37 research outputs found

    A Review of Privacy Preserving Techniques in Wireless Sensor Network

    Get PDF
    This paper represents a review of privacy preserving techniques in wireless sensor network. Wireless sensor networks are not secure. To preserve privacy of wireless sensor network various techniques are discovered. A lot of work has been done to address challenges faced to preserve privacy of wireless sensor network. In this paper we represent a research on privacy preserving techniques used in location privacy, data privacy and network privacy. This paper should provide help for further research in privacy preservation in wireless sensor network. Keywords: Context privacy, data privacy, source location privac

    Harvesting Image Databases from The Web

    Get PDF
    The research work presented here includes data mining needs and study of their algorithm for various extraction purpose. It also includes work that has been done in the field of harvesting images from web. Here the proposed method is to harvest image databases from web. We can automatically generate a large number of images for a specified object. By applying concept of data mining and the algorithm from data mining which is used for extraction of data or harvesting images. A multimodal approach employing text ,metadata and visual  features is used to gather many high-quality images from the web. The modules can be made to find query images by selecting images where nearby text is top ranked by the topic i.e., formation of image clusters then download associate images by using approaches like web search, image search and Google images. Apply re-ranking algorithm and then filtering process to harvest the images.Currently, image search gives a very low precision (only about 4%) and is not used for the harvesting experiments. Since the movements of the technologies are growing rapidly the kinds of work also need to be grown up. This work shows an approach to harvest a large number of images of a particular class automatically and to achieve this with high precision by providing training databases so that a new object model can be learned effortlessly. Many other tools also are available for harvesting images from web .An approach in this paper is original and up to the mark. Keywords: Legacy code, re-engineering, class diagrams, Aggregation, Association, Attribute

    A Review of Privacy Preserving Techniques inWireless Sensor Network

    Get PDF
    This paper represents a review of privacy preserving techniques in wireless sensor network. Wireless sensor networks are not secure. To preserve privacy of wireless sensor network various techniques are discovered. A lot of work has been done to address challenges faced to preserve privacy of wireless sensor network. In this paper we represent a research on privacy preserving techniques used in location privacy, data privacy and network privacy. This paper should provide help for further research in privacy preservation in wireless sensor network. Keywords: Context privacy, data privacy, source location privac

    An Ant Colony Optimization based Routing Techniques for VANET

    Get PDF
    With number of moving vehicles, vehicular Ad Hoc Network (VANET) is formed. These are provided with the wireless connections. Among various challenges in the VANET such as security and privacy of the messages, data forwarding is also considered as a major challenge. The effective communication is mainly depends on the how safely and fast the data is being forwarded among the vehicles. Data forwarding using Greedy mechanism suitable for routing in the VANETs, it depends only on the position of nodes and also data forwarding is done with minimum number of hops. In this paper, Position based GPCR and topology based DYMO routing protocol are adapted to make the use of Ant Colony Optimization (ACO) procedures. The resulting bio-inspired protocols, ACO_GPCR and ACO_DYMO had its performance evaluated and compared against existing GPCR and DYMO routing protocols. The obtained results suggest that making the use of ACO algorithm make these protocols more efficient in terms of Delay, Jitter, Packet Delivery Ratio and energy consumption

    SYNTHESIS AND CHARACTERIZATION OF A NOVEL MUCOADHESIVE DERIVATIVE OF PSYLLIUM SEED POLYSACCHARIDE

    Get PDF
    Objective: In the present study, thiol-functionalization of psyllium seed polysaccharide (PSY) was cross-linked with thioglycolic acid by esterification in an attempt to reveal the mucoadhesive properties of thiolated psyllium seed polysaccharide (TPSY).Methods: The crosslinking was carried out by the microwave-assisted method. A simplex centroid design was employed to systematically study the mucoadhesive strength, mucoadhesive retention time and drug release profile. Comparative evaluation of carbopol-based ciprofloxacin hydrochloride (HCl) tablets containing PSY and TPSY was carried out. Acute oral toxicity studies and repeated oral toxicity for TPSY were also conducted.Results: Thiol-functionalization was confirmed by-SH stretch in Fourier Transform infra-red spectra at 2353 cm-1. Thiolation was observed in thiolated PSY (TPSY) by a change in the surface morphology of psyllium from fibrous to granular and resulted in 82 %swelling in deionized water. TPSY was found to contain 102.35 mmol of thiol groups/g as determined by the Ellman's method. The percent increase in mucoadhesive strength of TPSY was found to be 50.31 % as compared to PSY and 128.30 % as compared to carbopol. The percent increase in mucoadhesive retention time of TPSY was found to be 110 % as compared to PSY and 50 % as compared to carbopol.Conclusion: Mucoadhesion strength and mucoadhesive retention time were greater of tablets containing a higher amount of TPSY. Further, the acute oral toxicity studies and repeated oral toxicity for TPSY proved it as non-toxic and hence safe for human use

    A Review on IOT Techniques for Automating Devices

    Get PDF
    Nowadays world of Internet is changing towards Internet-of-Things simply called as IoT, where all things which we use in our day to day life connects to internet and can be monitor & can be operate remotely. IoT has many applications in all domains such as industrial wireless sensor network, smart homes, agriculture, etc. IoT uses standard protocols and predefined architecture for deployment using Smart technologies such as Radio Frequency Identification, Wireless Sensors, Actuators, Zigbee, etc. for communication. Applications of IoT are increasing day by day in many domains. This paper proposed an overview on architecture of IoT and technologies used in IoT. Applications of IoT, Problems in IoT and suitable solutions are also presented in this survey paper. DOI: 10.17762/ijritcc2321-8169.16041

    A Review : Biometric Fingerprint Recognition For Bus Ticket System.

    Get PDF
    Prior work has shown that when traveling in a bus the payment done for ticket is by cash .The bus ticket has such a payment figure which makes the traveler or the conductor short of money in terms of change. This makes the conductor to keep the change with himself .This creates inconvenience to the travelers. Hence there is a need for better work environment. To overcome this problem we are making use of fingerprints of the traveler which are linked to the database. The registration process will take all the details of the user when traveling for the first time. The account is created with some e-money in it .While traveling user has to give his fingerprint and pay the money for ticket through his account automatically .This overcomes the user inconvenience

    Smart Ration Card System using RFID and Embedded System

    Get PDF
    In the present days many immoral activities are taking place in ration shop, which are meant to distribute the commodities to the people who are in below the poverty line, as the distribution process is manually operated and due to which it consumes a lots of time. To overcome this problem we one can use RFID technology. In this report RFID tags are introduced, the RFID card are used instead of ration cards, which consists of all the details about the card holder like family details, type of card and its validity etc. In this report we are going to discuss different types of automatic ration distribution system implemented for the automatic ration distribution
    corecore