ºÝºÝߣshows by User: IJCERT / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: IJCERT / Sat, 03 Dec 2016 15:33:16 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: IJCERT Parametric Optimization of Rectangular Beam Type Load Cell Using Taguchi Method /slideshow/parametric-optimization-of-rectangular-beam-type-load-cell-using-taguchi-method/69790044 v3i1106-161203153316
In this work, Rectangular beam type load cell is considered for stress and strain analysis by using finite element method. The stress analysis is carried out to minimize the weight of Rectangular beam- type load cell without exceeding allowable stress. The intention of the work is to create the geometry of Rectangular beam-type load cell to find out the optimum solution. FEM software HyperWorks11.0.0.39 is using for parametric optimization of Rectangular beam type load cell. If the stress value is within the permissible range, then certain dimensions will be modified to reduce the amount of material needed. The procedure will be repeated until design changes satisfying all the criteria. Experimental verification will be carried out by photo-elasticity technique with the help of suitable instrumentation like Polariscope. Using Photo-elasticity technique, results are crosschecked which gives results very close to FEM technique. Experimental results will be compared with FEM results. With the aid of these tools the designer can develop and modify the design parameters from initial design stage to finalize basic geometry of load cell.]]>

In this work, Rectangular beam type load cell is considered for stress and strain analysis by using finite element method. The stress analysis is carried out to minimize the weight of Rectangular beam- type load cell without exceeding allowable stress. The intention of the work is to create the geometry of Rectangular beam-type load cell to find out the optimum solution. FEM software HyperWorks11.0.0.39 is using for parametric optimization of Rectangular beam type load cell. If the stress value is within the permissible range, then certain dimensions will be modified to reduce the amount of material needed. The procedure will be repeated until design changes satisfying all the criteria. Experimental verification will be carried out by photo-elasticity technique with the help of suitable instrumentation like Polariscope. Using Photo-elasticity technique, results are crosschecked which gives results very close to FEM technique. Experimental results will be compared with FEM results. With the aid of these tools the designer can develop and modify the design parameters from initial design stage to finalize basic geometry of load cell.]]>
Sat, 03 Dec 2016 15:33:16 GMT /slideshow/parametric-optimization-of-rectangular-beam-type-load-cell-using-taguchi-method/69790044 IJCERT@slideshare.net(IJCERT) Parametric Optimization of Rectangular Beam Type Load Cell Using Taguchi Method IJCERT In this work, Rectangular beam type load cell is considered for stress and strain analysis by using finite element method. The stress analysis is carried out to minimize the weight of Rectangular beam- type load cell without exceeding allowable stress. The intention of the work is to create the geometry of Rectangular beam-type load cell to find out the optimum solution. FEM software HyperWorks11.0.0.39 is using for parametric optimization of Rectangular beam type load cell. If the stress value is within the permissible range, then certain dimensions will be modified to reduce the amount of material needed. The procedure will be repeated until design changes satisfying all the criteria. Experimental verification will be carried out by photo-elasticity technique with the help of suitable instrumentation like Polariscope. Using Photo-elasticity technique, results are crosschecked which gives results very close to FEM technique. Experimental results will be compared with FEM results. With the aid of these tools the designer can develop and modify the design parameters from initial design stage to finalize basic geometry of load cell. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/v3i1106-161203153316-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In this work, Rectangular beam type load cell is considered for stress and strain analysis by using finite element method. The stress analysis is carried out to minimize the weight of Rectangular beam- type load cell without exceeding allowable stress. The intention of the work is to create the geometry of Rectangular beam-type load cell to find out the optimum solution. FEM software HyperWorks11.0.0.39 is using for parametric optimization of Rectangular beam type load cell. If the stress value is within the permissible range, then certain dimensions will be modified to reduce the amount of material needed. The procedure will be repeated until design changes satisfying all the criteria. Experimental verification will be carried out by photo-elasticity technique with the help of suitable instrumentation like Polariscope. Using Photo-elasticity technique, results are crosschecked which gives results very close to FEM technique. Experimental results will be compared with FEM results. With the aid of these tools the designer can develop and modify the design parameters from initial design stage to finalize basic geometry of load cell.
Parametric Optimization of Rectangular Beam Type Load Cell Using Taguchi Method from IJCERT
]]>
308 5 https://cdn.slidesharecdn.com/ss_thumbnails/v3i1106-161203153316-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Robust Resource Allocation in Relay Node Networks for Optimization Process /IJCERT/robust-resource-allocation-in-relay-node-networks-for-optimization-process v3i1105-161203153302
Overlay steering has risen as a promising way to deal with enhances unwavering quality and effectiveness of the Internet. For one-jump overlay source steering, when a given essential way experiences the connection disappointment or execution debasement, the source can reroute the movement to the destination by means of a deliberately set transfer hub. Be that as it may, the over-substantial activity going through the same transfer hub may bring about incessant bundle misfortune and postponement jitter, which can corrupt the throughput and usage of the system. To defeat this issue, we propose a Load-Balanced One-jump Overlay Multipath Routing calculation (LB-OOMR), in which the activity is first part at the source edge hubs and afterward transmitted along numerous one-bounce overlay ways. So as to decide an ideal split proportion for the activity, we plan the issue as a direct programming (LP) definition, whose objective is to minimize the more regrettable case system blockage proportion. Since it is hard to take care of this LP issue in commonsense time, a heuristic calculation is acquainted with select the transfer hubs for building the disjoint one-jump overlay ways, which enormously lessens the computational multifaceted nature of the LP calculation. Reproductions in light of a genuine ISP system and an engineered Internet topology demonstrate that our proposed calculation can diminish the system clog proportion significantly, and accomplish top notch overlay directing administration.]]>

Overlay steering has risen as a promising way to deal with enhances unwavering quality and effectiveness of the Internet. For one-jump overlay source steering, when a given essential way experiences the connection disappointment or execution debasement, the source can reroute the movement to the destination by means of a deliberately set transfer hub. Be that as it may, the over-substantial activity going through the same transfer hub may bring about incessant bundle misfortune and postponement jitter, which can corrupt the throughput and usage of the system. To defeat this issue, we propose a Load-Balanced One-jump Overlay Multipath Routing calculation (LB-OOMR), in which the activity is first part at the source edge hubs and afterward transmitted along numerous one-bounce overlay ways. So as to decide an ideal split proportion for the activity, we plan the issue as a direct programming (LP) definition, whose objective is to minimize the more regrettable case system blockage proportion. Since it is hard to take care of this LP issue in commonsense time, a heuristic calculation is acquainted with select the transfer hubs for building the disjoint one-jump overlay ways, which enormously lessens the computational multifaceted nature of the LP calculation. Reproductions in light of a genuine ISP system and an engineered Internet topology demonstrate that our proposed calculation can diminish the system clog proportion significantly, and accomplish top notch overlay directing administration.]]>
Sat, 03 Dec 2016 15:33:02 GMT /IJCERT/robust-resource-allocation-in-relay-node-networks-for-optimization-process IJCERT@slideshare.net(IJCERT) Robust Resource Allocation in Relay Node Networks for Optimization Process IJCERT Overlay steering has risen as a promising way to deal with enhances unwavering quality and effectiveness of the Internet. For one-jump overlay source steering, when a given essential way experiences the connection disappointment or execution debasement, the source can reroute the movement to the destination by means of a deliberately set transfer hub. Be that as it may, the over-substantial activity going through the same transfer hub may bring about incessant bundle misfortune and postponement jitter, which can corrupt the throughput and usage of the system. To defeat this issue, we propose a Load-Balanced One-jump Overlay Multipath Routing calculation (LB-OOMR), in which the activity is first part at the source edge hubs and afterward transmitted along numerous one-bounce overlay ways. So as to decide an ideal split proportion for the activity, we plan the issue as a direct programming (LP) definition, whose objective is to minimize the more regrettable case system blockage proportion. Since it is hard to take care of this LP issue in commonsense time, a heuristic calculation is acquainted with select the transfer hubs for building the disjoint one-jump overlay ways, which enormously lessens the computational multifaceted nature of the LP calculation. Reproductions in light of a genuine ISP system and an engineered Internet topology demonstrate that our proposed calculation can diminish the system clog proportion significantly, and accomplish top notch overlay directing administration. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/v3i1105-161203153302-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Overlay steering has risen as a promising way to deal with enhances unwavering quality and effectiveness of the Internet. For one-jump overlay source steering, when a given essential way experiences the connection disappointment or execution debasement, the source can reroute the movement to the destination by means of a deliberately set transfer hub. Be that as it may, the over-substantial activity going through the same transfer hub may bring about incessant bundle misfortune and postponement jitter, which can corrupt the throughput and usage of the system. To defeat this issue, we propose a Load-Balanced One-jump Overlay Multipath Routing calculation (LB-OOMR), in which the activity is first part at the source edge hubs and afterward transmitted along numerous one-bounce overlay ways. So as to decide an ideal split proportion for the activity, we plan the issue as a direct programming (LP) definition, whose objective is to minimize the more regrettable case system blockage proportion. Since it is hard to take care of this LP issue in commonsense time, a heuristic calculation is acquainted with select the transfer hubs for building the disjoint one-jump overlay ways, which enormously lessens the computational multifaceted nature of the LP calculation. Reproductions in light of a genuine ISP system and an engineered Internet topology demonstrate that our proposed calculation can diminish the system clog proportion significantly, and accomplish top notch overlay directing administration.
Robust Resource Allocation in Relay Node Networks for Optimization Process from IJCERT
]]>
117 4 https://cdn.slidesharecdn.com/ss_thumbnails/v3i1105-161203153302-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Software Engineering Domain Knowledge to Identify Duplicate Bug Reports /slideshow/software-engineering-domain-knowledge-to-identify-duplicate-bug-reports/69790036 v3i1104-161203153251
Earlier, many methodologies was proposed for detecting duplicate bug reports by comparing the textual content of bug reports to subject-specific contextual material, namely lists of software-engineering terms, such as non-functional requirements and architecture keywords. When a bug report includes a word in these word-list contexts, the bug report is measured to be linked with that context and this information is likely to improve bug-deduplication methods. Here, we recommend a technique to partially automate the extraction of contextual word lists from software-engineering literature. Evaluating this software-literature context technique on real-world bug reports creates useful consequences that indicate this semi-automated method has the potential to significantly decrease the manual attempt used in contextual bug deduplication while suffering only a minor loss in accuracy.]]>

