Paper Type :: Research Paper
Title :: A Secure Cryptosystem by using Euler Totient Function and Modified RSA
Country :: India
Authors :: Sanjeev Kumar Mandal || A R Deepti
Page No. :: 01-07
:: XXXX
:: XXXX
:: XXXX

In the internet world, there is a need for strong cryptographic techniques for data transmission and storing confidential information. To do this, an approach has been made by using the mathematical proof of the existence of a consistent formation of the Euler totient function to generate a key. Then the principles of number theory functions have been proposed in the encryption/decryption process. Thus, this structure is simple and powerful to use; in generating a key, computation of encryption/decryption process and key transmission.

Keywords: Cryptography, Euler Totient function, Number Theory, Testing tools, Modified RSA algorithm.

[1]. Gurpreet Singh, Supriya, "A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security" International Journal of Computer Applications, pp. 0975 – 8887.
[2]. The web page gives the AES contains: http://www.nist.gov/ CryptoToolkit.
[3]. Annapoorna Shetty, Shravya Shetty and Krithika, "A Review on Asymmetric Cryptography RSA and ElGamal Algorithm", International Journal of Innovative Research in Computer and Communication Engineering, 2014.
[4]. Coron, J. S. "What is cryptography?", IEEE Security & Privacy Journal, 12(8), 2006, pp. 70-73.
[5]. Harivans Pratap Singh, Shweta Verma , Shailendra Mishra, "Secure-International Data Encryption Algorithm", International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol. 2, Issue 2, February 2013.


Paper Type :: Research Paper
Title :: Modelling Incidents of Building Collapse Data in Nigeria, Using Poisson and Negative Binomial Regression Models
Country :: Nigeria
Authors :: N.L Nwakwasi || B.B Henshaw || H.U Nwoke
Page No. :: 08-15
:: XXXX
:: XXXX
:: XXXX

The rates of building collapse in Nigeria in the past twenty years have assumed a very worrisome dimension as many lives have been lost and huge investments wasted. Several causes have been attributed to natural or man-made phenomena. Survey carried out have shown that the use of substandard building materials, poor workmanship, non-enforcement of building codes or construction regulations, corruption in the building industry etc. have contributed immensely in most of the recorded cases of building failures. This paper is set to examine the application of Poisson and negative binomial regression models to identify the major factors that contributes to building collapse in Nigeria and toascertain the better model suitable for prediction of building collapse or failure in Nigeria, using a secondary data which span from (1995 – 2016). Maximum likelihood estimation procedure was used to estimate the parameter of the selected model. With the number of incidents of building collapse data as the response variable (Y) and 7-explanatory variable (X's), applying the forward selection criteria to the 7-explanatory variables................

Keywords: Building collapse, building materials, Poisson Regression Model, Negative Binomial Regression Model, Akaike Information Criteria (AIC)..

[1]. Adebowale P.A., Dambo M.D., Ankeli I.A and Daniel I.D. (2016). Building Collapse in Nigeria: Issues and Challenges.
[2]. Akinjogbin, I.O., &Omotehinse, O.J. (2011). Building Construction in practice. Ede: Fuhrer Publishers Ltd.
[3]. Ayininuola, G.M., &Olalusi, O.O. (2004). Assessment of Building Failures in Nigeria: Lagos and Ibadan Case Study. African \journal of Sciences and Technology. AJST Vol. 5, No. 1, pp. 73-78.
[4]. Fadamiro, J.A. (2002). Assessment of building regulations and standards and the implications for building collapse in Nigeria. Proceedings of a workshop on building collapse: causes, prevention and remedies. The Nigeria institute of building, Ondo State, 23-24 October.
[5]. Federal Republic of Nigeria. National building code (2006). Cape Town, South Africa: Lexis Nexis Butterworth.


