India is a country of immense diversity. It is home to people of many different racial, languages, ethnic, religious, and national backgrounds. Groups of people in India differ from each other not only in physical or demographic characteristics but also in distinctive patterns of behavior and these patterns are determined by social and cultural factors like language, region, religion, and caste. Apart from behaviour, economic development, level of education and political culture of the people in various social segments differ from region to region. More you can say that economy and cultures have been enriched by the contributions of migrants from round the globe. In an increasingly globalised world, migratory movements is continuously shaping the countries all over the world. Some countries like India and Ireland, which set the example of economic development and social integration, have the positive impact of the migration by globalisation and some countries like USA, which recently witness racism, xenophobia and discrimination have the negative impact on the migrants. It does not mean India do not face fragmentation and USA do not have cohesion. USA have many stories which show successful integration process, that facilitated the lives of immigrant communities, but being a developed country it still suffers from cultural alienation. In these countries, borders are built within borders to create cultural divides that do not allow people to integrate. Recently, this problem has become more prominent due to the rise of terrorism, clash of cultures in the world, leading to the glorification of stereotypes. People are becoming less accepting towards anyone who does not belong to their region. Migration does not stop after people move from one place to another place. The main question start after that ‘now what’ they will do. That is why this topic needs to be discussed thoroughly in order to find better solutions. This paper will begin with an analysis of different approaches to Migration, discuss the target groups for integration policies, provide indicators of the current situation of migrants and proceed to an analysis of integration tools: legislation, social policies and participatory processes. It will focus not only on the impact of migration but also on social integration, mix culture like indo-western culture in a comparative basis.
India is a country of immense diversity. It is home to people of many different racial, languages, ethnic, religious, and national backgrounds. Groups of people in India differ from each other not only in physical or demographic characteristics but also in distinctive patterns of behavior and these patterns are determined by social and cultural factors like language, region, religion, and caste. Apart from behaviour, economic development, level of education and political culture of the people in various social segments differ from region to region. More you can say that economy and cultures have been enriched by the contributions of migrants from round the globe. In an increasingly globalised world, migratory movements is continuously shaping the countries all over the world. Some countries like India and Ireland, which set the example of economic development and social integration, have the positive impact of the migration by globalisation and some countries like USA, which recently witness racism, xenophobia and discrimination have the negative impact on the migrants. It does not mean India do not face fragmentation and USA do not have cohesion. USA have many stories which show successful integration process, that facilitated the lives of immigrant communities, but being a developed country it still suffers from cultural alienation. In these countries, borders are built within borders to create cultural divides that do not allow people to integrate. Recently, this problem has become more prominent due to the rise of terrorism, clash of cultures in the world, leading to the glorification of stereotypes. People are becoming less accepting towards anyone who does not belong to their region. Migration does not stop after people move from one place to another place. The main question start after that ‘now what’ they will do. That is why this topic needs to be discussed thoroughly in order to find better solutions. This paper will begin with an analysis of different approaches to Migration, discuss the target groups for integration policies, provide indicators of the current situation of migrants and proceed to an analysis of integration tools: legislation, social policies and participatory processes. It will focus not only on the impact of migration but also on social integration, mix culture like indo-western culture in a comparative basis.
In this paper, investigations are made to analyze the human body temperature during wound healing process due to surgery. Wound is considered after the skin graft. Skin graft is a technique used in plastic surgery. Skin is the first line of defense between the human and environment, it is very susceptible to damage. Internal body or core temperature (Tb) is one of the clinical vital signs along with pulse and respiratory rates. Any disturbance in body temperature will drive complexities in wound healing process. These studies are important in the mechanism of establishing the limits of thermal regulation of human body during the healing process in different situations and conditions. The Finite element method is used to analyze tissues temperature for normal tissues (donor site) and abnormal tissues (tissues after surgery). Appropriate boundary conditions have been framed. Numerical results are obtained using Crank Nicolson Method.
India is not known as a country to be in for a bisexual person. Homosexual acts even within wedlock are a punishable offence in India. Legal battles over provisions in the Indian Penal Code which criminalizes any sexual act “against the order of nature” are rife. Even though Kerala has been hailed as a paradox inside India (mainly due to its human development parameters), the social, cultural and legal environment in the state is hostile to individuals who question hetero-normativity. Non-judgemental and unbiased scientific therapy or counselling are seldom available to sexual minorities. This paper is an attempt to map the experiences of a female who is openly bisexual, and is living in Kerala. An ethnographic interview was conducted where the experiences of the participant are explored, from the relationship dynamics as seen by her, to sexual experiences and difficulties in relationships. A reference is also made to the personal and social support systems that are in place for the Lesbian, Gay, Bisexual, Transgender (LGBT) community in Kerala and their role in initiating discourses regarding the topic. A few pointers for future studies in the topic, especially within the context of Kerala are also put forward.
