IOSR Journal of Computer Engineering (IOSR-JCE)

Nov – Dec 2014 Volume 16 - Issue 6

Version 1 Version 2 Version 3 Version 4 Version 5 Version 6 Version 7 Version 8

Paper Type : Research Paper
Title : An Approach to Identify Dishonest Nodes Using MAC Protocol in Multihop Cellular Networks
Country : India
Authors : Mr. P.Vijaya Babu Varma || Mrs. Lavanya Pamulaparty || Mr. T. Praveen Kumar
: 10.9790/0661-16660107    logo

Abstract: In mobility based networks, the mobile nodes usually relay on other node packets rather than their own rightful packet for enhancing network performance. It happens due to the availability of some selfish or malicious nodes which do not cooperate in transmission of received packets to honest nodes, which totally reduces the network performance. A fairness issue arises when a selfish/malicious node access the advantage of the honest nodes without providing their contributions to honest nodes which significantly degrades the performance of network and May results in failure of entire communication. In this paper, we are analyzing network performance by using Message Authentication Code (MAC) Based protocol which can identify misbehaving/malicious nodes.MAC uses only fast symmetric cryptographic operations, making it suitable for multicast networks, where latency is an important factor.

[1] Y. Lin and Y. Hsu, "Multihop Cellular: A New Architecture for Wireless Communications," Proc. IEEE INFOCOM, vol. 3, pp. 1273-1282, Mar. 2000.
[2] X. Li, B. Seet, and P. Chong, "Multihop Cellular Networks: Technology and Economics," Computer Networks, vol. 52, no. 9, pp. 1825-1837, June 2008.
[3] C. Gomes and J. Galtier, "Optimal and Fair Transmission Rate Allocation Problem in Multi-Hop Cellular Networks," Proc. Int'l Conf. Ad-Hoc, Mobile and Wireless Networks, Aug. 2009.
[4] H. Wu, C. Qios, S. De, and O. Tonguz, "Integrated Cellular and Ad Hoc Relaying Systems: iCAR," IEEE J. Selected Areas in Comm., vol. 19, no. 10, pp. 2105-2115, Oct. 2001.
[5] G. Shen, J. Liu, D. Wang, J. Wang, and S. Jin, "Multi-Hop Relay for Next-Generation Wireless Access Networks," Bell Labs Technical J., vol. 13, no. 4, pp. 175-193, 2009.
[6] R. Schoenen, R. Halfmann, and B. Walke, "MAC Performance of a 3GPP-LTE Multihop Cellular Network," Proc. IEEE Int'l Conf. Comm. (ICC), pp. 4819-4824, May 2008.


Paper Type : Research Paper
Title : IPv4 to IPv6 Transition Complaint Mediastreaming Using ARM 11
Country : India
Authors : Manju priya G
: 10.9790/0661-16660823    logo

Abstract: Internet Protocol version 6 (IPv6) is the next version of Internet Protocol (IP) which is currently in the transition phase from its predecessor, Internet Protocol version 4 (IPv4). With the number of IPv4 addresses almost completely depleted, the implementation of IPv6 has become a priority for many organizations. However, it is not all that feasible to just switch everything over to IPv6 without some type of transition. This project reconsiders the basic problems and key differences in IPv4-Ipv6 transition.

[1]. Alain Durand (2011) 'Deploying IPv6', IEEE Internet computing Vol. 5, No. 2, pp. 79-81.
[2]. Baker F., Li X, and Bao C. (2011) 'Frame work for IPV4 to IPV6 translation', IETF RFC 6144.
[3]. Chen W.E., Taiwan I. and Ssushien (2012) 'Client based IPv4 to IPv6 transition for session initiation protocol multimedia services in next generation networks', IEEE Internet Computing RFC 2529.
[4]. Clercq J. and Pervost. S. (2007) 'Connecting IPv6 islands over MPLS using provider edge routers', IETF RFC 4798.
[5]. Cynthia E. Martin SI International Reston, VA and Jeffrey (2007) 'Internet Protocol Version 6 (IPV6) security assessment', IEEE Internet Computing RFC 2460.
[6]. Jianping Wu and X.Li, (2006) 'Tunnel based Ipv6 transition' IEEE Internet Computing RFC 6144.
[7]. Waddington and Fangzhe chang Bell Research laboratories (2011) 'Realizing the transition to IPv6', IEEE Communication magazine RFC 4291.


