A Optimized Analysis for detection of Malicious Mobile App

Authors: B V V Durga, V Sita Rama Prasad, Dr. C P V N J MohanRao

Abstract: Positioning misrepresentation in the portable Application business shows to false or dubious activities, which are motivated behind, thumping up the Applications in the popularity list. To be sure, it ends up being more endless for Application architects to adventure shady means, for instance, developing their Applications' business or posting fraud Application assessments, to ponder situating deception. While the ramification of abstaining from positioning misrepresentation has been largely maintained, there is constrained comprehension and examination here. This paper gives an all-inclusive viewpoint of situating deception and proposes a Positioning misrepresentation distinguishing proof structure for versatile Applications. In particular, it is proposed to precisely discover the mining in order to posture blackmail the dynamic periods, to be particular driving sessions, of compact Applications. Such driving sessions can be used for recognizing the area irregularity as opposed to an overall anomaly of Application rankings. In addition, three sorts of verification s are investigated, i.e., situating based affirmations, displaying to rate based confirmations and study based evidences, Applications' situating, rating and review rehearses through genuine speculations tests. In the request, this paper gets the skill of the proposed system, and shows the distinguishing proof's flexibility estimation furthermore some consistency of situating deception works out.

Keywords: Mobile Apps, ranking fraud detection, historical ranking records, evidence aggregation, review, ranking and rating

Secure Relay Data communication in untrusted cooperative Networks

Authors: M Vikas, N V Ashok kumar

Abstract: This project studies the problem of secure transmission in dual-hop cooperative networks with untrusted relays, where each relay acts as both a potential helper and an eavesdropper. A security-aware relaying scheme is proposed, which employs the alternate jamming and secrecy-enhanced relay selection to prevent the confidential message from being eavesdropped by the untrusted relays. To evaluate the performance of the proposed strategies, we derive the lower bound of the achievable ergodic secrecy rate (ESR), and conduct the asymptotic analysis to examine how the ESR scales as the number of relays increases.

Keywords: Secure routing; Manets; Graph; QoS; Attacks.

A Secure and Efficient Lifetime Routing Optimization for End-to-End Communication in WSN

Authors: MD Raziya, Dr G Satyanarayana

Abstract: Lifetime optimization and security are two conflicting design issues for multi-hop wireless sensor networks (WSNs) with non-replenish able energy resources. In this paper, we first propose a novel secure and efficient end-to-end routing protocol to address these two conflicting issues through two adjustable parameters: energy balance control (EBC) and probabilistic based random walking. We then discover that the energy consumption is severely disproportional to the uniform energy deployment for the given network topology, which greatly reduces the lifetime of the sensor networks. To solve this problem, we propose an efficient non-uniform energy deployment strategy to optimize the lifetime and message delivery ratio under the same energy resource and security requirement. We also provide a quantitative security analysis on the proposed routing protocol. Our theoretical analysis demonstrate that the proposed end to end routing protocol can provide an excellent tradeoff between routing efficiency and energy balance, and can significantly extend the lifetime of the sensor networks in all scenarios. For the non-uniform energy deployment, we also demonstrate that the proposed end-to-end routing protocol can achieve a high message delivery ratio while preventing routing attacks. We adopt a novel approach of group key communication scheme in our design, such that there is a unique group key, called as path key, to protect data transmitted in the entire routing path. Rather than using multiple shared keys to repeat to perform encryption and decryption over every link, we implement end-to-end path keys to reduce the overheads of key generation. Therefore, we can see that by implementing these concepts we can improve efficiency of network and provide more security of transferred message.

Keywords: Security, Wireless Sensor Networks, Frequency hopping, Dijkstra's Algorithm, Encryption and Decryption

PV system integration with grid using fuzzy based H-Bridge multilevel inverter

Authors: Hasen Ali, Dr.T Srinivasa Rao, R Ganesh

Abstract: This paper characterizes another fuzzy based controller based measured fell H-bridge multilevel photovoltaic (PV) inverter for single-or three-phase grid-associated applications. The particular fell multilevel topology enhances the proficiency and adaptability of PV systems. To acknowledge better use of PV modules and maximize the sun based vitality extraction, a disseminated most extreme power point tracking control plan is connected to both single-and three-phase multilevel inverters, which permits free control of each dc-connection voltage. For three-stage network associated applications, PV mismatches may present uneven provided control, leading to lopsided framework current. To unravel this issue, a control scheme with tweak remuneration is likewise proposed. An experimental three-stage seven-level fell H-connect inverter has been built utilizing nine H-connect modules (three modules for every stage). Each H-connect module is associated with a 185-W sun oriented board. Simulation and test results are exhibited to check the possibility of the proposed approach.

