Watermarking aims at protecting a digital content from unauthorized
redistribution and copying by enabling ownership provability over the content. The goal of
digital watermarking is to insert a robust watermark into the digital content such that the mark
does not destroy the value of the content, and the mark is hard to be removed by adversaries
without destroying the utility of content. The measurement of the value of the content is
closely related to the data type and its intended use. We have proposed a new marking
scheme called as watermarking. Watermarking scheme first generates the bit string of fixed
length. The mark bit is computed with the help of watermark bit and mask bit, which is used
to mark the certain bit location of the attribute value. We have tested the algorithms for
insertion and detection of watermark as well as of watermark on real life Forest Cover Type
dataset, available from the University of California
(http://www.kdd.ics.uci.edu/databases/covertype/covertype.html) and we got the promising
results. It is observed that watermarking scheme is more robust against various forms of
attacks and updates to the data. Also watermarking is more imperceptible that is errors
introduced by it in the data after marking are less as compared to watermarking scheme. Our
extensive analysis shows that the proposed technique is robust against various forms of
malicious attacks and updates to the data.
As touch-screen mobile phones pour into the market, demands for reusing existing
mobile applications by adding a touch-screen UI are increasing. Previous on-screen keyboard
generation methods generate fixed keyboard layout that include every key defined by a
system, resulting in smaller and inconvenient keys. However, this method diminishes the
efficiency of touch-screens because a fixed- layout is applied to every application even
though different keys are used for different UI states of an application. This study proposes a
method that investigates the type of keys used in an application during run-time using the
probe key and dynamically configures the layout of screen keyboards.
It is well-known that cloud computing has many potential advantages and many
enterprise applications and data are migrating to public or hybrid cloud. But regarding some
business-critical applications, the organizations, especially large enterprises, still wouldn’t
move them to cloud. The market size the cloud computing shared is still far behind the one
expected. From the consumers’ perspective, cloud computing security concerns, especially
data security and privacy protection issues, remain the primary inhibitor for adoption of cloud
computing services. This paper provides a concise but all-round analysis on data security and
privacy protection issues associated with cloud computing across all stages of data life cycle.
Then this paper discusses some current solutions. Finally, this paper describes future research
work about data security and privacy protection issues in cloud.
Manual voting system has been deployed for many years in our country. However
in many parts of our country people cannot attend the voting because of several reasons. To
illustrate, sometimes people may not be in their own registration region and due to this fact
they cannot fulfill their voting duties. In order to solve these problems there is a need of
online election voting system in addition to manual voting system. After registering to
system, the voters will use their votes at any field areas by using the system if they prefer
online voting. The integrity of an election process will determine the integrity of democracy
itself. So the election system must be secure and robust against a variety of fraudulent
behaviors, should be transparent and comprehensible that voters and candidates can accept
the results of an election.
Spectrum sensing is a basic operation of cognitive radio to find the underutilized
spectrum. Energy detector is a popular sensing method because it doesn’t require transmitted
signal properties. This paper presents the energy detection of signals over fading channels.
Summarizes the performance result of energy detector over additive white Gaussian noise
(AWGN), Rayleigh channel evaluated from the probability of missed detection over
probability of false alarm by complementary receiver operating characteristics (ROC) curves.
And observed, missed detection decreases as the signal to noise ratio increases.
Web accessibility means that people with and without disabilities can use the web.
We aim to provide web accessibility through web template that supports speech recognition
and can be used for designing static website. The web template will be designed using
guidelines of Web Accessibility Initiative (WAI). The websites created using this template
will be accessed by normal as well as physically handicapped people and people with low
vision. Moreover, we are providing text magnification functionality for low vision people.
Through this we aim to provide equal access of information to all users.
Vaibhav D. Pawar, Bhushan P. Kulkarni, Vipin K. Tripathi
To meet today’s vehicle requirements and to improve cost and fuel efficiency,
there is an increasing interest in designing light weight and cost effective vehicle component.
This paper presents the optimization of Trailing Arm Suspension of BAJA vehicle, which is
manufactured by students of college of engineering, pune. In our research work we have
selected Trailing Arm Suspension of size 40X80X2 mm which was used in the BAJA 2013
vehicle. The CAD model of Trailing Arm is made in PRO-E software. Then FEA and
topology optimization of given model is done in Hyper-mesh using RADIOS and
OPTISTRUCT solver respectively. New model obtained from optimization, in which weight
reduction achieved was 9.70% compared to previous model. The displacement and stress
increased, but they were within acceptable limits.
