ICGITS' 2013 - Computer Science
Interruption Controlled Optimal Sorting[Full-Text ]
Rathinasabapathy R and Chandrasekaran SThere are numerous algorithms have been developed to sort a given set of elements. Generally, sorting algorithms are having a computational complexity of O(n2). During the process of sorting when there is an interrupt due to system failure, the algorithm abruptly ends. Then the algorithm usually requires to be started again from the beginning. Given the quadratic complexity, when the sorting process is interrupted, restarting from the beginning, will be time consuming. In this paper, a solution has been provided, by way of using an algorithm, which will not start from the beginning, instead it will continue from where the sorting algorithm was interrupted by storing the intermediate data in the secondary storage.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Automatic Skew Detection and Localisation of Vehicle License Plate Using Hough Transform[Full-Text ]
Raseena A, Asst. Prof. Muhammad SajeerAutomatic Skew Detection and Localization of Vehicle License Plate Using Hough Transform are used to identify a vehicle by its number plate. The proposed algorithm consists of three major parts: Extraction of plate region, segmentation of characters and recognition of plate characters. The proposed license plate localization algorithm is based on a combination of several algorithms that include Thresholding, Edge Detection and Hough rectangular transforms. The process flow is, initially the Thresholds are performed on a plain image. Then edge detection is applied to the obtained image and then location is found using top hat transform and then the skew is detected by using the Hough Rectangular Transform and correct it and finally get the localized number plate from the digital image as a deskewd image. After that Connected component analysis is used to segment the characters individually and finally statistical based template matching is used for recognition of plate characters
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Agent Based Evacuation Simulation Using Leader-Follower Model[Full-Text ]
Vani K, Sumam Mary IdiculaAgent based simulation is a widely developing area in artificial intelligence. The simulation studies are extensively used in different areas of disaster management. This work deals with the study of an agent based evacuation simulation which is being done to handle the various evacuation behaviors. Various emergent behaviors of agents are addressed here. Dynamic grouping behaviors of agents are studied. Collision detection and obstacle avoidances are also incorporated in this approach. Evacuation is studied with single exits and multiple exits and efficiency is measured in terms of evacuation rate, collision rate etc.Net logo is the tool used which helps in the efficient modeling of scenarios in evacuation.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Agent Based Simulation of Street Robbery[Full-Text ]
Amrutha S, Sumam Mary IdiculaRoutine activity theory introduced by Cohen& Felson in 1979 states that criminal acts are caused due to the presence of criminals, victims and the absence of guardians in time and place. As the number of collision of these elements in place and time increases, criminal acts will also increase even if the number of criminals or civilians remains the same within the vicinity of a city. Street robbery is a typical example of routine activity theory and the occurrence of which can be predicted using routine activity theory. Agent-based models allow simulation of diversity among individuals. Therefore agent based simulation of street robbery can be used to visualize how chronological aspects of human activity influence the incidence of street robbery. The conceptual model identifies three classes of people- criminals, civilians and police with certain activity areas for each. Police exist only as agents of formal guardianship. Criminals with a tendency for crime will be in the search for their victims. Civilians without criminal tendency can be either victims or guardians. In addition to criminal tendency, each civilian in the model has a unique set of characteristics like wealth, employment status, ability for guardianship etc. These agents are subjected to random walk through a street environment guided by a Q learning module and the possible outcomes are analyzed.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Harnessing Organizational Knowledge Engineering for Expert System Development by deploying ART Artificial Neural Networks Algorithm[Full-Text ]
CHRIS M. JAYACHANDRAN M.C.A., M.Sc (Psy)., DWAP., CUSCS., CLSS(BB).,Application of ART Neural Network Algorithm in organizational knowledge engineering for expert system development is one of its kinds Research Work. This pioneering effort is the fusion of domains such as Knowledge Management and Engineering, Artificial Neural Networks, and Expert Systems. This Research Work is the modular fine-tuning in the existing knowledge engineering pedagogies for Expert System development, by stepping over specific shortcomings that are held to be systemic in the Expert system development life-cycle. This paper proposes the "sure-to-yield-results" Plasticity-stability feature of ART Neural Networks in organizational knowledge engineering for expert system development.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Critical Misbehaviour Prevention for a Secure Mobile Agent System[Full-Text ]
