IOSR Journal of Computer Engineering (IOSR-JCE)

Mar - Apr 2014Volume 16 - Issue 2

Version 1 Version 2 Version 3 Version 4 Version 5 6 7 8 9 10 11 12

Paper Type : Research Paper
Title : Quantum Key Distribution Protocols: A Review
Country : India
Authors : Hitesh Singh, D. L. Gupta, A. K. Singh
: 10.9790/0661-162110109    logo
Abstract: Quantum key distribution (QKD) provides a way for distribution of secure key in at least two parties which they initially share. And there are many protocols for providing a secure key i.e. BB84 protocol, SARG04 protocol, E91 protocol and many more. In this paper all the concerned protocols that share a secret key is explained and comparative study of all protocols shown.
Keywords: Quantum key distribution, BB84 protocol, BB92 protocol, SARG04 protocol, E91 protocol, COW protocol, DPS protocol, KMB09 Protocol, S09 protocol, S13 protocol.
[1]. C. H. Bennett and G. Brassard, "Quantum cryptography: public key distribution and coin tossing," Proc. of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, pp. 175-179, 1984.
[2]. E. Artur "Quantum cryptography based on Bell‟s theorem.", Physical review Letters, Vol. 67, No, 6,5 august 1991, pp 661-663.
[3]. D.Mayers, Journal. of ACM 48, 351 (2001), preliminary version in Mayers, D. Advances in Cryptology-Proc. Crypto 96, vol 1109 of Lecture Notes in Computer Science, Kobiltz, N.Ed.(Springer-Verlag, New York, 1996) pp. 343-357.
[4]. E.Biham, M.Boyer, P.O.Boykin, T.Mor and V.Roychowdhury, in Proc of the thirty second annual ACM symposium on theory of computing (Portland, Oregon, United States, 2000), pp. 715-724
[5]. H.K.Lo and H.F.Chau Science 283, 2050 (1999).

Paper Type : Research Paper
Title : Analysis of Digital Image Splicing Detection
Country : India
Authors : P. Sabeena Burvin, J. Monica Esther
: 10.9790/0661-162111013    logo
Abstract: The availability of photo manipulation software has made it unprecedentedly easy to manipulate images for malicious purposes. One of the most common forms of digital image or photographic manipulation operation is known as image splicing or image composition. It is a process that's crops and paste regions from same or separate sources. In this paper, we analyze various automatic image forensic techniques for detecting digital image splicing.
Keywords: image forensic, image forgery, image composition, image retouching, copy-move image forgery.
[1]. Prof. Unmukh Datta & Chetna Sharma, "Analysis of copy-move image forgery detection"; International journal of advanced research in computer science & electronics engineering(IJARCSEE), volume 2, issue 8, august 2013.
[2]. Types of digital image forgery, Available. HWocU7zx IOOD8Qf8wIDgCw#q=Types+of+digital+image+forgery.
[4]. Zhen zhang,ying zhou, jiquankang & yaan ren, "Study of digital image splicing detection", zhang zhen, china.

Paper Type : Research Paper
Title : A Survey on Enhancing Routing using NCPR in Mobile Ad hoc Networks
Country : India
Authors : Smita S. Shrimandal, Ranjana B. Nadagoudar, Rekha B. Venkatapur
: 10.9790/0661-162111418    logo
Abstract: Mobile Ad hoc Network (MANET) is collection of wireless mobile hosts (or nodes) that are free to move in any directions at any speed. This nature of MANET's leads to periodic link breakage, which in turn leads to periodic path failure and route discoveries, hence overhead is created in the network topology. To overcome this overhead basic technique called Broadcasting is used which is inefficient in larger topologies as it incurs broadcast storm problems. This paper surveys and presents implementation of proposed NCPR Protocol to enhance routing performance by reducing the overhead. The NCPR Protocol determines ReBroadcast order using ReBroadcast delay by using neighbour coverage knowledge. Approach is to overcome collisions and channel contentions by reducing the number of retransmission and improve the Quality of Service (QoS) routing in MANETS. Broadcast, Routing, collision, Mobility, channel contentions.
Keywords: Mobile Ad hoc Networks (MANETs), Neighbour coverage Knowledge, ReBroadcast Techniques, Routing Overhead, NCPR.
[1] S. Y. Ni, Y. C. Tseng, Y. S. Chen, and J. P. Sheu. "The Broadcast Storm Problem in a Mobile Ad hoc Network," Proc. of ACM/IEEE MobiCom'99, pp. 151-162, 1999.
[2] Xin Ming Zhang, En Bo Wang, Jing Xia, and Dan Keun Sung."A Neighbour Coverage based Probabilistic ReBroadcast for Reducing Routing Overhead in Mobile Ad hoc Networks", 2012.
[3] C. Perkins, E. Belding-Royer, and S. Das, "Ad hoc On-Demand Distance Vector (AODV) Routing," RFC 3561, 2003.
[4] B. Williams and T. Camp, "Comparison of Broadcasting Techniques for Mobile Ad Hoc Networks," Proc. ACM MobiHoc'02, pp. 194-205, 2002.
[5] J. Kim, Q, Zhang, and D. P. Agrawal, "Probabilistic Broadcasting Based on Coverage Area and Neighbour Confirmation in Mobile Ad hoc Networks," Proc. of IEEE GLOBECOM'04, 2004.

