A Novel Method of Fingerprint Classification Using Image Parameters on ANFIS

Abstract :-
Numerous algorithms have been developed to improve the speed of fingerprint recognition and this assumes prime importance when dealing with a large database of fingerprint images. In this paper, we propose a novel technique of using the image parameters like mean, median, variance, standard deviation and root mean square value to train an adaptive network based fuzzy inference system (ANFIS) to classify the test image into one of the six popular categories of fingerprints namely arch, tented arch, left loop, right loop, whorl and twin loop. Continue reading A Novel Method of Fingerprint Classification Using Image Parameters on ANFIS

Performance Evaluation of Symmetric Encryption Algorithms on Power Consumption for Wireless Devices

Abstract :-
This paper illustrates the key concepts of security, wireless networks, and security over wireless networks. Wireless security is demonstrated by applying the common security standards like (802.11 WEP and 802.11i WPA,WPA2) and provides evaluation of six of the most common encryption algorithms on power consumption for wireless devices namely: AES (Rijndael), DES, 3DES, RC2, Blowfish, and RC6. A comparison has been conducted for those encryption algorithms at different settings for each algorithm such as different sizes of data blocks, different data types, battery power consumption, date transmission through wireless network and finally encryption/decryption speed. Continue reading Performance Evaluation of Symmetric Encryption Algorithms on Power Consumption for Wireless Devices

Analyzing the Energy Consumption of Security Algorithms for Wireless LANs

Abstract :-
Security in wireless networks is of paramount importance. Due to the broadcast nature of the wireless radio signals, wireless networks are implicitly vulnerable to several network attacks. Anyone within the wireless transmission range of a device (including malicious users or attackers) is able to passively listen to or eavesdrop on the signals and could potentially access information from the signals. It is also possible to actively transmit signals that can attack the network. Encryption algorithms play good roles in information security systems (ISS). Continue reading Analyzing the Energy Consumption of Security Algorithms for Wireless LANs

Energy Efficiency of Encryption Schemes for Wireless Devices

Abstract :-
Encryption algorithms are known to be computationally intensive.They play a main role in information security systems. On the other side, those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. This paper tries to present a fair comparison between the most common and used algorithms in data encryption field according to power consumption. It provides evaluation of six of the most common encryption algorithms namely: AES (Rijndael), DES, 3DES, RC2, Blowfish, and RC6. A comparison has been conducted for those encryption algorithms at different settings for each algorithm such as different sizes of data blocks, different data types, and finally encryption/decryption speed. Experimental results are given to demonstrate the effectiveness of each algorithm. Continue reading Energy Efficiency of Encryption Schemes for Wireless Devices

Evaluating the Effects of Cryptography Algorithms on power consumption for wireless devices

Abstract :-
Security is important for wireless networks, mainly because the communications signals are openly available as they propagate through the air. The security settings can be different in many factors, but the main factors are the choice of ciphers used to provide security functions, the key length, and the number of operational rounds, packet size, and data types. These factors also have a significant impact on the energy consumption for providing security. Continue reading Evaluating the Effects of Cryptography Algorithms on power consumption for wireless devices

Solving the Noun Phrase and Verb Phrase Agreement in Kannada Sentences

Abstract :-
This paper proposes a way of producing context free grammar for solving Noun and Verb agreement in Kannada Sentences. In most of the Indian languages including Kannada a verb ends with a token which indicates the gender of the person (Noun/ Pronoun). This paper shows the implementation of this agreement using Context Free Grammar. It uses Recursive Descent Parser to parse the CFG. Around 200 sample sentences have taken to test the agreement. Continue reading Solving the Noun Phrase and Verb Phrase Agreement in Kannada Sentences