Enhancing Bluetooth security for m-commerce transactions
Bluetooth is a short-range wireless cable replacement technology. The Bluetooth Security Architecture is susceptible to a number of attacks such as exhaustive search of short PINs, man-in-the middle attack and denial-of-service attacks. These attacks are made possible by weaknesses exploited in the PIN code, the system of key distribution and the handling of requests from malicious users. This paper also introduces some possible additional security measures which could be implemented to strengthen the overall security architecture of Bluetooth enabled devices.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Implementation of energy efficient adder for ALU using modified pass transistor logic
We present two high speed and low power full adder cells designed with modified pass transistor logic styles that lead to have a reduced power delay product (PDP) as compared to the previous logics DPL and SR-CPL logic. We carried out a comparison against other full adders reported as having a low PDP, in terms of speed and power consumption. All the full-adders were designed with a 0.12µm CMOS technology. Simulations of the circuit show that the proposed full-adders have reduced the power from 0.326mW to 0.242mW.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Mechanical properties of fibre reinforced concrete using different types of steel fibres
The Steel Fiber Reinforced Concrete (SFRC) is composed of cement, fine and coarse aggregates and discontinuous discrete steel fibers. In tension SFRC fails only after the steel fiber breaks or pulled out of the cement matrix. The composite nature of SFRC is responsible for its properties in freshly mixed and hardened state. The mechanical properties of SFRC are depending on type of fiber, aspect ratio, volume fraction of fibers and the size of the aggregates. SFRC transfer stresses across a cracked section which increases toughness of concrete in hardened state. This paper invistigate the behavior of steel fiber reinforced concrete for compressive strength, tensile strength and flexural strength, using different types of steel fibers and different aspect ratio.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Analysis of MEMS controlled Paper-like transmissive flexible display using Comsol multiphysics
Micro Electro Mechanical System (MEMS) controlled paper-like flexible display was designed with basic cantilever structure using comsol software. This model increased the picture clarity by spacer design. Foldable and flexible display achieved by having the flexible substrate. Low operating voltage can be obtained for the device by proper material usage and thickness of the layers. Electro static analysis showed that the distribution of the potential and the stability. This model promised for high picture clarity with more compact structure.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Detection of similar pattern of chhattisgarhi dialects through speech recognition using wavelet transformation
This paper will presents a method of finding a relations between similar speeches signals which are speaker independent taken from common set of samples of Chhattisgarhi language and dialects commonly spoken at different regions of Chhattisgarh. The objective of this paper is to detect similar and dissimilar patterns of different Chhattisgarhi dialects through wavelet analysis methods which are useful for complex speech signal analysis. Through wavelet transforms parameters are extracted from speech corpus and then relations are established.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A Graceful Motion of Robot using SLAM and Kalman Filter
Although progress in 2D mobile robot piloting has been significant but the goal of this paper focus on to explore the use of SLAM using kalman filter and with the help of various sensory gadgets. To estimate the robot position and feature (a point in environment) locations, Kalman Filter for moving robot is used in tabular format which depicts diversion of robot with respect to origin at starting and ending point and calculating reflexive angles at different points of experimental pathway. Main focus of this paper is to minimize the standard deviation in new estimation of moving robot
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Next Generation CDMA Technology
This paper presents the new trends in code division multiple access techniques known as Optical CDMA Technology. I highlight those trends and features that are believed to be essential to the successful introduction of various OCDMA techniques in communication systems and data networks in near future. In particular, i elaborate on enabling technologies that are needed prior to full scale consideration of OCDMA in communication systems. I extend my discussion to various data network. It is believed that OCDMA once fully developed and matured will be an inseparable part of advanced optical communication systems and networks due to its various desirable features and functionalities, in not so distant future. Optical Code Division Multiple Access (OCDMA) is an optical processing system which allows multiple users to share the same bandwidth simultaneously without interfering with each other using unique optical codes. In this paper we present an in depth review on the new trends and the directions taken by the researchers worldwide in Optical Code Division Multiple Access (OCDMA) systems.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Categorizing Web Pages and Data Mining
The diversity of knowledge on the web has made determining communication patterns in the database and knowledge discovery among this mass of information an attractive target. The first step to achieve this goal is to classify web pages. The current machine learning techniques to classify content are initially discussed by flat and simple text documents and do not use structures such as links and headers discussed in the web optimally. Data mining is a set of techniques that allows a person to move beyond conventional data processing and help mining the information hidden in a massive volume of data. Today, in most organizations, data are collected and stored rapidly. However, using these data is not simple and they cannot be used as a single unit of the volume of data, so techniques they can be applied properly using a combination of statistics and computer science and the use of machine learning. However, in order to achieve a meaningful result of Web mining we need to have good data on our website, so effective management of Web data is crucial in web mining. The ultimate goal of this descriptive paper is that the organizations and small businesses could use data mining in their decisions and e-commerce as a future big business would enter into new future areas. There is a wide range of users considered for this technology, including for example research centers, companies operating in the field of web and database, analysts and managers of organizations, business, Web (search engines) and …
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Exploring the data access control for multi-authority cloud storage with efficient revocation
Business record (BR) is an emerging patient-centric model of information exchange, which is outsourced to be stored at a third party, such as cloud providers. To assure business data control over access to their own BRs, it is promising method to encrypt the BRs before outsourcing. To achieve scalable data access control for BRs, we leverage attribute based encryption techniques to encrypt business file. In data owner, the users divide to the BR system into multiple security domains that reduces key management complexity for owner and users. A degree of privacy is guaranteed by exploiting multi-authority ABE.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Face recognition using apperance based analysis
Face recognition technology has evolved as a popular identification technique to perform verification of human identity. By using the feature extraction methods and dimensionality reduction techniques in the pattern recognition applications, a number of facial recognition systems have been produced with distinct measure of success. Various face recognition algorithms and their extensions; have been proposed in the past two decades. However, face recognition faces challenging problems in real life applications because of the variation in the illumination of the face images, facial expression and background variation. This paper provides a classification of back ground variation includes uniform background and non-uniform background along with facial expression, orientation of the image and illumination invariant using Principal Component Analysis (PCA) and Linear Discriminate Analysis (LDA) face recognition system.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]