Loading

Artificial Passenger Full Paper

Abstract: To overcome the problems due to accidents like crashes, deaths and injuries IBM introduces a new sleep prevention technology device called as ‘ARTIFICIAL PASSENGER’ which was developed by Dimitry Kanevsky and Wlodek Zadrozny.
        This research suggests that we can make predictions about various aspects of driver performance based on what we gleam from the movements of a driver’s eye and that a system can eventually be developed to capture this data and used to allow people when they are driving as become significantly impaired by fatigue. In this paper we are going to discuss about introduction, background of invention, why such systems used, advantages, devices used, architecture, applications, future enhancement and conclusion.   

Read Full Paper....

Design and Visulization of Space Colony Full Paper

Abstract: Lewis One is a qualitative space biosphere design. It is intended to house 10,000 residents in a cylinder large enough for a 1g rotating habitat module and construction facilities to reproduce the module. The shielding, exterior, and construction bays are non-rotating. Lewis One is compared to the Bernal Sphere space colony designed in the 1970’s. Lewis One is visualized using state of the art computer graphics hardware and software to produce a three dimensional, animated, lighted, shaded, texture mapped surface model. One may interactively ‘fly’ outside and inside the structure to examine features of interest. Interactively controlled planar cutaways at any location and/or orientation are available. Visualization provides insight into, and feedback on, the design to drive improvements and communicate design concepts.

Read Full Paper....

Ethical Hacking Paper Full

Abstract: The explosive growth of the Internet has brought many good things: electronic commerce, easy access to vast stores of reference material, collaborative computing, e-mail, and new avenues for advertising and information distribution, to name a few. As with most technological advances, there is also a dark side: criminal hackers. Governments, companies, and private citizens around the world are anxious to be a part of this revolution, but they are afraid that some hacker will break into their Web server and replace their logo with pornography, read their e-mail, steal their credit card number from an on-line shopping site, or implant software that will secretly transmit their organization's secrets to the open Internet. With these concerns and others, the ethical hacker can help. This paper describes ethical hackers: their skills, their attitudes, and how they go about helping their customers find and plug up security holes. The ethical hacking process is explained, along with many of the problems that the Global Security Analysis Lab has seen during its early years of ethical hacking for IBM clients.

Read Full Paper....

Cross-Layer Optimized MAC to Support Multihop QoS Routing for Wireless Sensor Networks

Cross-Layer Optimized MAC to Support Multihop QoS Routing for Wireless Sensor Networks
Abstract—This paper presents an efficient hybrid mediumaccess control (HMAC) protocol with an embedded cross-layer optimization solution to provide routing-layer coarse-grained end to-end quality-of-service (QoS) support for latency-sensitive traffic flows. A novel channel-reservation technique is proposed to significantly reduce the end-to-end delay for delay-sensitive traffic flows by allowing packets to go through multiple hops within a single medium-access control (MAC) frame and by also giving them higher priority channel access to reduce possible queuing delay. Our proposed protocol (HMAC) combines energy-efficient features of the existing contention-based and time-division multipleaccess (TDMA)-based MAC protocols and adopts a short frame structure to expedite packet delivery. Simulation results in ns-2 show that HMAC achieves significant performance improvements in energy consumption, latency, and throughput over existing MAC protocols.

Index Terms—End-to-end latency, energy efficiency, hybrid medium-access control (HMAC), latency-sensitive traffic, quality of service (QoS).

Read Full Paper....

Security in Wireless Sensor Networks using Frequency Hopping paper full

Security in Wireless Sensor Networks using Frequency Hopping
Abstract: A Wireless Sensor Network (WSN) is a collection of thousands of tiny sensor nodes having the capability of wireless communication, limited computation and sensing. These networks are vulnerable to internal and external attacks due to the lack of tamper-resistant packaging and the insecure nature of  wireless communication channels. Since most of the existing routing protocols are application specific and hence do not satisfy the security constraints of wireless sensor networks. Whenever any device comes within the frequency range can get the access to the transmitting data and may affect the transmission. In this paper, we simulated the concept of frequency hopping and proved it a better approach to provide security in WSN.

General Terms: Wireless Sensor Networks, Security, Frequency Hopping.

Read Full Paper....