Rushikesh S. Gite, Suhas V. Gawli, Swapnil S. Gawde, Ashok V. Bhoge
Bone mineral density generally correlates with bone strength .BMD testing is used
to asses bone density and diagnose osteoporosis. The HU scale is a linear transformation of
the original linear attenuation coefficient measurement in to one in which the radiodensity of
distilled water at standard pressure and temperature is defined as Zero Hounsfield Unit while
the radiodensity of air at STP is defined -1000HU .The correlation between CT number and
mechanical property estimated from cortical bone were found to be low (r2<0.2 )and
cancellous bone were found to be higher(r2>0.6). The specific relationship depending on the
types of bone ,that predict elastic module from density and CT numbers were suggested for
human cortical and cancellous bone .CT number or HU measures X-ray linear attenuation of
tissue inside the voxel.
Energy as become our routine process in our lifestyle for every work to be done. In
this paper we have discussed that how energy audit will help us to save energy in our electric
bill with an analysis of a residential house. Nowadays saving energy has become an essential
criteria rather than generation, we may find plenty ways for generation but we should also
concentrate on consuming it also in a proper and appropriate manner. As a part of our IET
Vision 10MW, initial work is started in this paper to conduct electrical energy audit for a
double bedroom house in Chennai. The proposed procedure is adapted to conduct the
electrical energy audit with suitable recommendation. After the critical analysis several
suitable recommendations is suggested for the house to implement with and without
investment including incorporating renewable power generation. The breakeven chart is
presented to check the effectiveness of the recommendation. In future our team are planning
for a big project that will cover 25 homes, 10 commercial buildings and 2 industries.
Jyoti Darekar, Prof. V. G. Raut, Prof. Harjeet Kaur
The LMS algorithm is used for the filter coefficient adjustment, which uses only current residual values and the numberof registers are evidently reduced and convergence speed is also much improved compared to existing methods by using FPGAfor FIR filter Structure. Most of digital signal processing (DSP) algorithm requires many multiplications. Many multipliers inhardware implementation will decrease the speed of operation, use more area for VLSI design, and also consume more powerconsumption. An implementation of least mean squared (LMS) adaptive filter using distributed arithmetic (DA) for filtercoefficient adjustment. Distributed arithmetic (DA) is a famous technique for hardware implementation of DSP algorithmwithout any multipliers. Coefficient-distributive DA is used instead of conventional DA because filter coefficient are varied bytime hence adder network and multiplexer structure is used in coefficient distributive DA. So the proposed LMS adaptive filterwill be miltiplierless and without lookup table. It includes for the application of echo cancellation in future and for improvethespeed.
Based on wavelet decomposition theory, an image source can be decomposed into different weight levels. Then, the bit streams with different weight are modulated by FH-OFDM system, which can give low frequency bits more protection with the help of hop frequency graphics design in FH_OFDM. A joint system combined with source coding and adaptive modulation method is studied to give the image bit streams with different subcarriers, which eliminates ISI in low frequency streams more effectively. Therefore, a better reconstruction image can be obtained at receiver. Simulation results indicate that the scheme withjoint source coding and adaptive modulation method can outperform the system without adaptive modulation in image quality.
Copying code fragments and then reuse by pasting with or without minor modifications or adaptations are common activities in software development. This type of reuse approach of existing code is called code cloning and the pasted code fragment (with or without modifications) is called a clone of the original . The area of clone detection (i.e., searching for duplicate fragments of source code) has received wide interest recently as indicated by numerous efforts in clone detection tool development . A clone detector must try to find pieces of code of high similarity in a system's source text. The main problem isthat it is not known beforehand which code fragments may be repeated. Thus the detector really should compare every possible fragment with every other possible fragment. Such a comparison is prohibitively expensive from a computational point of viewandthus, several measures are used to reduce the domain of comparison before performing the actual comparisons. Even after identifying potentially cloned fragments, further analysis and tool support may be required to identify the actual clones .
Pankaj Srivastava, Gagan Kant Tripathi,Neeraj K. Jaiswal
First-principles calculations within the local spin-density approximation have been used to investigate the electronic properties of chlorine adsorbed armchair born nitride nanoribbons (aBNNRs). The sensing was investigating by band structure. Boron nitride nanoribbons are randomly arrangement of the adsorption of chlorine one edge or both edge the comparing results ofbare boron nitride nanoribbons. It is revealed that presence of chlorine has a profound effect on the electronic properties of aBNNRs. BaresaBNNRs are non magnetic semiconductor in natures whereas chlorine adsorption turns them semiconductingirrespective of adsorption site. Further, the negative differential resistance (NDR) has been observed in bare ribbons which disappear upon the chlorine adsorption.