JECET : Journal of Environmental Science, Computer Science and Engineering & Technology. E-ISSN : 2278-179X

      JECET : Journal of Environmental Science, Computer Science and Engineering & Technology

Research Papers in Comp Science

Protecting Quantum Information from Errors

Mensouri Mohammed, Aaroud Abdessadek, Ali El Hore

The quantum error-correcting codes or QECC (Quantum Error-Correcting Codes), exist in the same classic that purpose: to protect the information. However, contrary to the classical case, the error correction of a quantum system is necessary to lower the degree of the scale. Typically, it would not be necessary to protect using classical correct codes the bits circulating inside a computer, if it is considered that the transmission is “instantaneous there”. The classical correct codes take all their direction during transmission by networks (standard telephony, television, Internet …) or damaging supports (type CD,). At the quantum level, the probability of error exists as of the creation of the qubit, and this is why even for a transmission as short as that existing inside a computer, one plans to use the QECC to fight against the phenomenon of decoherence, which threatens any quantum system continuously. The QECC could also be used repeaters during transmissions as quantum signal on long distance, as for the quantum transmission of secret keys used in quantum cryptography

Greening Mobile technology: Principles and Practices

Greening mobile technology refers using mobile technology very efficiently and minimizing the effects of toxic elements contained in the mobile phones on the environment. The problems produced by mobile phones on environment are very high and toxic in nature. The number of unused and repaired mobiles is keep increasing every year. The need for recycling the mobile phones and steps for recycling mobiles is given in this article. A survey is taken on different mobile phones with their basic problems which lead to failure and the need to stop producing the second grade mobile phones is discussed in this article.

Intelligent Vehicle Monitoring System Using Wireless Communication

Shaifali Jain, Ankit Satija, Anshul singh, Ayush Jain

In highly populated Countries like India, during accidents, people lose their lives due to unavailability of proper medical facilities at the right time; also the accidents due to drink and drive are increasing in a large manner, so proper care need to be taken to prevent accidents occurring due to drink and drive. The paper proposes a system that will sense any accident in the vehicle and intimates about it to the preprogrammed numbers likeambulance, police etc, also tells the location of the person who is dunk and driving to his family member so that fast preventive measures can be taken.

Arabic Name Entity Recognition Using Second Order Hidden Markov Model

Fadl Dahan, Ameur Touir and Hassan Mathkour

In this paper, we introduce a model that builds an automatic name entity recognition (NER) system for Arabic language by using the context structure for three words (the target word and two words before) and second order of Hidden Markov Model (HMM). We deal with this context, history by keeping them into Tri-gram model, then we integrate between the HMM and the words features to make decision about the classification of target words without human intervention and supported names list.

Distributed Data Security For Data Prevention In Cloud Computing Using One Time Password For User Authentication

Mr.S.Subbiah and Dr.S.Selva Muthukumaran

Abstract:Cloud computing is rapidly becoming an effective and economic solution for business transactions because it uses the philosophy of Infrastructure as A Service, where both the application and the data is stored in the cloud, while the end user or client can do with minimal resources without having to purchase, install the application and upgrade the hardware resources. The Cloud provides inherent benefits in data storing, data sharing and application access in a cost effective manner. This minimizes local data storage and maintenance. But the data is centralized means data is subject to risk. Hence data is spread across servers resources and is generally advocated. The data thus stored is encrypted and also used for data authentication and access. But the data storage is generally outsourced to third parties with vested interests. Hence this study proposes the need for data integrity through Third Party Auditing and by storing the data heterogeneously across multiple servers or databases and thus provides extra security to cloud users. And also use One Time Password for user authentication like the banking system. This distributed data split vertically when combined with encryption provides an extra layer of security and ensures users data access and storage in a simple and cost effective manner as well.

Knight’s Tour Application in Image Diffusion

Narendra K Pareek

 

In this communication, we propose an algorithm to diffuse pixels of a squared image using knight moving tour (game of chess) in conjunction with an external secret key of 128-bit size. The propose algorithm is extremely sensitive to initial position of the knight on a board and have a higher diffusion rate. Propose algorithm can be used to design robust and secured image encryption algorithm.

Journal Indexing


International Scientific Indexing (ISI).




Social Links

Facebook

Share