Alarming global warming trends due to heat emission by computer monitors
The world’s entrance into the computer age along with web has certainly had a profound impact on our society. With increase in purchasing power, mass production, lesser costs, exponential growth in computer technology and population growth were one of the main drivers of increases in global warming and climate change. The onset of Information age is associated with the digital revolution, just as the Industrial Revolution marked the information age. Computerization of modern society has brought convenience to all aspects of human life. It seems evident that there will be both positive and negative effects on society and global environment. Computers have added a new source of heat generation and emission into environment. In spite of recent studies indicating possible threats to global warming and global climate, there is no long term data available on the amount of heat generated, emitted and dissipated into environment by computer monitors. The scope of this research work is to experimentally measure the heat generated by computer monitors during on (sleep/Idle) mode and working mode. For this research work four decimal digit temperature measurement test instrument was designed and exclusively fabricated. A special air locked container was also fabricated for conducting heat emission experiments on computer monitors. Population and computers projections for India, China, USA and the whole world were also included in this research work for 2050. An attempt is made to indicate amount of heat generated, emitted and dissipated into environment by India, China, USA and entire world by computer monitors at present and projections for 2050.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Compressed Domain Based Review on Digital Video Watermarking Techniques
The present review covers the literature of digital video watermarking schemes based on considering the video during encoding or encoded video in an increasing order of their publication year from 1998 to 2016. Through extensive literature, some grouping is required. Therefore, only papers published by a method of peer review in high class journal are reviewed. Most of the papers are deals with MPEG structure. Few papers are following the structure of H.264/AVC. These articles include experimental, analytical and numerical work for specific applications. This review also takes papers from good conferences and meeting on video watermarking in addition to above reviewing journal articles. The limitations and the still existing challenges are described in the later part of the review facilitate for those authors who further require doing some innovative work in this field. Eventually, the aim of the authors is to covers the in-depth discussion on already published literature based on compressed domain video watermarking.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Preventing SQL injection attacks using Blowfish and RSA
SQL injection attacks on the web databases are mainly due to the application development process where the coding process is vulnerable as it was not secured. This however can be prevented by various methods. One of the techniques is to limit the access of database to authorized users only. Database contents are encrypted so as to allow a secure way of efficient query processing directly on the encrypted database. SQL attacks can be prevented through highly secure authentication schemes in the login phase itself. In this paper, we have presented one such technique. Our scheme proposes that access be provided to verified users only. That is, at the time of creation of the user account, a user key is generated for every user where the user name and password at the time of login is encrypted by Blowfish encryption and RSA technique at different levels of the total encryption process. The access is provided by the server after confirming the user’s authenticity. On server side the encrypted data will be decrypted using the user key. The decrypted data will be checked and if the user is genuine, further access will be granted to the database. The RSA encryption will work as a protective cover for the SQL query generated by the user at the client’s end.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Realisation of electronic circuit based on modified rossler system and its application in secure communication
The present article described the design technique of hardware electronic circuit based on modified Rossler equations. The dynamical behaviour of the proposed system has been studied by computer simulation and in electronic experiment. The results of periodic and chaotic behaviour of the hardware circuit are reported. Next the synchronization between two such electronic circuits is experimentally verified and a secure scheme of communication is described using chaos masking technique. The hardware experimental results are incorporated in this article to support the design algorithm.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Sharon: bio-sensor system in health care using Christina theory WHDM tool
In this work we have proposed a new mobile based health application on pervasive computing to cater the well being of human life and we designing a new bio-related mobile which is incorporated with an application called AIDS Awareness Application (A.A.A), we call it as “Sharon Mobile” with automatic application for suggesting the AIDS related frequently asked questions. This mobile has two different storage say server side and dB related storage in the mobile database itself. Gender wise searching option is implemented in this AIDS Awareness mobile. We are using heterogeneous data mining and mobile dB features for query searching with WHDM Tool.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Review Summarization with Machine Learning Language