This paper centers around how innovations adds to enhancing interoperability between IoT gadgets, and making effectively utilization of IoT gadgets. The proposed stage innovation gives semantic-based IoT data administrations, and semantic interoperability of IoT gadgets. This administration stage can be material to a great deal of semantic IoT administrations: gathering imperceptible data in genuine condition by brilliant gadgets, giving keen life benefits by sharing, taking an interest, circulating open detecting data.
Mobile pervasive environment interact with several devices at varying service ranges. The technical heterogeneity of pervasive environment is expected to increase the system flexibility and adaptability on modeling with context training phase. While working with context based training phase, time entity measure is considered as the significant issue. The evaluation of the services through numerous devices during training phase does not acquire an effective service monitoring on mobile pervasive environment. Mobile pervasive environment based information extraction fails to modify the patterns as activities change over time. To improve the flexibility of context training phase in mobile pervasive environment, an Active Context Source Discover Training Phase (ACSDTP) with Classifier Decision Tree Support (CDTS) mechanism is proposed in this paper. Our research work is to develop an effective modification (i.e., updation) of the pattern on training phase with real world context as per changes over time. Initially, the ACSDTP set up the available sensors in pervasive environment to work with the ever changing set of context users. The available sensors are maintained using the Active Discover process. Second, the CDTS mechanism is designed using weighted prediction for easy identification of context result on the training phase. Decision tree is operated separately using the learning techniques, where the identification is performed in a significant manner with minimal time factor. The learning process is performed to identify the inferred situations. Finally, the integration process is carried out to work with the complex association between the situations and sensor data in the mobile pervasive environment to achieve flexibility and adaptability factor. Experiment is conducted on factors such as time entity measure rate, precision ratio, and user context result determination level.
A new reliable high throughput NOC router design is proposed with FSM based smart arbiter module for 4X4 Mesh architecture. This design is based the XY routing algorithm with prioritized round robin arbitration and synthesis of the proposed design is done on Spartan III FPGA. An enhanced work is also done in this paper to explore the drawbacks of the exceptional techniques of the existing generation and to research the scope for overall performance improvisation of the NoC designing
A huge number of embedded devices offer their services to the end users in pervasive environments. Context-aware discovery is a rich and very dynamic system extensively applied for combining the different mobile devices, sensors, actuators and software functions. Existing knowledge-based system using the Common KADS (CKADS) system represent contextual information but algorithm are not effective in predicting the user behavior. Current Location-aware Private Service Discovery (LPSD) considers the discovery path for reducing the distributed topology and flooding operations. LPSD in pervasive environment is not effective in accurately locating the required service by searching method. To present an architecture principle for accurately predicting the user behavior in mobile-pervasive computing environment, Affluent Context Aware Systems based on the User Behavior (ACAS-UB) is proposed in this paper. ACAS-UB mechanism contains the class of mobile devices that can sense (i.e.,) search the physical pervasive environment. Affluent means effectively engaged mobile devices in ACAS-UB mechanism which uses the context information. The ACAS-UB context information contains the judgment of the similar users and also the response from the other users for improving the effectiveness in pervasive environment user behavior prediction. Master-slave concept is used in the ACAS-UB mechanism for the easy collection of response information from the different users. ACAS-UB mechanism construct the user profile initially from the context information, then performs the similarity measure and finally work is to predict the user behavior. ACAS-UB mechanism provides the hints which are necessary to explore different options, rather than just limiting the options in mobile-pervasive computing environment. ACASUB mechanism is experimented on the factors such as message overhead in pervasive environment, scalability and approximately 10 % lesser processing time.
Pets need special care and tracking system to track their path in case of lost. Due to our busy life style, this task is not simple as it used to be. The aim of this work is to design and implement smart pet house and tracking system. The objective of this paper is to allow pets owners to automate simple things like monitoring and tracking of the path of pets. Also lighting, feeding and air-conditioning controls. The proposed work addresses the implementation and analysis of a wireless sensor networks based pet location monitoring system for domestic scenarios. These systems describes, finding the path of lost pet using fitbit flex scale device and also using GPS tracker. Pet begin moving before you get a GPS signal, the tracker will calculate distance using steps and stride length as described above until a GPS signal is found.
Human being has lot of virtual mask in their behaviour (mind or brain). By the way of probability study alone, be able to find a person’s loyalty through their emotions, stress of speech, way of expressions and so on. It is not a novel technique to this world. The judgement and the hearings are finalizing in accordance to passed parameters (questions, transparent as well hidden test) and the result. Artificial Neural Network (ANN) is one of the best methods meant for speech stress analysing based cheap lie detection for the loyalty test. To show the results, polygraph is a comprehensible demonstration oriented approach. These methods are already used by the insurance fraud investigations and police. Through an individual’s stress (stress percentage or else range) voice as well their emotions are able to detect the loyalty. Lie detection techniques require being extremely confidential and dynamic. For the reason that voice stress analysis (VSA) parameters have to be an encrypted for avoiding speech practise with testing tool. Here this paper, outlooks by using for predicting the liars through Speech VSA.