Earlier, many methodologies was proposed for detecting duplicate bug reports by comparing the textual content of bug reports to subject-specific contextual material, namely lists of software-engineering terms, such as non-functional requirements and architecture keywords. When a bug report includes a word in these word-list contexts, the bug report is measured to be linked with that context and this information is likely to improve bug-deduplication methods. Here, we recommend a technique to partially automate the extraction of contextual word lists from software-engineering literature. Evaluating this software-literature context technique on real-world bug reports creates useful consequences that indicate this semi-automated method has the potential to significantly decrease the manual attempt used in contextual bug deduplication while suffering only a minor loss in accuracy.]]>
Sat, 03 Dec 2016 15:32:51 GMT /slideshow/software-engineering-domain-knowledge-to-identify-duplicate-bug-reports/69790036 IJCERT@slideshare.net(IJCERT) Software Engineering Domain Knowledge to Identify Duplicate Bug Reports IJCERT Earlier, many methodologies was proposed for detecting duplicate bug reports by comparing the textual content of bug reports to subject-specific contextual material, namely lists of software-engineering terms, such as non-functional requirements and architecture keywords. When a bug report includes a word in these word-list contexts, the bug report is measured to be linked with that context and this information is likely to improve bug-deduplication methods. Here, we recommend a technique to partially automate the extraction of contextual word lists from software-engineering literature. Evaluating this software-literature context technique on real-world bug reports creates useful consequences that indicate this semi-automated method has the potential to significantly decrease the manual attempt used in contextual bug deduplication while suffering only a minor loss in accuracy. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/v3i1104-161203153251-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Earlier, many methodologies was proposed for detecting duplicate bug reports by comparing the textual content of bug reports to subject-specific contextual material, namely lists of software-engineering terms, such as non-functional requirements and architecture keywords. When a bug report includes a word in these word-list contexts, the bug report is measured to be linked with that context and this information is likely to improve bug-deduplication methods. Here, we recommend a technique to partially automate the extraction of contextual word lists from software-engineering literature. Evaluating this software-literature context technique on real-world bug reports creates useful consequences that indicate this semi-automated method has the potential to significantly decrease the manual attempt used in contextual bug deduplication while suffering only a minor loss in accuracy.
Software Engineering Domain Knowledge to Identify Duplicate Bug Reports from IJCERT
]]>
166 8 https://cdn.slidesharecdn.com/ss_thumbnails/v3i1104-161203153251-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
A Survey on: Sound Source Separation Methods /slideshow/a-survey-on-sound-source-separation-methods/69790030 v3i1103-161203153238
now a day’s multimedia databases are growing rapidly on large scale. For the effective management and exploration of large amount of music data the technology of singer identification is developed. With the help of this technology songs performed by particular singer can be clustered automatically. To improve the Performance of singer identification the technologies are emerged that can separate the singing voice from music accompaniment. One of the methods used for separating the singing voice from music accompaniment is non-negative matrix partial co factorization. This paper studies the different techniques for separation of singing voice from music accompaniment.]]>

now a day’s multimedia databases are growing rapidly on large scale. For the effective management and exploration of large amount of music data the technology of singer identification is developed. With the help of this technology songs performed by particular singer can be clustered automatically. To improve the Performance of singer identification the technologies are emerged that can separate the singing voice from music accompaniment. One of the methods used for separating the singing voice from music accompaniment is non-negative matrix partial co factorization. This paper studies the different techniques for separation of singing voice from music accompaniment.]]>
Sat, 03 Dec 2016 15:32:37 GMT /slideshow/a-survey-on-sound-source-separation-methods/69790030 IJCERT@slideshare.net(IJCERT) A Survey on: Sound Source Separation Methods IJCERT now a day’s multimedia databases are growing rapidly on large scale. For the effective management and exploration of large amount of music data the technology of singer identification is developed. With the help of this technology songs performed by particular singer can be clustered automatically. To improve the Performance of singer identification the technologies are emerged that can separate the singing voice from music accompaniment. One of the methods used for separating the singing voice from music accompaniment is non-negative matrix partial co factorization. This paper studies the different techniques for separation of singing voice from music accompaniment. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/v3i1103-161203153238-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> now a day’s multimedia databases are growing rapidly on large scale. For the effective management and exploration of large amount of music data the technology of singer identification is developed. With the help of this technology songs performed by particular singer can be clustered automatically. To improve the Performance of singer identification the technologies are emerged that can separate the singing voice from music accompaniment. One of the methods used for separating the singing voice from music accompaniment is non-negative matrix partial co factorization. This paper studies the different techniques for separation of singing voice from music accompaniment.
A Survey on: Sound Source Separation Methods from IJCERT
]]>
289 4 https://cdn.slidesharecdn.com/ss_thumbnails/v3i1103-161203153238-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
An Image representation using Compressive Sensing and Arithmetic Coding /slideshow/an-image-representation-using-compressive-sensing-and-arithmetic-coding/69790027 v3i1102-161203153227
The demand for graphics and multimedia communication over intenet is growing day by day. Generally the coding efficiency achieved by CS measurements is below the widely used wavelet coding schemes (e.g., JPEG 2000). In the existing wavelet-based CS schemes, DWT is mainly applied for sparse representation and the correlation of DWT coefficients has not been fully exploited yet. To improve the coding efficiency, the statistics of DWT coefficients has been investigated. A novel CS-based image representation scheme has been proposed by considering the intra- and inter-similarity among DWT coefficients. Multi-scale DWT is first applied. The low- and high-frequency subbands of Multi-scale DWT are coded separately due to the fact that scaling coefficients capture most of the image energy. At the decoder side, two different recovery algorithms have been presented to exploit the correlation of scaling and wavelet coefficients well. In essence, the proposed CS-based coding method can be viewed as a hybrid compressed sensing schemes which gives better coding efficiency compared to other CS based coding methods.]]>

