El documento describe las diferentes etapas del procesamiento de información en una computadora, incluyendo encender el equipo, cargar el sistema operativo, imprimir texto, y escribir en un procesador de texto.
Analysis of Cryptographic Algorithms for Network SecurityEditor IJCATR
Cryptography plays a major role in securing data. It is used to ensure that the contents of a message are confidentially
transmitted and would not be altered. Network security is most vital component in information security as it refers to all hardware and
software function, characteristics, features, operational procedures, accountability, access control, and administrative and management
policy. Cryptography is central to IT security challenges, since it underpins privacy, confidentiality and identity, which together
provide the fundamentals for trusted e-commerce and secure communication. There is a broad range of cryptographic algorithms that
are used for securing networks and presently continuous researches on the new cryptographic algorithms are going on for evolving
more advanced techniques for secures communication.
Authentic Data Access Scheme for Variant Disruption- Tolerant NetworksEditor IJCATR
Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network
connectivity and frequent partitions. Disruption-tolerant network (DTN) technologies are becoming successful solutions that allow
wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by
exploiting external storage nodes. However, the problem of applying CP-ABE in decentralized DTNs introduces several security and
privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued from different authorities.
In this paper, we propose a secure data retrieval scheme using CP-ABE for decentralized DTNs where multiple key authorities manage
their attributes independently. We demonstrate how to apply the proposed mechanism to securely and efficiently manage the
confidential data distributed in the disruption-tolerant military network. Since some users may change their associated attributes at
some point (for example, moving their region), or some private keys might be compromised, key revocation (or update) for each
attribute is necessary in order to make systems secure. This implies that revocation of any attribute or any single user in an attribute
group would affect the other users in the group. It may result in bottleneck during rekeying procedure, or security degradation due to
the windows of vulnerability if the previous attribute key is not updated immediately.
Sampling of User Behavior Using Online Social NetworkEditor IJCATR
The popularity of online networks provides an opportunity to study the characteristics of online social network graphs is important, both to improve current systems and to design new application of online social networks. Although personalized search has been proposed for many years and many personalization strategies have been investigated, it is still unclear whether personalization is consistently effective on different queries for different users, and under different search contexts. In this paper, we study performance of information collection in a dynamic social network. By analyzing the results, we reveal that personalized search has significant improvement over common web search.
The mixing time of thee sampling process strongly depends on the characteristics of the graph.
Photo-Oxygenated Derivatives from EugenolEditor IJCATR
Photo-oxygenation reaction was performed on eugenol (1) (2- methoxy-4-(2'-propenyl) phenol) in
chloroform as a solvent and tetraphenyl porphrine (TPP) as singlet oxygen sensitizer. Irradiation of the reaction
mixture was carried out by sodium lamp at -20 °C for six hrs., during which dry oxygen was allowed to pass
through the reaction mixture. Two hydroperoxides (3) and (4) were formed. Eugenol methyl ether (2) was also
photo-oxygenated under the same conditions of eugenol, where only the side chain was photo-oxygenated at
position C-1' to give product (5). In addition to the epoxide derivative of eugenol methyl ester (8) was prepared
and its reaction with aminoantipyrine was carried out to give product (9). Product (8) could be considered as a
DNA- alkylating agent
n this paper channel state information is exploited for improving system performance. The per
formance parameters of
the
Multiple Input Multiple Output system is better and are even achieved using additional RF modules that are required as multi
ple
antennas are employed. To reduce the cost associated with the multiple RF modules, antenna selection
techniques can be used to
employ a smaller number of RF modules than the number of transmit antennas. The exploiting of information for complexity red
uced
antenna selection is performed for achieving high channel capacity. Simulation r
esults show
that th
e channel capacity increases in
proportion to the number of the selected antennas
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...Editor IJCATR
Elliptic Curve Cryptography (ECC) gained a lot of attention in industry. The key attraction of ECC over RSA is that it
offers equal security even for smaller bit size, thus reducing the processing complexity. ECC Encryption and Decryption methods can
only perform encrypt and decrypt operations on the curve but not on the message. This paper presents a fast mapping method based on
matrix approach for ECC, which offers high security for the encrypted message. First, the alphabetic message is mapped on to the
points on an elliptic curve. Later encode those points using Elgamal encryption method with the use of a non-singular matrix. And the
encoded message can be decrypted by Elgamal decryption technique and to get back the original message, the matrix obtained from
decoding is multiplied with the inverse of non-singular matrix. The coding is done using Verilog. The design is simulated and
synthesized using FPGA.
