IOSR Journal of Computer Engineering (IOSR-JCE)

International Conference on Advances in Engineering & Technology – 2014 (ICAET-2014)

Volume 2

Paper Type : Research Paper
Title : Parallel Implementation of Apriori Algorithm
Country : India
Authors : Nilesh.S.Korde, Prof.Shailendra.W.Shende

Abstract: Association rule mining concept is used to show relation between items in a set of items. Apriori algorithm for mining frequent itemsets from large amount of database is used. Parallelism is used to reduce time and increase performance, Multi-core processor is used for parallelization. Mining in a Serial manner can consume time and reduce performance for mining. To solve this issue we are proposing a work in which load balancing is done among processors. Our work is based on serial and parallel implementation of Apriori algorithm and comparison of both on the basis of time and varying support-count. For parallelization most widely used parallel programming technique Open Multi-Processing (OpenMP) can be used.

Keywords –Apriori, Data mining, Multi-core processor, OpenMP, Parallel processing

[1] Jiawei Han and Micheline Kamber, Data Mining concepts and Techniques2nd edition Morgan Kaufmann Publishers, San Francisco2006.

[2] Anuradha.T, Satya Pasad R and S N Tirumalarao. Parallelizing Apriori on Dual Core using OpenMP. International Journal of Computer Applications 43(24):33-39, April 2012. Published by Foundation of Computer Science, New York, USA.

[3] Chao-Tung Yang, Tzu-Chieh Chang, Hsien-Yi Wang, William C.C. Chu, Chih-Hung Chang. Performance Campion with OpenMP Parallelization for Multi-core Systems. Ninth IEEE International Symposium on Parallel and Distributed Processing with Applications, 2011 IEEE, pp 232-237.

[4] Ying Liu, Fuxiang Gao. Parallel Implementations of Image Processing Algorithms on Multi-Core. 2010 Fourth International Conference on Genetic and Evolutionary Computing, 2010 IEEE, pp 71-74.

[5] Agrawal R, Srikant R ―Fast algorithms for mining association rules‖ In: Proceedings of the 1994 international conference on very large data bases (VLDB‟94), 1994 Santiago, Chile, and pp 487–499

[6] Ketan D. Shah, Dr. (Mrs.) Sunita Mahajan. Performance Analysis of Parallel Apriori on Heterogeneous Nodes. 2009International Conference on Advances in Computing, Control, and Telecommunication Technologies, 2009 IEEE, pp 42-44.

[7] Anuradha.T, Satya Prasad.Parallelizing Apriori on Hyper-Threaded Multi-Core Processor.International Journal of Advanced Research in Computer Science and Software Engineer. Volume 3, Issue 6, June 2013.

[8] Zhong Zheng, Xuhao Chen, Zhiying Wang, Li Shen, Jiawen Li. Performance Model for OpenMP Parallelized Loops. 2011International Conference on Transportation, Mechanical, and Electrical Engineering(TMEE) December 16-18, Changchun, China, 2011 IEEE, pp 383-387.

Paper Type : Research Paper
Title : Inter-Infrastructure and Vehicle Communication for Traffic Information Sharing in VANET
Country : India
Authors : Shraddha .S. Meshram, Prof. Mrs. S. S. Golait, Prof. Mr. N. A. Ghodichor

Abstract: Establishment of vehicular ad-hoc network is most demanding in smart traffic management system. By sharing the information between traffic system, road side unit and vehicles research can create vehicular network. Automatic detection of road signs has recently received attention from the computer vision research community. The main objective of this system is to detect signs from a moving vehicle. Road Traffic Sign Detection is a technology by which a vehicle is able to recognize the traffic signs put on the .we are proposing the system which will use one signal transmitter in each and every symbol or message board at road side and whenever any vehicle passes from that symbol the receiver situated inside the vehicle will receive the signals and display proper message or the symbol details on display connected in car. Now driver can concentrate on driving Position information is a fundamental requirement for many vehicular applications such as navigation, intelligent transportation systems (ITSs), collision avoidance, and location based services (LBSs)...

Keywords: Ad hoc network, Road Traffic Sign, Symbols, VANET.

[1].Nazmus S. Nafi and Jamil Y. Khan, "A VANET Based Intelligent Road Traffic SignalingSystem", School of Electrical Engineering &Computer Science, December-2012 IEEE.

[2].Nazish Khan, Dr. Anjali Mahajan, "Centralized Framework with Ring Broadcasting for Real-time Traffic in Vehicular Ad hoc Networks" Third International Conference on Emerging Trends in Engineering and Technology, October-2010 IEEE.

