IOSR Journal of Computer Engineering (IOSR-JCE)

May - June 2014Volume 16 - Issue 3

Version 1 Version 2 Version 3 Version 4 Version 5 6 7 8 9

Paper Type : Research Paper
Title : Selective Encryption of Plaintext Using Multiple Indexing
Country : India
Authors : Soumya Balachandran , Sangeeta Sharma
: 10.9790/0661-16340105  logo
Abstract: Selective Encryption is one of the encryption algorithm in the field of multimedia security. They are used for the purpose of hiding image, video or audio files. The main feature of selective encryption is that the resource and time taken to encrypt the files is lower than any other encryption algorithm. We propose an algorithm that will exploit this feature of selective encryption to encrypt plaintext instead of multimedia file. Our purpose is to design an encryption algorithm that will be computationally faster than any hard encryption algorithm such as Advanced Encryption Standard (AES) while providing the basic cipher complexity.
Keywords: Advanced Encryption Standard; Cipher Complexity; Linear Congruential Theorem; Prime Number indexing; Pythagorean Theorem; Selective Encryption

[1] W. Zeng, J. Wen, M. Severa , Format-compliant selective scrambling for multimedia access control, Proc. of the International Conference on Information Technology: Coding and Computing, 2002 , p. 77.
[2] Marc Van Droogenbroeck and Raphaël Benedett, Techniques for a Selective Encryption of Uncompressed and Compressed images, Proc. of Advanced Concepts for Intelligent Vision Systems, September 9-11, 2002

[3] A Massoudi, F Lefebvre, C De Vleeschouwer, B Macq and J-J Quisquater , Overview on Selective Encryption of Image and Video: Challenges and Perspectives, EURASIP Journal on Information Security,Vol.2008,Article id.17929, 2008
[4] Stallings,William, Cryptography and Network Security: Principles and Practice( Pearson, 5th Edition,2006, p. 226).


Paper Type : Research Paper
Title : Health Diagnosis Using Wban Technology
Country : India
Authors : G. Swaapnika, Dr. N. Chandra Sekhar Reddy, SVS. Hanumanth Rao , I.Surya Prabha
: 10.9790/0661-16340609  logo
Abstract: Invention of the low power consuming wireless sensors are raising the emergence for the usage of wireless body area networks (WBAN).WBAN is widely used in many applications such as entertainment, gaming, army etc this is widely used for active applications as it provides instant monitoring .So, this is very useful for healthcare sensing which provides effective monitoring with the help of tiny sensors. In, this paper we discuss about the architecture of health monitoring system using WBAN, how to overcome the path attenuation, devices used in this WBAN, body sensor network and security.
Keywords: WBAN, Health monitoring system (HMS) , Path Attenuation , Body sensor network, security

[1] Joonyoung Jung, et al.,"Wireless Body Area Network in a Ubiquitous Healthcare System for Physiological Signal Monitoring and Health consulting", International Journal of Signal Processing, Image Processing and Pattern Recognition, 2008.
[2] Emil Jovanov, et al., "Body Area Networks for Ubiuitous Healthcare Applications: Opportunities and Challenges", J Med Syst(2011) 35:1245- 1254, 2011.
[3] P. S. Hall, et al., "Antennas and Propagation for On-Body Communication Systems", IEEE Magazine on Antennas and Propagation. vol. 49 (3), pp. 41-58, 2007.
[4] Ulla, S., et al., "A Review of Wireless Body Area Networks (WBANs) for Medical Applications", International Journal of Communications, Network and System Sciences (IJCNS), Vol. 2,No. 8, pp797-803. 2009.
[5] Wan-Young Chung, et al., "A Wireless Sensor Network Compatible Wearable U-healthcare Monitoring System Using Integrated ECG, Accelerometer and SpO2", 30th Annual International IEEE EMBS Conference vancouver, British Columbia, Canada, August 20-24, 2008.


Paper Type : Research Paper
Title : Grid Computing- An Emerging Technology that enables large-scale resource sharing
Country : India
Authors : Prof. R. S. Kamble , Prof. Mrs. D. A. Nikam
: 10.9790/0661-16341019  logo
Abstract: In the last few years there has been a rapid exponential increase in computer processing power, data storage and communication. But still there are many complex and computation intensive problems, which cannot be solved by supercomputers. These problems can only be met with a vast variety of heterogeneous resources. The increased use and popularity of the Internet and the availability of high-speed networks have gradually changed the way we do computing. These technologies have enabled the cooperative use of a wide variety of geographically distributed resources as a single more powerful computer. This new method of pooling resources for solving large-scale problems is called as grid computing. Grid computing is a form of distributed computing in which an organization (business, university, etc.) uses its existing computers (desktop and/or cluster nodes) to handle its own long-running computational tasks. Grid computing combines computers from multiple administrative domains to reach a common goal, to solve a single task, and may then disappear just as quickly. Grid computing is managed by Global Grid Forum (GGF). Grid includes various protocols, topologies, standards and layers for implementing grid related applications. This paper describes the concepts underlying grid computing.
Keywords: CPU scavenging, Open Grid Forum (OGF), Object Management Group (OMG), Sensor grid, Supercomputers.