Keywords: Fuzzy, Cascaded multilevel inverter, distributed maximum power point (MPP) tracking (MPPT), modular, modulation compensation, photovoltaic (PV).

Cooperative OFDM Communication with DQPSK

Authors: Javvadi Satya Naga Manikanta, Balakrishna Batta

Abstract: The idea of 2-D standardized tags is of extraordinary significance for use in remote information transmission between handheld electronic gadgets. In a regular setup, any document on a PDA, for instance, can be exchanged to a moment mobile phone through a progression of pictures on the LCD which are then caught and decoded through the camera of the second wireless. In this examination, another approach for information adjustment in 2-D standardized tags is presented, and its execution is assessed in contrast with other standard strategies for scanner tag regulation. In this new approach, orthogonal recurrence division multiplexing (OFDM) tweak is utilized together with differential stage move keying (DPSK) over contiguous recurrence space components. A particular point of this investigation is to build up a framework that is demonstrated tolerant to camera developments, picture obscure, and light spillage inside neighbouring pixels of a LCD. In this paper Differential Phase Shift Keying was joined on account of Orthogonal Frequency Division Multiplexing keeping the ultimate objective to control data stream into visual two dimensional institutionalized labels. It was exhibited that QPSK-OFDM direction has certifiable insufficiencies in the balance of camera LCD improvements where the time of each part changes tenaciously. On the other hand, development of a differential stage modulator before OFDM to manage the data stream into organize differences of close-by parts (DPSK-OFDM) causes the development effect to logically incapacitate in light of its unfaltering change from segment to segment, adding to a little deviation from the ideal stage in the got hail. It was watched that under relative LCD-camera developments that create screw up rates in plenitude of 30% in PAM and QPSK-OFDM, the proposed course of action of DPSK-OFDM will keep up an error rate under 8% which is basically correctable using goof revision coding.

Keywords: Barcode, data transfer, differential phase shift keying, orthogonal frequency-division multiplexing (OFDM) modulation

Study and Analysis of different types of PLLs used in DVR’s for sag swell compensation under grid fault condition

Authors: M Santhosh Kumar, Dr.T Srinivasa Rao, M V Ramana Murty

Abstract: The real system code necessities for the system relationship of appropriated time structures, generally wind and photovoltaic (PV) systems, are ending up being incredibly asking. The transmission system heads (TSOs) are especially worried about the low-voltage-ride-through necessities. Courses of action in view of the foundation of STATCOMs and component voltage controllers (DVRs), and furthermore on front line control functionalities for the current drive converters of scattered time plants, have added to redesign their response under blemished and distorted circumstances and, in this manner, to fulfill these requirements. With a particular true objective to achieve pleasing results with such systems, it is critical to rely on upon exact and speedy system voltage synchronization estimations, which can work under uneven and turned conditions. This paper separates the synchronization capacity of three moved synchronization systems: the decoupled twofold synchronous reference diagram arrange darted circle (PLL), the twofold second demand summed up integrator PLL, and the three-organize enhanced PLL, planned to work under such conditions. Despite the way that distinctive systems in light of repeat darted circles have also been made, PLLs have been picked due to their association with dq0 controllers. In the going with, the unmistakable estimations will be shown additionally, discretized, and their execution will be attempted in an exploratory setup controlled in order to evaluate their precision likewise, execution highlights.

Keywords: Electric variable estimations, electrical designing, recurrence estimation, recurrence bolted circles, consonant examination, observing, synchronization.

