IOSR Journal of Computer Engineering (IOSR-JCE)

Mar - Apr 2014Volume 16 - Issue 2

Version 1 Version 2 Version 3 Version 4 5 6 7 8 9 10 11 12

Paper Type : Research Paper
Title : An efficient Architecture for Multiband-MIMO with LTE-Advanced Receivers for UWB Communication System
Country : India
Authors : Ahmed Qaiem, Dr. Anil Kumar , Dr. Rajeev Paulus
: 10.9790/0661-16290106    logo
Abstract: The emerging ultra wideband (UWB) system offers a great potential for the design of high speed short-range wireless communications. In order to satisfy the growing demand for higher data rates, one possible solution is to exploit both spatial and multipath diversities via the use of multiple-input multiple-output (MIMO) and proper coding techniques. In this paper, candidate architecture for LTE Advanced receiver is proposed. Based on the combination of MIMO techniques and flexible spectrum access, LTE-Advanced terminals will require the increasing of the analog front-end complexity
[1] Revision of Part 15 of the Commission's Rules Regarding Ultra-Wideband Transmission Systems, First Report and Order. Fed.Commun.Comm. Rep., FCC, Washington DC, ET-Docket 98-153.
[2] R. A. Scholtz, "Multiple access with time-hopping impulse modulation, "in Proc. MILCOM Conf., Boston, MA, Oct. 1993, pp. 447–450.
[3] M. Z. Win and R. A. Scholtz, "Impulse radio: How it works," IEEE Commun. Lett., vol. 2, no. 2, pp. 36–38, Feb. 1998.
[4] M. L.Welborn, "System considerations for ultra-wideband wireless networks, "in IEEE Radio Wireless Conf., Aug. 2001, pp. 5–8.
[5] E. Saberinia and A. H. Tewfik, "Pulsed and nonplused O

Paper Type : Research Paper
Title : Object Query Optimization through Detecting Independent Sub queries
Country : India
Authors : Mohammad Farhan, Yatin Chauhan, Mohammad Akhtar, Fayeem Khan, Poonam Pangarkar
: 10.9790/0661-16290710    logo
Abstract: Database Switching includes execution of queries on same or different machines connected in LAN with different backend without rewriting any queries. Switching between the databases reduces the work of rewriting the queries for each of the database thus saving time. User just has to select the Source DBMS and Table from that DBMS and a switch file is created on a click of a button. Now this switch file can be used in any machine (can be a remote machine) to switch data in any of the DBMS. Database GUI helps a user to do all database operations through a GUI provided with minimal knowledge of the database. Here user can do all database activities like Creating Table, Inserting Data, Joining two tables etc with minimal knowledge of queries without having the knowledge of whole database can access through GUI.
[1]. J. Plodzień, A. Kraken, "Object Query Optimization through Detecting Independent Subqueries", Information Systems, Elsevier Science, 25(8), 2000, pp. 467-490.
[2]. Michel Bleja, Krzysztof Stencel, Kazimierz Subeita, "Optimization of Object-Oriented Queries Addressing Large and Small Collections", Proc. Of the IMCSIT, 2009, ISBN 978-83-60810-22-4, Vol. 4, pp. 643-680.
[3]. K.Subieta, C.Beeri, F.Matthes, J.W.Schmidt. "A Stack-Based Approach to Query Languages". Proc.2nd East-West Database Workshop, 1994, Springer Workshops in Computing, 1995, 159-180.
[4]. Minyar Sassi, and Amel Grissa-Touzi "Contribution to the Query Optimization in the Object-Oriented Databases" World Academy of Science, Engineering and Technology 11 2005
[5]. G. Gardarin, "Object and relational databases" , Eyrolles, 1999.
[6]. R.G.G. Catell, "Object-Oriented Data Management: Object-Oriented and Extended Relational Database Sytems", Addison-Wesley Publishing, Inc., 1994.

Paper Type : Research Paper
Title : An Automated Approach for Job Scheduling and Work Flow Mining
Country : India
Authors : P. Rijisha , V. Venkatesh
: 10.9790/0661-16291115    logo
Abstract: Now a day's work allotment in a software firm become more important and cumbersome. The main objective of this concept is to reduce the work of the software developers in a software company and work allocation. Here the work will be allotted for the each person automatically by splitting the modules into tasks. When developing a big project more confusion and more discussions will occur, and some clauses will arise between modules while splitting into tasks and who the person to develop the particular task And performance evolution will not be in accurate, which confuse with the actual work allotment by the HR. So that still companies are struggling to book multiple software projects at a same time. So that still companies are yielding less works from their employees. In order to reduce these problems, implementing work flow mining, some of them are Group movement pattern, Heterogeneous project details, Ranking model adaptation SVM (RA-SVM), Domain specific search, Distributed clustering etc.
[1]. LinjunYang, Member, IEEE, Chao Xu, Xian-Sheng Hua,"Ranking Model Adaptation for Domain specific Search", IEEE Transaction on Knowledge and Data Engineering,Volume:24,Issue:4,2012.
[2]. Dik Lun Lee , Wang-Chien Lee,"PMSE: personalized mobile search engine", Browse Journals & Magazines,Knowledge and Data Engineerin, Volume:25 Issue:4, 2013.
[3]. Lam, Wai, Tsang, Ivor W. Wong, Tak-Lam, "Discovering low- rank shared concept space for adapting text mining model", Journals & Magazines, Pattern Analysis and Machine, Volume:35 Issue:6,2013.
[4]. Xi Li ; Dick, A. ; van den Hengel, A, "Boosting Object Retrieval With Group Quires", Journals & Magazines,Signal Processing Letters, Volume:19 Issue:11,2012.

