IOSR Journal of Computer Engineering (IOSR-JCE)

International Conference on Future Technology in Engineering – ICFTE’16

Volume 1

Paper Type : Research Paper
Title : Category Based Sentiment Analysis in Travel And Tourism Domain
Country : India
Authors : Devika M D || Sunitha C || Amal Ganesh

Abstract: Sentiment analysis (SA) is an intellectual process of extricating user's feelings and emotions. It is one of the pursued fields of Natural language processing (NLP). The evolution of Internet based applications has steered massive amount of personalized reviews for various related information on the Web. These reviews exist in different forms like social Medias, blogs, Wiki or forum websites. Both travellers and customers find the information in these reviews to be beneficial for their understanding and planning processes......

Keywords - Setiments, lexicons, semantics, polarity

[1] Neha S. Joshi, Suhasini A. Itkat, " A Survey on Feature Level Sentiment Analysis" (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (4) , 2014, 5422-5425.
[2] He Y., "Incorporating sentiment prior knowledge for weakly supervised sentiment analysis ", ACM Transactions on Asian Language Information Processing, Vol. 11(2).
[3] N. Veeranjaneyulu, Akkineni Raghunath, B, Jyostna Devi, Venkata Naresh Mandhala, "Scene Classification Using Support Vector Machines With Lda " journal of theoretical and applied information technology 31 may 2014. Vol. 63 No.3
[4] Ankush Sharma, Aakanksha, "A Comparative Study of Sentiments Analysis Using Rule Based and Support Vector Machine", IJRCCE Vol. 3, Issue 3, March 2014.
[5] A. Tamilselvi, M. ParveenTaj, "Sentiment Analysis of Micro blogs using Opinion Mining Classification Algorithm " International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Volume 2 Issue 10, October 2013.


Paper Type : Research Paper
Title : Ensuring security for Fixed Block Level Deduplication in Cloud Backup
Country : India
Authors : Akhila K || Amal Ganesh || Sunitha C

Abstract: In the digital world, data is of prime importance for individuals as well as for organizations. As the amount of data being generated increases exponentially with time, duplicate data contents being stored cannot be tolerated. Thus, employing storage optimization techniques is an essential requirement to large storage areas like Cloud. Deduplication is one such storage optimization technique that avoids storing duplicate copies of data. Deduplication over encrypted data brings about more effective storage optimization in large storage areas like Cloud, since such storage areas are resident more of encrypted data. Data deduplication techniques used in large storage areas are widely applied over unencrypted data at file level..........
Keywords: Deduplication; Convergent encryption; Cloud storage; Proof of Ownership

[1] Akhila, K., Amal Ganesh, and C. Sunitha. "A Study on Deduplication Techniques over Encrypted Data." Procedia Computer Science 87 2016 – Elsevier : 38-43.
[2] J. Douceur, A. Adya, W. Bolosky, D. Simon, and M. Theimer. "Reclaiming space from duplicate files in a serverless distributed file system. In Distributed Computing Systems", 2002. Proceedings. 22nd International Conference on, pages 617{624. IEEE, 2002.
[3] Dropbox http://www.dropbox.com.
[4] AmazonS3 http://aws/amazon.com/s3s.
[5] GoogleDrive http://www.drive.google.com.

Paper Type : Research Paper
Title : Effective Data Hiding Scheme For Video in Encrypted Domain with Tampering Detection
Country : India
Authors : R. Aparna || Ajish S

Abstract: Usually encrypted videos when tampered by a third party can be easily detected at the receiver side as the decoder may crash. But there can be instances where the tampering is done such that the compression parameters alone are changed. The paper proposes a novel scheme of tamper detection using the data hidden in encrypted video. The video is first encrypted to ensure perceptual security and then data is embedded into the encrypted video for tamper detection. Two sensitive parameters namely IPM and MVD are selected for encryption . The codewords of levels are used for data hiding. The data embedded is used for tamper detection. Both the encryption and data hiding is done such that the file size is preserved and format compliance is achieved after encryption and data hiding.

