IJECT 8.1 Ver -1 (Jan-March 2017)

INTERNATIONAL JOURNAL OF ELECTRONICS & COMMUNICATION TECHNOLOGY (IJECT)
Vol 8 Issue 1 (Jan-March 2017)


International Journal of Electronics & Communication Technology Vol 8 Issue 1 (Jan-March 2017)
S.No. Research Topic Paper ID
01 Design of Low Power L2 Cache Using Multistep Tag Comparison Method
Abilash.V, Chidambaram.S

Abstract
Tag comparison in a highly associative cache consumes a significant portion of the cache energy. Existing methods for tag comparison reduction are based on predicting either cache hits or cache misses. In this project, we propose novel ideas for both cache hit and miss predictions. In this method, a partial tag-enhanced Bloom filter is used to improve the accuracy of the cache miss prediction method and hot/cold checks that control data liveness to reduce the tag comparisons of the cache hit prediction method. This approach combine both methods so that their order of application can be dynamically adjusted to adapt to changing cache access behavior, which further reduces tag comparisons. To overcome the common limitation of multistep tag comparison methods , a new method proposed that reduces tag comparisons while meeting the given performance bound.
Full Paper
IJECT/81/1/A-464
02 Development of Cryptographic Algorithm for Secure Communication
Sahnoaj Ahmed, Bijoy Mandal, Dr. Arindam Biswas, A. K. Bhattacharjee

Abstract
RSA algorithm uses Integer Factorization as the backbone of data security while Diffie-Hellman Algorithm uses Discrete Logarithm to provide platform for secure key exchange. In this paper, we provide algorithm to merge both of them to provide a user with even higher level of data security. Actually, our intent is to secure data of smaller as well as larger size by obtaining one randomly chosen key pair from set of RSA keys and one randomly chosen secret key using Diffie-Hellman algorithm and then applying RSA encryption to make even public components of Diffie-Hellman algorithm inaccessible for any eavesdropper freely. We design the encryption method, which uses Diffie-Hellman Secret Key in such a way that it would not only encrypt the data but also does not increase the size of it any further. On top of that, encrypted exchange of public components of Diffie-Hellman part of the system makes it hidden from all other than intended users to see Diffie-Hellman generator and prime modulus. This will make our algorithm M*N times complex to break using even the latest version of Brute Force attack, where M and N are corresponding complexities imposed by the Diffie-Hellman and RSA algorithms respectively.
Full Paper
IJECT/81/1/A-465
03 Enhanced Data Security using RSA Digital Signature with Robust Reversible Watermarking Algorithm in Cloud Environment
Monisha.M.S, Chidambaram.S

Abstract
Now a days multimedia is a fast growing technology and almost all the mobile users would need for multimedia based applications in mobile phones. In multimedia cloud due to its increasing demand, and millions of users can surfing for various purpose, therefore threat of its security is becoming a major issue. Several old security methods are suggested to secure the interaction between the mobile user and cloud environment. In traditional watermarking can cause damage to the sensitive information present in the original data. We know that the most secure web transactions today are already dependent on RSA algorithm.In our research work RSA digital signature algorithm used for encryption process. After the encryption algorithm,the scalable watermarking method is used to ensure the data integrity and confidentiality, which is a robust reversible watermarking used to watermark the encrypted sending message to enhance the data security and prevent access from the unauthorized users. In our work both RSA digital signature and robust reversible watermarking is used to protect the data in mobile application environment efficiently. Our research findings shows that the proposed method not only reaches better security performance, but also recover the original information and enhance the confidentiality purpose.
Full Paper
IJECT/81/1/A-466
04 A Multi Band Holey Based EBG Resonator Antenna for Performance Enhancement in UHF Band Frequency Range
Gaurav Jain, Nitesh Kumar

Abstract
A multi-frequency substrate integrated antenna with a large frequency difference is presented. It consists of a substrate integrated Dielectric Resonator Antenna (DRA) for low- and high-frequency radiation, respectively. The structure is a using air holes and dual substrate. Beneath the antenna substrate is a second substrate. A Multi-frequency antenna working at S band, C band and X was designed, simulated, and measured. The S-parameters, VSWR, radiation patterns, excitation power, dispersive loss of material FR4 lossy are presented for different antenna structure and above parameters are reported. The results shows that Hole based MEBG antenna has main lobe magnitude between 14.9 dBv/m to 20 dBv/m with Angular Width (3dB) range from 27.4 to 47.1 degree and SLL of range -1.4 dB to -5.4 dB and having triple band of radiation with highest band width of 1.05 GHz for MEBG design with hole based structure. The minimum return loss is obtained for proposed design th is -24.37 dB at 6.44 GHz frequency the other bandwidth supported by the proposed design is 0.19 GHz and 0.33 GHz at 1.15 GHz and 4.53 GHz frequency. From the above research we can conclude that the presence of hole on EBG antenna leads towards multiband and modified ground plane with EBG structure improve the bandwidth of antenna along with higher magnitude of main lobe at radiating frequency range.
Full Paper
IJECT/81/1/A-467
05 Survey on Internet of Vehicle -Routing Protocol & Security
Chaya. S, Dr. P.V.Y Jayasree