Paper Type : Research Paper
Title : Highly Confidential Security Systems
Country : India
Authors : Cheruku Sandeep Kumar, Nandikonda Sindhuja, Posham Lenin Reddy
: 10.9790/0661-16291619    logo
Abstract: In todays crazy busy life style it is not very uncommon for us all to be forgetful.We often fail to remember our passwords,mail ids,pancard numbers,passport details,study certificate numbers etc..,this kind of data is confidential and at present we store them manually (i.e mobiles,sticky notes) which is very easy to lose or even hacked.The "HIGHLY CONFIDENTIAL SECURITY SYSTEM" aims at developing a web application through which user can store his confidential data in a very secured way.
[1] Cryptography and Network Security,Principles and Practices,Fourth Edition,William Stalings,PEARSON Education.
[2] The Complete Reference Java2,Third Edition,Patrick Naughton,Herbert Schildt,TATA McGraw-HILL EDITON
[3] Web Component Development With Servlet And JSP Technologies,SUN EDUCATIONAL SERVICES,SUN MICROSYSTEMS
[4] Web Programming,Building Internet Applications,Second Edition,Chris Bates,Sheffield Hallam University,WILEY INDIA
[5] w3schools.com

Paper Type : Research Paper
Title : Reducing location error in Wireless Sensor Networks
Country : India
Authors : T.Sathya PG Scholar, S.Saranya Assistant Professor
: 10.9790/0661-16292027    logo
Abstract: Localization is the basic problem in the wireless sensor networks. All the result data get wasted if the node is placed in the wrong position. Range based and Range free algorithms are used for locating the node in the wireless sensor network. But in the existing system they will use any one of the algorithm. The method CDL- combined and Differentiated Localization approach inherits the properties of both Range based and Range free algorithm. CDL provides the location accuracy efficiently but still it has location error in large scale networks. To overcome this problem the novel, geographic routing method named Conditioned Mean Square Error Ratio (CMSER) routing, intended to route packets when the localization error is occurred.
[1]. H. Kung, C. Lin, T. Lin, and D. Vlah, "Localization with snap-inducing shaped residuals (SISR): Coping with errors in measurement," in Proc. ACM MobiCom, 2009, pp. 333–344.
[2]. Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality
[3]. Jizhong Zhao, Associate Member, IEEE, Member, ACM , Wei Xi, Student ember, IEEE, ACM, Yuan He, Student Member, IEEE, Member, ACM, Yunhao Liu,Senior Member, IEEE, Xiang-Yang Li, Senior Member, IEEE, Lufeng Mo, and Zheng Yang, Student Member, IEEE, ACM
[4]. Y. Shang, W. Rumi, Y. Zhang, and M. Fromherz, "Localization from connectivity in sensor networks," IEEE Trans. Parallel Distrib. Syst.,

Paper Type : Research Paper
Title : A Novel Approach for Semi Supervised Document Clustering with Constraint Score based Feature Supervision
Country : India
Authors : S. Princiya, M. Prabakaran
: 10.9790/0661-16292834    logo
Abstract: Text document clustering provides an effective technique to manage a huge amount of retrieval outcome by grouping documents in a small number of meaningful classes. In unsupervised clustering method the unlabeled input data is used to estimate the parameter values. In a semi supervised document clustering both labeled and unlabeled input data is used for document clustering. A semi supervised clustering with feature supervision and constraint score is proposed in this paper.
[1]. R. Huang, et al., "Dirichlet Process Mixture Model for Document Clustering with Feature Partition,"2012.
[2]. M.Kalakech et al., Philippe Biela et al.,"Constraint scores for semi-supervised feature selection:A comparative study,"2011.
[3]. D. Nott, et al., "A sequential algorithm for fast fitting of Dirichlet process mixture models," arXiv preprint arXiv:1301.2897, 2013.
[4]. L. Talavera et al.,"An evaluation of filter and wrapper methods for feature selection in categorical clustering".
[5]. M.Hindawi et al., Kaïs Allab et al ., " Constraint Selection based Semi-supervised Feature Selection",2011

Paper Type : Research Paper
Title : Identifying Threats Associated With Man-In-The-Middle Attacks during Communication between a Mobile Device and the Back End Server in Mobile Banking Applications
Country : Kenya
Authors : Anthony Luvanda, Dr Stephen Kimani, Dr Micheal Kimwele
: 10.9790/0661-16293542    logo
Abstract: sometimes referred to as M-Banking, Mbanking or SMS Banking, is a term used for performing balance checks, account transactions, payments, credit applications and other banking transactions through a mobile device such as a mobile phone or Personal Digital Assistant (PDA).
[1]. 3GPP TS 33.102, ―3G security; Security architecture,‖ 3GPP, Rel-11, version11.1.0, Dec. 2012.
[2]. Abhijit S. Pandya, ErcanSen, ATM Technology for Broadband telecommunications Networks, CRC Press, 1998.
[3]. B. Adida, M. Bond, J. Clulow, A.Lin, S. Murdoch, R.J Anderson and R.Rivest. Phish and chips.In Security Protocols Workshop, 2006.
[4]. Bruce scheinier, Applied cryptography,protocols, algorithms and source code in C, John Wiley and Sons 2006.
[5]. Charles P. Pfleeger, Security in computing, Revised edition, Prentice Hall 2007.