Keywords- Data Hiding, Encryption, Codeword Substitution, Tampering Detection, Video Security

[1]. W. J. Lu, A. Varna, and M. Wu, "Secure video processing: Problems and challenges," in Proc. IEEE Int. Conf. Acoust., Speech, Signal Processing, Prague, Czech Republic, May 2011, pp. 5856–5859.
[2]. B. Zhao, W. D. Kou, and H. Li, "Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol," Inf. Sci., vol. 180, no. 23, pp. 4672–4684, 2010.
[3]. P. J. Zheng and J. W. Huang, "Walsh-Hadamard transform in the homomorphic encrypted domain and its application in image watermarking," in Proc. 14th Inf. Hiding Conf., Berkeley, CA, USA, 2012, pp. 1–15.
[4]. X. P. Zhang, "Reversible data hiding in encrypted image," IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255–258, Apr. 2011.
[5]. W. Hong, T. S. Chen, and H. Y. Wu, "An improved reversible data hiding in encrypted images using side match," IEEE Signal Process. Lett., vol. 19, no. 4, pp. 199–202, Apr. 2012.


Paper Type : Research Paper
Title : Secure Key Generation over Noisy Fingerprints With Intruder Detection
Country : India
Authors : Aparna A || Ajish S

Abstract: The design of a reliable and secure communication channel for the transfer of confidential data is one of the primary researched topics in the field of security. The most important entity in a secure communication process is the cryptographic key that is used for encryption and decryption purposes. The key used in such a process must be extremely strong so that it is untraceable to attackers. Many methods have been proposed for generating a secure key ranging from biometric techniques to that of the modern quantum cryptography. An innovative approach to generate a shared key between two users is to exploit the contextual information present in the environment the users are in...............

Keywords: Audio Fingerprinting, Ambient Audio, Key Generation, Cryptography

[1] DominikSchurmann and Stephan Sigg, Member, IEEE Computer Society, ―Secure Communication on Based on Ambient Audio‖, IEEE Transactions On Mobile Computing, Vol. 12, No. 2, February 2013.
[2] R. Mayrhofer and H. Gellersen, ―Spontaneous Mobile Device Authentication Based on Sensor Data,‖ Information Security Technical Report, vol. 13, no. 3, pp. 136-150, 2008.
[3] D. Bichler, G. Stromberg, M. Huemer, and M. Loew, ―Key Generation Based on Acceleration Data of Shaking Processes,‖Proc. Ninth Int'l Conf. Ubiquitous Computing, J. Krumm, ed., 2007.
[4] L.E. Holmquist, F. Mattern, B. Schiele, P. Schiele, P. Alahuhta, M. Beigl, and H.W. Gellersen, - Smart-Its Friends: A Technique for Users to Easily Establish Connections Between Smart Artefacts,‖Proc. Third Int'l Conf. Ubiquitous Computing, 2001.
[5] A. Varshavsky, A. Scannell, A. LaMarca, and E. de Lara, ―Amigo: Proximity-Based Authentication of Mobile Devices,‖ Int'l J. Security and Networks, vol. 4, pp. 4-16, 2009.


Paper Type : Research Paper
Title : Preemptive EDF And Round Robin Scheduling Schemes For Real Time Wireless Networks
Country : India
Authors : Priscilla Joy.R || Dheeba.J

Abstract: The existing scheduling schemes were by means of the First Come First Serve(FCFS) scheduling for scheduling the real time tasks. Derived from the (Dynamic Multilevel Priority) DMP scheduling scheme [1] the real time tasks which scheduled by FCFS which proceed deadlock. To conquer this problem this paper proposes to schedule the real time task by means of preemptive (Earliest Deadline First) EDF. This will prevail over the deadlock. In addition to that the non-real time tasks will also be scheduled using the round robin scheduling. So that it will be scheduled in a circular fashion which in turn will reduce the delay and overhead in so doing increasing the throughput and packet delivery ratio. Consequently the overall performance will be improved.