[3].KaoutherAbrougui, AzzedineBoukerche, "Location-Aided Gateway Advertisement and Discovery Protocol for VANets " IEEE Transactions on Vehicular Technology VOL. 59, No. 8, October 2010.

[4].NimaAlam, AsgharTabatabaeiBalaei, and Andrew G. Dempster, "Relative Positioning Enhancement inVANETs: A Tight Integration Approach" IEEE Transactions on Intelligent Transportation Systems VOL.14, No. 1, March 2013.

[5].Xiaoya n Yin, and Kishor S. Trivedi, "Design and Analysis of a Robust Broadcast Scheme for VANET Safety-Related Services" IEEE Transactions on Vehicular Technology, VOL. 61, No. 1, January 2012.

Paper Type : Research Paper
Title : Review on Enabling Enhanced Privacy in Participatory Sensing
Country : India
Authors : Ms. Sayara Bano Sheikh, Mrs. Preeti Deshmukh

Abstract: The extreme use of mobile phones has increased the amount of digital data produced and processed every day. PPaarrttiicciippaattoorryy SSeennssiinngg (PS) is an emerging paradigm that focuses on the collection of digital data produced from a large number of connected, always-on, always-carried mobile devices. PS takes the advantage of rapid progress of the sensor-equipped devices and therefore theomnipresence of broadband network infrastructure produces sensing applications whereverreadying of a WSN infrastructure isn't economical or not possible.. It targets to providing high level of privacy and security in participatory sensing to data producers like users who are providing sensed information and consumers like applications that are accessing the gathered information. Hence providing privacy to the users of such a PS today becomes a significant concern. We are here providing a review on eennhhaanncceedd pprriivvaaccyy iinn PPaarrttiicciippaattoorryy SSeennssiinngg (PS).

Keywords -PPaarrttiicciippaattoorryy SSeennssiinngg ((PPSS)),, pprriivvaaccyy,, MMoobbiillee NNooddee ((MMNN)),, QQuueerriieerr,, PPrriivvaaccyy.

[1] Claudio Soriente andEmiliano De Cristofaro, Participatory Privacy: Enabling Privacy in Participatory Sensing, IEEE transactions on networking NO.1 VOL.27 YEAR 2013
[2] E. De Cristofaro and C. Soriente, Privacy-Preserving Participatory Sensing Infrastructure, [3] Kapadia, A.; Kotz, D.; Triandopoulos, N., "Opportunistic sensing: Security challenges for the new paradigm,"Communication Systems and Networks and Workshops, 2009. COMSNETS 2009. First International, vol., no., pp.1,10, 5-10 Jan. 2009 doi: 10.1109/COMSNETS.2009.4808850 [4]Koutsopoulos, I., "Optimal incentive-driven design of participatory sensing systems,"INFOCOM, 2013 Proceedings IEEE, vol., no., pp.1402,1410, 14-19 April 2013 doi: 10.1109/INFCOM.2013.6566934 [5] OpenSense Project:, 2010 [6] R.K. Ganti, N. Pham, H. Ahmadi, S. Nangia, and T.F. Abdelzaher, "GreenGPS: A Participatory sensing fuel-efficient maps application", inProc. ACM MobiSys, 2010. [7] T. Yan, B. Hoh, D. Ganesan, K. Tracton, T.Iwuchukwu, J.-S. Lee, "CrowdPark: A Crowdsourcing-based Parking Reservation System for Mobile Phones", University of Massachusetts at Amherst Tech. Report, yan/pubs/yan11CrowdPark.pdf [8] L. Deng and L.P.Cox, "LiveCompare: Grocery Bargain Hunting through Participatory Sensing", in Proc. ACM HotMobile, 2009. [9] S. Reddy, A. Parker, J. Hyman, J. Burke, D. Estrin and M. Hansen, "Image browsing, processing, and clustering for participatory sensing: Lessons from a dietsense prototype", in Proc. 4th Workshop on Embedded NetworkSensors (EmNets), 2007. [10] Chih-Jye Wang; Wei-Shinn Ku, "Anonymous Sensory Data Collection Approach for Mobile Participatory Sensing,"Data Engineering Workshops (ICDEW), 2012 IEEE 28th International Conference onpp.220,227, April 2012

Paper Type : Research Paper
Title : A Lightweight Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks – A Review
Country : India
Authors : Pooja Motwani, Priyanka Fulare2=

