IOSR Journal of Computer Engineering (IOSR-JCE)

Sep. – Oct. 2015 Volume 17 - Issue 5

Version 1 Version 2 Version 3 Version 4 Version 5

Paper Type : Research Paper
Title : Development of a Force Acquisition Instrument for Orthodontics
Country : Philippines
Authors : John Carlo Valdez

Abstract: In the field of Orthodontics, various appliances and components are being utilized to facilitate tooth movement. Tissue responses range from physiologic tooth movement to irreversible damage such as pulling a tooth out of a socket. The aim of the study is to develop a force acquisition instrument which can accurately measure forces applied by orthodontic components to the tooth. Furthermore, in this paper it test and present the linearity, bias, and significant difference on the measured and true values when exposed to varying room temperature of the developed force acquisition instrument for orthodontics.

Keywords: force acquisition instrument, orthodontics, force measurement, ortho-components

[1] Parker, L., Setting It Straight – Advanced Orthodontics. Retrieved from
[2] Tengku, B., Joseph, B., Harbrow, D., Taverne, A., & Symons, A. (2010). Effect of a static magnetic field on orthodontic tooth movement in the rat. The European Journal of Orthodontics, 22(5), 475-487.
[3] Lu, L., Sun, H.S., Xue, H., Guo, J., and Chen, Y. (2013). Effects of orthodontic load on the periodontium of autogenously transplanted teeth in beagle dogs. Journal of Zhejiang University SCIENCE B.
[4] Invernic, S., Maruo, I., Camargo, E., Hirata, T., Maruo, H., Filho, O., and Tanaka, O. (2012). Influence of Ortho Primer Morelli adhesion booster on orthodontic brackets shear bond strength. Dental Press J Orthod, 17(3), 31-39.
[5] Proffit, W. (2007). Biological basis of orthodontic therapy. In Contemporary Orthodontics (4th ed., pp. 331-358). Mosby, St. Louise.

Paper Type : Research Paper
Title : Technology Impact on Admission Systems with Reference to Professional Programmes in Maharashtra.
Country : India
Authors : MRS. Madhuri P. Pant || Dr. Sachin A. Kadam

Abstract: As Admission system is a process, researchers are going to concentrate on standardization and then evaluation. This research paper first presents different phases involved in Admission process and how technology shows its impact in every phase. One Online Admission System derived from study of IITs (Indian Institute of Technology) Admission System and many other eminent organizations' Online Admission Systems used by various Professional Programmes like Engineering and Technology, Management (MBA and MCA), Health Sciences, Agriculture, Pharmacy, Education ,Law Programmes in Maharashtra is taken as Standard for Evaluation.IIT and other 46 organizations in Maharashtra involved in Online Admission of above mentioned Professional Programmes are studied, data is analyzed. Researchers proved with statistical analysis how there is impact of technology in each phase.

[2]. Gifford, Juanita Briceño-Perriott and Frank Mianzo "Pen to Mouse: Web-Based Technology's Impact on College
[3]. Admission Applications" SUMMER 2005 JOURNAL OF COLLEGE ADMISSION

Paper Type : Research Paper
Title : TPDS: A Heuristic Approach for Traffic Pattern Discovery System in Mobile Ad-hoc Network
Country : India
Authors : Priyanka Sen || Vaishali Sahare

Abstract: There is absence of centralized coordination among nodes in Mobile Ad-hoc Network (MANET). This makes MANET vulnerable to attacks especially passive attacks. Security is one of the major concerns in military application. Anonymity hides the role of a node as source or destination. In order to trace the traffic pattern of adversaries this system is proposed. The objective of proposed system is to identify an approximate source and destination nodes present in the network. In MANET, identification of these nodes helps to trace the traffic pattern that is followed by an adversary.