Abstract
The In this paper we focus on the cloud among the vehicle network. With the help of cloud, information is transferred from one vehicle to other vehicle (V2V communication). We have reviewed various research papers related to cloud and vehicle network. Therefore selecting of cluster head is an essential part in each cluster. We select the cluster header on the basis of the vehicle distance, energy, angle and bandwidth of particular cluster. Our proposed policy follows the Centralized Cloud System (CCS) to direct the vehicles in various cluster. After getting the cloud’s permission only, vehicle can transfer the data to other vehicle. This transfer may be intra cluster or inter cluster of vehicle network.
Full Paper
IJECT/81/1/A-468
06 Experimental Analysis of Kalman Filter in Speech Enhancement
Pravitha Prakash, Deepa Elizabeth George

Abstract
Speech enhancement is concerned with the processing of corrupted or noisy speech signal in order to improve the quality or intelligibility of the signal. There are so many applications of speech still to be far from reality just because of lack of efficient and reliable noise removal mechanism and preserving or improving the intelligibility for the speech signals. The aim of the speech enhancement techniques is to provide noiseless communication. To filter out the background noise from the desired speech signal several speech filtering algorithms has been introduced in last few years. In this paper Kalman Filter for speech enhancement has been proposed. The Kalman filter has been tuned to get a suitable value of Q by defining the robustness and sensitivity metrics and then applied on noisy speech signals.
Full Paper
IJECT/81/1/A-469
07 Delay Estimation of an Electromagnetic Wave Propagating Through Ionosphere Using Total Electron Content in GPS
Mahesh Babu Katta, Tejaswini Kunam, R.Priyakanth

Abstract
The most famous and known effects of space weather is fluctuation in the amplitude and phase of the radio signal that propagates in the ionosphere. This fluctuation is also known as scintillation which will intense, degrades the signal quality, reduce the information content, or cause failure of the signal reception. The analysis of fluctuation can be used to predict the behavior of ionosphere during day time. Scintillation at the ionosphere during the day time seems to be different compared to night time. So, this research mainly focuses on the effect of ionosphere corresponding to delays. The method that will be used is analyzing the GPS Ionospheric delays and TEC Monitor data obtained from International reference Ionosphere. The result will be recorded in graph and tables to see the difference of parameter values during day time and night time for a day. The finding from this research is Total Electron Content (TEC) was increasing when sun radiation increases as well as range delay increases.
Full Paper
IJECT/81/1/A-470
08 Prediction of Solar Energy Harvesting with Optimal Battery Management System of a Wireless Sensor Node
Dr. Ashok. J, Rupali H. Nangare

Abstract
The Wireless Sensor Nodes of a network have some major constraints due to their limited energy, storage capacity, computing power and frequent battery replacement factor, when they meant to collect the information from an unattended location using various sensors. Hence the proposed research implements a novel power management system by introducing pack of two solar powered batteries and an automatic battery switching system. However, they are not a reliable, consistent source of energy because of the Sun’s cycles and the ever changing weather conditions. Thus, in this paper we present a fast, efficient and reliable solar prediction algorithm, namely, Weather-Conditioned Moving Average (WCMA) that is capable of exploiting the solar energy. Which enhance the battery management system for providing total energy control for wireless node even in Hill stations, barren region, and unattended locations.
Full Paper
IJECT/81/1/A-471
09 GSM Based Smart Security Lock for Access Control Applications
Mitu Raj

Abstract
Security of electronic devices is sometimes essential to defy any unauthorised access and to make them invulnerable to external interventions. Electronic Security Systems for Access Control are a class of security systems, which serve for the aforementioned purpose. In this paper, a GSM (Global System for Mobile Communication) Based Smart Security Lock is proposed to authorise access to electronic devices. The proposed system is a security lock, installed between the power supply and the device to be secured as a password controlled switch. The device can be locked with a programmable numeric password of any desirable length up to 15. The lock is also authorised to a unique phone number. The incorporated GSM module acts as a mean for enhancing security through a real-time two-way interaction between the system and the owner via SMS (Short Message Service). The Smart Security Lock comes with an inbuilt antitampering feature. Also a feature called freeze mode has been added for emergency security and sleep mode for saving power. The proposed system intends to put forth a reliable, low cost, potent and novel security solution for access control applications.
Full Paper
IJECT/81/1/A-472
10 The Design of a Circular Microstrip Patch Antenna (CMPA) with Defected Ground Structure (DGS) for Wireless Applications
Kavitha H.D.