Jasiya Jabbar, Jyothi B, Mala J BA software agent is an intelligent program that acts as a user's personal assistant. Software agents endowed with the property of mobility are called mobile agents. Mobile agents perform a user's task by migrating and executing on several hosts connected to the network. The main drawback of mobile agents is the security risk involved in using mobile agents. Security risks in a mobile computing environment are two-fold. Firstly a malicious mobile agent can damage a host. On the other hand a malicious host can tamper with the functioning of the mobile agent. Any behaviour exhibited by a machine that is not taken into account at the time of programming, regardless of its favourable or unfavourable outcome, is considered to be misbehaviour. The surveys conducted on mobile agent security gives idea about different techniques that can be used for ensuring security of mobile agents. In this section we uses digital signature and RSA encryption algorithm for providing mobile agent security. In this work, we use JADE for the development of mobile agents. JADE (Java Agent DEvelopment Framework) is a software Framework fully implemented in Java language. JADE is free software and is distributed by Telecom Italia. In this work, JADE is enhanced to confirm major security goals-confidentiality, integrity and availability.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A virtual Cloud Model for Education and Knowledge Enhancement[Full-Text ]
M. Malathi, V.RajamaniWith the rapid development of the Internet, there are numerous resources one can find in the web. These resources may be available free of cost or come with transaction and access fee. It will be of major use if one could get a single or multiple resources from a pool of resources for rent on utility basis, allocated dynamically with demand varying from peak loads to normal, sitting at home or at a convenient location browsing through the internet. We have made a research on virtual education and the solution is Cloud Computing. Cloud computing is largely under study for various applications and for its cost reducing features. In this paper, we have utilized the service of cloud computing technology in the educational sector. We have proposed a virtual cloud called VCloud which makes use of the cloud computing features and providing service to the students. This service can be effectively used in educational, research institutions, and also companies involved in research, schools particularly in villages.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Technique for Bump Detection in Indian Road Images Using Color Segmentation and Knowledge Base Object Detection[Full-Text ]
Dr. Ajit Danti, Smt. Jyoti .Y. Kulkarni, Dr. P.S.HiremathSudden variation in the surface of the road makes it very difficult for safe driving and causes lot of accidents. The situation is more critical especially for vehicles moving with high speed. Sudden bumps pose a very difficult situation and applying sudden break at those juncture leads to many accidents. So, any techniques which can avoid such accidents need to be invented on urgent basis. With this background in view we have proposed to undertake a study by which it will be possible to suggest a novel, efficient technique for detecting the bumps. Bumps are detected by extracting the horizontal profile of the roads and by estimating the volume of horizontal profile. System is tested against the images of the roads taken across different parts of India using digital camera from a moving SUV running at a speed of 30km/h. Experiments show promising results in the detection of bumps
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
NetworkX and Matplotlib an Analysis [Full-Text ]
Yedhu Sastri, Kuttyamma A.JToday most of the networking computation and functions performed by the network administrators are very complex and requires high degree of programming skill. Python is a very powerful, open source, user friendly language that is widely popular today. NetwokX and Matplotlib are two packages in Python that provides wide range of functionalities and operations. NetworkX as its name indicates is very helpful in networking side. Matplotlib is mainly used for data visualization purpose. This paper is to give a basic idea about how the features of Python, NetworkX and Matplotlib can be used in solving Networking operations and Algorithms in an user friendly manner by reducing its complexity.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Pattern Matching Mechanisms for Packet Inspection[Full-Text ]
Nikhila T. Suresh,Mariam VarghesePacket is an integral part of any network system. Packet holds information & also they are the smallest individual units of information passed through the network. As the attacks in the internet have taken a tremendous growth in the previous years, the protection mechanisms come to the play dramatically. Initially there were protection & authentication mechanisms like password authentication, cryptography, firewalls etc. Along with these all techniques, the introduction of IDS (Intrusion Detection Systems)&Intrusion protection Systems(IPS)also happened. Deep packet inspection is very critical processes in many networking applications. This inspects the packets flowing through the network to detect viruses, applications or intrusions. If it detects any intrusion, then those packets will be blocked. This is known as deep packet inspection. These inspection points are embedded with