Paper Type :: Research Paper
Title :: Frequency reconfigurable antenna and polarization reconfigurable antenna for wireless communication
Country :: India
Authors :: R. S. Kadam || A.V. Kulkarni
Page No. :: 16-21
:: XXXX
:: XXXX
:: XXXX

A frequency reconfigurable microstrip patch antenna and polarization reconfigurable microstrip patch antenna is presented in this paper. The patch is resonating at 2.4GHz. The frequency reconfigurable antenna is capable of switching to nine different frequencies from 1.98GHz to 2.4GHz using PIN diodes or Varactors. The paper demonstrated this switching operation using copper strips as substitutes for active elements. The design, switching table and results are presented. The polarization reconfigurable antenna able to switch between vertical polarization to horizontal polarization. HFSS simulation software is being used to provide software results. Parameters like gain, S11 (Return loss) and radiation pattern is demonstrated. The fabricated antennas are tested in a well equipped lab on a network analyzer to verify software results.

Keywords: Reconfiguration, Return Loss, VSWR, Radiation Pattern.

[1]. M. Samsuzzaman, M. T. Islam, N. Misran, M.A. MohdAli," Dual band X shape Microstrip Patch Antenna for Satellite Applications", Procedia Technology, Vol 11, pp. 1223 – 1228, ( 2013 ).
[2]. W.Chen,W. Jhang, "A Planar WWAN/LTE Antenna for Portable Devices", IEEE Antennas and Wireless Propagation Letters, Vol. 12, pp. 19-22,(2013).
[3]. N. P. Kothari, N. P. Thakre, Thiripurasundari, "Design of Meander Line Monopole Patch Antenna for LTE Applications ", Research India Publications Vol. 8, No. 19 , pp.2385-2387,(2013).
[4]. T. Sharma, O. Atal, "Design of Ultra Small Microstrip Patch Antenna For Wireless Communication Applications", PhD Thesis, Department of Electrical Engineering National Institute of Technology Rourkela, pp.1-56, (2013).
[5]. K. L. Roman, G.Vermeeren, A. Thielens, W. Joseph, L. Martens, "Characterization of path loss and absorption for a wireless radio frequency link between an in-body endoscopy capsule and a receiver outside the body", EURASIP Journal on Wireless Communications and Networking, Vol.21, pp.1-10,(2014).


Paper Type :: Research Paper
Title :: A Survey on Certificate-Less Public Key Encryption for Authentication in a Smart IoT-Based LoRaWAN
Country :: India
Authors :: Srishti Tiwari || Dr. Hiren B. Patel || Dr. Bela Shrimali
Page No. :: 22-28
:: XXXX
:: XXXX
:: XXXX

Key management and authentication are the two key components to make sure that the entities involved in communication process in Internet of Things (IoT) operate securely. Due to architectural as well as operational differences between a conventional network and an IoT network, protocols and techniques used in a traditional key management are not well-suited for IoT. Mutual authentication is one of the critical task to achieve in an IoT network as the entities are spread across wide area with limited memory capacity and battery power. This can be achieved with the implementation of certificate-less public-key cryptography (CL-PKC) in IoT. Many recent researches have been carried out about Long Range (LoRa) and Long Range Wide Area Network (LoRaWAN) which are newly developed communication architectures..........

Keywords: IoT, certificate, certificate-less, key, attacks, security, long, range, network, key-generator, battery.

[1] Roberto Minerva, Abyi Biru and Domenico Rotondi, "Towards a definition of the Internet of Things (IoT)", IEEE Internet Initiative, pp.10, 27 May, 2015.
[2] D. Q. Bala, S. Maity and S. K. Jena, "Mutual authentication for IoT smart environment using certificate-less public key cryptography," 2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS), Chennai, 2017, pp. 29-34.
[3] J. Kim and J. Song, "A Secure Device-to-Device Link Establishment Scheme for LoRaWAN," in IEEE Sensors Journal, vol. 18, no. 5, pp. 2153-2160, 1 March, 2018.
[4] "A technical overview of LoRa and LoRaWAN," LoRa Alliance, San Ramon, CA, USA, Tech. Rep., Nov. 2015. [Online]. Available:
https://docs.wixstatic.com/ugd/eccc1a_ed71ea1cd969417493c74e4a13c55685.pdf
[5] N. Sornin, M. Luis, T. Eirich, T. Kramp, and O. Hersent, "LoRaWAN specification," LoRa Alliance, San Ramon, CA, USA, Tech. Rep. Version 1.0.2, Jul. 2016.