[1] J. Kong, X. Hong, and M. Gerla, "An Identity-Free and On- Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks," IEEE Trans. Mobile Computing, vol. 6, no. 8, pp.888-902, Aug. 2007.
[2] Y. Qin and D. Huang, "OLAR: On-Demand Lightweight Anonymous Routing in MANETs," Proc .Fourth Int'l Conf. Mobile Computing and Ubiquitous Networking, pp. 72-79, 2008.
[3] J. Raymond, "Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems," Proc. Int'l Workshop Designing Privacy Enhancing Technologies: Design Issues in Anonymity Unobservability, pp. 10-29, 2001.
[4] M. Wright, M. Adler, B. Levine, and C. Shields, "The Predecessor Attack: An Analysis of a Threat to Anonymous Communications Systems," ACM Trans. Information and System Security, vol. 7, no. 4, pp. 489-522, 2004.
[5] G. Danezis, "Statistical Disclosure Attacks: Traffic Confirmation in Open Environments," Proc. Security and Privacy in the Age of Uncertainty, vol. 122, pp. 421-426, 2003.

Paper Type : Research Paper
Title : Implementation of Hybrid Wavelet Transform for Adaptive Lossless Image Compression
Country : India
Authors : Dibas Sil || Bramah Hazela

Abstract: In digital image processing, Image compression is a type of data compression causing reduction in image size but maintain the image quality. It reduce cost and time in image storage and transmission and thus can enhance the performance of the digital system. The main purpose is to reduce and restored the volume of data such that the real image will be perfectly rebuild from the compressed image. So, a proper selection of encoding and decoding algorithm is require for image compression. Among the algorithms, EZW is one of the best image compression algorithm and is also computationally fast. Here, a method for lossless compression of image is projected which uses the Embedded Zero trees of Wavelet Transforms in combination with Huffman coding and LZW algorithm for further compression.

[1]. David Salomon, Data Compression - The Complete Reference, Springer, 2004, 3rd edition.
[2]. K. Sayood, Introduction to Data Compression , 2nd Ed, 2000 Academic Press, Morgan Kaufmann publishers.
[3]. Rafael C. Gonzalez, Richard E. Woods, Steven L. Eddins, Digital Image Processing Using MATLAB, 2008, Pearson Education
[4]. Shapiro, J. M., "Embedded Image Coding Using Zero trees of Wavelet Coefficients", IEEE Transactions on Signal Processing, 41, No. 12 (1993), p. 3445-3462.
[5]. Kharate G.K., Ghatol A. A. and Rege P. P., "Image Compression Using Wavelet Packet Tree," ICGSTGVIP.
[6]. V.S. Shingate, T. R. Sontakke & S.N. Talbar, "Still Image Compression using Embedded Zero tree Wavelet Encoding", International Journal of Computer Science & Communication, Vol. 1, No. 1, January-June 2010, pp.21-24.
[7]. Janaki. R, Tamilarasi. A, "Still Image Compression by Combining EZW Encoding with Huffman Encoder", International Journal of Computer Applications, Vol 13, No. 7, January 2011.

Paper Type : Research Paper
Title : Information and Communication Technology: A Global Tool to Facilitate Teaching and Learning of Business Education in Colleges in Nigeria.
Country : Nigeria
Authors : Dr Oyedemi Jacob Folasayo MNCSPr. FIGA || Awoniyi Bola Ruth (Mrs)

Abstract: Information and Communication Technology (ICTs) occupies a complex position in relations to teaching and learning of Business Education in Colleges. The emergence of ICTs has serious implications on the nature and purpose of educational institutions. The researcher is basically concerned with academic performances of students if ICTs is used as a tool for teaching. Data for analysis were obtained from a test given to the students in both experimental and the control groups..