Hydrogen Embrittlement of heat treatable steel plates welding

Authors: Dasam Hari Satya Sai Srinivas, V Ravi Kumar, V Vijay Kumar

Abstract: In the paper, influence of hydrogen on mechanical properties of welded joints from heat-treatable structural steel plates were investigated. The heat treatment of welded plate specimens was performed, and then the specimens were charged with hydrogen electrolytically generated from 1 N H2SO4 solution. The following studies were carried out: static tensile test, hardness investigations, macroscopic metallographic investigations as well as investigations with the use of a scanning microscope. Hydrogen embrittlement of welded joints from steel plates was revealed by a distinct decrease of ductility and a slight decrease of strength. On the basis of metallographic investigations, it was found that in a fracture region there are fine pores created by the presence of hydrogen and its displacement due to formed stresses and plastic deformation. It was shown that welded joints are susceptible to hydrogen cracking in the heat affected zone and in the fusion zone.

Keywords: Hydrogen Embrittlement, steel, welding.

Performance Analysis of Power Spectrum Efficiency under Interference Cancellation

Authors: Kosuru Padma, G.Phani kumar

Abstract: A distributed interference cancellation scheme for cellular networks is considered in which a subset of receivers forward their decoded messages to another subset of receivers. The messages can then be used to cancel interference with estimated cross-channel gains. A distributed power control algorithm is presented that harnesses the gain of interference cancellation and that takes into account channel estimation error. The algorithm is based on the exchange of interference prices, but in this case the local power updates are not concave due to nonlinear terms introduced by channel estimation errors. A partial cancellation scheme is then presented where the power updates are derived in closed form. We show that the algorithm converges to a local optimum of the weighted sum-rate maximization problem. Two methods for sorting users into the two groups that respectively forward and receive the decoded messages are presented. The first is sequential and is shown to converge to a local optimum. The second is a simple heuristic that is based on a stochastic geometric approach. Numerical results show that power control and adaptive partitioning of the users can add substantial gains to interference cancellation.

Keywords: Distributed power control, uplink channel, coordinated multi-point, multi-cell processing, distributed interference cancellation, fractional power control, stochastic geometry, channel estimation error, interference prices.

Pattern Matching based Iris Recognition System

Authors: Panchadarla jayalakshmi, Bhaghyasree manepalli, G.Phani Kumar

Abstract: Iris biometrics is widely recognized as being one of the most practical biometrics in use today. The iris of the human eye is the angular region between the pupil and sclera. The iris pattern consists of complex and distinctive ligaments, furrows, ridges, rings, corona, freckles and collarette. Also, the iris is relatively stable over the lifetime of a person starting from the eighth month of gestation and demonstrates high pattern variability, even for identical twins and between the left and right eye of the same person. These characteristics make the iris a very suitable candidate for biometric user authentication in smart phones. a novel liveness detection method that exploits the acquisition workflow for iris biometrics on smart phones using a hybrid visible (RGB)/near infra-red (NIR) sensor. This is able to capture both RGB and NIR images of the eye and iris region in synchronization.

Keywords: Smartphone, consumer biometrics, iris recognition, liveness.

Pattern Matching based Iris Recognition System

Authors: Panchadarla jayalakshmi, Bhaghyasree manepalli, G Phani Kumar

Abstract: Iris biometrics is widely recognized as being one of the most practical biometrics in use today. The iris of the human eye is the angular region between the pupil and sclera. The iris pattern consists of complex and distinctive ligaments, furrows, ridges, rings, corona, freckles and collarette. Also, the iris is relatively stable over the lifetime of a person starting from the eighth month of gestation and demonstrates high pattern variability, even for identical twins and between the left and right eye of the same person. These characteristics make the iris a very suitable candidate for biometric user authentication in smartphones. a novel liveness detection method that exploits the acquisition workflow for iris biometrics on smartphones using a hybrid visible (RGB)/near infra-red (NIR) sensor. This is able to capture both RGB and NIR images of the eye and iris region in synchronization.

Keywords: Smartphone, consumer biometrics, iris recognition, liveness.
If You feel any difficulty in paper submission, Please mail us ijeecm@gmail.com


Copyright © 2015 International Journal of Electrical, Electronics,Computers & Mechanical Engineering. All Rights Reserved.