Paper Type :: Research Paper
Title :: Model Early Warning System Based Android
Country :: Indonesia
Authors :: Febrina Sari || Nurhadi || Herianto || Atma Hadiansa || Dewi Suranti
Page No. :: 29-37
:: XXXX
:: XXXX
:: XXXX

Early Warning System Model designed using Android-based mobile technology, with the aim of maintaining the continuity of injection contraceptive use. This system will provide an effective program for acceptors, so that they will periodically inject according to schedule. An early warning system will send text messages based Web Services via mobile devices such as smart phones. The use of contraceptives is one of the efforts made by the government to reduce the population growth rate, the use of contraception that is predominantly used by acceptors is injection contraception, therefore the use of contraceptives must be maintained, the results of this study are models of early warning systems designed to help acceptors in remembering their periodic injection schedule in the next period and provide various information about the implementation of family planning programs through text messages. Waterfall and in the development of system design using integrated modeling language namely Unified Modeling Language (UML).

Keywords : Web Service, Web Application, UML.

[1]. Malawi National Statistical Office and MEASURE DHS, Malawi Demographic and Health Survey, 2010, Zomba: Malawi National Statistical Office and MEASURE DHS, 2010.
[2]. D"Arcangues C, Snow RC. "Injectable contraceptives for women". In: Rabe T, Runnebaum B, editors. Fertility Control-Update and Trends. Berlin: Springer-Verlag; 1999. pp. 121–49. [3]. Westhoff C, Kems J, Morroni C, Cushman LF, Tiezzi L, Murphy PA. Quick start: novel oral contraceptive initiation method. Contraception. 2002 Sep;66 (3):141–5.
[4]. F. Sari and P. Lidya, "Mobile Application Reminder Of SPP Payment Schedule‟s And School Activities Information Based SMS Gateway". Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 2017.
[5]. The Open University. Text Messaging Usage Statistics. http://www.openuniversity.edu/news/news/2014-text-messagingusage- statistics, Dec. 2014.


Paper Type :: Research Paper
Title :: Comparative Analysis of CCTV Video Image Processing Techniques and Application: A Survey
Country :: India
Authors :: Varshali Jaiswal || Varsha Sharma || Sunita Varma
Page No. :: 38-47
:: XXXX
:: XXXX
:: XXXX

Now a day's security weak points are increases, for the prevention of attacks need to improve the CCTV (Close-Circuit Television) surveillance system. CCTV video image processing is one of the most applicable techniques uses of improving the CCTV surveillance system and information security. CCTV traffic video image processing is challenging task and required in many areas of where the image segmentation has to perform like background subtraction and foreground segmentation and moving object detection, real-time road Congestion detection, road sign, road surface state recognition and also for the traffic counting, speed measurement, queue length and vehicle classification. The goal of this paper gives a new direction of innovation in the CCTV video image processing in computer vision.

Keywords- Image Segmentation, Artificial Neural Network, Classification, Clustering, Evolutionary Approach, Computer Vision.

[1]. Zhou, J., Bao, X., Li, D. and Yin, Y., 2017, October. Traffic Video Image Segmentation Model Based on Bayesian and Spatio-Temporal Markov Random Field. In Journal of Physics: Conference Series (Vol. 910, No. 1, p. 012041). IOP Publishing.
[2]. Gadde, R., Jampani, V. and Gehler, P.V., 2017. Semantic video cnns through representation warping. CoRR, abs/1708.03088.
[3]. Varagula, J. and ITOb, T., 2017. Object Detection Method in Traffic by On-Board Computer Vision with Time Delay Neural Network. Procedia Computer Science, 112, pp.127-136.