[1]. Anonymous (2011), Information and communication technologies in education (Online) Available: Accesses on: 10, February, 2015.
[2]. Oyedemi J.F. (2012). A computer based simulation and modeling performances on academics. Unpublished PhD Thesis, Springfield University, Hampton U.S.A
[3]. Renner B.V. (2005). A correlation studies of performances between Mathematics and Physics. Publish PhD Thesis, Birkbeck University of London. United Kingdom.
[4]. Adomi, E.E. and Anie, S.O. (2006), an assessment of computer literacy skills of professionals in Nigerian university libraries; Library Hi Tech News 23(2)10-14
[5]. Evol, C.J. (2007). Policy networks and the transformation of secondary education through ICTs in African International Journal of Education and Development using ICT (IJEDICT) 3(1), 64-84
[6]. Anzalons, S (2001). ICTs to Support Learning in Classrooms in SEAMEO Countries: At What Cost? Bangkok: Paper prepared for SEAMEO conf. March 26-29.

Paper Type : Research Paper
Title : Maximizing Wireless Sensor Networks Life Time through Sink Mobility
Country : India
Authors : Prof.Geeta Patil

Abstract:The main objective of this paper is to optimise wireless sensor network life time by moving the sink to a finite number of locations. If any node is having energy less than minimum, that node is not considered in communication path then alternate path is created by routing algorithm AODV. Information gathered by mobile sink can reduce the energy consumption of sensor nodes by reducing multihop communication, automatically network lifetime is improved.
Key words: Sensor, mobility, AODV, Routing, Energy, Optimization, Dimension., Protocol..

[1]. Suyoung Yoon; Dutta, R.; Sichitiu, M.L.; North Carolina State Univ., Raleigh –"Power Aware Routing Algorithms for Wireless
Sensor Networks", Wireless and Mobile Communications, 2007. ICWMC '07. Third International Conference , ISBN: 0-7695-
[2]. Archan Misra, Suman Banerjee-MRPC: Maximizing Network Lifetime for Reliable Routing inWireless Environments, IBM
T.J. Watson Research Center 30 Saw Mill River Road Hawthorne, NY 10532, USA
[3]. Katja Schwieger, Amrit Kumart XGeIrh ard Fettweis- On the Impact of the Physical Layer on Energy Consumption in Sensor
Networks, *Vodafone Chair Mobile Communications Systems Dresden University of Technology, Mommsenstr. 18, D-
01062 Dresden, Germany. Indian Institute of Technology (IIT), Guwahati, 690799, India
[4]. Li-Hsing Yen, Ming-Zhou Cai, Yang-Min Cheng, and Ping-Yuan Yang- Minimizing Energy Expense for Chain-Based
Data Gathering in Wireless Sensor Networks , Department of Computer Science and Information Engineering
ChungHua'University,Taiwan300, R.O.C.[Conference name]

Paper Type : Research Paper
Title : A Novel Irreversible Transformation Scheme for Biometric Template Protection
Country : India
Authors : Supriya V G || Dr Ramachandra Manjunatha

Abstract: Modern biometric technologies claim to provide alternative solution to traditional authentication processes. Even though there are various advantages of biometric process, it is vulnerable to attacks which can decline its security. In this paper, we propose a Novel Irreversible Transformation Scheme (ITS) to Secure Biometric Templates based on Chaotic Maps which are known to posses desirable properties of pseudo randomness, high sensitivity to initial conditions and very large key space. The simulation and analysis results shows that the proposed chaos based ITS is computationally simple compared to standard traditional cryptographic algorithms and provides better security performance.

Keywords: Biometrics, Security, Biometric Cryptosystems (BCS), Cancelable Biometrics (CB), Chaotic maps, Key stream..

[1] Jain AK, Ross A, Prabhakar S: An introduction to biometric recognition .IEEE Trans Circ Syst Video Technol 2004, 14:4-20. [2] N K Ratha, JH Connell, RM Bolle, Enhancing security and privacy in biometrics-based authentication systems. IBM Syst J 40, 614–634 (2001) . [3] Ratha NK, Connell JH, Bolle RM (2011) Enhancing security and privacy inbiometrics-based authentication systems. IBM Syst J 40: 614-634 [4] A Cavoukian, A Stoianov, Biometric encryption. Encyclopedia of Biometrics (Springer, 2009) [5] A. Juels and M. Sudan. A Fuzzy Vault Scheme. In IEEE International Symposium Information Theory, pp- 408-413, 2002. [6] Prof. Maithilli Arjunwaddkar, Prof.Dr.RV.Kulkarni, "Robust Security Model For Biometric template Protection Using Chaos Phenomenon". International Journal of Computer Science and Security. 2009..

