NCICT-2018- National Conference on Intelligence and Communication Technology
"NCICT-2018 Conference Papers "
A Study and Analysis of Effective Data transmission Using UDP[Full-Text ]
G. Ajay, P. BalaKrishnanThis abstraction is grouped into layers of general functionality. For protocols on the transmission layer, many choices exist. But while popular protocols such as TCP, UDP and SCTP do provide connection oriented communication offering reliability, ordering and data integrity, solutions that offer such connections from one point to multiple endpoints. Evaluation of two well known transport layer protocol TCP and UDP using two popular queue Evaluation of two well known transport layer protocol TCP and UDP using two popular queue management methods; Random Early Detection (RED) and Drop Tail, in terms of throughput, queuing delay, packet drop rate and bandwidth utilization management methods; Random Early Detection (RED) and Drop Tail, in terms of throughput, queuing delay, packet drop rate and bandwidth utilization.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Study of Evolutionary Mobile Operating System and Design[Full-Text ]
A. Aravindhan, K.DilipKumarThis paper presents a survey Evolutionary Mobile Operating System and Design application developments one platform and market analysis design on a mobile operating system. Mobile OS Architectures, challenges and Issues in various mobile operating Systems. a variety of services such as video calls, faster browsing services,2d and 3d games, Camera, Banking Services, GPS services, File sharing services, Tracking Services, M-Commerce and so many. The challenge in mobile technology may be due to Operating System or Hardware or Network or Memory. The security threads a multitasking processor and storage space and smart phone on condition and mobile using people on the smart phone develop and secure using the mobile the many mobile OS on market in today and a every day on new information on mobile OS
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
ios Security System Using Biometric Authentication System[Full-Text ]
M. Aruna, P. Kokila, Mrs.M.Angelin RosyTechnology is ever changing. Smartphone now a day’s save big quantity of records that may be secret confidential and sensitive data together with bank accounts, personal and important emails, pictures. To secure such data mobile os have the biometric authentication system. Biometric protection system can update the conventional method of entering passwords or pins with a swipe of finger in order that the telephone may be unlocked and used. Biometric techniques set in the cellular telephones encompass touch id, face id, signature recognition ,voice detection and iris scan.ios has been very superior and complex mobile running machine launched inside the 12 months 2007.Apple ios has introduced contact identity and face identification, that permits a fingerprint-based authentication and face recognition device to be used for unlocking an iphone. In this paper, we have a look at the significant of the biometrics specifically fingerprint and touch id biometric device and attention on biometric authentication machine with their advantages.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Security in Wireless Sensor Network For Attacks and Goals[Full-Text ]
E.Asha, N.SavithaWireless sensor networks consist of many inexpensive wireless nodes, each having sensing capability with some computational and communication power. The development of large scale wireless sensor networks that consist of many low power, low cost and small size sensor nodes. Security is critical for many sensor network applications, such as military target tracking and security monitoring. Wireless sensor networks are result of developments in micro electro mechanical system and wireless networks. That traditional security measures are not enough to overcome these weakness. These small sensor nodes are susceptible to many kinds of attacks. Attacks can also be classified into outside and inside attacks. Wireless sensor networks are one of the most exciting and challenging research domains of our time. The energy efficient security protocol proposed in symmetric cryptography. It is extremely important to build a secure channel in a WSN.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
The Surveillance on Computer Viruses and Its Security[Full-Text ]
P. BalaKrishnan, G. Ajaytoday, safety of our data is a big question from various threats come from online and offline. This paper describes about the computer viruses, and how they are stealing the data and destroying the systems. Virus can result in poor performance, loss of data, loopholes in system. Because of it, everyone who uses computers have a fear of losing data. On the other hand, anti-virus technologies are continually followed the virus tricks and methodologies to overcome their threats. So the user wants to know about the knowledge of computer viruses and their prevention tips. This paper shows about viruses briefly and about analysis techniques for user. The beginner should protect their valuable data from these threats using different anti-virus software tools available in market. The development of the computer viruses and their prevention (anti-virus) methods are described here.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Study and Analysis of Access to High Speed Connection in Wireless Technology[Full-Text ]
K. DilipKumar, A. AravindhanAbstract— Wireless telecommunication is the transfer of information between two or more computers or connected through the hotspot. Certain distance only can travels the networks through one device to another device and will controls the remote device to the control. Such as the fixed mobiles, portable devices, radio, cellular telephones and then personal digital assistants (PDA) and wireless networking .Wireless technology improves the technology based and increasing the many organizations for the wide range purpose of telecommunications .Wireless is meter reading protocol is the Zigbee protocol has been evolved through the database management system. Zigbee technology is a wireless network of the low cost and then save the low data for the lower power consumption has been processed.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Analysis and Design of Multi Agent Systems[Full-Text ]