Abstract: Wireless reprogramming in a wireless sensor network (WSNs) is the process of propagating new code image or relevant commands to sensor nodes. While all existing insecure/secure reprogramming protocols are based on the centralized approach, it is important to support distributed reprogramming in which multiple authorized network users can simultaneously and directly reprogram sensor nodes without involving the base station. Very recently, a novel secure and distributed reprogramming protocol named SDRP has been proposed, which is the first work of its kind. The identity-based signature scheme has been chosen, which requires less computation cost and is significantly more efficient than all known IBS schemes, and the size of signatures is approximate 160 bits which is the shortest ID-based signatures so far. Compared to Deluge, Rateless Deluge has many advantages such as reducing latency at moderate levels of packet loss, being more scalable to dense networks, and generally consuming far less energy, a premium resource in WSNs.Thus, in order to further improve the reprogramming efficiency of SDRP, integrate SDRP with a more efficient reprogramming protocol like Rateless Deluge, leading to more secure and efficient distributed reprogramming.

Keywords -ID-based short signature,Reprogramming, Rateless Deluge, security, wireless sensor networks

[1] V. C. Gungor and G. P. Hancke, Industrial wireless sensor networks: Challenges, design principles, and technical approaches, IEEE Trans.Ind. Electron., 56(10), 2009, 4258–4265.

[2] V. C. Gungor, B. Lu, and G. P. Hancke, Opportunities and challenges of wireless sensor networks in smart grid, IEEE Trans. Ind. Electron., 57(10), 2010, 3557–3564. [3] X. Cao, J. Chen, Y. Xiao, and Y. Sun, Building-environment control with wireless sensor and actuator networks: Centralized versus distributed, IEEE Trans. Ind. Electron., 57(11), 2010, 3596–3604.

[4] V. Naik, A. Arora, P. Sinha, and H. Zhang, Sprinkler: A reliable and energy efficient data dissemination service for extreme scale wireless networks of embedded devices, IEEE Trans. Mobile Comput., 6(7), 2007, 762–776.

[5] R. C. Luo and O. Chen, Mobile sensor node deployment and asynchronous power management for wireless sensor networks, IEEE Trans.Ind. Electron., 59(5), 2012, 2377–2385.

[6] P. K. Dutta, J. W. Hui, D. C. Chu, and D. E. Culler, Securing the deluge network programming system, Proc. IPSN, 2006, 326–333.

[7] Y. Law, Y. Zhang, J. Jin, M. Palaniswami, and P. Havinga, Secure rateless deluge: Pollution-resistant reprogramming and data dissemination for wireless sensor networks, EURASIP J. Wireless Commun. Netw., 2011(1), 2011, 1–21.

[8] C. Parra and J. Garcia-Macias, A protocol for secure and energy- aware reprogramming in WSN, Proc. IWCMC, 2009, 292–297.

[9] S. Hyun, P. Ning, A. Liu, and W. Du, Seluge: Secure and DoS-resistant code dissemination in wireless sensor networks, Proc. IPSN, 2008, 445–456.

Paper Type : Research Paper
Title : Retinal Vessels Segmentation Using Supervised Classifiers For Identification of Cardiovascular Diseases
Country : India
Authors : R. Mahadevan

Abstract: The risk of cardio vascular diseases can be identified by measuring the retinal blood vessel. The identification of wrong blood vessel may result in wrong clinical diagnosis. This proposed system addresses the problem of identifying the true vessel by vascular structure segmentation. In this proposed model the segmented vascular structure is modelled as a vessel segment graph and the true vessels are identified by using supervised classifier approach. This paper proposes a post processing step in diagnose cardiovascular diseases which can be identified by tracking a true vessel from the optimal forest in the graph given a set on constraints.

Keywords: Cardiovascular, Graph tracer, Morphology, Optimal forest, Retinal vessel.

[1] Qiangfeng Peter Lau, Mong Li Lee, Wynne Hsu, and Tien Yin Wong., "Simultaneously Identifying All True Vessels fromSegmented Retinal Images". IEEE Transactions on Biomedical Engineering 2013.

[2] T. Y. Wong et al., "Retinal vascular caliber, cardiovascular risk factors, and inflammation: the multi-ethnic study of atherosclerosis (mesa)." Invest Ophthalmol Vis Sci, vol. 47, no. 6, pp. 2341–2350, 2006.

[3] K. McGeechan et al., "Meta-analysis: retinal vessel caliber and risk for coronary heart disease." Ann Intern Med, vol. 151, no. 6, pp. 404–413, 2009.

[4] C. Y.-L. Cheung et al., "Retinal vascular tortuosity, blood pressure, and cardiovascular risk factors," Ophthalmology, vol. 118, pp. 812–818, 2011.