Paper Type : Research Paper
Title : Dynamic and transparent seat allocation using QR Code in a Mobile Application
Country : India
Authors : Joydeep Singh || Vaibhav Shukla || Ruchi Tawani

Abstract: Indian Railway is world's largest human transport system which is currently dealing with a lot of problems, such as availability of confirming seat to waiting list passengers after its departure. Moreover, there is no such system/ regulation in Indian railway that instantly gives accommodation to waiting list passengers during their journey. This paper proposes the Dynamic Seat Allocation (DSA) system considering the advantage of QR code processing along with one of the standards of wireless communication. Adding to more benefits, dynamic authentication to the wireless device is incorporated with respect to which is passenger specific. Through this research paper our approach is to make fair processing in seat reservation or allocation in Indian Railway.

[1] Indian railway budget 2014
[2] Man Mohan Swarup, Abhiram Dwivedi, Chanchal Sonkar, Rajendra Prasad, Monark Bag, Vrijendra Singh "A QR Code Based Processing For Dynamic and Transparent Seat Allocation in Indian Railway" Cyber Law and Information Security Division, Indian Institute of Technology, Allahabad, India
[3] A QR Code Based Processing for Dynamic and Transparent Seat Allocation Mehul Yadav*, Sumedh Kurundkar*, Anushka Barve*, Mrugesh Verekar

Paper Type : Research Paper
Title : Cyber Physical Systems: Error Verification and Prediction in Smart Medical Devices
Country : Nigeria
Authors : Stephen O. Maitanmi || Sunday A. Idowu || Olawale J. Omotosho || Olusegun A. Ojesanmi

Abstract: Embedded software is a piece of software that is built in a system or hardware component to achieve an objective. Cyber-Physical Systems (CPS) are integrations of computation with physical processes which are monitored and controlled by the embedded systems. CPS has positively affected a number of application areas which include communication, consumer energy, infrastructure, healthcare, manufacturing, military, robotics and transportation. This research paper focuses on CPS with particular application interest on error prediction in smart medical devices SMDs. SMDs are used for healthcare services by medical personnels in such a way that they have to interact with the patients in one form or the other. A number of research works has focused on errors arising from the use of SMDs..

[1]. Workshop Report."Foundations for Innovation in Cyber-Physical Systems Available: /NIST-CPSWorkshop/downloads.html,2013 [Nov. 20, 2014].
[2]. San Diego State University ."Introduction to computers". Information technology and Teachers Education International Conference. Available:, 2009. [June 12, 2014]
[3]. E. A. Lee "Cyber physical systems: Design Challenges" Technical Report, EECS Department, University of California, Berkeley, January (CPS Steering Group), 2008
[4]. D. R. Wallace, and R. U. Fujii. :Software verification and validation: an overview" Software, IEEE,Vol.6, no.3,pp.10- 17, 1989
[5]. T. J. John "A New Evidence-Based Estimate of Patient Harms Associated with Hospital Care" Journal of Patient Safety Volume 9, Number 3. 2013
[6]. NAP Committee on Quality of Health Care in America IoM. 'To err is human: building a Safer Health System' Washington, D.C.: National Academy Press., 2001
[7]. M. Soares, J. I. F. Salluh, and F. A. Bozza, Current definitions of patient safety. In: Chiche, J. D, Moreno R, Putensen C, Rhodes A, editors. Patient Safety and Quality of Care in Intensive Care Medicine. Berlin:Medizinisch WissenschaftlicheVerlagsgesellschaft; p. 9-17., 2009

Paper Type : Research Paper
Title : An Optimized and Secured Ranking Approach for Retrieving Cloud Data Using Keyword Search
Country : India
Authors : Vineetha Viswan || Adarsh Sunil

