Refine your search
Collections
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Kaur, Supreet
- Different Design Approaches for the Optimization of FIR Filter Coefficients
Abstract Views :116 |
PDF Views:2
Authors
Affiliations
1 Electronics and Communication Engineering Department, Guru Nanak Dev University, Regional Campus, Jalandhar, IN
1 Electronics and Communication Engineering Department, Guru Nanak Dev University, Regional Campus, Jalandhar, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 17, No 1 (2016), Pagination: 229-235Abstract
A digital filter is a system that uses discrete time signal as input and produce a discrete time output signal for the purpose of achieving a filter objective. Parks-McClellan method provides optimum equiripple approximation to the desired frequency response and has become the dominant method for optimum design of FIR filters. The filter design process can be described as an optimization problem where each requirement contributes with the term to an error function which should be minimized. This paper deals with the various optimization methods and approaches applied for linear phase FIR filtering. A brief performance comparison of these techniques is also performed.Keywords
Optimization, Particle Swarm Optimization (PSO), Real Genetic Algorithm (RGA), Cat Swarm Optimization (CSO), Steepest Descent Optimization Algorithm, Differential Evolution Algorithm (DE).- Analysis of Different Techniques for Segmentation of Connected Handwritten Indian Scripts Words
Abstract Views :111 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science, Punjabi University, Patiala, IN
1 Department of Computer Science, Punjabi University, Patiala, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 4 (2011), Pagination: 373-381Abstract
In OCR processing text is extracted from an image. Here many common imperfections occur, like the characters that are connected together are returned as a single sub-image containing both characters. So this is the major challenge in the recognition process and we need to segment the connected words to get correct results. In segmentation process the first task is to find out the segmentation point. Once this is done the next step is to fragment the image from that point and get two separate sub-images for each character. There are many algorithms proposed for this process. One class of approaches uses the straight segmentation technique and segments the words based on the vertical and horizontal histogram profiles. Another approach uses contour features of the component for segmentation. Some researchers segments the characters by recognizing the profile features of touching character and the segmenting them. This technique is commonly known as recognition based segmentation or cut classification.- Cost Based Energy Efficient Routing Protocol for Wireless Body Area Networks
Abstract Views :181 |
PDF Views:3
Authors
Ramneet Kaur
1,
Supreet Kaur
1
Affiliations
1 Department of Computer Engineering, Punjabi University, Patiala, IN
1 Department of Computer Engineering, Punjabi University, Patiala, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 22 (2016), Pagination: 23-30Abstract
In this paper, the cost based energy efficient routing protocol is proposed for the Wireless Body Area Networks (WBANs). The major aim is to improve the lifetime network of the sink node. We propose a high throughput, path loss, residual energy, data send to sink and data received at sink routing protocol for (WBANs). The Cost function defined in this approach which is responsible to decided which node forward the data to the sink node. Cost function selects the node which has minimum threshold energy node which sends the data. Simulation outcomes show that proposed protocol raises the network stability amount and keep alive for longer amount.Keywords
WBANs (Wireless Body Area Networks), Threshold, Cost Function, Path Loss, No of Dead Nodes.- Logo Image Based Approach for Phishing Detection
Abstract Views :167 |
PDF Views:0
Authors
Affiliations
1 Computer Science Engineering, PURCITM, Mohali, IN
1 Computer Science Engineering, PURCITM, Mohali, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 22 (2016), Pagination: 43-48Abstract
Phishing is a cyber attack which involves a fake website mimicking the some real legitimate website. The website makes the user believe the website being authentic and thus online user provides their sensitive information like password, PIN, Social Security Number, and Credit Card Information etc. Due to involvement of such high sensitivity information, these websites are a huge threat to online users and detection and blocking of such website become crucial. In this thesis, we propose a new phishing detection method to protect the internet users from such attacks. In particular, given a website, our proposed method will be able to detect between a phishing website and a legitimate website just by the screenshot of the logo image of it. Due to the usage of screenshot for extracting the logo, any hidden logo will not be able to spoof the algorithm into considering the website as phishing as happened in existing methods. In first study focus was on dataset gathering and then the logo image is extracted. This logo image is uploaded to Google image search engine using automated script which returns the URLs associated with that image. Since the relationship between logo and domain name is exclusive it is reasonable to treat the logo image as identity of original URL. Hence the phishing website will not have the same relation to the logo image as such and will not get returned as URL by Google when search for that logo image. Further, Alexa page rank is also used to strengthen the detection accuracy.Keywords