[5] Shilpa Joshi, Dr P.T. Karule., "Retinal Blood Vessel Segmentation." International Journal of Engineering and Innovative Technology (IJEIT) Volume 1, Issue 3, March 2012.

Paper Type : Research Paper
Title : A Survey on Node Placement for Wireless Sensor Network Using Pso Algorithm
Country : India
Authors : Bhupesh Kumar Gupta, Sudha Chandrakar

Abstract: A wireless sensor network is a group of low cost, low power, multifunctional and small size distributed networked sensors. These sensors work together to sense the environment with a little or no human intervention. Developers of WSNs face challenges that arise from communication link failures, memory and computational constraints, and limited energy. Particle Swarm Optimization (PSO) is a simple, effective and computationally efficient optimization algorithm. It has been applied to address WSN issues such as optimal deployment, node localization, clustering and data-aggregation. Node placement is an important task in wireless sensor network Particle swarm optimization is one of the latest population based evolutionary optimization techniques which is based on the behaviours of bird flocking and fish schooling. PSO algorithm based framework has been proposed in this paper.

Keywords: Node Placement Problem, Particle Swarm Optimization, Wireless Sensor Network.

[1] Whitman, E.C. Sosus: The "Secret Weapon" of Undersea Surveillance. Undersea Warfare 2005, 7. Available online: 25/sosus.htm (accessedSeptember 17, 2009).

[2]Chong, C.Y.; Kumar, S.P. Sensor Networks: Evolution, Opportunities, and Challenges. Proc.IEEE 2003, 91, 1247–1256.

[3]Akyildiz, I.F.; Su, W.; Sankarasubramaniam, Y.; Cayirci, E. Wireless Sensor Networks: A Survey.Comput. Netw.2002, 38, 393–422.

[4] SamanehHojjatoleslami, VaheAghazarian, Mehdi Dehghan and NimaGhazanfarihMotlagh, PSO Based Node Placement Optimization for Wireless Sensor Networks, IEEE,2011.

[5] Raghavendra V. Kulkarni, Senior Member, IEEE, and Ganesh Kumar Venayagamoorthy,Senior Member IEEE.

[6] Mohamed Younis and Kemal Akkaya. Strategies and Techniques for Node Placement inWireless Sensor Networks: A Survey. Ad Hoc Networks, 6(4):621–655, 2008.

Paper Type : Research Paper
Title : Dynamic Routing for Encrypted Data Transmission
Country : India
Authors : Kishor T. Mane, Vandana G. Pujari, Radhika Dhanal, Shatakshi Kokate

Abstract: The Nowadays, the use of the internet increases either with the help of wired or wireless network. Due to the transfer of valuable information over the network, security becomes a prime issue for the society. As the data transferred on the computer network may not be secure and is vulnerable to many threats. The various security mechanisms have been incorporated in the recent times, which greatly improve the data security. This paper focuses on the new way of transferring the information using a dynamic routing algorithm with cryptographic extensions to improve the data security over computer network. This system is very easy to implement and is also compatible with existing network infrastructure. The results of testing are satisfactory.

Keywords -Blowfish algorithm, Encryption,Data security, Dynamic routing, Static routing.

[1] Chin-Fu Kuo, Ai-Chun Pang and Sheng-Kun Chan, "Dynamic Routing with Security Considerations", IEEE Transactions on Parallel and Distributed System, VOL. 20, NO. 1, January 2009
[2] G. Apostolopoulos, V. Peris, P. Pradhan, and D. Saha, "Securing Electronic Commerce: Reducing the SSL Overhead,"IEEE Network, 2000
[3] J. Yang and S. Papavassiliou, "Improving Network Security byMultipath Traffic Dispersion," Proc. IEEE Military Comm. Conf.(MilCom), 2001.
[4] S.-H. Liu, Y.-F.Lu, C.-F.Kuo, A.-C.Pang, and T.-W. Kuo, "The Performance Evaluation of Dynamic Configuration Method over IPSEC," Proc. 24th IEEE Real-Time Systems Symp.: Works in Progress Session (RTSS WIP), 2003.
[5] Secure Sockets Layer (SSL),, 2008.
[6] W. Lou and Y. Fang, "A Multipath Routing Approach for Secure Data Delivery," Proc. IEEE Military Comm. Conf. (MilCom), 2001.
[7] Book: Herbert Schildt, "Java Complete Reference"
[8] Book: Michael Blaha, James Rambaugh. "Object Oriented Modeling and Design with UML"
[9] Book: Ian Sommerville, "Software Engineering", Seventh Edition,