V. Kasthuri, M.SivaranjiniThe multi agent systems is used in the cooperative negotiations in the consistent planning. In the case of real time systems incorporating temporal restrictions specified by interaction mandatory. A problem in agent called Tire Negotiator Agent. The organization model is built in the systems of single entity. The agents makes the decision of the internal constraints. The structures of the agent designs communication protocols are distribute entities between physical nodes. The artifacts obtained in the different models of the analysis activity. The main objectives of the design from high level points. The agent systems simulation the frame work of computational methodology. The multi agent systems are retyped into Egress analysis (or) MASS Egress. It frequently observed in social behavior in emergencies. It provides a good basic building complex software system. In The applications of multi agent systems are environment is an interesting of work line that can gives new solution to very complex and restrictive systems that are real time systems. The design of multi agent systems that based on the notations of interacting frames and framing. The design is developed by the artifacts obtained in different models of the analysis activity.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Study of Analysis and Wireless Network and Security[Full-Text ]
N.Kavitha, SelviThe increasing as network technologies and applications wireless networking cards to experiment with new MAC layer protocol 802.11 MAC on top of this radio subsystem wireless network virtualization enables abstraction and sharing if infrastructure and radio spectrum resources wireless network virtualization including isolation control signaling resources recovery and allocation, mobility, management. It was one of the most promising technologies for the future. Ad hoc network is a collection of wireless computer (nodes) a secure ad hoc networking routing protocol based on the design of the destination sequenced distance vector routing protocol wireless sensor in recent years. Wireless sensor networks are displayed mostly in open and unguarded environment.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
The Biggest Cyber Security Challenges on Phone[Full-Text ]
P. Kokila, M. Aruna, Dr.M.InbavalliThis paper is part of the research to study and challenges of cyber security for smart devices at home. We have seen the development and demand for seamless interconnectivity of smart devices to provide various functionality and abilities to user. Current cyber security issues related to smart devices are discussed and analyzed. The paper begins with related background and motivation. Mobile malware as one of the main issues in the smart device security. The mobile users can expect to see a striking increase in malware and notable advancements in malware-related attacks. We discuss and analyzed mobile malware in details and identified challenges and future trends in this area. Then we propose and discuss and integrated security solution for cyber security in mobile to tackle the issues.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A New Form of Change in Computer Memory and Plastic Memory[Full-Text ]
V.Kumar, P.TamilarasanA line of advances in organic new memory technology is demonstrated that enable an entirely new low-cost Memory technology. Inventors incorporate these advances with the one of the most flexible material PLASTIC. This novel memory technology can be utilized in a 3D onetime-programmable storage array. Without the prohibitive costs of silicon processing, this memory is able of setting cost points several orders of magnitude lower than their inorganic counter part. They have also progressively integrated this technology onto flexible plastic substrates. Combined with stacking these vertical memory elements can create read only memory densities denser than many inorganic memories. At a fraction of the cost a conducting plastic has the potential to put into a mega bit of data in a mille meter -square device-10 times denser than current magnetic memories. This system is cheap and fast, but cannot be rewritten, so would only be suitable for permanent storage. The system sand winches a blob of a conducting polymer called PEDOT and a silicon diode between perpendicular connections. the key to the new technology was discovered by passing high current through PEDOT (Polyethylene dioxythiophene) which converts it into an insulator. Rather like blowing a fuse .The polymer has two possible states conductor and insulator that form the one and zero, necessary to put into digital data.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Mobile Computing - New Advancement Techniques[Full-Text ]
S.Nivetha, J.Punitha, Mrs.M.Angelin RosyMobile Cloud Computing (MCC) is nearing trends which merge the functionality of cloud computing and mobile applications. Extending usage of mobile cloud computing services which allows the new comers to use over it. The discovery of cloud computing is to deliver the computing services – servers, storage, database & more over the internet.MCC converts the cloud computing into mobile environment and it gives the performance like (e.g.: battery, storage , bandwidth) In this paper we demonstrate about the deviation among the cloud computing and mobile cloud computing and the workflow of the architecture of mobile computing. We also express about the current technologies enables in MCC with real-life layouts which will clarify the usage of mobile computing and mobile edge computing (MEC)
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Comparative Study on Software Testing Strategies Common Errors and Bug Report[Full-Text ]
J.Punitha, S.Nivetha, Dr.M.InbavalliSoftware testing is a process of finding errors while executing a program in the software. It is a important part and critical phase of any software development life cycle and aimed to evaluating the capability, quality or usability of a program. The software testing is to make a quality of service in efficient way. Software must be fully tested before it could be handled to the customer. Software testing is the main activity of validating and executing the software with the major purpose of find out the errors. The black box testing, white box testing and grey box testing is the very important testing techniques in software testing strategies. This paper executing the comparative study on the black box, white box and grey box testing techniques. The software bug is arising at the time of software testing. The bug report is giving knowledge about the software testing. In this paper the testing strategies, common errors and bug report have been described. Some typical latest researches have been summarized.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Recent Application of Biometric Technology[Full-Text ]
