Recent Patents on Engineering - Volume 12, Issue 1, 2018
Volume 12, Issue 1, 2018
-
-
A Secure Image Encryption Scheme using Chaos and Wavelet Transformations
Authors: Bhaskar Mondal, Tarni Mandal, Danish A. Khan and Tanupriya ChoudhuryBackground: Images are widely stored and transformed over public channel for communication, medical purpose or organizational uses. Mostly the images are collected from the remote location, therefore the confidentiality of the data becomes the most important matter of concern. The most convenient way to protect the data (image) is to encrypt it right after the capturing the images from the sensors at remote locations. There are a large number of patents registered till date. We have covered all the benchmark and important patents on encryption. Objective: This paper furnished an enhanced secure encryption scheme to assure the confidentiality of images at the time of transmission or storage. There are numerous encryption algorithms proposed in the recent days, most of them are not suitable for image encryption due to their high computational overhead and design structure. The proposed scheme has comparatively low computational overhead as it uses 2D DWT for decomposition of the image and chaotic maps for generating pseudo random numbers sequence (PRNS). Methods: The scheme is based on 2D DWT and chaotic maps. The scheme can be divided into two basic phases. In the first phase, it permutes the image using pseudo-random numbers generated by Arnold's cat map followed by a transformation in 2D DWT for diffusion based on enhanced piece wise linear chaotic map (EPWLCM). Results: The proposed scheme was tested statistically with promising results. Therefore, the proposed scheme is secured from any attack, has light weight and is effective. Conclusion: The proposed scheme highly reduced the computational complexity, but without compromising the security. A number of tests were done and the results obtained were satisfactory. The scheme may simply be modified for color image or any other kind of data encryption.
-
-
-
A Novel Defense Scheme against Flooding Attack in Mobile Adhoc Networks
Authors: T. Bhatia, A.K. Verma, G. Sharma and S. BalaBackground: Mobile Adhoc NETwork (MANET) is a self-configurable network consisting of mobile nodes connected by wireless links according to recent patents. The inherent features of MANETs like- dynamic topology, limited resources and lack of centralized trusted authority make it more vulnerable to attacks than wired networks. Reactive protocols that involve broadcasting of route request (RREQ) messages to their one hop neighbors are prone to RREQ flooding attack. We have revised the patents relating to flooding attack in MANET. Objective: An attempt is made to propose a secure route from source to destination in presence of RREQ flooding attack and effectiveness of proposed scheme is validated using NS-2. Methods: We proposed an efficient and lightweight detection algorithm, which is capable of not only mitigating useless RREQs packets caused by malicious nodes but also detecting and isolating them. The cache of a node purges after a fixed interval of time to account for better memory utilization of mobile nodes. Results: Simulation results show significant improvement in packet delivery fraction in the presence of RREQ Flooding nodes with marginal rise in average end to end delay and routing load thus indicating the closeness to the Adhoc On-Demand Distance-Vector (AODV) routing protocol. Conclusion: Our proposed algorithm detects and isolates multiple RREQ Flooding nodes without sending any additional control packets. Benign nodes in the network work in cooperation for detecting and penalizing attacker nodes by blocking routing and data packets originated from it.
-
-
-
Persistent Cellular Telephony: Enhanced Secure GSM Architecture
Authors: Prabhat Kumar, Md. Zafarul Quadri, Kavita Sharma, Nhu N. Gia and Preetish RanjanBackground: Patents reveal that mobile phones are the best possible mode of contact in case of any emergency situation. However, a message such as switched off or out of coverage area on mobile phones may make a caller helpless. There is no way of contacting a mobile user if the user is in a situation of out of range or switched off state due to non-coverage or any technical fault. Objective: This paper proposes a method using existing GSM architecture which allows to contact the cellphone users even if their mobile is switched off or out of coverage area. Methods: The proposed solutiongathers the information of all the mobile phones present in the vicinity of a particular mobile phoneover a Bluetooth connection.This information is stored and maintained at the network subsystem in a database called Phone List Register (PLR) which is updated periodically. Whenever a user needs to contact a mobile which may be either switched off or out of coverage area the service provider shall make this list available to the user so as to contact the intended receiver. Results: The proposed method has been analysed to be a viable solution for providing messages to a particular person, or even identifying the last known location of the user in emergency scenarios such as terrorist attacks, kidnapping and other disaster situations. Conclusion: The implementation of PCT in GSM network will open a wide range of facilities for a user that will make mobile communication more persistent and easy to use.