Paper Type : Research Paper
Title : Real Time Hand Gesture Recognition for Human Machine Communication Using ARM Cortex A-8
Country : India
Authors : Vignesh. S PG Scholar, Mr.P.Saravanan
: 10.9790/0661-16294348    logo
Abstract: A novel method proposes for human machine communication using ARM Cortex A-8 processor. Gesture is a form of non-verbal communication in which visible bodily actions communicate particular messages. A novel method proposes for human-machine communication via gesture. The real time system employs a USB web camera, Beagle board XM and HDMI Monitor.
[1]. Erol A, Bebis G, Nicolescu M, et al. Vision-based hand pose estimation: A review. Computer Vision and Image Understanding, 2007, 108(1-2): 52-73. www.elsevier.com/locate/cviu.
[2]. T. F. William and D. W. Craig, "Television Control by Hand Gestures," in IEEE Intl. Workshop on Automatic Face and Gesture Recognition ,Zurich ,June 1995.
[3]. Wang F, Ngo C W, Pong T C. Simulating a smart board by real-time gesture detection in lecture videos. IEEE Transactions on Multimedia, 2008, 10(5): 926-935.
[4]. Juang C F, Chang C M, Wu J R, et al. Computer vision-based human body segmentation and posture estimation. Systems, Man and Cybernetics, Part A: Systems and Humans, IEEE Transactions on, 2009, 39(1): 119-133.
[5]. Okatani T, Deguchi K. Auto calibration of a projector camera system. Pattern Analysis and Machine Intelligence, IEEE Transactions on, 2005, 27(12): 1845-1855.

Paper Type : Research Paper
Title : Survey: Recent Modifications in Vigenere Cipher
Country : India
Authors : Ranju S Kartha#, Varghese Paul
: 10.9790/0661-16294953    logo
Abstract: In order to secure the information there are different polyalphabetic substitution ciphers are available. Out of these Vigenere cipher is considered to be most efficient and simplest one. Due to its repeating nature of the key it is also vulnerable to attacks. To overcome this, there are many researches going on to modify the conventional Vigenere Cipher. In this paper we have presented a review of recent modifications in Vigenere cipher and its cryptanalysis.
[2] Behrouz A Forouzan, "Cryptography and Network Security", Tata McGraw-Hill Publishing Company Limited, 2007.
[3] Quist-Aphetsi Kester, "A cryptosystem based on Vigenère cipher with varying key", International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 1, Issue 10, December 2012.
[4] Phillip I Wilson and Mario Garcia, "A Modified Version of the Vigenère Algorithm", IJCSNS International Journal of Computer Science and Network Security, Volume 6 No.3B, March 2006.
[5] C. R. S. Bhardwaj, "Modification of Vigenère Cipher by Random Numbers, Punctuations & Mathematical Symbols", IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 4, Issue 2, Sep.-Oct. 2012.
[6] Ravindra Babu Kallam, Dr.S. Udaya Kumar, Md Abdul Rasool, Dr. A. Vinaya Babu and Puskur Pavan, "An Enhanced Polyalphabetic Cipher using Extended Vigenere Table", International Journal of Advanced Research in Computer Science, Mar-Apr 2011.

Paper Type : Research Paper
Title : Communication via LED
Country : India
Authors : Prof. P.K. Karmore, Mr. Saurabh Dubey, Mr. Rohit Sadawarti,
Mr. Shirish Wankhede, Mr. Sachin Patil
: 10.9790/0661-16295458    logo
Abstract: This paper describes the use of light as a medium for communication between two systems. It takes out the "optics from the optical fiber". It demonstrates transmission and reception of live data between two systems that do not have any physical communication between them. It's the same idea behind infrared remote controls but far more powerful.
[1]. T. Komine and M. Nakagawa, "Integrated Systems of White LED Visible-Light Communications and Power-Line Communications", IEEE Transactions on Consumer Electronics, vol. 49, Feb. 2003.
[2]. Akassh A. Mishra and Neelesh S. Salian,"Internet using Visible Light Communication" IACSIT International Journal of Engineering and Technology, Vol. 3, No. 5, October 2011.
[3]. Yuichi T. and M. Nakagawa, "Indoor Visible Light Data Transmission System Utilizing White LEDs Lights", IEICE Trans, Commun. vol. #86-B, no. 8, Aug. 2003.
[4]. S. Iwasaki, M. Wada, T. Endo, T. Fujii and Masayuki, "Tanimoto Basic Experiments on Parallel Wireless Optical Communication for ITS," in Proc. IEEE Intelligent Vehicles Symposium Istanbul, Turkey, June 13-15, 2007.
[5]. N. Narendran and Y. Gu, "Life of LED-Based White Light Sources", IEEE/OSA Journal of Display Technology, vol. 1, no. 1, Sept. 2005.