Paper Type : Research Paper
Title : Secured Tagging [Redefining Spam Detection]
Country : India
Authors : S. Himaja, Dr. N. Chandra Sekhar Reddy, S. Srinivas
: 10.9790/0661-162111922    logo
Abstract: Recently Social bookmarking websites have emerged for finding and promoting relevant websites among its users. People can add bookmarks to promote the links and have a total control over their bookmarks. Because of the multimedia contents social networking sites became so popular around the web. However spam is the one thing that is still annoying the users to perform productive searches. Spam tags that are totally irrelevant to these content enriched sites appear malicious in general. There are various techniques used to control such tag spam. We discussed one of those techniques in this paper, Trust modeling approaches can be classified into 2 categories according to the target of trust, i.e., user and content trust modeling to predict spam, the spam factor(P) is calculated and basing on its value P is categorized into one among High (H), Low (L) and Medium (M) levels.
Keywords: Spam detection, Social Bookmarking, tags, spam factor.
[2] A. Jøsang, R. Ismail, and C. Boyd, "A survey of trust and reputation systemsfor online service provision," Decision Support Syst., vol. 43, no. 2, pp. 618–644,Mar. 2007.
[3] B. Markines, C. Cattuto, and F. Menczer, "Social spam detection," in Proc.ACMAIRWeb, Apr. 2009, pp. 41–48.
[4] I. Ivanov, P. Vajda , J.-S. Lee, L. Goldmann, and T. Ebrahimi, "Geotagpropagation n social networks based on user trust model," Multimedia Tools Applicat., pp.1–23, July 2010.
[5] F. Benevenuto, T. R odrigues, V. Almeida, J. Almeida, and M. Gonçalves,"Detecting spammers and content promoters in online video social networks," inProc. ACM SIGIR, July 2009, pp. 620–627.

Paper Type : Research Paper
Title : Displaying All Bangla Compound Letters & Alphabets By 32-Segment
Country : Bangladesh
Authors : Shamsun Nahar, Fariha Jabin
: 10.9790/0661-162112327    logo
Abstract: Different approaches have been proposed for representing Bangla and English alphabets and numerals by segment display. But there is no complete and accurate scheme has been done yet for Bangla compound letters. The focus of our paper is on all compound letters to represent by 32 segments. By these 32 segments, we also represent all Bengali and English numerals and alphabets. Accurate recognition of compound characters is difficult due to their complex shapes. In this paper we try to present total 97 compound letters in simpler look. This proposed design performs well for complex-shaped compound characters, which were confusing to the existing methods.
Keywords: 32-segment display, alphabets, compound letters and numerals.
[1] Md. Badrul Alam Miah, Rashed Mazumder, S.M. Anamul Haque, and Nazrul Islam; "A NEW APPROACH TO DESIGN 9 SEGMENTS DISPLAY FOR BANGLA NUMERALS", Canadian Journal on Electrical and Electronics Engineering Vol. 2, No. 12, December 2011
[2] Md. Abul Kalam Azad, Rezwana Sharmeen, Shabbir Ahmad and S. M. Kamruzzaman; "A Unique 10 Segment Display for Bengali Numerals",
[3] Sabbir Ahmed, Serazam Monira; "Designing a 10 segment display for Bangla and English numerals", 6th ICCIT 2004
[4] Ahmed Yousuf Saber, Mamun Al Murshed Chowdhury, Suman Ahmed, Chowdhury Mofizur Rahman; "Designing 11-Segment Display for Bangla Digit"s, 5th ICCIT 2002
[5] Al-Sakib Khan Pathan ,Md. Mahbub Alam, Mostafa Monowar, Forhad Rabbi, Sabbir Ahmed,Tareq Hasan Khan; "12-SEGMENT DISPLAY FOR BENGALI NUMERICAL CHARACTERS", National Conference on Computer Processing of Bangla (NCCPB-2004), pp. 82-88, Dhaka, Bangladesh, February, 2004

Paper Type : Research Paper
Title : A Novel Method of Data Staging For Better Mobile User Accessibility through Cloud
Country : India
Authors : Syeda Misba, Prof. D. Jayaramaiah
: 10.9790/0661-162112831    logo
Abstract: In this paper, we identify and create vantage sites to stage shared data items for the ease of mobile user accesses. As mobile users will be charged on the usage of communication bandwidth and for the amount of the time the storage resources are utilized on their respective data, we aim to minimize cost for mobile users. As the identification of the access patterns to assist future requests are already known in advance, our aim is to efficiently stage the shared data items to predetermined vantage sites at specific time intervals thus minimizing the monetary costs for caching and transmitting the requested data items as well as managing some of the issues faced by Mobile cloud computing like limited bandwidth and high latency of network because the radio resource for wireless networks is much scarce as compared with the traditional wired networks and availability as mobile users may not be able to connect to the cloud to obtain a service due to traffic congestion, network failures, and the out-of-signal.
Index terms: Cloud computing, Mobile cloud computing, data staging, data caching, data placement and replication.
[[1] "Cloud Computing for Future Generation of Computing Technology" Proceedings of the 2012 IEEE International Conference on Cyber Technology in Automation, Control and Intelligent Systems May 27-31, 2012
[3] H. Gupta and B. Tang, "Data Caching under Number Constraint," Proc. IEEE INFOCOM, 2006.
[4] A. Benoit, V. Rehn-Sonigo, and Y. Robert, "Replica Placement and Access Policies in Tree Network," IEEE Trans. Parallel and Distributed Systems, vol. 19, no. 12, pp. 1614-1627, Dec. 2008.
[5] M. Bienkowski, A. Feldmann, D. Jurca, W. Kellerer, G. Schaffrath, S. Schmid, and J. Widmer, "Competitive Analysis for Service Migration in Vnets," Proc. Second ACM SIGCOMM Workshop Virtualized Infrastructure System and Architectures (VISA), Sept. 2010.