-
-
-
Clustering Morphed Malware using Opcode Sequence Pattern Matching
Authors: Ekta Gandotra, Sanjam Singla, Divya Bansal and Sanjeev SofatBackground: Due to easily available Virus Creation Kits that help in the generation of variants from an original malware in no time on the Internet has led to an exponential growth of the advanced malware. In recent years, the detection of advanced malicious programs like Metamorphic and Polymorphic variants has become a major issue for the Anti-Virus companies due to their concealing property either by mutating their code or by using obfuscation techniques according to recent patents. Due to mutation property of the morphed malware, the detection methods based on signature and heuristic techniques seem to be irrelevant solutions. Methods: In this paper, K-means clustering is used to identify the variants of known malicious programs. In the proposed method, K-Means algorithm is applied on the dataset consisting of variants generated from Virus Creation Kits like MPCGEN/G2 and normal malicious files downloaded from the Internet. For computing the similarity score (using Euclidean distance equation), opcode sequence pattern matching is used. Results: Based on the similarity score of opcode sequence pattern matching, the files considered in the dataset are grouped as normal malware or Polymorphic/Metamorphic malware with promising accuracy rate of 98.1%. Conclusions: Due to the availability of Virus Generation Kits on the Internet and the concealing property of the morphed malware, there has been an exponential growth of morphed malicious programs which are complex and hard to be detected by Anti-Virus tools. The proposed method shows that K-means is very effective for clustering malware variants mainly because it intuitively fits in solving the opcode sequence matching problem.
-
-
-
Graphene-Based Ultrafiltration Membranes for Separation: Synthesis and Applications
Authors: Xu Zhang, Zehai Xu, Ling Wang, Xinyan Wang, Yong Zeng and Guoliang ZhangBackground: Water treatment, important for maintaining clean water among other applications, is still a challenge to improve remediation technologies for eliminating pollution. Ultrafiltration, as one kind of membrane separation processes which play a vital role in water treatment, has been attracted extensive attention for its merits of high-efficiency, low-cost and energy-saving. However, some drawbacks still restrict the application, including poor hydrophilicity, low permeability and severe membrane fouling. Thus, improving the performances of the ultrafiltration membrane is urgently required. Methods: This paper reviews recent literatures and patents on the synthesis and applications of graphene-based ultrafiltration membranes. The goal in this work is to provide deep insight into the selection of graphene-based materials, structural design and methods of graphene-based mixed-matrix membranes (MMMs) and the substrate supported graphene-based membranes. Results: Various drawbacks in traditional ultrafiltration membranes such as obvious protein adsorption, severe membrane fouling and poor hydrophilicity can be reduced through incorporating graphene-based nanomaterials into polymer membranes. It is confirmed by putting forward to some applications in water purification, antibacterial membranes, membrane bioreactors and protein separation. Conclusion: Graphene-based materials introduced into membrane materials have shown that they can effectively increase the permeability, antifouling and antibacterial properties of membranes. In this review, we anticipate to provide a useful insight into the design and synthesis of graphene-based ultrafiltration membranes, and hope that a new avenue can be opened to develop high quality ultrafiltration membranes in separation process.
-
-
-
Critical and Comprehensive Evaluation of High Pressure Pipeline Rehabilitation Methods and Patents for Seeking Innovation Trends
Background: Fluid transport pipelines are subjected to operating conditions that generate their continuous deterioration. The deterioration rate is of great significance when the pipeline is considered a high pressure line (above 200 psi), which can lead to major loss of life and assets in case of any system's failure. Objective: This study seeks for innovative pressure pipeline intervention methods used in industry, like the oil & gas. Methodology: An exhaustive revision of literature from diverse sectors of pressurized fluid transport through pipelines was performed, with special emphasis on oil & gas sector. The traditional criteria were reviewed including the possibility of implementing the intervention while in service, the possibility of application of the method with leakage, the classes of defects in which the method is effective, material classes, user-friendliness, and risks associated with the implementation of the methods. The new principle depends on the ability of the method to relieve the stresses of the intervened area immediately. A patent review of trench technologies was also performed to emphasize innovation evolution and possible investigation trends referring to “active” interventions. Conclusion: The selection of rehabilitation methods is dependent on the degree of the integrity improvement, operability and the desired increase in the remaining life. Most of the developed technologies are applied with the common defects found in the pressurized transportation pipelines. There has been an important change in the generated patents for the industry that shows the evolution from mere mechanical containments to hybrid rehabilitation methods that lead to the “active” trend.
