Volume 1 Issue 9- October 2011


S.No Title Page
1. Analytical Computation Method of Electric Field based on Free Space Model
Abdourahmane Raimy , Bocar Sow

  Abstract—The multiplication of the number of GSM base stations raises the issue of the harmfulness of the electromagnetic waves radio frequencies. In such a context, evaluation methods of the quantity of energy absorbed (SAR-Specific Absorption Rate) by human tissues during an exposition exist: dosimetry for cellular phone and in-situ measurement for base station. However, the in-situ methods require devices for measuring electric fields (spectrum analyzer, personal dosimeter and probe, etc…) that are characterized by high financial and temporal costs. In this paper, we propose an analytical calculation method of electric fields emitted by the GSM base station (BS). It relies on a propagation model of electromagnetic wave. The simulation of our model with MATLAB tools shows a lot of similarities with real measures obtained with in-situ measurements. The advantage of our model is that it doesn’t require equipments but only a prior study of the base station vicinity.

Index Terms—Base stations, Electromagnetic fields, Biological interactions, In vitro, In vivo, Dosimetry, Free Space Model, Path loss.

Full Text PDF
2. A Novel Technique for Beacon Localization in Indoor Environments
A. Ravesha, B. Manjula, Md. Zia Ur Rahman, B.V.Rama Mohana Rao

In a typical localization technique, beacon nodes whose locations are known apriori, act as reference in estimating the location of user nodes. Placement of these beacons in the indoor environments has strong impact on the quality of the localization technique. When the operating environment is an indoor environment such as an office or building, the placement of beacons is very important due to the presence of obstructions which often result in non-uniform signal propagation error and self interference of beacon nodes. Besides, the structure of indoor environment keeps changing with time, affecting the beacon infrastructure. Readjustment of beacon nodes is time consuming and might interrupt the localization service. Hence, it is ideal to minimize the number of readjustments of the beacon nodes as far as possible. To address this issue, we propose an algorithm to minimize the number of the readjustments of beacon nodes and the interruption in localization service.

Keywords— Wireless sensor network, Beacon nodes, User nodes, Localization system, Network devices.

Full Text PDF
3. Performance of Routing Protocol for Ad Hoc Network Using Path Survivability Based on Load and Bandwidth Management under Back Pressure Technique
A K Daniel ,R Singh, J P Saini

Mobile wireless ad hoc network has emerged as the self organized wireless interconnection for the various applications in random topology. However achieving reliable transmission in mobile wireless network is crucial due to change in the network topology caused by node mobility. Congested links are also an expected characteristic of such a network as wireless links inherently have significantly lower capacity than hardwired links and are therefore more prone to congestion. The protocol adapts quickly to routing changes when host movement is frequent, yet requires little or no overhead during periods in which hosts move less frequently. This protocol finds alternate mechanism that will find out optimal and reliable paths in terms of congestion and number of Hop counts, Bandwidth, Traffic load. The route maintenance process is different from of DSR because concept of delay time and alert packets is used.

Keywords— packet, delay time, stream array, survivability factor, Hop counts, Bandwidth, Traffic load

Ful Text PDF
4. An Approximation to the Interval valued Fuzzy set
Pranita Goswami

In this paper  Interval Valued fuzzy set is obtained  over the constant density function between the limits 0 to 1by using Series  expansion  and continued fraction expansion and is represented by the segment between  the two membership functions.

Key words: Uncertainity,intervals.Points, Membership functions

Full Text PDF
5. Evaluated and Suggested Range aggregate query approximation on data cubes in P2P networks
K.Seetha Devi, CH.V. Phani Krishna, P.Venkateswara Rao

Individual computers provide opportunities for tremendous productivity gains, but they become many times more powerful when they're connected to one another forming a peer to peer network that gives them the ability to share data and processing resources. This paper presents data exchange between peers occurs when one of them, in the role of a local peer, needs data available in other nodes, denoted the acquaintances of the local peer and also an adaptive dual-phase approach based on random walks of the P2P graph for efficiently serving range aggregate queries on data cubes in a peer to peer system. The problem of answering large-scale ad hoc analysis queries, for example, range aggregate queries on data cubes possesses unique challenges. Exact solutions can be time consuming and difficult to implement, given the distributed and dynamic nature of P2P data cubes. In this paper, we use an I/O-efficient technique based up on a multi resolution wavelet decomposition that yields excellent approximations for range aggregate queries with limited space usage and computational cost.

Keywords- OLAP, data cubes, aggregate queries, wavelet decomposition, P2P graph


Full Text PDF
6. A Low power 50 nm Technology Based CMOS Inverter with Sleep Transistor Scheme
Arun Kumar Sunaniya , Kavita Khare

This paper proposes a sleep transistor based minimum size inverter in BSIM4.3.0, 50nm CMOS technology with supply voltage of 1V, power dissipation of 46.28nW at 0.502V and maximum drain current of 70nA. The operating frequency is 1GHz. The disadvantage is decrease in voltage swing by 15% compared to the conventional CMOS Inverter
of the same size, whereas the power dissipation is only 1.117% of the power dissipated by classical CMOS inverter and operating frequency is almost 2 times. It is able to satisfy the low standby power requirement and simultaneously high performance during the active mode for many mixed signal applications.
Keywords— Sleep transistor, 50nm, BSIM4.3.0, Voltage Swing.