[1]. "SETI@Home Credit overview". BOINC. Retrieved April 21, 2010.
[2]. "A Gentle Introduction to Grid Computing and Technologies" (PDF). Retrieved May 6, 2005.
[3]. Hingne, V.; Joshi, A.; Houstis, E.; Michopoulos, J. On the Grid and Sensor Networks. In Proc. Of International Workshop on Grid Computing. Pages 166-173. Nov. 2003.
[4]. H.B. Lim, et al. Sensor Grid: Integration of Wireless Sensor Networks and the Grid, In Proc. of the IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05), October 2005.
[5]. GGF, http://www.ggf.org.


Paper Type : Research Paper
Title : Video Object Tracking Mechanism
Country : India
Authors : R. Sathya Bharathi
: 10.9790/0661-16342026  logo
Abstract: The video object mechanism is based on the appearance representation of the object. Tracking objects in a video has applications in video surveillance and other some applications. In previous method does not handle the case of full occlusion. The case of full occlusion can be handled by setting an LSK similarity threshold, which stops tracking when the object is lost. The objects can be tracked based on the compression domain and pixel domain. The spatial information of the object that is being tracked is retrieved using Local Steering Kernels. The Color features are extracted using color histograms. The features similarities between a candidate object ROI and the object ROI in the previous frame and the last stored object instance in the object model are measured. For extracting the foreground extended Kalman filter is used. This increases the tracking efficiency of the algorithm.
Index Terms: Color histograms, localsteeringkernels, and visualobjecttracking

[1]. A. Cavallaro, O. Steiger, and T. Ebrahimi, ―Tracking video objects in cluttered background,‖ IEEE Trans. Circuits Syst. Video Technol., vol. 15, no. 4, pp. 575–584, Apr. 2005.
[2]. D. Roller, K. Daniilidis, and H. H. Nagel, ―Model-based object tracking in monocular image sequences of road traffic scenes,‖ Int. J. Comput. Vision, vol. 10, pp. 257–281, Mar. 1993.
[3]. C. Yang, R. Duraiswami, and L. Davis, ―Efficient mean-shift tracking via a new similarity measure,‖ in Proc. IEEE Comput. Soc. Conf. Comput. Vision Pattern Recogn., vol. 1, Jun. 2005, pp. 176–183.
[4] A. Yilmaz, X. Li, and M. Shah, ―Contour-based object tracking with occlusion handling in video acquired using mobile cameras,‖ IEEE Trans. Pattern Anal. Mach. Intell., vol. 26, no. 11, pp. 1531–1536, Nov.2004.
[5] Y. Wang and O. Lee, ―Active mesh—a feature seeking and tracking image sequence representation scheme,‖ IEEE Trans. Image Process., vol. 3, no. 5, pp. 610–624, Sep. 1994


Paper Type : Research Paper
Title : The Application of Model Predictive Control (MPC) to Fast Systems such as Autonomous Ground Vehicles (AGV)
Country : Nigeria
Authors : Solomon Sunday Oyelere
: 10.9790/0661-16342737  logo
Abstract: This paper investigates the application of Model Predictive Control (MPC) to fast systems such as Autonomous Ground Vehicles (AGV) or mobile robots. The control of Autonomous ground vehicles (AGV) is challenging because of nonholonomic constraints, uncertainties, speed, accuracy of controls and the vehicle's terrain of operation. Two nonlinear models: a car-like model and a bicycle model are considered. A Nonlinear MPC (NMPC) was developed. A trajectory tracking performance index for both models was studied. After thorough and extensive simulation, it is observed that both models are applicable in the context of NMPC and the constraints on model variables were adequately respected. The trajectories were successfully tracked and thus clearly indicate the efficiency and effectiveness of the MPC technique. In order to improve on speed and reduce the computational effort required for the optimization problem, a Linear MPC (LMPC) was implemented with both models. This is possible by successive linearization along the reference trajectory and formulating a quadratic optimization problem which is solved by implementing an interior-point quadratic programming algorithm. For both AGV models, analysis concerning the reduced computational efforts is presented in order to show the viability of LMPC technique developed.
Keywords: Model predictive control, Autonomous Ground Vehicle, Optimization, Interior-point Quadratic Programming.

[1] L. Cunjia, C. Wen-Hua, and J. Andrews. Optimisation based control framework for autonomous vehicles: Algorithm and experiment. In Mechatronics and Automation, pp. 1030-1035, 2010.
[2] T. Keviczky, P. Falcone, F. Borrelli, J. Asgari, and D. Hrovat. Predictive control approach to autonomous vehicle steering. In American Control Conference, 2006.
[3] J. A. Rossiter. Model-Based Predictive Control: A practical approach (CRC Press, 2003).
[4] J. M. Maciejowski. Predictive Control with Constraints(Pearson Education Limited,2002).
[5] E. F. Camacho and C. Bordons. Model Predictive Control (Springer-Verlag, 2nded. 2004).
[6] C. Bordons, E. F. Camacho. Model Predictive Control. Advanced Textbooks in Control and Signal Processing (Springer-Verlag, London, 1999)..