S.Rekha, A.Santhiya, Mrs.M.Dukithabiometric information has been a broadly discussed topic in the past and it still is. recent discussions consist of proposals for storing biometric facts on passports. there are for example video shops using fingerprints for authentication, an increasing number of laptops have a fingerprint sensor incorporated, and banks are beginning to apply biometric facts as well. this paper discusses why authentication using biometric information isn't always a not unusual standard up to now. it additionally analyses if the usage of biometric records makes structures greater cozy and if it's far really worth spending more money on such systems. the dialogue and evaluation in the paper ends in the conclusion that during most instances the trade-offs which want to be made aren't proper enough to remember biometric consumer authentication as a better opportunity to standard strategies consisting of login/password authentication. on the cease the paper provides a quick outlook about the destiny use of `biometric information. Human biometric traits which include face, finger, iris scanning, voice, signature and other functions offer a dependable security degree.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Exertion of Swarm Robotics of Factual Life[Full-Text ]
A.Santhiya, S.RekhaThis paper describes the swarm robotics and factual life. Swarm robotics is a new approach to the coordination of multi-robot system consists of large number of relatively simple robot it’s inspiration from social insects. It is supposed that a desired collective behavior emerges from the interaction between the robots and the interaction of robots with the environment. Swarm robotics plays an important role in the development of collective artificial intelligence. It is based on the use of local rules, and simple robots compared to the complexity of the task to achieve, and inspired by social insects in a more efficient way than a single robot, giving robustness and flexibility to the group. A review of different research works and experimental results, together with a discussion of the world application completes this work.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Wireless Sensor Network for Health Monitoring System Technique and Working Models[Full-Text ]
S. Sathiya, J. SuryaRecent technological advances in sensors, low-power integrated circuits, and wireless communications have enabled the design of low cost, miniature, lightweight, and intelligent physiological sensor nodes. These nodes, capable of sensing, processing, and communicating one or more vital signs, can be seamlessly integrated into wireless personal or body networks (WPANs or WBANs) for health monitoring. These networks promise to revolutionize health care by allowing inexpensive, non-invasive, continuous, ambulatory health monitoring with almost real-time updates of medical records via the Internet. Though a number of ongoing research efforts are focusing on various technical, economic, and social issues, many technical hurdles still need to be resolved in order to have flexible, reliable, secure, and power-efficient WBANs suitable for medical applications. This paper discusses implementation issues and describes the authors’ prototype sensor network for health monitoring that utilizes off-the-shelf 802.15.4 compliant network nodes and custom-built motion and heart activity sensors. The paper presents system architecture and hardware and software organization, as well as the authors’ solutions for time synchronization, power management, and on-chip signal processing.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Web Mining Techniques for Image Extraction[Full-Text ]
N. Savitha, E. AshaWeb mining is an important research area. Valuable information can be hidden in images. The need for image mining is high the view of fast growing amounts of image data. Image mining deals with the extraction of image pattern from a large collection of image in database. Clearly ,image extraction is different from low-level computer vision and image processing techniques because, the focus of image is an extraction of patterns from large collection of according to user queries, the focus of computer extracting specific features of a single image. While there seems to be some overlaps between the image and content based retrieval image. Beyond of the problem extraction goal is the discovery of image patterns that are significant in a given collection of images as per user queries. Image extraction is the discovery of view by automatically extracting information from different written resources.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Zigbee Technology Using for Wireless Sensor Network[Full-Text ]
V. Selvi, N.KavithaZigBee Technology is one of such progression in wireless technology. Wireless is not a new technology as wireless networking and wireless internet are already in use .ZigBee is an set of specifications for wireless personal area network (WPAN). Digital radio connection between computer and related devices. It is using high-level communication protocols. it has low-power digital radios, such as for home automation, medical device data collection, and other low-power, low-bandwidth needs, designed for small scale projects which need wireless connection. Hence, Zigbee is a low -power, low data rate, and close proximity (i.e., personal area) . Zigbee connect to sensor operating at 2.4GHZ with data rate of 250Kps .the Z-Wave operated 915MHZ and large radio range but with data rate. Zigbee a range of techniques. At a first level. Zigbee networks apply a coding mechanism to radio transmissions.. it using mesh wireless network. WSN is spatially of diapered and dedicated sensor for monitoring and recording the physical conditions. Battery on embedded form of energy harvesting. Large scale deployment, cross layer design used to optimal modulation transmission performance. range but with lower data rate.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Transmission System Link for Radio over Fiber and Wide Area Optical Network[Full-Text ]