a large no. of pattern which can be expressed in terms of ordinary strings or regular expressions. Regular expressions are powerful than ordinary strings & can be effectively find the intrusion attempts. Packet payloads are matched against these patterns. I.e. they allow the packet to continue its flow only if the payload of that packet matches with the patterns. This is called deep packet inspection. The major application areas are Intrusion detection, virus scanning, content filtering, instant-messenger management, and peer-to-peer identification etc. The deep packet inspection can be done through string matching or regular expression matching. The string matching can be done using 3 different methods i.e. Automation based, Heuristic based &filter based string matching algorithms. This paper mainly focuses on the statistical study on the different string matching mechanisms present in this scenario for deep packet inspection.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Novel Approach for Providing Security in SNMP Managed Sensor Networks Using Skipjack Algorithm [Full-Text ]
Geethu Krishna Kartha, Divya JamesNetwork Management is one of the important functionality in network Engineering. This paper proposes a methodology for security in SNMP managed sensor networks. Here we use SKIPJACK encryption algorithm for providing security in the network. IEEE1451.4 TEDS is also incorporated to provide plug and play of sensor networks. SNMP is compactable with many kind of devices used in networking, so it provides a wide variety of devices to communicate in a network independent of the manufacturers
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Improved Autonomous Network Reconfiguration System[Full-Text ]
Aswathi.P, Lakshmi.K.SWireless mesh networks (WMNs) are new developing technology in wireless networks and has a variety of applications. However during their life period, multi-hop wireless mesh networks which experience frequent link failures caused by channel interference from other collocated wireless networks, dynamic obstacles like Bluetooth, and/or application bandwidth demands .By this link failures the information transfer can be lost so the quality of communication cannot be achieved and cause severe performance degradation in WMNs. Sometimes for their permanent recovery, it requires expensive manual network management .This paper presents an improved autonomous network reconfiguration system (IARS) that enable a multi-radio WMN to autonomously recover from local link failure to preserve network performance. Based on current channel assignment and radio association, IARS first create some feasible local reconfiguration plans to recover from link failure. Next, based on that plans the system cooperatively reconfigures network setting among local mesh router. In addition, to strengthen WMNs performance, IARS decouples network reconfiguration from flow assignment and routing. In WMNs a threshold value is set for every node. When a node want to transmit data in the form of a packet from source to destination, it verify threshold value of each node, whether it reach its limit or not. When it reaches its limit, node choose another node to send data .It choose it route with minimum path cost value and minimum delay time, higher throughput. With this consideration, packet loss will be less when compared to ARS system.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Advanced Techniques For Preventing Selective Jamming Attacks[Full-Text ]
Abhimanyu.V ,L.M.NithyaThe wireless medium is always subjected to jamming attacks. These Jamming attacks can be used for launching Denial-of-Service attacks on wireless networks. Jamming has been considered as external attack model, but if the attack is internal it cannot be solved by using methods such as spread spectrum methods. In case of internal attacks, the adversary launches jamming attacks in which it targets highly important packets. First the problem of packet classification can be mapped to the hiding property of commitment methods, and propose a packet-hiding method based on commitments in which transmitter and receiver commit on a particular static key. A swarm based vulnerable prevention mechanism based on swarm intelligence is proposed against jamming attacks in wsn. Swarm intelligence algorithm is good in adapting according to change in network topology and traffic. Another method named channel surfing methods using attracting nodes to defend against selective jamming/dropping attacks is also proposed for enhanced security.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
An Architecture based hybrid approach for Network Management through Mobile Agents[Full-Text ]
Sayana Catharin Paul, Soumya Thomas, Sreedevi.R, Syamala.sConventional Simple Network Management Protocol (SNMP) based network management is centralized which leads to excessive processing load at the manager and increased bandwidth utilization which in effect reduces the scalability of the network. In order to overcome these problems, a distributed network management framework is developed by adding a layer of mobile agents over the conventional SNMP protocol which makes our architecture a hybrid model incorporating the advantages of both systems. We introduce an architecture consisting of different agents utilizing the features of SNMP for managing various aspects of network management. The Java Agent Development Framework (JADE) is used to develop the platform for the mobile agents. JAVA provides the SNMP support
