B.Prabhavathi, AVR&SVR College of Engg.& Tech., Dept .of CSE, Nandyal, Kurnool(Dt.), A.P.
P.D.Chidhambara Rao, SKTRM College of Engg. & Technology, Dept .of CSE, Kondair, A.P.
P.Raja Sekhar, SVPCET, Dept .of CSE, R.V.S.Nagar, Puttur, Chittur(Dt.), A.P.
Ishrath Jahan, College for Charted Accounts, Dept. of CSE , Vijayawada, A.P.
G.Murali Mohan, SVPCET, Dept .of CSE, R.V.S.Nagar, Puttur, Chittur(Dt.), A.P.
Abstract—Efficient multimedia encryption algorithms play a key role in multimedia security protection. We introducing multiple Huffman Tables (MHT), which performs both compression and encryption by using multiple statistical models (i.e. Huffman coding tables) in the entropy encoder and multiple Huffman tables are kept secret. A known-plaintext attack is presented to show that the MHTs used for encryption should be carefully selected to avoid the weak keys problem. We then propose chosen-plaintext attacks on the basic MHT algorithm as well as the advanced scheme with random bit insertion. In addition, we suggest two empirical criteria for Huffman table selection, based on which we can simplify the stream cipher integrated scheme, while ensuring a high level of security.
Keywords : Cryptanalysis; Encryption; Entropy encoding; Multiple Huffman Tables (MHT); Selective Encryption.
G.V.SURESH, Shabbeer Shaik, O.Srinivasa Reddy, B. Munibhadrayya
Abstract— Data mining has emerged to be a very important research area that helps organizations make good use of the tremendous amount of data they have. In this data uncertainty is common in real-world applications due to various causes, including imprecise measurement, network latency, out-dated sources and sampling errors. These kinds of uncertainty have to be handled cautiously, or else the mining results could be unreliable or even wrong. We propose that when data mining is performed on uncertain data, uncertainty has to be considered in order to obtain high quality data mining results. In this paper we explores a fuzzy neural network for classification of uncertain data and suggests how uncertainty can be incorporated in data mining and how to handle data uncertainty in data mining by using a Fuzzy neural network.
Keywords : Neural networks; Fuzzy logic; data classification; uncertain data; fuzzy neural network.
Zied TRIFA, Mohamed LABIDI, Maher KHEMAKHEM
Department of Computer Science, University of Sfax, MIRACL Lab, Sfax, Tunsia.
Abstract—Distributed computing is the method of splitting a large problem into smaller pieces and allocating the workload among many computers. These individual computers process their portions of the problem, and the results are combined together to form a solution for the original problem. At present, Distributed computing systems can be broadly classified into two methods, namely Grid computing and Volunteer computing. In this paper, we are interested by the distribution of the Arabic OCR (Optical Character Recognition) based on the DTW (Dynamic Time Warping) algorithm on the distributed computing systems such as Scientific Research Tunisian Grid (SRTG) and Berkeley Open Infrastructure for Network Computing (BOINC), and we present the performance analysis of an experimental study of our distribution in order, to prove again that such systems provides very interesting and promising infrastructures to speed up, at will, several greedy algorithms or applications, especially, the Arabic OCR based on the DTW algorithm.
Keywords- Grid Computing; Volunteer Computing; Arabic OCR; DTW algorithm; SRTG; BOINC.
Ravindra Babu Kallam, Vivekananda Institute of Technology and Science SET, Karimnagar, A.P, India.
S.Udaya Kumar, Principal MVSR Engineering College, Hyderabad, Andhra Pradesh, India.
A.Vinaya babu, Admissions, JNTUH, Hyderabad,A.P, India.
Shravan kumar, Aizza college of Engineering and Technology,Mancherial,A.P, India
Abstract— in this paper we describe the importance of cryptography with its substitution techniques. Our main focus is on poly alphabetic cipher, discuss about its merits and demerits. We have proposed and implemented a comprehensive Vigenare square appropriate for encryption and decryption of all the alphanumeric characters, symbols on the keyboard and e.t.c. We have explained
the algorithm with suitable example and have proven that it can encrypt or decrypt any kind of text. Finally we have concluded that it is cryptographically stronger as comparing with previous poly alphabetic cipher.
Keywords- Algorithm; Security; Cipher; Modern Vigenere Cipher; Substitution; Cryptography; Polyalphabetic.
Sourabh Rungta, Computer Science Department, RCET, Bhilai, India.
Kshitij Verma, ICT Department, ABV-IIITM, Gwalior, India.
Neeta Tripathi, Electronics Deptt., SSITM, Bhilai,India.
Anupam Shukla, ICT Deptt, ABV-IIITM, Gwalior,India.
Abstract—This paper introduces the performance and technical features of the new generation international video coding standard H.264 as well as discusses the implementation and optimization of H.264 on mobile device. Optimization is proposed at algorithm/code-level for both encoder and decoder to make it feasible to perform real-time H.264/AVC video encoding/decoding on mobile device for mobile multimedia applications. For encoder an improved motion estimation algorithm based on hexagonal pattern search is proposed exploiting the temporal redundancy of a video sequence. For decoder, at code level memory access minimization scheme is proposed and at algorithm level a fast interpolation scheme is proposed. The experimental result shows that we have reduced the complexity of H.264 video encoder/decoder up to 60% as compared to the reference software JM10.0.
Keywords- Component H.264; Mobile Multimedia Applications; Video encoding.
Munisha Kaushal, Rakshpal Singh Dehal, Amrit kaur
Department of Electronics and Communication Engg., University college of Engineering, Punjabi University, Patiala, India.
Zumita Kaushal, Department of Computer Science & Engg., Ambala college of Engineering, Kurukeshtra University, Ambala, India.
