IOSR Journal of Computer Engineering (IOSR-JCE)

International conference on computing and virtualization (ICCCV-17)

Volume 1

Paper Type : Research Paper
Title : Predicting User Goal in Personalized Web Search & Improvement Using Categorization
Country : India
Authors : Mrs.Geetha.S || Prof.RachanaDhannawat

Abstract: For the web users retrieving the most relevant information from the Web become difficult because of the huge amount of documents available in various formats. Personalized Web search approach can be used to satisfy the requirements of the user. It is a process that adapts information or services provided by a Web to the needs of each specific or set of users, taking the facts of the knowledge gained from the users. In this paper a method for deriving user search objective using user feedback sessions and mapping of these feedback..........

Keywords - Pseudo-documents, feedback sessions, clustering, classified average precision.

[1]. "A New Algorithm For Inferring User Search Goals With Feedback Sessions" By Zheng Lu, HongyuanZha, Xiaokang Yang, Weiyao Lin, And ZhaohuiZheng , pp.502-513,2013 IEEE
[2]. "Web-Page Recommendation Based on Web Usage and Domain Knowledge" byThanh Sang Nguyen, Hai Yan Lu, and Jie Lu, pp.2574-2587, 2014 IEEE
[3]. "A Collaborative Decentralized Approach to Web Search"by AthanasiosPapagelis and Christos Zaroliagis,pp 1271-1290 , 2012 IEEE
[4]. "Personalizing Web Directories with the Aid of Web Usage Data" by Dimitriosierrakos and George Palioura, pp 1331-1343, 2010 IEEE
[5]. "Uncertainty Analysis for the Keyword System of Web Events, byJunyuXuan, XiangfengLuo, Guangquan Zhang, Jie Lu, and ZhengXupp 829-842,2016 IEEE


Paper Type : Research Paper
Title : More Focus on Tax Evasion Detection with Graph Based Approach
Country : India
Authors : Komal Rokade || Rashmi Mane

Abstract: A tax is the source of government funding. The purpose of tax is to increase revenue to fund government. The money paid by taxpayers in taxes goes to many places. It is used to paying the salaries of government workers, tax money also help to support common resources, such as police and firefighters. Tax money helps to ensure the roads you travel on are safe and well-maintained. Taxes fund public libraries and parks. Tax evasion is increased so tax evasion detection is very important in current status to avoid loss of government funding.............
Keywords: Group mining, Tax evasion, TPIIN, trading data

[1]. W. F. Fox, L. Lunab, and G. Schau,"Destination Taxation and Evasion: Evidence from U.S. Inter-State Commodity Flows,"Journal of Accounting and Economics,vol.57, no. 1, pp. 43–57, Feb. 2014.
[2]. P. C. Gonz´l´cleza and J. D. Vel´l´csquez,"Characterization and Detection of Taxpayers with False Invoices Using Data Mining Techniques, "Expert Systems with Applications,vol.40, no. 5, pp. 1427–1436, Apr.2013.
[3]. R.-S. Wu, C. Ou, H. ying Lin, S.-I. Chang, and D. C. Yen, "Using Data Mining Technique to Enhance Tax Evasion Detection Performance, "Expert Systems with Applications,vol.39, no. 10, pp. 8769–8777, Aug.2012.
[4]. Y.S. Chen and C.-H. Cheng,"A Delphi-Based Rough Sets Fusion Model for Extracting Payment Rules of Vehicle License Tax in the Government Sector, "Expert Systems with Applications, vol. 37, no. 3, pp. 2161–2174,Mar.2010.
[5]. J.Han, M.Kamber, andj.Pei, data mining: concepts and techniques, Burlington, Massachusetts: Morgan Kaufmann, 2011.


Paper Type : Research Paper
Title : Verbal Authentication for Personal Digital Assistants
Country : India
Authors : Aaroh Gala || Devang Mistry || Somdev Mehta || Manish Potey

Abstract: Personal Digital Assistant (PDA) i.e. a handheld device interacting with human beings verbally and performing tasks that are usually performed by an assistant, has been a growing and continuously evolving technology in recent years. Technology is rapidly automating all the manual work. In such scenario, the concept of PDA where everyone can carry their very own assistant in their pockets and can use it anytime and anywhere without even having to reach their pockets (i.e. completely hands-free usage) proves out to be a great success for technological world...............

Keywords- PDA - Personal Digital Assistant, STT - Speech to Text, TTS- Text to Speech, API - Application Program Interface.

