{"title":"A New Framework for Credit Card Transactions Involving Mutual Authentication between Cardholder and Merchant","authors":"Shalini Gupta, R. Johari","doi":"10.1109/CSNT.2011.12","DOIUrl":"https://doi.org/10.1109/CSNT.2011.12","url":null,"abstract":"Electronic Commerce (e-Commerce) and ease in the onsite transactions have led to the exponential growth in the acceptance of credit cards among consumers of all the sections. But despite their remarkable advantages, consumers are still reluctant in their use, especially for online transactions and reason being the increasing credit card fraud rate. A number of security models have been proposed and deployed for secure online transactions but the sharing of sensitive credit card data over the Internet has made online transactions vulnerable to threats. In this paper, we discuss and analyze the current developments in online authentication procedures including biometrics, one-time-password systems and use of mobile device and Public Switched Telephone Network for cardholder authentication. Then we propose a complete new framework for both onsite and online (Internet shopping) credit card transactions. This framework is more secure, robust, enhances user privacy and does not involve the deployment of special hardware systems at the customer's site.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"86 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116307271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pyrometric Human Presense Detection System","authors":"Shreyansh Jain, G. Tomar","doi":"10.1109/CSNT.2011.90","DOIUrl":"https://doi.org/10.1109/CSNT.2011.90","url":null,"abstract":"A simple model has been planned for human presence sensing in a closed room using a scanning type pyrometric detector, embedded system and intelligent software. Sensors are to be mounted on a rotating platform for scanning of the field of view at regular intervals and at slow speed. This concept is intended to monitor movements of human at desired location and activate equipment accordingly.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123777236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of AES and TwoFish Encryption Schemes","authors":"S. Rizvi, S. Z. Hussain, N. Wadhwa","doi":"10.1109/CSNT.2011.160","DOIUrl":"https://doi.org/10.1109/CSNT.2011.160","url":null,"abstract":"The two main characteristics of a good encryption algorithm are: Security and Speed. Usually security algorithms have to be embedded in a variety of applications like e-banking, online shopping, mails etc. So they should be fast as well as secure in different environments. In this paper, we do security v/s performance analysis of two algorithms Two fish and AES. First, we will discuss security issues of both algorithms by considering their safety factor. Then we study encryption speed of both algorithms by encrypting different type of data (text, image, audio) and analyze their performance in terms of throughput of every algorithm on different size of RAMs. The results show the relationship between performance of algorithms and size of RAM and type of data.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"218 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126115692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
O. Verma, M. Hanmandlu, Seba Susan, M. Kulkarni, P. Jain
{"title":"A Simple Single Seeded Region Growing Algorithm for Color Image Segmentation using Adaptive Thresholding","authors":"O. Verma, M. Hanmandlu, Seba Susan, M. Kulkarni, P. Jain","doi":"10.1109/CSNT.2011.107","DOIUrl":"https://doi.org/10.1109/CSNT.2011.107","url":null,"abstract":"In this paper, we present a region growing technique for color image segmentation. Conventional image segmentation techniques using region growing requires initial seeds selection, which increases computational cost & execution time. To overcome this problem, a single seeded region growing technique for image segmentation is proposed, which starts from the center pixel of the image as the initial seed. It grows region according to the grow formula and selects the next seed from connected pixel of the region. We use intensity based similarity index for the grow formula and Otsu's Adaptive thresholding is used to calculate the stopping criteria for the grow formula. We apply the proposed method to the Berkley segmentation database images and discuss results based on Liu's F-factor that shows efficient segmentation.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125224029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Proposed Feature Extraction Technique for Dental X-Ray Images Based on Multiple Features","authors":"J. Raju, C. Modi","doi":"10.1109/CSNT.2011.116","DOIUrl":"https://doi.org/10.1109/CSNT.2011.116","url":null,"abstract":"In recent years, the need for personal identification systems has increased in cases of severe accidents and calamities for criminal investigation. Biometric identification systems can be used for gaining access to systems and verification purpose. However, biometrics such as iris, fingerprint, etc. are vulnerable to early decay and decomposition. On the other hand, dental x rays remain invariant over time and resist early decomposition, fire, etc. Hence they can be used for human identification purpose. In this paper, a novel approach to feature extraction of dental x-ray radiograph is proposed based on the shape and texture of extracted tooth from the radiograph and thereafter matching is done by finding mean square error between the query and database images.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127993066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Backstepping Control of Discrete-Time Nonlinear System Under Unknown Dead-zone Constraint","authors":"V. Deolia, S. Purwar, T. Sharma","doi":"10.1109/CSNT.2011.78","DOIUrl":"https://doi.org/10.1109/CSNT.2011.78","url":null,"abstract":"This paper proposes the adaptive back stepping controller for a class of nonlinear discrete-time systems in strict-feedback form with unknown dead-zone using neural networks. The control design is attained by introducing the dead-zone nonlinearity and using it in the controller design with back stepping technique. A dead-zone inverse is developed to compensate the dead-zone effect in nonlinear systems. In this scheme, Chebyshev Neural Network (CNN) is used to approximate the unknown nonlinear functions and also used to compensate the dead-zone nonlinearity. New weight updates laws are derived to guarantee uniform ultimate boundedness (UUB) for all signals in closed loop system.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125136955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Kumar, Jagmeet Singh Sandhu, Bharat Bisht, Pragya Gupta, G. Singh