Paper Type : Research Paper
Title : Design & Implementation of Vehicle Black Box For Driver Assistance And Alert
Country : India
Authors : Rajashri R. Lokhande, Sachin P. Gawate

Abstract: In this paper we proposed the GPS (Global Positioning System)/ GSM (Global System for Mobile Communication) for driver assistance and car surveillance. Wireless black box using MEMS accelerometer and GPS tracking system is developed for monitor the accident. The system consists of cooperative components GPS device and GSM module. In the event of accident ,if any injury happened to the car driver or passengers so maybe there will be loss of lives due to delay in medical help. Keeping this idea in our mind, we are proposing a system where car itself intimates the concern emergency service for immediate reaction in case of accident or any emergency situation. After the accident, this wireless device will send mobile phone short massage indicating the position of vehicle by GPS system to family members, nearest police station and hospitals. The emergency medical service (EMS) is provided to the driver. The threshold algorithm is used to determine speed of motorcycle and fall or accident in real-time.

Keywords -MEMS accelerometer, GPS device, GSM module, emergency medical service (EMS), real time monitoring

[1] N.Watthanawisuth,T.LomasandA.Tuantranont, "Wireless Black Box Using MEMS Accelerometer and GPS Tracking for Accidental Monitoring of Vehicles", Proceedings of the IEEE-EMBS International Conference on Biomedical and Health Informatics (BHI 2012) Hong Kong and Shenzhen, China, 2-7 Jan 2012.
[2] D.Malan,T.R.F.Fulford-Jones, M.Welsh,S.Moulton, CodeBlue: an ad-hoc sensor network infrastructure for emergency medical care, in:Proceedings of the Mobi-Sys 2004 Work shop on Applications of Mobile.
[3] N. Jinaporn, S. Wisadsud, P. Nakonrat, A. Suriya, "Security system against asset theft by using radio frequency identification technology," IEEE Trans. ECTI-CON 2008.
[4] Chung-ChengChiu, Min-YuKu, Hung-Tsung, Chen Nat, "Motorcycle Detection and Tracking System with Occlusion Segmentation," Image Analysis for Multimedia Interactive Services. Santorini, vol. 2, pp. 32-32, June 2007.
[5] Oscar S. Siordia, Isaac Martín de Diego, Cristina Conde, and Enrique Cabello "Wireless in-complaint Box For Accident Analysis" IEEE Vehicular Technology Magzine,September 2012 .
[6] Fleischer ,PaulBenjamin,Nelson,Atso Yao, Sowah,RobertAdjetey ;Bremang, Appah "Design and Development of GPS/GSM Based Vehicle Tracking and Alert System for commercial Inter-City Buses".
[7] Murugandhan and P.R.Mukesh (2010) "Real Time Web Based Vehicle Tracking Using GPS " world Academy of Science ,Engineering and Techology.
[8] F. A. Author is with the National Institute of Standards and Technology, Boulder, CO 80305 USA (corresponding author to provide phone: 303-555-5555; fax: 303-555-5555; e-mail: author@

Paper Type : Research Paper
Title : Efficient TIMG Algorithm for Secure Transmission of Data
Country : India
Authors : Sujeet More, Mohammed Mujeeb Arab

Abstract: Cryptography is the process where an individual or message sending by party to other individual such that only the authorize party will get the scrambled message, which will be unscrambled to get the original message. In the public network hacking is the biggest problem. Many existing encryption algorithms like DES, 3DES, AES, and RC6 have been used to protect different-different types of attacks to eavesdrop or prevent the data to be communicating to the end-user safely. In this paper, a new encryption algorithm for transfer of data is proposed to achieve the different goals of security i.e., Integrity, Availability, and Confidentiality. This new TIMG algorithm is based on combination of two algorithms. The results show better efficiency compared to different existing algorithms. Keywords--- Decryption, Encryption, Key generation, Pixel, Security, TIMG Algorithm.

[1] A.Cheddad, J. Condell, K. Curran, P.M. Kevitt,"Digital image steganography: Survey and analysis of current methods", Elsevier
Journal Signal Processing, vol. 90, Issue3, pp. 727–752, March 2010.
[2] Data Hiding and Retrieval : Asoke Nath, Sankar Das, Amlan Chakraborty, published in IEEE Proceedings of International
Conference on Computational Intelligence and Communication Networks(CICN 2010) held from 26-28 NOV" 2010 at Bhopal.
[3] Advanced Steganography Algorithm using encrypted secret message: Joyshree Nath and Asoke Nath, International Journal of
Computer Science and Applications, Vol-2, No. 3, Page- 19-24, Mar (2010).
[4] New Steganography algorithm using encrypted secret message: Joyshree Nath, Meheboob Alam Mallik, Saima Ghosh and Asoke
Nath : Proceedings of Worldcomp 2011 held at Las Vegas (USA), 18-21 Jul, 2011.
[5] W. N. Lie and L. C. Chang." Data hiding in images with adaptive number of least significant bits based on the human visual system."
Proc. ICIP ‟99, 1:286–290, 1999.