M.Sivaranjini, V.KasthuriRadio over fiber refers to a transmitted over an optical fiber link. Lower application losses and reduced quality to noise and electromagnetic interference electrical signal transmission. Range of mobile radio signals (3G, 4G, 5G, and WIFI) television signals (ca TV)to the transmission .A wide area network (WAN) is a telecommunication networks or computer network that extend over large geographical distance. ROF system that is modulated with multiple bit rates using different transmission techniques such as stilton and maximum time division multiplexing (MTDW)technique .fiber –radio network comprised two distinct domains, one optical and one wireless. Energy-saving mode, network capacity is dimensional to support peak-hour traffic and IP routers and switches. Network element of during off-peak hours, ideally 75% of energy can be saved the traffic load decreases to its minimal value around 6:00.interconnected network for radio over virtual connection.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Study and Analysis of Data Secure Storage in Cloud Computing[Full-Text ]
J.Surya, S.Sathiya, Mrs.M.DukithaCloud computing is architecture for providing computing service via the internet on demand and pay per user access to a pool of shared resources namely networks, storage, servers, services and applications, without physically acquiring them. So it saves managing cost and time for organizations. A set of security protocols for ensuring the privacy and legal compliance of customer data in cloud computing architectures. Threats are which include data leakage, insecure interface, sharing of resources, data availability and inside attacks. There are various research challenges also there for adopting cloud computing such as well managed service level agreement (SLA), privacy, interoperability and reliability. To the best of our knowledge, PasS (Privacy as a Service) is the first practical cloud computing privacy solution that utilizes previous research on cryptographic coprocessors to solve the problem of securely processing sensitive data in cloud computing infrastructures. By using cryptographic encryption algorithms Cloud service providers (CSP) can provide a level of privacy and security to the cloud users. By following query any user can access the data from the cloud servers through decryption.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Android Operating System Latest Technology[Full-Text ]
N. Vishwanath, V. KumarTheir application support and there operating system on which these application runs these sensors were placed near the root of the product. Data from sensors was transmitted via Wi-Fi in real-time to a mobile phone based on IOS/Android. In the light of obtained data, the seasonal precision irrigation system was created depending on the amount of water required by the plants at each stage of their growth stag Linux kernel is used to manage core system services such as virtual memory, networking, drivers, and power management. In these paper different features of architecture of Android OS as well security features of Android OS are discussed. Technology and features may varies from one type of mobile operating system to another type of mobile operating system .This paper produces a comparative study on smart phone operating systems Android, OS, Windows.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Develop and Implementation of Attendance Management System[Full-Text ]
S. MeenaAttendance Management System is software developed for daily student attendance in schools, colleges and institutes. If facilitates to access the attendance information of a particular student in a particular class. The information is sorted by the operators, which will be provided by the teacher for a particular class. This system will also help in evaluating attendance eligibility criteria of a student. Student attendance management system deals with the maintenance of the student’s attendance details. It is generates the attendance of the student on basis of presence in class. This project is absolutely on the computer-based attendance management system. Computer based attendance system provide efficient means of determining eligibility criteria for students to meet examination requirements. Now, with the advent of the computerized attendance management system, problems associated with the manual processing of student attendance will be alleviated to its minimum level. Hence, computerization of attendance management system aimed at its incorporating a computer based system in processing attendance of student at promoting speed of operations and accuracy of result.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Novel Method of Design and Integration of SOA in a Multi-Agent Model for Distributed Scheduling[Full-Text ]
Ms. T.Lavanya, Dr. Antony Selvadoss Thanamani.Based on design and integration concepts of a generic multi-agent model for planning distributed model to schedule projects is proposed. In this paper, a novel approach for providing to improve the understanding of complex social systems those characterized by distributed scheduling. We first review key characteristics of multi-agent models and then discuss how the purpose of a model influences what are appropriate types and levels of model validation. Multi-agent systems which adapt and extend existing techniques, a methodology which provides a clear framework to design and integration of SOA. Due to great advantages that Service-Oriented Architecture (SOA) offers to its adopters in almost all fields for distributed scheduling.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Intrusion Detection System using DM Tools[Full-Text ]
K. Mohanapriya, Dr. M.Savitha Devi.We use internet for all of our works (such as e-commerce, bank transactions, healthcare) and also entertainments(chat and post our views in social networks).While using internet, Security and Privacy are prime concern for safe process. Integrity, Authentication, confidentiality and availability are provides Security to access and transfer our data. But Intrusion is main threat for the above Security measures and privacy.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Web Semantics and Services[Full-Text ]
R.V.Raha Khursheed, Z. Fazlin Mina, M. Muthumari.The next web generation promises to deliver Semantic Web Services (SWS) that are self-described and amenable to automated discovery, composition and invention. The emergence of social web has resulted in tremendous growth on data available in the web and also makes enormous growth on textual electronic data. The web page consists of millions and billions of information that are unarranged and unstructured.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Review of Status, Challenges and Safety Issues in Human-Robot Interaction[Full-Text ]
