T R A C K       P A P E R

Login Panel

Close tab

Password Meter

ISSN:2394-3661 | Crossref DOI | SJIF: 5.138 | PIF: 3.854

International Journal of Engineering and Applied Sciences

(An ISO 9001:2008 Certified Online and Print Journal)

Volume 6 Issue 12 (December2019)

S.No. Title & Authors Page No View
1

Title : Analysis on Secure Key Agreement Protocol Using Trusted Third Party Information Sensitivity Systems

Authors : Gnanasekaran P, Umadevi V

Click Here For Abstract

Download Certificate
Abstract :

The study of security models for sensitive data systems has been taken on for years. Throughout this century, the thought of seeking the system security to the supply of system development lifecycle received Brobdingnagian improvement within the system and software system assurance domain. This paper expounds the understanding security by illustrating information security study development progress since pre-computer age and presents an outline of Internet and cyberization security by summarizing the established order of cyberization. Then a security model referred to as PDRL, which incorporates six core security attributes of sensitive data systems, is planned to safeguard the protection of sensitive data systems within the whole system life-cycle. Within the past, many key agreement protocols square measure planned on watchword based mostly mechanism. These protocols square measure prone to wordbook attacks. Storing plain text version of watchword on server isn't secure continuously. During this paper we have a tendency to utilize the service of a trustworthy third party, i.e., the Key Distribution server (KDS) for key agreement between the hosts. Now-a-days in massive operating environments 2 party key agreement protocols square measure being seldom used. During this planned theme, rather than storing plain text version of watchword we have a tendency to store a technique hash of the watchword at the server. Each host and server agrees upon family of independent unidirectional hash functions, victimization that host authentication is completed once a bunch applies for session key with KDS. Host establishes just once key with server victimization that server authentication is completed. Thanks to this man-in-the middle attacks square measure defeated. The planned protocol relies on Diffie-Hellman key exchange protocol.

1-5
2

Title : Congestion Control Mechanisms for 4G Random Access Channel (RACH): A Survey

Authors : Magbo P.C., Chukwudi P.C., Abubakar A.

Click Here For Abstract

Download Certificate
Abstract :

Telecommunication systems have evolved from various generations; this evolution aimed at improving the rate of information transfer and communication from one place to another. One of the evolutions in communications is the Long-term Evolution Advanced (LTE-A), also known as the fourth-generation network (4G). The LTE-Advanced, which is a wireless cellular network, offers tremendous services in terms of providing quality of service, security, and improved mobility when compared to the other generation network that predates it. Machine to Machine communications explores the LTE-Advanced technology to supports the massive connection of devices with little or no human interaction.  However, one of the challenging issues of Machine-to-Machine communication is congestion. Congestion limits the access of these multiple devices to the network and reduces their response time. This paper presents a survey of different mechanisms that various researchers have proposed over the years to solve the issue of congestion experienced when multiple devices want to have access to the base station (also known as eNodeB).

6-9
3

Title : Dialog Act Classification for Vietnamese Spoken Text

Authors : Thi-Lan Ngo, Thi Bich Ngoc Doan, Thi Lan Phuong Ngo

Click Here For Abstract

Download Certificate
Abstract :

Systems, which use the conversational interface to interact with users such as chat-bots, virtual personal assistants, recommendation systems and automatic customer care systems and so on, are getting popular in our life. A significant challenge in designing and building those systems is how to effectively determine the user intents from the user’s speech interactions. In particular, determining dialog act is the first step in determining user intent. Dialog act recognition has widely studied in many different languages but in Vietnamese, there are few studies. In this paper, we present an attempt on dialog act recognition for Vietnamese conversational text. We adopt a machine learning approach by using maximum entropy model on Vietnamese conversational dataset labelled dialog act based on ISO 24617-2 standard. The achieved result is 70.80% that satisfy for practical applications.

10-13
4

Title : Comparative Study of Air Conditioning Systems

Authors : Harouna Mamadou BAL, Vincent SAMBOU, Mactar FAYE, Youssouf MANDIANG

Click Here For Abstract

Download Certificate
Abstract :

This work consists in comparing systems of air-conditioning with mechanical compression equipping buildings according to their yearly energy consumptions and maintenance costs.  Our study showed that it does exist an important difference while leaving from one system to another.  The variable air or flow system   is most interesting in terms of energy consumption, then comes the child water system and finally respectively fixed airflow rate central air-conditioning and the PTAC air-conditioning in whole our study field.

14-17
5

Title : Implementation of garbage collection java application on sun java real time operating system mobile embedded application

Authors : Amandeep Kaur, Balpreet Kaur, Gurpreet Kaur

Click Here For Abstract

Download Certificate
Abstract :

Java possesses many advantages for embedded system development, including fast product deployment, portability, security, and a small memory footprint. As Java makes inroads into the market for embedded systems, much effort is being invested in designing real-time garbage collectors. Memory allocation can be done in constant time and sweeping can be performed in parallel by multiple modules. In this paper, garbage collection java application has been implemented on real time system mobile embedded application.

18-20