Paper Type : Research Paper
Title : Enhancedcongestion Control In Reset Frequency Controlled Dccp_Tfrc
Country : India
Authors : Dr. B. Chellaprabha, M. Abinaya, V. Chithra, P. Gnanaprabha
: 10.9790/0661-16295963    logo
Abstract: Congestion control (CC) is one of the major issues in wireless sensor network. CC will be handled in Data link layer, Network layer and Transport layer. Among all existing transport protocols, it is proved that DCCP is performing better than all protocols compared. In DCCP, there are two congestion control identifier (CCID)-TCP_LIKE (CCID2), TCP_TFRC (CCID 3) In the proposed system, DCCP_TFRC is considered. Reset is one of the main functions in DCCP which resets all the parameters to its default values when it is invoked. Whenever the connection is to be closed for some reason the reset function is invoked.
[1]. B.Chellaprabha, Dr.S.ChenthurPandian, Dr. C. Vivekanandan, "Reset frequency controlled parameter Re-estimation method for the improvement congestion control in DCCP_TFRC".
[2]. B.Chellaprabha, Dr.S.ChenthurPandian, Dr. C. Vivekanandan, "Performance of TCP, UDP and SCTP on Sensor Network with Different Data Reporting Intervals", IOSR Journal of Engineering, Apr. 2012, Vol. 2(4) pp: 621-628
[3]. B.Chellaprabha, Dr.S.ChenthurPandian, Dr. C. Vivekanandan, "Performance of Datagram Congestion Control Protocol DCCP-TCPLike and DCCP-TFRC on Sensor Network", IRACST – International Journal of Computer Networks and Wireless Communications (IJCNWC), ISSN: 2250-3501, Vol.2, No.2, April 2012.

Paper Type : Research Paper
Title : Palm Vein Extraction and Matching For Personal Identification
Country : India
Authors : Mr. Vishal U. Bhosale, Mr. Onkar S. Kale, Mr. Mahesh W. Pawar,
Mr. Roshan R. Patil, Mr. Pritam S. Patil, Prof Mrs. Sonali Madankar
: 10.9790/0661-16296468    logo
Abstract: The most common method used for authentication is Textual passwords. But Textual passwords are in risk to eves dropping, dictionary attacks, social engineering and shoulder surfing. Biometric passwords are introduced as alternative techniques to textual passwords. Biometrics is used for human recognition which consists of authentication, verification and recognition. A CCD camera will capture the image and this image will process through various algorithms. In future this image will be compared for personal authentication. In this paper, three algorithms are proposed to extract the images taken by CCD camera.
[1]. Debnath Bhattacharya, Poulami Das, Taihoon Kim, Samir Bandopadhyay, "Vascular Pattern Analysis towards Pervasive Palm Vein Authentication", Journal of Universal Computer Science, vol. 15, no. 5 (2009),
[2]. Yingbo Zhou, Ajay Kumar, Senior member of IEEE, "Human identification using palm vein images", IEEE transactions on information forensics and security ,vol. 6, no. 4 (2011)
[3]. Mona A. Ahmed, Hala M. Ebid, El-Sayed M. Horbaty, Abdel-Badeeh M. Salem, Ain Shams University, Cairo, Egypt,"Analysis of palm vein pattern recognition algorithms and systems, International Journal of biomedical informatics and e-health, vol. 1, no 1 (2013).
[4]. Hassan Soliman, Abdelnasser Saber Mohamed and Ahmed Atwan, Feature Level Fusion of Palm Veins and Signature Biometrics , International Journal of Video & Image Processing and Network Security IJVIPNS-IJENS Vol: 12 No: 01, pp.28-39, 2012.
[5]. Yingbo Zhou and Ajay Kumar,"Contactless Palm Vein Identification using Multiple Representations", in 4th IEEE international conference on biometrics: Theory applications and systems (BTAS), pp. 1-6, September 2010.

Paper Type : Research Paper
Title : A software tool that provides relevant information for diabetic patients to help prevent diabetic foot
Country : India
Authors : Shebin S, Mallikarjunaswamy S
: 10.9790/0661-16296973    logo
Abstract: This project proposes a tool which can be very useful for diabetic patients for preventing diabetic foot. 347 million people worldwide have diabetes and 15% of them have the chance of developing diabetic foot. This can result in Amputation of limbs. This can be prevented by educating patients about the dangers of developing diabetic foot. The software provides the patients with suggestions for their current condition.
[1]. K. Mohammed Ali, S. Shah, N. Tandon, "Review of Electronic Decision-Support Tools for Diabetes Care: A Viable Option for Low- and Middle-Income Countries".
[2]. T. D. Sequist, T.K. Gandhi, A.S. Karson, J.M. Fiskio, D. Bugbee, M. Sperling, E.F. Cook, E.J. Orav, D.G, Fairchild, D.W. Bates, "A randomized trial of electronic clinical reminders to improve quality of care for diabetes and coronary artery disease".
[3]. Meigs JB, Cagliero E, Dubey A, Murphy-Sheehy P, Gildesgame C, Chueh H, Barry MJ, Singer DE, Nathan DM, "A controlled trial of web-based diabetes disease management: the MGH diabetes primary care improvement project", Diabetes Care. 2003;26(3), pp.750–757.
[4]. K.P. McCarrier, J.D. Ralston, I.B. Hirsch, G. Lewis, D.P. Martin, F.J. Zimmerman, H.I. Goldberg "Web-based collaborative care for type 1 diabetes: a pilot randomized trial. "2009;11(4),pp.211–217.