Keywords:- Deadlock, end-to-end delay, overhead, priority, round robin, scheduling, task

[1]. N. Nasser, L. Karim and T. Taleb, "Dynamic Multilevel Priority Packet Scheduling Scheme for Wireless Sensor Network," in IEEE Transactions on Wireless Communications, vol. 12, no. 4, pp. 1448-1459, April 2013.
[2]. V. Gamini Abhaya, Z. Tari, P. Zeephongsekul and A. Y. Zomaya, "Performance Analysis of EDF Scheduling in a Multi-Priority Preemptive M/G/1 Queue," in IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 8, pp. 2149-2158, Aug. 2014.
[3]. A. Manirabona, S. Boudjit and L. C. Fourati, "A Priority-Weighted Round Robin scheduling strategy for a WBAN based healthcare monitoring system," 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, 2016, pp. 224-229.

[4]. Sohel A. Bhura, A. S. Alvi'Scheduling Real-Time Transactions Using Deferred Preemptive Technique" Volume 380 of the series Advances in Intelligent Systems and Computing pp 631-638

[5]. F. Eisenbrand, N. Hähnle, M. Niemeier, M. Skutella, J. Verschae, and A. Wiese. Scheduling periodic tasks in a hard real-time environment. Technical report, EPF Lausanne & TU Berlin, February 2010.


Paper Type : Research Paper
Title : Faster Image Feature Extraction Hardware
Country : India
Authors : Jibu J.V || Sherin Das || Mini Kumari G

Abstract: Scale Invariant Feature (SIFT) has many applications in different fields especially in computer vision. Several improved version of SIFT were proposed after David Lowe proposed" Distinctive Image Features from Scale Invariant key points "in 2004[1].Many people tried to improve sift features by adding some features to original SIFT.SURF, n-dimensional SIFT, CSIFT,GSIFT are some of them. One of the major constraint of SIFT in real time is its computational delay. Because of its computational complexity and large time delay its hardware implementation is a challenging task ............

Keywords: Sift, FPGA, Feature Detection, Image Matching,Computer Vision

[1]. Jie Jiang, Xiaoyang Li, and Guangjun SIFT Hardware Implementation for Real-Time Image Feature Extraction IEEE transactions on circuits and systems for video technology, vol. 24, no. 7, july 2014
[2]. Lifan Yao , Hao Feng , Yiqun Zhu , Zhiguo Jiang, Danpei Zhao, Wenquan Feng.An Architecture of Optimised SIFT Feature Detection for an FPGA Implementation of an Image Matcher. 978-1-4244-4377-2/09/ 2009 IEEE .
[3]. D. G. Lowe, "Distinctive image features from scale-invariant key points," Int. J. Comput. Vis., vol. 60, no. 2, pp. 91–110, Jan. 2004.


Paper Type : Research Paper
Title : Automatic Detection of Breast Cancer in Mammograms using Optimized Cascaded Network
Country : Saudi Arabia
Authors : Shamy Shabeer || J. Dheeba

Abstract: This paper presents a novel method for accurate early detection of breast cancer to reduce the mortality rate. Masses and micro calcification clusters are an important early signs of breast cancer. However, it is often difficult to distinguish abnormalities from normal breast tissues because of their subtle appearance and ambiguous margins. Computer aided diagnosis (CAD) helps the radiologist in detecting the abnormalities in an efficient way. This paper investigates a new classification approach for detection of breast abnormalities in digital mammograms using Particle Swarm Optimized cascaded coreelation Neural Network (SOCCN)...........

