International Journal of Advanced Studies in Computer Science and Engineering (IJASCSE)

                                                                                                                                                                                                   ISSN : 2278 7917 

Call For Papers

January 2019

  Submission         January 10

  Acceptance         January 20

  Publication          January 30

Bookmark and Share

International Journal of advanced studies in Computer Science and Engineering (IJASCSE) is here to provide a timely and broad coverage of research in ever-challenging field of Computer Science and Computer Science Engineering. IJASCSE is an interdisciplinary, peer reviewed, fully refereed, monthly, Open Access journal for research scholars with a mix of regular and theme based issues to share their new and advanced research in Computer Science and Engineering. 


The papers published at IJASCSE are currently Abstracted & Indexed by some world famous databases.

 Call For Papers

December  2018

     Submission            December 10

      Notification            December 20

      Publication            December 31

Bookmark and Share

Open Access Database


IJASCSE is an online peer reviewed quality publication, which publishes research papers from diverse fields in computers, sciences, engineering and technologies that emphasizes new research, development and their applications. It provides an open access database for all who are interested to exchange their research work, technical notes & surveying results among professionals through out the world.

 

 IJASCSE volume 7 issue 06                            

 

Overview of Flash Memory Characteristic and FTL Mapping Strategies for Data Duplication Performance

Aqilah Paskhal Rostam, Rosni Abdullah

 

Abstract-In order to store a bulk of data in a shorter time, duplicator machine is used to speed up the transfer and duplication process where generally duplication process is done by copying each data bit from the master device to the targeted device including the unused memory region. Unfortunately, to duplicate a 64GB (eMMC) memory typically takes up between two to seven hours plus speed specification provided by vendors for the duplicators performance is much lower when tested in real experience. Therefore, this paper review past performance of mapping strategies limitation and consider other way to improve duplication process such as focusing more on data size reduction and how data is arranged and transferred during data duplication process across flash devices.

 

REFRACTIVE INDEX TUNABILITY IN SILICON OXYCARBIDE FOR PHOTONIC WAVEGUIDES
Bilal Nizamani, Faheem Aziz Umrani, Faisal Ahmed Memon


Abstract-. In this paper we have worked on high index contrast channel waveguides based on silicon oxycarbide (SIOC) core with silica (SiO2) clad which result in increased confinement factor, low bending radius, low coupling loss and higher integration. Integration of several components permits us to have various functionalities onto a single chip which will also reduce the cost. We have analyzed the characteristics of silicon oxycarbide waveguides with software based on beam propagation method (BPM). Silicon oxycarbide being a novel material has been analyzed having refractive index to be tuned from 1.58 to about 1.82. With the tuning of refractive index from 1.58 to 1.82 the simulation result of confinement factor is observed to increase from 32% to 61% and the coupling loss remains in acceptable range of below 3db.

STEGANOGRAPHY ENCRYPTION AND DECRYPTION USING LEAST SIGNIFICANT BIT INSERTION AND TEMPLATE MATCHING FOR IMAGE MESSAGING SECURITY
Wirawan Istiono, Hijrah, Said Ramadhi


Abstract —In internet era, the transaction of information by using the internet media is commonly do by many people, but the information security is often experiencing constraints because the information can be accessed by someone who are not unauthenticated or irresponsible, using steganography, the information protection techniques by concealing messages in the image media by using the Significant bit insertion method, which then can be extracted again by using a special key and a special system created to describe the hidden messages in the image. The results obtained by using the least significant bit insertion method in the image and template matching for the image, it has been proven that the message can be hidden in the picture and then can be extracted again.

  

Vehical Tracking Techniques in ITS: A Survey

Sundas Metlo, Faisal Karim Shaikh

 

Abstract- In this paper, we have reviewed and presented the different techniques with different methods, platforms and algorithm used for tracking of vehicles. GPS based tracking technique is used most commonly, but other techniques like RFID, Cellular network based, Smartphone based and VANETs based tracking techniques are also reviewed. Parameter based comparison between different tracking technique is presented. For future development, cost effective crowdsource based vehicle tracking system is also discussed, which will meet the future needs of ITS services.  

 






Keywords — Duplication; FTL; Page-Mapping; Block-Mapping, Hybrid- Mapping, NAND.













Keywords: Silicon oxycarbide, waveguide, coupling loss, confinement factor.















Keywords- component; Steganography, least significant, bit insertion, javascript, text information  encrypt











Keywords— ITS; Vehicle Tracking; GPS; GSM; RFID; Smartphone


block-mapping.pdf
To download Click here
refractive index tunability.pdf
To download Click here
steganography encryption.pdf
To download Click here
vehical tracking techniques.pdf
To download Click here