81 research outputs found

    Review on Swarm Intelligence Optimization Techniques for Obstacle-Avoidance Localization in Wireless Sensor Networks

    Get PDF
    Wireless sensor network (WSN) is an evolving research topic with potential applications. In WSN, the nodes are spatially distributed and determining the path of transmission high challenging. Localization eases the path determining process between source and destination. The article, describes the localization techniques based on wireless sensor networks. Sensor network has been made viable by the convergence of Micro Electro- Mechanical Systems technology. The mobile anchor is used for optimizing the path planning location-aware mobile node. Two optimization algorithms have been used for reviewing the performacne. They are Grey Wolf Optimizer(GWO) and Whale Optimization Algorithm(WOA). The results show that WOA outperforms in maximizing the localization accuracy

    Review on Swarm Intelligence Optimization Techniques for Obstacle-Avoidance Localization in Wireless Sensor Networks

    Get PDF
    Wireless sensor network (WSN) is an evolving research topic with potential applications. In WSN, the nodes are spatially distributed and determining the path of transmission high challenging. Localization eases the path determining process between source and destination. The article, describes the localization techniques based on wireless sensor networks. Sensor network has been made viable by the convergence of Micro Electro- Mechanical Systems technology. The mobile anchor is used for optimizing the path planning location-aware mobile node. Two optimization algorithms have been used for reviewing the performacne. They are Grey Wolf Optimizer(GWO) and Whale Optimization Algorithm(WOA). The results show that WOA outperforms in maximizing the localization accuracy

    Investigation of Effective Classification Method for Online Health Service Recommendation System

    Get PDF
    Hospital Recommendation Services have been gaining popularity these days. There are many applications and systems that are recommending hospitals based on the user’s requirements and to meet the patient satisfaction. These applications take the reviews of the patients and the users and based on these reviews, they recommend the hospitals. Also if a person is new to the location that he is currently residing, when the speciality is given as input by him, then these applications recommend the hospitals. But the problem is that everyone is not aware of the medical terms like specialities. For those people, “Health Service Recommendation System” comes handy. “Health Service Recommendation System” is an Android Application for finding hospitals within a specified range of distance and requirements provided by the client using the Naïve Bayes classification algorithm. Naïve Bayes algorithm classifies the speciality and thus helps in achieving the maximum accuracy compared to the other algorithms used. This application is helpful even for the people who are not aware of the specialities of the hospitals

    Implementation of Deduplication on Encrypted Big-data using Signcryption for cloud storage applications

    Get PDF
    As Big Data Cloud storage servers are getting widespread the shortage of disc space within the cloud becomes a major concern. The elimination of duplicate or redundant data, particularly in computer data is named deduplication. Data deduplication is a method to regulate the explosive growth of information within the cloud storage, most of the storage providers are finding more secure and efficient methods for their sensitive method. Recently, a noteworthy technique referred to as signcryption has been proposed, in which both the properties of signature (ownership) and encryption are simultaneously implemented with better performance According to deduplication, we introduce a method that can eliminate redundant encrypted data owned by different users. Furthermore, we generate a tag which will be the key component of big data management. We propose a technique called digital signature for ownership verification. Convergent encryption also called for a content hash key cryptosystem. Convergent encryption is an encryption approach that supports deduplication. With this encryption technique, the encryption key is generated out of a hash of plain text. Therefore applying this technique, identical plaintexts would turn out the same ciphertext

    Implementation of Deduplication on Encrypted Big-data using Signcryption for cloud storage applications

    Get PDF
    As Big Data Cloud storage servers are getting widespread the shortage of disc space within the cloud becomes a major concern. The elimination of duplicate or redundant data, particularly in computer data is named deduplication. Data deduplication is a method to regulate the explosive growth of information within the cloud storage, most of the storage providers are finding more secure and efficient methods for their sensitive method. Recently, a noteworthy technique referred to as signcryption has been proposed, in which both the properties of signature (ownership) and encryption are simultaneously implemented with better performance According to deduplication, we introduce a method that can eliminate redundant encrypted data owned by different users. Furthermore, we generate a tag which will be the key component of big data management. We propose a technique called digital signature for ownership verification. Convergent encryption also called for a content hash key cryptosystem. Convergent encryption is an encryption approach that supports deduplication. With this encryption technique, the encryption key is generated out of a hash of plain text. Therefore applying this technique, identical plaintexts would turn out the same ciphertext

    Investigation of Effective Classification Method for Online Health Service Recommendation System