Paper Type : Research Paper
Title : A Step-Wise Procedure to Develop an Algorithm for Image Brightness Using Edge Detection Principles
Country : India
Authors : A. Prema, Prof. Dr. M. V. Ramana Murthy
: 10.9790/0661-162113235    logo
Abstract: This paper uses the technique of edge detection to make the image of an oil pipeline toappear bright and clear for further investigations after applying Mathematical morphology for curve error detection. This algorithm is developed to read the pixel values and eliminate the shadow images that appear. The pixels are studied carefully to give a set of appropriate values, which helps in setting up the right image for image evaluation. To achieve this, edge detection method is used and an algorithm is developed for image processing. This algorithm helps to build up a set of accurate pixel values, to determine the co-ordinates of the image for processing and analysis.This algorithm is developed mainly to remove the shadow images if caused during the camera intervention inside the oil pipeline.
Keywords: Edge, Smooth, Noise, Thresold, Gradient.
[1]. Edge detection with Sobel operator by Sausheong,April 20,2011
[2]. A Research on Improved Canny Edge Detection Algorithm-Jun Li, Sheng Ding

Paper Type : Research Paper
Title : Improvising Data Locality and Availability in Hbase Ecosystem
Country : India
Authors : Shalini Sharma, Satyajit Padhy
: 10.9790/0661-162113641    logo
Abstract: In this paper, we try to represent the importance of data locality with the HBase architecture. HBase has a dynamic master slave architecture but the emphasis on data locality, i.e. getting the logic or processing near to the data is the major phenomenon followed for better and efficient performance. Data Locality is valid as every region server has the information of every data blocks located in respective regions but what if the region server crashes or the region server is restarted or the regions are randomly re-distributed with all the region servers due to load balancing, then data locality is completely lost during that time. Performance is majorly affected if there is misconfiguration of data locality in the cluster. The HMaster uses [4] .META table to get information about the region server that has its specified regions containing rows. Keeping an eye on this disadvantages and challenges, we propose to improvise data locality by allocating maximum regions to that region server which had the maximum data blocks of that region in it. An algorithm is proposed based on HRegion locality index for deciding the criteria of allocating the regions to region servers for maintaining data locality.
Keywords: Data Locality, HRegion, HDFS, locality index, MapReduce, Region servers.
[1]. HBase: The Definitive Guide by Lars George
[2]. Y. Guo, Z. Pan, and J. Heflin, "LUBM: A benchmark for OWL knowledge base systems." Journal of Web Semantics, vol. 3, no. 2-3, pp. 158–182, 2005.
[3]. S. Nishimura, S. Das, D. Agrawal, and A. Abbadi, "Mdhbase: A scalable multi-dimensional data infrastructure for location aware services," in Mobile Data Management ( MDM), 2011 12th IEEE International Conference on, vol. 1. IEEE, 2011, pp. 7–16.
[4]. F. Chang, J. Dean, S. Ghemawat, W. Hsieh, D. Wallach, M. Burrows, T. Chandra, A. Fikes, and R. Gruber, "Bigtable: A distributed storage system for structured data," ACM Transactions on Computer Systems (TOCS), vol. 26, no. 2, p. 4 , 2008.
[5]. K. Muthukkaruppan, "HBase @ FacebookThe Technology Behind Messages," April 2012. [Online]. Available:

Paper Type : Research Paper
Title : A Secure and Efficient Two-Server Password Only Authenticated Key Exchange
Country : India
Authors : Ms. Sandra Bhavadas A. B., Ms. Jini K. M.
: 10.9790/0661-162114247    logo
Abstract: Password-authenticated key exchange (PAKE) is an authentication mechanism where a client and a server who share a password and authenticate each other with that password and hence both will agree on a cryptographic key. Normally, the passwords which are required to verify the clients are stored on a single server. If the server is compromised, due to some malicious operations like hacking or installing a Trojan horse, passwords which are stored in the server gets revealed. In this paper two servers cooperate to authenticate a client and if one server is cooperated, the attacker still cannot act as a client with the evidence from the conceded server. Current solutions for two servers PAKE are either symmetric in the way that the two server correspondingly contribute to the authentication or asymmetric in the sense that one server confirms the authenticity of legal client with the assistance of another server. This paper presents the development of symmetric protocol for two-server PAKE, where the client can establish different cryptographic keys with the two servers. In addition to that a nonce will be generated during the period of authentication and this will act as a timer. If the timer does not expire with in the period limit, the authentication procedure will be carried out within the limit which provides security to replay attacks.
Keywords: PAKE, Dictionary Attack, Diffie-Hellman Key Exchange, Elgamalencryption, Nonce.
[1]. Xun Yi, San Ling, Hauxiong Wang, "Efficient Two-Server Password Only Authenticated Key Exchange", IEEE Transactions on Paralleland Distributed Systems,24,no.9, Sep. 2013.
[2]. J. Katz,P.MacKenzie,G.Taban, andV.Gligor, "Two-ServerPassword-Only Authenticated Key Exchange," Proc. AppliedCryptographyandNetworkSecurity(ACNS'05),pp. 1-16,2005.
[3]. Y.Yang, R.H. Deng, and F.Bao,"A Practical Password-Based Two-Server Authenticationand keyExchangeSystem," IEEE Trans DependableandSecureComputing, vol.3,no.2,pp. 105-114, Apr.2006.
[4]. H.Jin,D.S.Wong, andY. u,"AnEfficientPassword-OnlyTwo- Server AuthenticatedKey Exchange System," Proc.Ninth Int'l Conf.Information andComm.Security(ICICS'07),pp. 44-56,2007.
[5]. D. Jablon, "Password AuthenticationUsing Multiple Servers,"Proc.Conf.TopicsinCryptology: TheCryptographer's TrackatRSA (RSA-CT'01),pp. 344-360,2001.