Paper Type : Research Paper
Title : Regression Test Case Selection &PrioritizationUsing Dependence Graph and Genetic Algorithm
Country : Malaysia
Authors : Samaila Musa , Abu Bakar M. d. Sultan , Abdul Azim Abd Ghani, Salmi Baharom
: 10.9790/0661-16343847  logo
Abstract: Regression testing is very important process in software maintenance. Unfortunately, it iscostly and time consumingto allow for the re-execution of all test cases during regression testing. The challenge in regression testing is the selection of best test cases from the existing test suite.This paper presents an evolutionary regression test case prioritization for object-oriented software based on extended system dependence graph model of the affected program using genetic algorithm. The approach is based on optimization of selected test case from dependency analysis of the source codes. The goal is to identify changes in a method's body due to data dependence, control dependence and dependent due to object relation such as inheritance and polymorphism, select the test cases based on affected statements and ordered them based on their fitness by using GA.The number of affected statements determined how fit a test case is good for regression testing. A case study is reported to provide evidence of the feasibility of the approach and its benefits in increasing the rate of fault detection and reduction in regression testing effort compared with retest-all. It was shown that our approach needs 30% of the test cases to cover all the faults, while 80% is needed to cover all the faults using retest-all, which is time consuming and costly.
Keywords: Evolutionary algorithm, genetic algorithm, regression testing, regression test case, regression test case prioritization, system dependence graph.

[1] S. P. Roger, Software engineering: A practitioner's approach (Fifth Edition. McGraw-Hill Publisher, New York, America, 2001).
[2] G. Rothermel and M. Harrold, Selecting regression tests for object-oriented software, International Conference on Software Maintenance, Victoria, CA, September 1994, 14–25.
[3] G. Rothermel, , M.J. Harrold, A safe, efficient regression test selection technique, ACM Transactions on Software Engineering Methodology, 6(2), 1997, 173–210.
[4] A. Orso, N. Shi, and M. Harrold. Scaling regression testing to large software systems,ACM SIGSOFT, Twelfth International Symposium on Foundations of Software Engineering, 29(6), 2004, 241–251.
[5] J. M. Kim, and A. Porter, A history-based test prioritization technique for regression testing in resource constrained environments, In Proceedings of the 24th International Conference on Software Engineering, 2002, New york, NY, USA, 119-129..


Paper Type : Research Paper
Title : Efficient Information Retrieval System with Higher Priority for User Preference
Country : India
Authors : T.GnanaJanani , M.SivaKumar
: 10.9790/0661-16344854  logo
Abstract: A search engine is a software system or a tool that is designed to search for information. Web search engines return lists of web pages ranked by the page's relevance to the user query and by number of times a web page viewed. A personalization technique is adopted to retrieve the user preferred result by re-ranking the user's clickthrough data. The re-ranking is performed by evaluating the weights of the user's clickthrough data. The web search is classified as content based and location based, so as to obtain the most relevant data. The content based search returns the ontology results where as the location based searches returns the location information of the geo-web query. The system can be used in hand -held devices where individual user is focused and can also be used in desktops where multiple users are considered. This improves the search engine robustness and also reduces the waiting time of the user.
Keywords: click through data, geo-web, ontology, re-ranking, web search engine, re-ranking

[1]. Kenneth.W.L, Dik.L,(2013), "Personalized mobile search engine",IEEE Transaction on Knowledge And Data Engineering, Vol 25, No. 4.

[2]. Wilson D. (2000). "Human Information Behavior", informing science,vol. 3 No.2 ,pp.2-3.
[3]. A. MarkoItz, Y.-Y. Chen, T. Suel, X. Long, and B. Seeger. , (June 2000) "Design and implementation of a geographic search engine". In 8th Int. Workshop on the web and Databases (webDB).
[4]. Joachims, T. (2002) "Optimizing search engines using Click through data", ACM 1-58113-567-X/02/0007.
[5]. Comtet, L. (2005) "Advanced Combinatorics: The Art of Finite and Infinite Expansions", rev. enl. ed. Dordrecht, Netherlands: Reidel, pp. 176- 177.


Paper Type : Research Paper
Title : Efficient Weather Prediction By Back-Propagation Algorithm
Country : India
Authors : Manisha Kharola, Dinesh Kumar
: 10.9790/0661-16345558  logo
Abstract: Artificial Neural Networks (ANNs) have been applied extensively to both regress and classify weather phenomena. While one of the core strengths of neural networks is rendering accurate predictions with noisy data sets, there is currently not a significant amount of research focusing on whether ANNs are capable of producing accurate predictions of relevant weather variables from small-scale, imperfect datasets. Our paper makes effort to use back propagation algorithm to train the network. So, that it can help in predicting the future weather.
Keywords: ANN, Back Propagation, Weather Prediction

[1] Raúl Rojas," The back propagation algorithm of Neural Networks - A Systematic Introduction, "chapter 7, ISBN 978-3540605058
[2] Saduf, Mohd Arif Wani,"Comparative study of Back Propagation Learning Algorithm for Neural Networks,"IJARCSSE,Volume:3,Issue:12,Dec2013.
[3] Shital Solanki,H.B.Jethva "A review on back propagation algorithms for Feedforward Networks" GRA Volume : 2 | Issue : 1 Volume : 2 | Issue : 1 | Jan 2013.
[4] Gunjan Goswami, "Introduction to Artificial Neural Network".
[5] Singh, Bhambri and Gill, "Time Series based Temperature Prediction using Back Propagation with Genetic Algorithm Technique",IJCSI,Volume:8,Issue5,No.3,Sep2011.