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Enhancing the Quality of Service in Low Duty Cycle Wireless Sensor[Full-Text ]
K. Sivanarulselvan M.E, Ph.D Sherin GeorgeRecent technologies in wireless communication have enabled the development of low-cost Wireless Sensor Networks (WSNs). Wireless Sensor Networks usually have limited energy and transmission capacity and hence turn active only when they perform sensing tasks and communications and remain dormant during idle periods. Broadcasting is one of the essential services in Wireless Sensor Networks (WSN). Broadcasting is used to propagate messages from a node or sink to all other nodes in the network. The control messages have to be broadcasted from sink to other nodes during network configuration. Also, to query the nodes about an event, message has to be broadcasted to all the nodes. The broadcasting is also used in to propagate routes to the nodes. Hence implementing an effective broadcast service which is simple, reliable and energy-efficient with less overhead is critical for the effective functioning of Wireless Sensor Networks. In this paper, the Quality of Service of the broadcasting is enhanced by reducing the message cost and the time cost in low duty-cycle WSNs. The performance degradation occurs during broadcast in low duty cycle WSN as it fails to cover the entire network within the acceptable time. This paper provides two solutions, namely, centralized dynamic and distributed solution which improves the QoS of broadcasting. The centralized dynamic solution considers diverse low duty cycle strategies. The distributed solution relies only on local information and operations for reliable and scalable broadcast service. The performance of our solution is evaluated under various network configurations. The results suggest that the quality of broadcasting in distributed solution has less time cost and message cost. In addition, it can resist the wireless loss along with considerable scalability on network size and density.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Power Estimation in Wireless Sensor Networks by Clustering Mechanism [Full-Text ]
Manjuprasad, Andhe Dharani, Vijaylakshmi, VijaySinghPerformance is one of the key factors in wireless sensor networks (WSNs). As wireless sensor networks is plays a vital role in many application which can be classified majorly as monitoring and tracking. WSNs operate with limited resource like battery, memory; processor among this power optimization is one of the main factors that affect the battery power the sensor. So there is a need of estimation of the power dissipation that affects the performance of WSNs communication. This papers aims to identify the power dissipation of the WSNs by clustering in different deployment scenarios like sparse and dense deployment, tier architecture, heterogeneous WSNs.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Policy Scripts to Detect Network Intrusions[Full-Text ]
Sanmeet Kaur, Maninder SinghSecurity is a big issue for all networks in today's enterprise environment. Hackers and intruders have made many successful attempts to bring down high-profile company networks and web services. Many methods have been developed to secure the network infrastructure and communication over the Internet, among them the use of firewalls, encryption, and virtual private networks. Intrusion detection is a relatively new addition to such techniques. Intrusion detection methods started appearing in the last few years. In this paper Intrusion Detection System called Bro is discussed. The major emphasis is on the design and development of the policy scripts to detect various network intrusions. These scripts are written using the scripting language of Bro, which supports various special data types to support network level activities. It also has signature-matching features to make threat signatures to match against various attacks and detect them later.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Power Management and connectivity efficiency for mobile sensor nodes by 3 tier Operating mode[Full-Text ]
Nisha K S , M PreethaThese Wireless sensor nodes are a versatile, general-purpose technology capable of measuring, monitoring and controlling their environment. Even though sensor nodes are becoming ever smaller and more power efficient, there is one area that is not yet fully addressed; efficient switching of nodes. Standard solutions that are efficient enough for electronic devices with higher power consumption than sensor nodes, such as mobile phones or PDAs, may prove to be ill suited for the extreme low-power and size requirements often found on wireless sensor nodes. So to provide the low power wireless nodes efficient switching we introduce a 3tier switching mechanism. This also improves the connectivity between nodes.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Energy Conservation Using Virtual Backbone in Wireless Sensor Network - Survey[Full-Text ]
Rehannara Beegum.TWireless sensor network comprises of sensor nodes. Sensor nodes mainly rely on battery power which cannot be recharged in most of the situations .Thus energy of sensor nodes is a main constraint in wireless sensor network. Algorithms are developing now a day to maintain energy efficient data routing and to reduce the delay in wireless sensor network. In this paper an idea is given about various methods used in certain algorithms which can efficiently constructs a back bone virtually using connected dominating set concepts.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Multi level De noise Steganography[Full-Text ]