Weighted frequent pattern mining is suggested to find out more important frequent pattern by considering different weights of each item. Weighted Frequent Patterns are generated in weight ascending and frequency descending order by using prefix tree structure. These generated weighted frequent patterns are applied to maximal frequent item set mining algorithm. Maximal frequent pattern mining can reduces the number of frequent patterns and keep sufficient result information. In this paper, we proposed an efficient algorithm to mine maximal weighted frequent pattern mining over data streams. A new efficient data structure i.e. prefix tree and conditional tree structure is used to dynamically maintain the information of transactions. Here, three information mining strategies (i.e. Incremental, Interactive and Maximal) are presented. The detail of the algorithms is also discussed. Our study has submitted an application to the Electronic shop Market Basket Analysis. Experimental studies are performed to evaluate the good effectiveness of our algorithm..
Growth, structural, mechanical and dielectric studies of undoped and urea dop...Editor IJCATR
Undoped and urea doped L-alaninium maleate crystals were grown by solution method with slow evaporation technique.
Solubility studies were carried out for the grown crystals and it is found that solubility increases with temperature for both the samples.
XRD studies were performed to find the crystal structure of the samples. NLO activity of the grown crystals was studied using a
Nd:YAG laser and SHG efficiency was found for both the samples. Microhardness studies were performed to understand the
mechanical strength of the samples. Measurements of values of dielectric constant and dielectric loss were carried out and the
electrical processes that are taking place in the samples are discussed
Design and Implementation of Refresh and Timing Controller Unit for LPDDR2 Me...Editor IJCATR
this paper presents a “Implementation of “Refresh And Timing Controller” unit for low power double data rate 2 memory
controller (LPDDR2 MEMORY CONTROLLER). “Refresh and Timing Controller” unit plays a vital role for LPDDR2 memory
controller .It maintains different timing parameters to handle various commands for memory like refresh, read and write operations and
also performs Memory Initialization. Since it is low power DDR2 the maximum duration in power-down mode and deep power down
mode is maintained by “Refresh and Timing Controller” unit. The refresh rate period is programmable using the Refresh Period
Register. It supports “All Bank Refresh”. The unit has timers to accommodate Refresh, Read/Write, and Power down modes. The RTL
is done using the System Verilog. The design is simulated
Analysis of Cryptographic Algorithms for Network SecurityEditor IJCATR
Cryptography plays a major role in securing data. It is used to ensure that the contents of a message are confidentially
transmitted and would not be altered. Network security is most vital component in information security as it refers to all hardware and
software function, characteristics, features, operational procedures, accountability, access control, and administrative and management
policy. Cryptography is central to IT security challenges, since it underpins privacy, confidentiality and identity, which together
provide the fundamentals for trusted e-commerce and secure communication. There is a broad range of cryptographic algorithms that
are used for securing networks and presently continuous researches on the new cryptographic algorithms are going on for evolving
more advanced techniques for secures communication.
Authentic Data Access Scheme for Variant Disruption- Tolerant NetworksEditor IJCATR
Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network
connectivity and frequent partitions. Disruption-tolerant network (DTN) technologies are becoming successful solutions that allow
wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by
exploiting external storage nodes. However, the problem of applying CP-ABE in decentralized DTNs introduces several security and
privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued from different authorities.
In this paper, we propose a secure data retrieval scheme using CP-ABE for decentralized DTNs where multiple key authorities manage
their attributes independently. We demonstrate how to apply the proposed mechanism to securely and efficiently manage the
confidential data distributed in the disruption-tolerant military network. Since some users may change their associated attributes at
some point (for example, moving their region), or some private keys might be compromised, key revocation (or update) for each
attribute is necessary in order to make systems secure. This implies that revocation of any attribute or any single user in an attribute
group would affect the other users in the group. It may result in bottleneck during rekeying procedure, or security degradation due to
the windows of vulnerability if the previous attribute key is not updated immediately.
Sampling of User Behavior Using Online Social NetworkEditor IJCATR
The popularity of online networks provides an opportunity to study the characteristics of online social network graphs is important, both to improve current systems and to design new application of online social networks. Although personalized search has been proposed for many years and many personalization strategies have been investigated, it is still unclear whether personalization is consistently effective on different queries for different users, and under different search contexts. In this paper, we study performance of information collection in a dynamic social network. By analyzing the results, we reveal that personalized search has significant improvement over common web search.