Paper Type : Research Paper
Title : A Multi-Relational Decision Tree Learning (MRDTL) Approach: A Survey
Country : India
Authors : Patel Rinkal , Rajanikanth Aluvalu
: 10.9790/0661-16297481    logo
Abstract: Data Mining is the process of extracting useful knowledge from large set of data. There are number of data mining techniques available to find hidden knowledge from huge set of Data. Among these techniques classification is one of the techniques to predict the class label for unknown data based on previously known class labeled dataset. Several classification techniques like decision tree induction, Naivy Bayes model, rough set approach, fuzzy set theory and neural network are used for pattern extraction.
[1] Jing-Feng Guo, Jing Li and Wei-Feng Bian," An Efficient Relational Decision Tree Classification Algorithm", College of Information Science and Engineering, Anshan University, China..
[2] Xiaoxin Yin, Jiawei Han and Jiong Yang," Efficient Multi-relational Classification by Tuple ID Propagation", Department of Computer Science University of Illinois at Urbana-Champaign.
[3] Arno J. Knobbe, Arno Siebes, Daniël van derWallen," Multi-Relational Decision Tree Induction", 3821 AE Amersfoort the Netherlands.
[4] Hongyu Guo, Herna L. Viktor," Multirelational Classification: A Multiple View Approach", School of Information Technology and Engineering, University of Ottawa, Ontario, Canada, Jan 19, 2008.
[5] Anna Atramentov," Multi-relational decision tree algorithm -implementation and experiments", Graduate College Iowa State University, 2003.

Paper Type : Research Paper
Title : lntrusion Detection System Using GA
Country : India
Authors : Ms.Lata Jadhav, Prof.C.M.Gaikwad
: 10.9790/0661-16298284    logo
Abstract: Intrusion detection has become an essential component of computer security in recent years so many technologies have been developed to protect our system or network from intruders such as antivirus, firewalls etc. so this paper describes the brief overview of Intrusion detection, genetic algorithm and related detection techniques.
[1] W. Li, "A Genetic Algorithm Approach to Network Intrusion Detection", SANS Institute, USA, 2004.
[2] Li, Wei. 2002. "The integration of security sensors into the Intelligent Intrusion Detection System (IIDS) in a cluster environment." Master's Project Report. Department of Computer Science, Mississippi State University.
[3] MIT Lincoln Laboratory, DARPA datasets, MIT,USA, in November r 2004). http://www.ll.mit.edu/IST/ideval/data/data_index.html(accessed
[4] Base ,Rebecca:An introduction to Intrusion Detection & Assessment.Infidel Inc.prepared for ICAS Inc.Copyright 1998.
[5] Base ,Rebecca Gurley:IntroductionDetection Copyright 2000 by Macmillan Tchnical Publishing ISBN 1-57870-185-6.

Paper Type : Research Paper
Title : An Assessment of Risk Management Strategies for Financial Information Systems by Financial Institutions in Kenya
Country : Kenya
Authors : Ann Kibe1* Prof Waweru Mwangi, Dr Stephen Kimani
: 10.9790/0661-16298598    logo
Abstract: In the process of risk analysis for information systems, models are built in order to analyze and better understand the risk factors and their causal relationships in real-world information systems. Establishing an appropriate model suitable for the target risk problem is a crucial task that will ultimately influence the effectiveness of risk analysis results. In the existing literature, most the approaches either assumed that the structure of the model was provided by domain expert experience and knowledge, or assumed that the structure was chosen from some general well-known class of model structures, thus, the results of risk analysis were relatively subjective.
[1]. Bryman, A. and Bell, E. (2007), Business Research Methods, 2nd edition, Oxford UniversityPress.
[2]. Cooper, D.R., & Schindler, P.S., (2008), Business Research Methods 8th edition,McGraw-Hill Companies, Inc.85
[3]. Creswell, J.W., (2008), Research Design: Qualitative, Quantitative and Mixed Methods Approach, Second Edition, Sage Publication, Inc.
[4]. Creswell, J.W. (2010).Research Design: Qualitative and Quantitative Approaches, Thousand Oaks, CA: Sage Publications.
[5]. Creswell, J.W. and Clark V.L. (2007). Designing and Conducting Mixed Methods Research, Thousand Oaks, CA: Sage Publications

Paper Type : Research Paper
Title : Dendritic Cell Algorithm and Dempster Belief Theory Based Approach for Intrusion Detection System
Country : India
Authors : Mr. Ved Prakash Sharma, Dr. Rajdev Tiwari, Mr. Rajesh KumarVarun
: 10.9790/0661-162999103    logo
Abstract:Everyone knows the services of the Internet. Internet services contain large scale of data. Security is one of the important issues during transmission of data over the network. To avoid misuse of data an efficient Network Intrusion Detection Systems (NIDS) is needed. To predict intrusion over the network a combined features of Dendritic Cell Algorithm (DCA) and Dempster Belief Theory (DBT) has been used called hybrid model of DCA and DBT. This algorithmic approach comes under the Artificial Immune Detection System. The presented system is about to analyze the network statistics under different parameters and identify the False Negative Rate and the Uncertainty Parameters.
[1]. T.Subbulakshmi," Detection of DDoS Attacks using Enhanced Support Vector Machines with Real Time Generated Dataset", IEEE-ICoAC 2011 978-1-4673-0671-3/11©2011 IEEE.
[2]. Marinova-Boncheva," Applying a Data Mining Method for Intrusion Detection", International Conference on Computer Systems and Technologies - CompSysTech'07.
[3]. Neelam Sharma," Layered Approach for Intrusion Detection Using Naive Bayes Classifier", ICACCI'12, August 3-5, 2012, Chennai, T Nadu, India. ACM 978-1-4503-1196-0/12/08.
[4]. C.I. Ezeife," NeuDetect: A Neural Network Data Mining Wireless Network Intrusion Detection System", IDEAS10 2010, August 16-18, Montreal, QC [Canada]; Editor: Bipin C. DESAI; ACM 978-1-60558-900-8/10/08.
[5]. Wenke Lee," Mining in a Data-flow Environment: Experience in Network Intrusion Detection", KDD-99 San Diego CA USA 1999 l-581 13-143-7/99/08.