[1] Sarabjeet Singh, Yamini M "Voice Based Login Authentication For Linux" in 2013 International Conference on Recent Trends in Information Technology (ICRTIT).
[2] R.C. Johnsona,b, Walter J. Scheirera,c and Terrance E. Boulta,b "Secure voice based authentication for mobile devices: Vaulted Voice Verification" in 2012.
[3] Dong-Ju Kim, Kwang-Woo Chung, and Kwang-Seok Hong "Person Authentication using Face, Teeth and Voice Modalities for Mobile Device Security" IEEE transactions on Consumer Electronics, Vol 56, No.4 November 2010
[4] Jean-François Bonastre, Frédéric Bimbot, Louis-Jean Boë, Joseph P. Campbell, Douglas A. Reynolds, Ivan Magrin-Chagnolleau "Person Authentication by Voice: A Need for Caution" in EUROSPEECH 2003: GENEVA.
[5] Qi Li, Biing-Hwang Juang, Qiru Zhou and Chin-Hui Lee "Automatic Verbal Information Verification for User Authentication" in IEEE TRANSACTIONS ON SPEECH AND AUDIO PROCESSING, VOL. 8, NO. 5, SEPTEMBER 2000.


Paper Type : Research Paper
Title : Multi-Resolution Image Processing Techniques
Country : India
Authors : Harshula Tulapurkar || Rajesh Bansode

Abstract: A digital image is a representation of a two-dimensional image as a finite set of digital values, called picture elements or pixels. This pixel value represents various aspects of the image like color, brightness, etc. In recent years Multi-Resolution Analysis (MRA) techniques are applied for image analysis. MRA offers a framework for extracting information from image at various resolutions and can be applied to variety of problems in signal and image processing. It is believed that the Human Visual System (HVS) offers a hierarchical approach of extracting details from the view..............

Keywords: Multi Resolution, Frequency Domain, Discrete Wavelet Transform, Ridgelet Transform, Contourlet Transform, Curvelet Transform

[1] Sparse Image and Ridgelet Processing: Wavelets, Curvelets, Morphological Diversity(Jean-Luc Starck, Fionn
Murtagh, Jalal M. Fadili)
[2] Fundamental concepts & an overview of the wavelet theory(Robi Polikar)
[3] Digital Image Processing (R. C. Gonzales and R. E. Woods, Addison-Wesley Publishing Company, 1992)


Paper Type : Research Paper
Title : Data Concealment within Image Files using Visual Cryptography
Country : India
Authors : Yash Mehata || Garima Kaushik || Jesalkumari Varolia

Abstract: Digital Steganography is an science of hiding data in a medium carrier which in this paper is a cover image .On the other hand Visual Cryptography is a technique of dividing an image into a no of indecipherable part which a know as shares. Many algorithms have been proposed is the field of Steganography and Visual Cryptography with goal of improving security, reliability and efficiency in the field Computer Science. This paper discuss the combination of both the methodologies in which a secret message in divided into shares and hidden within cover images using SPIHT compression and LSB method for embedding shares in cover image.............

Keywords:- Steganography , Visual Cryptography , Digital Halftoning , SPIHT, LSB

[1] M. Naor and A. Shamir, "Visual cryptography" in Eurocrypt 94
[2] James .C .Judge "Steganography: Past, Present, Future" in SANS Institute Reading Room
[3] Young - Chang Hou, "Visual cryptography for color images," Pattern Recognition, Vol. 36, No. 7, pp. 1619 - 1629, 200
[4] Jesalkumari Joshi and R. R Sedamkar "Modified Visual Cryptography Scheme for Colored Secret Image Sharing" in IJCAT Vol. 2 Issue 3 Pg 350-356


Paper Type : Research Paper
Title : License Plate Recognition Using Convolutional Neural Network
Country : India
Authors : Shrutika Saunshi || Vishal Sahani || Juhi Patil || Abhishek Yadav || Dr. Sheetal Rathi

Abstract: In this world of new upcoming technologies which leads to our ease and comfortable life style, we also demand a comfortable traveling life, be it private or public vehicle. With increasing number of vehicles every day, it is very difficult to keep track of every vehicle manually to keep check on law enforcement, traffic control, stolen cars etc. Using OCR technology, we can automate the manual work of noting down the license plate number and then verifying it later which is time consuming and a tedious job especially with the ever increasing number of vehicles..............

Keywords: ALPR, Character Segmentation, Convolutional Neural Networks, Edge Detection, License Plate Extraction, Morphology, OCR.