Abstract: Cloud computing is a versatile technology that emerged as a solution to reduce costs in organizations by providing on-demand high quality applications and services from a centralized pool of configurable computing resources. With the advantage of storage as a service data owners are motivated to outsource their valuable and sensitive data from local sites to commercial public cloud since it costs less, easily scalable and can be accessed from anywhere anytime. Sensitive data that moves into and across cloud infrastructures increases the risk of data loss or compliance violations. However to protect data privacy, sensitive cloud data have to be encrypted before outsourcing. Data encryption makes effective data utilization a very challenging task. In this paper we define an optimized and secured semantic based ranked keyword search over encrypted cloud data.

[1] A. Swaminathan, Y. Mao, G.-M. Su, H. Gou, A.L. Varna, S. He, M.Wu, and D.W.Oard, "Confidentiality-Preserving Rank-Ordered Search," Proc. Workshop Storage Security and Survivability, 2007.

[2] Cong Wang, Ning Cao, Kui Ren and Wenjing Lou,"Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data", IEEE Transactions on Parallel and Distributes Systems, Vol.23, NO.8, AUGUST 2012).

[3] C. Wang, K. Ren, S. Yu, K. Mahendra, and R. Urs, "Achieving Usable and Privacy-Assured Similarity Search over Outsourced Cloud Data," Proc. IEEE INFOCOM, 2012.

[4] J. Zobel and A. Moffat, "Exploring the Similarity Space," SIGIR Forum, vol. 32, no. 1, pp. 18-34, 1998.

[5] Jaspreet Kaur and Manish Mahajan, "A Review on Semantic Multi-Keyword Ranked Search Techniques over Encrypted Cloud Data".

[6] C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, "Secure Ranked Keyword Search over Encrypted Cloud Data," Proc. IEEE 30th Int‟l Conf. Distributed Computing Systems (ICDCS ‟10), 2010.

Paper Type : Research Paper
Title : Cloud Based Vital Health Stats Monitoring using IoT
Country : India
Authors : Shanmuga Sundaram B

Abstract: While there are lot of devices and applications available for monitoring the vital health statistics of human beings, there is still room for enhancement and improvement. This paper's intention is to address one of those perspectives. There are a lot of elderly people, whose children live abroad or at a long distance due to work and other priorities. Monitoring the health of the parents and having a keen eye on their health on a daily basis is a real challenge for the children living away from them..

[1] Books: [2] Dinakar Sitaram, Geetha Manjunath, Moving to the Cloud (Syngress, Elsevier 2011).

Paper Type : Research Paper
Title : Secure seamless access to IP applications and IP service availability in VANET
Country : India
Authors : Sachin More || Prof. Uma Nagaraj

Abstract: Traditional Internet-based applications and driver assistance services, as well as peer-to-peer applications are services that will make traveling a more convenient and pleasant experience, that enable the instant sharing of information between vehicles. The multi-hop Vehicular Communications Network (VCN) appears as a promising solution for the ubiquitous access to IP services in vehicular environments. Longer bidirectional connections between road side access routers and vehicles can be established through multi-hop paths..

[1]. A. Gundavelli, K. Leung, V. Devarapalli, K. Chowdhury, and B. Patil, "Proxy Mobile IPv6," IETF RFC 5213, August 2008.
[2]. M. Asefi, S. Cespedes, X. Shen, and J. W. Mark, "A Seamless Quality-Driven Multi-Hop Data Delivery Scheme for Video Streaming in Urban VANET Scenarios," in Proc. of IEEE ICC 2011, pp. 1–5.
[3]. C. Tang and D. Wu, "An Efficient Mobile Authentication Scheme for Wireless Networks," IEEE Trans. Wireless Commun., vol. 7, no. 4, pp.
[4]. A. Al Shidhani and V. C. M. Leung, "Secure and Efficient Multi-Hop Mobile IP Registration Scheme for MANET-Internet Integrated Architecture," in Proc. of IEEE WCNC 2010, pp. 1 –6.
[5]. Y. Jiang, C. Lin, X. Shen, and M. Shi, "Mutual Authentication and Key Exchange Protocols for Roaming Services in Wireless Mobile Networks," IEEE Trans. Wireless Commun., vol. 5, no. 9, pp. 2569 – 2577, 2006.
[6]. S. Pack, X. Shen, J. Mark, and J. Pan, "Mobility management in mobilehotspots with heterogeneous multihop wireless links," Communications Magazine, IEEE, vol. 45, no. 9, pp. 106 –112, september 2007.