Paper Type : Research Paper
Title : Efficient Audit Services for Data Outsourcing in Clouds
Country : India
Authors : Anuraj C.K
: 10.9790/0661-16662428    logo

Abstract: This paper introduce a dynamic audit service for integrity verification of untrusted and outsourced storages. Our audit service is constructed based on the techniques, fragment structure, random sampling, and index-hash table, supporting provable updates to outsourced data and timely anomaly detection. Constructed on interactive proof system (IPS) with the zero knowledge property, our audit service can provide public auditability without downloading raw data and protect privacy of the data. Also, our audit system can support dynamic data operations and timely anomaly detection with the help of several effective techniques, such as fragment structure, random sampling, and index-hash table (IHT). We also propose an efficient approach based on probabilistic query and periodic verification for improving the performance of audit services. A proof-of-concept prototype is also implemented to evaluate the feasibility and viability of our proposed approaches.

[1]. M. Mowbray, "The Fog over the Grimpen Mire: Cloud Computing and the Law," Technical Report HPL-2009-99, HP Lab., 2009..
[2]. A.A. Yavuz and P. Ning, "BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems," Proc. Ann.Computer Security Applications Conf. (ACSAC), pp. 219-228, 2009.
[3]. H.-C. Hsiao, Y.-H. Lin, A. Studer, C. Studer, K.-H. Wang, H.Kikuchi, A. Perrig, H.-M. Sun, and B.-Y. Yang, "A Study of User-Friendly Hash Comparison Schemes," Proc. Ann. Computer Security Applications Conf. (ACSAC), pp. 105-114, 2009.
[4]. A.R. Yumerefendi and J.S. Chase, "Strong Accountability for Network Storage," Proc. Sixth USENIX Conf. File and Storage Technologies (FAST), pp. 77-92, 2007.
[5]. Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S.S. Yau, "Efficient Provable Data Possession for Hybrid Clouds," Proc. 17th ACM Conf. Computer and Comm. Security, pp. 756-758, 2010.
[6]. A. Juels and B.S. Kaliski Jr., "PORs: Proofs of Retrievability for Large Files," Proc. ACM Conf. Computer and Communications
Security (CCS '07), pp. 584-597, 2007.


Paper Type : Research Paper
Title : Analysis of Image and Video Using Color, Texture and Shape Features for Object Identification
Country : India
Authors : Kumar Rajpurohit || Rutu Shah || Sandeep Baranwal || Shashank Mutgi
: 10.9790/0661-16662933    logo

Abstract: The recent developments in cognitive sciences and Artificial Intelligence has made possible the process of automation in object detection and recognition using various low level visual features used to represent a standard image of an object. Our approach uses analysing the methods used by most intelligent living entities, humans. Humans use the sense of sight and intuition to recognise objects. This paper highlights the methodologies that can be used to identify objects using details such as colour, texture and shape of an image to infer the object.

Keywords: CBVR, Edge Detection, Feature Extraction, Object Identification, Video Segmentation

[1] Shweta Ghodeswar , B.B. Meshram , Content Based Video Retrieval, International Journal of UbiComp (IJU), Vol.3, No.2, April 2012.
[2] Canny Edge Detection 09gr820 March 23, 2009.
[3] Ivica Dimitrovisci, Suzana Loskovska, Gorgi Kakasevki and Inam Chorbev, Video Content Based Retrieval System, The International Conference on "Computer as a tool", September 2012.
[4] Dr.S.Vijayarani, Mrs.M.Vinupriya, Performance Analysis of Canny and Sobel Edge Detection Algorithms in Image Mining, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 1, Issue 8, October 2013.