[1] http://timesofindia.indiatimes.com/city/delhi/40-vehicles-stolen-in-Delhi-every-day/articleshow/14619149.cms
[2] S. Zhang, M. Zhang, and X. Ye, "Car plate character extraction under complicated environment," in Proc. IEEE Int. Conf. Syst. Man Cybern., vol. 5. Oct. 2004, pp. 4722–4726
[3] K. K. Kim, K. I. Kim, J. B. Kim, and H. J. Kim, "Learning-based approach for license plate recognition," in Proc. IEEE Signal Process. Soc. Workshop Neur. Netw. Signal Process, vol. 2. Dec. 2000, pp.614–623
[4] O. D. Trier, A. K. Jain and T. Text, "Feature Extraction Methods For Character Recognition- A Survey", Pattern Recognition, Vol. 29, No. 4, pp.641-662, 1996
[5] Anand Sumatilal Jain, Jayshree M. Kundargi; Automatic License plate Recognition Using Artificial Neural Network; IRJET Volume: 02 Issue: 04 | July-2015; e-ISSN: 2395-0056; p-ISSN: 2395-0072


Paper Type : Research Paper
Title : Home Automation System using Arduino
Country : India
Authors : Sunen Soni || Mayank Thanvi || Shivam Sharma || Sunil Yadav || Mr. Vikas Singh

Abstract: Automation is the key to the current trends (system) being followed to transform them into a better, faster and reliable technological solutions or systems. Automation refers to technique of making systems control themselves with a view to reduce human effort. With this principle came the idea of our project "Home Automation System". The proposed project controls electrical appliances and components at home to be automatically or remotely controlled by the system or by the user respectively. The backbone of this system is the Arduino UNO microcontroller and Wireless Ethernet shield which provides the interface between the user and the appliances............

Keywords— Automation, Arduino UNO, Wireless Ethernet Shield, Infrared.

[1] https://internetofthingsagenda.techtarget.com/definition/home-automation
[2] https://www.xfinity.com/resources/home-automation.html
[3] Ahmed El Shafee and Karim Alaa Hamed (2012), "Design and Implementation of a WiFi Based Home Automation System", World Academy of Science, Engineering and Technology, Vol. 6.
[4] Ankit Sood, Babalu Sonkar, Atul Ranjan, "Microcontroller Based LPG Gas Leakage Detector Using GSM Module", International Journal of Electrical and Electronics Research, Vol. 3, Issue 2.
[5] https://create.arduino.cc/projecthub/BuddyC/ir-controller-for-air-conditioner-5bd0a2


Paper Type : Research Paper
Title : Eatery Directory Using Recommendation System and Data Mining
Country : India
Authors : Dr Sheetal Rathi || Rohan Rander || Parth Sanghvi || Swet Shah

Abstract: Many recommender system has been developed in recent years which recommends the users based on reviews such as Zomato, Netflix etc. but there is a dearth of such system developed for local eateries hotspot in a particular area. In this project, a local food eatery recommender system is built based on reviews, likes and data mined from different websites, blogs and social media such as Facebook, Twitter etc. We are using different API's for extracting data from social media such as Graph API for Facebook, Tweepy for Twitter etc. On the data extracted we are using collaborative filtering technique and ranking algorithm for recommending the eatery hotspot based on reviews and likes................

Keywords - Collaborative filtering, Graph API – Application Program Interface,Mining, Recommendation system, Tweepy.

[1] Hosein Jafarkarimi; A.T.H. Sim and R. Saadatdoost "A Naïve Recommendation Model for Large Databases", International Journal of Information and Education Technology, June 2012.
[2] http://files.grouplens.org/papers/FnT%20CF%20Recsys%20Survey.pdf.
[3] Xiaoyuan Su & Taghi M. Khoshgoftaar, "A Survey of Collaborative Filtering Techniques", Advances in Artificial Intelligence, Volume 2009 (2009), Article ID 421425.
[4] Garcia Esparza S, O'Mahony MP, Smyth B (2010) "Effective product recommendation using the real-time web". 30th SGAI International Conference on Innovative Techniques and Applications of Artificial Intelligence
[5] Leung CWK, Chan SCF, Chung F (2006) "Integrating collaborative filltering and sentiment analysis: A rating inference approach". ECAI 2006 Workshop on Recommender Systems.