Afzal A. S, Mr. S. VijayakumarHuman Robot Interaction (HRI) is currently a very extensive a diverse research and design activity. The current status of human robot interaction has been review as key current research challenges for the human factors. Human robot interaction has been applied in various robots tasks including space, undersea, military, agriculture, education, piloting etc. Safety is an important consideration in human robot interaction. The accidents caused by robots can be grouped into three main categories: Engineering errors, human mistakes and poor environments conditions. This paper discuss about various status, challenges and safety issues in human robot interaction.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Pros & Cons of Various Bio-Metric Authentication Systems[Full-Text ]
C. Arunkumar, M.DeepanayakiThis paper presents pros and cons of various biometric authentication systems. A brief introduction is usually offered regarding commonly used biometrics including, Face, Iris, Fingerprint, Finger Vein, Lips, Voice, Signature Verification, Keystroke dynamic, DNA. With the fast increasing of the electronic crimes and their related issues, deploying a reliable user authentication system became a significant task for both of access control and securing user’s private data. Such authentication models have overcome other traditional security methods like passwords and PIN. This paper outlined opinions about the usability of biometric authentication systems & advantages and disadvantages, future development of biometric authentication system.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Study on Big data security issues and challenges[Full-Text ]
A.Dhanush, S.Senthil MuruganThe term of Big Data is now used almost everywhere in our daily life. The amount of data is world is growing day by day. Data is growing because of use of internet, smart phones and social networks. Big data is a collection of data sets which is very large in size as well as complex. Generally size of the data is pet byte and Exabyte. The big data change the way that data is managed and used. Some of the applications are in areas such as healthcare, banking, retail, traffic management, education and so on. This paper highlights important concept of big data and we discuss various aspect of big data. We define big data and discuss the parameters along which big data is defined. This includes the three v’s of big data which are velocity, volume and variety.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Evolution of AES, Blowfish and Two fish Encryption Algorithm[Full-Text ]
E. Jeevalatha, Mr. S. Senthil Murugan,Data is any type of stored digital information. Security is about to protection of assets. Network security involves covers a variety of computer networks, both public and private, that are used in everyday jobs. Cryptography is a concept to protect network and data transmission. Cryptography is a method of storing and transmitting data in a particular form. AES is one of the most powerful techniques. In this paper, we analyze and find an efficient encryption algorithm which takes less space, time and security among these encryption algorithms. These AES, Blowfish and Two fish algorithms are outlined.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Managing and Monitoring the Real-Time Data of Patient from Wireless Sensor Network[Full-Text ]
S. MehtajBanu, Mr.G.Sathish, BSN body sensor network is a technology which senses the data from the human body and transfers the sensed data to the base station. Here the difficulty is like not processing the data but transmission of data from the sensor. Here the introduction of a protocol occurs to manage the transmission LEACH which is a cluster based routing and TDMA based MAC protocol, which helps the transmission of data through clustering the data of all sensors through CH. The data and network environment is going to be heterogeneous here which can be managed by LEACH. Impending to the database we are to use the two main approaches in order to manage and querying the data are warehouse approach and distributed approach. Here in order to monitor the patient in the both cases distributed approach and warehouse approach is used.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Automatic Detection of Potholes and Humps on Roads to Driver Using PIR Sensor [Full-Text ]
Mr.S.Rajadurai, Mr.P.Thiyagarajan, Ms.R.SandhiyaRecently, vehicles accidents have been increasing. One of the causes is poor road maintenance because of its high costs. To overcome this accidents there been many exiting methods.Through the existing methods we can get knowledge about potholelocation using GPS and GSM. It detect thepothole and hump to alert the driver.The proposed method to detect road damage and curve using PIR sensor.This sensor can provides timely alerts to drivers through providing on signal to user monitor placed in between the meters. Because of this alert system the road accident can be reduced periodically.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Study of Using Biometric Mechanism in Mobile Banking Application[Full-Text ]
R.Sundar, M.Ganesan The next generation of banking application won’t be on desktop or mainframes but on thesmall devices we carry every day. Secured e-banking on the mobile is the latest issue for all mobileusers.In this paper authors have focused on how biometric mechanism provides the highest securityto the mobile payment.The present security issues surround the loss of personal information throughthe theft of the cell phone.The problems associated with the implementation of a secure e-payment systems in the country stem from card thefts, internet fraud and identity theft e.t.c, which runs into millions of US dollars annually.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Comparative Study of Normalized Dynamic Feature and Immune Recognition System in Signature Verification using Artificial Intelligence[Full-Text ]
AlthafKhan.A, Mr.S. VijayakumarIn this competitive generation security is very important. As like handwritten signature verification is most widely used in any financial and documentation activity but this system is manual verify. So, a more robust system is required for verification through online and offline.In this article showing the comparative study of normalized feature and immune recognition system are implemented. It is for both offline and online. In artificial intelligence the signature verification has many methods. Signature verification from this comparative study showing the existing technique with digital tablet with digital pen and unique technique that support the artificial immune recognition system and their merits and demerits of this techniques.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Comparative Study of Cybercrime and its Preventive Measure across Different Country[Full-Text ]