Keywords— Breast cancer, cascaded correlation, laws, mammograms, particle swarm optimization

[1] Freer, T.W. and Ulissey, M.J. "Screening Mammography with Computer-aided Detection: Prospective Study of 12,860 Patients in a Community Breast Center", Radiology, Vol. 220, pp. 781-786, 2001.
[2] Giger, M.L., Karssemeijer, N. and Armato, S.G. "Computer aided diagnosis in Medical Imaging'', IEEE Transactions on Med. Imaging Vol. 20, No. 12, pp. 1205-1208, 2001. [3] Thurfjell, E.L., Lernevall, K.A. and Taube, A.A. "Benefit of Independent Double Reading in a Population based Mammography Screening Program", Radiology, Vol. 191, No.1, pp. 241-244, 1994.
[4] Dheeba, J. and Tamil Selvi, S. "Cascaded Correlation Neural Network based Microcalcification detection in Mammographic Images", Advances in Intelligent and Soft Computing, Springer, Vol.132, pp.153-160, 2012.
[5] Anna N. Karahaliou, Ioannis S. Boniatis, Spyros G. Skiadopoulos, Filippos N. Sakellaropoulos, Nikolaos S. Arikidis, Eleni A. Likaki, George S. Panayiotakis and Lena I. Costaridou, "Breast Cancer Diagnosis: Analyzing Texture of Tissue Surrounding Microcalcifications", IEEE Transactions on Information Technology in Biomedicine, Vol. 12, No. 6, pp. 731-738, 2008.


Paper Type : Research Paper
Title : Enhanced Malware Monitor in SDN using Kinetic Controller
Country : India
Authors : Jiphi T S || Simi Krishna K R

Abstract: Software Defined Networking introduced significant granularity, visibility and flexibility to networking, but at the same time brought forth many security challenges. So, many of the security measures have to be brought to SDN which are used in traditional networks. One such concept is Malware Monitor, which combines the advantage of a distributed detection performing NIDS with SDN. It allows for integration into existing hardware. It is faster and more flexible in threat blocking. But one of the fundamental challenges is to build and deploy effective detection systems in highly dynamic environments where maintaining host and network state information is very difficult. The objective of this work is to formulate a mechanism to build an effective system that can cope with highly dynamic environments. This will ensure high security in those networks.

Keywords - Malware, Openflow, Programmable Networks, SDN

[1] Zainab Abaid, Mohsen Rezvani and Sanjay Jha, MalwareMonitor: An SDN-based Framework for Securing Large Networks, CoNext Student Workshop'14, 2(12), 2014.
[2] Chapter 4 - How SDN works, 2014 Elsevier Inc.
[3] Hyojoon Kim, Joshua Reich, Arpit Gupta, Muhammad Shahbaz, Nick Feamster and Russ Clark, Kinetic: Verifiable Dynamic Network Control, 12th USENIX Symposium on Networked Systems Design and Implementation, 2015, 59-72.
[4] Hongxin Hu, Wonkyu Han, Gail-Joon Ahn, and Ziming Zhao, FLOWGUARD: Building Robust Firewalls for Software-Defined Networks, HotSDN'14, 22(8), 2014.
[5] Jiphi T S and Simi Krishna K R, A Survey on SDN Controllers, Proc. 17th National Conference on Technological Trends, Trivandrum, Kerala, 2016, 863-866.


Paper Type : Research Paper
Title : Review on Copy Move Image Forgery Detection Methods
Country : India
Authors : Ameera Beegom J || Akhil Paulose || Deepa S S

Abstract: In today's contemporary life, digital images have momentous importance because they have become a prominent source of information distribution. However, the increased usage of image changing tools made it easier to forge the contents of a digital image; making the truthfulness untruthful. Many techniques can be used to falsify the digital images. Copy move forgery is a method where a definite part of an image is copied and pasted elsewhere in the same image to cover unwanted part or object............