The demand for graphics and multimedia communication over intenet is growing day by day. Generally the coding efficiency achieved by CS measurements is below the widely used wavelet coding schemes (e.g., JPEG 2000). In the existing wavelet-based CS schemes, DWT is mainly applied for sparse representation and the correlation of DWT coefficients has not been fully exploited yet. To improve the coding efficiency, the statistics of DWT coefficients has been investigated. A novel CS-based image representation scheme has been proposed by considering the intra- and inter-similarity among DWT coefficients. Multi-scale DWT is first applied. The low- and high-frequency subbands of Multi-scale DWT are coded separately due to the fact that scaling coefficients capture most of the image energy. At the decoder side, two different recovery algorithms have been presented to exploit the correlation of scaling and wavelet coefficients well. In essence, the proposed CS-based coding method can be viewed as a hybrid compressed sensing schemes which gives better coding efficiency compared to other CS based coding methods.]]>
Sat, 03 Dec 2016 15:32:27 GMT /slideshow/an-image-representation-using-compressive-sensing-and-arithmetic-coding/69790027 IJCERT@slideshare.net(IJCERT) An Image representation using Compressive Sensing and Arithmetic Coding IJCERT The demand for graphics and multimedia communication over intenet is growing day by day. Generally the coding efficiency achieved by CS measurements is below the widely used wavelet coding schemes (e.g., JPEG 2000). In the existing wavelet-based CS schemes, DWT is mainly applied for sparse representation and the correlation of DWT coefficients has not been fully exploited yet. To improve the coding efficiency, the statistics of DWT coefficients has been investigated. A novel CS-based image representation scheme has been proposed by considering the intra- and inter-similarity among DWT coefficients. Multi-scale DWT is first applied. The low- and high-frequency subbands of Multi-scale DWT are coded separately due to the fact that scaling coefficients capture most of the image energy. At the decoder side, two different recovery algorithms have been presented to exploit the correlation of scaling and wavelet coefficients well. In essence, the proposed CS-based coding method can be viewed as a hybrid compressed sensing schemes which gives better coding efficiency compared to other CS based coding methods. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/v3i1102-161203153227-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The demand for graphics and multimedia communication over intenet is growing day by day. Generally the coding efficiency achieved by CS measurements is below the widely used wavelet coding schemes (e.g., JPEG 2000). In the existing wavelet-based CS schemes, DWT is mainly applied for sparse representation and the correlation of DWT coefficients has not been fully exploited yet. To improve the coding efficiency, the statistics of DWT coefficients has been investigated. A novel CS-based image representation scheme has been proposed by considering the intra- and inter-similarity among DWT coefficients. Multi-scale DWT is first applied. The low- and high-frequency subbands of Multi-scale DWT are coded separately due to the fact that scaling coefficients capture most of the image energy. At the decoder side, two different recovery algorithms have been presented to exploit the correlation of scaling and wavelet coefficients well. In essence, the proposed CS-based coding method can be viewed as a hybrid compressed sensing schemes which gives better coding efficiency compared to other CS based coding methods.
An Image representation using Compressive Sensing and Arithmetic Coding from IJCERT
]]>
94 4 https://cdn.slidesharecdn.com/ss_thumbnails/v3i1102-161203153227-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Multiple Encryption using ECC and Its Time Complexity Analysis /slideshow/multiple-encryption-using-ecc-and-its-time-complexity-analysis/69790021 v3i1101-161203153215
Rapid growth of information technology in present era, secure communication, strong data encryption technique and trusted third party are considered to be major topics of study. Robust encryption algorithm development to secure sensitive data is of great significance among researchers at present. The conventional methods of encryption used as of today may not sufficient and therefore new ideas for the purpose are to be design, analyze and need to be fit into the existing system of security to provide protection of our data from unauthorized access. An effective encryption/ decryption algorithm design to enhance data security is a challenging task while computation, complexity, robustness etc. are concerned. The multiple encryption technique is a process of applying encryption over a single encryption process in a number of iteration. Elliptic Curve Cryptography (ECC) is well known and well accepted cryptographic algorithm and used in many application as of today. In this paper, we discuss multiple encryptions and analyze the computation overhead in the process and study the feasibility of practical application. In the process we use ECC as a multiple-ECC algorithm and try to analyze degree of security, encryption/decryption computation time and complexity of the algorithm. Performance measure of the algorithm is evaluated by analyzing encryption time as well as decryption time in single ECC as well as multiple-ECC are compared with the help of various examples.]]>

Rapid growth of information technology in present era, secure communication, strong data encryption technique and trusted third party are considered to be major topics of study. Robust encryption algorithm development to secure sensitive data is of great significance among researchers at present. The conventional methods of encryption used as of today may not sufficient and therefore new ideas for the purpose are to be design, analyze and need to be fit into the existing system of security to provide protection of our data from unauthorized access. An effective encryption/ decryption algorithm design to enhance data security is a challenging task while computation, complexity, robustness etc. are concerned. The multiple encryption technique is a process of applying encryption over a single encryption process in a number of iteration. Elliptic Curve Cryptography (ECC) is well known and well accepted cryptographic algorithm and used in many application as of today. In this paper, we discuss multiple encryptions and analyze the computation overhead in the process and study the feasibility of practical application. In the process we use ECC as a multiple-ECC algorithm and try to analyze degree of security, encryption/decryption computation time and complexity of the algorithm. Performance measure of the algorithm is evaluated by analyzing encryption time as well as decryption time in single ECC as well as multiple-ECC are compared with the help of various examples.]]>
Sat, 03 Dec 2016 15:32:15 GMT /slideshow/multiple-encryption-using-ecc-and-its-time-complexity-analysis/69790021 IJCERT@slideshare.net(IJCERT) Multiple Encryption using ECC and Its Time Complexity Analysis IJCERT Rapid growth of information technology in present era, secure communication, strong data encryption technique and trusted third party are considered to be major topics of study. Robust encryption algorithm development to secure sensitive data is of great significance among researchers at present. The conventional methods of encryption used as of today may not sufficient and therefore new ideas for the purpose are to be design, analyze and need to be fit into the existing system of security to provide protection of our data from unauthorized access. An effective encryption/ decryption algorithm design to enhance data security is a challenging task while computation, complexity, robustness etc. are concerned. The multiple encryption technique is a process of applying encryption over a single encryption process in a number of iteration. Elliptic Curve Cryptography (ECC) is well known and well accepted cryptographic algorithm and used in many application as of today. In this paper, we discuss multiple encryptions and analyze the computation overhead in the process and study the feasibility of practical application. In the process we use ECC as a multiple-ECC algorithm and try to analyze degree of security, encryption/decryption computation time and complexity of the algorithm. Performance measure of the algorithm is evaluated by analyzing encryption time as well as decryption time in single ECC as well as multiple-ECC are compared with the help of various examples. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/v3i1101-161203153215-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Rapid growth of information technology in present era, secure communication, strong data encryption technique and trusted third party are considered to be major topics of study. Robust encryption algorithm development to secure sensitive data is of great significance among researchers at present. The conventional methods of encryption used as of today may not sufficient and therefore new ideas for the purpose are to be design, analyze and need to be fit into the existing system of security to provide protection of our data from unauthorized access. An effective encryption/ decryption algorithm design to enhance data security is a challenging task while computation, complexity, robustness etc. are concerned. The multiple encryption technique is a process of applying encryption over a single encryption process in a number of iteration. Elliptic Curve Cryptography (ECC) is well known and well accepted cryptographic algorithm and used in many application as of today. In this paper, we discuss multiple encryptions and analyze the computation overhead in the process and study the feasibility of practical application. In the process we use ECC as a multiple-ECC algorithm and try to analyze degree of security, encryption/decryption computation time and complexity of the algorithm. Performance measure of the algorithm is evaluated by analyzing encryption time as well as decryption time in single ECC as well as multiple-ECC are compared with the help of various examples.
Multiple Encryption using ECC and Its Time Complexity Analysis from IJCERT
]]>
337 5 https://cdn.slidesharecdn.com/ss_thumbnails/v3i1101-161203153215-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Hard starting every initial stage: Study on Less Engine Pulling Power /slideshow/hard-starting-every-initial-stage-study-on-less-engine-pulling-power/62157364 v3i502-160518192634
Automobiles engine, it is a prime mover; and a machine in which power is applied to do work, often in the form of converting heat energy into mechanical work. We know that the power unit of an automobile is called I C engine. The power developed by the engine depends upon the calorific value of the fuel used. This value is equal to the total heat produced to combustion of hydrogen and carbon. Fuel injection pump (FIP), has to supply various quantities of fuel in accordance with the different engine load and in-line pumps, which correctly positioned connects the fuel supply from gallery. Diesel engines compress pure air during compression stroke and must have some means to force fuel into the combustion chamber with a pressure higher from the compression pressure. The injection nozzle atomizes the fuel very small droplets (3 to 30 microns) and delivers it to the combustion chamber. This achieved by small orifice.]]>