Paper Type : Research Paper
Title : A Review on Systematic Quality Software Designing and DevelopmentPractices
Country : India
Authors : Mulugu Narendhar || Dr.K.Anuradha

Abstract: Software Engineering process, technology and the results cover the definition of suitable models for the environment to ensure its quality.Any software development project is very important to create quality software design artifacts wheresoftware architecture and design rules set plays an important part.The current program and designing practice has been provided by the use of proper testing and code created significant improvement in quality and productivity.This paper presents a review on the systematically and efficiently designing, modelling and verification processto help the improvisation of the quality of software designing process and development practices through various characters, roles and measures to participate in testing..

[1]. Gordon Fraser and Andrea Arcuri",Whole Test Suite Generation",IEEE Transactions On Software Engineering, Vol. 39, No. 2, February 2013
[2]. YRafique and Vojislav B. Misic",The Effects of Test-Driven Development on External Quality and Productivity: A Meta-Analysis", IEEE Transactions On Software Engineering, Vol. 39, No. 6, June 2013
[3]. Gustavo Soares, RohitGheyi, and Tiago Massoni",Automated Behavioural Testing of Refactoring Engines", IEEE Transactions On Software Engineering, Vol. 39, No. 2, February 2013
[4]. J Itkonen, M V. Mantyla and C Lassenius, "The Role of the Tester's Knowledge in Exploratory Software Testing", IEEE Transactions On Software Engineering, Vol. 39, No. 5, May 2013
[5]. Scrum Alliance, World Wide Web electronic publication,, Sept. 2008.
[6]. S. Nerur and V. Balijepally, "Theoretical Reflections on Agile Development Methodologies", Comm. ACM, vol. 50, no. 3, pp. 7983, 2007

Paper Type : Research Paper
Title : Finding Location of Mobile Vehicle Using GPL-Maps in the Absence of Network
Country : India
Authors : Mr. K Suresh Kumar Reddy || Dr. D Rajaveerappa

Abstract: Usually, knowing the location is key role for Mobile vehicle users. Day-by-day technology is changing dynamically, beyond user expectations. For finding location of mobile users, current Techniques are using Google maps, A-GPS. Whatever the technology developing, without network it's tough and not possible for finding location of a mobile user. For finding location, many network providers are using many techniques provide services to the mobile users.

[1]. Rajaveerappa D and Venkataram P,"A CDMA/TDMA MAC protocol for Multimedia Wireless Networks" , Intl. Conf. on Info., Commun., and Signal Proce. (ICICS'99), Singapore, Dec. 7-10, 1999.
[2]. Adaptive AOA-Aided TOA Self-Positioning for Mobile Wireless Sensor, Sept. 2008.
[3]. D. Rajaveerappa and Fituri H. Belgassem, "A Two Ray Propagation Model For Finding Mobile Location Over Plain Microcellular Environment", 2010 IEEE International Conference on Computer and Communication Technology (ICCCT-2010), Sept. 2010, pp. 408-414.
[4]. Basic principles of inertial navigation system by "Tampere university of technology

Paper Type : Research Paper
Title : Performance Evaluation and QoS Analysis of EEPB and PDCH Routing Protocols in Wireless Sensor Networks
Country : India
Authors : Sangeeta Vhatkar || Jigish Rana || Mohammad Atique