Keywords: Passive, Copy move, Forensics, Forgery, Authenticity, Digital image

[1]. David G. Lowe., "Distinctive Image Features from Scale-Invariant Key-Points", International Journal of Computer Vision ,2004,60(2), pp.91-1
[2]. Xu Bo, Wang Junwen, Liu Guangie and Dai Yuewei., "Image Copy-Move forgery Detection Based on Surf", International Conference on Multi-media Information Networking and Security, 2010 , pp.889-892
[3]. Mohammad Farukh Hashmi, Aaditya Hambarde., "Copy move forgery detection using DWT and SIFT", International Conference on Intelligent System Design and applications, 2013, pp.188-193.
[4]. J. Fridrich, D. Soukal, and J. Lukas, "Detection of Copy-Move Forgery in Digital Images", in Proceedings of Digital Forensic Research Workshop, August 2003
[5]. Neha Jadhav, Suvarna Kharat, Punam Nangare,"Copy-Move Forgery Detection using DCT", International Journal for emerging Technologies and Engineering, Vol 2 Isuue 3 March 2015, ISSN 2348-8050.


Paper Type : Research Paper
Title : Power Draining Vampires in Wireless Ad hoc networks: Detection and Prevention
Country : India
Authors : Anoopa S || Jayaprabha P

Abstract: Ad-hoc low-power wireless networks are the most promising research direction in sensing and pervasive computing. Prior security work in this area has focused primarily on denial of service at the routing or medium access control levels. Earlier, the resource depletion attacks are considered only as a routing problem, very recently these are classified in to a new group called vampire attacks. This thesis work explores the identification of resource depletion attacks at the routing protocol layer and in the application layer, which permanently disable networks by quickly draining nodes' battery power.........

Keywords – Vampires in networks, Wireless Ad-Hoc network power drainage, PLGPa algorithm, vampire detection etc.

[1]. Tao Shu and Marwan Krunz, Fellow IEEE, Privacy –preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad hoc Networks, IEEE Transactions on Mobile Computing,volume 14, No.4 , published on April 2015(pages 813-827)
[2]. E Y Vasserman , N Hopper ,Vampire Attacks: Draining life from wireless Ad hoc sensor networks, IEEE Transactions on Mobile Computing,volume 12, issue 2 , published on feb 2013(pages 318-332)
[3]. Bryan Parno, Mark Luk, Evan Gaustad, and Adrian Perrig, Secure sensor network routing: A clean-slate approach, CoNEXT, 2006.
[4]. INSENS: Intrusion-tolerant routing for wireless sensor networks, Computer Communications 29 (2006), no. 2.
[5]. Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly, Denial of service resilience in ad hoc networks, MobiCom, 2004.


Paper Type : Research Paper
Title : Implementation of a Model for Web Mining Based on Web Usage
Country : India
Authors : Jayaprabha P || Dr.Paulose Jacob || Dr.Preetha Mathew || Bindu P K

Abstract: Web search engines are used to retrieve relevant information from the web. Current search engines are very fast in terms of their response time to a user query. From the huge volume of information, extracting relevant information is an application of data mining. There are different techniques used for extracting relevant information, such as sequential rules, self organizing map, association rules, genetic algorithm, cluster computing etc. In this paper we have explode the possibility of genetic algorithm for extracting relevent information.......

Keywords:-Genetic Algorithm,Self-Organizing Map,Web search engines.

[1] A. Z. Broder, S. C. Glassman, M. S. Manasse, and G. Zweig, "Syntactic clustering of the web," in Proc. 6th Int. WWW Conf., 1997, pp. 391–404
[2] S. K. Pal, A. Ghosh, and M. K. Kundu, Eds., Soft Computing for Image Processing. Heidelberg, Germany: Physica-Verlag, 2000
[3] Amit Kumar Mishra, Mahendra Kumar Mishra, Vivek Chathurvedi, Santhosh Kumar Guptha, Jaiveer Singh. "Web Usage Mining Using Self Organized Map."International Journal of Advanced Rearch in Computer Science and Software Engineering. Vol.3, June 2013
[4] W. Fan, M. Gordon and P. Pathak, "Genetic programming-based discovery of ranking functions for effective web search," Journal of Management Information Systems, vol 21(4), pp 37-56, 2005.
[5] W. Y. Lin, S. A. Alvarez, and C. Ruiz. Collaborative recommendation via adaptive association rule mining. presented at Int. Workshop Web Mining for E-Commerce (WEBKDD'00). [Online]http://robotiocs.stanford.edu/~ronnyk/WEBDD2000/papers/alvarez.pdf


