Certificates
Certificates
Certificates
We the undersigned solemnly declare that the Major project report entitled
“COMPARISON OF CPU SCHEDULING ALGORITHMS” is based our own work
carried out during the course of our study under the supervision of Dr. J P Patra.
We assert that the statements made and conclusions drawn are an outcome of the
project work. We further declare that to the best of our knowledge and belief that the
report does not contain any part of any work which has been submitted for the award
of any other degree/diploma/certificate in this University/Deemed university of India
or any other country.
I
Department of Computer Science & Engineering
Shri Shankaracharya Institute of Professional Management & Technology
Raipur (C.G.)
This is to certify that the Major project report entitled “COMPARISON OF CPU
SCHEDULING” is a record of project work carried out under my guidance and
supervision for the fulfillment of the award of degree of Bachelor of Engineering in
the faculty of Computer Science & Engineering of Chhattisgarh Swami Vivekananda
Technical University, Bhilai (C.G.) India.
__________________________
(Signature of the Supervisor)
Dr. J P Patra
Professor, Dept of C.S.E.
S.S.I.P.M.T, Raipur (C.G.)
Forwarded to
Chhattisgarh Swami Vivekanand Technical University
Bhilai
_______________________________ _______________________________
(Signature of HOD) (Signature of the Principal)
Dept. of Computer Science & Engineering Dr. Alok Kumar Jain
II
Department of Computer Science & Engineering
Shri Shankaracharya Institute of Professional Management & Technology
Raipur (C.G.)
III
Department of Computer Science & Engineering
Shri Shankaracharya Institute of Professional Management & Technology
Raipur (C.G.)
__________________ __________________
Internal Examiner External Examiner
Date: Date:
Department of Computer Science & Engineering
Shri Shankaracharya Institute of Professional Management & Technology
Raipur (C.G.)
ACKNOWLEDGEMENT
Working for this project has been a great experience for us. There were moments of
anxiety, when we could not solve a problem for the several days. But we have
enjoyed every bit of process and are thankful to all people associated with us during
this period we convey our sincere thanks to our project guide Dr. J P Patra for
providing me all sorts of facilities. His support and guidance helped us to carry out the
project. We owe a great dept. of his gratitude for his constant advice, support,
cooperation & encouragement throughout the project we would also like to express
our deep gratitude to respected Dr. J P Patra (Head of Department) for his ever
helping and support. We also pay special thanks for his helpful solution and
comments enriched by his experience, which improved our ideas for betterment of the
project. We would also like to express our deep gratitude to respected Dr. Alok
Kumar Jain (Principal) and college management for providing an educational
ambience. It will be our pleasure to acknowledge, utmost cooperation and valuable
suggestions from time to time given by our staff members of our department, to
whom we owe our entire computer knowledge and also we would like to thank all
those persons who have directly or indirectly helped us by providing books and
computer peripherals and other necessary amenities which helped us in the
development of this project which would otherwise have not been possible.
We have taken efforts in this project. However, it would not have been possible
without the kind support and help of AICTE-IDEA Lab at SSIPMT, Raipur. We
would like to extend our sincere thanks to all the gurus, mentors and support staff of
Idea lab.
Department of Computer Science & Engineering
Shri Shankaracharya Institute of Professional Management & Technology
Raipur (C.G.)
LIST OF ABBREVIATIONS
BT Burst Time
RR Round Robin
LIST OF FIGURES
ABSTRACT
In data communication and multimedia application, security plays a crucial role for
transmission of knowledge and pictures. In recent years, the latest encryption
technology has improved the safety of multimedia data from unauthorized access.
Multimedia encryption techniques converts original data to other form which is hard
to recognized and is known as cipher-text. At the present, there are several
conventional encoding algorithms are available like, AES, RSA and IDEA which are
used for encryption of text and binary data. The essential methods have a fixed length
of a key. However, the traditional algorithms are inefficient to use them directly in
multimedia data and colour image encryption due to high correlation among pixels.
Here in this paper, we have discussed various encryption techniques and trying to
focus its merits and demerits on encryption of images. We have also find out the gaps
of all major key generated encryption techniques and proposed their solutions through
this paper. This paper may en light the path of new researcher who are working in
image encryption using key generation method and bitwise operation.
Keywords: Image, XOR cipher, Image Encryption: Key generation and bitwise
operation, Encryption Quality Analysis.
Department of Computer Science & Engineering
Shri Shankaracharya Institute of Professional Management & Technology
Raipur (C.G.)
TABLE OF CONTENTS
Page No.
DECLARATION BY CANDIDATE I
CERTIFICATE BY SUPERVISOR II
CERTIFICATE BY EXAMINERS III
ACKNOWLEDGEMENT IV
ACKNOWLEDGEMENT TO AICTE IDEA LAB V
LIST OF FIGURES VI
LIST OF ABBREVIATIONS VII
ABSTRACT VIII