The mixing time of thee sampling process strongly depends on the characteristics of the graph.
Photo-Oxygenated Derivatives from EugenolEditor IJCATR
Photo-oxygenation reaction was performed on eugenol (1) (2- methoxy-4-(2'-propenyl) phenol) in
chloroform as a solvent and tetraphenyl porphrine (TPP) as singlet oxygen sensitizer. Irradiation of the reaction
mixture was carried out by sodium lamp at -20 °C for six hrs., during which dry oxygen was allowed to pass
through the reaction mixture. Two hydroperoxides (3) and (4) were formed. Eugenol methyl ether (2) was also
photo-oxygenated under the same conditions of eugenol, where only the side chain was photo-oxygenated at
position C-1' to give product (5). In addition to the epoxide derivative of eugenol methyl ester (8) was prepared
and its reaction with aminoantipyrine was carried out to give product (9). Product (8) could be considered as a
DNA- alkylating agent
n this paper channel state information is exploited for improving system performance. The per
formance parameters of
the
Multiple Input Multiple Output system is better and are even achieved using additional RF modules that are required as multi
ple
antennas are employed. To reduce the cost associated with the multiple RF modules, antenna selection
techniques can be used to
employ a smaller number of RF modules than the number of transmit antennas. The exploiting of information for complexity red
uced
antenna selection is performed for achieving high channel capacity. Simulation r
esults show
that th
e channel capacity increases in
proportion to the number of the selected antennas
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...Editor IJCATR
Elliptic Curve Cryptography (ECC) gained a lot of attention in industry. The key attraction of ECC over RSA is that it
offers equal security even for smaller bit size, thus reducing the processing complexity. ECC Encryption and Decryption methods can
only perform encrypt and decrypt operations on the curve but not on the message. This paper presents a fast mapping method based on
matrix approach for ECC, which offers high security for the encrypted message. First, the alphabetic message is mapped on to the
points on an elliptic curve. Later encode those points using Elgamal encryption method with the use of a non-singular matrix. And the
encoded message can be decrypted by Elgamal decryption technique and to get back the original message, the matrix obtained from
decoding is multiplied with the inverse of non-singular matrix. The coding is done using Verilog. The design is simulated and
synthesized using FPGA.
Weighted frequent pattern mining is suggested to find out more important frequent pattern by considering different weights of each item. Weighted Frequent Patterns are generated in weight ascending and frequency descending order by using prefix tree structure. These generated weighted frequent patterns are applied to maximal frequent item set mining algorithm. Maximal frequent pattern mining can reduces the number of frequent patterns and keep sufficient result information. In this paper, we proposed an efficient algorithm to mine maximal weighted frequent pattern mining over data streams. A new efficient data structure i.e. prefix tree and conditional tree structure is used to dynamically maintain the information of transactions. Here, three information mining strategies (i.e. Incremental, Interactive and Maximal) are presented. The detail of the algorithms is also discussed. Our study has submitted an application to the Electronic shop Market Basket Analysis. Experimental studies are performed to evaluate the good effectiveness of our algorithm..
Growth, structural, mechanical and dielectric studies of undoped and urea dop...Editor IJCATR
Undoped and urea doped L-alaninium maleate crystals were grown by solution method with slow evaporation technique.
Solubility studies were carried out for the grown crystals and it is found that solubility increases with temperature for both the samples.
XRD studies were performed to find the crystal structure of the samples. NLO activity of the grown crystals was studied using a
Nd:YAG laser and SHG efficiency was found for both the samples. Microhardness studies were performed to understand the
mechanical strength of the samples. Measurements of values of dielectric constant and dielectric loss were carried out and the
electrical processes that are taking place in the samples are discussed
Design and Implementation of Refresh and Timing Controller Unit for LPDDR2 Me...Editor IJCATR
this paper presents a “Implementation of “Refresh And Timing Controller” unit for low power double data rate 2 memory
controller (LPDDR2 MEMORY CONTROLLER). “Refresh and Timing Controller” unit plays a vital role for LPDDR2 memory
controller .It maintains different timing parameters to handle various commands for memory like refresh, read and write operations and
also performs Memory Initialization. Since it is low power DDR2 the maximum duration in power-down mode and deep power down
mode is maintained by “Refresh and Timing Controller” unit. The refresh rate period is programmable using the Refresh Period
Register. It supports “All Bank Refresh”. The unit has timers to accommodate Refresh, Read/Write, and Power down modes. The RTL
is done using the System Verilog. The design is simulated