Jithesh K, Thavavel.VAn innovation that blends both brilliance and craft can only survive. A multi level security mechanism through psychological approach is proposed here. Hiding encrypted data inside an image is introduced. Encryption is done through Visual cryptography and hiding is done through Steganography. This technique provides the features of both encryption and hiding. Hence it gives multi levels of security. Usually, while hiding data inside an image make distortion to the image and leads to unauthorized access. But in lieu of that, this technique tries to remove disturbances or noise that is already present as part of the image, through replacing noise bits with secret data. Since we replace the noise bits with the secret data bits, it improves the quality of the cover medium and hence it is not that easy for a steg-analyst to find the presence of the confidential data. For which the steganography algorithm used is Selected Noise Bits [SNB], because, noise bits need to be replaced to avoid disturbances.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Survey of Online Detection and Prevention of Phishing Attacks[Full-Text ]
Veena Antony, Divya JamesPhishing is a kind of network attack which impacts financial loss and makes user a fool. Phishing attackers attract innocent website users by providing fake websites .In recent years phishing is a technique used for cyber crimes. In this paper we present an overview of different techniques used by the attackers and its prevention approaches.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Self Energy Optimizing Cluster Framework for Map Join Reduce Applications[Full-Text ]
Vinisha Sasidharan, P. Mohamed Shameem, Dr. R .S ShajiCloud computing is emerging as a new paradigm of large-scale distributed computing. Cloud computing provides customers/users scalability, flexibility for their applications by providing collection of interconnected and virtualized servers. But as the requirement for cloud increases, so increase the consumption of huge amounts of electrical energy, contributing to high operational costs Green House Gas emission and carbon footprints to the environment. Therefore, we need a Green Cloud computing solutions that can minimize energy consumption and thereby operational cost. By Green Computing, it means reducing the environmental impact. This paper proposes an algorithm for achieving energy efficiency in cloud that runs Map-Join-Reduce applications for processing large amount of data.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
High Resolution Imaging by Using Phase Modulated wavelets[Full-Text ]
K. Mathew , Dr. S. ShibuIt is proposed to achieve high resolution within image from low resolution images. This method has three steps: Registration, Interpolation and Reconstruction. In Registration the specimen under investigation is photographed from different angles and from different positions using holographic techniques and these low resolution images are superimposed in a particular reference plane. In Interpolation, the photograph is divided into several finite elements. As the number of element is very large, each element is more or less of point size called Pixel. The finite elements are scanned by laser beam of given frequency and amplitude. The resulting beam from each node has a phase variation dependant on the pixel density. This phase dependant wavelets are digitalized and magnified. The final process is recombination of the amplified digital signals. The final image obtained has high resolving power, super clarity, distortion less magnification and three dimensional views.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Modified Framework For Secure And Robust Blind Data Hid-ing In Videos Using Chaotic Encryption And Forbidden Zone Concept[Full-Text ]
Neethu Mathai,Sherly K.KVideo data hiding is an important and emerging research area due to the design complexities involved.It has found usage in a great number of applications.. Various aspects are required for a complete system, however most of the works deals with only certain parts of the problem. A complete application should take into account robustness,capacity,security,error correction, human visual system adaptation and similar issues. Hence substantial effort is required inorder to design and develop such systems. Design of a complete video data hiding application constitutes the main motivation of this paper. This paper proposes a new framework for video data hiding that makes use of superiority of Forbidden Zone Data Hiding concept, cryptographic security provided by chaotic encryption and erasure correction capability of Repeat Accumulate codes . Selective embedding is utilized in the proposed method to determine host signal coefficients used for data hiding. This framework also contains a sequential management scheme in order to withstand frame drop and insert attacks. Thus this proposed framework helps in developing a more secure and robust complete video data hiding system which can be successfully utilized in video data hiding applications
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Query by Sketch A content based image retrieval system[Full-Text ]
