Volume 1 Issue 9- October 2011
S.No | Title | Page |
---|---|---|
1. | Analytical Computation Method of Electric
Field based on Free Space Model Abdourahmane Raimy , Bocar Sow Abstract
Abstract—The multiplication of the number of GSM base stations raises the issue of the harmfulness of the electromagnetic waves radio frequencies. In such a context, evaluation methods of the quantity of energy absorbed (SAR-Specific Absorption Rate) by human tissues during an exposition exist: dosimetry for cellular phone and in-situ measurement for base station. However, the in-situ methods require devices for measuring electric fields (spectrum analyzer, personal dosimeter and probe, etc…) that are characterized by high financial and temporal costs. In this paper, we propose an analytical calculation method of electric fields emitted by the GSM base station (BS). It relies on a propagation model of electromagnetic wave. The simulation of our model with MATLAB tools shows a lot of similarities with real measures obtained with in-situ measurements. The advantage of our model is that it doesn’t require equipments but only a prior study of the base station vicinity. Index Terms—Base stations, Electromagnetic fields, Biological interactions, In vitro, In vivo, Dosimetry, Free Space Model, Path loss. |
534-537 Full Text PDF |
2. | A Novel Technique for Beacon Localization in
Indoor Environments A. Ravesha, B. Manjula, Md. Zia Ur Rahman, B.V.Rama Mohana Rao Abstract
In a typical localization technique, beacon nodes whose locations are known apriori, act as reference in estimating the location of user nodes. Placement of these beacons in the indoor environments has strong impact on the quality of the localization technique. When the operating environment is an indoor environment such as an office or building, the placement of beacons is very important due to the presence of obstructions which often result in non-uniform signal propagation error and self interference of beacon nodes. Besides, the structure of indoor environment keeps changing with time, affecting the beacon infrastructure. Readjustment of beacon nodes is time consuming and might interrupt the localization service. Hence, it is ideal to minimize the number of readjustments of the beacon nodes as far as possible. To address this issue, we propose an algorithm to minimize the number of the readjustments of beacon nodes and the interruption in localization service. Keywords— Wireless sensor network, Beacon nodes, User nodes, Localization system, Network devices. |
538-543 Full Text PDF |
3. | Performance of Routing Protocol for Ad Hoc
Network Using Path Survivability Based on Load
and Bandwidth Management under Back
Pressure Technique A K Daniel ,R Singh, J P Saini Abstract
Mobile wireless ad hoc network has emerged as the self organized wireless interconnection for the various applications in random topology. However achieving reliable transmission in mobile wireless network is crucial due to change in the network topology caused by node mobility. Congested links are also an expected characteristic of such a network as wireless links inherently have significantly lower capacity than hardwired links and are therefore more prone to congestion. The protocol adapts quickly to routing changes when host movement is frequent, yet requires little or no overhead during periods in which hosts move less frequently. This protocol finds alternate mechanism that will find out optimal and reliable paths in terms of congestion and number of Hop counts, Bandwidth, Traffic load. The route maintenance process is different from of DSR because concept of delay time and alert packets is used. Keywords— packet, delay time, stream array, survivability factor, Hop counts, Bandwidth, Traffic load |
544-549 Ful Text PDF |
4. | An Approximation to the Interval valued Fuzzy set Pranita Goswami Abstract
In this paper Interval Valued fuzzy set is obtained over the constant density function between the limits 0 to 1by using Series expansion and continued fraction expansion and is represented by the segment between the two membership functions. Key words: Uncertainity,intervals.Points, Membership functions |
550-552 Full Text PDF |
5. | Evaluated and Suggested Range aggregate query
approximation on data cubes in P2P networks K.Seetha Devi, CH.V. Phani Krishna, P.Venkateswara Rao Abstract
Individual computers provide opportunities for tremendous productivity gains, but they become many times more powerful when they're connected to one another forming a peer to peer network that gives them the ability to share data and processing resources. This paper presents data exchange between peers occurs when one of them, in the role of a local peer, needs data available in other nodes, denoted the acquaintances of the local peer and also an adaptive dual-phase approach based on random walks of the P2P graph for efficiently serving range aggregate queries on data cubes in a peer to peer system. The problem of answering large-scale ad hoc analysis queries, for example, range aggregate queries on data cubes possesses unique challenges. Exact solutions can be time consuming and difficult to implement, given the distributed and dynamic nature of P2P data cubes. In this paper, we use an I/O-efficient technique based up on a multi resolution wavelet decomposition that yields excellent approximations for range aggregate queries with limited space usage and computational cost. Keywords- OLAP, data cubes, aggregate queries, wavelet decomposition, P2P graph
|
553-559 Full Text PDF |
6. | A Low power 50 nm Technology Based CMOS
Inverter with Sleep Transistor Scheme Arun Kumar Sunaniya , Kavita Khare Abstract
This paper proposes a sleep transistor based
minimum size inverter in BSIM4.3.0, 50nm CMOS technology
with supply voltage of 1V, power dissipation of 46.28nW at
0.502V and maximum drain current of 70nA. The operating
frequency is 1GHz. The disadvantage is decrease in voltage
swing by 15% compared to the conventional CMOS Inverter |
560-562 Full Text PDF |
7. | Robust Intrusion Detection System using Layered
Approach with Conditional Random Fields Vasavi Bande, U.D.Prasan Abstract