Anti-Phishing, Website Logo, Google Image Search.- A Review:Biometric Security Mechanism in E-Commerce
Abstract Views :102 |
PDF Views:8
Authors
Sumit Bansal
1,
Supreet Kaur
2
Affiliations
1 Computer Engineering Deptt., Punjabi University, Patiala-147002, IN
2 Punjabi University, Patiala-147002, IN
1 Computer Engineering Deptt., Punjabi University, Patiala-147002, IN
2 Punjabi University, Patiala-147002, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 22 (2016), Pagination: 407-413Abstract
Internet is an amazing tool and it has changed the lifestyle of the people considerably. It is the ease of use, efficiency and time factor, which have contributed to the growth and popularity of E-commerce [1]. Some of the issues that are occurred during payment are speed, time, durability, security etc. In these days, online transactions using internet enabled mobile phone, Tablets and Laptops has been widely used. Debit/ Credit Cards are used for payment for online business or E-payments and online banking is also practically used. As the technology is rising day-by-day misuse of this technology has increased. Cards frauds like using phone calls, phishing attack, card cloning, hacking the internet enabled devices [2]. Due to these type of problems in the E-commerce, biometric system can be used. Biometric have proved to be good security mechanism and has been implemented in some areas. This review paper reviews use of biometric system to reduce these types of the unauthorized accesses and misuse of information. Various techniques used by researchers include biometric models, PIN, Password can be used to overcome the problem. An increasing number of people are overwhelmed by the efficiency and convenience of internet for making web-based transactions globally, as it is the technology of the 21st century [3].Keywords
E-Commerce, CIA, Fingerprint, PIN, Password, Face Recognition, Cryptography, Authentication.- Biometric Security with Password for Web Based Architecture
Abstract Views :183 |
PDF Views:0
Authors
Sumit Bansal
1,
Supreet Kaur
1
Affiliations
1 Deptt. of Computer Engineering, Punjabi University, Patiala, 147002, IN
1 Deptt. of Computer Engineering, Punjabi University, Patiala, 147002, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 26 (2017), Pagination: 67-75Abstract
Commercial web sites and web services uses internet and its services to reach the user or consumer. Current state of art technology, even though quite sophisticated, has certain security flaws due to which users tend to doubt the use of internet services. Some of the issues that occur are security, confidentiality, Authentication and cyber threats etc. To overcome these problems, two level of protection is provided by using biometric and password [1]. In this research paper, biometric is used along with password merged in a template which provides two level security. Keeping in account the future usage of template on the internet, RSA encryption is applied on the template itself.Keywords
Password, OTP, Finger Print Recognition, Encryption, Fingerprint Matching, Merging.References
- International Journal of Innovative Research in Computer and Communication Engineering (An ISO 3297: 2007 Certified Organization) Vol. 4, Issue 3, March 2016, “Secured Internet Banking Using Fingerprint Authentication” Priyanka Mahajan1, Prof. B. Mahalakshmi5, Pune, Savitribai Phule Pune University, Pune, India.
- “A Practical Guide to Biometric Security Technology” Simon Liu and Mark Silverman, 1520-9202/01/$10.00 © 2001 IEEE.
- Verginia Espinosa, “Minutiae detection algorithm for fingerprint recognition”, IEEE AESS Systems Magazine, 2002.
- Abinandhan Chandrasekaran and Dr.Bhavani Thuraisingham,”Fingerprint Matching Algorithm Based on Tree Comparison using Ratios of Relational Distances”,Second International Conference on Availability, Reliability and Security.
- Catalin LUPU, Vasile-Gheorghita GAITAN and Valeriu LUPU, “Security enhancement of internet banking applications by using multimodal biometrics”, IEEE 13th International Symposium on Machine Intelligence and Informatics, January 2015.
- Hossein Jadidoleslamy, “Designing A Novel Approach for Fingerprint Biometric Detection: Based on Minutiae Extraction”, International Journal on Bioinformatics & Biosciences (IJBB) Vol.2, No.4, December 2012.
- Aliaa A.A. Youssif, Morshed U. Chowdhury, Sid Ray and Howida Youssry Nafaa, “Fingerprint Recognition System Using Hybrid Matching Techniques”, 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2012).
- Shashi Kumar D R, Kiran Kumar K, K B Raja, R. K Chhotaray, Sabyasachi Pattnaik, “Hybrid Fingerprint Matching using Block Filter and Strength Factors”, 2010 Second International Conference on Computer Engineering and Applications.
- Om Preeti Chaurasia, “An Approach to Fingerprint Image PreProcessing”, I.J. Image, Graphics and Signal Processing, 2012, 6, 29-35, Published Online July 2012 in MECS DOI:10.5815/ijigsp.2012.06.05.
- Bellamkonda sivaiah, Kotha Hari Chandana, “An Efficient Approach for Fingerprint Recognition by Matching Minutiae Pairings”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 2, February 2015, ISSN:2277 128X.
- Ankita Mehta,“Design & Implementation of Features based Fingerprint Image Matching System”, International Journal of Multidisciplinary and Current Research, Accepted 15 Dec 2014, Available online,20,Dec2014,Vol.2,Nov/Dec2014issue.