Automobiles engine, it is a prime mover; and a machine in which power is applied to do work, often in the form of converting heat energy into mechanical work. We know that the power unit of an automobile is called I C engine. The power developed by the engine depends upon the calorific value of the fuel used. This value is equal to the total heat produced to combustion of hydrogen and carbon. Fuel injection pump (FIP), has to supply various quantities of fuel in accordance with the different engine load and in-line pumps, which correctly positioned connects the fuel supply from gallery. Diesel engines compress pure air during compression stroke and must have some means to force fuel into the combustion chamber with a pressure higher from the compression pressure. The injection nozzle atomizes the fuel very small droplets (3 to 30 microns) and delivers it to the combustion chamber. This achieved by small orifice.]]>
Wed, 18 May 2016 19:26:34 GMT /slideshow/hard-starting-every-initial-stage-study-on-less-engine-pulling-power/62157364 IJCERT@slideshare.net(IJCERT) Hard starting every initial stage: Study on Less Engine Pulling Power IJCERT Automobiles engine, it is a prime mover; and a machine in which power is applied to do work, often in the form of converting heat energy into mechanical work. We know that the power unit of an automobile is called I C engine. The power developed by the engine depends upon the calorific value of the fuel used. This value is equal to the total heat produced to combustion of hydrogen and carbon. Fuel injection pump (FIP), has to supply various quantities of fuel in accordance with the different engine load and in-line pumps, which correctly positioned connects the fuel supply from gallery. Diesel engines compress pure air during compression stroke and must have some means to force fuel into the combustion chamber with a pressure higher from the compression pressure. The injection nozzle atomizes the fuel very small droplets (3 to 30 microns) and delivers it to the combustion chamber. This achieved by small orifice. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/v3i502-160518192634-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Automobiles engine, it is a prime mover; and a machine in which power is applied to do work, often in the form of converting heat energy into mechanical work. We know that the power unit of an automobile is called I C engine. The power developed by the engine depends upon the calorific value of the fuel used. This value is equal to the total heat produced to combustion of hydrogen and carbon. Fuel injection pump (FIP), has to supply various quantities of fuel in accordance with the different engine load and in-line pumps, which correctly positioned connects the fuel supply from gallery. Diesel engines compress pure air during compression stroke and must have some means to force fuel into the combustion chamber with a pressure higher from the compression pressure. The injection nozzle atomizes the fuel very small droplets (3 to 30 microns) and delivers it to the combustion chamber. This achieved by small orifice.
Hard starting every initial stage: Study on Less Engine Pulling Power from IJCERT
]]>
324 8 https://cdn.slidesharecdn.com/ss_thumbnails/v3i502-160518192634-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Data Security Using Elliptic Curve Cryptography /slideshow/data-security-using-elliptic-curve-cryptography/62157284 v3i503-160518192429
Cryptography technique is used to provide data security. In existing cryptography technique the key generation takes place randomly. Key generation require shared key. If shared key is access by unauthorized user then security becomes disoriented. Hence existing problems are alleviated to give more security to data. In proposed system a algorithm called as Elliptic Curve Cryptography is used. The ECC generates the key by using the point on the curve. The ECC is used for generating the key by using point on the curve and encryption and decryption operation takes place through curve. In the proposed system the encryption and key generation process takes place rapidly.]]>

Cryptography technique is used to provide data security. In existing cryptography technique the key generation takes place randomly. Key generation require shared key. If shared key is access by unauthorized user then security becomes disoriented. Hence existing problems are alleviated to give more security to data. In proposed system a algorithm called as Elliptic Curve Cryptography is used. The ECC generates the key by using the point on the curve. The ECC is used for generating the key by using point on the curve and encryption and decryption operation takes place through curve. In the proposed system the encryption and key generation process takes place rapidly.]]>
Wed, 18 May 2016 19:24:29 GMT /slideshow/data-security-using-elliptic-curve-cryptography/62157284 IJCERT@slideshare.net(IJCERT) Data Security Using Elliptic Curve Cryptography IJCERT Cryptography technique is used to provide data security. In existing cryptography technique the key generation takes place randomly. Key generation require shared key. If shared key is access by unauthorized user then security becomes disoriented. Hence existing problems are alleviated to give more security to data. In proposed system a algorithm called as Elliptic Curve Cryptography is used. The ECC generates the key by using the point on the curve. The ECC is used for generating the key by using point on the curve and encryption and decryption operation takes place through curve. In the proposed system the encryption and key generation process takes place rapidly. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/v3i503-160518192429-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cryptography technique is used to provide data security. In existing cryptography technique the key generation takes place randomly. Key generation require shared key. If shared key is access by unauthorized user then security becomes disoriented. Hence existing problems are alleviated to give more security to data. In proposed system a algorithm called as Elliptic Curve Cryptography is used. The ECC generates the key by using the point on the curve. The ECC is used for generating the key by using point on the curve and encryption and decryption operation takes place through curve. In the proposed system the encryption and key generation process takes place rapidly.
Data Security Using Elliptic Curve Cryptography from IJCERT
]]>
527 7 https://cdn.slidesharecdn.com/ss_thumbnails/v3i503-160518192429-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication /slideshow/seccloudpro-a-novel-secure-cloud-storage-system-for-auditing-and-deduplication/62157260 v3i501-160518192355
In this paper, we show the trustworthiness evaluating and secure deduplication over cloud data utilizing imaginative secure frameworks .Usually cloud framework outsourced information at cloud storage is semi-trusted because of absence of security at cloud storage while putting away or sharing at cloud level because of weak cryptosystem information may be uncover or adjusted by the hackers keeping in mind the end goal to ensure clients information protection and security We propose novel progressed secure framework i.e SecCloudPro which empower the cloud framework secured and legitimate utilizing Verifier(TPA) benefit of Cloud Server. Additionally our framework performs data deduplication in a Secured way in requested to enhance the cloud Storage space too data transfer capacity i.e bandwidth.]]>

In this paper, we show the trustworthiness evaluating and secure deduplication over cloud data utilizing imaginative secure frameworks .Usually cloud framework outsourced information at cloud storage is semi-trusted because of absence of security at cloud storage while putting away or sharing at cloud level because of weak cryptosystem information may be uncover or adjusted by the hackers keeping in mind the end goal to ensure clients information protection and security We propose novel progressed secure framework i.e SecCloudPro which empower the cloud framework secured and legitimate utilizing Verifier(TPA) benefit of Cloud Server. Additionally our framework performs data deduplication in a Secured way in requested to enhance the cloud Storage space too data transfer capacity i.e bandwidth.]]>
Wed, 18 May 2016 19:23:55 GMT /slideshow/seccloudpro-a-novel-secure-cloud-storage-system-for-auditing-and-deduplication/62157260 IJCERT@slideshare.net(IJCERT) SecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication IJCERT In this paper, we show the trustworthiness evaluating and secure deduplication over cloud data utilizing imaginative secure frameworks .Usually cloud framework outsourced information at cloud storage is semi-trusted because of absence of security at cloud storage while putting away or sharing at cloud level because of weak cryptosystem information may be uncover or adjusted by the hackers keeping in mind the end goal to ensure clients information protection and security We propose novel progressed secure framework i.e SecCloudPro which empower the cloud framework secured and legitimate utilizing Verifier(TPA) benefit of Cloud Server. Additionally our framework performs data deduplication in a Secured way in requested to enhance the cloud Storage space too data transfer capacity i.e bandwidth. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/v3i501-160518192355-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In this paper, we show the trustworthiness evaluating and secure deduplication over cloud data utilizing imaginative secure frameworks .Usually cloud framework outsourced information at cloud storage is semi-trusted because of absence of security at cloud storage while putting away or sharing at cloud level because of weak cryptosystem information may be uncover or adjusted by the hackers keeping in mind the end goal to ensure clients information protection and security We propose novel progressed secure framework i.e SecCloudPro which empower the cloud framework secured and legitimate utilizing Verifier(TPA) benefit of Cloud Server. Additionally our framework performs data deduplication in a Secured way in requested to enhance the cloud Storage space too data transfer capacity i.e bandwidth.
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication from IJCERT
]]>
172 4 https://cdn.slidesharecdn.com/ss_thumbnails/v3i501-160518192355-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc Network /slideshow/handling-selfishness-in-replica-allocation-over-a-mobile-adhoc-network/62157230 v3i404-160518192300
MANET is a collection of mobile devices that can communicate with each other without the use centralized administration. One of the interesting application of MANET is File Sharing. File Sharing in MANET is similar to that of the regular file sharing, what makes the difference is it allow user to access the data or memory of that nodes only which are connected to it. This File sharing many a times leads to Network Partitioning, i.e dividing a network into two different networks .Due to which the nodes may act selfishly. The selfishness of some of the nodes may lead in reduction of performance in terms of accessing data. The proposed system will use the SCF-tree technique for building a tree of Node which will share their data in terms of Replica, and as a result it detects the selfish node in the network. The replica insures that performance is not degraded.]]>