    Get PDF
    Hospital Recommendation Services have been gaining popularity these days. There are many applications and systems that are recommending hospitals based on the user’s requirements and to meet the patient satisfaction. These applications take the reviews of the patients and the users and based on these reviews, they recommend the hospitals. Also if a person is new to the location that he is currently residing, when the speciality is given as input by him, then these applications recommend the hospitals. But the problem is that everyone is not aware of the medical terms like specialities. For those people, “Health Service Recommendation System” comes handy. “Health Service Recommendation System” is an Android Application for finding hospitals within a specified range of distance and requirements provided by the client using the Naïve Bayes classification algorithm. Naïve Bayes algorithm classifies the speciality and thus helps in achieving the maximum accuracy compared to the other algorithms used. This application is helpful even for the people who are not aware of the specialities of the hospitals

    Secured Transmission of a compressed image by using ECC

    Get PDF
    Security is the main issue concerned with protecting the digital images that are transmitted over the network. By providing the high security, the digital images on the network can be protected from various types of attacks. A Cryptographic technique plays a major role in providing the security goals such as confidentiality and integrity for digital images. Elliptical curve cryptography (ECC) is the asymmetric encryption which is used to apply to the images that result from DWT Compression. Discrete Wavelet Transform (DWT) is an important compression technique which is used to compress the image effectively. It represents the input data in the form of the low pass (approximate) and high pass (detailed) coefficients. These coefficients are entered into the filters. The outputs from these filters are down-sampled for compression. In this paper, the transmitted images via wireless network were secured by encryption using the public key. The sender will generate the private key from the compressed image based on elliptical curve cryptography. The Sender will send the compressed image and private key separately to the receiver. DWT provides high compression ratio and robustness for protecting the digital image integrity. This experiment result provides some performance measures such as Peak Signal to Noise Ratio (PSNR), Bit Error Rate (BER) and Mean Squared Error (MSE). It also provides high integrity for transmitted digital images

    Secured Transmission of a compressed image by using ECC

    Get PDF
    Security is the main issue concerned with protecting the digital images that are transmitted over the network. By providing the high security, the digital images on the network can be protected from various types of attacks. A Cryptographic technique plays a major role in providing the security goals such as confidentiality and integrity for digital images. Elliptical curve cryptography (ECC) is the asymmetric encryption which is used to apply to the images that result from DWT Compression. Discrete Wavelet Transform (DWT) is an important compression technique which is used to compress the image effectively. It represents the input data in the form of the low pass (approximate) and high pass (detailed) coefficients. These coefficients are entered into the filters. The outputs from these filters are down-sampled for compression. In this paper, the transmitted images via wireless network were secured by encryption using the public key. The sender will generate the private key from the compressed image based on elliptical curve cryptography. The Sender will send the compressed image and private key separately to the receiver. DWT provides high compression ratio and robustness for protecting the digital image integrity. This experiment result provides some performance measures such as Peak Signal to Noise Ratio (PSNR), Bit Error Rate (BER) and Mean Squared Error (MSE). It also provides high integrity for transmitted digital images

    Genetic Algorithm based Cluster Head Selection for Optimimized Communication in Wireless Sensor Network

    Get PDF
    Wireless Sensor Network (WSNs) utilizes conveyed gadgets sensors for observing physical or natural conditions. It has been given to the steering conventions which may contrast contingent upon the application and system design. Vitality administration in WSN is of incomparable significance for the remotely sent vitality sensor hubs. The hubs can be obliged in the little gatherings called the Clusters. Clustering is done to accomplish the vitality effectiveness and the versatility of the system. Development of the group likewise includes the doling out the part to the hub based on their borders. In this paper, a novel strategy for cluster head selection based on Genetic Algorithm (GA) has been proposed. Every person in the GA populace speaks to a conceivable answer for the issue. Discovering people who are the best proposals to the enhancement issue and join these people into new people is a critical phase of the transformative procedure. The Cluster Head (CH) is picked using the proposed technique Genetic Algorithm based Cluster Head (GACH). The performance of the proposed system GACH has been compared with Particle Swarm Optimization Cluster Head (PSOCH). Simulations have been conducted with 14 wireless sensor nodes scattered around 8 kilometers. Results proves that GACH outperforms than PSOCH in terms of throughput, packet delivery ratio and energy efficiency

    An Enhanced Least Significant Bit Steganography to Improve the Effectiveness of Graphical Password Authentication

    Get PDF
    Authentication means acknowledging a user’s identity. It is the way of associating a request with a set of identity. The identification provided is an authorized user’s information on a personal computer system or within an authentication server. A graphical password is a validation system in which user has to select from images, in a particular order, presented in a graphical user + interface (GUI). Graphical passwords can be easily remembered, as users remember images better than words. Also, the system should be more unaffected by brute-force attacks, because there is practically an infinite search space. Complex text passwords are hard to remember and simple textual passwords are easy to guess. Graphical passwords provide more robustness and memorability. It is a secure mechanism to provide authenticated sign up to a system
    • …
    corecore