Abstract: EEPB (Energy-Efficient PEGASIS-Based protocol) is a chain-based protocol. It has certain deficiencies such as it ignores the nodes energy and distance between nodes to BS when selecting the leader. It causes overhead, maximize the overall network delay and consumes more energy because of more number of transmission and receives among all nodes. Aiming at these problems, PDCH (PEGASIS with Double Cluster Head) is proposed in this paper. PDCH uses a double cluster head instead of single cluster head to distribute energy load among all nodes to increase the network lifetime. Also PDCH uses a dynamic cluster formation to eliminate overhead and reduce the distance of transmission by choosing appropriate node based on residual energy and neighbor nodes. The simulation results show that PDCH has a better performance than EEPB on the efficiency of energy consumption, minimizing network overhead, increasing the network lifetime and balancing load of the network.

Keywords: Double Cluster Head, EEPB, Hierarchical Routing, PDCH, PEGASIS, Wireless Sensor Network

[1] Akyildiz et al., "A Survey on Sensor Networks," IEEE Commun. Mag., vol. 40, no. 8, Aug. 2002, pp. 102–144.
[2] J. Al-Karaki, and A. Kamal, "Routing Techniques in Wireless Sensor Networks: A Survey," IEEE Communications Magazine, vol 11, no. 6, pp. 6-28, Dec. 2004.
[3] W. Heinzelman, A. Chandrakasan and H. Balakarishnan, "Energy-Efficient Communication Protocols for Wireless Microsensor Networks," in Proceedings of the 33rd Annual Hawaii International Conference on Systems Science, Jan. 2000.
[4] S. Lindsey and C. S. Raghavendra, "PEGASIS: Power-efficient gathering in sensor information systems," in IEEE Aerospace Conference Proceedings, vol. 3, pp. 1125-1130, March 2002.

Paper Type : Research Paper
Title : Performance Evaluation and Qos Analysis of SPEED and MMSPEED Routing Protocol in Wireless Sensor Network
Country : India
Authors : Sangeeta Vhatkar || HarshKumar Thakar || Mohommad Atique

Abstract: Wireless sensor network (WSN) is based on distributed event-based system which is used to provide a bridge between the real physical and virtual world. The main aim of the system is to send and receive a data packet with the highest efficiency and quality. In WSN, quality of service (QoS) is to give special delivery service to the applications that need it by guaranteeing adequate transmission capacity, jitter, balancing latency and decreasing data loss. Here we are focus on Stateless Protocol for End to end delay (SPEED) is a Qos based routing protocol to provide real time communication, effective delivery speed and efficiency over the network. Multipath Multi SPEED (MMSPEED) is another Qos protocol is to provide multi-path, efficiency and minimal overhead to the network. This paper presents the study and comparison of SPEED and MMSPEED protocols in ns2.

Keywords: WSN, Qos, SPEED, MMSPEED

[1] Akyildiz et al., "A Survey on Sensor Networks," IEEE Commun. Mag., vol. 40, no. 8, pp. 102–144, Aug. 2002.
[2] M. Fonoage, M. Cardei, and A. Ambrose," A QoS Based Routing Protocol for Wireless Sensor Networks," in IEEE 29th International Performance Computing and Communications Conference (IPCCC), pp.122 – 129, Albuquerque, NM, Dec. 2010.
[3] T. He, J. A. Stankovic, C. Lu, and T. F. Abdelzaher, "SPEED: A Stateless Protocol for Real-Time Communication in Sensor Net-works," in 23rd International Conference on Distributed Computing Systems (ICDCS), pp. 46 – 55, May 2003.
[4] S. Felemban, E, Chang-Gun L.E.E,"MMSPEED QoS guarantee of reliability and. Timeliness in wireless sensor networks," Mobile Computing, IEEE Transactions, vol. 15, pp. 738 – 754, June 2006.
[5] Harshkumar Thakar, Vhatkar Sangeeta and mohommad atique, "Comparative Study of Speed Protocols in Wireless Sensor Network," International Journal of Computer Applications (IJCA), vol. 120, pp.08-13, June 2015.

