Surekha B.,N.B.K.R IST |
Narayana K.L.,SITAMS |
Jayaprakash P.,SITAMS |
Vorugunti C.S.,IIIT SriCity
Proceedings - 2016 IEEE International Conference on Cloud Computing in Emerging Markets, CCEM 2016 | Year: 2016
RFID is a wireless system which uses electromagnetic fields in identifying and tracking the tags attached to objects. Many researchers have proposed RFID based authentication schemes under the assumption that the back end server is trustworthy. This pre assumption is not found to be valid in cloud centered RFID scenarios where the tag data is outsourced to insecure third party cloud. In this context, in 2013, Xie et al had proposed a first of its kind of cloud based RFID authentication scheme. In 2015, Abughazalah et al has presented that Xie et al scheme is susceptible to reader impersonation attack, tag location tracking attack and proposed an improved version. After detailed analysis, we will demonstrate that Abughazalah et al scheme still lacks to accomplish tag location privacy. As a portion of our contribution, we propose a cloud centered RFID authentication scheme, which is robust and resistant to the above attacks. We formally evaluate the security strong points of our scheme using widely recognized CasperFDR tool. © 2016 IEEE.
Damera B.,Bharathiar University |
Babu P.C.,P.A. College |
Proceedings of the 2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology, iCATccT 2016 | Year: 2017
The idea is to build an architecture to deliver services like broadcast and multicast over an existing infrastructure using LTE Multimedia Broadcast Multicast Service in a Single Frequency Network Area. Video on demand is the current demand from everyone and which is in a high rise and the mobile operators are in a plan of migrating their current IP based infrastructure of LTE to attain new business in the market, online gaming, radio broadcast, webcast, live streaming apps, file sharing are the other services. Many mobile users wanted to have TV support on their mobiles to watch movies, promos and so on. A set of first solutions to this requirement was Media FLO, DVB-H/DVB-T, ISDB-T etc. So from user point of view, it was very good since they can have both mobile phone and TV on a single device with a small extra cost. But for the service provider's point of view, it is not that simple story. Mobile phone network and mobile TV network is totally different and separate, so it is big investment to deploy the network for mobile TV. In view, we can have another simple and powerful broadcasting mechanism for radio broadcast globally. The expected demand is only met when the current serving infrastructure is upgraded. To achieve this one possible solution would be LTE cell transmission with eMBMS. Using this the available bandwidth can be effectively utilized and required content can be delivered with an optimized eMBMS. Long Term Evolution (LTE) is a bi-directional and IP based service which is best used when serving such kind of services. Commercial systems need to be installed to effectively cater the needs. The main objective of the proposed solution is to address the future needs with few key optimizations. The main objective is to optimize the MCE scheduling algorithm using evolved Round Robin technique is to serve more contents to users with optimized radio resource allocation in this paper. © 2016 IEEE.
Muni Rathnam S.,SITAMS |
Journal of Theoretical and Applied Information Technology | Year: 2014
Remote Sensing is vital because of their pressing need due to the analysis of natural hazards. Among the various natural hazards, the Volcanoes are terrific hazard which may harm the nature as well as the living things. Due to the aforesaid reasons, the identification of volcanoes and their hotspot identification are important to protect the living things. A mechanism which will be utilized to identify the volcanoes and their hotspot from the satellite images is proposed. Initially, the color space of the satellite image will be converted to another color space to identify the contents of the image clearly. After this process, the image will be segmented to identify the volcano's hotspot. In order to identify the hotspot of volcano, the Artificial Neural Network (ANN) is utilized which uses Standard Back Propagation (SBP) Algorithm. The proposed mechanism will be developed with the aid of the platform MATLAB (version 7.11). © 2005 - 2014 JATIT & LLS. All rights reserved.
Vijaya Kishore V.,SITAMS
Proceedings of the 2013 3rd IEEE International Advance Computing Conference, IACC 2013 | Year: 2013
Several lung diseases are diagnosed detecting patterns of lung tissue in various medical imaging obtained from MRI, CT, US and DICOM. In recent years many image processing procedures are widely used on medical images to detect lung patterns at an early and treatment stages. Several approaches to lung segmentation combine geometric and intensity models to enhance local anatomical structure. When the lung images are added with noise, two difficulties are primarily associated with the detection of nodules; the detection of nodules that are adjacent to vessels or the chest wall corrupted and having very similar intensity; and the detection of nodules that are non-spherical in shape due to noise. In such cases, intensity thresholding or model based methods might fail to identify those nodules. Edges characterize boundaries and are hence of fundamental importance in image processing. Image edge detection significantly reduces the amount of data by filtering and preserving the important structural attributes. So understanding of edge detecting algorithms is necessary. In this paper Morphology based Region of interest segmentation combined with watershed transform of DICOM lung image is performed and comparative analysis in noisy environment such as Gaussian, Salt & Pepper, Poisson and speckle is performed. The ROI lung area blood vessels and nodules from the major lung portion are extracted using different edge detection filters such as Average, Gaussian, Laplacian, Sobel, Prewitt, Unsharp and LoG in presence of noise. The results are helpful to study and analyse the influence of noise on the DICOM images while extracting region of interest and to know how effectively the operators are able to detect, overcoming the impact of different noise. The evaluation process is based on parameters from which decision for the choice can be made. © 2013 IEEE.