Paper Type : Research Paper
Title : Application of Page Ranking Algorithm in Web Mining
Country : India
Authors : A.M. Sote, Dr. S. R. Pande

Abstract: The World Wide Web is a popular and interactive medium to disseminate information today. It is a system of interlinked hypertext documents accessed via the Internet. With a web browser, one can view web pages that may contain text, images, videos, and other multimedia, and navigate between them via hyperlinks. It is very difficult for a user to find the high quality information which he wants to need. When we search any information on the web, the number of URL's has been opened. User wants to show the relevant on the top of the list. So that Page Ranking algorithm is needed which provide the higher ranking to the important pages. In this paper, we discuss the Page Ranking algorithm to provide the higher ranking to important pages.

Keywords -HITS, Page Rank Algorithm, Web mining, Weighted page Rank,

[1] R. Kosala, and H. Blockeel, Web Mining Research: A Survey,SIGKDD Explorations, Newsletter of the ACM Special Interest Group on Knowledge Discovery and Data Mining Vol. 2, No. 1 pp 1-15, 2000.
[2] S. Brin, L. Page, "The Anatomy of a Large Scale Hypertextual Web search engine," Computer Network and ISDN Systems, Vol. 30, Issue 1- 7, pp. 07-117, 1998.
[3] W. Xing and Ali Ghorbani, "Weighted PageRank Algorithm", Proc. Of the Second Annual Conference on Communication Networks and Services Research (CNSR '04), IEEE, 2004.
[4] J. Kleinberg, "Authoritative Sources in a Hyper-Linked Environment", Journal of the ACM 46(5), pp. 604-632, 1999.
[5] P Ravi Kumar, and Singh Ashutoshkumar, Web Structure Mining Exploring Hyperlinks and Algorithms for Information Retrieval, American Journal of applied sciences, 7 (6) 840-845 2010.
[6] J. Kleinberg, "Hubs, Authorities and Communities", ACM Computing Surveys, 31(4), 1999.
[7] S. Chakrabarti, B. Dom, D. Gibson, J. Kleinberg, R. Kumar, P. Raghavan, S. Rajagopalan, A. Tomkins, "Mining the Link Structure of the World Wide Web", IEEE Computer Society Press, Vol 32, Issue 8 pp. 60 – 67, 1999.
[8] N. Duhan, A. K. Sharma and K. K. Bhatia, "Page Ranking Algorithms: A Survey, Proceedings of the IEEE International Conference onAdvance Computing, 2009.

Paper Type : Research Paper
Title : A Novel Approach of Transformer Oil Quality Analysis Using Image Processing
Country : India
Authors : M.H.Sidram, Subrahmanya Hegde

Abstract: Electrical energy is the paramount need in a nation's development. To cater for large demand for electricity there is a need for reliable and proficient power system. For a power system to work reliably, the role of Transformers is critical. Health of the transformer mainly depends on its insulation. Among the different insulating material used in transformers, mineral oil is the most widely used as insulating medium in oil filled transformers. The performance of the transformer depends on the quality of the insulating oil. Hence, the oil quality analysis becomes essential. Traditionally chemical diagnostic criteria are used for oil quality evaluation. However, this conventional method is expensive and time consuming. Extensive experimental evaluation has been fruitful to establish the acidity and tanδ of the transformer oil. Here, we are proposing Image processing technique to estimate the oil properties, which is inexpensive and effective technique. Namely Texture Entropy is extended to compute the Neutralization Number (NN) or Acidity and tanδ (Dissipation factor). Further they compared.

Keywords: Transformer oil, Oil analysis, Acidity, tanδ (Dissipation factor), Image Processing (IP), Entropy (E).

[1] Endah Yuliastuti, Analysis of dielectric properties comparison between mineral oil and synthetic ester oil., Delft University of Technology, Netherland, June 2010.

[2] Dr. J Spencer, Optical detection of the degradation of transformer oil., University of Liverpool, 2009.

[3] Sherif S. M. Ghoneim, Sayed A., Taif ,Dissolved gas analysis as a diagnostic tool for early detection of transformer faults, Advances in Electrical Engineering Systems, 1(3), 2012, 152 – 156.

