{"title":"Using cell division for text to image encryption","authors":"Vaishnavikannan, Smita Jhajharia","doi":"10.1109/ISCO.2016.7727107","DOIUrl":"https://doi.org/10.1109/ISCO.2016.7727107","url":null,"abstract":"Protection of data has always been an issue and newer encryption methods are a constant need. Our paper provides a novel text encryption technique that encrypts a text message into an image using the concept of cell division that occurs in cellular organisms. Cell division, that includes the meiotic and the mitotic division, leads to the distribution of genetic material between two daughter cells. We draw a parallel between the cell division and encryption to achieve a high level of security. Our method works in three main stages - the mitotic phase, the meiotic phase and the image formation phase. Encrypted message is obtained in the form of an image. The results are passable. As per our knowledge, no prior work similar to our approach has been done.","PeriodicalId":320699,"journal":{"name":"2016 10th International Conference on Intelligent Systems and Control (ISCO)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121468372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A hybrid multilevel authentication scheme for private cloud environment","authors":"S. Sridhar, S. Smys","doi":"10.1109/ISCO.2016.7727141","DOIUrl":"https://doi.org/10.1109/ISCO.2016.7727141","url":null,"abstract":"Cloud Computing is the ubiquitous model of a shared pool of configurable computing resources. This paper proposes a multilevel authentication technique for use in Private Cloud network. Authentication of User is a challenging issue due to increasing security threats as it acts as the first defence against attackers. Whole authentication control lies in the server Side so Single-tier authentication is not enough to overcome these problems. We come up with a novel authentication mechanism, called Hybrid Multilevel Authentication, which provides the security against the insider attacks and virtualization attacks. Positives and negatives of other cloud setup were considered. Encryption function is implemented by symmetry-based AES encryption algorithm. This model provides a level of security for each member of that organisation.","PeriodicalId":320699,"journal":{"name":"2016 10th International Conference on Intelligent Systems and Control (ISCO)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128608893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Nivetha, N. Elizabeth, T. P. Padmasha, I. Gohulalakshmi
{"title":"Secure authentication process in smart cards","authors":"S. Nivetha, N. Elizabeth, T. P. Padmasha, I. Gohulalakshmi","doi":"10.1109/ISCO.2016.7726879","DOIUrl":"https://doi.org/10.1109/ISCO.2016.7726879","url":null,"abstract":"The application of smart cards and its fraudulent manipulation by software, hardware or telecommunication appears to be a major concern. Security breaches of smart cards, hacking into the system and creating duplicates of the cards have to be rectified. In this paper we propose an approach to design a more secure two-level authentication process that uses the PIN number as the first level of authentication and OTP generated using SHA-256 as the second level of authentication. Also comparison of various Hash algorithms are performed to justify the use of SHA-256 for OTP generation.","PeriodicalId":320699,"journal":{"name":"2016 10th International Conference on Intelligent Systems and Control (ISCO)","volume":"30 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128470309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Summary of LED down light testing and its implications","authors":"K. Shailesh, S. Kini, C. P. Kurian","doi":"10.1109/ISCO.2016.7727086","DOIUrl":"https://doi.org/10.1109/ISCO.2016.7727086","url":null,"abstract":"LED lighting technology is advancing at fast pace, LED lighting products in the market show a wide range of performance characteristics. This work explains the need for trustworthy, fair product performance information to promote the market for LED lighting products. In this work more than 120 LED down lights were tested using industry-approved test procedures and summary of the results is presented in this report. This work has exposed a broad range of performance, from poor to exceptional. Some LED lighting products tested deliver lumen output and luminous efficacies that exceed all expectations others perform badly and do not produce enough luminous flux output for their intended application. Some manufacturers are publishing trustworthy values for luminous flux output and luminous efficacy, there is often broad gap between performance claims in marketing literature and actual tested LED lighting product performance. Test results indicate that there is urgent need to implement strict regulations to curb misleading product literature from representing LED lighting product information. The work aims to discourage cheap low-quality LED lighting products and exaggerated claims, but also serves as useful source of information for government agencies and end-users to make informed decisions. Lighting product distributors, retailers, lighting designers, government agencies, and other stakeholders can draw inferences from this study and know the current state of the LED lighting market and its course.","PeriodicalId":320699,"journal":{"name":"2016 10th International Conference on Intelligent Systems and Control (ISCO)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128524643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Gopikrishnan, P. D. Mahendiran, V. Jothiprakash
{"title":"Localization of sensor nodes in the presence of obstruction in wireless sensor network environment","authors":"S. Gopikrishnan, P. D. Mahendiran, V. Jothiprakash","doi":"10.1109/ISCO.2016.7727144","DOIUrl":"https://doi.org/10.1109/ISCO.2016.7727144","url":null,"abstract":"Localization is considered as an important parameter in wireless sensor network where it support the node to identify its location so that routing can take place in power efficient way in a dynamic network topology. The issue of localization has been addressed in many research areas such as vehicle navigation systems, virtual reality systems, user localization in wireless sensor networks (WSNs). The proposed model presents a unique localization framework considering the presence of obstruction in the environment of wireless sensor network with random node placement and irregular radio patterns for minimizing the estimates of the range free localization errors. The mobile anchor nodes frequently broadcast beacon message, including their current location approach. The range-free localization algorithms evaluate the node ranging error accuracy in the anisotropic networks to address the localization inequality issues for the empty feasible set. Here, we applied the approach of convex optimization for localization since the computation is faster. Depending upon the node density the regular node need to communicate with the mobile anchor for the localization process by participating the regular nodes in the cooperative localization process.","PeriodicalId":320699,"journal":{"name":"2016 