{"title":"Low power and high speed AES using mix column transformation","authors":"J. Balamurugan, E. Logashanmugam","doi":"10.1109/ICCTET.2013.6675950","DOIUrl":"https://doi.org/10.1109/ICCTET.2013.6675950","url":null,"abstract":"It is crucial to design energy-efficient advanced encryption standard (AES) cryptography for low power embedded systems powered by limited battery. We will present the hardware architecture to implement low power AES crypto module. Our low power AES crypto module has optimized architecture of data encryption unit and key schedule unit which could be applicable to wireless sensor networks. We also details low power design methods used to design our low power AES crypto module. The power consumption and area is further decreased by inserting compact and flexible architecture for mix column transform. The proposed AES algorithm achieves a high speed and low area when compared with the existing methods.","PeriodicalId":242568,"journal":{"name":"2013 International Conference on Current Trends in Engineering and Technology (ICCTET)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115894230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel approach of organic solar cells based on ZNO nanowires layer","authors":"R. P. Nivedha, S. Balaji, J. Jaya","doi":"10.1109/ICCTET.2013.6675984","DOIUrl":"https://doi.org/10.1109/ICCTET.2013.6675984","url":null,"abstract":"In our research we are looking for alternative to solar cells based on silicon. We are using zinc oxide (ZnO) which is N type semiconductor instead of silicon. To reach PN junction P type polymer is used. ZnO is in form of well aligned nanowires. Since the distance between nanowires is smaller than the mean free path of electrons almost all emitted electrons are collected. We use vapor-liquid-solid (VLS) method to create ZnO nanowires. Used substrate was sapphire, silicon and silica glass. Small solar cell was manufactured and its open circuit voltage under light was measured.","PeriodicalId":242568,"journal":{"name":"2013 International Conference on Current Trends in Engineering and Technology (ICCTET)","volume":"26 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113974569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhanced slicing models for preserving privacy in data publication","authors":"S. Kiruthika, M. Raseen","doi":"10.1109/ICCTET.2013.6675998","DOIUrl":"https://doi.org/10.1109/ICCTET.2013.6675998","url":null,"abstract":"Privacy preservation in publishing of microdata has been studied extensively in recent years. Microdata contain records each of which contains information about an individual entity, such as a person, a household, or an organization. Several anonymization techniques, such as generalization, bucketization and slicing have been designed for privacy preserving microdata publishing. That generalization loses considerable amount of information, especially for high dimensional data. Bucketization does not prevent membership disclosure and does not apply for data that do not have a clear separation between quasi-identifying attributes and sensitive attributes. Slicing have a drawback when more number of similar attribute value and the sensitive value may present in the different tuples may give the original tuple while performing the random permutation. The utility of the dataset is lost by generation the fake tuples. Thus enhanced slicing models have designed to overcome the drawbacks of slicing. The suppression slicing is done by suppressing any one of the attribute value in the tuples and then perform the slicing. Thus utility is maintained with minimum loss by suppressing only very few values and privacy is maintained by random permutation. The next model is Mondrian slicing in this the random permutation is done with all the buckets not within the single bucket. Thus same utility of the original dataset is maintained.","PeriodicalId":242568,"journal":{"name":"2013 International Conference on Current Trends in Engineering and Technology (ICCTET)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122929225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"User profile creation based on navigation pattern for modeling user behaviour with personalised search","authors":"Josna Jojo, N. Sugana","doi":"10.1109/ICCTET.2013.6675989","DOIUrl":"https://doi.org/10.1109/ICCTET.2013.6675989","url":null,"abstract":"Web Usage Mining (WUM) is the process of extracting knowledge from Web users access data by exploiting Data Mining techniques. It mines the secondary data (web logs) derived from the user interaction with the web pages during certain period of Web sessions. In the present research work, a hybrid method is proposed, which uses the ant-based clustering and LCS classification methods to find and predict user's navigation behaviour. Thus user profile can be tracked in dynamic pages. Personalized search can be used to address challenge in the web search community, based on the premise that a user's general preference may help the search engine disambiguate the true intention of a query. Each user can view searching history along with ranking. In this paper, how a search engine can learn a user's preference automatically based on area of interest and how it can use the user preference to personalize search results.","PeriodicalId":242568,"journal":{"name":"2013 International Conference on Current Trends in Engineering and Technology (ICCTET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130182240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy aware multicast opportunistic routing protocol (Eamor) to optimize lifetime of MANET","authors":"S. M. Lakshmi, K. Sikamani","doi":"10.1109/ICCTET.2013.6675948","DOIUrl":"https://doi.org/10.1109/ICCTET.2013.6675948","url":null,"abstract":"The main theme of this paper is to propose an opportunistic multicast routing protocol with awareness of energy to adopt with the highly dynamic environment of Mobile Adhoc Network. The nodes distributed in MANET environment is divided into several multicasting regions based on the geographical location. Each and every node is present in any one of the multicasting region. Each and every region is assigned with group address. When the source node forwards the data to a multicast group, the source node forwards the data through the node with highest energy so, the proposed multicast routing scheme optimize the total energy consumption and increase the lifetime of the network. The performance is evaluated by comparing the results with the traditional method MAODV.","PeriodicalId":242568,"journal":{"name":"2013 International Conference on Current Trends in Engineering and Technology (ICCTET)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116246994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design, analysis and FPGA implementation LDPC codes with BCH codes","authors":"R. Muthammal, S. S. R. Madhane","doi":"10.1109/ICCTET.2013.6675957","DOIUrl":"https://doi.org/10.1109/ICCTET.2013.6675957","url":null,"abstract":"In this work, a analysis is performed between LDPC and BCH codes, the BCH codes[1] and LDPC