[4] G. J. Pukel, H. M. Muhr, W. Lick, Transformer diagnostics: Common used and new methods, Graz University of Technology Austria.

[5] Naveen Kumar Sharma, Prashant Kumar Tiwari, and Yog Raj Sood, Review of Artificial Intelligence Techniques Application to Dissolved Gas Analysis on Power Transformer, International Journal of Computer and Electrical, Engineering, 3(4), August 2011, 577- 581.

[6] Amritpal Singh, and P. Verma, A Review of Intelligent Diagnostic Methods for Condition Assessment of Insulation System in Power Transformers, IEEE International Conference on Condition monitoring and Diagnosis, Beijing, China, 2008.

[7] W. Xu, D. Wang, Z. Zhouand and H. Chen, Fault Diagnosis of Power Transformers: Application of Fuzzy Set Theory, Expert Systems, and Artificial Neural Networks, IEEE Proceedings of Science, Measurement and Technology, 144(1), 1997, 39-44.

[8] M.H. Wang, Extension neural network for power transformer incipient fault diagnosis, Generation, Transmission and Distribution,

Paper Type : Research Paper
Title : Anti-Piracy System to Prevent Collusive Copyright Protection in P2P Network
Country : India
Authors : Sushant Borse, Nikhil Jamdade, Deryle D'souza

Abstract: PEER-TO-PEER (P2P) networks are most cost-effective in delivering large files to massive number of users. Unfortunately, today's P2P networks are grossly abused by illegal distributions of music, games, video streams, and popular software. To protect such contents from being distributed to unauthorized peers, Lou and Hwang proposed a proactive content poisoning scheme. In this paper, we are revising the same scheme with more clear and limited approach. The main sources of illegal file sharing are peers who ignore copyright laws and collude with pirates. Our goal is to stop collusive piracy within the boundary of a P2P content delivery network. This scheme tries to stop collusive piracy without hurting legitimate P2P clients by targeting poisoning on detected violators. Peer authorization protocol (PAP) is used to distinguish pirates from legitimate clients. Detected pirates will receive poisoned chunks in their repeated attempts. Pirates are thus severely penalized with no chance to download successfully in tolerable time.

Keywords: content poisoning, copyright protection, network security, p2p networks

[1] Kevin Bauer, Dirk Grunewald and Douglas Sicker, The Challenges of Stopping Illegal Peer-To-Peer File Sharing, Department of Computer Science, University of Colorado.

[2] Nicolas Christin, UC Berkeley, Andreas S. Weigend, Content Availability, Pollution And Poisoning In File Sharing Peer To Peer Networks, Weigend Associates LLC, John Chuang, UC Berkeley, 2005

[3] Antonio Liotta, Rossana Motta, Ling Lin, A File Protection Method For Peer-To-Peer Systems, Department of Electronic System Engineering, University of Essex, Colchester, CO4 3SQ, UK, Florida State University, Tallahassee, FL 32306, USA.

[4] Xiaosong Lou and Kai Hwang, Adaptive Content Poisoning to Prevent Illegal File Distribution in P2P Networks, University of Southern California, 2006.

[5] S.H. Kwok, Watermark-Based Copyright Protection System Security, Comm. ACM, pp. 98-101, Oct. 2003.
[6] "Digital Signature",
[7] "ID Based Encryption",

[8] D. Boneh and M. Franklin, Identity-Based Encryption From The Weil Pairing, Proc. Advances in Cryptology (Crypto '01).
[9] N. Mook, P2P Future Darkens as eDonkey Closes,
[10] Signing the Digest,

Paper Type : Research Paper
Title : Implementation of Iterative Algorithm In Parallel Processing And Distributed Computing For Crypt Data.
Country : India
Authors : Nasim kothiwale, Trupti patil, Snehal Madum,Wasim Mujavar

Abstract: A parallel computer (or multiple processor system) is a collection of communicating processing elements (processors) that cooperate to solve large computational problems fast by dividing such problems into parallel tasks, exploiting Thread-Level Parallelism (TLP). In this paper we mainly focus on inImplementation of Iterative algorithm in parallel processing and distributed computing for crypt data. We propose a parallel processing crypto-processor for Elliptic Curve Cryptography (ECC) to speed up EC point multiplication. The processor consists of a controller that dynamically checks instruction-level parallelism (ILP) and multiple sets of modular arithmetic logic units accelerating modular operations. A case study of HW design with the proposed architecture shows that EC point multiplication over GF(p) and GF(2m) can be improved by a factor of 1.6 compared to thecase of using single processing element.