Paper Type : Research Paper
Title : Design and Implementation of Low-Cost Multi-Touch Surface Computing Using Image Processing
Country : India
Authors : Prinkan Pal, Subramanya Vikas, Pavan Raju
: 10.9790/0661-162114856    logo
Abstract: Touch sensing devices have reached the pinnacle of success in the present era thereby revolutionizing human machine interaction. Capacitive touch-screens are popular because of its portability whereas image processing based touch-screens are massive but for low-cost surface computers with the capability of both touch and object-recognition, the latter is preferred because it uses optical solutions to sense touch.Multi-touch devices are in vogue and therefore the concept of surface computing is gaining popularity since it provides an enhanced multi-touch and multi-user experience.Multi-touch denotes a set of interaction techniques that allow computer users to control multimedia applications with several fingers. The concept of gesture recognition thus comes into the picture. Our objective is to implement a cost-effective multi-touch surface computing system. The image processing algorithms used are implemented in MATLAB and the simulation of gesture recognition is carried out using Open Source Computer Vision Library (OpenCV).
[1]. Han, Jerfferson Y. "Low Cost Multi-Touch Sensing through Frustrated Total Internal Reflection." Symposium on User Interface Software and Technology: Proceedings of the 18th annual ACM symposium on User interface software and technology. Seattle,WA, USA, 2005. 115-118.
[2]. Ang, Zhi-Yang; Yuen, Chai Tong; Ng, Tze-Yu; Ng, Yee-Long; Ho, Jee-Hou; "Development of a multi-touch table for natural user interface", Sustainable Utilization and Development in Engineering and Technology (STUDENT), 2011 IEEE Conference, pp - 201 – 206
[3]. Saravanan, C., "Color Image to Grayscale Image Conversion", Computer Engineering and Applications (ICCEA), 2010 Second International Conference, pp - 196 – 199
[4]. S. S. A. Sheikh, S. M. Hanana, Y. Al-Hosany, and B. Soudan, "Design and implementation of an FTIR camera-based multitouch display," GCC Conference & Exhibition, 2009 5th IEEE, pp – 1-6.

Paper Type : Research Paper
Title : Client Based System on Wireless Sensor Network for Efficient Packet Transmission
Country : India
Authors : Mr.S.Selvakumar, S.R, Manikandan
: 10.9790/0661-162115758    logo
Abstract: Wireless sensor networks are vulnerable to the node distributor dividend, and several distributed protocols has been transfer the data in secure .Where MD5 algorithm that implements adaptive TTL, piggybacking, and perfecting, and provides near strong consistency guarantees. Cached data items are assigned adaptive TTL values that correspond to their update rates at the data source. Expired items as well as non expired ones but meet certain criteria are grouped in validation requests to the data source, which in turn sends the cache devices the actual items that have changed
[1]. Zhujun li, member; IEEE, and Guang Gong, senior member, IEEE "On the Node Clone Detection in Wireless Sensor Networks"
Journal Papers:
[2]. G. Anandharaj , Dr.R. Anitha "A Distributed Location Aware Cache Maintenance Technique for Mobile Computing Environments"
(Journal of Computational Information Systems 8: 7 (2012) 2839–2849))
Chapters in Books:
[3]. Sunho Lim Soo-Hoan Chae "On Improving The Robustness Of Partitionable Internet-Based Mobile Ad Hoc Networks"
(Computing and Informatics, Vol. 30, 2011, 429–446)
Proceedings Papers:
[4]. Jaeyeon Jung, Arthur W. Berger and Hari Balakrishnan "Modeling TTL-based Internet Caches, Pro"c. INFOCOM 2003. Twenty-
Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies (Volume:1 )

Paper Type : Research Paper
Title : A B-S Model for Online Integrated Information System for Bayero University Kano Nigeria
Country : Nigeria
Authors : Abubakar Sulaiman Gezawa, Ahmed Aliyu, Abduarra'uf Garba, Saifullahi Aminu Bello, Usman Joda
: 10.9790/0661-162115967    logo
Abstract: An online integrated information system for Bayero University Kano, is a web-based application that provides inputs and outputs information support to admin/users in order to access and update university student record. Bayero University Kano is one of the most recognized conventional universities in Nigeria with a large number of students both undergraduate and post graduate.
[1]. Visscher, A. J. (1991). School administrative computing: A framework for analysis. Journal of Research on Computingin Education, 24(1), 1-19.
[2]. A Servlet and JSP tutorial URL:
[6]. Sun Microsystems, Java URL:

Paper Type : Research Paper
Title : A Survey on Data Annotation for the Web Databases
Country : India
Authors : Miss.Priyanka P.Boraste
: 10.9790/0661-162116870    logo
Abstract: Web search engines are designed to search information in the web database and to return dynamic web pages. Data unit's returns from the databases and information technology are accessible through HTML form-based interfaces and web technology. Web pages are retrieved when a query is submitted to the search interface. Each web page contains several search result records related to user query. Every SRR contains multiple data units each of which describes one aspect of a real-world entity.
[1]. Y. Lu, H. He, H. Zhao, W. Meng, C. Yu, "Annotating Search Result From Web databases" In IEEE Transaction on Knowledge and
[2]. Data Engineering, Vol. 25, No.3, 2013 N. Krushmerick, D. Weld, and R. Doorenbos, "Wrapper Induction Information Extraction," Proc. Int'l Joint Conf. Artificial Intelligence (IJCAI), 1997\ L. Liu, C. Pu, and W. Han, "XWRAP: An XML-Enabled Wrappe Construction System for Web Information Sources," Proc. IEEE
[3]. Conf. Data Eng. (ICDE), 2001W. Meng, C. Yu, and K. Liu, "Building Efficient and Effective Metasearch Engines," ACM Computing Surveys, vol. 34, no. 1, pp. 48- 89,2002

Paper Type : Research Paper
Title : Android Based Appointment Scheduler and Location Helper using file operation
Country : India
Authors : Kujur Preeti Nancy, Pooja
: 10.9790/0661-162117175    logo
Abstract: With the development of Android OS, an open source operating system has created an android world and enhance the software development skills, where developers are creating new application for Android devices. Application are typically developed using Java programming language using the Android Software Development Kit but another languages such as Python being dynamically typed is more preferable nowadays compared to Java. Here we created an Offline Android Application-Appointment Scheduler and Location Helper using File operation. Moreover in this application user can schedule his appointment and the user can get to know the path and direction of any nearby places by Location Helper.

Paper Type : Research Paper
Title : Security Enforcement with query routing Information Brokering in Distributed Information Sharing
Country : India
Authors : A. Banu Prabha
: 10.9790/0661-162117682    logo
Abstract: Information brokering system (IBS) shares information via on-demand access. IBS connect large-scale loosely federated data sources via a brokering overlay. It is a peer-to-peer overlay network that comprises diverse data servers and brokering components, that helps client queries to locate the data server(s). Peer-to-peer (P2P) systems are gaining increasing popularity as a scalable means to share data among a large number of autonomous nodesand to balance the load.
[1]. W. Bartschat, J. Burrington-Brown, S. Carey, J. Chen, S. Deming, and S. Durkin, "Surveying the RHIO landscape: A description of current
[2]. RHIO models, with a focus on patient identification," Journal of AHIMA 77, pp. 64A–D, January 2006.
[3]. A. P. Sheth and J. A. Larson, "Federated database systems for managing distributed, heterogeneous, and autonomous databases," ACMComputing Surveys (CSUR), vol. 22, no. 3, pp. 183–236, 1990.
[4]. X. Zhang, J. Liu, B. Li, and T.-S. P. Yum, "CoolStreaming/DONet: A data-driven overlay network for efficient live media streaming," in
[5]. Proceedings of IEEE INFOCOM, 2005.A. C. Snoeren, K. Conley, and D. K. Gifford, "Mesh-based content routing using XML," in SOSP, pp. 160–173, 2001.
[6]. G. Koloniari and E. Pitoura, "Peer-to-peer management of XML data: issues and research challenges," SIGMOD Rec., vol. 34, no. 2, 2005.

Paper Type : Research Paper
Title : Advanced Lightweight BFT Process ForTrustworthy Management inWeb Services Computing System
Country : India
Authors : Mr.B.Karthikraja (M.Tech) Scholar, Mr.K.P.Kaliyamurthie (H.O.D)
: 10.9790/0661-162118388    logo
Abstract: The project entitled as "Trustworthy Coordination of Web Services Atomic Transactions". The consumer will enter their customer id and PIN for accessing their account details. They can view all the accounts across all branches of Net Bank locations online and as well affect fund transfers on real time basis within the Bank network. The accounttransmissions are stored in your database at Net Bank using some services. Such as, Activation service, Registration service, Completion service, Coordinator serviceIn activation services, creates a Coordinator thing and a transaction based context for each transaction. Essentially the Activation service performsidentical factory object that creates Coordinator objects.
[1] The web services-businessactivity–initiator (WS-BA–I) protocol: an extension to the web services-business activity specification- hanneserven, georghicker, christianhuemer and marcozaptletal.
[2] A survey of trust in internet applications - tyronegrandison and morrissloman
[3] Secure and scalable replication in phalanx - dahlia malkhi, michael K. Reiter
[4] Thema: byzantine-fault-tolerant middleware forweb-service applications - michael G. Merideth, aruniyengar, thomasmikalsen, stefan tai, isabellerouvellou, priyanarasimhan

Paper Type : Research Paper
Title : Performance Analysis of Routing Protocols in MANET
Country : Morocco
Authors : Mohamed Otmani, Dr. Abdellah Ezzati
: 10.9790/0661-162118994    logo
Abstract: The A mobile ad hoc network (MANET) is a wireless communication network, consists of a number of mobile devices that come together to form a network as needed, without any support from any existing Internet infrastructure or any other kind of fixed stations. It is a self-configuring, infrastructure-less network of mobile devices. These devices are free to move independently in any direction and will be change its links to other devices frequently. In a dynamic environment, nodes are independent and they can move in any direction and thus mobility causes frequent change of network connectivity.
[1] Zehua Wang, Yuanzhu Chen and Cheng Li, ― PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc Networks‖,IEEE Transactions on Vehicular Technology, Vol. 63, no. 2, February 2014.
[2] Seema Vilas Bhujade, Prof. S. D. Sawant, ―Evaluation AODV, DSR and DSDV Protocol of MANET by USING NS-2‖, IJET, Volume 4 Issue 8- August 2013.
[3] D GEETHA, T SARIKA, ―Performance Analysis of TORA & DSR Routing Protocols in Mobile Ad-hoc Networks‖, IJECSE, Volume 2,Number 1.
[4] Basu Dev Shivahare, Charu Wahi, Shalini Shivhare, ― Comparison Of Proactive And Reactive Routing Protocols In Mobile Adhoc Network Using Routing Protocol Property‖, International Journal of Emerging Technology and Advanced Engineering , Volume 2, Issue 3, March 2012.