Now a days e-commerce becoming more popular, Seller selling product on the web often ask their customers for reviews about products which they have purchased and these reviews are used by other people to know features of the product. In this paper, we design and develop, review summarization system with Machine Learning Language. The goal of review summarization system is to take out the product features on which people write their opinions and then identifying whether the opinions are positive, negative or neutral. This system is based on the sentiment classification and portal algorithm. It differentiates the reviews into positive, negative and neutral. Latent Semantic Analysis (LSA) is used to identify features of the product. Portal algorithm is used to classify the reviews. In proposing system we display total percentages of reviews in graphical representation.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Design and implementation plan of e-tourism and development: sample approach in KSA
In recent decades the tourism sector has grown rapidly to become a pillar of the global economy, political cooperation, social change and far - reaching advances in technology; both in communications and infrastructure. Tourism has closely been connected to progress of ICTs for over 30 years. With increasing complexity of tourism business models and tasks, there is a clear need of the next generation in tourism sector. Therefore, we proposing here new structure e-tourism which can support flexible automation, integration, computation, storage, and collaboration. In every year, millions of pilgrims visiting our Holy City, But on the part of tourism and development, Saudi Arabia is less than Europe, America and Asia in the sector of tours and travel development. There is no much significance research proposal or article on e-tourism & development in our Saudi Kingdom. This paper deals with e-tourism, innovation and designing proposal suitable for Kingdom of Saudi Arabia. Also we discussed about problems and solutions related to the e-tourism sector adoptable by the industry and government organization in Saudi Arabia.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Laptop tracking mechanism using GSM/GPS technology
In this paper we explain, the need of Organizations facing the real problem on physical, mechanism to protect their IT systems such as Laptops or notebooks and palmtaps. All IT systems ,have become difficult to protect because they can easily be stolen. Not only in companies but also in universities and colleges, social places it became a major problem for students, staff and people. Even though the laptops are password protected, that type of security is not providing any kind of use in finding the laptops once they are stolen. This is a method which gives better way in finding the laptops and also catching the thieves. In this paper, we are designing an anti-theft security system to track the location of the laptop. By using the GSM/GPS module connected to laptop the current location of the laptop is read and it is sent through message to the owner. By which it is possible to get back our laptops. As result we can reduce the laptop thefts.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Network proxy log mining: association rule based security and performance enhancement for proxy server
Network Proxy Logs contain useful user access patterns that are waiting to be discovered. By analyzing those logs, it is possible to discover various kinds of knowledge, which can then be applied to improve the performance of proxy server. Association Rule mining, by using Proxy logs, aims to discover interesting user access patterns. This paper proposes a novel approach for proxy log mining. In our approach, the Apriori Algorithm is used to extract important or useful Rules from proxy server ACCESS logs. Our paper’s aim is to mine patterns from the Network Proxy Logs and show the difference that some unauthorized clients somehow getting access to information and some authorized clients are not getting access to information. Clients who are unauthorized might be an intruder.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Pareto Type IV Software Reliability Growth Model
Software quality depends upon Software Reliability as it is one of its most important characteristics. Software Reliability is an important attribute of software quality, together with functionality, usability, performance, serviceability, capability, installability, maintainability, and documentation. It is hard to be achieved, because the complexity of software tends to be high. The development of many Software Reliability Growth Models (SRGMs) over the last several decades have resulted in the improvement of software facilitating many engineers and managers in tracking and measuring the growth of reliability. This paper proposes Pareto type IV based Software Reliability growth model with interval domain data. The unknown parameters of the model are estimated using the maximum likelihood (ML) estimation approach. Reliability of a software system using Pareto type IV distribution, which is based on Non-Homogenous poisson process (NHPP) is presented through estimation procedures. Comparison is also made between the Pareto type II model and Proposed model. The performance of the SRGM is judged by its ability to fit the software failure data. How good does a mathematical model fit to the data is also being calculated. Besides, an analysis of two software failure data sets is included.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]