Wireless Sensor Networks (WSNs) received enormous attention in recent years due to its phenomenal ability of implementation in various fields. WSNs consist of a large number of small sensor nodes. These nodes are very cheap in terms of cost. In military operations, there is always a threat of being attacked by enemies. So, the use of these cheap sensor nodes will help to reduce the loss. In this project, the security of data transmission in WSNs for military applications is analyzed. It discusses the available scenarios of using sensor nodes in the military uses. The aim is to present a better deployment of sensor nodes for military purposes with the help of cryptographic techniques. This project will try to identify different areas in which we can reduce the damage in case of militant’s attack or enemy’s outbreak using an intelligent deployment of nodes. It is proposed to use the WSNs in battlefield surveillance to closely monitor the critical areas and borders to obtain information about enemy activity in that area. Hence, militant’s will gather information quickly which will result in quick response. Border monitoring is an essential component of military surveillance to prevent enemy’s intrusion. Here the proposed work provides security using several techniques to encrypt and decrypt the data in WSNs. Elliptic Curve cryptography involves Attribute based encryption which is more complicate to hack. As well as skipjack is used to create digital signature to avoid unauthorized users.
Identity-based encryption (IBE) is a public key cryptosystem and eliminates the demands of public key infrastructure (PKI) and certificate administration in conventional public key settings. Because of the absence of PKI, the revocation drawback could be a crucial issue in IBE settings. Many rescindable IBE schemes are planned relating to this issue. Quite recently, by embedding associate outsourcing computation technique into IBE, Li et al. planned a rescindable IBE theme with a key-update cloud service supplier (KU-CSP). However, their theme has 2 shortcomings. One is that the computation and communication prices are above previous rescindable IBE schemes. The opposite disadvantage is lack of measurability within the sense that the KU-CSP should keep a secret worth for every user. Within the article, we have a tendency to propose a replacement rescindable IBE theme with a cloud revocation authority (CRA) to resolve the 2 shortcomings, namely, the performance is significantly improved and the CRA holds only a system secret for all the users. For security analysis, we demonstrate that the proposed scheme is semantically secure under the Decisional Bilinear Diffie-Hellman (DBDH) assumption. Finally, we have a tendency to extend the planned rescindable IBE theme to gift a CRA-aided authentication theme with period-limited privileges for managing an outsized range of varied cloud services.
The development of smart phone technology has lead to denigrate of the phone prepared with many sophisticated features such as sensors. Camera is one of the most extensively used sensors. Although the photographs capture by camera can be shared via Multimedia Message Service (MMS) which allows broadcast of files like photographs, audio and video. A major problem of MMS is, it doesn’t provide adequate safety mechanism. Because of this, the data of the people who wants to conceal confidential information from state-controlled systems that can be easily monitored. Video Steganography is a technique to hide any type of files in any extension into a Video file. The idea proposed in this paper is to embed any kind of data in another file, which is called carrier file. The carrier file must be image video file. Steganography is the art of hiding messages inside other messages such that the very existence of the message is unknown to third party. In this paper, a steganography-based android mobile application that can insert the confidential information into an image, then into a video that can be send it to receiver. Finally we can extract the confidential information from the image in the receiver side.
A P2P network can be an ad hoc connection- a couple of computers connected via a Universal Serial Bus to transfer files. And these networks are vulnerable to peers. The traditional security techniques are insufficient for P2P networks as they are insecure by their very nature. There’s no centralized server controlling access to shared resources in a P2P network which have unique challenges including identity management of the peers, secure reputation data management, Sybil attacks, and above all, availability of reputation data. The future actions are predicted where peers are encapsulated in its digital reputation, based on the past behaviour of the peer.Thus a peer’s reputation allows it to cooperate and prevent from malicious activities. The cryptographic protocol is coupled with selfcertification and cryptographic mechanisms for identity management and countering Sybil attack.
Abstract should be times new roman with 9 fount single spacing.The main focused of Watermarking is developing and i Image Recognition is the idea of simulating the visual functions of human brain which uses human eyes as the source of input to recognize and make decisions on the objects it sees. This became possible with the advent of cameras and advanced processing technologies. The idea is to copy the features exactly present in the pattern, that the brain uses to recognize images [6]. The image in the real world are captured and pre-processed in the desired format and stored in large chunks of memories. This is to provide the recognition program to compare the new image taken with the ones that has been pre-processed and stored. The comparison is done at the pixel level of the image which is expressed in a matrix form. The image is compared with the data set stored at pixel level and the decisions are made recognizing the image. This picture recognition method becomes a smarter solution with the availability of more number of data sets. With large number of trail and errors the system will get familiar and intelligent providing best solution for computer and robot vision technologies.