Paper Type : Research Paper
Title : Music-Map: A Music Recommendation System Based On Data Mining Technique
Country : India
Authors : Basundhara Dey
: 10.9790/0661-1621195100  logo
Abstract: This report describes the design, implementation and protocol of a Music Recommendation System in details. I have used python programming language to develop the proposed system and SQLite to design and control the backend database. The report contains algorithm and data structure as well. In this paper, I present a music recommendation system, which provides a personalized service of music recommendation.

Paper Type : Research Paper
Title : Effects Of Wormhole Attack On AODV And DSR Routing Protocol Through The Using NS2 Simulator
Country : Morocco
Authors : Mohamed Otmani, Dr. Abdellah Ezzati
: 10.9790/0661-16211101107    logo
Abstract: Mobile Adhoc Networks (MANET) are self organizing, decentralized networks and possess dynamic topology, which make them attractive for routing attacks. Attacks on ad hoc networks can be classified as passive and active attacks, depending on whether the normal operation of the network is disrupted or not. The security of the AODV and DSR protocol is compromised by a particular type of attack called 'Worm hole attack'. Wormhole attack is a network layer attack observed in MANET, which completely disrupts the communication channel. In This paper we analyses the performance of AODV and DSR routing protocols with and without wormhole attack using Network Simulator 2. For analyzing the performance we considered total packets received, total bytes received, first packet received, last packet received, average end-to-end delay and throughput as measures.
[1]. H. Deng, W. Li, and D. P. Agrawal, "Routing security in ad hoc networks," IEEE Communications Magazine, vol. 40, no. 10, pp. 70-75, Oct. 2002.
[2]. Y. A. Huang and W. Lee, "Attack analysis and detection for ad hoc routing protocols," in The 7th International Symposium on Recent Advances in Intrusion Detection (RAID'04), pp. 125-145, French
[3]. Charles E. Perkins and Elizabeth M. Royer, "Ad-hoc On-Demand Distance Vector Routing ," 2nd IEEE workshop on mobile computing systems and applications, New Orleans, Louisiana, USAp. 90-100, Feb. 1999
[4]. Seung Yi and Prasad Naldurg, "Security-aware ad hoc routing for wireless networks ," 2nd ACM international symposium on Mobile ad hoc networking & computing, MobiHoc'01, 2001,p. 299 - 302
[5]. Charles Perkins and Elizabeth Royer, " Ad hoc On-Demand Distance Vector (AODV) Routing ," RFC 3561, 2003, p. 1-37

Paper Type : Research Paper
Title : Detection and Prevention of Black Hole Attack in Mobile Ad-Hoc Networks: A Survey
Country : India
Authors : Kashmeera N. Khachar, Mrs Jayna B.Shah
: 10.9790/0661-16211108112    logo

Abstract: A mobile ad hoc network (MANET) is a self-configuring network that is formed automatically by a collection of mobile nodes. There is no centralized management. Both legitimate and malicious nodes can access the network, so there are many possible attacks in MANET. In a black hole attack, a malicious node attracts traffic towards it and drops all packets without forwarding to the destination. The security of the AODV protocol is compromised by a particular type of attack called black hole attack.

Keywords: mobile ad hoc network, legitimate node, malicious node, black hole attack.

[1] Y. Zhang and W. Lee, "Intrusion detection in wireless ad-hoc networks," Sixth Annual International Conference on Mobile Computing and Networking (MobiCom‟2000), Boston, August 6-11, 2000. [2] Jiwen CAI, Ping YI, Jialin CHEN, Zhiyang WANG, Ning LIU, "An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network" 24th IEEE International Conference on Advanced Information Networking and Applications 2010 [3] Manuel D. Serrat-Olmos, Enrique Hernández-Orallo, Juan-Carlos Cano, Carlos T. Calafate, Pietro Manzoni, "Accurate Detection of Black Holes in MANETs using Collaborative Bayesian Watchdogs" IEEE International Conference 2012 [4] Mohammad Taqi Soleimani and Abdorasoul Ghasemi, "Detecting Black Hole Attack in Wireless Ad Hoc Networks Based On Learning Automata" [5] Kulbhushan, Jagpreet Singh, "Fuzzy Logic based Intrusion Detection System against Blackhole Attack on AODV in MANET"IJCA Special Isson Network Security and Cryp to graphy NSC 2011. [6] Yibeltal Fantahun Alem and Zhao Cheng Xuan, "Preventing Black hole Attack in Mobile Ad-hoc Networks using Anomaly Detection" IEEE International Conference-2010

Paper Type : Research Paper
Title : Alltalk™- A Windows Phone Messenger with Cross Language Communication
Country : India
Authors : Shruti Shetye, Akhil Abraham, Royston Pinto, Sonali Vaidya
: 10.9790/0661-16211113119    logo

Abstract: In day to day life, messengers or chatting applications provide facility for instant messaging over the internet. Exchange of messages takes place in universally used languages like English, French, etc. where both the users know how to communicate in a common language. Thus chatting on mobile phones is a luxury when both the parties involved know a common language. Hence we have implemented ALLTALK™ which is a Windows 8 phone based chatting application which makes cross language communication possible using mobile programming and networking technology.This application will enable the communication between two persons irrespective of the language each user wishes to use individually.

