Notice Board :





Volume VIII Issue III

Author Name
N Faccoli, A K Allam, C Mesiar
Year Of Publication
2016
Volume and Issue
Volume 8 Issue 3
Abstract
In the past few years, varieties of image cryptosystems are planned. However, several of them have been shown to be insecure. During this paper we have a tendency to gift a robust and economical cryptosystem supported the organization of a chaotic time delay system to transmit a digital image in a very secure method. It consists of 2 steps: the primary one assures the transmitter/receiver synchronization, the second step focus on the encryption/decryption procedure. The transmitter unit consists of a chaotic generator that is the time delay feedback Chua circuit associate degreed an encoding mechanism (chaotic masking), within which the key message (digital image) is else to the output of the chaotic generator. The receiver unit consists of a nonlinear state observer design that is driven by just one of the states of the time delay feedback Chua circuit and a secret writing mechanism. The cryptosystem is of profit to the safety of digital pictures.
PaperID
2016/EUSRM/03/2016/32345

Author Name
Nikolaos L, B C Batistos
Year Of Publication
2016
Volume and Issue
Volume 8 Issue 3
Abstract
Computing U/C is one in every of the foremost vital and time-consuming computation in attribute reduction. In this paper, we have a tendency to improve the algorithmic program for computing U/C gift based on number sorting, and therefore reach a finer multidimensional language. Both the rough set and also the fuzzy set theories may be wont to deal with inexact and incomplete info. On basis of the new table, we have a tendency to introduce fuzzy set and style a replacement fast attribute reduction algorithmic program with that we will amendment the threshold relating to user’s demand and special information and therefore get a higher results of attribute reduction. In the end, we apply the fast algorithmic program into Associate in Nursingalyzing information table in estate info of some town.
PaperID
2016/EUSRM/03/2016/32419

Author Name
D Sheriff, H Zhang, G Xiaoqing
Year Of Publication
2016
Volume and Issue
Volume 8 Issue 3
Abstract
A dynamic wireless network that's shaped with none pre-existing infrastructure, in which each node will act as a router is named a mobile impromptu network (MANET). Since MANETS has not got clear cut security provisions, it is accessible to any of the licensed network users and malicious attackers. The greatest challenge for the MANETS is to return with a strong security resolution even within the presence of malicious nodes, in order that painter are often shielded from various routing attacks. Many countermeasures are planned for these routing attacks in MANETS exploitation numerous science techniques. However most of these mechanisms don't seem to be significantly appropriate for the resource constraints, i.e., bandwidth limitation and battery power, since they ends up in serious traffic load for exchanging and verification of keys.
PaperID
2016/EUSRM/03/2016/32556

Author Name
S Lasram, Dichi I
Year Of Publication
2016
Volume and Issue
Volume 8 Issue 3
Abstract
This paper discusses the role of circumstantial networking in future wireless communications. Ad hoc networks are classified as isolated circumstantial networks with giant and small sizes, integrated circumstantial networks in numerous scenarios and cellular circumstantial networks for the long run mobile access networks. The terribly low traffic performance of enormous scale circumstantial networks is shown by simulation results, indicating such a sort of networks having very little business potential tiny size circumstantial networks appear to be omnipresent because of the supply of low-cost wireless computer network technologies. Integration of tiny size circumstantial networks with the global web is often completed by circumstantial gateways, which are proposed during this paper.
PaperID
2016/EUSRM/03/2016/32612