Paper Type : Research Paper
Title : NLP Based Event Extraction from Text Messages
Country : India
Authors : Aneesh G. Nath || Krishnanth V || Kevin Biju Mathew || Pranav T S || Sarath Gopi

Abstract: Natural language processing has made its mark in many of the applications recently released. The process which helps in communication and handling natural language by machines has led to exploration in the field of computer science and machine learning. In this paper, we propose an application which extracts events from text messages and adds them to the calendar and notify on specific time. The text message is initially treated by a lexical analyzer and split into tokens and these tokens are taken in as the input to the POS tagging phase. After proper tagging it's provided to the parser..........

Keywords: Tokenizing; Grammar; Parser; Event Extraction; Kivy; Buildozer

[1]. Julie A. Black and Nisheeth Ranjan. Automated Event Extraction from Email. 2004.
[2]. Deyu Zhou,Liangyu Chen, Yulan He, " A Simple Bayesian Modelling Approach to Event Extraction from Twitter", 52nd Annual Meeting of the Association for Computational Linguistics, ACL 2014, vol. 2, pp.700-705, Jun 2014.
[3]. Cunningham, Hamish, et al. "Developing Language Processing Components with GATE (a User Guide)."2003.
[4]. Manning, Cristopher D. and Hinrich Schütze. Foundations of Statistical Natural Language Processing. Cambridge, MA: The MIT Press. 2003.
[5]. Califf, Mary Elaine and Raymond J. Mooney. "Bottom-Up Relational Learning of Pattern Matching Rules for Information Extraction." 2003.


Paper Type : Research Paper
Title : Mobile Ad-Hoc Disaster Management Using Cardinal Location Transmitting Sensor Embedded Device
Country : India
Authors : Jeya Sree M || Amar Pratap Singh J

Abstract: Communication systems in the managing of disaster relief operations are critical. The wi-fi structures are anticipated to carry out at their first-class in opposed conditions with confined resources considering the fact that lots of lives are at stake. past tragedies like tsunami, assaults, hurricane have highlighted the extreme flaws in the present information/communication exchange structures. In reaction to those tragedies, researchers are arising with higher solutions for wi-fi networks. on this paper, we propose a new routing protocol (Local Resection of Exposure Nodes Over Highly Dynamic Vector) for cardinal location transmitting sensor embedded mobile devices..............

Keywords: Disaster management, cardinal location, sensor networks, magnetometer, LRDV, localization

[1]. D. LI, J. WANG, L. ZHANG, H. LI and J. ZHOU, "A Cooperative Location Management Scheme for Mobile Ad Hoc Networks," Int'l J. of Communications, Network and System Sciences, Vol. 2 No. 8, 2009, pp. 732-741. doi: 10.4236/ijcns.2009.28084.
[2]. Integrated location management and location-aided routing system for mobile ad hoc networks, Zhang L, Muppala JK, Chanson ST, Journal of parallel and distributed computing, v. 66, (3), 2006, MAR, p. 367-378.J.
[3]. Geographical Routing With Location Service in Intermittently Connected MANETs, Kuiper E, Linkoping Univ, Linkoping, Sweden, Nadjm Tehrani S, Vehicular Technology, IEEE Transactions on Volume:60 , Issue: 2.
[4]. DoMaIN: A Novel Dynamic Location Management Solution for Internet-Based Infrastructure Wireless Mesh Networks, Weiyi Zhao, Jiang Xie, Parallel and Distributed Systems, IEEE Transactions on Volume:24 , Issue: 8.
[5]. Design of a Fast Location-Based Handoff Scheme for IEEE 802.11 Vehicular Networks, Almulla M., Yikun Wang, Boukerche, A, Zhenxia Zhang, Vehicular Technology, IEEE Transactions on Volume:63, Issue: 8.



IOSR Journals are published both in online and print versions.