MANET is a collection of mobile devices that can communicate with each other without the use centralized administration. One of the interesting application of MANET is File Sharing. File Sharing in MANET is similar to that of the regular file sharing, what makes the difference is it allow user to access the data or memory of that nodes only which are connected to it. This File sharing many a times leads to Network Partitioning, i.e dividing a network into two different networks .Due to which the nodes may act selfishly. The selfishness of some of the nodes may lead in reduction of performance in terms of accessing data. The proposed system will use the SCF-tree technique for building a tree of Node which will share their data in terms of Replica, and as a result it detects the selfish node in the network. The replica insures that performance is not degraded.]]>
Wed, 18 May 2016 19:23:00 GMT /slideshow/handling-selfishness-in-replica-allocation-over-a-mobile-adhoc-network/62157230 IJCERT@slideshare.net(IJCERT) Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc Network IJCERT MANET is a collection of mobile devices that can communicate with each other without the use centralized administration. One of the interesting application of MANET is File Sharing. File Sharing in MANET is similar to that of the regular file sharing, what makes the difference is it allow user to access the data or memory of that nodes only which are connected to it. This File sharing many a times leads to Network Partitioning, i.e dividing a network into two different networks .Due to which the nodes may act selfishly. The selfishness of some of the nodes may lead in reduction of performance in terms of accessing data. The proposed system will use the SCF-tree technique for building a tree of Node which will share their data in terms of Replica, and as a result it detects the selfish node in the network. The replica insures that performance is not degraded. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/v3i404-160518192300-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> MANET is a collection of mobile devices that can communicate with each other without the use centralized administration. One of the interesting application of MANET is File Sharing. File Sharing in MANET is similar to that of the regular file sharing, what makes the difference is it allow user to access the data or memory of that nodes only which are connected to it. This File sharing many a times leads to Network Partitioning, i.e dividing a network into two different networks .Due to which the nodes may act selfishly. The selfishness of some of the nodes may lead in reduction of performance in terms of accessing data. The proposed system will use the SCF-tree technique for building a tree of Node which will share their data in terms of Replica, and as a result it detects the selfish node in the network. The replica insures that performance is not degraded.
Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc Network from IJCERT
]]>
137 6 https://cdn.slidesharecdn.com/ss_thumbnails/v3i404-160518192300-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
GSM Based Device Controlling and Fault Detection /slideshow/gsm-based-device-controlling-and-fault-detection/62157187 v3i406-160518192125
The mobile communication has expanded to a great extent such that it can be applied for controlling of electrical devices. These projects make use of this capability of mobile phone to control three electrical devices with some use of embedded technology which can be extended up to eight devices. Apart from controlling it also does the sensing of the devices. Thus a user can be able to know of the status of the devices and in addition to that the user get notified if any fault is detected. Here in the project controlling and sensing is done for three electrical devices only. According to the user need both of this can be expanded. ]]>

The mobile communication has expanded to a great extent such that it can be applied for controlling of electrical devices. These projects make use of this capability of mobile phone to control three electrical devices with some use of embedded technology which can be extended up to eight devices. Apart from controlling it also does the sensing of the devices. Thus a user can be able to know of the status of the devices and in addition to that the user get notified if any fault is detected. Here in the project controlling and sensing is done for three electrical devices only. According to the user need both of this can be expanded. ]]>
Wed, 18 May 2016 19:21:25 GMT /slideshow/gsm-based-device-controlling-and-fault-detection/62157187 IJCERT@slideshare.net(IJCERT) GSM Based Device Controlling and Fault Detection IJCERT The mobile communication has expanded to a great extent such that it can be applied for controlling of electrical devices. These projects make use of this capability of mobile phone to control three electrical devices with some use of embedded technology which can be extended up to eight devices. Apart from controlling it also does the sensing of the devices. Thus a user can be able to know of the status of the devices and in addition to that the user get notified if any fault is detected. Here in the project controlling and sensing is done for three electrical devices only. According to the user need both of this can be expanded. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/v3i406-160518192125-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The mobile communication has expanded to a great extent such that it can be applied for controlling of electrical devices. These projects make use of this capability of mobile phone to control three electrical devices with some use of embedded technology which can be extended up to eight devices. Apart from controlling it also does the sensing of the devices. Thus a user can be able to know of the status of the devices and in addition to that the user get notified if any fault is detected. Here in the project controlling and sensing is done for three electrical devices only. According to the user need both of this can be expanded.
GSM Based Device Controlling and Fault Detection from IJCERT
]]>
330 5 https://cdn.slidesharecdn.com/ss_thumbnails/v3i406-160518192125-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Efficient Multi Server Authentication and Hybrid Authentication Method /slideshow/efficient-multi-server-authentication-and-hybrid-authentication-method/62157175 v3i405-160518192108
Password is used for authentication on many major client-server system, websites etc. Client and a server share a password using Password-authenticated key exchange to authenticate each other and establish a cryptographic key by exchanging generated exchanges. In this scenario, all the passwords are stored in a single server which will authenticate the client. If the server stopped working or compromised, for example, hacking or even insider attack, passwords stored in database will become publicly known. This system proposes that setting where multiple servers which are used to, so that the password can be split in these servers authenticate client and if one server is compromised, the attacker still cannot be able to view the client’s information from the compromised server. This system uses the Advance encryption standard algorithm encryption and for key exchange and some formulae to store the password in multiple server. This system also has the hybrid authentication as another phase to make it more secure and efficient. In the given authentication schema we also use SMS integration API for two step verification.]]>

Password is used for authentication on many major client-server system, websites etc. Client and a server share a password using Password-authenticated key exchange to authenticate each other and establish a cryptographic key by exchanging generated exchanges. In this scenario, all the passwords are stored in a single server which will authenticate the client. If the server stopped working or compromised, for example, hacking or even insider attack, passwords stored in database will become publicly known. This system proposes that setting where multiple servers which are used to, so that the password can be split in these servers authenticate client and if one server is compromised, the attacker still cannot be able to view the client’s information from the compromised server. This system uses the Advance encryption standard algorithm encryption and for key exchange and some formulae to store the password in multiple server. This system also has the hybrid authentication as another phase to make it more secure and efficient. In the given authentication schema we also use SMS integration API for two step verification.]]>
Wed, 18 May 2016 19:21:08 GMT /slideshow/efficient-multi-server-authentication-and-hybrid-authentication-method/62157175 IJCERT@slideshare.net(IJCERT) Efficient Multi Server Authentication and Hybrid Authentication Method IJCERT Password is used for authentication on many major client-server system, websites etc. Client and a server share a password using Password-authenticated key exchange to authenticate each other and establish a cryptographic key by exchanging generated exchanges. In this scenario, all the passwords are stored in a single server which will authenticate the client. If the server stopped working or compromised, for example, hacking or even insider attack, passwords stored in database will become publicly known. This system proposes that setting where multiple servers which are used to, so that the password can be split in these servers authenticate client and if one server is compromised, the attacker still cannot be able to view the client’s information from the compromised server. This system uses the Advance encryption standard algorithm encryption and for key exchange and some formulae to store the password in multiple server. This system also has the hybrid authentication as another phase to make it more secure and efficient. In the given authentication schema we also use SMS integration API for two step verification. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/v3i405-160518192108-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Password is used for authentication on many major client-server system, websites etc. Client and a server share a password using Password-authenticated key exchange to authenticate each other and establish a cryptographic key by exchanging generated exchanges. In this scenario, all the passwords are stored in a single server which will authenticate the client. If the server stopped working or compromised, for example, hacking or even insider attack, passwords stored in database will become publicly known. This system proposes that setting where multiple servers which are used to, so that the password can be split in these servers authenticate client and if one server is compromised, the attacker still cannot be able to view the client’s information from the compromised server. This system uses the Advance encryption standard algorithm encryption and for key exchange and some formulae to store the password in multiple server. This system also has the hybrid authentication as another phase to make it more secure and efficient. In the given authentication schema we also use SMS integration API for two step verification.
Efficient Multi Server Authentication and Hybrid Authentication Method from IJCERT
]]>
123 4 https://cdn.slidesharecdn.com/ss_thumbnails/v3i405-160518192108-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Data Trend Analysis by Assigning Polynomial Function For Given Data Set /slideshow/data-trend-analysis-by-assigning-polynomial-function-for-given-data-set/62157143 v3i403-160518192015
This paper aims at explaining the method of creating a polynomial equation out of the given data set which can be used as a representation of the data itself and can be used to run aggregation against itself to find the results. This approach uses least-squares technique to construct a model of data and fit to a polynomial. Differential calculus technique is used on this equation to generate the aggregated results that represents the original data set.]]>