Paper Type : Research Paper
Title : Peer to Peer (P2P) Social Networks: An Improvement on Availability in a Trusted Way
Country : Bangladesh
Authors : Muhammed Tawfiqul Islam, Sabbir Ahmed, Kazi Chandrima Rahman,
Dr. Syed Faisal hasan
: 10.9790/0661-1629104114    logo
Abstract: Online Social Networks (OSNs) provide the easiest way to stay connected to the people dear and important to us. People are using social networking sites for sending messages, sharing files and expressing their thoughts to others. Popular social networking sites like Facebook, MySpace are web based. Users register with their services and agree to provide their private data to the OSN providers. OSN providers use centralized server. User data can be shared and updated easily in this fashion. But OSN providers give users a limited control over their data.
[1] Tanenbaum, Andrew S.; Steen, Maarten V.: Distributed Systems: Principles and Paradigms. Upper Saddle River, NJ, USA: Prentice Hall PTR, 2002. – ISBN 0130888931.
[2] http://end.wikipedia.org/wiki/Distributed_hash_table.
[3] Kubiatowicz, John ; Bindel, David ; Chen, Yan ; Czerwinski, Steven ; Eaton, Patrick ; Geels, Dennis ; Gummadi, Ramakrishna ; Rhea, Sean ; Weatherspoon, Hakim ; Wells, Chris ; Zhao, Ben: OceanStore: An architecture for global-scale persistent storage. In: SIGARCH Comput. Archit. News 28 (2000), Nr. 5, S. 190–201. http://dx.doi.org/http://doi.acm.org/10.1145/378995.379239.
[4] Muthitacharoen, Athicha ; Morris, Robert ; Gil, Thomer M. ; Chen, Benjie: Ivy: a read/write peer-to-peer file system. In: SIGOPS Oper. Syst. Rev. 36 (2002), Nr. SI, 31-44. http://dx.doi.org/http://dx.doi.org/10.1145/844128.844132.
[5] Dabek, Frank; Kaashoek, M. F.; Karger, David; Morris, Robert; Stoica, Ion: Wide-area cooperative storage with CFS. In: SOSP '01: Proceedings of the eighteenth ACM, 2001. – ISBN 1–58113–389–8, S. 202–215.

Paper Type : Research Paper
Title : A System for Task Scheduling and Task Migration in Cloud Environment
Country : India
Authors : Haimantee Mahato, Anjali Munjal, Shreya Chinchalikar
: 10.9790/0661-1629115118    logo
Abstract: Large scale data processing is increasingly common in cloud computing systems in recent years. In these systems, files are split into many small blocks and all blocks are replicated over several servers. To process files efficiently, each job is divided into many tasks and each task is allocated to a server to deals with a file block. If the current server is busy, then it migrates the small block of task to another free server.
[1] J. Dean and S. Ghemawat, "MapReduce: simplified data processing on large clusters," Commun. ACM, vol. 51,no. 1, pp. 107–113, 2008.
[2] M. Isardet al., "Dryad: distributed data-parallel programs from sequential building blocks," in EuroSys '07. NewYork, NY, USA: ACM, 2007, pp. 59–72.
[3] S. Ghemawat et al., "The google file system," in SOSP '03. New York, NY, USA: ACM, 2003, pp. 29–43.
[4] T. White, Hadoop: The Definitive Guide, 1st ed. O'Reilly Media, Inc., 2009.
[5] Michael L. Pinedo. Scheduling: Theory, Algorithms, and Systems (3rd Ed). Springer, 2008

Paper Type : Research Paper
Title : Smart Combined Video Tool
Country : India
Authors : Mrunalini Sinnarkar, Vidya Shinde, Sayli Sonje, Shweta Shinde
: 10.9790/0661-1629119123    logo
Abstract: [1] Fehmi Chebil, Member, IEEE, Ragip Kurceren, Member, IEEE, Asad Islam, Member, IEEE and Udit Budhia" Compressed Domain Editing of H.263 and MPEG-4 Videos" May 2005. [2] Kai Wang and John W.Woods, "Compressed Domain Mpeg-2 Video Editing", IEEE International Conference on Multimedia and Expo (I), 2000. [3] A.Girgensohn, et al., "A semi-automatic approach to home video editing", Proc. of UIST '00, ACM Press, pp. 81-89, 2000. [4] Ranjan Parekh "Principles of Multimedia". [5] http://www.chiariglione.org/mpeg/standards/mpeg4/mpeg.html [6] Compressed-Domain Video Processing for Adaptation, Encryption, and Authentication Razib Iqbal, Shervin Shirmohammadi, Abdulmotaleb El Saddik, and Jiying Zhao University of Ottawa
[1]. Bryman, A. and Bell, E. (2007), Business Research Methods, 2nd edition, Oxford UniversityPress.
[2]. Cooper, D.R., & Schindler, P.S., (2008), Business Research Methods 8th edition,McGraw-Hill Companies, Inc.85
[3]. Creswell, J.W., (2008), Research Design: Qualitative, Quantitative and Mixed Methods Approach, Second Edition, Sage Publication, Inc.
[4]. Creswell, J.W. (2010).Research Design: Qualitative and Quantitative Approaches, Thousand Oaks, CA: Sage Publications.
[5]. Creswell, J.W. and Clark V.L. (2007). Designing and Conducting Mixed Methods Research, Thousand Oaks, CA: Sage Publications