10th International Conference on Intelligent Systems and Control (ISCO)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116402203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Emerging time and frequency domain techniques for power quality disturbances analysis","authors":"P. Nalini, K. Selvi","doi":"10.1109/ISCO.2016.7727143","DOIUrl":"https://doi.org/10.1109/ISCO.2016.7727143","url":null,"abstract":"Recognition of power quality events by analyzing voltage waveform disturbances is a very important task for power system monitoring. This paper presents a novel approach for the recognition and classification of power quality disturbances using wavelet transform and support vector machine. The proposed method employs wavelet transform techniques to extract the most important and significant features from details and approximation waves. The obtained severable feature vectors are used for training the support vector machines to classify the power quality disturbances. Five types of disturbances are considered for classification. The simulation results reveal that the combination of wavelet transform and SVM in time and frequency domain can effectively classify different PQ events.","PeriodicalId":320699,"journal":{"name":"2016 10th International Conference on Intelligent Systems and Control (ISCO)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116705232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of self powered wireless sensor network using hybrid PV-wind system","authors":"P. Rangaree, G. Asutkar","doi":"10.1109/ISCO.2016.7727037","DOIUrl":"https://doi.org/10.1109/ISCO.2016.7727037","url":null,"abstract":"The commercially available sensor nodes are battery-driven devices. A number of nodes together constitute a network called wireless sensor network. As days proceed, the batteries used in the WSN lose their charge and subsequently get isolated from the network. Many energy harvesting schemes have been proposed to alleviate this problem which is to convert the ambient energy from the environment into electricity to power the sensor nodes. Energy harvesting from single source have environmental limitations like if the sensor is installed inside a building solar energy cannot be used and with wind generators is that they are too big, and are expensive if the size has to be decreased. Hence proposed system is design to provide multisource and self powered power supply to wireless sensor node which could stay charged by generating power on its own.","PeriodicalId":320699,"journal":{"name":"2016 10th International Conference on Intelligent Systems and Control (ISCO)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116761942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PID control of structure with tuned liquid column damper","authors":"Salsala Abubaker, S. Nagan, T. Nasar","doi":"10.1109/ISCO.2016.7726928","DOIUrl":"https://doi.org/10.1109/ISCO.2016.7726928","url":null,"abstract":"New civil engineering structures are long and slender and they have less damping. Therefore they are subjected to large vibrations when earthquake or wind acts. These excitations may cause structural collapse of the structure. Therefore to control these vibrations supplementary control devices are used. Tuned liquid column damper (TLCD) is one of a passive control device to reduce the excitations. TLCD will transfer the energy from the structure to TLCD by the motion of water in a U-shape tube like devices fitted with an orifice opening. Due to this motion the excitations will reduced. The aim of this paper is to study the effectiveness of PID control in TLCD system. The results are obtained with structure only, passive, PID controlled system. From this paper, the vibrations can be effectively suppressed with the PID controller.","PeriodicalId":320699,"journal":{"name":"2016 10th International Conference on Intelligent Systems and Control (ISCO)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114312284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new k out of n secret image sharing scheme in visual cryptography","authors":"K. Shankar, P. Eswaran","doi":"10.1109/ISCO.2016.7726969","DOIUrl":"https://doi.org/10.1109/ISCO.2016.7726969","url":null,"abstract":"Visual cryptography (VC) is a method for shielding the secret image which encodes the image into many shares and allocates them to various participants. When all shares are aligned and stacked together, they expose the secret image. In k out of n (k, n) VC scheme, the secret image is shared into n shares such that when k or more participants by amassing their transparencies by means of an overhead projector to reveals the secret image. This paper proposed a brand new of simple and robust (k, n) visual cryptography technique which is used to effectively sharing the secret image with utmost confidentiality. In share creation process, specified new condition for random matrices and then XOR operations are performed to generate the `n' transparencies. It is possible to decode the secret image visually by superimposing a k subset of transparencies. Nevertheless no secret data can be acquired from the superposition of an illegal subset. Experiments, statistical and security assessments are carried out on the shares to validate the strength of the proposed scheme by means of a sequence of investigations such as visual testing, encryption quality testing, security analysis and different attacks. The proposed (k, n) VC scheme offers a consistent protection for communicating images over the public channels.","PeriodicalId":320699,"journal":{"name":"2016 10th International Conference on Intelligent Systems and Control (ISCO)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114481306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design implementation of UART and SPI in single FGPA","authors":"M. Poorani, R. Kurunjimalar","doi":"10.1109/ISCO.2016.7726983","DOIUrl":"https://doi.org/10.1109/ISCO.2016.7726983","url":null,"abstract":"The UART(Universal Asynchronous Receiver and transmitter) controller is the key component of the serial communications subsystem of a computer. The UART takes bytes of data and transmits the individual bits in a sequential fashion. SPI is a common technology used nowadays for communication with peripheral devices where we want to transfer data speedily and with in real time constraints. In the existing work data acquisition system for underground has been designed for counters triggered by surface detectors and they have used UART and SPI protocol for the communication with dedicated processor. In this paper we have used Xilinx 12.4i and SPARTAN 3E FPGA to implement the whole system. The hyper terminal is used to check the UART protocol and 12 bit DAC MCP4922 used for check SPI protocol. The proposed work can provides both protocol effectively for the wireless serial communication. These serial protocols mainly used in Zigbee wireless technology.","PeriodicalId":320699,"journal":{"name":"2016 10th International Conference on Intelligent Systems and Control (ISCO)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116226336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}