Paper Type : Research Paper
Title : A Fuzzy & K-L Based Reduced Reference ImageQuality
Country : India
Authors : BivayKumar || PankajRai

Abstract: Reduced-reference (RR) image quality measures aim to predict the visual quality of distorted images with only partial information about the reference images. In this paper, in first stage uses present thresholding technique between probability distribution of local entropy of reference and their corresponding images using relative entropy (also known as the Kullback-Leiber discrimination distance function) as a criterion of thresholding of probability distribution of local entropy between references and distorted of their reference image. After then we create a model FIS (Fuzzy Inference System) and then use as input KLD and get quality score of distortedimage.

Key words: Local entropy, probability distribution of local entropy, KLD, Fuzzy InferenceSystem.

[1]. H.R.Wu and K.R. Rao, "Digital Video Image Quality and PerceptualCoding,"CRCPress,2005
[2]. Z.Wang,E.P.Simoncelli and A.C.Bovik,"Multi-scale structural similarityforimagequalityassessment"IEEEAsilomarConference onSignals,SystemsandComputers,2003,Vol.2,pp.1398-1402.
[3]. A. Beghdadi and B. Pesquet-Popescu, "A New Image Distortion Measure Based Wavelet Decomposition," 2003, IEEE International Symposium on Signal Processing and Its Applications, 2003, pp. 485-488
[4]. H.R. Sheikh and A.C.Bovik, "Image information and visual quality," IEEE Transactions on Image Processing, 2006, Vol.15, no.2, pp.430-444.
[5]. Z. Wang, H.R. Sheikh and A.C. Bovik, "No-reference perceptual quality assessment of JPEG compressed images," IEEE InternationalConferenceonImage Processing,2002,pp.477-480..
[6]. F.Crete, "Estimer, mesurer et corriger les artefacts de- compressionpourlatelevision,"UniversiteJosephFourier,2007.
[7]. A .Chetouani, G. Mostafaoui and A. Beghdadi, "A New Free Reference Image Quality Index Based on Perceptual Blur Estimation," IEEE Pacific-Rim Conference on Multimedia, 2009, pp.1185-1196.

Paper Type : Research Paper
Title : Securing Biomtric Template Over Non-Secure Channel using Cryptography and Helping Data
Country : India
Authors : Manmohan Lakhera || Dr MMS Rauthan

Abstract: the security of biometric template is a very important aspect in the biometric system. Biometric template are the very important parts of biometric systems and attacker mostly attack on template over non-secure channel so securing them is a very crucial. In this research paper our focuses on securing biometric template in non-secure channel. We develop an algorithm for securing fingerprint template and fetching partial information of IRIS as a helping data. AES is used as a cryptographic algorithm.

Keywords- component: Encryption, Public Key, Private Key, Verification, Password

[1] Ao Shan, Ren Weiyin, Tang Shoulian "Analysis and Reflection on the Security of Biometrics System" 2008 IEEE..

[2] Ratha NK, Connell JH, Bolle RM (2001) Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal 40:614{634

[3] Schneier B (1999) the Uses and Abuses of Biometrics. Communications of the ACM 42:136, 1999.

[4] Inter National Committee for Information Technology Standards (INCITS) (2006) Study Report on Biometrics in E-Authentication, Technical Report IN-CITS M1/06-0693

[5] Ross A, Shah J, Jain AK (2005) Towards Reconstructing Fingerprints from Minutiae Points. In Conf. SPIE Biometric Technology for Human Identification II, 5779:6880

[6] Hill, Chris J, "Risk of Masquerade Arising from the Storage of Biometrics"Australian National University: s.l.Bachelor of science thesis, Dept. of CS, Nov 2002.

[7] Schneier.,"Bruce., Inside risks: The uses and abuses of biometrics," Communications of the ACM, Vol 42 ed, ACM New York, NY, USA, August 1999

Researcher can also search IOSR published article contents through

IOSR Xplore