Abstract— The face of science and engineering has been changing with the recent growth in computer architecture. This growth is so important and robust that it is dramatically reshaping relationships among people and organizations and providing a foundation for understanding and learning of intelligent behavior in living and engineered systems. Is this growth beneficial to our society, these are such questions of the general public which are due to the lack of education concerning rapidly advancing technologies. This paper attempts to present an overview of Artificial Intelligence (AI). A generally accepted theory that ―machine will do and think like humans more in the future‖ is the concept behind AI. Brief literature of different aspects by which AI is achieved like expert system, knowledge based systems (knowledge engineering), neural networks, fuzzy logic, Neuro-fuzzy logic and fuzzy expert system, is included in order to have a clear understanding of AI. Along with this the different applications of AI, has been included in this paper. It is concluded that extensive ongoing research in the field of AI gives an idea that in near future a day will
come when human beings and machines will merge into cyborgs or cybernetic organisms that are more capable and powerful than either. This idea is called transhumanism.
Keywords- Artificial Intelligence; Expert System; Neural Network; Fuzzy Logic; Neuro-fuzzy logic.
Abdelali EL BOUCHTI, Said EL KAFHALI, Abdelkrim HAQIQ
Computer, Networks, Mobility and modelling laboratory, e-NGN research group, Africa and Middle East, FST, Hassan 1st University, Settat, Morocco.
Abstract—This paper presents a problem of queuing theoretic performance modeling and analysis of Orthogonal Frequency Division Multiple Access (OFDMA) under broad-band wireless networks. We consider a single-cell WiMAX environment in which the base station allocates sub channels to the subscriber stations in its coverage area. The sub channels allocated to a subscriber station are shared by multiple connections at that subscriber station. To ensure the Quality of Service (QoS) performances, two Connection Admission Control (CAC) schemes, namely, threshold-based and queue-aware CAC schemes are considered at a subscriber station. A queuing analytical framework for these admission control schemes is presented considering OFDMA-based transmission at the physical layer. Then, based on the queuing model, both the connection-level and the packetlevel performances are studied and compared with their analogues in the case without CAC. The connection arrival is modeled by a Poisson process and the packet arrival for a connection by a Markov Modulated Poisson Process (MMPP). We determine analytically and numerically different performance parameters, such as connection blocking probability, average number of ongoing connections, average queue length, packet dropping probability, queue throughput and average packet delay.
Keywords-Worldwide Interoperability for Microwave Access (WiMAX); Connection Admission Control; Orthogonal Frequency Division Multiple Access; Markov Modulated Poisson Process; Queuing Theory; Quality of Service; Performance Parameters.
B. I. Ahmad, Department of Mathematics, Ahmadu Bello University, Zaria. Kaduna, Nigeria.
F. Yakubu, Iya Abubakar Computer Center, Ahmadu Bello University, Zaria. Kaduna, Nigeria.
M. A. Bagiwa, Department of Mathematics, Ahmadu Bello University, Zaria. Kaduna, Nigeria.
U. I. Abdullahi, Department of Mathematics, Ahmadu Bello University, Zaria. Kaduna, Nigeria.
Abstract—Remote home management is one of the developing areas in current technology. In this paper we described how to manage and control home appliances using mobile phone, people can use this system to do things in their home from a far place before they reach home. For instance, user may start his/her room cooler or heater so that before they reach home the condition in the room will be conducive, also appliances like washing machine and cooker can be started and if the time taken for this appliances to perform a task is known that can also be set, so that if the time elapsed the appliance will automatically switch off itself. To control an appliance the user sends a command in form of SMS from his/her mobile phone to a computer which is connected to the appliance, once the message is received the computer will send the command to a microcontroller for controlling the appliance appropriately.
Keywords- Remote control; home appliances; J2ME; mobile phone; SMS; GSM; GAMMU; DTMF.
A. Joseph Raphael, Ibra College of Technology, Sultanate of Oman
V. Sundaram, Department of Computer Applications, Karpagam College of Engineering, Coimbatore, India.
Abstract – Techniques for information hiding are becoming increasingly more sophisticated and widespread. This paper proposes a new alternative method for secured communication to protect digital data from tampering by combining the techniques of cryptography and steganography. Message to be sent is transformed into encrypted form using Unicode symbols and hidden in an image carrier without disturbing its bits. On the other end, extraction algorithm is designed in such a way that the process separates the message and image into two different entities; then reads the extracted message which is in the encrypted form and transforms it from the Unicode symbols to a readable form. The method is defined as undetectable, strong and secured communication of data related to the multimedia image. Thus any confidential message can be send to any target without the knowledge of others through an unsecured communication channel. This encoding and decoding scheme of the proposed new method is significantly different as compared to the traditional schemes.
Keywords: Cipher; Crypto-Stegano object; Unicode Value; Unicode Symbol.
Eva Cipi, Computer Science Department, University of Vlora, Vlora, Albania.
Betim Cico, Informatics Engineering Department, Polytechnic Tirana University, Tirana, Albania.
Abstract— This work is focused on modeling an intelligent system agent based in dynamic environment. The model we propose is a software system in which an agent interacts in a dynamic, adaptive and evolving way. This computational approach allows us to overcome some difficulties that are present when we want to consider our system as an intelligent decision maker; in this way we are able to study different types of agent environments, and interpret them in the relevant effective simulation. Consequently we can observe how different situations of agent conditioned by environmental dynamism may lead the system to different behaviors. In particular, we are interested on studying the environment – agent interaction. For this purpose, we simulate both static and dynamic environment, to show the different behaviors of agent in the given cases for a larger base of discussion about the level of intelligence.
Keywords- agent; environment; dynamic; planning off-line; planning online; agent architecture.