Paper Type : Research Paper
Title : Sentiment Analysis of Movie Ratings System
Country : India
Authors : Sagar Chavan || Akash Morwal || Shivam Patanwala || Prachi Janrao

Abstract: Sentiment analysis also term as refers to the use of natural language processing, text analysis and computational linguistics to identify and extract subjective information in source materials. In recent years, Opinion mining is a hotspot in the field of natural language processing, and it is also a challenging problem Sentiment analysis is widely applied to reviews and social media for a variety of applications, ranging from marketing to customer service. Movie reviews are an important way to gauge the performance of a movie. The objective of this paper is to extract features from the product reviews and classify reviews into positive, negative............

Keywords: Movie Review Mining, Pre-processing, Sentiment Analysis, Stemming

[1]. Vishal Gupta and Gurpreet S. Lehal, a Survey of Text Mining Techniques and Applications, Journal of Emerging Technologies in Web Intelligence, Vol. 1, No. 1, August 2009.
[2]. A.Jeyapriya and C.S.Kanimozhi Selvi Extracting Aspects and Mining Opinions in Product Reviews Using Supervised LearningAlgorithm

[3]. V. P. H. Binali and W. Chen. A State Of The Art Opinion Mining and Its Application Domains. In IEEE International Conference On Industrial Technology, Pages 1–6, February 2009.

[4]. Su, Et Al, "Hidden Sentiment Association in Chinese Web Opinion Mining"

[5]. M.F. Porter, An Algorithm For Suffix Stripping, Program, Vol. 14, No. 3, Pp. 130-137, 1980.


Paper Type : Research Paper
Title : Quadcopter for Rescue Missions and Surveillance
Country : India
Authors : Pooja Srivastava || Tejaswi Ninawe || Chitral Puthran || Vaishali Nirgude

Abstract: The aim of this research paper is to design a light weight quadcopter system using budget friendly Raspberry pi. The quadcopter will be controlled from a laptop or a RC (Remote controller) from a certain distance wirelessly. This small and highly manageable system would acquire data such as video/images from a camera installed in the quadcopter and send them to the base station. The project would have an impact on carrying out future rescue missions and would provide visual and audio aid to the people in distress. It will have the ability to help assist, locate and save victims, faster with more efficiency than any other option. It could also be used as a measure for survey or surveillance.

Keywords – Raspberry-pi, Quadcopter, Remote Controller, rescue mission, surveillance.

[1] Dhriti Raj Borah et al., "A review on Quadcopter Surveillance and Control", ADBU-Journal of Engineering Technology, 4(1), 2016, 116-119

[2] Prof.A.V.Javir, Ketan Pawar, Santosh Dhudum, et al., "Design, Analysis and Fabrication of Quadcopter", Journal of The International Association of Advanced Technology and Science, vol. 16, 2015

[3] Yiwen Luo, Meng Joo Er, et al., "Intelligent Control and Navigation of an Indoor Quad-copter", IEEE, 2014, 1700-1705.

[4] Gordon Ononiwu, Arinze Okoye, et al., "Design and Implementation of a Real Time Wireless Quadcopter for Rescue Operations", American Journal of Engineering Research, 5(9), 2016, 130-138.

[5] Prabhjot Singh Sandhu, "DEVELOPMENT OF ISR FOR QUADCOPTER", International Journal of Research in Engineering and Technology, 03(4), 2014, 181-189


Paper Type : Research Paper
Title : Detecting and Changing Brain Waves Using Sound Wave Interception
Country : India
Authors : Dhaval Patanwadia || Rohan Gandhi || Daizy Bhadresha || Vaishali Nirgude

Abstract: Currently, a lot of people complain from stress and tension and require a device or method for stress relief. At the same time, similar problems of people not being able to make their mind active and feel lazy and bored to do tasks have also been found. Recently, the research for a system that is able to obtain the relaxation effect has been actively performed. For example, in a system where the user is presented with various sounds, the relaxation effect is measured from the brainwaves, heartbeat, and so on. Thus it was proved to be possible to change the state of brain by providing sound input to the users..............

Keywords:- Brain computer interface, brain waves, EEG, Electroencephalography, fuzzy logic, neural networks, sound, supervised learning.

[1] What are Brainwaves? Types of Brainwaves, http://www.brainworksneurotherapy.com/what-are-brainwaves, visited on 15th January, 2017.
[2] M. Teplan, A. Krakovska, "EEG responses to long-term audio-visual stimulation", International Journal of Psychophysiology, 2006, pp. 81-90.


