IJEA - Volume 3 Issue 10 (October 2014)


Sr/No/ Title Pdf
1 A Comparison Of The Encryption Algorithms In The Wireless Sensor Networks
A. John Felix Prakash, Dr. Mala, S. Gayathiri

Abstract-In this modern world, the wireless sensor networks (WSN’s) plays a major role in the telecommunication industry. Security of personal as well as organization information is most important issues in all concerns. For this reason, we are here analyzed the one of the block cipher method for preventing the information from the attacks. For preventing the corrupted and unauthorized messages from being forwarded in the wireless sensor networks, the authentication of messages is one of the efficient ways for the above issue. One of the main concern in wireless sensor network is its limited resources, however WSN are being popular day by day. Encryption algorithm like DES (Data Encryption Standard), AES (Advanced Encryption Standard) and RSA algorithms are investigated by this paper for encrypting the blocks that containing the messages in the nodes of the wireless sensor networks. And more in this paper we are discussing which algorithm consumes low execution time.

2 Optimum Relay Selection for Energy-Efficient Cooperative Ad Hoc Networks

Abstract:-Topology control have been widely studied and applied in wireless ad hoc networks as one of the key energy saving techniques. In order to save energy and extend lifetime of networks, topology control lets each wireless node to select certain subset of neighbors or adjust its transmission power meanwhile maintain network connectivity. Recently, a new class of communication techniques has been introduced. This technique has been named as Cooperative Communication (CC). CC allows single antenna devices to take the advantage of the Multiple-Input-Multiple-Output (MIMO) systems. The CC explores broadcast nature of the wireless medium. The CC also allows nodes that have received the transmitted signal to cooperatively help relaying data for other nodes. Recent study has shown significant performance gain of CC in various wireless network applications i.e., Energy-efficient routing and connectivity improvement.

3 Analysis of Bulk Arrival with Removable Server & Working Vacation
Sanjeet Singh

Abstract— Queueing models are used to address service oriented problems where customers arrive randomly to receive some service. In this paper, the behaviour of queue length in relation to arrival and service pattern during busy period has been explained .The arrival process assumes to be Poisson with parameter λ and service by different server. If there are less than ‘a’ customers in queue then the server serves the customer according to exponential law with parameter μ1. If there are greater than or equal to ‘a’ customers in the queue then server serves the customers according to exponential law with parameter μ2. The joint distribution of number of arrivals and departures up to time t as well as steady state solution are obtained. Further, numerical results have also been calculated. The relationship between queue length and arrival/service rates during busy period has been discussed with the help of graphs.

4 Dramatic Effects on Conversion Efficiency of Photovoltaic Cells under Very High Temperature Variations
Ahmed Nabih Zaki Rashed

Abstract-This paper has examined how the efficiency of a solar photovoltaic (PV) panel is affected by the ambient temperature. It is wee known how to predict the power output of a PV panel at different temperatures. Solar cells parameters such as open circuit voltage, short circuit current, fill factor and efficiency are the function of temperature to understand the performances of solar cells at temperature range (25-525) 0C and estimated variation of solar cells parameters regularly and shows linearly behavior on this temperature conditions. The fill factor and efficiency variations are directly proportional to the Isc and Voc respectively.

5 Wild Cane- Fiber Hybrid Composites
Ch Satish Babu, V Gowtham Reddy

Abstract- The natural fiber reinforced composites have the advantage of being light weight, renewable, bio-degradable, cheap and eco-friendly. So there is every need to investigate potentiality of natural fibers and its composites, which can be used in highly demanding situations. However, very small contribution of research work exists in the design and fabrication of composite materials using natural fibers. An attempt has been made in the present work to explore the possible use of variety of wild grown fibers in nature in the development of new composites for load carrying structures

6 Unique Security Identification Techniques Using Of Palmprint
A.Angayarkanni, Bharathi.R

Abstract- Biometrics are providing more efficient security identification ,it is automated methods for identifying a person or verifying the identity of a person based on a physiological or behavioral characteristic has the capability to reliably distinguish between an authorized person and an imposter. Day by day, biometric identification technique is gaining more impotence. Different techniques have been developed each of them has its own advantages and disadvantages. As we compare different biometric based techniques the palmprint identification technique has more flexibility and also has effective results. Palmprint recognition has been investigated over 10 years. During this period, number of palmprint identification systems are designed also many different problems related to palmprint recognition have been addressed. This paper provides an overview of current palm- print research, for real-time palmprint identification.