This paper aims at explaining the method of creating a polynomial equation out of the given data set which can be used as a representation of the data itself and can be used to run aggregation against itself to find the results. This approach uses least-squares technique to construct a model of data and fit to a polynomial. Differential calculus technique is used on this equation to generate the aggregated results that represents the original data set.]]>
Wed, 18 May 2016 19:20:15 GMT /slideshow/data-trend-analysis-by-assigning-polynomial-function-for-given-data-set/62157143 IJCERT@slideshare.net(IJCERT) Data Trend Analysis by Assigning Polynomial Function For Given Data Set IJCERT This paper aims at explaining the method of creating a polynomial equation out of the given data set which can be used as a representation of the data itself and can be used to run aggregation against itself to find the results. This approach uses least-squares technique to construct a model of data and fit to a polynomial. Differential calculus technique is used on this equation to generate the aggregated results that represents the original data set. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/v3i403-160518192015-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This paper aims at explaining the method of creating a polynomial equation out of the given data set which can be used as a representation of the data itself and can be used to run aggregation against itself to find the results. This approach uses least-squares technique to construct a model of data and fit to a polynomial. Differential calculus technique is used on this equation to generate the aggregated results that represents the original data set.
Data Trend Analysis by Assigning Polynomial Function For Given Data Set from IJCERT
]]>
183 6 https://cdn.slidesharecdn.com/ss_thumbnails/v3i403-160518192015-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Online Payment System using Steganography and Visual Cryptography /slideshow/online-payment-system-using-steganography-and-visual-cryptography-62157124/62157124 v3i402-160518191936
In recent time there is rapid growth in E-Commerce market. Major concerns for customers in online shopping are debit card or credit card fraud and personal information security. Identity theft and phishing are common threats of online shopping. Phishing is a method of stealing personal confidential information such as username, passwords and credit card details from victims. It is a social engineering technique used to deceive users. In this paper new method is proposed that uses text based steganography and visual cryptography. It represents new approach which will provide limited information for fund transfer. This method secures the customer's data and increases customer's confidence and prevents identity theft.]]>

In recent time there is rapid growth in E-Commerce market. Major concerns for customers in online shopping are debit card or credit card fraud and personal information security. Identity theft and phishing are common threats of online shopping. Phishing is a method of stealing personal confidential information such as username, passwords and credit card details from victims. It is a social engineering technique used to deceive users. In this paper new method is proposed that uses text based steganography and visual cryptography. It represents new approach which will provide limited information for fund transfer. This method secures the customer's data and increases customer's confidence and prevents identity theft.]]>
Wed, 18 May 2016 19:19:36 GMT /slideshow/online-payment-system-using-steganography-and-visual-cryptography-62157124/62157124 IJCERT@slideshare.net(IJCERT) Online Payment System using Steganography and Visual Cryptography IJCERT In recent time there is rapid growth in E-Commerce market. Major concerns for customers in online shopping are debit card or credit card fraud and personal information security. Identity theft and phishing are common threats of online shopping. Phishing is a method of stealing personal confidential information such as username, passwords and credit card details from victims. It is a social engineering technique used to deceive users. In this paper new method is proposed that uses text based steganography and visual cryptography. It represents new approach which will provide limited information for fund transfer. This method secures the customer's data and increases customer's confidence and prevents identity theft. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/v3i402-160518191936-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In recent time there is rapid growth in E-Commerce market. Major concerns for customers in online shopping are debit card or credit card fraud and personal information security. Identity theft and phishing are common threats of online shopping. Phishing is a method of stealing personal confidential information such as username, passwords and credit card details from victims. It is a social engineering technique used to deceive users. In this paper new method is proposed that uses text based steganography and visual cryptography. It represents new approach which will provide limited information for fund transfer. This method secures the customer&#39;s data and increases customer&#39;s confidence and prevents identity theft.
Online Payment System using Steganography and Visual Cryptography from IJCERT
]]>
771 8 https://cdn.slidesharecdn.com/ss_thumbnails/v3i402-160518191936-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Prevention of Packet Hiding Methods In Selective Jamming Attack /slideshow/prevention-of-packet-hiding-methods-in-selective-jamming-attack/62157104 v3i411-160518191848
The sharing nature of wireless medium provides various challenging features among various set of users. It is very important in real world and it provides better transfer rate but authentication is ignored. The limitations of existing wired network are overcome by wireless network. These networks act as source for various types of jamming attacks. In analysis and detection of jamming attack various methods are available but sometime they fail. In case of external threat the analysis and reporting of jamming attack is very easy model but it is quite difficult in terms of internal threat model, these internal term uses the knowledge about network secrets and network protocols to launch various attacks with very low effort. Various cryptographic techniques are implemented to prevent these attacks. The main goal of this project is to prevent the information at the wireless physical layer and allowed the safe transmission among communicated nodes although the attacker is present.]]>

The sharing nature of wireless medium provides various challenging features among various set of users. It is very important in real world and it provides better transfer rate but authentication is ignored. The limitations of existing wired network are overcome by wireless network. These networks act as source for various types of jamming attacks. In analysis and detection of jamming attack various methods are available but sometime they fail. In case of external threat the analysis and reporting of jamming attack is very easy model but it is quite difficult in terms of internal threat model, these internal term uses the knowledge about network secrets and network protocols to launch various attacks with very low effort. Various cryptographic techniques are implemented to prevent these attacks. The main goal of this project is to prevent the information at the wireless physical layer and allowed the safe transmission among communicated nodes although the attacker is present.]]>
Wed, 18 May 2016 19:18:48 GMT /slideshow/prevention-of-packet-hiding-methods-in-selective-jamming-attack/62157104 IJCERT@slideshare.net(IJCERT) Prevention of Packet Hiding Methods In Selective Jamming Attack IJCERT The sharing nature of wireless medium provides various challenging features among various set of users. It is very important in real world and it provides better transfer rate but authentication is ignored. The limitations of existing wired network are overcome by wireless network. These networks act as source for various types of jamming attacks. In analysis and detection of jamming attack various methods are available but sometime they fail. In case of external threat the analysis and reporting of jamming attack is very easy model but it is quite difficult in terms of internal threat model, these internal term uses the knowledge about network secrets and network protocols to launch various attacks with very low effort. Various cryptographic techniques are implemented to prevent these attacks. The main goal of this project is to prevent the information at the wireless physical layer and allowed the safe transmission among communicated nodes although the attacker is present. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/v3i411-160518191848-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The sharing nature of wireless medium provides various challenging features among various set of users. It is very important in real world and it provides better transfer rate but authentication is ignored. The limitations of existing wired network are overcome by wireless network. These networks act as source for various types of jamming attacks. In analysis and detection of jamming attack various methods are available but sometime they fail. In case of external threat the analysis and reporting of jamming attack is very easy model but it is quite difficult in terms of internal threat model, these internal term uses the knowledge about network secrets and network protocols to launch various attacks with very low effort. Various cryptographic techniques are implemented to prevent these attacks. The main goal of this project is to prevent the information at the wireless physical layer and allowed the safe transmission among communicated nodes although the attacker is present.
Prevention of Packet Hiding Methods In Selective Jamming Attack from IJCERT
]]>
126 5 https://cdn.slidesharecdn.com/ss_thumbnails/v3i411-160518191848-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
AUTOMATIC SPEECH RECOGNITION- A SURVEY /IJCERT/automatic-speech-recognition-a-survey v3i410-160518191745
Speech recognition is the next big step that the technology needs to take for general users. An Automatic Speech Recognition (ASR) will play a major role in focusing new technology to users. Applications of ASR are speech to text conversion, voice input in aircraft, data entry, voice user interfaces such as voice dialing. Speech recognition involves extracting features from the input signal and classifying them to classes using pattern matching model. This can be done using feature extraction method. This paper involves a general study of automatic speech recognition and various methods to generate an ASR system. General techniques that can be used to implement an ASR includes artificial neural networks, Hidden Markov model, acoustic –phonetic approach]]>

