computer journal top header
logo empirical research press ltd.
journal engineering and applied computer science
divider
Volume: 02, Issue: 05, May 2017
Journal-January-2017
Content
computer-engineering
h-index
6
Shivangi Pandey, Anjali Potnis, Madhuram Mishra
cyber
i10-index
4
Impact Factor
S. Pandey, A. Potnis, and M. Mishra, “A Detailed Analysis on Feature Extraction Techniques of Panoramic Image Stitching Algorithm,” International Journal of Engineering and Applied Computer Science, vol. 02, no. 05, pp. 147–153, May 2017. http://dx.doi.org/10.24032/ijeacs/0205/01
2.35
Abstract—Image stitching is a technique which is used for attaining a high resolution panoramic image. In this technique, distinct aesthetic images that are imaged from different view and angles are combined together to produce a panoramic image. In the field of computer graphics, photographic and computer vision, Image stitching techniques are considered as current research areas. For obtaining a stitched image it becomes mandatory that one should have the knowledge of geometric relations among multiple image co-ordinate system [1].First, image stitching will be done based on feature key point matches. Final image with seam will be blended with image blending technique. Hence in this paper we are going to address multiple distinct techniques like some invariant features as Scale Invariant Feature Transform and Speeded up Robust Transform and Corner techniques as Harris Corner Detection Technique that are useful in sorting out the issues related with stitching of images.
computer-engineering
Thrimurthi M, Adithya B A, Thandavamurthi H R, Gururaj H L
cyber
T. M, A. B A, T. H R, and G. H L, “Impact of Flash Crowd Attack in Online Retail Applications,” International Journal of Engineering and Applied Computer Science, vol. 02, no. 05, pp. 154–159, May 2017. http://dx.doi.org/10.24032/ijeacs/0205/02
Abstract— Now days the usage of internet has been enormously increased. Online shopping has acquired widely in day today event. Mean which these online shopping is affected by various advanced network security attacks Flash Crowd Attack is the one of the advanced attack, where huge amount of dummy requests are sent at a time and thus putting lot of pressure on server machine and degrade the efficiency. Also authorized client can’t receive the acknowledgement notification. We found that this attack might cause lot of problems to online buy user in the coming days. This paper depicts the minimization Flash Crowd Attack and discuses various issue of this attack.
computer-engineering
Dhruva MS, Gururaj H L, Ramesh B
cyber
D. MS, G. H L, and R. B, “Cryptography Based Light-Weight Attribute Encryption Scheme for Internet of Things,” International Journal of Engineering and Applied Computer Science, vol. 02, no. 05, pp. 160–164, May 2017. http://dx.doi.org/10.24032/ijeacs/0205/03
Abstract—For those organization for vast number about IoT devices, progressively vast amounts about information need aid produced, which abandons provision suppliers confronting new tests especially for administration to security. Information security might make attained utilizing cryptographic encryption strategies. Cryptographic keys are needed will unscramble data, Furthermore must a chance to be disseminated to An specific best approach will commissioned information clients that perform dissimilar errands with respect to information. To deal with an extensive amount about units generating trickles for data, an adaptable and fine-grained get control result thought to a chance to be utilized. A guaranteeing approach need as of late rose In view of Attribute-Based encryption (ABE) that gives adaptable What's more fine-grained get control. This framework employments quality based encryption to IOT gadgets. Those different clients previously, an association will oblige to entry different information produced Eventually Tom's perusing diverse sensors. Hence, in this system, best the clients who need aid commissioned will right specific information camwood right it. The way used to scramble that information is itself encrypted Also sent should client. When a commissioned client solicitation those data, as much genuineness is main checked and the qualities of the asked information are sent on as much email. He may be at that point obliged with enters this data. These qualities would use to unscramble those encrypted enter. Those decrypted fact that thus used to unscramble the information.
computer-engineering
P Appala Naidu, CH GVN Prasad, Prasad B, Bhanuja Bodla
cyber
P. A. Naidu, “Fingerprint and Palmprint Multi-Modal Biometric Security System,” International Journal of Engineering and Applied Computer Science, vol. 02, no. 05, pp. 165–171, May 2017. http://dx.doi.org/10.24032/ijeacs/0205/04
Abstract—In this work, fingerprint and palm print multi-modal biometric security system is proposed. In this proposed work some of the common features of finger print and palm print images are identified and the process is carried out for authentication. At first, the preprocessing steps are completed on chosen images which include binarization, thinning and minute extraction. Binarization is for identifying the important ridges of finger print and palm print images and later on thinning is applied to eliminate the repetitive pixels on the binarized images. Using minute extraction different angles are formed for the thinned images for choosing the specific area of the images. In the next step for identifying the specific area in the finger print images region of interest is carried out. After the initial stage (preprocessing) features are extracted by using Feature Extraction method from both the finger print and palm print images and all the extracted features are combined to form a feature vector element. Secrete key is generated using the fuzzy extractor from the biometric features and stored in the fuzzy vault. The generated key and obtained vector elements are stored in the database. In final stage authentication methods are carried out for the test images. In this method feature of finger print images and palm print images are extracted and verified with the fuzzy vault and then a secrete key is generated. If the key generate and key stored in database are matched then the process is successful authentication or else it is failure authentication.
computer-engineering
Siddharth Agarwal, Yash Omer, T.B. Patil, Supriya C. Sawant
cyber
S. Agarwal, “Solar Panel Cells as Power Source and Li-Fi Data Nodes Integrated with Solar Concentrator,” International Journal of Engineering and Applied Computer Science, vol. 02, no. 05, pp. 172–175, May 2017. http://dx.doi.org/10.24032/ijeacs/0205/05
Abstract—The usage of internet and requirement for data transmission is at tremendous demand. People are more dependent on the internet compared to previous decades. So with the increase in number of users, spectrum is becoming congested. Presently Wi-Fi technology is popular which runs on radio frequency waves having less bandwidth so, to have a larger bandwidth for greater data transfer rate Li-Fi has been introduced. Li-Fi uses visible light spectrum having bandwidth 10,000 times more than radio waves. Li-Fi requires continuous electric power for illumination to transfer data. Electrification is a major concern in rural areas. Uses of this Li-Fi technology with solar panel make it more efficient and easily available at every nook and corner. This paper deals with integration of Li-Fi with solar panel. Solar panel is used instead of photodiodes for demodulation of data. Solar panels consist of solar cells which works for both storing energy and converting that energy stored in electrical signal for illuminating LED lamps and to complete the successful working of life technology also solar panel have also become more efficient by placing the solar concentrator above them which will increase the output power of solar panel manifold.

computer science journal, engineering journal