Shahna ElliasDevelopment in digital photography has led to a huge collection of still images that are stored in digital format. As the demand for digital images increases, the need to store and retrieve images in an efficient manner arises. Most of the available image search tools, such as Google Images and Yahoo! Image search, are based on textual annotation of images. In these tools, images are manually annotated with keywords and then retrieved using text-based search methods. The performances of these systems are not satisfactory. Therefore, the field of content-based image retrieval has emerged as an important research area in computer vision and image processing. The key issue in image retrieval is how to match two images according to computationally extracted features. . The proposed approach gives maximum freedom to the user by using user-produced pictorial queries (sketches) depicting the wanted image(s), extracts visual features from the images and allows the comparison of database images with queries ,thereby providing best possible retrieval efficiency and time. Fields that can benefit from CBIR applications are almost countless. Among them are art galleries, architectural and engineering design, interior design, geographic information system, weather forecasting, retail, fabric and fashion design, , law enforcement and criminal investigation and picture archiving.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Morphological Analysis of Punjabi Verbs for UNL Based Machine Translation System[Full-Text ]
Parteek Kumar, RK SharmaMorphological analysis of verbs is an important activity in order to design a machine translation system for a language. This paper discusses morphological analysis of Punjabi verbs for developing Universal Networking Language (UNL) based Machine Translation (MT) system for this Language. Verbs play a significant role in extracting Gender, Number, Person, Tense, Aspect and Modality (GNPTAM) information from a given sentence. An analysis of Punjabi verbs has been carried out on the basis of verb paradigms in this work. There are approximately one hundred verb paradigms defined on the basis of their vowel ending and GNPTAM information in Punjabi language. Based on these paradigms, one thousand rules have been created with respect to UNL attributes in this analysis. This analysis has been carried out for simple as well as conjunct verbs. It has been found that a good number of conjunct verbs are formed in Punjabi language by adding the verbs kar (do) or ho (be) to nouns or adjectives. Verb morphology in UNL based EnConverter and DeConverter for Punjabi language has also been implemented in this paper.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Wireless Device Localization Using Vehicular Ad hoc Network[Full-Text ]
Joseph John, Lakshmi K SWith the advance in wireless technology and the increase in use of wireless devices the need for technologies and tools to localize or locate wireless devise has become important, especially in law and order. This paper presents a novel idea to localize a wireless device using VANETs.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
An Efficient AODV Protocol and Encryption Mechanism for Group Communication and Preventing Attacks in Adhoc Networks[Full-Text ]
Sisily Sibichen, Sreela SreedharOpenly available communication signals, in wireless adhoc network poses high security risk. The absence of a centralized coordination and shared wireless medium make them more vulnerable to Dos attacks. Further, closer attention should also be paid in securing the network from Grayhole and Blackhole attacks, wherein malicious nodes disrupt data transmission in the network by transmitting incorrect routing information. A realization of these enabled us to approach the subject of data security in wireless adhoc networks with a different perspective so as to have a communication route, free from all previously mentioned security threats. The purpose of this paper is to present an efficient Adhoc On-demand Distance Vector (AODV) protocol that removes the malicious node by isolating it, thereby ensuring safe and secure communication. In order to achieve this goal, the intermediate node receiving abnormal routing information from its neighbour node is programmed to consider that neighbour node as malicious. In adhoc network, as the nodes join or leave dynamically, an efficient key management mechanism is required. So, the nodes are arranged in spanning tree fashion. An efficient key exchange and encryption mechanism is presented, where each node shares secret key only with authenticated neighbours in the adhoc network to provide more security and thus avoids global re-keying operations. The proposed method aims to use two encryption techniques to forward data among the nodes.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
SQL Injection Attack Solutions[Full-Text ]
Sruthy Manmadhan, Manesh T, Varghese PaulWeb applications are becoming an important part of our daily life. So attacks against them also increases rapidly. Of these attacks, a major role is held by SQL Injection Attacks (SQLIA). This attack is launched through specially crafted user inputs and target web applications that used backend databases. Characteristics feature of this attack is that, it will change the intended query structure. To avoid this type of attack, the best solution is to do not allow user to enter any part of the SQL query directly. In this paper, we describe SQL Injection attack, various types and a detailed review of its solution techniques.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Secure Cloud Service Management and its Resource Utilization of Server Using Volunteer Computing[Full-Text ]
