, “TVA: A DoS-Limiting Network Architecture,” IEEE/ACM Trans. on Netw., vol. 16, no. 3, pp. 1267 - 1280, Jun. 2008.
[19] X. Liu, X. Yang, and Y. Lu, “To Filter or to Authorize: Network-Layer DoS Defense Against Multimillion-node Botnets,” In Proc. SIGCOMM’ 08, Aug. 2008, Seattle, WA, USA.
[20] D. G. Andersen, H. Balakrishnan, N. Feamster, T. Koponen, D. Moon, and S. Shenker, “Accountable Internet Protocol (AIP),” In Proc. SIGCOMM’ 08, Aug. 2008, Seattle, WA, USA.
[21] P. B. Godfrey, I. Ganichev, S. Shenker, and I. Stoica, “Pathlet routing,” in Proc. SIGCOMM’09, Aug. 2009, Barcelona, Spain, pp. 111 - 122.
[22] T. Koponen, S. Shenker, H. Balakrishnan, N. Feamster, I. Ganichev, A. Ghodsi, P. B. Godfrey, N. McKwoen, G. Parulkar, B. Raghavan, J. Rexford, S. Arianfar, D. Kuptsov, “Architecting for innovation,” ACM Comput. Commun. Rev., vol. 41, no. 3, July 2011, pp. 24 - 36.
[23] P. Jokela, A. Zahemszky, C. E. Rothenberg, S. Arianfar, P. Nikander, “LIPSIN: Line Speed Publish/Subscribe Inter- networking,” in Proc. SIGCOMM’09, Aug. 2009, Barcelona, Spain, pp. 195 - 206.
[24] H. Luo, Z. Chen, J. Cui, H. Zhang, M. Zukerman, C. Qiao, “CoLoR: an information-centric internet architecture for innovations,” IEEE Network, vol. 28, no. 3, pp. 4 - 10, May 2014.
[25] L. Zhang, A. Afanasyev, J. Burke, V. Jacobson, kc claffy, P. Crowley, C. Papadopoulos, L. Wang, and B. Zhang, “Named data networking,” ACM Comput. Commun. Rev., vol. 44, no. 3, pp. 66 - 73, Jul. 2014.
[26] T. Koponen, M. Chawla, B. C G. Chun, A. Ermolinskiy, K. H. Kim, S. Shenker, I. Stoica, “A data-oriented (and beyond) network architecture,” in Proc. SIGCOMM’07, Aug. 2007, Kyoto, Japan, pp. 181 - 192.
[27] D. Raychaudhuri, K. Nagaraja, A. Venkataramani, “MobilityFirst: a robust and trustworthy mobility-centric architecture for the future Internet,” Mobile Comput. and Comm. Rev., vol. 16, no. 3, pp. 2 - 13, Jul. 2012.
[28] M. Antikainen, T. Aura, M. Sarela, “Denial-of-service attacks in bloomfilter- based forwarding,” IEEE/ACM Trans. on Netw., vol. 22, no. 5, pp. 1463 - 1476, Oct. 2014.
[29] BGP Peer Report. http://bgp.he.net/report/peers/.
Citation
N. Vijay, M. Sakthivel, "Controlling Distributed Denial-of-Service Attacks through Dynamic Path Identifiers," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1085-1093, 2018.