Speech recognition is the next big step that the technology needs to take for general users. An Automatic Speech Recognition (ASR) will play a major role in focusing new technology to users. Applications of ASR are speech to text conversion, voice input in aircraft, data entry, voice user interfaces such as voice dialing. Speech recognition involves extracting features from the input signal and classifying them to classes using pattern matching model. This can be done using feature extraction method. This paper involves a general study of automatic speech recognition and various methods to generate an ASR system. General techniques that can be used to implement an ASR includes artificial neural networks, Hidden Markov model, acoustic –phonetic approach]]>
Wed, 18 May 2016 19:17:45 GMT /IJCERT/automatic-speech-recognition-a-survey IJCERT@slideshare.net(IJCERT) AUTOMATIC SPEECH RECOGNITION- A SURVEY IJCERT Speech recognition is the next big step that the technology needs to take for general users. An Automatic Speech Recognition (ASR) will play a major role in focusing new technology to users. Applications of ASR are speech to text conversion, voice input in aircraft, data entry, voice user interfaces such as voice dialing. Speech recognition involves extracting features from the input signal and classifying them to classes using pattern matching model. This can be done using feature extraction method. This paper involves a general study of automatic speech recognition and various methods to generate an ASR system. General techniques that can be used to implement an ASR includes artificial neural networks, Hidden Markov model, acoustic –phonetic approach <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/v3i410-160518191745-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Speech recognition is the next big step that the technology needs to take for general users. An Automatic Speech Recognition (ASR) will play a major role in focusing new technology to users. Applications of ASR are speech to text conversion, voice input in aircraft, data entry, voice user interfaces such as voice dialing. Speech recognition involves extracting features from the input signal and classifying them to classes using pattern matching model. This can be done using feature extraction method. This paper involves a general study of automatic speech recognition and various methods to generate an ASR system. General techniques that can be used to implement an ASR includes artificial neural networks, Hidden Markov model, acoustic –phonetic approach
AUTOMATIC SPEECH RECOGNITION- A SURVEY from IJCERT
]]>
532 11 https://cdn.slidesharecdn.com/ss_thumbnails/v3i410-160518191745-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Implementation of Motion Model Using Vanet /slideshow/implementation-of-motion-model-using-vanet/62157007 v3i413-160518191615
A collection of mobile nodes is known as ad-hoc network in which wireless communication network is used to connect these mobile nodes. A major requirement on the MANET is to provide unidentifiability and unlinkability for mobile nodes During the last few decades, continuous progresses in wireless communications have opened new research fields in computer networking, goal of extending data networks connectivity to environments where wired solutions are impracticable. Among these, vehicular traffic is attracting a increasing attention from both academic and industry, due to the amount and importance of the related applications, ranging from road safety to traffic control, up to mobile entertainment. Vehicular Ad-hoc Network(VANETs) are self-organized networks built up from moving vehicles, and are part of the broader class of Mobile Ad-hoc Net- works(MANETs). Because of their peculiar characteristics, VANETs require the definition of specific networking techniques, whose feasibility and performance are usually tested by means of simulation. One of the main challenges posed by VANETs simulations is the faithful characterization of vehicular mobility at both macroscopic and microscopic levels, leads to realistic non-uniform distributions of cars and velocity, and unique connectivity dynamics. There are various secure routing protocols have been proposed, but the requirement is not satisfied. The existing protocols are unguarded to the attacks of fake routing packets. Simulation results have demonstrated the effectiveness of the proposed AODV protocol with improved performance as compared to the existing protocols.]]>

A collection of mobile nodes is known as ad-hoc network in which wireless communication network is used to connect these mobile nodes. A major requirement on the MANET is to provide unidentifiability and unlinkability for mobile nodes During the last few decades, continuous progresses in wireless communications have opened new research fields in computer networking, goal of extending data networks connectivity to environments where wired solutions are impracticable. Among these, vehicular traffic is attracting a increasing attention from both academic and industry, due to the amount and importance of the related applications, ranging from road safety to traffic control, up to mobile entertainment. Vehicular Ad-hoc Network(VANETs) are self-organized networks built up from moving vehicles, and are part of the broader class of Mobile Ad-hoc Net- works(MANETs). Because of their peculiar characteristics, VANETs require the definition of specific networking techniques, whose feasibility and performance are usually tested by means of simulation. One of the main challenges posed by VANETs simulations is the faithful characterization of vehicular mobility at both macroscopic and microscopic levels, leads to realistic non-uniform distributions of cars and velocity, and unique connectivity dynamics. There are various secure routing protocols have been proposed, but the requirement is not satisfied. The existing protocols are unguarded to the attacks of fake routing packets. Simulation results have demonstrated the effectiveness of the proposed AODV protocol with improved performance as compared to the existing protocols.]]>
Wed, 18 May 2016 19:16:15 GMT /slideshow/implementation-of-motion-model-using-vanet/62157007 IJCERT@slideshare.net(IJCERT) Implementation of Motion Model Using Vanet IJCERT A collection of mobile nodes is known as ad-hoc network in which wireless communication network is used to connect these mobile nodes. A major requirement on the MANET is to provide unidentifiability and unlinkability for mobile nodes During the last few decades, continuous progresses in wireless communications have opened new research fields in computer networking, goal of extending data networks connectivity to environments where wired solutions are impracticable. Among these, vehicular traffic is attracting a increasing attention from both academic and industry, due to the amount and importance of the related applications, ranging from road safety to traffic control, up to mobile entertainment. Vehicular Ad-hoc Network(VANETs) are self-organized networks built up from moving vehicles, and are part of the broader class of Mobile Ad-hoc Net- works(MANETs). Because of their peculiar characteristics, VANETs require the definition of specific networking techniques, whose feasibility and performance are usually tested by means of simulation. One of the main challenges posed by VANETs simulations is the faithful characterization of vehicular mobility at both macroscopic and microscopic levels, leads to realistic non-uniform distributions of cars and velocity, and unique connectivity dynamics. There are various secure routing protocols have been proposed, but the requirement is not satisfied. The existing protocols are unguarded to the attacks of fake routing packets. Simulation results have demonstrated the effectiveness of the proposed AODV protocol with improved performance as compared to the existing protocols. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/v3i413-160518191615-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A collection of mobile nodes is known as ad-hoc network in which wireless communication network is used to connect these mobile nodes. A major requirement on the MANET is to provide unidentifiability and unlinkability for mobile nodes During the last few decades, continuous progresses in wireless communications have opened new research fields in computer networking, goal of extending data networks connectivity to environments where wired solutions are impracticable. Among these, vehicular traffic is attracting a increasing attention from both academic and industry, due to the amount and importance of the related applications, ranging from road safety to traffic control, up to mobile entertainment. Vehicular Ad-hoc Network(VANETs) are self-organized networks built up from moving vehicles, and are part of the broader class of Mobile Ad-hoc Net- works(MANETs). Because of their peculiar characteristics, VANETs require the definition of specific networking techniques, whose feasibility and performance are usually tested by means of simulation. One of the main challenges posed by VANETs simulations is the faithful characterization of vehicular mobility at both macroscopic and microscopic levels, leads to realistic non-uniform distributions of cars and velocity, and unique connectivity dynamics. There are various secure routing protocols have been proposed, but the requirement is not satisfied. The existing protocols are unguarded to the attacks of fake routing packets. Simulation results have demonstrated the effectiveness of the proposed AODV protocol with improved performance as compared to the existing protocols.
Implementation of Motion Model Using Vanet from IJCERT
]]>
143 4 https://cdn.slidesharecdn.com/ss_thumbnails/v3i413-160518191615-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Intelligent Device TO Device Communication Using IoT /slideshow/intelligent-device-to-device-communication-using-iot/62156973 v3i409-160518191535
Internet is becoming the most intrinsic part of the human life. There are many users of the internet but the devices will be the main users in the Internet of Things (IoT). These devices communicate with each other efficiently and gather the information to transfer the data to particular device. The quality of this information depends on how smart the devices are. IoT coverage is very wide and consists of the things or devices connected in network like camera, android phones, sensors etc. Once all these devices are connected with each other, they are capable of processing smartly and satisfying basic needs of environment. Thus the communication between the devices is achieved using various technologies and devices.]]>

