Archive Browsing VOLUME 7 ISSUE 01 AUGUST 2018

Palmprint Recognition using Hybrid Features with Gabor Wavelet, Wavelet Moments and Random Forest Classifier
Abstract: The identification of individuals by their palmprints, considered as a new member of the family of biometric modalities, has become a very active area of research in recent years. The work done so far has been based on palmprints image representation techniques for better classification. This paper is divided into two phases, training phase and testing phase. In training phase there are three sub processes; pre-processing, feature extraction and dimensionality reduction. Pre-processing is done with the help of image resizing and RGB to Gray conversion. For feature extraction, we have used Gabor wavelet and wavelet moments. Principal Component analysis (PCA) is used for dimensionality reduction. The extracted features are then stored in database. In the testing phase the same process is done up to the PCA and then the similarity measure with database is done. Random Forest Classifier is used for similarity measure. The MATLAB image processing tool box is used to implement proposed Palmprint recognition system.

Authors: Jahnvi Thahirani, Rohitashva Jajoo

File Name: Jahnvi_70100-18-101.pdf
 Download Abstract | Download Full Paper

A Novel Hybrid Relaying Approach in Cooperative Communication
Abstract: Cooperative communications can be extremely proficient in combating fading multipath channels and enhance scope with complexity and cost. Furthermore, there is also a possibility of improving the performance of cooperative communication by optimal relay selection strategies. In the basic cooperative communication network, there is three type of devices, a source, a destination and a set of relay devices. These relay devices are responsible for forwarding the overheard information from the source node to the destination node, thereby providing diversity gain at the destination node. But practically not all available relays are efficient. Application of relay selection scheme with cooperative communication techniques not only removes communication overhead from destination node but also will enhance system performance. In this regard, this paper is focused towards a hybrid relay selection scheme of the cooperative network with cooperative non-regenerative (AF) and regenerative (DF) relaying technique. Bit Error Rate (BER) performance is compared using Rayleigh, Rician and Nakagami fading environment.

Authors: Vishita Chouhan, Praveen Patidar

File Name: Vishita_70100-18-103.pdf
 Download Abstract | Download Full Paper

A Novel Approach of Character Recognition using Local Binary Pattern and SVM Classifier
Abstract: The purpose of this paper is to initiate the development of a framework for digitization and recognition of handwritten character. The software architecture of the system is based on the generic integration of commercial character recognition tools called OCR (Optical Character Recognition). Indeed, the evolution of these tools today opens up a serious alternative to manual entry in order to increase productivity. We will present the capabilities of these tools and their limitations. In this paper, support vector machine (SVM) based approach is proposed to solve this type of problem which is capable of recognizing character with the help of Local Binary Pattern feature extraction and support vector machine (SVM) based classifier.

Authors: Alka Kumari, Nirupama Tiwari

File Name: Alka_70100-18-102.pdf
 Download Abstract | Download Full Paper

Area Efficient AES SBOX Architecture
Abstract: As the Technology advances day by day, there is an essential need of a secured data transmission for exchanging information from one user to the other. The access of objects in data security is based on key properties that are the root of communication and authentication. Advanced Encryption Standard is specified by National Institute of Standards in 2001 as the specifications for encryption in electronic communication. It is also known as symmetric key algorithm as the encryption and decryption both are formulated using this single standard. From the family of ciphers, NIST selected three members of Rijndael family, each with key length 128, 192 and 256 bits for each 128-bit block size. In this research, AES 128 bits has been designed and implemented. This paper presents an area efficient S-BOX structure based on Galois Field arithmetic which is also used for optimizing the speed. The proposed SBOX is very attractive for their extremely small sizes are described in hardware using the HDLs. These VHDL RTL models are simulated on Modelsim 6.5e to check area efficiency.

Authors: Swati Kukde

File Name: Swati_70100-18-106.pdf
 Download Abstract | Download Full Paper

Cyberspace Security: An Epidemic in Identity Theft
Abstract: Over the past few decades, the issue of cyber security has become increasingly prevalent in modern society. Because of the technological innovations that engineers have made, we now rely on computers for just about every aspect of our daily lives. However, some of these rapid improvements in technology and computer infrastructure have led to an epidemic of problems within both small and large networks. Because computers are still a modern innovation, there is a need for ongoing and rapid improvement, which explains why there are so many flaws in our security systems. This paper is an epidemic summary to consider as an introduction to the world of cyberspace, its issues and challenges.

Authors: Sudhirkumar Jagadishbhai Patel, Dr. Chandikaditya Kumawat

File Name: Sudhir_70200-18-102.pdf
 Download Abstract | Download Full Paper

© 2016 IJDACR Journal. All rights reserved.