Network Security is fast becoming an absolute necessity to protect the information contained on computer systems worldwide. The ever changing network use and operation along with the public concern for protection of sensitive information makes implementing an efficient and effective security plan a must. Intrusion detection Systems faces a number of challenges, One component of this approach is that of network intrusion detection systems what we are discussing in this paper uses Snort signature database. An intrusion detection system must reliably detect malicious activities in a network and must perform efficiently to cope with the large amount of network traffic. Making a network intrusion detection system work effectively should not degrade overall network performance so some type of performance measurement plan must be designed and implemented. Intrusion Detection Systems have become very popular in the recent years. This is due to the obvious explosive growth of the Internet and the fact that most us keep and access sensitive data online. In this paper, we have addressed these two issues of accuracy and efficiency using conditional random fields and layered approach. We have demonstrated that high attack detection accuracy can be achieved by using conditional random fields and high efficiency by implementing the layered approach. Finally, we have resolved that this system is robust and is able to handle noisy data without compromising the network performance. Keywords – IDS, NIDS, Conditional random fields, layered based, preprocessor, snort signatures, FAR. |
563-568 Full Text PDF |
8. | Authentication Using Mobile Phone as a Security
Token T.Venkat Narayana Rao, Vedavathi K Abstract
Today security concerns are on the rise in all areas industries such as banks, governmental applications, healthcare industry, militaryorganization, educational institutions etc, with one common weak link being “passwords”. Several proper strategies for using passwords have been proposed. Some of which are very difficult to use and others might not meet the company’s security concerns. The usage of passwords for authentication is no longer sufficient and stronger authentication schemes are necessary. Two factor authentication uses elements or devices such as tokens and ATM cards. We have proposed to resolve the password problem, which could be inconvenient for the user and costly for the service providers to combat otherwise. To avoid the usage of additional device, the mobile phone is adopted as security token. In this paper several different authentication solutions using the mobile as authentication token are discussed, where these solutions vary in complexity, strength, security and user friendliness. One of the authentication schemes (OTP solution) is implemented to verify their usability. Hence, a classification and evaluation of the different solutions is provided according to defined criteria. |
569-574 Full Text PDF |
9. | Effective Load Balancing in Overlay Chord & P Grid Networks S.Bhagya Rekha, M.Vijaya Saradhi Abstract
In structured chord & P Grid systems finding the successor nodes, Load balancing and dynamic routing are the challenging issues because nodes are heterogeneous and dynamically nodes may join the network or old node may release from network. We present a general framework, HiGLOB, for global load balancing in structured Chord systems. Current load balancing, finding optimized node and dynamic routing algorithms are based on their own mechanisms they typically adhoc, heuristic based, and localized. Each node in HiGLOB has three key components:
Keywords- Histogram, peer-peer networks, Chord networks, overlay networks, P Grid networks, DHT |
575-581 Full Text PDF |
10. | Architecture for Portable and Secure Patient Smart
Card Amjad Gamlo, Omar Batarfi Abstract
In this paper, the patient smart card, its uses and its importance have been defined. Patient smart card projects have been reviewed in order to evaluate their provided security levels. Then, a patient smart card system has been proposed to overcome the disadvantages of reviewed projects. Architecture and algorithm which provide higher security for the card have been suggested and tested. Testing methods have been described. Finally, results proved that the security services- confidence, authentication, integrity and non-repudiation- are realized in the proposed system. Keywords— Patient Smart Card, Security Services, Confidentially, Authentication, Integrity, Non-Repudiation, Digital Signature, Private Key, Public Key, Encryption, and Decryption. |
582-586 Full Text PDF |
11. | A Secure Privacy Preserving Storage
Architecture of Cloud Database Vamsidhar Talasila and Venkata Anusha Peruri Abstract
Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. Cloud Computing has been envisioned as the next generation Architecture of IT Enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, Cloud Computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges which have not been well understood. Privacy concerns arise whenever sensitive data is outsourced to the cloud. This paper introduces a cloud database storage architecture which doesn’t allow the local administrator as well as the cloud administrator to learn about the outsourced database content. Moreover, machine readable rights expressions are used in order to limit users of the database to a need-to-know basis. These limitations are not changeable by administrators after the database related application is launched, since a new role of rights editors is defined once an application is launched. Furthermore, trusted computing is applied to bind cryptographic key information to trusted states. By limiting the necessary trust in both corporate as well as external administrators and service providers, we counteract the often criticized privacy and confidentiality risks of corporate cloud computing. Keywords --- Access control, Data security, Software |
587-595 Full Text PDF |
- Home
- Author Instruction
- Editorial Board
- Call for Paper
- Current volume
- Archives
- Indexing
- FAQ
- Publication Fees
- Contact
- Citation Index 0.47
Email: ijcsetonline@gmail.com / editor@ijcset.net