P. Ashokkumar, Mrs. M. DeepanayakiCybercrimes are responsible for the interruption of normal computer functions and has been known to cause the downfall of many companies and personal entities. This research paper aims to discuss following aspects of Cybercrimes: the definition, why they occur, laws governing them, methods of committing cybercrimes, who they affect, and cybercrime prevention procedures. More specifically, this paper will delve into one main example of cybercrime “hacking”.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Analyzing the Scope, Functionality, and Challenges of Neptune: A Graph Base Database Built For the Cloud[Full-Text ]
G.Sathish, C.Deepa, C.NandhiniNeptune powers graph use cases such as recommendation engines, fraud detection, knowledge graphs, drug discovery, and network security. Neptune is a fast, reliable, fully managed graph database service that makes it easy to build and run applications that work with highly connected datasets. The core of Neptune is a purpose-built, high performance graph database engine that is optimized for storing billions of relationships and querying the graph with milliseconds latency. Neptune supports the popular graph query languages Apache Tinker Pop Gremlin and W3C’s SPARQL, allowing you to easily build queries that efficiently navigate highly connected datasets.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Security analysis of proactive, reactive and hybrid routing protocol in Manetk.[Full-Text ]
Janani, Mr.S.Senthil MuruganA MANET is used to utilize the wireless connection to attach with network. The information can send and receive safe and secure using the routing protocols. This paper focuses on Security analysis of Proactive, Reactive and hybrid routing protocol. All type of routing protocol should be used here for the security purpose. HRP is used to determine optimal network destination routes and to report topology data notifications. The different attacks are going to be prevent by using different routing protocols. So, we are using a hybrid routing protocol. By using hybrid routing protocol can support plenty of routings like AODV, OLSR, ZRP, etc
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
An Analysis of the Privacy and Security Risks of IOS VPN Permission – Enabled Apps[Full-Text ]
C. Kesavan, Mr.S.Vijayakumar,Millions of Users worldwide resort to mobile VPN clients to either circumvent censorship or to access geo-blocked content and more generally for privacy and security purposes. In this paper we provide a first comprehensive analysis of 6 apps that use IOS VPN permission, which we extracted from a corpus of more than 2.2 million application available for the iPhone. We perform in light of the Representative decision to allow broadband internet providers to sell your browsing data without your consent, web searches for Virtual Private Network (VPNs) spiked virtually overnight. We perform a number of passive and active measurements designed to investigate a wide range of security and privacy features and to study the behavior of each VPN-based app. We can access a virtual private network (VPN) on your iPhone this enables you to securely access your company`s network behind firewall using an encrypted internet that acts as secure “tunnel” for data. There are many reasons to consider a VPN service for your iPhone or iPad for easy to target for cybercriminal, so you need to protect yourself
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Iot Based On Smart Agriculture [Full-Text ]
Mr. N.Sivakumar, Mr. P.Thiyagarajan, Ms.R.SandhiyaThis paper is for internet of things in agriculture to be used by farmers in their Agriculture lands, they can use “soil moisture sensors”. This sensor system which monitors and maintains the desired soil moisture content via automatic water supply. It is used to get information’s about environmental conditions such as light, dust, humidity or sudden changes in temperature. The setup uses soil moisture sensors which measure the exact moisture level in soil. The value active the systems to use appropriate quantity of water avoids over/under irrigation. Usually the farmer pumps the water more or less to cultivate the land. This may result in wastage of water or insufficiency to the crops.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Security Privacy & Threads in Smart City[Full-Text ]
V.Ajith, Mr.Vijaya Kumar .SSmart city opens up data with a wealth of information that brings innovation and connects government, industry and citizens. Cyber insecurity, on the other hand has raised concerns among data privacy and threats to smart city systems. In this paper, we look into security issues in smart city infrastructure from both technical and business operation perspectives and propose an approach to analyze threats and to improve data security of smart city systems. The assessment process takes hundreds of features into account. Data collected during the assessment stage are then imported into an algorithm that calculates the threat factor. Mitigation strategies are provided to help reducing risks of smart city systems from being hacked into and to protect data from being misused, stolen or identifiable. Study shows that the threat factor can be reduced significantly by following this approach. Experiments show that this comprehensive approach can reduce the risks of cyber intrusions to smart city systems. It can also deal with privacy concerns in this big data arena.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Analyzing The Challenge Of Storage Virtualization[Full-Text ]
Asfad Nowman.A, Mrs. Deepanayaki.This paper we are discussing about the Challenges of Storage Virtualization and abstraction of logical Storage from physical Storage in Storage Virtualization there are 3 different types. Theyare1) DAS-Direct Attached Storage2) NAS-Network Attached Storage3)SAN-Storage Attached Network. DAS is the conventional method of data storage where storage drives are directly attached to server machine.NAS is the shared storage which connects through the network. It is used for file sharing devices sharing.SAN is a storage device that are shared with different server over a high accelerate network. Be specific or outline what are the challenges to be discussed?