Paper Type : Research Paper
Title : Design and Simulation of Dct Chip In Vhdl and Application in Watermark Extraction
Country : India
Authors : Nirabh Agarwal, Arpit Jain, Prof. Sanjeev Sharma
: 10.9790/0661-16345964  logo
Abstract: The paper presented the design, modeling and chip implementation of 2D Discrete Cosine Transform (DCT) domain for copyright protection of images, as digital watermarking chip. Recent improvement in computational world and the proliferation of the Internet have facilitated and demanded the production and distribution of unauthorized copies of copyrighted digital contents. The research work involved simulations and synthesis of VHDL code utilizing recent FPGA families of Xilinx, SPARTEN 3E. It is achieving the most demanding real-time requirements of some standardized frame resolutions and rates. The simulation and Synthesis results for 8-point DCT implementations indicate operating frequencies of 50 MHz, and 60 MHz for Xilinx ISE Environment and functional check using Modelsim 10.1 b software.

[1] A. M. Eskiciogluand E. J. Delp, "An Overview of Multimedia Content Protection in Consumer Electronics Devices," Elsevier Signal Processing: Image Communication, vol.1 6, pp.681–699, 2001.
[2] D.W. Trainor J.P. Heron* and R.F. Woods, White paper on "IMPLEMENTATION OF THE 2D DCT USING A XILINX XC6264 FPGA", Department of Electrical Integrated Silicon Systems Ltd and Electronic Engineering Chlorine Gdn‟s The Queen's University of Belfast N. Ireland( Page 9)
[3] H. Berghel, "Watermarking Cyber space," Communications of the ACM, vol.40, no.11, pp.19–24, November1997.
[4] IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 4, No 1, July 2010 ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 Watermarking of Digital Video Stream for Source Authentication Kesavan Gopal, Dr. M. Madhavi Latha, Team Leader, Infotech Enterprises Limited Bangalore, Karnataka, India (Page 1,6)
[5] I.J.Cox, J. Kilian, T. Leighton, and T. Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Transactions on Image Processing, vol.6, no.12, pp.1673–1687, Dec1997.


Paper Type : Research Paper
Title : A New Web Document Retrieval Method Using Extended-IOWA (Extended-Induced Ordered Weighted Averaging) Operator on HTML Tags
Country : India
Authors : Sukrati Pathak, Sakshi Mitra
: 10.9790/0661-16346574  logo
Abstract: A new scenario has arisen into the information retrieval (IR) field with the increase in the use of mark-up languages. This paper targets structured IR and is focused on documents with structure. This assumption forces us to estimate the different weights which are applied to every field of structured web documents (designed using HTML). In this work a new ranking function based on fuzzy logic called Extended-IOWA operator for structured IR has proposed. Its purpose is to develop a competent IR system through Extended-IOWA operator with weighted HTML tags. We prioritized HTML tags into four classes and assign fuzzy weights to these classes according to their significance in text retrieval. Document weights are based on tags, which contain query terms. Consequently each class generates a matrix which describes document-document relationship using Linguistic terms which we represent using Trapezoidal Fuzzy Numbers. Document score is calculated in different classes and finally scores of documents are aggregated by Extended-IOWA which in turn returns result in the form of final ranked list of relevant documents.
Keywords: Document Retrieval, Fuzzy Logic, OWA Operators, HTML Tags, Multi-criteria decision making Problem, Trapezoidal Fuzzy numbers.

[1] Guiwa Wei & wende Yi, Induced Trapezoidal Fuzzy Ordered Weighted Harmonic Averaging Operator. Journal of information & Computational Science, vol. 7, issue no. 3, 2010, pp. 625-360.
[2] R.R. Yager, D.P. Filev, Operations for granular computing: Mixing words and numbers. In: Proceedings of the FUZZ-IEEE World Congress on Computational Intelligence, Anchorage, vol. 1, 1998, pp. 123–128.
[3] Youssef Bassil & Paul Semaan , Semantic-Sensitive Web Information Retrieval Model for HTML Document. European Journal of Scientific Research, ISSN 1450-216X, vol. 69(4), 2012.
[4] Ronald R. Yager , On Ordered Weighted Averaging Aggregation Operators Multi-criteria Decision making. IEEE Transactions on Systems, Man, And Cybernetics, vol 18, issue no. 1, 1988, pp. 183-190.
[5] Jiawei Deng and Lihui Chen, Web Documents Categorization Using Fuzzy Representation and HAC. In: Proceedings of the IEEE First International Conference, vol. 2, 2000, pp. 24-28


Paper Type : Research Paper
Title : Secure Keyword Search Using TRSE Scheme over Cloud Data
Country : India
Authors : A. Libana Mary, Ms. R.Asmetha Jeyarani, M.Tech
: 10.9790/0661-16347579  logo
Abstract: Cloud computing is a pattern which is mainly necessary for outsourcing the data and also for sharing the computing resources. According to privacy it has been presented as an outsourcing of sensitive information. The searchable symmetric encryption is mainly focus on addressing the data privacy issues. The aspect of similarity relevance and scheme robustness has been formulated by the privacy issues. The server side ranking based on order-preserving encryption and it's inevitably leaks the data privacy has to be observed and it can control in the proposed scheme. Two-round searchable encryption scheme is mainly used to eliminate the leakage that supports top-k multi keyword retrieval and a two main model has been used. The vector space model is helps to provide sufficient search accuracy. The homomorphic encryption which involves the user in ranking while the majority of computing works is done on the server side by operations only on cipher text.
Index Terms: TRSE, Top-K, order Preserving Encryption, Vector Space Model, Homomorphic Encryption