Paper Type : Research Paper
Title : A Proposed Framework for Integrating Stack Path Identification and Encryption Informed by Machine Learning as a Spoofing Defense Mechanism
Country : Kenya
Authors : Anne Kaluvu
: 10.9790/0661-16663440    logo

Abstract: Spoofing attacks have been terrorizing the information world for decades; so many methodologies have been formulated to attempt the eradication of these attacks. This study elaborates on a proposed framework for integrating StackPi and Encryption informed by Machine learning as spoofing defense methodologies. IP Spoofing is one of the major tools used by hackers in the internet to mount spoofing attacks and has been difficult to eradicate. Stack Pi uses Path Identification markings to differentiate between spoofed packets and the legitimate packets and in addition encryption is used to apply proper authentication measures that can enhance the speed of detection and prevention of IP spoofed packet. Machine learning incorporated in this framework to address the short comings of StackPi-IP filtering method and thereby increasing its efficiency. The integration of these three methodologies makes an ideal mechanism for eradicating spoof attacks.

Keywords: Spoof attacks, Stack Pi, Encryption, Machine Learning

[1]. Linta S. R. and Khan, R. . Today's Impact on Communication System by IP Spoofing and Its Detection and Prevention. Santa Cruz, CA. GRIN Verlag. 2013.
[2]. Linta S. R. and Khan, R. . Today's Impact on Communication System by IP Spoofing and Its Detection and Prevention. Santa Cruz, CA. GRIN Verlag. 2013.
[3]. Wyld D. C, Wozniak M and Chaki. N, Trends in Network and Communications: International Conferences. In Proceedings Volume 197 of Communications in Computer and Information Science, ISSN 1865-0937. Chennai, India. Springer Science & Business Media. 2011.
[4]. Gupta, V & Kavyashree, H. Comparative Study of IP Address Spoofing: Attacks and Their Defense Mechanism. International Journal of Innovative Research and Studies. Vol 2 Issue 5. ISSN 2319-9725. 2013.


Paper Type : Research Paper
Title : The impact of the attachment implementation in the healthcare domain
Country : Morocco
Authors : Hicham Amine || Abdelouahab Mesnaoui || Safaa Elkhaddam
: 10.9790/0661-16664145    logo

Abstract:An "attachment" is any supplemental health documentation needed from a provider to support a specific business process in the Healthcare domain while using electronic exchange within the organization or between healthcare companies and payer and/or providers. The purpose of this study is to enhance the submission of the healthcare transactions by adding an attachment for each transaction. This study includes the submission of medical documentation to support; that includes Health care claims, Appeals, Pre-authorizations for services, Referral authorizations, Enrollee eligibility inquiries and Coordination of benefits. An attachment can be 'solicited' via a request from the provider or 'unsolicited' (sent pro-actively by the provider and not tied to a health plan request.) The majority of Attachments are solicited vs. unsolicited. We can notice a high difference between the ones are for and the ones against by comparing 70% and 30% which clarifies how this implementation will make the companies achieve a better and effective exchange of info which can improve the quality of the services.

[1]. Pawson, R.;The Science of Evaluation: a Realist Manifesto. Sage, London, (2013).
[2]. Federal register; the daily journal of the united state government; health and human department ; (2005).
[3]. Best A., Greenhalgh T., Lewis S., Sau J.E., Carroll, S., Bitz, J.; Large-system transformation in health care: a realist review. Millbank Q. 90, 421- 456, (2012).
[4]. Clark, A.; What are the component of complex interventions? Theorizing approaches to parts, powers and the whole intervention. Soc. Sci. Med. 93, 185-193, (2013).
[5]. Thomson S., Osborn R., Squires D., Jun M., International Profiles of Health Care Systems, The Commonwealth Fund, New York, (2012).
[6]. Ray P. , Joanne G. , Cathy B. , Elizabeth G.; Do reviews of healthcare interventions teach us how to improvehealthcare systems. Social Science & Medicine 114,129-137, (2014).