Paper Type : Research Paper
Title : Image Based Authentication for Folder Security using Persuasive Cued Click-Points and SHA
Country : India
Authors : Suraj Hande, Nitin Dighade , Ruchal Bhusari, Mrunali Shende, Prof. Heena Agrawal
: 10.9790/0661-1629124128    logo
Abstract: In this paper Image Based Authentication application is applied on folder's (folders that are confidential to user) ,since the studies till date have shown that textual passwords are more prone that they are well hacked by hackers through easily available software's or programming different code to hack the password.
[1]. P. C. van Oorschot, A. Salehi-Abari, and J. Thorpe. Purely automated attacks on passpoints-style graphical password. IEEEE Trans. Info. Forensics and security, vol. 5, no. 3, pp. 393-405, 2011
[2]. K. Golofit. Click password under investigation. 12th European Symposium On Research In Computer Security, LNCS 4734, Sept 2007.
[3]. S. Chiasson, A. Forget, R. Biddle, and P. C. van Oorschot. User interface design affects security: Patterns in click-based graphical passwords. International Journal of Information Security, Springer, 8(6):387-398, 2009
[4]. S.Chiasson, A. Forget, and R. Biddle. Graphical password authentication using cued click points. Symposium On Research in Computer Security (ESORICS), LNCS 4734, September 2007, pp. 359-374.

Paper Type : Research Paper
Title : Social Interaction Feature for Mobile TV Services Based On Cloud Move
Country : India
Authors : Sakitha V, Sarasvathi V ME
: 10.9790/0661-1629129137    logo
Abstract: The rapidly increasing power of personal mobile devices (smartphones, tablets, etc.) is providing much richer contents and social interactions to users on the move. This trend however is throttled by the limited battery lifetime of mobile devices and unstable wireless connectivity, making the highest possible quality of service experienced by mobile users not feasible.
[1] M. Satyanarayanan, P. Bahl, R. Caceres, and N. Davies, ―The case for VM-based Cloudlets in mobile computing,‖ IEEE Pervasive Comput., vol. 8, pp. 14–23, 2009.
[2] S. Kosta, A. Aucinas, P. Hui, R. Mortier, and X. Zhang, ―Thinkair: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading,‖ in Proc. IEEE INFOCOM, 2012.
[3] Z. Huang, C. Mei, L. E. Li, and T. Woo, ―Cloud stream: Delivering high-quality streaming videos through a cloud-based SVC proxy,‖ in Proc. INFOCOM'11, 2011, pp. 201–205.
[4] T. Coppens, L. Trappeniners, and M. Godon, ―AmigoTV: Towards a social TV experience,‖ in Proc. EuroITV, 2004.

Paper Type : Research Paper
Title : Building a Diabetes Data Warehouse to Support Decision making in healthcare industry
Country : Nigeria
Authors : Abubakar Ado, Ahmed Aliyu, Saifullahi Aminu Bello, Abdulra'uf Garba Sharifai Abubakar Sulaiman Gezawa
: 10.9790/0661-1629138143    logo
Abstract: data warehousing did not find its way easily and readily into healthcare and medicine, not like others financial institutions, Healthcare presents unique challenges for the architect of a data warehouse and the information needs for Health data warehouse were fundamentally different and complicated. When it come to health care, data warehousing is completely stagnant and still there is a need for data warehouse in healthcare. This paper presents a proposed architecture for Health care data warehouse for Diabetes diseases which could be use to monitor Diabetes disease, measure cost of infections and to detect prescription errors in addition it can also be used by healthcare executive managers, doctors, physicians and other health professionals to support the capture, healthcare process and analysis of data, and offer the potential of radically altering the practice and delivery of healthcare and medical research.
[1]. KFF. (2006). ―Comparing Projected Growth in Health Care Expenditures and the Economy‖, Snapshots: Health Care Costs Retrieved 22.10.2007, from http://www.kff.org/insurance/snapshot/chcm050206oth2.cfm
[2]. Dr.Osama E.Sheta and Ahmed Nour Eldeen, BUILDING A HEALTH CARE DATA WAREHOUSE FOR CANCER DISEASES, International Journal of Database Management Systems ( IJDMS ) Vol.4, No.5, October 2012
[3]. [3] Dr. Osama E.Sheta and Ahmed Nour Eldeen, THE TECHNOLOGY OF USING A DATA WAREHOUSE TO SUPPORT DECISION-MAKING IN HEALTH CARE, International Journal of Database Management Systems ( IJDMS ) Vol.5, No.3, June 2013.
[4]. Marleen de Mul, Peter Alons, Peter van der Velde, Ilse Konings, Jan Bakker, Jan Hazelzet, (2010) Development of a clinical data warehouse from an intensive care clinical information system CMPB, 2010.07.002 .

