IJEI : Volume 4 - Issue 2
|Sl. No.||Article Description||Page No.|
Audio-video Crypto Steganography using LSB substitution and advanced chaotic algorithm
Praveen. P, Arun. R
Abstract: Steganography is the technique of hiding any secret information like password, data andimage behind any cover file. This paper proposes a method which is an audio-video crypto steganography system which is the combination of audio steganography and video steganography using advanced chaotic algorithm as the secure encryption method. The aim is to hide secret information behind image and audio of video file. Since video is the application of many audio and video frames. We can select a particular frame for image hiding and audio for hiding our secret data.4LSB substitution can be used for image steganography and LSB substitution algorithm with location selection for audio steganography. Advanced chaotic algorithm can be used for encryption and decryption of data and images. Suitable parameter of security and authentication such as PSNR value, histograms are obtained at both the receiver side and transmitter sides which are found to be identical at both ends. Reversible data hiding methods for both video and audio are also being mentioned. Hence the security of the data and image can be enhanced. This method can be used in fields such as medical and defence which requires real time processing.
Enhancing Power Unbiased Cooperative Media Access Control Protocol in Manets
Mr. Gudditti.Viswanath, Mr. G.Sreenivasulu, Mr. T. Sunil Kumar Reddy
Abstract: In order enhance the network efficiency of Mobile ad hoc Networks (MANETs), an Power Unbiased Cooperative Media Access Control(PUC-MAC) protocol in MANETs was planned during this paper. It adopted the most effective partnership choice statement to select the cooperative node with higher channel condition, higher passing rate and additional balanced power consumption. Simulation results showed that PUC-MAC outperforms EC-MAC,Cooperative MAC (CoopMAC) and IEEE 802.11 Distributed Coordination perform (DCF) in terms of the packet release quantitative relation, network outturn and network lifespan beneath 2 distinct channel noise levels, particularly beneath the worst channel condition.
Refer this Research Paper(copy & paste below code)
Mr. Gudditti.Viswanath, Mr. G.Sreenivasulu, Mr. T. Sunil Kumar Reddy - Enhancing Power Unbiased Cooperative Media Access Control Protocol in Manets - published at: "International Journal of Engineering Inventions, Volume 4, Issue 2, August 2014 Edition".
Analysis of Noise Pollution on Airport Environment (Case study of International Airport of Sam Ratulangi Manado, Indonesia)
Daniel Sondakh, Maryunani, Soemarno, Budi Setiawan
Abstract: The purpose of this study is to measure and evaluate noise levels arising from operation of Sam Ratulangi International Airport of Manado to the surrounding environment, then proceed to make the imp ct restraint strategies. Environmental noise measurement method is done in accordance with the Regulation of the Environment State Minister of the Republic of Indonesia No. 48/1996 on Noise Level Treshold. By the measurement and the calculation of the level of noise during the night (LDAY-NIGHT) at the locations of retrieved results: in Apron 87.4 dB (A); Koka village's 67.5 dB (A); Wusa village 73.1 dB (A); and Mapanget village 59.7 dB (A), which means all of the location occurs lending in excess of a threshold noise levels according to the threshold of noise Standards for residential areas is 55 dB (A), and the airport of 75 dB (A). While based on the perception of the people who live around the airport which is located in the village of Koka, Wusa and Mapanget about noise obtained information changes on the health of the body such as insomnia (58%), hearing loss (18%), declining environmental quality (13%) and disturbance on communication (11%), which means there is the influence of impact noise that occurs on the physical health of people living around the airport. Restraint and handling of the problem of noise at the airport can be arranged through Noise restraint at the source; Noise restraint on the transmission path; and Noise restraint on humans.
Keywords: Airport Environment Noise Pollution, Level of Noise Equivalent, Noise Level Treshold, Noise restraint at the source; Noise restraint on the transmission path; and Noise restraint on humans.
Refer this Research Paper(copy & paste below code)
Daniel Sondakh, Maryunani, Soemarno, Budi Setiawan - Analysis of Noise Pollution on Airport Environment (Case study of International Airport of Sam Ratulangi Manado, Indonesia) - published at: "International Journal of Engineering Inventions, Volume 4, Issue 2, August 2014 Edition".