1]. MChatterjee, S.,Abhichandani, T. ,Haiqing Li, TuIu, B. JongbokByun, Instant Messaging and PresenceTechnologies for College Campuses , Network, IEEE, 19(3), 2005, 4 - 13.
[2]. Peter Saint-Andre., Streaming XML with Jabber/XMPP, Internet Computing, IEEE , 9(5), 2005, 82 - 89.
[3]. D. Stenberg, "History of IRC (Internet Relay Chat),", Mar. 29, 2011.
[4]. C. Yudkowsky, "Byte of Success: An IM Strategy,", Nov. 10th, 2004.
[6]. Vanessa Wang, Frank Salim, Peter Moskovits, Building Instant Messaging and Chat over WebSocket with XMPP, The Definitive Guide to HTML5 WebSocket, 4 (New York: Springer-Apress, 2013) 61-83.
[7]. Jongmyung Choi, Chae-Woo Yoo,The Internet of Things ,Connect with Things through Instant Messaging, 4 (New York: Springer-Springer Berlin Heidelberg, 2008) 276-288.
[8]. Peter Saint-Andre. Extensible Messaging and Presence Protocol (XMPP): Core. IETF RFC 3920, Oct 2004.

Paper Type : Research Paper
Title : Analysis of Intrusion Detection Response System (IDRS) In Cyber Physical Systems (Cps) Using Regular Expression (Regexp)
Country : India
Authors : Ms. Simrandeep Kaur chana, Prof S.J.Karale
: 10.9790/0661-16211120125    logo

Abstract: In this research we aim to design and validate Intrusion Detection Response System (IDRS) for a cyber physical system (CPS) comprising for controlling and protecting physical infrastructures. The design part includes host IDS, system IDS and IDS response designs. The validation part includes a novel model-based analysis methodology with simulation validation. Our objective is to maximize the CPS reliability or lifetime in the presence of malicious nodes performing attacks which can cause security failures. Our host IDS design results in a lightweight, accurate, autonomous and adaptive protocol that runs on every node in the CPS to detect misbehavior of neighbor nodes based on state-based behavior specifications. Our system IDS design results in a robust and resilient protocol that can cope with malicious,

[1]. Bradley, T.(n.d) "Introduction To Intrusion Detection System(IDS)" International Journal of Computer Science & technology VOL.2,NO.3, March-2011.
[2]. M. Anand, E. Cronin, M. Sherr, M. Blaze, Z. Ives, and I. Lee, "Security challenges in next generation cyber physical systems," in Beyond SCADA: Networked Embedded Control for Cyber Physical Systems. Pittsburgh, PA, USA: NSF TRUST Science and Technology Center, NOV. 2006.
[3]. Robert R. Mitchell III, Eric Cronin, Micah Sherr, Matt Blaze, Zachary Ives, Insup Lee "Design and Analysis of Intrusion Detection Protocols in Cyber Physical Systems" Institute Of Electrical And Electronics Engineers Of Computer Security, Vol.10,NO.2, November-2010.
[4]. Alvaro A. C´ardenas, Saurabh Aminy, Bruno Sinopoliz, Annarita Giani Adrian Perrigz Shankar Sastry "Challenges for Securing Cyber Physical Systems" VOL.25,NO.12,September-2010

Paper Type : Research Paper
Title : Implementation Of Web Based Manufacturing Process Planning Workflow In A Pressure Die Casting Industry
Country : India
Authors : M. Nagaraj, Dr.G. Madhan Mohan
: 10.9790/0661-16211126134    logo

Abstract:Today's manufacturing industry requires product data management system (PDM) for efficient product development and production. Manufacturing industries must deal with competition, time to market, reduction of the cost of doing business, and rapid development of new services and products. To address these requirements industries must constantly reconsider and optimize the way they do business and change their systems and applications to support evolving business processes. In the part of the PDM solution, workflow management system facilitates creating and executing workflow and controlling, monitoring, optimizing and supporting business processes. This paper proposes an approach to implement web based manufacturing process planning workflow in a pressure die casting industry to overcome the bottleneck associated with the workflow of the company. The advantage of this work is its efficiency and flexibility of data management and the business processes are explicitly defined. Manufacturing process planning workflow has been implemented to support the business process of the pressure die casting industry.

1]. Qui.Z.M, and Wong.Y.S., Dynamic workflow change in PDM systems", Computer in Industry, Vol.58 (2007) 453-563.
[2]. Jae-Yoon Jung, Hoonate Kim, and Suk-Ho Kang ., Standards based approaches to B2B integration, Computer & Industrial vol. (2006) 321-334.
[3]. Itana Maria de Souza Gimenes, Fabrício Ricardo Lazilha, Edson Alves de Oliveira Junior, Leonor Barroca, A Component basedProduct Line for Workflow Management Systems, CLEI electronic journal, vol. 7(2004) paper 5.
[4]. Eynard, Thomas Gallet, Pierre Nowa, and Lionel Roucoules., UML based specifications of PDM product structure and workflow, Computers in Industry 55 (2004) 301–316.
[5]. [Miguel A. Laguna, Jose M. Marque, and Francisco J. Garcia, DocFlow: workflow based requirements elicitation, Information and Software Technology 45 (2003) 357–369.
[6]. Lerina Aversano, Gerardo Canfora , Andrea De Lucia, and Pierpaolo Gallucci., Business process reengineering and workflowautomation:a technology transfer experience, The Journal of Systems and Software 63 (2002) 29–44.