Internet is becoming the most intrinsic part of the human life. There are many users of the internet but the devices will be the main users in the Internet of Things (IoT). These devices communicate with each other efficiently and gather the information to transfer the data to particular device. The quality of this information depends on how smart the devices are. IoT coverage is very wide and consists of the things or devices connected in network like camera, android phones, sensors etc. Once all these devices are connected with each other, they are capable of processing smartly and satisfying basic needs of environment. Thus the communication between the devices is achieved using various technologies and devices.]]>
Wed, 18 May 2016 19:15:35 GMT /slideshow/intelligent-device-to-device-communication-using-iot/62156973 IJCERT@slideshare.net(IJCERT) Intelligent Device TO Device Communication Using IoT IJCERT Internet is becoming the most intrinsic part of the human life. There are many users of the internet but the devices will be the main users in the Internet of Things (IoT). These devices communicate with each other efficiently and gather the information to transfer the data to particular device. The quality of this information depends on how smart the devices are. IoT coverage is very wide and consists of the things or devices connected in network like camera, android phones, sensors etc. Once all these devices are connected with each other, they are capable of processing smartly and satisfying basic needs of environment. Thus the communication between the devices is achieved using various technologies and devices. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/v3i409-160518191535-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Internet is becoming the most intrinsic part of the human life. There are many users of the internet but the devices will be the main users in the Internet of Things (IoT). These devices communicate with each other efficiently and gather the information to transfer the data to particular device. The quality of this information depends on how smart the devices are. IoT coverage is very wide and consists of the things or devices connected in network like camera, android phones, sensors etc. Once all these devices are connected with each other, they are capable of processing smartly and satisfying basic needs of environment. Thus the communication between the devices is achieved using various technologies and devices.
Intelligent Device TO Device Communication Using IoT from IJCERT
]]>
424 6 https://cdn.slidesharecdn.com/ss_thumbnails/v3i409-160518191535-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Secure Routing for MANET in Adversarial Environment /slideshow/secure-routing-for-manet-in-adversarial-environment/62156916 v3i415-160518191343
Collection of mobile nodes is known as ad-hoc network in which wireless communication is used to connect these mobile nodes. A major requirement on the MANET is to provide unidentifiability and unlinkability for mobile nodes. There are various secure routing protocols have been proposed, but the requirement is not satisfied. The existing protocols are unguarded to the attacks of fake routing packets or denial-of-service broadcasting, even the node identities are protected by pseudonyms. We propose a new secure routing protocol which provides anonymity named as authenticated anonymous secure routing (AASR), to satisfy the requirement of mobile networks and defend the attacks. The route request packets are authenticated by a group signature and public key infrastructure, to defend the potential attacks without exposing the node identities. The cocept of key-encrypted onion routing which provides a route secret verification message, to prevent intermediate nodes from inferring a real destination. Simulation results have demonstrated the effectiveness of the proposed AASR protocol with improved performance as compared to the existing protocols.]]>

Collection of mobile nodes is known as ad-hoc network in which wireless communication is used to connect these mobile nodes. A major requirement on the MANET is to provide unidentifiability and unlinkability for mobile nodes. There are various secure routing protocols have been proposed, but the requirement is not satisfied. The existing protocols are unguarded to the attacks of fake routing packets or denial-of-service broadcasting, even the node identities are protected by pseudonyms. We propose a new secure routing protocol which provides anonymity named as authenticated anonymous secure routing (AASR), to satisfy the requirement of mobile networks and defend the attacks. The route request packets are authenticated by a group signature and public key infrastructure, to defend the potential attacks without exposing the node identities. The cocept of key-encrypted onion routing which provides a route secret verification message, to prevent intermediate nodes from inferring a real destination. Simulation results have demonstrated the effectiveness of the proposed AASR protocol with improved performance as compared to the existing protocols.]]>
Wed, 18 May 2016 19:13:43 GMT /slideshow/secure-routing-for-manet-in-adversarial-environment/62156916 IJCERT@slideshare.net(IJCERT) Secure Routing for MANET in Adversarial Environment IJCERT Collection of mobile nodes is known as ad-hoc network in which wireless communication is used to connect these mobile nodes. A major requirement on the MANET is to provide unidentifiability and unlinkability for mobile nodes. There are various secure routing protocols have been proposed, but the requirement is not satisfied. The existing protocols are unguarded to the attacks of fake routing packets or denial-of-service broadcasting, even the node identities are protected by pseudonyms. We propose a new secure routing protocol which provides anonymity named as authenticated anonymous secure routing (AASR), to satisfy the requirement of mobile networks and defend the attacks. The route request packets are authenticated by a group signature and public key infrastructure, to defend the potential attacks without exposing the node identities. The cocept of key-encrypted onion routing which provides a route secret verification message, to prevent intermediate nodes from inferring a real destination. Simulation results have demonstrated the effectiveness of the proposed AASR protocol with improved performance as compared to the existing protocols. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/v3i415-160518191343-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Collection of mobile nodes is known as ad-hoc network in which wireless communication is used to connect these mobile nodes. A major requirement on the MANET is to provide unidentifiability and unlinkability for mobile nodes. There are various secure routing protocols have been proposed, but the requirement is not satisfied. The existing protocols are unguarded to the attacks of fake routing packets or denial-of-service broadcasting, even the node identities are protected by pseudonyms. We propose a new secure routing protocol which provides anonymity named as authenticated anonymous secure routing (AASR), to satisfy the requirement of mobile networks and defend the attacks. The route request packets are authenticated by a group signature and public key infrastructure, to defend the potential attacks without exposing the node identities. The cocept of key-encrypted onion routing which provides a route secret verification message, to prevent intermediate nodes from inferring a real destination. Simulation results have demonstrated the effectiveness of the proposed AASR protocol with improved performance as compared to the existing protocols.
Secure Routing for MANET in Adversarial Environment from IJCERT
]]>
185 4 https://cdn.slidesharecdn.com/ss_thumbnails/v3i415-160518191343-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Real Time Detection System of Driver Fatigue /slideshow/real-time-detection-system-of-driver-fatigue/62156905 v3i414-160518191328
The leading cause of vehicle crashes and accidents is the driver distraction. With the rapid development of motorization, driver fatigue has become a very serious traffic problem. Reasons for traffic accidents are driving after alcohol consumption, driving at night, driving without taking rest, aging, sleepiness, and fatigue occurred due to continuous driving, long working hours and night shifts. So to reduce rate of accidents due to above reasons, is aim of this project. This paper presents a method for detection of early signs of fatigue using feature extraction, Haar classifier and delivering of information and whereabouts of the driver to the emergency contact numbers.]]>

The leading cause of vehicle crashes and accidents is the driver distraction. With the rapid development of motorization, driver fatigue has become a very serious traffic problem. Reasons for traffic accidents are driving after alcohol consumption, driving at night, driving without taking rest, aging, sleepiness, and fatigue occurred due to continuous driving, long working hours and night shifts. So to reduce rate of accidents due to above reasons, is aim of this project. This paper presents a method for detection of early signs of fatigue using feature extraction, Haar classifier and delivering of information and whereabouts of the driver to the emergency contact numbers.]]>
Wed, 18 May 2016 19:13:28 GMT /slideshow/real-time-detection-system-of-driver-fatigue/62156905 IJCERT@slideshare.net(IJCERT) Real Time Detection System of Driver Fatigue IJCERT The leading cause of vehicle crashes and accidents is the driver distraction. With the rapid development of motorization, driver fatigue has become a very serious traffic problem. Reasons for traffic accidents are driving after alcohol consumption, driving at night, driving without taking rest, aging, sleepiness, and fatigue occurred due to continuous driving, long working hours and night shifts. So to reduce rate of accidents due to above reasons, is aim of this project. This paper presents a method for detection of early signs of fatigue using feature extraction, Haar classifier and delivering of information and whereabouts of the driver to the emergency contact numbers. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/v3i414-160518191328-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The leading cause of vehicle crashes and accidents is the driver distraction. With the rapid development of motorization, driver fatigue has become a very serious traffic problem. Reasons for traffic accidents are driving after alcohol consumption, driving at night, driving without taking rest, aging, sleepiness, and fatigue occurred due to continuous driving, long working hours and night shifts. So to reduce rate of accidents due to above reasons, is aim of this project. This paper presents a method for detection of early signs of fatigue using feature extraction, Haar classifier and delivering of information and whereabouts of the driver to the emergency contact numbers.
Real Time Detection System of Driver Fatigue from IJCERT
]]>
238 6 https://cdn.slidesharecdn.com/ss_thumbnails/v3i414-160518191328-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-IJCERT-48x48.jpg?cb=1569849972 International Journal of Computer Engineering in Research Trends (IJCERT) ISSN(Online):2349-7084, SJIF Journal Impact Factor: 4.029 andGlobal Impact Factor:0.565 and is a scholarly Online, Open Access, Peer-Reviewed, interdisciplinary, monthly, and fully refereed journal.IJCERT is one of the most trusted, leading and fastest growing research Journal publishing organization in the world. IJCERT Approved by "National Science Library[NSL]. National Institute of Science Communication and Information Resources[NISCAIR],Council of Scientific and Industrial Research, New Delhi, India. www.ijcert.org https://cdn.slidesharecdn.com/ss_thumbnails/v3i1106-161203153316-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/parametric-optimization-of-rectangular-beam-type-load-cell-using-taguchi-method/69790044 Parametric Optimizatio... https://cdn.slidesharecdn.com/ss_thumbnails/v3i1105-161203153302-thumbnail.jpg?width=320&height=320&fit=bounds IJCERT/robust-resource-allocation-in-relay-node-networks-for-optimization-process Robust Resource Alloca... https://cdn.slidesharecdn.com/ss_thumbnails/v3i1104-161203153251-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/software-engineering-domain-knowledge-to-identify-duplicate-bug-reports/69790036 Software Engineering D...