Paper Type : Research Paper
Title : Automated Traffic Assistance System
Country : India
Authors : Aryadip Sarkar
: 10.9790/0661-16664654    logo

Abstract: In this paper we have described the design and implementation concept of an automated traffic assistance system. In our project we are trying to recover the common problems that everyone faces most of the days in this congested society with heavy traffic movements. We have tried to make the support system fully automated rather than the manual control. We thought to use of the Traffic Signal Lights as the server and the vehicles moving towards the signals as clients and clients can communicate with the server via wireless communication.

The design and implantation concept described in detail in the methodology section of this report. The result section shows that the system works as per our expectation. We hope that the concept and algorithms described in this report will aid the developers' community in near future.


Paper Type : Research Paper
Title : Effect of Using Reclaimed Asphalt Pavement on Asphalt Mix Performance
Country :  Egypt
Authors : Ahmed Mohamady || Ashraf Elshahat || Mahmoud Fathy Abd-Elmaksoud || Mohamed Hoseny Abdallah
: 10.9790/0661-16665567    logo

Abstract: Throughout history, the earth`s resources have been exploited without considering their eventual limitations. At present, one of the key challenges is to concentrate on saving natural resources for future generations while bringing industrial activities into a more stable long-term balance between environmental preservation and costs. The main purpose of this study aims to investigate the use of recycled aggregate pavement (RAP) materials in highway and to determine the optimum reclaimed percent. To achieve the study objective, a comprehensive experimental program was designed and conducted.

[1]. Betenson W.D. "Recycled Asphalt Concrete in Utah", Proceedings of the Association of Asphalt Paving Technologists, Vol.48, 1979, pp. 272 – 295.
[2]. Mallick, B.R., Lecture Notes, A3- day workshop on "Recycling and Other Pavement Rehabilitation Methods", IIT Kanpur, 8-10th February, 2005, pp. 58 – 350.
[3]. Holtz, K. and Eighmy, T.T., "Scanning European Advances in the Use of Recycled Materials in Highway Construction", Public Roads, Vol. 64, No. 1, 2000, pp. 34- 40.
[4]. Ikeda, T., and Kimura, M. "Recent Development in Recycling Asphalt Pavements in Japan", Proceedings of 8th International Conference on Asphalt Pavements, Seattle, Washington, 1997, pp. 99 – 106.
[5]. Dar-Hao Chen and John Bilyeu, "Assessment of a Hot-in Place Recycling Process", Tamkang Journal of Science and Engineering, Vol. 4, No. 4, pp. 265-276 (2001).


Paper Type : Research Paper
Title : Advanced Client Repudiation Diverge Auditor in Public Cloud
Country : India
Authors : Ms.Nita R. Mhaske || Prof. S.M.Rokade
: 10.9790/0661-16666872    logo

Abstract: With data storage and sharing services provided by cloud , people work together by sharing data as a group . After creating group and shared data in the cloud user in the group is able to access and modified and also share the latest updated data with the rest of the group . To ensure shared data integrity can be verified publicly, users in the group need to compute signatures on all the blocks in shared data. Different blocks in shared data are generally signed by different users due to data modifications performed by different users.

[1]. B. Wang, B. Li, Member, H. Li, ―Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud ― in the Proceedings of IEEE INFOCOM 2014, 2014
[2]. B. Wang, B. Li, and H. Li, ―Public Auditing for Shared Data with Efficient User Revoation in the Cloud,‖ in the Proceedings of IEEE INFOCOM 2013, 2013, pp. 2904–2912.
[3]. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, an M. Zaharia, ―A View of Cloud Computing,‖ Communications of the ACM, vol. 53, no. 4, pp. 50–58, Apirl 2010.
[4]. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, ―Provable Data Possession at Untrusted Stores,‖ in the Proceedings of ACM CCS 2007, 2007, pp. 598–610.
[5]. H. Shacham and B. Waters, ―Compact Proofs of Retrievability,‖ in the Proceedings of ASIACRYPT 2008. Springe Verlag,2008,pp. 90–107.

Researcher can also search IOSR published article contents through

IOSR Xplore