IJETE
Call for papers , Manuscript submission last date 30th April 2018. Send to ijete.editor@ijete.org

Volume 1 Issue 10 November 2014 Edition

SECURE WIRELESS NETWORK CONNECTIVITY IN THE PRESENCE OF EAVESDROPPERS
S.SUGANYA, T.PARTHIBAN
pp 241-245
Abstract: In wireless ad hoc networks the sender and receiver should sharing the message with secure and timely manner. Each nodes communicate through an intermediate node which are moving over the network. The nature of an intermediate or relay node should produce the throughput performance on entire network. Relay transmission can enhance coverage and Throughput. In this paper, consider the transmission of a confidential message from a source to a destination in a decentralized wireless network in the presence of randomly distributed eavesdroppers. The source–destination pair off can be potentially assisted by randomly dispersed relays. For an arbitrary relay, develop exact expressions of secure link probability for both colluding and noncolluding eavesdroppers. To obtain lower bound expressions on the secure connection probability, which are correct when the eavesdropper density is small. Using these lower bound terminology, propose a relay selection strategy to improve the secure connection probability. By analytically compare the secure connection probability for direct transmission and relay transmission, to address the important problem of whether or not to relay and discuss the condition for relay transmission in terms of the relay density and source–destination space. These analytical results are accurate in the small eavesdropper density regime. There is no link failure between nodes because each node having static velocity. If data loss is occurred any node that node should retransmit the data to neighbor without the involvement of source node. It will save the energy of relay node. A trust based security protocol based on a MAC-layer approach which attains confidentiality and authentication of packets in both routing and link layers of MANETs.
AAPS: ANDROID BASED SYSTEM FOR CAMERA BASED ATTACKS
VAIBHAV WANJALE, ABHIJIT DHAPTE, SARITA MOREY, PROF. MRS. NEHA KORIA
pp 246-247
Abstract: Generally, when talking about privacy protection, most smart phone users pay attention to the safety of SMS, emails, contact lists, calling histories, location information, and private files. They may be surprised that the phone camera could become a traitor; for example, attackers could stealthily take pictures and record videos by using the phone camera. Spy camera apps have also become quite popular. Which allow phone users to take pictures or record videos of other people without their permission. Attackers can implement spy cameras in malicious apps such that the phone camera is launched automatically without the device owner’s notice, and the captured photos and videos are sent out to these remote attackers. Nowadays, people carry their phones everywhere; hence, their phones see lots of private information. If the phone camera is exploited by a malicious spy camera app, it may cause serious security and privacy problems. In this article, we first conduct a survey on the threats and benefits of spy cameras. And we have present camera based attack detection and prevention system. The results demonstrate the feasibility and effectiveness of these attacks detection and prevention. Finally, we propose a lightweight defense scheme.
DESIGN OF CHARGE SHARED POWER OPTIMIZED PULSE TRIGGERED FLIP FLOP
SIJITHRA P.C, MATHAN K
pp 248-252
Abstract: The need for low power has caused a major paradigm shift where power dissipation has become as important a consideration as performance and area. So this Low Power Pulse Triggered Flip Flop reviews various strategies and methodologies for designing low power circuits and systems. The article concludes with the future challenges that must be met to design low power, high performance systems. In this method an explicit type pulse-triggered structure and a modified true single phase clock latch based on a signal feed-through scheme is used. This system also deals in solving long discharging path problem in conventional explicit type pulse-triggered FF. In the proposed system Conditional Pulse-Enhancement Scheme will be used. In digital electronics, charge sharing is an undesirable signal integrity phenomenon observed most commonly in the Domino logic family of digital circuits.

CONTENT SEARCH & QUERY VALUE SEARCH FOR DOCUMENT ANNOTATION
NISHIGANDHA KUTE, MONAL SALUNKE, SUREKHA KHAIRE,PROF. MRS. S. PATIL
pp 253-255
Abstract: Searching the World Wide Web can be both beneficial and frustrating in today’s life. And also all collection of textual data contains large amount of structured information which remains hidden in unstructured format. Relevant information is always difficult to find in these documents. You may find vast amounts of information, or you may not find the kinds of information you’re looking for. Searching online will provide you with a wealth of information, but not all of it will be useful or of the highest quality. In this paper we are consider an alternative approach for content and query searching based on Facilitating Document Annotation for the structured metadata by identifying documents in overall system that are likely to contain information of interest and this information is going to be useful for content of querying the database. Here publisher will likely to assign metadata, structured or unstructured related to documents which they upload which will easily help the users in retrieving the documents.
IMPLEMENTATION OF PACKET CLASSIFICATION ALGORITHM USING VHDL
EVANGELINE ASHA B, KAVITHA S
pp 256-260
Abstract: Packet classification is one of the most important tasks by the networking equipment. This device is used to sort the packets. A packet has five fields where these have to be matched with a rule. The incoming packets are placed in a flow which is determined by the matched rule. Packet’s priority is decided by the matched rule. Classifying the packet is the difficult task. All the packets are processed at same speed and the rulesets can contain ten thousand of rules. The packet classification uses classification engine that consumes more power. Power is the major constraint in the networking device. This paper uses modified hypercut algorithm [1] that consumes only little amount of power. The software used here helps to find the amount of memory used as well as the resources used. This helps to determine the amount of area of the hardware device that has to be manufactured. This method avoids the floating point division.
PERSON IDENTIFICATION USING GAIT: SVM CLASSIFIER APPROACH
P.B.SHELKE, P.R.DESHMUKH
pp 261-264
Abstract: Person identification from a distance has got lot of importance in the field of security and visual surveillance. Gait biometrics play vital role to recognize a person via style of his walking. On the basis of their walking, proposed method used to identify the person during their walking. This method is evaluated on CASIA gait database by using support vector machine classifier on the basis of kernel functions. Experiment results shows that the classification ability of SVM classifier using quadratic kernel is perform better than redial basis, polynomial, linear type kernel function. This method is more efficient on the basis of their recognition rate and their computational complexity.