Paper Type : Research Paper
Title : Cloud Computing: Environment of Next Generation Technology
Country : India
Authors : Rajan Kumar Yadav, Avinash Thakur, Manoranjan Kumar
: 10.9790/0661-1629144148    logo
Abstract: Cloud computing is the convergence of virtualization, Distributed Applications, Grid, Maturity of enterprise software application and enterprise IT Management. It is a tremendously attractive technology as it enables a fundamental shift from capital intensive focus to a flexible operational management model. Basically it is characterized by on demand computing, based on pay per use pricing model. This technology enables the user to use the system without the need to know the physical location and configuration of the system that delivers the services. At the same time it also offers participation of less manpower and zero maintenance of the services.
[1]. Mihai Tudor, ICT Cloud Computing, Cisco Expo, Bucharest, April 2013
[2]. Fang Liu, Jin Tong, Jian Mao, Robert Bohn, John Messina, Lee Badger and Dawn Leaf, NIST Cloud Computing Reference Architecture, NIST Special Publication 500-292, NIST SP 500-292
[3]. Zoran Pantić and Muhammad Ali Babar, Guidelines for Building a private Cloud Infrastructure, Tech Report TR-2012-153, ISBN: 978-87-7949-254-7,IT University of Copenhagen, Denmark, 2012
[4]. Penny Pritzker , NIST Cloud Computing Standards Roadmap, NIST Special Publication 500-291, Version 2, July 2013
[5]. Nelson Gonzalez, Charles Miers, Fernando Red´ıgolo, Marcos Simpl´ıcio, Tereza Carvalho, Mats N¨aslund and Makan Pourzandi, A quantitative analysis of current security concerns and solutions for cloud computing, Gonzalez et al. Journal of Cloud Computing: Advances, Systems and Applications 2012, 1:11

Paper Type : Research Paper
Title : Efficient Data Gathering Mechanism using Mobile Collector in Wireless Sensor Networks
Country : India
Authors : Mr.Shanmugapriyan.R, Mr.Sivasakthivel.A
: 10.9790/0661-1629149154    logo
Abstract: In this paper, we proposed a new data-gathering mechanism for large-scale wireless sensor networks by introducing mobility into the network. A mobile data collector, for convenience called an M-collector in this paper, could be a mobile robot or a vehicle equipped with a powerful transceiver and battery, working like a mobile base station and gathering data while moving through the field. An M-collector starts the data-gathering tour periodically from the static data sink, polls each sensor while traversing its transmission range, then directly collects data from the sensor in single-hop communications, and finally transports the data to the static sink.
[1] R. C. Shah, S. Roy, S. Jain, and W. Brunette, "Data MULEs: Modeling a three-tier architecture for sparse sensor networks," in Proc. IEEE WorkshopSens. Netw. Protocols Appl., 2003.
[2] A. A. Somasundara, A. Ramamoorthy, and M. B. Srivastava, "Mobile element scheduling for efficient data collection in wireless sensor networks with dynamic deadlines," in Proc. IEEE RTSS, Dec. 2004, pp. 296–305.
[3] S. Jain, R. C. Shah, W. Brunette, G. Borriello, and S. Roy, Exploiting mobility for energy efficient data collection in wireless sensor networks. Norwell, MA: Kluwer, 2005.
[4] D. Jea, A. A. Somasundara, and M. B. Srivastava, "Multiple controlled mobile elements (data mules) for data collection in sensor networks," in Proc. IEEE/ACM Int. Conf. DCOSS, Jun. 2005, pp. 244–257.
[5] M. Ma and Y. Yang, "Data gathering in wireless sensor networks with mobile collectors," in Proc. 22nd IEEE Intern.Parallel Distrib.Symp.,Miami, FL, Apr. 2008, pp. 1–9.

Paper Type : Research Paper
Title : An Improved Novel Steganographic Technique For RGB And YCbCr Colorspace
Country : India
Authors : Shweta Maurya, Vishal Shrivastava
: 10.9790/0661-1629155157    logo
Abstract: Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exists a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points. Different applications have different requirements of the steganography technique used. For example, some applications may require absolute invisibility of the secret information, while others require a larger secret message to be hidden. This paper intends to give an overview of image steganography, its uses and techniques. It also attempts to identify the requirementsof a good steganographic algorithm and briefly reflects on which steganographic techniques are moresuitable for which applications.
[1] Feng, J.B., Lin, I.C., Tsai, C.S., Chu, Y.P., 2006. Reversible watermarking: current status and key issues. International Journal of Network Security 2 (May), 161–170.
[2] C. Cachin, "An Information-Theoretic Model for Steganography", Proceedings of 2nd Workshops on Information Hiding, MIT Laboratory for Computer Science, May 1998
[3] Smriti Kumar, AyushSwarnkar, "Colorization of Gray Scale Images in lαß Color Space using Mean and Standard Deviation" IEEESCEECS 2012, MANIT, Bhopal (India), IEEE Conference Publications, March 2012.
[4] Welsh, T., Ashikhmin, M. and Mueller, K., "Transferring color to grey scale images", In: Proceedings of 29th Annual Conferenceon Computer Graphics and Interactive Techniques, ACM-SIGGRAPH2002, pp. 277- 280, ACM Press, New York, USA, 2002.
[5] DeepeshRawat and VijayaBhandari "A Steganography Technique for Hiding Image in an Image using LSB Method for 24 Bit Color Image‟,International Journal of Computer Applications (0975 – 8887) Volume 64– No.20, February 2013

Researcher can also search IOSR published article contents through

IOSR Xplore