A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Krithika, S.
- Providing Security to Medical Data
Authors
1 Department of Computer Science and Engineering, Kumaraguru College of Technology, Coimbatore, IN
Source
Wireless Communication, Vol 8, No 2 (2016), Pagination: 86-89Abstract
Wireless Medical Sensor Network (WMSN) is used in healthcare applications which have the collection of sensors connected to body or emergency care unit to monitor the patients’ vital signs. The privacy details of the patients have to be secured. Lot of techniques have been proposed to secure the health data. But there are some loop holes still exist for the attackers to hack the data. This is the major problem and to solve this issue some techniques have to be invented. In the proposed system we are comparing the four existing cryptosystems for its computation time. We choose the best one among them to encrypt the data.
Keywords
Security, Transmission of Data, Privacy.- Improved Algorithm for Quadruple Deblocking Filtering in the Removal of Block Artifact
Authors
1 Department of ECE, VCET, Madurai, Tamilnadu, IN
Source
Digital Image Processing, Vol 3, No 6 (2011), Pagination: 339-342Abstract
The recent researches showed that the existing quadruple Deblocking algorithm fails in selecting the artifact factors and increases the time computation complexity it is verified through its mode calculation in analytical approach; hence we propose a novel algorithm for selecting the block artifact and the proposed algorithm has introduced to justify the blocked pixels from the decompressed video and the blocks can be removed by involving three different stage by stage approach, which are selected through each pixel, which improves the visual perspective of the video. This innovation is achieved by considering both the luminance and chrominance data arranging in the filtering schedule. Compared to the previous woks this gives higher real-time performance requirements but also provides a good trade-off between enhancing the performance as it gives the improvement in both subjective and objective image quality. The proposed algorithm is justified in the output Video by observing the visual perspective and the processing time is been much reduced compared to the quadruple deblocking filter, this implementation is carried out using MATLAB GUIDE.Keywords
Quadruple Filtering, Trade-Off, Luminance, Chrominance, MATLAB GUIDE.- Quantum Key Distribution (QKD):A Review on Technology, Recent Developments and Future Prospects
Authors
1 Department of ECE, Kumaraguru College of Technology, Coimbatore, IN
Source
Research Journal of Engineering and Technology, Vol 8, No 3 (2017), Pagination: 291-294Abstract
Quantum Key Distribution (QKD) provides promising secure communication, the crucial need for online security in Public Key Infrastructure (PKI). QKD is mainly used for distribution of keys securely between two parties and is a commercially available application of Quantum Cryptography (QC). QKD has the ability to enable the authenticated users to detect unwanted attempts by the intruder in trying to gain knowledge of the secret key. Through the fundamental nature of quantum mechanics, in Principle QKD has the distinction of being, unshakable. Quantum cryptography harnesses the counterintuitive behavior of elementary particles such as photons and ensures the confidentiality of information transmitted between two parties. There are many QKD protocols that provide a secure key which include BB84 protocol, BB92 protocol, SARG04 protocol, E91 protocol, COW protocol, DPS protocol ect. In this review the trends and challenges in Quantum Key Distribution is discussed .Also the contribution of QKD towards network security is presented by analyzing its strengths and weakness.Keywords
Quantum Mechanics, Quantum Key Distribution, Quantum Cryptography, QKD Protocols, PKI, Network Security.References
- C. H. Bennett, “Quantum cryptography: Uncertainty in the service of Privacy”, Science, vol.257, 752-753 (1992).
- N. Lutkenhaus, “Security against eaves dropping in quantum cryptography,” Phys. Rev. A, Vol 54. (1996).
- Bennett, C. H. and Brassard, G. Quantum cryptography: public key distribution and coin tossing. In Proc. IEEE Int. Conf. Comp. Systems Signal Processing 175–179 (IEEE, 1984).
- X. B. Wang, “Beating the photon-number-splitting attack in practical quantum cryptography,” Phys. Rev. lett, Vol 94. (2005).