[1] Jiadi Yu, Peng Lu, Yanmin Zhu, Guangtao Xue and Minglu Li "Towards Secure Multi- Keyword Top-k Retrieval over Encrypted Cloud Data" - IEEE TRANSACTIONS ON DEPEDABLE AND SECURE COMPUTING, 2013
[2] M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A.Konwinski, G. Lee, D. Patterson, A. Rabkin, and M. Zaharia, "A View of Cloud Computing," Comm. ACM, vol. 53, no. 4, pp. 50-58,2010.
[3] M. Arrington, "Gmail Disaster: Reports of Mass Email Deletions,"http://www.techcrunch.com/2006/12/28/gmaildisasterreportsof-mass-email-deletions/, Dec. 2006.
[4] Amazon.com, "Amazon s3 Availability Event: July 20, 2008,"http://status.aws.amazon.com/s3-20080720.html, 2008.
[5] RAWA News, "Massive Information Leak Shakes Washington over Afghan War,"http://www.rawa.org/ temp/runews/2010/08/20/ massive-information-leak-shakes-washington-overafghan-war.html, 2010


Paper Type : Research Paper
Title : Enhanced Security Algorithm using Hybrid Encryption and ECC
Country : India
Authors : A. P Shaikh , V. kaul
: 10.9790/0661-16348085  logo
Abstract: The AES and ECC are the best two algorithms of symmetric encryption technology and asymmetric encryption technology. The paper presents a hybrid model which uses a combination of two symmetric algorithms enhanced AES and Blowfish for data confidentiality, Message Digest-5 for data integrity, Elliptic Curve Diffie Hellman algorithm-ECDHA for key exchange and Elliptic Curve Digital signature algorithm-ECDSA is used for digital signature. AES is enhanced by modifying the S-boxes columns, and then combination of enhanced AES and blowfish is used for data confidentiality. Performance of this system is evaluated on different configurations on the basis of encryption/decryption time, throughput and memory usage for different data formats like text file, image file, audio file and video file.
Keywords: AES, Blowfish(BF), enhanced AES, Elliptic Curve Cryptography, ECDH, ECDSA andMD5

[1]. T. Nie, C. Song and X. Zhi," Performance Evaluation of DES and Blowfish Algorithms, Biomedical Engineering and computer Science International Conference, IEEE, 2010.
[2]. A. Nadeem and M.Y Javed., "A Performance Comparison of Data Encryption Algorithms," IEEE Information and Communication Technologies, 2005. ICICT 2005. First International Conference, 2006, pp. 84- 89.
[3]. J. Daemen and V. Rijmen, "AES submission document on Rijndael, Ver2", September 1999.
[4]. "Announcing the Advance Encryption Standard", FIPS Publication, 2001.
[5]. M.J.B. Robshaw and Y. L. Yin, "Elliptic Curve Cryptosystems", RSA Laboratories Technical Note, 1997


Paper Type : Research Paper
Title : Improved Text Analysis Approach for Predicting Effects of Nutrient on Human Health using Machine Learning Techniques
Country : India
Authors : Dhanasekaran Kuttiyapillai , Rajeswari Ramachandran
: 10.9790/0661-16348691  logo

Abstract: A text analysis method is introduced which processes the unstructured information from document collection in order to support efficient text classification and information extraction. The Information extraction helps the system to discover useful knowledge for the users. The keyword based information search method fails due to the generation of many false positives. It leads to inaccurate generation of user expected result for many applications where context sense plays a major role while identifying the relevant features. The method developed can solve this problem by using combination of techniques from machine learning and natural language processing. The text contents are preprocessed and applied with entity tagging component. The proposed method performs accurate information extraction by improving precision and recall value. The automatic generation of rules provides an easy way to predict the effects of nutrient on malnutrition. The bottom-up scanning of key-value pairs helps to speed up the content finding to generate relevant items to the task. Our method can outperform other methods by eliminating sub tree which has an overestimating heuristic. Our approach will be useful to prevent errors generated through misinterpretation of available facts and improves the accuracy of information extraction in many text analysis applications.

Keywords: Classification, Knowledge discovery, Machine learning, Semantic relevance, Term extraction

[1]. Wang Wei, Payam Barnaghi and Andrzej Bargiela, Probabilistic Topic Models for Learning Terminological Ontologies, IEEE Transactions on Knowledge and Data Engineering, 2010, pp.1028-1040.
[2]. Qinbao Song, Jingjie Ni and Guangtao Wang,A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data, Journal IEEE Transactions on Knowledge and Data Engineering, 10(10), 2011,pp.1-14.
[3]. Hong Huang and Hailiang Feng,Gene Classification Using Parameter-free Semi-supervised Manifold Learning,IEEE/ACM Transactions on Computational Biology and Bioinformatics, 10(10),2011,pp.1-13
[4]. Ahmed Rafea, Hesham A. Hassan, Mohamed Yehia Dahab, TextOnto Ex: Automatic Ontology Construction from Natural English Text,International conference of Artificial Intelligence and Machine Learning,2006.
[5]. Topon Kumar Paul and Hitoshi Iba,Prediction of Cancer Class with Majority Voting Genetic Programming Classifier Using Gene Expression Data,IEEE/ACM transactions on computational biology and bioinformatics, 6,2009, pp.353-367.