Nirupadi Tidigol, Thrilochana Kumara Y.P, T.P.LokeshCloud computing Delivers the computing resources to the user as a service over an internet. It uses wireless services with a user's data, software and computation. So spreaded over almost all IT sector and become a rich area of research. Cloud Computing composes of virtualization, on demand deployment. Here user has to pay for the application on which they want. So extensive and effective cloud security is provided by using kerberos to ensure the correctness of data, as the number of users increases cloud server may busy and failure to provide the services to the users, volunteer computing can be used to maintain the load balance of a cloud server
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Impact of database security in Cloud Computing[Full-Text ]
J.Srinivasan, D.RanjithThe aim of this paper is to get an overview of the database services available in cloud computing environment, analyses the security risks combination and propose the possible counter measures to minimize the risks. And also analyzes the cloud database service providers namely; Amazon and Xeround, RackSpace2. The reason behind choosing these are providers is because they are currently amongst the leading cloud database providers the relational cloud databases which make the separation. The focus that examines has been to provide an overview of their database services as well as the available security measurements. It has been appended at the end of the report to help with technical configurations of database migration and connecting applications to the databases for the mentioned cloud database providers.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Automated Layered HTTP Botnet Detection Mechanism[Full-Text ]
Seena Elizebeth Mathew, Abdul AliHTTP botnet uses HTTP protocol for compromising another system. This paper proposes robust method of detecting as well as preventing botnet attacks. Distributed denial of service attacks, session attacks, port scanning, HTTP errors are mainly considered in this paper. Detection and prevention based on network level and packet level features of the packets entering to the system. Performance evaluation is done based on precision, F-value and probability. Layered approach reduces the computation and overall time required for the detection by using autonomous and self sufficient layers. Thread model provide more effieciency to the system.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Factors Influencing Project Success during Software Development Process an Analysis[Full-Text ]
Lakshmi Madhuri K, Suma V, T.R.Gopalakrishnan NairEffective project management is influenced by several factors such as scope creep, time, cost, number of personnel and complexity of project and so on. However, existing project management strategies mainly rely on domain knowledge and experiences of the project personnel than on analytical procedures. This has a considerable impact on the failure rate of the projects in IT industry. Further, every partial, if not full failure of project accelerates the overhead required to resolve those failures affecting the continuous process improvement in the industries. This paper presents an empirical analysis of several projects developed at various software industries in order to comprehend the impact of scope creep on various factors influencing the project success. Investigation results indicate the need for effectively managing the scope creep to ensure increased production of successful projects and henceforth continued sustainability of the organization in the industrial market.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Business Process Re engineering Of Bacteriology Laboratory Using Tablet PC[Full-Text ]
Jisha Babu, Neema Babu, Teenu Therese Paul, Shiju George, Jayakrishna V, Gomathi SekharMany branches of the health care industry are being influenced by information and communication technology. Laboratory Information Sys-tem is not an exception. Despite this fact, more than 75% of laboratory data are being collected on paper records. Recent advances in technology, such as broad acceptance of wireless networks and tablet PCs may soon reduce this percentage of paper supported laboratory data. In this paper we introduce a new approach to reduce the paper works in laboratories with the help of Wi-Fi enabled tablet PCs and computer generated barcodes. This system will change the current laboratory practices to a computer driven system, and it will eliminate the turnaround time for obtaining information from current records and encourage collaborative research. The system is currently under implementation in the Bacteriology Laboratory of National Institute of Research in Tuberculosis, in Chennai, a premier research institute of Indian Council of Medical Research.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Ubiquitous Creation Of Electronic Medical Record And Clinical Data Management Using Tablet PC[Full-Text ]