Abstract
In this paper, we propose a design of Circular Microstrip Patch Antenna (CMPA) with a rectangular slot as DGS. The defected ground structure concept is used to improve the bandwidth, impedance matching and the relocation of resonant frequency to make the compact CMPA. The size reduction of about 4.6% compared to the actual area required to resonate at 5.6GHz. The bandwidth 260MHz with respect to center frequency 5.595GHz which covers wireless bands such as HiperLAN/2 band. The percentage bandwidth of 4.6% and the average gain of 4.5dBi is achieved.
Full Paper
IJECT/81/1/A-473
11 Improved Noise Suppression Techniquefor Digital Hearing Aids
N. Manohar, R S Madhu

Abstract
Background noise in digital hearing aid is the most common complaint. Many efforts have been put in recent years aiming to suppress background noise effectively. Adopting wiener filter is one such method in suppressing background noise by considering both the priori and posteriori signal to noise ratio to calculate the wiener gain. This paper presents Improved Noise Suppression Technique (INST) a new method for background noise suppression. The improved noise suppression technique incorporates both the features of wiener filter based on decision directed approach and two step noise reduction technique (TSNR). Extensive MATLAB simulations, study and analysis of the results shows that Improved Noise Suppression Technique also offers good noise suppression capability.
Full Paper
IJECT/81/1/A-474
12 The Rectangular Microstrip Patch Antenna for 14GHz
Kavitha H.D.

Abstract
In this work we have designed an Antenna for 14GHz in Ku Band using Rectangular Microstrip Patch Antenna. The antenna structure resonated ku band with bandwidth 450 impedance bandwidth. The impedance bandwidth 3.28% achieved. The proposed structure is having good impedance matching. Rectangular Microstrip Patch Antenna can easily configured for most complex multiband characteristics. Antennas which can work properly in more than one frequency region either for transmitting or receiving electromagnetic (EM) waves. The proposed antenna resonated at 14GHz of ku band and we have achieved 4.06dBi of average gain.
Full Paper
IJECT/81/1/A-475
13 Automatic Floor Cleaner
Aishwarya Pardeshi, Shraddha More, Dhanashri Kadam, V.A.Patil

Abstract
With the advancement of technology, robots are getting more attention of researches to make life of mankind comfortable. This projects presents the design, development and fabrication of prototype automatic floor cleaner. This robot operates autonomous mode with additional features like dirt container with air vacuum mechanism and pick and place mechanism. This work is very useful in improving life style of mankind.
Full Paper
IJECT/81/1/A-476
14 PAPR Reduction for MU-OFDM Systems
Reena Chackochan, Praveena N., Sheetal B.

Abstract
Multiuser Orthogonal Frequency Division Multiplexing(MUOFDM) has attracted much attention as the fourth generation\ mobile communication system, because it can realize high-bitrate and high capacity transmission by multiplexing information symbols of many users with orthogonal codes. In addition it is especially useful in the downlink transmissions. However, similar to OFDM system the transmitted signal from MU-OFDM system also exhibits a very high Peak to Average Power Ratio (PAPR) when using large number of subcarriers and with increased number of users resulting in nonlinear distortion at the high power amplifier and the degradation of the bit error rate. In this paper the performance of Selected Mapping technique will be analyzed and will be compared with another technique called Partial Transmit sequence for PAPR reduction in case of MU-OFDM.
Full Paper
IJECT/81/1/A-477
15 Continuous Monitoring and Protection System for Underground Mine Workers using Arduino
S. Naveen Kumar, P.V.L. Siva Prasad

Abstract
In any type of industry one of the most vital parts is the safety. Negligence in the safety may cause loss of human life or may cause damaging of high quality equipments. So, this paper discusses the continuous monitoring of underground coal mine parameters like temperature, gases and humidity. Sensors are used to collect and send all these parameters information to monitoring section. Mine workers are informed through buzzer. The hardware section includes the Arduino Galileo from Intel, Temperature, Gas and Humidity sensors, GSM shield.
Full Paper
IJECT/81/1/A-478
16 QR Code Security Using Proxy Re-Encryption for Private Data Shared Barcodes
K.Lakshmi, D.Jeyamanilatha

Abstract
A two layer QR Codes for private data sharing using convolutional coder and Proxy Re-Encryption is proposed. In barcodes, as the encoded information is featured to be machine readable only, a human cannot distinguish between a valid and a maliciously manipulated code. While humans might fall for phishing attacks, automated readers are most likely vulnerable to SQL injections and command injections. In this approach both encoding rate and interference level will be optimized with two robust error correction methods. Existing systems uses various techniques like Steganography, DCT, DFT and Secret (N, N)-Threshold QR Code Sharing Approach. But in proposed system convolutional coder is going to be used for encoding the QR Code at the transmitted side and decode the same at the receiver side. To improve the security Proxy Re-Encryption is used. Two single layer QR Codes were taken. One as a input another code is used as guide. Proxy Re- Encryption improves the flexibility of sharing the data between different hosts and also improves security.
Full Paper
IJECT/81/1/A-479