Paper Type : Research Paper
Title : Classification of Cardiovascular Disease from ECG using Artificial Neural Network and Hidden Markov Model
Country : India
Authors : Mr. Ankit Sanghavi, Prof. Sachin M. Bojewar
: 10.9790/0661-16349298  logo
Abstract: this paper deals with the classification of cardiovascular disease for its future analysis. If future progression of the disease can be predicted earlier with proper change in medication patients treatment can be improved. Artificial neural network (ANN) is used as classifier with wavelet transform as the feature extraction for reducing data set of ECG. Hidden markov model (HMM) is used as predictor along with artificial neural network (ANN). ECG samples are collected for testing from MIT_BIH database. MATLAB 2010b is used as the simulation tool for modeling and testing. The result obtain with Artificial neural network (ANN) and Hidden markov model (HMM) combine are much efficient than that of ANN alone.
Index Terms: cardiovascular disease classification, ECG, Wavelet transforms, artificial neural networks (ANN), hidden markov model (HMM).

[1] A. Taddei et al., "The European ST-T database: Standard for evaluating systems for the analysis of ST-T changes in ambulatory electrocardiography, "Euro. Heart J., vol. 13, pp. 1164–1172, 1992.
[2] "MIT-BIH database distributor," Tech. Rep., Beth Israel Hospital, Biomed. Eng., Division KB-26, Boston, MA.
[3] J. J. Bailey et al., "Recommendations for standardization and specification in automated electrocardiography: Bandwidth and digital signal processing," Circulation, vol. 81, 1990.
[4] R. Silipo, A. Taddei, and C. Marchesi, "Continuous monitoring and detection of ST-T changes in ischemic patients," IEEE Comput. Cardiol.,pp. 225–228, 1994.
[5] M. Bianchini, P. Frasconi, and M. Gori, "Learning in multilayered networks used as autoassociators," IEEE Trans. Neural Networks, vol.6, pp. 512–515, 1995.


Paper Type : Research Paper
Title : Natural Language Query Processing on Dynamic Databases Using Semantic Grammar
Country : India
Authors : Sefali koli, Anjali Sarvade, Ashwini Waykar, Shradha Modak, R.A.Khan
: 10.9790/0661-163499103  logo
Abstract: Ease and effectiveness of Information Retrieval from Structured Database through Natural Language provides high utility value. The main purpose of Natural Language Query Processing is that an English sentence will be interpreted by the computer and appropriate action taken. It includes correct interpretation, disambiguation and context resolution in natural language query processing.
Asking questions to databases in natural language is a very convenient and easy method of data access, especially for casual users who do not understand complicated database query languages such as SQL. Input of system is an English statement that will be converted into equivalent SQL query and SQL query will be fired on related database to get final output. Our system provides intelligence to the natural language processing in terms of lexicon processing, query formulation and automatic generation of SQL code which can be easily modified and reuse.
Keywords: Natural language Processing, Semantic Grammar, POS

[1]. Gauri Rao, Chanchal Agarwal, Snehal Chaudhry, Nikita Kulkarni, Dr. S.H. Patil, "Natural Language Query Processing using Semantic Grammar", (IJCSE) International Journal on Computer Science and Engineering Vol. 02, No. 02, 2010, 219-223.
[2]. Valentin Tablan, Danica Damljanovic, and Kalina Bontcheva ,"A Natural Language Query Interface to Structured Information", Department of Computer Science University of SheieldRegent Court.
[3]. Mrs.Vidya Dhamdhere, Nijesh Hirpara, Kalpesh Surana, Karishma Gangwani, Chirayu Bootley, "A Natural Language Query Processor for Database Interface", Int.J.Computer Technology & Applications,Vol 3 (1), 378-382.
[4]. Gauri Rao, S.H.Patil,"Natural Language Query Processing based on Probabilistic Context Free Grammar" Department of Computer Engineering Bharati Vidyapeeth College of Engineering, Pune , India.
[5]. David Taniar, Hui Yee Khaw a, Haorianto Cokrowijoyo Tjioe a, Eric Pardede ,"The use of Hints in SQL-Nested query optimization",Clayton School of Information Technology, Monash University Clayton, Vic. 3800, Australia Department of Computer Science& Computer Engineering, La Trobe University, Bundoora, Vic. 3083, Australia


Paper Type : Research Paper
Title : Online Password Guessing Attacks by Using Persuasive Click Point with Dynamic User Block
Country : India
Authors : P. Kalaivizhi, Dr. S. Thiru Nirai Senthil
: 10.9790/0661-1634104108  logo
Abstract: The goal of knowledge-based authentication system is to guide the users in creating graphical passwords. User often creates memorable passwords that are easy for attackers to guess, but strong system assigned passwords are difficult for user to remember. So the researchers of modern days use alternative methods where graphical pictures are used as a password. Human brain is good in remembering picture than textual character. Various graphical password techniques are used, now PCCP with dynamic user blocks approach presents a more feasible way of varying the security level depending upon the user's requirements. The proposed system lets the user to select the security level. In order to help the user to memorize the password audio support can also be provided. The system influence the user to create a click based graphical password, which is more random, so that it will be difficult for the hackers to guess it.
Keywords: PCCP with dynamic user blocks, Persuasive technology, Password registration, User login process.

