IJEA - Volume 7 Issue 7 (July 2018)

 


Sr/No/ Title Pdf
1 DESIGN OF TRUST MODEL FOR INTRUTION DETECTION FOR IOT: A REVIEW
Abhay Singh Thakur (M. Tech Scholar), Prof. Neeta Nathani

ABSTRACT - Large-scale deployment & use of cloud computing in the industry is accompanied & in same time hampered by concerns regarding protection of data handled by cloud computing providers. One of the consequences of moving data processing & storage of company premises is that organizations have less control over their infrastructure. As a result, cloud service (CS) clients must trust that cloud service provider is able to protect their data & infrastructure from both external & internal attacks. Currently, however, such trust may only rely on organizational processes declared by cloud service provider & cannot be remotely verified & validated by an external party. Having tools to perform such verifications prior to launch as a virtual machine (VM) instance, allows cloud service clients to decide at runtime whether certain data should be stored to calculations should be made at the virtual machine instance offered by cloud service provider, This paper combines two components trusted computing, & cloud computing platforms to address issues of trust & security in public cloud computing environments.
Keywords — virtual machine (VM), Cloud Server, SaaS, PaaS and AaaS etc. .
Page No. 01 - 05 .

Download
2 HIGHLY SECURE DATA ENCRYPTION TECHNIQUE DESIGN FOR IDEA AND AES ENCRYPTION METHODS
Bhawna Ondela and Prof. Silky Pareyani

ABSTRACT - Cryptography is a procedure to send data securely. Many algorithms are available in cryptography like AES, DES, BLOWFISH, RSA and IDEA etc. But there are some problems in these algorithms like performance, integrity of data and authentication. As we studied some papers, AES (Rijndael) was the best among all in terms of Security, Flexibility, Memory usage and Encryption performance. Our proposed work is a high level security algorithm for encryption and is named as PAIE (pipelined AES and IDEA Encryption) which is a combination of AES and IDEA .The basic concept involved in proposed work is reducing time delay and increase the avalanche of the data .We have worked in three basic parameters throughput, timed delay and avalanche and compare these parameters from ADA Algorithm [1] result. PAIE is successfully simulated in MATLAB and experimental results shows that PAIE has reduced the time delay. .
Keywords— DES (Data Encryption System), AES (Advance Encryption System), IDEA (international data encryption algorithm), SAFAR (Secured & fast encryption routine), NIDS (Network Intrusion Detection System), PAIE-Pipelined AES IDEA encryption and AES cum DES algorithm (ADA).
Page No. 01-06 .
Download
3 De-Noising using Wavelet Transforms of ECG Signals: A Survey
Rahul Mandle (M. Tech Scholar), Prof. Ritesh kumar Pandey

ABSTRACT -n any style of signal process, it's been incontestable that it's necessary to get rid of noise from the signal before recognizing or classifying the patterns. Otherwise, the entire method might provide wrong results. During this work the selection of de-noising mechanisms for numerous forms of input file and Gaussian noise is explored, to extend the signal strength. Nowadays, we've got seen that a lot of internal organ diseases are diagnosed by graphical record take a look at. Thus cardiogram analysis is wide studied and applied in clinic. The recorded cardiogram signal in clinical info is corrupted by numerous varieties of noises. to get true cardiogram signal from hissing observations are often developed as drawback of signal de-noising.
Keywords— ECG, RMSE, WT and SNR.
Page No. 01-03 .
Download
4 Watermarking for secure Communication based on Three level DWT cum SVD (3DWTS) Method: Review
Reena Agnihotri (M. Tech Scholar) and Prof. Vishal Shrivastava

ABSTRACT -Watermarking is an approach to hide the image efficiently into any covering object (image in our case) and it should do that any intruder cannot interpret it by any means, as from the proposed method that is been achieved and one can say that our generated stegno image cannot be interpreted easily by any intruder, proposed work is a unique DWT based method for watermarking. The Covering image is divided into four sub bands using transform technique DWT. Two different privet images set fixed in the HL and HH sub-bands respectively. When inserted privet images are spread within each band and use a semi random succession and only one Session key. Privet images are retrieved using the session key along with size of the images. In this approach the stegno image produce is of acceptable level with good imperceptibility and less distortion as compared to other cover image with different methods and enhance the overall security.
Keywords— DWT, Watermarking, Stegno Image etc.
Page No. 01-03 .
Download
5 NEW GLCM AND THRESHOLDING BASED SKIN DISEASE DETECTION WITH HIGH ACCURACY RATE
Sonam Vishvakarma (M. Tech Scholar) and Prof. Aditya Sharma

ABSTRACT - Skin texture analysis is one of than challenging issues in the field of medical diagnosis. Various types of skin diseases are affecting human life like skin dryness, fungus, and allergic symptoms. The objective of this paper is to analyze the skin disease using texture analysis of skin image and by comparing the test image to a defined images or reference images. Support Vector Machine (SVM) based GLCM has been applied for observation of features. Processing of SKIN TEXTURE images is one of the parts of this field. MATLAB is been used for the design the proposed system, to make the design user friendly a GUI is been developed for front end use and in the background the proposed algorithm works, the results found are very good in terms of accuracy and time delay.
Keywords— STA-Skin Texture Analysis, GLCM-Gray level co‐occurrence matrix, SVM-Support Vector Machine, FAR-False acceptance Rate, FRR-False Rejection rate
Page No. 01 - 08 .
Download
6 DE-NOISING OF ECG SIGNAL METHODS AND PROCEDURE: A REVIEW
Sujan Singh Thakur (M. Tech Scholar) and Prof. Papiya Dutta

ABSTRACT - Electrocardiogram signal is one of the biomedical signals, which reflects electrical activity of the heart. ECG signals are widely studied and applied in clinic. The ECG signal is time varying signal, includes the valuable information related to heart diseases, but frequently this valuable information is corrupted by various noises. As noise corrupts the ECG signal it is very important as well as difficult task to suppress noises from ECG signal. So de-noising is the method of estimating the unknown signal from available noisy data. The empirical mode decomposition provides description of signal, decomposing it at different time-frequency resolution. Empirical mode decomposition is well suited tool for analysis of non-stationary signals like ECG. At first step, the signal is decomposed into transform domain where filtering procedures are applied. The noise free signal is then obtained by inverse transform. The basic idea behind this paper is the estimation of the uncorrupted ECG signal from the corrupted or noisy signal, and is also referred to as signal denoising.
Keywords— RMSE: root means square error, SNR: signal to noise ratio, ECG: Electrocardiogram, AWGN: Additive White Gaussian Noise and LMS: Least Mean Square.
Page No. 01 - 04 .
Download