The rapid growth of wireless devices introduces a diverse range of applications and requires intelligent hardware platforms that integrate computing, sensing, and wireless connectivity in a compact systemon- chip (SoC). This paper presents a low-power, high-performance SoC platform that supports dynamic power management and secure communication. The SoC platform consists of 16-/32-bit programmable ARM9 cores, a power management unit with multiple low-power modes, analog and digital peripherals, and security engines. A complete tool-chain with an automatic platform generator has also been developed to ease and accelerate the application development. Fabricated in a 65 nm CMOS technology, an implementation of the proposed platform occupies an area of 1.0 × 1.7 mm2.
A mobile adhoc network is a Self-configuring network of mobile routers connected by wireless links. In the mobile adhoc network, each and every device moves independently in any direction so that there are frequent changes in the links. It is essential to learn the position of the neighbors because there is increase in location-aware services. So, there is a chance that the malicious nodes are easily abused the process. The significant problem in mobile networks is correctness of node locations and also it is primarily challenging in the presence of adversaries. So, the neighbor position verification protocol is used to a fully distributed, a lightweight NPV procedure which allows each node to obtain the locations advertised by its neighbors and asses their truthfulness. Further to extend neighbor position verification protocols in the proactive model that need to each node constantly verify the position of its neighbors. So, we introduce a technique called secure link state updating which provides secure proactive topology discovery that is multiply useful for the network operation. This technique is vigorous against individual attackers, it is capable to adjust its capacity between local and network-wide topology discovery, and also operating in networks of frequently changing topology and membership nodes. Experimental results show that the proposed system is high efficiency in terms of security when compared to the existing system.
The mobile adhoc network is a group of mobile nodes without having the fixed infrastructure. Due to the infrastructure less network and distributed nature, make mobile adhoc network susceptible to malicious attackers. So, we use an intrusion detection system called Enhanced Adaptive ACKnowledgement (EAACK) especially for mobile adhoc networks. Based on the digital signature algorithm (DSA) and RSA the EAACK is designed. To enhance the strength of the security in the mobile adhoc networks, we introduce an innovative approach called Hybrid Security Protocol that provides integrity, confidentiality and authentication. This Hybrid Security Protocol consists of Cryptography based on Elliptic curve, Dual-RSA algorithm and Message Digest MD5. Encryption is achieved by using Elliptic Curve Cryptography, Dual-RSA algorithm for authentication and MD-5 for integrity. By using a combination of both symmetric and asymmetric cryptographic techniques, we achieve better security with integrity.
For given condition of (temperature and humidity) of suction air, the delivery air condition depends on the system parameters (depth, radius, length and air mass flow rate), thermo physical properties of the surrounding earth (thermal conductivity and specific thermal capacity) and earth surface environment (ambient temperature, ambient humidity and solar irradiance)[1,3].Sensitivity analysis of system performance is essential for understanding the relative importance of different parameters of design of a optimum system [2,5]. For the steady state periodic input air condition and the performance of the system can be measured in terms of heating potential during the winter period and cooling potential during the summer period. Sensitivity of the system performance parameters (heating potential in winter and cooling potential in summer) to the changes in system parameters or thermo physical properties of the surrounding earth has been analysed and the result is present is in this paper.
Keeping an in depth tab of recent folks or folks on chair with bound health conditions for his or her health and safety is a very important task. With maturity, weak bones and weakness because of alternative health connected problems could lead to will increase risk of falling. A supervisor might not continually be on the market with them and if correct assistance is not provided at the correct time it should cause larger health considerations which will need extra resources for treatment. For this purpose we've projected a wise IOT Fall Detection System exploitation acceptable sensors that square measure integrated facilitate|to assist} report these incidents to assist avail help at the correct time to forestall additional injury to health. The same system uses sensors like associate degree measuring system to live the speed of the person, a rotating mechanism to live the person’s orientation so as to live their stability, a load sensing element once the system is employed by an individual employing a chair to live their weight, a Wi-Fi module and a microcontroller that sends the general readings to alert the involvedthose that shall give with the right suggests that to assist the person in want. The microcontroller receives all the info from the sensors and perpetually transmits and monitors the acceleration and also the orientation of the person. Any fast abrupt modification within the system which will result from a fall is taken into account as a ‘fall’ and is reported . a serious concern would be that not all fast movement may end up from a fall and be thought of as a matter of concern. To avoid this warning a napbutton is provided to snooze the system. This button will be ironed before a definite time say 15-30 seconds to prevent the system from causation the alert, thus avoiding any confusion and panic. this method will be mounted to the person’s chair or will be created compact to be created into a wearable device which will be worn on the hand.