[1]. S.Chiasson, E.Stobert, A.Forget, R.Biddle,and P.van Oorschot," Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism", IEEE DEPENDABLE AND SECURE COMPUTING, March/Arril 2012
[2]. Zhi Li, Qibin Sun, Yong Lian, and D. D. Giusto, 'An association-based graphical password design resistant to shoulder surfing attack‟, International Conference on Multimedia and Expo (ICME), IEEE.2005
[3]. S. Akula and V. Devisetty, "Image Based Registration and Authentication System," in Proceedings ofMidwes Instruction and Computing Symposium, 2004.
[4]. L. Sobrado and J.-C. Birget, "Graphical passwords," The Rutgers Scholar, An Electronic Bulletin for Undergraduate Research, vol. 4, 2002.
[5]. S. Chiasson, A. Forget, E. Stobert, P. van Oorschot, and R. Biddle, "Multiple Password Interference in Text and Click-Based Graphical Passwords," Proc. ACM Conf. Computer and Comm. Security (CCS), Nov. 2009.



Paper Type : Research Paper
Title : Resource Aware Node Authentication Framework for Secure MANET
Country : India
Authors : Komal Naik (Joshi), Arati Dixit
: 10.9790/0661-1634109113  logo

Abstract: MANET comprises mobile nodes, which are links to each other by wireless connections without any base infrastructure. MANETs are vulnerable to security attack due to their features such as autonomous nature, infrastructure-less network and multi-hop communication. Therefore every node in MANET must be secure; node security can be provided by using node authentication techniques. Every node in MANET consists of resources such as battery power, bandwidth, and a memory to keep routing information. These resources provided by the MANET node are limited resources. A MANET faces various security attacks; one of them is flooding attack whose aim is to drain off limited resources of MANET node by continuously sending Route Request control Packet, false route information or fake data packets. The main goal of our approach is to provide resource aware node authentication framework to prevent flooding attack in MANET.

Keywords: AODV, Flooding Attack, MANET, Node authentication.

[1]. Pushpender Singh and Manik Chandra Pandey, "Evaluation of certificate-based authentication in Mobile Ad-hoc networks",
International Conference on Recent Trends in Engineering and Technology, 2012, 69-74.
[2]. Jaydip Sen, "Robust and Efficient Node Authentication Protocol for Mobile Ad Hoc Networks", Computational Intelligence,
Modelling and Simulation (CIMSiM), 2010 Second International Conference on, 2010, 476-481.
[3]. C. Perkins et al., (2001, 07), "Ad Hoc On-Demand Distance-Vector Routing (AODV)", IETF draft, 2001.
[4]. Djamal DJENOURI, Nadjib BADACHE, "Survey on security issues in Mobile Ad-hoc Networks ", IEEE communications surveys,
2005
[5]. Nikos Komninos, Dimitris Vergados, Christos Douligeris, "A Two-Step Authentication Framework in Mobile Ad-Hoc Networks,
China Communication Journal, 4(1), 2007, 28-39. Available: openaccess.city.ac.uk/2512/1/TwoStep%20Authentication.pdf


Paper Type : Research Paper
Title : IOG - An Improved Approach to Find Optimal Grid Size Using Grid Clustering Algorithm
Country : India
Authors : Monali Parikh, Asst. Prof. Tanvi Varma
: 10.9790/0661-1634114118  logo
Abstract: The grid-clustering algorithm is the most important type in the hierarchical clustering algorithm. The grid-based clustering approach considers cells rather than data points. In grid-based clustering, all the clustering operations are performed on the segmented data space, rather than the original data objects. Grid-based methods are highly popular compared to the other conventional models due to their computational efficiency but to find optimal grid size is a key feature in grid-based clustering algorithm. There exist some algorithm in that they achieve optimal grid size but in real life data can be dense or sparse. So, in these research to develop an algorithm that can find optimal grid size in any type of dataset in dense or sparse with appropriate accuracy or maintaining the accuracy with less time.
Keywords: Data mining; Clustering; Grid; k-nn method

[1] Han, P.N., Kamber, M.: Data Mining: Concepts and Techniques,2nd (2006).
[2] Tan, P.N., Steinbach, M., Kumar, V.: Introduction to Data Mining (2006).
[3] http://www.cs.put.poznan.pl/jstefanowski/sed/DM-7clusteringnew.pdf
[4] Damodar Reddy Edla and Prasanta K. Jana "A Grid Clustering Algorithm Using Cluster Boundaries" IEEE World Congress on Information and Communication Technologies 2012
[5] https://www.google.co.in/?gfe_rd=cr&ei=k719U5PTMc_N8gfYvoGwBg#q=dm_clustering2.ppt
[6] H. Darong and W. Peng, "Grid-based DBSCAN Algorithm with Referential Parameters," Proc. International Conference on Applied Physics and Industrial Engineering (ICAPIE-2012), Physics Procedia, vol. 24(B), pp. 1166-1170, 2012


Paper Type : Research Paper
Title : Simulation of Denial of Service (DoS) Attack using Matlab and Xilinx
Country : India
Authors : Mukhopadhayay, S Polle, P Naskar
: 10.9790/0661-1634119125  logo
Abstract: As the Internet is growing – so is the vulnerability of the network. Companies now days are spending huge amount of money to protect their sensitive data from different attacks that they face. DoS or Denial Of Service attacks are one of such kind of attacks. In this paper, we at first recognize different kinds of DoS attacks and then propose a new methodology to simulate those.
Keywords: Denial of service (DoS), neural network tool (nntool), distributed denial of service (DDoS