Paper Type : Research Paper
Title : Severe SOA Security Threats on SOAP Web Services – A Critical Analysis
Country : India
Authors : Mohamed Ibrahim B, Dr. Mohamed Shanavas A R
: 10.9790/0661-16211135141    logo

Abstract: Enterprise Application Integration (EAI) involves several technologies; among them, the popular and recent one is Service Oriented Architecture (SOA). Mainly, SOA is used for developing loosely coupled distributed applications. Loosely coupled applications are a group of applications (to form EAI) which can operate independently of each other. The early SOA was achieved by using a number of architectures which include DCOM (Distributed Component Object Model),

[1] Srirama, S. N., Jarke, M. and Prinz, W., "Security Analysis of Mobile Web Service Provisioning," International Journal of Internet Technology and Secured Transactions, 2007
[2] Controneo, D., Graziano, A., and Russo, S., "Security Requirements in Service Oriented Architectures for Ubiquitous Computing," Proceedings of the 2nd Workshop on Middleware for Pervasive and Ad-hoc Computing, ACM, 2004
[3] Noor A. Altaani, Ameera S. Jaradat, "Security Analysis and Testing in Service Oriented Architecture," International Journal of Scientific & Engineering Research, Volume 3, Issue 2, 2012
[4] Deven Shah and Dhiren Patel, "Architecture Framework Proposal for Dynamic and Ubiquitous Security in Global SOA," International Journal of Computer Science and Applications, Vol. 6, No. 1, pp. 40-52, 2009
[5] Dirk Krafzig, Karl Banke, Dirk Slama, "Enterprise SOA Service Oriented Architecture Best Practices," Pearson Education, Inc, USA, 2005

Paper Type : Research Paper
Title : Decisive Role Model For Data Association
Country : India
Authors : Anurag Bhardwaj, Ashutosh Bhardwaj
: 10.9790/0661-16211142145    logo

Abstract: This paper focuses on defined rule based on the itemsets appearing in the database and their relationship among themselves. Features are extracted leading to data trends, patterns and associations. Constraining the selection of itemsets, the feature transaction set in reduced. The algorithm here integrates the support and confidence values for the itemsets leading to strong rule generation.

[1] Berger, Adam L., Vincent J. Della Pietra, and Stephen A. Della Pietra. "A maximum entropy approach to natural language processing." Computational linguistics 22.1 (1996): 39-71.
[2] Gupta, Himanshu. "Selection of views to materialize in a data warehouse."Database Theory—ICDT'97. Springer Berlin Heidelberg, 1997. 98-112.
[3] Wang, Jiawei Han Yongjian Fu Wei, et al. "DBMiner: A system for mining knowledge in large relational databases." Proc. Intl. Conf. on Data Mining and Knowledge Discovery (KDD'96). 1996.
[4] Agrawal, Rakesh, and Ramakrishnan Srikant. "Privacy-preserving data mining."ACM Sigmod Record 29.2 (2000): 439-450.
[5] Worboys, Michael. "Event‐oriented approaches to geographic phenomena."International Journal of Geographical Information Science 19.1 (2005): 1-28.
[6] Luo, Jiebo, Andreas E. Savakis, and Amit Singhal. "A Bayesian network-based framework for semantic image understanding." Pattern Recognition 38.6 (2005): 919-934.
[7] Huang, Jiejun, Heping Pan, and Youchuan Wan. "An algorithm for cooperative learning of Bayesian network structure from data." Computer Supported Cooperative Work in Design I. Springer Berlin Heidelberg, 2005. 86-94.

Paper Type : Research Paper
Title : Secure and Efficient Key Management Scheme in MANETs
Country : Saudi Arabia
Authors : Abu Taha Zamani, Syed Zubair
: 10.9790/0661-16211146158    logo

Abstract: InMobile ad hoc networks (MANETs) security has become a primary requirements.Thecharacteristics capabilities of MANETsexposeboth challenges and opportunities in achieving key security goals,such as confidentiality,access control,authentication, availability, integrity, and non-repudiation.Cryptographic techniques are widely used for secure communications in both TCP and UDPnetworks. Most cryptographic mechanisms, such as symmetric and asymmetric cryptography,often involve the use of cryptographic keys.

[1] Saloma, A. (1996). Public-Key Cryptography, Springer-Verlag.
[2] Tanenbaum, A. (2003). Computer Networks, PH PTR.
[3] Zhou, L. and Haas, Z. (1999). Securing Ad Hoc Networks, IEEE Network Magazine vol.13, no. 6, pp.24-30.
[4] Wu, B., Chen, J., Wu, J., and Cardei, M. (2006). A Survey on Attacks and Countermeasures in MobileAd Hoc Networks.
Wireless/Mobile Network Security, Springer. Chapter 12.
[5] Yi, S., Naldurg, P., and Kravets, R. (2002). Security Aware Ad Hoc Routing for Wireless Networks.Report No.UIUCDCS-R-2002-
2290, UIUC.
[6] Luo, H. and Lu, S. (2004). URSA: Ubiquitous and Robust Access Control for Mobile Ad HocNetworks, IEEE/ACM Transactions
on Networking. vol. 12, no. 6, pp. 1049-1063.

Researcher can also search IOSR published article contents through

IOSR Xplore