[4]. Zhao, J., Wu, H. and Chen, L., 2017. Road Surface State Recognition Based on SVM Optimization and Image Segmentation Processing. Journal of Advanced Transportation, 2017.
[5]. Islam, K.T. and Raj, R.G., 2017. Real-time (vision-based) road sign recognition using an artificial neural network. Sensors, 17(4), p.853.


Paper Type :: Research Paper
Title :: Topological Invariance of Separation Properties in Bitopological Spaces
Country :: India
Authors :: Harjot Singh
Page No. :: 48-50
:: XXXX
:: XXXX
:: XXXX

The main aim of this research study is to list some well known separation properties of bitopological spaces from available literature and to investigate and accomplish that how these separation properties are preserved under pair homeomorphism.

Keywords- Bitopological spaces, pair continuous, pair homeomorphism, separation properties.

[1]. Fletcher, P., Hoyle III, H., B., & Patty, C.,W. (1969). Duke Math. J., 36. The comparison of
topologies. 325–331.
[2]. Kelly, J., C. (1963). London Math. Soc. Proc., 13(3). Bitopological spaces. 71–89.
[3]. Kim, Y., W. (1968). Publ. Math. Debrecen, 15. Pairwise compactness. 87–90.
[4]. Patty C. W. (1967) Duke Math. J., 34. Bitopological spaces. 387–392.
[5]. Pervin, W. (1967). Nederl. Akad. Wetensch. Proc. Ser. A70, Indag. Math., 29. Connectedness in bitopological spaces. 369–372.


Paper Type :: Research Paper
Title :: Iot Based Security System for Monitoring Surveillance Area by Using Raspberry Pi with Android App Alerts
Country :: India
Authors :: Vasudev Emmennavar || Dr. U. B. Mahadeva Swamy
Page No. :: 51-58
:: XXXX
:: XXXX
:: XXXX

People are surrounded by a wide variety of electronic gadgets, sensors and devices which range from mobile phones, routers, home automation systems and many more. They are all embedded systems, be it a small device or a big one. Internet of Things is an approach of transferring information from one entity to the other inter-connected to a network through a wireless connection to a remote device. It is an area of interest which is growing very fast. It can be as simple as communicating a small message between two devices or as complex as sending information from a spaceship connected to a space station using embedded systems through cloud services. The proposed work aims at using sensors and IoT based Security System to monitor a secured area remotely for any activity that might occur. The application polls the surveillance area continuously and once an activity is detected, images of the particular activity are captured using a camera connected to a Raspberry Pi Board. This application uses OpenCV, computer vision library and detects the motion. The captured pictures are uploaded to a dropbox and simultaneously the GSM interface alerts the user using the android application through a voice output that some activity has occurred and needs user's attention. The Android app plays a voice output as "Caution camera image is captured".

Keywords- Embedded systems, OpenCV, Internet of Things, Raspberry Pi, Android application, GSM.

[1]. S. Emima Princy, S. Emima Princy, "Implementation of Cloud Server for Real Timedata Storage using Raspberry Pi" 2015 Online International Confernece on Green Engineering and Technologies (IC-GET 2015), 2015.
[2]. Eben Upton, Gareth Halfacree, Raspberry Pi User Guide. United States of America: Wiley, 2014.
[3]. Zoran Zivkovic, "Improved Adaptive Gaussian Mixture Model for Background Subtraction," intelligent and Autonomous Systems Group University of Amsterdam, The Netherlands, ICPR, 2004.
[4]. Nima Bari, Ganapathy Mani, Simon Berkovich, "Internet of Things as a Methodological Concept," IEEE International Conference on Computing for Geospatial Research and Application, Washington DC, USA, pp. 48-55, 2013.
[5]. SIM900_AT Command Manual, Shanghai SIMCom Wirless Solution Ltd.2010.