-
-
-
Simulation and Experimental Study on Micro Electrochemical Drilling with Ultra Short Pulse Voltage by using High-speed Spiral Electrode
Authors: Jingran Niu, Yong Liu, Chunsheng Guo, Mingyu Wang and Minghong LiBackground: The fabrication of Micro-holes in hard machining materials is always difficult according to recent patents. The electrochemical drilling process is a good selection for the fabrication of Micro-holes. Methods: In this paper, an electrochemical drilling process for fabricating Micro-holes with high efficiency is introduced, and simulation of the gap electric field and the gap flow field is carried out. Firstly, the model of ultra short pulse gap electric field is established, the shape change of the anode workpiece surface in the electric field is analyzed and predicted based on the simulation of the drilling with ultra short pulse voltage. Then, the numerical simulation of the gap flow field is simulated by CFX with the increase of the electrode rotating speed. Finally, the simulation results are verified by the experiments. Results: The removal direction and rate of a point on the surface of the workpiece with ultra short pulse voltage was derived. The shape change of the anode workpiece surface with ultra short pulse voltage was simulated. The distribution of water vapor and the velocity vector graph in micro machining was obtained. A series of Micro-holes was machined successfully, the diameter of the Micro-holes was less than 200μm. Conclusion: The ultra short pulse voltage can greatly improve the machining localization. The gas film with good insulation effect around the electrode increases rapidly, which can reduce the taper of the Micro- holes significantly. The experiment results prove that the micro electrochemical drilling for fabricating Micro-holes has a huge potential and a widespread application prospect.
-
-
-
Fault Diagnosis Based on Strong Tracking SRUKF and Residual Chisquare Test
More LessBackground: Patents suggest that fault diagnosis is an important technology for maintenance, which is usually employed to avoid system catastrophic damage and ensure reliability. Objective: As traditional diagnosis method was limited in linear systems, a novel diagnosis method was proposed to address hidden failure in nonlinear system. Methods: This method was based on the combination of strong tracking square root unscented Kalman filter (STSRUKF) and sequential residual χ2 (chi-square) test. After discussing some related patents and methods, the χ2 test was introduced to check the STSRUKF abnormal residual, and this test solved the problem of inability to locate fault for SRUKF. Firstly a χ2 test was used to locate faulty parameters via detecting STSRUKF residual outputs generated by all the potential faulty models. Secondly, the located faulty parameters were estimated by STSRUKF to indicate the faulty degree. Results: A simulation case was used to verify the reliability of the presented approach. The experiment results indicated that the proposed algorithm could locate faulty parameter accurately, and the STSRUKF estimation accuracy was higher than square root unscented Kalman filter (SRUKF) and strong tracking unscented Kalman filter (STUKF). Conclusion: The method provides references for hidden fault detection and parameter estimation.
-
-
-
New Method for Testing the Grouting Compactness in Pre-Stressed Concrete Girder
Authors: Qingming Xiang, Shenghui Qi, Jiaxuan Su, Tianshu Yang and Xuansheng ChengBackground: The post-tensioned pre-stressed concrete girder is widely used in modern bridge construction. Grouting compactness has a great influence on the safety, reliability and durability of pre-stressed concrete girders. So, it is important to test the grouting compactness of the pre-stressed girder to ensure the construction quality and meet the design requirements. However, there are some defects in the existing method for testing the grouting quality of post-tensioned pre-stressed concrete girders. Therefore, a new method should be invented. Methods: In this paper, the recent research status and patents on grouting compactness testing are summarized, and the principles of grouting quality testing methods (ultrasonic testing method, impact-echo method, radiographic testing method, endoscope testing method, infrared radiometry method, and ground penetrating radar testing method) that are commonly used are compared and analyzed. Results: Based on the advantages, disadvantages and applicability of these testing methods, by refining the current patents relating to grouting compactness testing, new intelligent testing equipment is integrated, and new method is proposed. Conclusion: This new method is more efficient and accurate and it has good applicability in engineering.
-
Volumes & issues
-
Volume 19 (2025)
-
Volume 18 (2024)
-
Volume 17 (2023)
-
Volume 16 (2022)
-
Volume 15 (2021)
-
Volume 14 (2020)
-
Volume 13 (2019)
-
Volume 12 (2018)
-
Volume 11 (2017)
-
Volume 10 (2016)
-
Volume 9 (2015)
-
Volume 8 (2014)
-
Volume 7 (2013)
-
Volume 6 (2012)
-
Volume 5 (2011)
-
Volume 4 (2010)
-
Volume 3 (2009)
-
Volume 2 (2008)
-
Volume 1 (2007)
Most Read This Month