Gundala S.,SITAMS |
Ramanaiah V.K.,Yogi Vemana University |
Kesari P.,JNTUK UCE
2014 International Conference on Advances in Electronics, Computers and Communications, ICAECC 2014 | Year: 2015
The power consumption is a major concern for emerging applications like mobile phones, digital cameras, pace makers and multimedia processors. The power consumption can decreases by number of ways. The multiple supply voltage design is a dominant technique for the reduction of power consumption in System on Chips/Cores. The System on Chips/Cores uses level shifters and the level shifter will become overhead, when its own power consumption & delay is high. In this paper a nanosecond delay level Shifter with logic level correction circuit is introduced that performs level up shifting as well as logic level correction to keep the VOUT stable, equals to VDD or VSS with low power consumption. The circuit is designed and simulated in a 90nm process technology. The proposed technique is a unique component, will comprise a feedback network to keep the output as stable as possible. Robustness of the new level shifter design has examined at an operating frequencies of 10 KHz, 500 KHz, and 1 MHz with varying load of 10 fF to 70 fF and varying temperature from-20 °C to 70 °C. The proposed design reliably shifts 0.4V input signal to 1V output signal with a delay as low as 0.8ns and average power consumption of 80nW at a frequency of 1MHz. © 2014 IEEE.
Sarvabhatla M.,NBKRIST |
Narayana K.L.,SITAMS |
Vorugunti C.S.,Dhirubhai Ambani Institute of ICT
2015 IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems, SPICES 2015 | Year: 2015
The advancement of communication technology resulted in increasing number of security threats over public Internet on remote servers. In 2014, Shipra et al. proposed an improved remote user authentication scheme using smart cards with check digits. Shipra et al. claimed that their scheme is secure and efficient against all major cryptographic attacks. Unfortunately, their scheme is vulnerable to some of the cryptographic attacks, particularly 'online password guess attack' as discussed in this manuscript. As a part of our contribution, we propose a robust and extra secure authentication scheme for remote users based on smart cards with check digits, with slight increase in the cost. Security is the fundamental compared to complexity, since complexity can be easily manage with improved technology. © 2015 IEEE.
Murugan G.,SITAMS |
Vorugunti C.,Dhirubhai Ambani Institute of ICT
2014 IEEE International Conference on Cloud Computing in Emerging Markets, CCEM 2014 | Year: 2015
Cloud computing is a collection of virtually massive distributed large scale computers to handle enormous enterprise computing, hardware, storage needs. An exponential advancement of communication and information technologies results in substantial traffic for accessing of cloud resources wired and mobile, through various communication devices like desktop, laptop, tabs, etc. via Internet. Significance of enterprise data and increased access rates from low-resource terminal devices demands for reliable and low cost authentication techniques. Lots of researchers have proposed authentication schemes based on password, biometric, steganography etc. with varied efficiencies. In 2014, Nimmy et al proposed a steganography based mutual authentication protocol for cloud computing and claimed that their scheme resists major cryptographic attacks. Unfortunately, in this paper we will show that Nimmy et al is vulnerable to offline password guessing attack and Denial of Service attack. As a part of our contribution, we propose a low cost steganography based authentication scheme which is strongly secure and best suited for asymmetric cloud computing environment. © 2014 IEEE.
Krishna M.V.,SITAMS |
2014 International Conference on Science Engineering and Management Research, ICSEMR 2014 | Year: 2014
Making Network on Chip is carried out here, we introduce another system on-chip (Noc) that handles exact limitations of the flawed parts of the Noc. The proposed Noc is focused around new slip location components suitable for element Nocs, where the number and position of processor components or defective squares differ amid runtime. The Noc medium performs an abnormal state of modularity, adaptability, and throughput. A Noc includes switches and interconnections permitting correspondence between the PEs and/or Ips. The Noc depends on information parcel trade. The way for an information parcel between a source and a terminus through the switches is characterized by the steering calculation. Subsequently, the way that an information bundle is permitted to take in the system depends chiefly on the addictiveness allowed by the routing algorithm, which is connected provincially in every switch being crossed and to every information parcel. © 2014 IEEE.
Machiraju P.K.,SITAMS |
2014 International Conference on Science Engineering and Management Research, ICSEMR 2014 | Year: 2014
Level up and level down applications can be performed by using the novel Efficient Voltage Level Shifter (EVLS). Based on its input voltage the proposed EVLS can able to perform level up shift or level down shift. EVLS means, the circuit monitors its input voltage and performs level up shift, when its input voltage is low and level down shift when its input voltage is high. This novel level shifter consistently performs level up shift from 0.6V to 1.2V and level down shift from 1.2V to 0.6V. A new design of level up and down shifter for low power application has been presented. The circuit has been designed and simulated with 90nm process technology. In analysis of power and delay, the new proposed EVLS shifter has level up and level down average power dissipation of 24.7145nW and with a delay of 2.053ns has achieved. © 2014 IEEE.
Thulasi Krishna S.,Rayalaseema University |
International Journal of Pharmacy and Technology | Year: 2016
Software Development Life Cycle Model gives theoretical guide line regarding development of the software. Software development models are very important for developing software in a systematic manner such that it will be delivered within the time deadline and also should satisfy quality parameters. Generally we have many different techniques and methods used in software development life cycle. An overview of the more common system development process models used to guide the system Analysis,Design,Development and Maintenance of developed software. I propose new Software development process model that is “Confident Software Development Process Model”. In this model we have not frozen requirement phase,one can move easily from design phase to requirement phase if a new requirement surfaces. We can easily incorporate small to large changes in any phase. This is very useful to developers to develop new software. © 2016,International Journal of Pharmacy and Technology. All rights reserved.