7 A Novel Frame Work for High Level Noise Estimation Using Singular Value Decomposition for Images
P.Thirupalu, Smt.U V Ratnakumari

Abstract—accurate estimation of Gaussian noise level is the basic interest in the vision and image processing applications. In this paper by the basis of the study of singular values of noise-corrupted images, a new effective noise level estimation method is proposed. There are two novel aspects of this paper address the major challenges in noise estimation: 1) the use of the tail of singular values for noise estimation to alleviate data basis for the noise estimation process and 2) the addition of known noise to estimate the content-dependent parameter, so that the proposed scheme is adaptive to visual signals, thereby enabling a wider application scope of the proposed scheme. The experiment results and analysis of proposed algorithm demonstrate that it can reliably infer noise levels and show robust behaviour over a wide range of visual content and noise conditions, and that is outperforms relevant existing methods.

8 Tracking Of Face In Video Using Spatial Temporal Structural Context Based Tracker
Shipra Vats, Sandeep gupta

Abstract—In videos, the moving object changes its appearance and location very frequently and gets occluded by other objects in unconstrained environments. That’s why, Moving object tracking is a challenging problem in today’s era. Moving object or target in the video changes it state continuously in space with time. Also, other factor i.e. brightness, color intensity and multiple objects heavily effects the moving target tracking task. Therefore, a robust technique is presented which is based on space time context model. Tracker based on this model completes the tracking task in unconstrained environments. The time based context captures the historical appearance information of the moving object. This feature prevents the tracker from drifting to the background in a long term tracking. The space context model integrates contributors. These contributors are the key-points around the target, to build a supporting field. The supporting field provides much more information than appearance of the target itself.

9 Malicious Routing Attacks in Mobile Ad Hoc Networks
P Hasitha Reddy, S Lavanya Reddy, Roshini K, A. V. S. M. Adiseshu

Abstract—The black hole problem is one of the security attacks that occur in mobile ad hoc networks (MANETs). We present two possible solutions. The first is to find more than one route to the destination. The second is to exploit the packet sequence number included in any packet header. Computer simulation shows that compared to the original ad hoc on-demand distance vector (AODV) routing scheme, the second solution can verify 75% to 98% of the route to the destination depending on the pause times at a minimum cost of the delay in the networks.

10 An Experimental Study of Fiber Reinforced concrete panels subjected to In-Plane and flexural forces
Dr Mohammad Ahmad, Saiful Islam, Roohul Abad Khan

Abstract—In this paper, an experimental study of fibre reinforced concrete wall and slab panels subjected to in-plane and flexure forces has been presented. The panels were casted of plain concrete as well as of concrete consisting of three different percentages of fibres. Steel fibres of diameter 0.426mm having aspect ratio of 72 were taken. Fibre content used were 0.4%, 0.5% and 0.6% by volume of concrete. These panels were tested in compression, one-way and two-way bending. Load- Deflection data were obtained and analysed. The crack patterns and failure mechanism were also examined. The fibre reinforced concrete panels were found to be stiffer at the serviceability loads and show ductile behaviour towards the failure stages of loading.

11 A Cross Layer Energy Based On Demand Routing Protocol For MANETs
K.Muthumayil, M.Buvana

Abstract—The design of efficient routing protocols for Ad hoc networks is a complex issue. In this paper, a dynamic energy conscious routing algorithm, a cross layered energy based on-demand routing protocol (ACER) where cross layer interaction is provided to utilize the energy related information from physical and MAC layers. Bit error rate (BER) at the end of a multi-hop route is calculated using the interference and noise level from physical layer. Routing is made after this information is collected from MAC layer. In this protocol, minimum receiving power is calculated after the initial transmission. This protocol is implemented for achieving good quality of service (QoS) in terms of energy consumption, throughput and delay.