{"title":"Dual-Band Dielectric Rod Antenna for Satellite Communication System","authors":"K. Kumar, Jagmeet Singh Sandhu, Bharat Bisht, Pragya Gupta, G. Singh","doi":"10.1109/CSNT.2011.59","DOIUrl":"https://doi.org/10.1109/CSNT.2011.59","url":null,"abstract":"In this paper, we have simulated the dielectric rod antenna by using CST microwave studio which is commercially available simulator based on finite integral technique for satellite communication system. We emphasize particularly, on the gain of the proposed antenna at two frequencies that is from 25GHz to 35 GHz. The radiation mechanism of the dielectric rod antenna is based on the discontinuity radiation concept in which the antenna is regarded as an array composed of two effective sources at the feed end and free end of the rod.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129224061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Mittal, B. Kumar, Y. S. Negi, B. Kaushik, R.K. Singh
{"title":"Organic Thin Film Transistor Architecture, Parameters and their Applications","authors":"P. Mittal, B. Kumar, Y. S. Negi, B. Kaushik, R.K. Singh","doi":"10.1109/CSNT.2011.96","DOIUrl":"https://doi.org/10.1109/CSNT.2011.96","url":null,"abstract":"Organic Thin Film Transistors (OTFTs) are promising devices for future development of variety of low-cost and large-area electronics applications such as flexible displays. This paper analyzes the performance of OTFT made of several organic semi conducting and insulating materials and further discusses their applications. Analysis of previous research work demonstrates that the mobility in OTFT decreases when the product of semi conducting film thickness and gate capacitance per unit area increases. The decrease is specified by a power law function with parameters for several organic semiconductors. OTFT characteristics have undergone spectacular improvements during the last few years. This paper explores the effect of variation of channel length from 40 nm to 20 nm on drain current for pentacene bottom contact structure. Variations in these quantities maps to variations in the electrical behaviour of devices. It has been found that drain current increases due to decrease in length of organic thin film conducting channel. It reviews recent progress in parameter properties for device designs and applications related to OTFTs. The performance of OTFTs is evaluated in terms of mobility, on/off current ratio, threshold voltage and sub threshold slope. This paper thoroughly discusses the overall performance and applications of OTFTs in various fields.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115727155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Part of Speech Tagging for Hindi Corpus","authors":"N. Mishra, Amit Mishra","doi":"10.1109/CSNT.2011.118","DOIUrl":"https://doi.org/10.1109/CSNT.2011.118","url":null,"abstract":"The wide utilization of internet for making search of information has got emerging use of computational linguistics as most of the search systems uses bag of words mode which causes problem in retrieval due to polysemy, homonymy, synonymy[9][3]. This has lead to shift in the accepted boundary between what kinds of query information are submitted by humans and what kinds further intreprations in form of annotation of query information can be done so as to get better results[1][4]. In this regards the process of annotating the words in a text in accordance to a particular part of speech is the objective of this paper. further POS tagging is much tougher than making a list of words and their parts of speech, as most words tend to have more than one part of speech in different scenarios and some parts of speech of these words are rather complex or unspoken[5] [6]. There are large numbers of POS tagger available for english language which has got satisfactory performance but cannot be applied to hindi language due to structural differences[8]. This paper aims at part of speech tagging for hindi corpus as large no of hindi documents are growing on internet.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"11 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113955790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Human Identification by Partial Iris Segmentation Using Pupil Circle Growing Based on Binary Integrated Edge Intensity Curve","authors":"Hemal U. Patel, C. Modi, M. Paunwala, S. Patnaik","doi":"10.1109/CSNT.2011.76","DOIUrl":"https://doi.org/10.1109/CSNT.2011.76","url":null,"abstract":"Identification of human based on iris has gained increased attention in recent years. The paper focuses on novel and efficient approach of partial iris based recognition of human using pupil circle region growing and binary integrated edge intensity curve which defeats the difficulties of eyelids occlusions. The experimental results are obtained on CASIA database version-1 and show good performance with EER of 5.14%. The advantage of the proposed approach is its computational simplicity and good recognition accuracy as it avoids the eyelids portion from the iris region for further processing.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"295 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115321358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}