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Survey on Search Engine Optimization , Its Techniques, Tools and Algorithms [Full-Text ]
P.Dinesh, S.Senthil Murugan In today’s competitive market, SEO is more important than ever. Search engines serve millions of users per day looking for answers to their questions or for solutions to their problems. If you have a web site, blog or online store, SEO can help your business grow and meet the business objectives. Certainly, how the more traffic can be increased to your website. This survey paper provides specific description for Search engine Optimization and explains about how it effectively works on a website to bring page rank and increase traffic towards your website, SERP (Search Result Page on Search Engine). This paper also focuses on latest SEO techniques and its algorithms.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Review On Tools And Their Validity In Data Mining[Full-Text ]
Mr.N.Saravanan,Mr.P.Thiyagarajan, Mr.P.KarthickData mining is the process of extracting the useful data, patterns and trends from a large amount of data by using techniques like clustering ,classification, association and regression. There are a wide variety of applications in real life. Various tools are available which supports different algorithms. A summary about data mining tools available and The supporting algorithms are the objective of this paper. Comparison between various tools has also been done to enable the users use various tools according to their requirements and applications. Different validation indices for the validation are also summarized.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Study on Future Scope of Wi-Vi Technology[Full-Text ]
M.Murugan, Mr.G.Sathish Technology is progressing rapidly and it making many things easier. Wi-Fi is the most popular wireless networking technology, Wi-Fi used radio waves to provide network connectivity. Wireless Vision (Wi-Vi) is a new technology similar to Wi-Fi which using for seeing through walls with the help of Wi-Fi signals. Wi-Vi relies on capturing the reflections of its own transmitted signals off moving objects behind a wall. So particularly we can use such signals to identify number of objects or people in a wall. We can also identify simple gestures. This paper investigates for future application of Wi-Vi, in some example of Emergency Situavation, Law Enforcement, Personal Security and etc.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Analyzing the Functionalities of Cloud Data Migration Techniques and Tools from Various Cloud Providers[Full-Text ]
Mr. D.Sathasivam, Mr. P.Thiyagarajan, Ms.M.PrithiCloud computing services are becoming more and more popular. However, the high concentration of data and services on the clouds make them attractive targets for various security attacks, including DoS, data theft, and privacy attacks. Additionally, cloud providers may fail to comply with service level agreement in terms of performance, availability, and security guarantees. Moreover, users may choose to utilize public cloud services from multiple vendors for various reasons including fault tolerance and availability. Therefore, it is importance to have secure and efficient mechanisms that enable users to transparently copy and move their data from one provider to another.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
An Efficient Clustering Using Hadoop Mapreduce for Mobile Clouds and Survey[Full-Text ]
S. Amutha, N.V. ChinnasamyThe new generations of mobile devices have high processing power and storage, but they lag behind in terms of software systems for big data storage and processing. Hadoop is a scalable platform that provides distributed storage and computational capabilities on clusters of commodity hardware. Building Hadoop on a mobile network enables the devices to run data intensive computing applications without direct knowledge of underlying distributed systems complexities. As mobile devices are more susceptible to unauthorized access, when compared to traditional servers, security is also a concern for sensitive data. The MDFS (Mobile Distributed File System) addresses these issues for big data processing in mobile clouds. The Hadoop Map Reduce framework over MDFS and have studied its performance by varying input workloads in a real heterogeneous mobile cluster. The implementation addresses all constraints in processing large amounts of data in mobile clouds.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Detecting Stress Based On Social Interactions in Social Network[Full-Text ]
A.Jothi, Mr.V.ChinnasamyPsychological stress is threatening people’s health. It is non-trivial to detect stress timely for proactive care. With the popularity of social media, people are used to sharing their daily activities and interacting with friends on social media platforms, making it feasible to leverage online social network data for stress detection. In this project, we find that users stress state is closely related to that of his/her friends in social media, and we employ a large-scale dataset from real-world social platforms to systematically study the correlation of users’ stress states and social interactions. We first define a set of stress-related textual, visual, and social attributes from various aspects, and then propose a novel hybrid model-factor graph model combined with Convolution Neural Network to leverage tweet content and social interaction information for stress detection. Experimental results show that the proposed model can improve the detection performance by 6-9% in F1-score. By further analyzing the social interaction data, we also discover several intriguing phenomena, i.e. the number of social structures of sparse connections (i.e. with no delta connections) of stressed users is around 14% higher than that of non-stressed users, indicating that the social structure of stressed users’ friends tend to be less connected and less complicated than that of non-stressed users.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Cloud-Based Multimedia Sensor Networks with Secure Services Architecture[Full-Text ]
A.   Jothimurugan , S.SasikumarCloud network is widely evolving trend and it plays significant role in computer networks. This means Cloud Computing provide services based on demand request and offers several benefits such as resource pooling, virtualization, rapid elasticity, low cost software, wide network access. It is integrated with wireless sensor network to offer reliable data delivery in multimedia. However, there is lot of restraint factors for integrated cloud and wireless sensor networks to use the WPAN (Low WPAN & High WPAN) technologies. Specifically in cloud and WSN networks having the more security mechanisms but they are not satisfying the security aspects. The existing Cloud based WMSN compromising with security issues.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Network Assisted Mobile Computing With Optimal Uplink Query Processing[Full-Text ]