codes both being an error correcting codes that can be used in wireless standards, by implementing these two error correcting codes in FPGA we analyze the Architectures of Error correcting codes in order to show that LDPC is having low area and less power than BCH codes.","PeriodicalId":242568,"journal":{"name":"2013 International Conference on Current Trends in Engineering and Technology (ICCTET)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122325796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A vigorous distributive approach to adaptive link scheduling in Mobile Ad-Hoc Networks","authors":"X. Shiny, R. JagadeeshKannan","doi":"10.1109/ICCTET.2013.6675934","DOIUrl":"https://doi.org/10.1109/ICCTET.2013.6675934","url":null,"abstract":"In our project, we propose a distributive heuristic algorithm for maximizing the network throughput in adaptive power and adaptive rate spatial-TDMA wireless mesh networks. At each step of our algorithm, the link with highest receive Signal-to-Interference and Noise Ratio in its neighborhood is included in the schedule that is set for the underlying time slot, configuring its Modulation/Coding Scheme so that it transmits at the highest feasible power and rate levels. The transmitting node of the winning link announces the current receive power margin of its link's receiver to its neighbors. The transmitters of unscheduled links subsequently calculate the maximum potential Signal-to-Interference and Noise Ratio level at which their links could operate if scheduled next. The process repeats until the announced power margins of scheduled links do not allow more additions to the schedule at the underlying time slot. We demonstrate the robustness and energy efficiency of our distributive algorithm by applying it to schedule a new set of links on top of an existing schedule. For the examined scenarios, we show that the throughput rate achieved by using such an incremental scheduling scheme is within 25% of the throughput rate attained when a complete scheduling of all the links is carried out, while reducing the control traffic overhead rate and achieving a more energy efficient operation.","PeriodicalId":242568,"journal":{"name":"2013 International Conference on Current Trends in Engineering and Technology (ICCTET)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127842216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic registration of images with simulated rotation and translation estimation using HAIRIS","authors":"K. Priyadharshini, R. Jegan, G. Venkatesan","doi":"10.1109/ICCTET.2013.6675904","DOIUrl":"https://doi.org/10.1109/ICCTET.2013.6675904","url":null,"abstract":"Image registration is the most important fundamental phenomenon in the image processing system. In which Automatic image registration is a challenging aspect. Although enormous methods for automatic image registration have been developed and implemented in ancient days, it is still a broad use in plenty applications, such as in remote sensing. In my work, I have proposed a method for automatic image registration through histogram-based image segmentation (HAIRIS). This new approach is designed by combining several segmentations of the pair of images to be registered, according to a relaxation parameter based on the delineating histogram modes, following the characterization of the objects extracted via the objects area, axis ratio, perimeter and fractal dimensionand a statistical procedure for objects matching is applied to each object. Finally, the simulated rotation and translation are illustrated for this proposed methodology. The first and foremost dataset consists of a photograph and a rotated and shifted version of this photograph is developed, with different levels of added Gaussian white noise. This can also be applied to satellite images which are in pair, with different spectral content and simulated translation and rotation is estimated, and also for various remote sensing applications comprising of different viewing angles, different acquisition dates and different sensors. Histogram-based image segmentation allows the registration of pairs of multitemporal and multisensor images with their differences in rotation and translation parameters, with small spectral content differences whereas, leading to sub pixel accuracy.","PeriodicalId":242568,"journal":{"name":"2013 International Conference on Current Trends in Engineering and Technology (ICCTET)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127432520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An experimental investigation on flexural behaviour of stainless steel fiber reinforced concrete beam elements","authors":"P. Prasath, D. Silambarasan","doi":"10.1109/ICCTET.2013.6675931","DOIUrl":"https://doi.org/10.1109/ICCTET.2013.6675931","url":null,"abstract":"Concrete is the most widely used construction material because of its specialty of being cast into any desirable shape. Ductility and energy absorption capacity are the main requirements of earthquake resistant structures. However the conventional concrete has low tensile strength, lower energy absorption and little resistance to cracking. Therefore, it cannot fulfill the requirements of the earthquake or seismic resistant structure. Extensive researches have shown that the most significant influence of the inclusion of steel fiber in concrete is to delay and control tensile cracking of the composite material. The primary variables are fiber content and matrix composition. The addition of steel fiber to matrix leads to improvement in several properties of concrete. In this investigation the strength properties are determined by using different geometrical steel fibers. The various parameters like load carrying capacity, stiffness, ductility character and energy absorption capacity has to be analyzed.","PeriodicalId":242568,"journal":{"name":"2013 International Conference on Current Trends in Engineering and Technology (ICCTET)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116946370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic hierarchical mobility detection for mobile target in wireless networks","authors":"V. K. R. Bharathy, S. Kowsalaya, P. Balamurugan","doi":"10.1109/ICCTET.2013.6675929","DOIUrl":"https://doi.org/10.1109/ICCTET.2013.6675929","url":null,"abstract":"Selecting the locations of mobile targets moving in a given area optimizes WSN topology and maximizes the efficiency of the framework. We propose to add dynamic hierarchical mobility to identify the positions of the nodes of Wireless sensor networks (WSNs). It uses the MIP protocol which extends ip address of the mobile node by effectively utilizing two ip address, one for routing purpose and other for identification purpose. Routing enhances the existing system of identifying the positions effectively by increasing the speed of the application.","PeriodicalId":242568,"journal":{"name":"2013 International Conference on Current Trends in Engineering and Technology (ICCTET)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131668033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}