Study and Fabrication of Thermoelectric Air Cooling and Heating System
Prof. N. B. Totala, Prof. V. P. Desai, Rahul K. N. Singh, Debarshi Gangopadhyay, Mohd. Salman Mohd. Yaqub, Nikhil Sharad Jane
Abstract: In present scenario, HVAC system (commonly used in the air conditioners) is very efficient and reliable but it has some demerits. It has been observed during the last two decades that the O3 layer is slowly destroyed because of the refrigerant (CFC and HFC) used for the refrigeration and air- conditioning purposes. The common refrigerant used is HFC's which are leaked and slowly ascend into the atmosphere. When they reach to O3 layer they act on O3 molecules and the layer of O3 is destroyed. A single molecule of HFC can destroy thousands of O3 molecules and that's why it has created a threat for the not only to maintain earth eco system stable but also to existence of earth. Even the percentage of HFCs are emitted into the atmosphere compared to CO2 is negligible but its global warming effect is few thousand times of CO2. The effect of 100 gm of HFC can destroy 0.5 tons of O3 molecules. These HFCs once destroy O3 layer; it takes hundreds of years to recover its thickness as it is formed by complex reactions. This is because as HFCs comes in environment, they remain in atmosphere for 18 years. The capacity of HFCs to increase in earth temperature 10% is contributed by HFC's only. That leads to the emergence of finding an alternative of the conventional HVAC system, i.e. thermo-electric cooling and heating system.
Keywords: Peltier effect, Thermoelectric module, Cooling load, Thermal resistance, COP.
Refer this Research Paper(copy & paste below code)
Prof. N. B. Totala, Prof. V. P. Desai, Rahul K. N. Singh, Debarshi Gangopadhyay, Mohd. Salman Mohd. Yaqub, Nikhil Sharad Jane - Study and Fabrication of Thermoelectric Air Cooling and Heating System - published at: "International Journal of Engineering Inventions, Volume 4, Issue 2, August 2014 Edition".
Quality study of cooked and dried barley semolina
A. El Yamlahi, R. Salghi, M. Ouhssine
Abstract:The quality of cooked and dried barley semolina (BS) has been studied. The conducted experiment reproduced four modes of preparing BS (spices, cumin, caraway and vegetables) usually consumed in Morocco. These preparations were divided into two lots that have been cooked in boiling water "Belboula" and steam "Couscous". All have been dried at 85 ° C for 1 hour 30 to 2 hours to decrease the moisture content to 12.5%. The finished products have been subsequently packaged, stored at room temperature and submitted to physico-chemical, technological and microbiological analysis. An increase in ash and decrease in carbohydrate contents have been observed, particularly for belboula. The cooking steam has preserved the granular aspect of BS. Cooked in boiling water, BS particles have taken the form of flat flakes. The bulk density (g/cm3), optimum cooking time (min) and swelling index were found to be 0.59, 13.67, 2.04 for couscous and 0.35, 12.33 and 1.86 for belboula. Regarding microbiological analysis, the experimental outcome showed good hygienic quality. Also, statistical analysis showed that the effect of cooking method was very highly significant (α = 0.01%) on the bulk density, the swelling index and the particle size.
Keywords: barley, semolina, couscous, cooking, quality.
Simulation Study of Video Streaming in Multi-Hop Network
C. Vijesh Joe, S. Shinly Swarna Sugi
Abstract: The main problem is to avoid the complexity of retrieving the video content without streaming problem in multi network clients. The proposed work is to improve Collaboration among streaming contents on server resources in order to improve the network performance. Implementing network collaboration on a content delivery scenario, with a strong reduction of data transferred via servers. Audio and video files are transmitted in blocks to clients through the peer using the Network Coding Equivalent Content Distribution scheme. The objective of the system is to tolerate out-of-order arrival of blocks in the stream and is resilient to transmission losses of an arbitrary number of intermediate blocks, without affecting the verifiability of remaining blocks in the stream. To formulate the joint rate control and packet scheduling problem as an integer program where the objective is to minimize a cost function of the expected video distortion. Suggestions of cost functions are proposed in order to provide service differentiation and address fairness among users.
Keywords: Datagram Congestion Control Protocol (DCCP), Video Streaming, Packet Traces.
Internet Security Agent
Inas Ismael Imran
Abstract: Security has been identified as the major concern for the agent paradigm for two reasons. First, foreign code that executes on a site shares that site's services and resources with local processes and other agents. Services can include electronic commerce utilities. Resources include the file system, the GUI and the network server, as well as memory and CPU. It is difficult for a site to ensure that no agent can steal information or corrupt another agent or shared resource. The second security problem is that the agent itself can be circumvented by a malicious site which may steal or corrupt agent data or simply destroy the agent. To solve this problems we build a mini–password manager using a code in language Java. Then we incorporate the mini–password manager into the simple web server to authenticate users that would like to download documents and resources. The goal of this paper is to accentuate the positive aspects that agents bring to Internet security.