- Tang, Y.-L. etal. Source attack of decoy-state quantum key distribution using phase information. Phys. Rev. A 88, 022308 (2013).
- H. K. Lo, X. Ma and K. Chen, “Decoy State Quantum Key Distribution,” Phys. Rev. lett, Vol 94. (2005).
- Ma, X., Fung, C.-H. F. and Lo, H.-K. Quantum key distribution with entangled photon sources. Phys. Rev. A 76, 012307 (2007).
- Inoue, K., Waks, E. and Yamamoto, Y. Differential phase shift quantum key distribution. Phys. Rev. Lett. 89, 037902 (2002).
- Yuan, Z. L., Sharpe, A. W. and Shields, A. J. Unconditionally secure one-way quantum key distribution using decoy pulses. Appl. Phys. Lett. 90, 011118 (2007).
- Young, A., “The future of cryptography: Practice and Theory”, IEEE IT Professional Journal, 62-64 (2003).
- Buttler, W.T. et al.: “Free Space QuantumKey Distribution”, Physics Review – A, Vol.57, 2379 – 2382 (1998).
- N. Lutkenhaus, “Security against individual attacks for realistic Quantum Key Distribution”, Phys. Rev. A, Vol 61. (2000).
- K. Patel et al., “Co exsistance of high bit rate quantum key distribution and data on optical fiber.” Phys Rev, X, Vol 2 No 4 (2012).
- Tanaka, A. et al. High-speed quantum key distribution system for 1-Mbps real-time key generation. IEEE J. Quant. Electron. 48, 542–550 (2012).
- Diesel Bunk Automation with Prepaid Card
Authors
1 Department of Electronics and Communication Engineering, Sri Eshwar College of Engineering, Coimbatore, Tamil Nadu, IN
Source
Digital Signal Processing, Vol 11, No 3 (2019), Pagination: 51-54Abstract
Liquid dispensing systems are quite commonly found in our day to day life. In current days fuel stations are operated manually. The operation of fuel pumps are time consuming and require more manpower.Here we are more focused on the safety preciseness in the automation of the system. In our project we are going to automate the diesel bunk. We are going to present a modern era diesel bunk which is meant to be operated with prepaid card. We can fill the fuel for our own vehicle using prepaid card and that deduced amount information and remaining balance of the card is sent to the customer’s mobile. This not only ensures accuracy but also saves a lot of time for consumers and avoids misconceptions and arguments. Hence this project made the automated petrol bunk system with no limitation and reduced manpower.
Keywords
Manually, Prepaid Card, Automation, Mobile, Fuel Dispenser.References
- Ganeswara Madhavi and H. Raghupathi , “Automation Petrol Bunk Management Using Prepaid Smart Cards By Using Wireless Technology”, Visvesvaraya College of Engineering and Technology Patelguda, Telangana, International Journal of Advance Research in Science and Engineering,Vol.6, Issue 10, October 2017
- G. Janani,”Petrol Bunk Automation with Prepaid Card Using GSM Identification”, IJRASET, Vol.6,Issuse 02, February 2018
- Priyanka A. Gaikwad, Shubhangi S. Wanare, Pallavi S. Sonone. ”Automation in Petrol Bunk using RFID and GSM, IJRAT, Issues National Conference, 9 April 2017
- Rakesh, Veeresh Pujari, Baswaraj Gadgay,”RFID Based Prepaid Card For Petrol Station Using Web Server”, VTU Centre for PG Studies, Kalaburagi,International Research Journal of Engineering and Technology ,Volume: 05 Issue: 07, July 2018
- V. Kavitha , D .Hephzibah Rajathi , P. Jancy, M. Mahibha Kerenhap and K. Mughila,”Automation Petrol Bunk Management Using Prepaid Cards and GSM COMMUNICATION” , Kings Engineering College, Chennai,International Journal of Advanced Research Trends in Engineering and Technology (IJARTET) Vol. 3, Special Issue 19, April 2016