Paper Type : Research Paper
Title : Placement Test Web Portal
Country : India
Authors : Anand Singh || Aishwary Shukla || Maulik Sharma || Rahul Yadav || Vidyadhari Singh

Abstract: Placement Web Portal is a system which aims at providing an easy and automated system for conducting placements during Campus Recruitment Drive. If placement process is conducted manually, then a lot of additional paperwork needs to be done; it requires a lot of time. This system will eradicate all manual work, by automating the information collection procedure, conduction of tests, displaying of results, as well as, storing it, notifying the eligible students via. Email and SMS..............

Keywords: Student Analysis, Sentiment Analysis, Automation, SMS, Test

[1]. Priyanka Hajare, Priyanka Khandave, Shital Adhav, Swati Pimpale, Prof. Anagha Kulkarni, "Implementation of Online Placement System".International Journal of Emerging Research in Management & Technology ISSN: 2278-9359, Vol.5, Issue 1, January 2016


Paper Type : Research Paper
Title : Leave and Payroll Management System
Country : India
Authors : Manish Singh || Prachi Singh || Rohil Singh || Shubham Singh || Shiwani Gupta

Abstract: Management of leave and payroll are critical operations for each institution as it has effect on payment of staff memebers of any institution and also to complete it accurately and on time. The Current Leave and Payroll Manager both are paper based systems. Though the attendance is Biometric but still it is not that much efficient in terms of matters related to leave management. Manual payment calculation of staff members is too complex and it even takes lot of time and also requires lot of efforts. So if these processes are automated, it would be of great benefit as it would require less time to calculate the salary of the employees. So, a web application that has a payroll management system is considered as one of the way here..............

Keywords: Leave management, Payroll management, Biometrics.

[1]. Arjun V. Singh, Siddesh V. Chaphekar, Yogesh S. Sawant (2016) "Automated Payroll System" University of Mumbai, Department of Computer Science.
[2]. Kritika Mahajan, Shilpa Shukla, Nitasha Soni (2015) "A Review of Computerized Payroll System" University of Lingaya, Department of Computer Science.
[3]. Poonamdeep Kaur, Dr. Dinesh Grover (2012) "Computer Based Payroll System Implementation for E-Governance at Punjab" Agricultural University, Department of Computer Science.
[4]. http://accounting-financial-tax.com/2012/07/how-does-payrollprocess-work-with-flowchart/
[5]. http://www.scribd.com/doc/21877936/Payroll-Management-System#scribd


Paper Type : Research Paper
Title : A Survey of Potential Security Threats and Counter-Measures in SDN: An IoT Enabling Technology
Country : India
Authors : Trupti Lotlikar || Deven Shah

Abstract: The exponential growth of new applications and services in both mobile devices and fixed terminals has made the communication networks a crucial point at homes and enterprises. This results in the development of new IoT applications connecting heterogeneous devices to the internet. Internet of Things (IoT) and Software defined network (SDN) can be integrated together to eliminate the use of traditional point to point connection between heterogeneous devices. Securing such complex heterogeneous networks is however a real challenge in network security. This paper focuses on various potential security challenges in SDN such as saturation attacks, denial of service (DoS) attack and its countermeasures. This paper is a step to further initiate research in SDN security as it is crucial enabler technology for IoT

Keywords: Internet of Things, Software defined network, SDN security

[1]. John A Stankovic, Life fellow "Research Directions for the internet of Things" IEEE 2014 internet of things journal, vol. 1, no. 1, February 2014.
[2]. Charles Gomez and Joseph Paradells, Technical University of Catalonia "Wireless Home Automation Networks: A Survey of Architectures and Technologies" by, published in IEEE Communications Magazine, June 2010
[3]. Pedro Martinez-Julia and Antonio F. Skarmeta "Empowering the Internet of things with Software Defined Networking" [white paper] in June 2015.
[4]. Diego KreutzFernando , M. V. Ramos, Paulo Verissimo, University of Lisbon, Portugal "Towards secure and dependable software defined networks" published in IEEE journal , August 2013.
[5]. M.K Shin, K.H.Nam, and H. J.Kim "Software-defined networking (SDN): A reference architecture and open APIs" published at published by IEEE Journal at ICT Convergence(ICTC) international conference in October 2012


Paper Type : Research Paper
Title : Face Recognition in Videos using Gabor Filter
Country : India
Authors : Swapnil V Tathe || Sandipan P Narote

Abstract: In the past decade, advances in computer vision have lead automated security applications to high altitude. Human face detection in video sequences is a challenging problem in computer vision. It has wide range of applications in human recognition, human computer interaction (HCI), behavior analysis, teleconferencing, video surveillance etc. Faces serve as an identifying element of human anatomy. In this paper background subtraction is used to detect moving objects in videos. Real-time Viola's Haar face detector is used for detecting faces in moving regions of video frames............