Gloriya Mathew, Neema Babu, Rintumol Joseph, Shafeena Basheer Shiju George, Jayakrishna .V, Dr. Dina NairTraditional medical record systems are predominantly hard copy paper based models with or without variable components of electronic data such as laboratory results and X-ray reports. The paper record is not always legible and poor indexing of data makes the finding of information difficult or impossible. Electronic Medical Record (EMR) uses the alternative method of storage of all health care data in electronic format. The advent of EMR has not only changed the format of medical records but also increased accessibility of information contained in the repository, especially for research purposes. However, the system for creation and maintenance of EMR presents a new challenge to the designer of the Hospital Information and Management System (HIMS). Many HIMS provides a Manual entry system for EMR. The health care staffs are required to manually enter the data into the computer system using a screen provided for this purpose. Even though this is easy to conceive and implement, it is a major source for increased workload, manual errors, and delays in capturing data into the EMR. Ubiquitous creation of EMR has the potential to solve these problems. It has the promise to streamline the data collection process for EMR creation with least disturbance to the clinical staff .This paper presents a system for the creation and management of EMR using a set of tablet PC's interconnected over a Wi-Fi network. The system is currently under implementation in National Institute of Research in Tuberculosis, in Chennai, a premier research institute of Indian Council of Medical Research.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Color Face Recognition using Texture Features and Fractional Fourier Transforms[Full-Text ]
Kavitha S, Dr.Varghese Paul, Dr.T.GnanasekaranThis paper proposes color local binary pattern and fractional Fourier Transform features for face recognition. The YCbCr Color space model is used in this approach. Fractional Fourier Transform features and local binary pattern features are used for face recognition. kNN classifier is applied to face recognition phase.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
PSNR Based Analysis of Block Matching Algorithms for Motion Estimation[Full-Text ]
#AUTHORS#This paper mainly focuses on the two main classification of motion estimation algorithms used for video compression. Motion Estimation (ME) algorithms vary with respect to the a priori information and constraints they employ, as well as the method of computation they use to obtain the estimate. The classifications for ME algorithms are based on feature/region matching, gradient based methods, spatiotemporal energy methods, deterministic model based methods and stochastic model based methods. This paper focuses more on block matching algorithms which comes under feature/region matching and gradient based methods. This paper compares 2 important ME algorithms. They are Full Search (FS) or ES and a newly found adaptive algorithm called AMEA. These algorithms are used for implementing various standards, which ranges from MPEG1 / H.261 to MPEG4 / H.263 and H.264/AVC. A very brief introduction to the entire flow of video com-pression is also presented in this paper.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Compression of Color Images Using Clustering Techniques[Full-Text ]
Nisha Joseph , Divya Mohan , Jayakrishna V This paper deals mainly with the image compression algorithms and presents a new color space normalization (CSN) technique for enhancing the discriminating power of color space along with the principal component analysis (PCA) which enables compression of colour images. Context-based modeling is an important step in image compression. We used optimized clustering algorithms to compress images effectively by making use of a large number of image contexts by separating a finite unlabeled data set into a finite and discrete set of natural, hidden data structures, rather than provide an accurate characterization of unobserved samples generated from the same probability distribution. Since images contain large number of varying density regions, we used an optimized density based algorithm from a pool. PCA is used to express the large 1-D vector of pixels constructed from 2-D color image into the compact principal components of the feature space. Each image may be represented as a weighted sum (feature vector) of the eigen values, which are stored in a 1D array. PCA allows us to compute a linear transformation that maps data from a high dimensional space to a lower dimensional space. It covers standard deviation, covariance, eigen vectors and eigen values. These values are provided at the compression side. So the decompressed image has not much loss of information. Experiments using different databases show that the proposed method by combining color space discrimination and PCA can improve compression of color images to a great extend.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Improved Query by Image Retrieval using Multi feature Algorithms[Full-Text ]
Rani Saritha R, Varghese Paul, P. Ganesh KumarQuery by Image Retrieval uses image content features to search and retrieve digital images from a large database. Visual feature extraction methods are commonly employed techniques for searching purpose. However, their usefulness is limited by computational time, inefficient indexing and retrieval performance. In this paper, we present a simple and efficient image retrieval model based on the semantic features that uses histograms and Gabor wavelet techniques for extracting the features of the image. The proposed method is tested through simulation in comparison with the existing approaches and the results are encouraging.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------