Full Text PDF
7. Robust Intrusion Detection System using Layered Approach with Conditional Random Fields
Vasavi Bande, U.D.Prasan

Network Security is fast becoming an absolute necessity to protect the information contained on computer systems worldwide.  The ever changing network use and operation along with the public concern for protection of sensitive information makes implementing an efficient and effective security plan a must. Intrusion detection Systems faces a number of challenges, One component of this approach is that of network intrusion detection systems what we are discussing in this paper uses Snort signature database. An intrusion detection system must reliably detect malicious activities in a network and must perform efficiently to cope with the large amount of network traffic. Making a network intrusion detection system work effectively should not degrade overall network performance so some type of performance measurement plan must be designed and implemented. Intrusion Detection Systems have become very popular in the recent years. This is due to the obvious explosive growth of the Internet and the fact that most us keep and access sensitive data online.  In this paper, we have addressed these two issues of accuracy and efficiency using conditional random fields and layered approach. We have demonstrated that high attack detection accuracy can be achieved by using conditional random fields and high efficiency by implementing the layered approach.  Finally, we have resolved that this system is robust and is able to handle noisy data without compromising the network performance.

Keywords – IDS, NIDS, Conditional random fields, layered based, preprocessor, snort signatures, FAR.

Full Text PDF
8. Authentication Using Mobile Phone as a Security Token
T.Venkat Narayana Rao, Vedavathi K

Today security concerns are on the rise in all areas industries such as banks, governmental applications, healthcare industry, militaryorganization, educational institutions etc, with one common weak link being “passwords”. Several proper strategies for using passwords have been proposed. Some of which are very difficult to use and others might not meet the company’s security concerns. The usage of passwords for authentication is no longer sufficient and stronger authentication schemes are necessary. Two factor authentication uses elements or devices such as tokens and ATM cards. We have proposed to resolve the password problem, which could be inconvenient for the user and costly for the service providers to combat otherwise. To avoid the usage of additional device, the mobile phone is adopted as security token. In this paper several different authentication solutions using the mobile as authentication token are discussed, where these solutions vary in complexity, strength, security and user friendliness. One of the authentication schemes (OTP solution) is implemented to verify their usability. Hence, a classification and evaluation of the different solutions is provided according to defined criteria.
Keywords- Two-factor authentication, Security token, UPIF, IMSI, IMEI, one time password (OTP).

Full Text PDF
9. Effective Load Balancing in Overlay Chord & P Grid Networks
S.Bhagya Rekha, M.Vijaya Saradhi

In structured chord & P Grid systems finding the successor nodes, Load balancing and dynamic routing are the challenging issues because nodes are heterogeneous and dynamically nodes may join the network or old node may release from network. We present a general framework, HiGLOB, for global load balancing in structured Chord systems. Current load balancing, finding optimized node and dynamic routing algorithms are based on their own mechanisms they typically adhoc, heuristic based, and localized. Each node in HiGLOB has three key components:

  1. A Histogram manager maintains a histogram that reflects a global view of the distribution of the load  in the system
  2. A Replication Load Balancing manager redistributes the load whenever the node becomes overloaded or underloaded.
  3. A Routing Manager finds the best configured and optimized node and also finds the way how nodes are selected to overlay routing tables.    We implement this mainly for Chord networks demonstration.

Keywords- Histogram, peer-peer networks, Chord networks, overlay networks, P Grid networks, DHT

Full Text PDF
10. Architecture for Portable and Secure Patient Smart Card
Amjad Gamlo, Omar Batarfi

In this paper, the patient smart card, its uses and its importance have been defined. Patient smart card projects have been reviewed in order to evaluate their provided security levels. Then, a patient smart card system has been proposed to overcome the disadvantages of reviewed projects. Architecture and algorithm which provide higher security for the card have been suggested and tested. Testing methods have been described. Finally, results proved that the security services- confidence, authentication, integrity and non-repudiation- are realized in the proposed system.

Keywords— Patient Smart Card, Security Services, Confidentially, Authentication, Integrity, Non-Repudiation, Digital Signature, Private Key, Public Key, Encryption, and Decryption.

Full Text PDF
11. A Secure Privacy Preserving Storage Architecture of Cloud Database
Vamsidhar Talasila and Venkata Anusha Peruri

Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. Cloud Computing has been envisioned as the next generation Architecture of IT Enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, Cloud Computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges which have not been well understood. Privacy concerns arise whenever sensitive data is outsourced to the cloud. This paper introduces a cloud database storage architecture which doesn’t allow the local administrator as well as the cloud administrator to learn about the outsourced database content. Moreover, machine readable rights expressions are used in order to limit users of the database to a need-to-know basis. These limitations are not changeable by administrators after the database related application is launched, since a new role of rights editors is defined once an application is launched. Furthermore, trusted computing is applied to bind cryptographic key information to trusted states. By limiting the necessary trust in both corporate as well as external administrators and service providers, we counteract the often criticized privacy and confidentiality risks of corporate cloud computing.

Keywords ---  Access control,  Data security,  Software
architecture,  Outsourcing, Privacy.

Full Text PDF