A Perceptually Tuned Watermarking Scheme for Color Images ppt

A Perceptually Tuned Watermarking Scheme for Color Images
Abstract—Transparency and robustness are two conflicting requirements demanded by digital image watermarking for copyright protection and many other purposes. A feasible way to simultaneously satisfy the two conflicting requirements is to embed high-strength watermark signals in the host signals that can accommodate the distortion due to watermark insertion as part of perceptual redundancy. The search of distortion-tolerable host signals for watermark insertion and the determination of watermark strength are, hence, crucial to the realization of a transparent yet robust watermark. This paper presents a color image watermarking scheme that hides watermark signals in most distortion-tolerable signals within three color channels of the host image without resulting in perceivable distortion. The distortion-tolerable host signals or the signals that possess high perceptual redundancy are sought in the wavelet domain for watermark insertion. A visual model based upon the CIEDE2000 color difference equation is used to measure the perceptual redundancy inherent in each wavelet coefficient of the host image. By means of quantization index modulation, binary watermark signals are embedded in qualified wavelet coefficients.

Index Terms—CIEDE2000, color image watermarking, color visual model, just noticeable color difference (JNCD), just noticeable difference (JND), perceptual redundancy.

Download Full Paper PPT Click Here
Read Full Paper....

A Vehicle-to-Vehicle Communication Protocol for Cooperative Collision Warning

A Vehicle-to-Vehicle Communication Protocol for Cooperative Collision Warning
Abstract; This paper proposes a vehicle-to-vehicle communication protocol for cooperative collision warning. Emerging wireless technologies for vehicle-to-vehicle (V2V) and vehicle to-roadside (V2R) communications such as DSRC are promising to dramatically reduce the number of fatal roadway
accidents by providing early warnings. One major technical challenge addressed in this paper is to achieve low-latency in delivering emergency warnings in various road situations. Based on a careful analysis of application requirements, we design an effective protocol, comprising congestion control policies, service differentiation mechanisms and methods for emergency warning dissemination. Simulation results demonstrate that the proposed protocol achieves low latency in delivering emergency warnings and efficient bandwidth usage in stressful road scenarios.

Full Paper Presentation Click Here
Read Full Paper....

Human Language Query Processing role in Computer Interaction

Abstract: Nowadays interaction with computer is essential, effective process and also the storing and retrieving of data from database will play vital role in the database application. To access the Database the user should have a strong knowledge in SQL command and procedures. But this is not possible for all users. So in this we present Human Language Query Processing for Temporal Database. This will help the novice user to interact Temporal Database in their Native language (English), without using any SQL command or procedures.

              The conventional Database will give only current data not past or future data. But the Temporal data will support for past, present and future data. In temporal data we used third axis as time interval, which support both Transaction time as well valid time. The valid time is the actual or real world time at which the data is valid. The main aim of this system is that the human language is interpreted with Temporal Database and to produce appropriate results. This system is implemented in Java which can be used in any platform.

Download Full Paper Presentation
Read Full Paper....

A Broadcast Disk Scheme for Mobile Information System paper presentation

Abstract: The rapidly expanding technology of cellular communications, wireless local area network (LAN), wireless data networks and satellite gives mobile users the ability of accessing information anywhere and anytime. Data broadcasting algorithm plays an important role as it instructs the server to disseminate large amount of data at a fast rate to many mobile clients. One of the work known as the Broadcast Disk method creates a sequence of slots containing data and broadcasts them in a circular manner on the air. Mobile clients keep listening to the air and catch those slots that interest them. However in the Broadcast Disk method, some slots are empty, which results to waste of resources and increase in clients’ average waiting time. Empty slots are randomly generated and difficult to be located. In this paper we present a scheme called the Optimum Broadcast Disk, which is an enhancement of the Broadcast Disk method to overcome the empty slots issue and hence reduce the users’ waiting time. We manage to locate these empty slots and fill them with popular data. We demonstrate by case studies and simulation that our scheme eliminates empty slots and minimizes clients’ average waiting time.

Keywords: Data broadcasting, Broadcast Disk, Broadcast Schedule, Latency, Mobile Information
System.

Download Full Paper Presentation
Read Full Paper....

A Parallel Algorithm for Computing Minimum Spanning Trees

A Parallel Algorithm for Computing Minimum Spanning Trees
Abstract: We present a simple and implementable algorithm that computes a minimum spanning tree of an undirected weighted graph vertices and edges on an EREW PRAM using n m processors. This represents a substantial improvement in the running time over the previous results for this problem using at the same time the weakest of the PRAM models. It also implies the existence of algorithms having the same complexity bounds for the EREW PRAM for connectivity ear decomposition
biconnectivity strong orientationnumbering and Euler tours problems.

Download Full Paper Click Here
Read Full Paper....

Back to TOP