S.Sathya, Mr.T.RamasundaramMany mobile applications retrieve content from remote servers via user generated queries. Processing these queries is often needed before the desired content can be identified. Processing the request on the mobile devices can quickly sap the limited battery resources. Conversely, processing user-queries at remote servers can have slow response times due communication latency incurred during transmission of the potentially large query. We evaluate a network-assisted mobile computing scenario where mid network nodes with “leasing” capabilities are deployed by a service provider. Leasing computation power can reduce battery usage on the mobile devices and improve response times. However, borrowing processing power from mid-network nodes comes at a leasing cost which must be accounted for when making the decision of where processing should occur. We study the tradeoff between battery usage, processing and transmission latency, and mid-network leasing. We use the dynamic programming framework to solve for the optimal processing policies that suggest the amount of processing to be done at each mid-network node in order to minimize the processing and communication latency and processing costs. Through numerical studies, we examine the properties of the optimal processing policy and the core tradeoffs in such systems.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Lung Cancer Detection Using Circular Hough Transform Technique[Full-Text ]
R.Divya, Mrs.M.Angelin Rosy Lung cancer is one of the most serious cancers in the world, with the smallest survival rate after the diagnosis, with a gradual increase in the number of deaths every year. There are two main types of lung cancer, small-cell lung cancer and non small-cell lung cancer. Small-cell lung cancer typically responds well to chemotherapy and radiotherapy and non-small lung cancer is more commonly treated with surgical removal of lung tumor. Medical image processing techniques are used for timely detection of lung cancer in high resolution medical images. In this work, Lung cancer image has been preprocessed, segmented, and circular Hough transform technique is used to detect cancerous cells.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Social Network Analysis[Full-Text ]
Mohammed Asif Raza , Pradeep KumarSocial network analysis (SNA) has been a research focus in multiple disciplines for decades, including sociology, healthcare, business management, etc. Traditional SNA researches concern more human and social science aspectstrying to undermine the real relationship of people and the impacts of these relationships. While online social networks have become popular in recent years, social media analysis, especially from the viewpoint of computer scientists, is usually limited to the aspects of people’s behavior on specific websites and thus are considered not necessarily related to the day-today people’s behavior and relationships. We conduct research to bridge the gap between social scientists and computer scientists by exploring the multifact existing social networks in organizations that provide better insights on how people interact with each other in their professional life.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Survey of Obstacles and Attacks in Wireless Networks[Full-Text ]
Mrs.M.Sudha, Dr. S.Savitha DeviAs wireless sensor networks continue to grow, so does the need for effective security mechanisms. Because sensor networks may interact with sensitive data and/or operate in hostile unattended environments, it is imperative that these security concerns be addressed from the beginning of the system design. However, due to inherent resource and computing constraints, security in sensor networks poses different challenges than traditional network/computer security. There is currently enormous research potential in the field of wireless sensor network security. Thus, familiarity with the current research in this field will benefit researchers greatly
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Hiring an Energetic and Efficient Job Using Big Data[Full-Text ]
Mrs.R.RajalakshmiThe idea behind this paper is to access a variety of data sources from a single computer cluster of big data such as Apache Hadoop and Apache Spark. Nowadays, engineers and other professional persons are in demand to fight for the job and the upwelling of demand makes the people to work with big data sets and online services. E-recruitment is one of the best solution for the job seekers. In this paper, the online job seekers in big data analytics paves a better solution for job finders. All the job finding databases are clouded under one domain and the job seekers are in such a position to find requirements as needed. Time is saved due to non-redundant of resumes posted in big database. The job recommender system – a new requirements were identified to hire a energetic job in a particular location. Using MapR platform technology, we can collect data under one cloud with high speed and better reliability. This provides an intelligent way of opportunities in engineering and marketing. We can hire a smart and challenging job who are looking for an ambitious environment to work in. This paves an epicenter for changing from one environment to another environment
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Speech Recognition Integrated with Graphical Password Authentication System using Sequence Image Click[Full-Text ]
T.NithyaIn this graphical password system with supportive speech recognition to increase the remembrance of the password is discussed. In proposed work a click-based graphical password scheme called Cued Click Point (CCP) is presented. In this system a password consists of sequence of some images in which user can select one click-point per image in a Sequence Image Click (SIC). In addition user is asked to recognize their voice corresponding to each click point; this will be used to help the user in recalling the click point on an image. System showed very good performance in terms of security, accuracy, and ease of use.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Credit Card Fraud Detection Using Simulation Annealing and Genetic Algorithm[Full-Text ]
V.Z.Ifra, V.Safa Mehrin, B.SameenaMany researchers are using simulation annealing to guide artificial neural network in credit card fraud detection and also other researchers tried to prove genetic algorithm to reduce various frauds in credit card fraud detection,but it has not given the exact result in credit card fraud detection.Here we bring an emerging combination of genetic algorithm and simulation annealing to obtain the best result for credit card fraud detection
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------