[1]. Don Holden, "A Rule Based Intrusion Detection System", published in the proceeding of the IFIP TC11. ISBN: 0-444-89699-6
[2]. I. Kotenko and A. Ulanov, "Simulation of internet DDoS attacks and defense," in Information Security, pp. 327–342, Springer, 2006.
[3]. I. Kotenko, A. Alexeev, and E. Man'kov, "Formal framework for modeling and simulation of DDoS attacks based on teamwork of hackers-agents," in Intelligent Agent Technology, 2003. IAT 2003. IEEE/WIC International Conference on, pp. 507–510, IEEE, 2003.
[4]. L. Li and G. Lee, "DDoS attack detection and wavelets," Telecommunication Systems, vol. 28, no. 3-4, pp. 435–451, 2005.
[5]. H. Debar, B. Dorizzi, "An Application of a Recurrent Network to an Intrusion Detection System," International Joint Conference on Neural Networks. 1992, pp. (II) 478-483.
[6]. H. Debar, M. Becke, D. Siboni, "A Neural Network Component for an Intrusion Detection System, " IEEE Symposium on Research in Security and Privacy, 1992.


Paper Type : Research Paper
Title : Web Penetration Testing using Nessus and Metasploit Tool
Country : India
Authors : Indraneel Mukhopadhyay, Shilpam Goswami, Eshita Mandal
: 10.9790/0661-1634126129  logo
Abstract: Web Penetration Testing is a tool that is being used widely to see how the website reacts when an vulnerability attack is done. Now days many ethical hackers use web penetration tool to predict the vulnerabilities of the website. We have done a survey of some of the web penetration tools that are available and then we have proposed a architecture using nesus and metasploit tool to do scan vulnerabilities of an website.
General Terms: Web Penetration Tool, Vulnerability Scanner, Security
Keywords: Web Penetration Tool, Vulnerability Scanner, Nessus, Metasploit, Kali Linux, ethical hacking

[1]. Joseph Muniz Aamir Lakhani. "Web Penetration Testing with Kali Linux", PACKT publishing. September 2013.
[2]. Andrey Petukhov, Dmitry Kozlov "Detecting Security Vulnerabilities in Web Applications Using Dynamic Analysis with Penetration Testing", https://www.owasp.org/images/3/ 3e/OWASP-AppSecEU08-Petukhov.pdf
[3]. William G. J. Halfond1,Shauvik Roy Choudhary and Alessandro Orso "Improving penetration testing through static and dynamic Analysis". http://www-bcf.usc.edu/~halfond/ papers/halfond11stvr.pdf
[4]. Nuno Antunes and Marco Vieira, "Penetration Testing For Web Services", http://ieeexplore.ieee.org/stamp/stamp .jsp?tp=&arnumber=6681866
[5]. William G.J. Halfond, Shauvik Roy Choudhary, and Alessandro Orso "Penetration Testing with Improved Input Vector identification", http://www.cs.columbia.edu/~junfeng /reliable-software/papers/pen-test.pdf


Paper Type : Research Paper
Title : An Intelligent Decision Support System Using Adaptive Network-Based Fuzzy Inference System (ANFIS) For Choosing Suitable Bank Loan Installments
Country : Saudi Arabia
Authors : Ibrahim Albidewi, Rana Alouhali
: 10.9790/0661-1634130137  logo
Abstract: Choosing the best bank to obtain a loan from has become a dilemma for many loan applicants; Thus the need to automate the process throughout establishing an intelligent decision support system (IDSS) to facilitate applicant's decision-making process. However, there are many types of IDSS to design the system but we have found that the fuzzy logic is more suitable. Despite the fact that Fuzzy structure has strong inference system, it has no learning ability. In the contrary, neural network (NN) has a powerful learning ability. The Adaptive Network-based Fuzzy Inference System (ANFIS) merges these two desired features in its own structure. Therefore, using the ANFIS to determine the best loan package was proven in this paper to define the suitable bank.
Keywords: Adaptive Network-based Fuzzy Interface, ANFIS, Decision Support System, Fuzzy logic, neural network.

[1]. Park, Yong-tae, An empirical investigation of the effects of data warehousing on decision performance, Information & Management Journal 2005, 51-61.
[2]. G. M. Marakas, Decision Support Systems in the 21st century, 2nd Edition (New Jersey: Prentice Hall, 2002).
[3]. Shaw, J. Michael, and A. James, Gentry, Using an Expert System with Inductive Learning to Evaluate Business Loans, Financial Management, 1988, 45-56.
[4]. SAMA, About SAMA, 2010. Last access January 2014, Retrieved from: http://www.sama.gov.sa/sites/samaen/aboutus.aspx.
[5]. Eletter, S. Fathi, & S. G. Yaseen, Applying Neural Networks for Loan Decisions in the Jordanian Commercial Banking System, International Journal of Computer Science and Network Security, 10, 2010, 209-214.
[6]. A. AlShamiy, A. Lotfiy, E. Laiy, S. Coleman, Unified Knowledge Economy Competitiveness Index Using Fuzzy Clustering Model, IEEE Symposium on Computational Intelligence for Financial Engineering and Economics (CIFEr), 2011, 1-6.


Researcher can also search IOSR published article contents through

IOSR Xplore