Keywords: Background Subtraction, Face Detection, Face Recognition, Gabor Filter, Haar.

[1]. X. Zhang, J. Ding, An improved adaboost face detection algorithm based on the different sample weights, in: IEEE 20th International Conference on Computer Supported Cooperative Work in Design, 2016, 436–439.
[2]. H. Yang, L. Shao, F. Zheng, L. Wang, Z. Song, Recent advances and trends in visual tracking: A review, Neuro Computing, 74 (18) 2011, 1–9.
[3]. M. A. A. Dewan, E. Granger, G.-L. Marcialis, R. Sabourin, F. Roli, Adaptive appearance model tracking for still-to-video face recognition, Pattern Recognition 49, 2016, 129 – 151.
[4]. P. Viola, M. Jones, Rapid object detection using a boosted cascade of simple features, in: Proceedingsof the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 1, 2001, 511–518.
[5]. Y. Benezeth, P.-M. Jodoin, B. E. H. Laurent, C. Rosenberger., Comparative study of background subtraction algorithms, Journal of Electronic Imaging, 19 (3) , 2010.


Paper Type : Research Paper
Title : ERP System for Small and Medium Sized Printing Industries
Country : India
Authors : Akshay Dudani || Hitesh Hinduja || Khushboo Jethwani || Varun Golani || Gresha Bhatia

Abstract: The number of processes to manage in a printing industry becomes very complex to manage. On the given requirements the goal is to create an overall system that manages the tasks such as stock management, accounting, employee management, machine status management, order tracking. The development based on many components is advantageous for building the ERP system according to business needs and makes the maintenance and upgrading becomes more convenient. This paper also tells us about how the business requirements are achieved by the ERP system.

Keywords: ERP, FCFS scheduling, Printing industry, Priority scheduling, Queue.

[1]. Wenjie Yang,HaoXue Liu,Jie Shi, The Design of Printing Enterprise Resources Planning (ERP) Software Published in year 2010
[2]. Taolin Ma,Xiaoming Chen,Yansong Sun,Xiurong Li, The Research and development of IMIS for Small and Medium-sized Printing Enterprise Published in year 2009
[3]. Dr.BrotoRauth Bhardwaj, Sustainable Supply Chain Management Through Enterprise Resource Planning (ERP) Published in year 2014
[4]. Case study on commercial printing management software, http://findaccountingsoftware. com/expert-advice/case-study-round-up-commercial-printing-business-management-software/
[5]. Chunpeng Li1, 2, Yinyin Wang1, 2, ERP Application Research in Small and Medium-sized Printing Enterprises Published in year 2015


Paper Type : Research Paper
Title : Dynamic S-Box In Aes Algorithm in Cloud Environment
Country : India
Authors : Mr.Yash Shah || Mr.Anand Khandare

Abstract: Cloud computing today is the one of the most booming area of research and development in present scenario. The proliferation of computer usage and their interconnections through network have increased the need of protection of information stored against viruses, hackers, eavesdroppers, and electronic data deception. Although these threats require a variety of countermeasure, encryption process is a primary method of protecting valuable electronic information. The encryption process also needs to be dynamic in order to face new technique and more advance methods used by cryptanalysis. Substitution box (S-box) is keystone of modern symmetric cryptosystem.............

Keywords: Type your keywords here, separated by semicolons;

[1]. L. Scripcariu, "A Study of Methods Used To Improve Encryption Algorithms Robustness", IEEE 978-1-4673-7488-0/15/©2015.
[2]. Karim Djemame ,"A Risk Assessment Framework for Cloud Computing",IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. X, NO. Y, SEPTEMBER 2013.
[3]. Xiang Li, "An Improved AES Encryption Algorithm", Second International Conference on Emerging Applications of Information Technology, 2011.
[4]. Evgeny Pyshkin, "A Provisioning Service for Automatic Command Line Applications Deployment in Computing Clouds",IEEE International Conference on High Performance Computing and Communications, 2014.
[5]. B.Thiyagarajan, "Data Integrity and Security in Cloud Environment Using AES Algorithm",ICICES 2014.



IOSR Journals are published both in online and print versions.