[1] R. L. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Comm. ACM, vol. 21, pp. 120-126, 2011.
[2] N. Koblitz, "Elliptic Curve Cryptosystems," Math. Computation, vol. 48, pp. 203-209, 2010.
[3] V. S. Miller, "Use of Elliptic Curve in Cryptography," Advances in Cryptology: Proceedings of CRYPTO'85. Lecture Note in Computer Science, Springer-Verlag vol. 218, pp. 417-426, 1999.
[4] P. L. Montgomery, "Modular multiplication without trial division," Mathematics of Computation, vol. 44, pp. 519-21, 1985.
[5] E. Savas¸, A. F. Tenca and C¸ . K. Koc¸, "A Scalable and Unified Multiplier Architecture for Finite Fields GF(p) and GF(2m)," Cryptographic Hardware and Embedded Systems: Proceedings of CHES'00. Lecture Note in Computer Science, Springer- erlag, vol. 1965, pp. 281-296, 2000.
[6] A. Satoh and K. Takano, "A Scalable Dual-Field Elliptic Curve Cryptographic Processor," IEEE Trans. Computers, vol. 52, pp. 449-460, 2003.

Paper Type : Research Paper
Country : India
Authors : Almas Ansari, Prof.Chetan Bawankar

Abstract: Cloud computing is clearly one of today's most enticing technology areas due, at least in part, to its cost-efficiency and flexibility. However, despite the surge in activity and interest, there are significant, persistent concerns about cloud computing that are impeding momentum and will eventually compromise the vision of cloud computing as a new IT procurement model. In this paper, we characterize the problems and their impact on adoption. In addition, and equally importantly, we describe how the combination of existing research thrusts has the potential to alleviate many of the concerns impeding adoption. In particular, we argue that with continued research advances in trusted computing and computation-supporting encryption, life in the cloud can be advantageous from a business intelligence standpoint over the isolated alternative that is more common today. A third party service provider, stores & maintains data, application or infrastructure of Cloud user. Relinquishing the control over data and application poses challenges of security, performance, availability and privacy. Security issues in Cloud computing are most significant among all others. Information Technology (IT) auditing mechanisms and framework in cloud can play an important role in compliance of Cloud IT security policies. In this paper, we focus on cloud security audit mechanisms and models.

[1] Cong Wang ; Chow, S.S.M. ; Qian Wang ; KuiRen ;Wenjing Lou "Privacy-Preserving Public Auditing for Secure CloudStorage", IEEE Transactions on Computers Volume: 62 , Issue: 2 2013 ,PP no : 362 - 375
[2] C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-Preserving Public Auditing for Storage Security in Cloud Computing," Proc. IEEE INFOCOM ‟10, Mar. 2010.
[3] P. Mell and T. Grance, "Draft NIST Working Definition of Cloud Computing," index.html, June 2009.
[4] M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, "Above the Clouds: A Berkeley View of Cloud Computing," Technical Report UCB-EECS-2009-28, Univ. of California, Berkeley, Feb. 2009.
[5] M. Arrington, "Gmail Disaster: Reports of Mass Email Deletions," 2006/12/28/gmail-disasterreportsof- mass-email-deletions/, 2006.
[6] J. Kincaid, "MediaMax/TheLinkup Closes Its Doors," http:// /2008/07/10/mediamaxthelinkup-closesits- doors/, July 2008.
[7], "Amazon s3 Availability Event: July 20, 2008,", July 2008.
[8] Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, "Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing," IEEE Trans. Parallel and Distributed Systems, vol. 22, no. 5, pp. 847-859, May 2011.
[9] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, "Provable Data Possession at Untrusted Stores," Proc. 14th ACM Conf. Computer and Comm. Security (CCS ‟07), pp. 598-609, 2007.
[10] M.A. Shah, R. Swaminathan, and M. Baker, "Privacy-Preserving Audit and Extraction of Digital Contents," Cryptology ePrint Archive, Report 2008/186, 2008.

Paper Type : Research Paper
Country : India
Authors : Keerthi Priya Pulukuri, G Deepak Rao, Swathi Kandala, Rupali Nilaj Deshmukh

Abstract: Among all biometric traits, fingerprints have one of the highest levels of reliability and have been extensively used by forensic experts in criminal investigations. A fingerprint refers to the flow of ridge patterns in the tip of the finger. The ridge flow exhibits anomalies in local regions of the fingertip, and it is the position and orientation of these anomalies that are used to represent and match fingerprints. Fingerprints are believed to be unique across individuals, and across fingers of the same individual. There are various stages involved in fingerprinting. This paper discusses the various means of Fingerprint analysis and its methods of storage, along with a comparison between several different methods used for each different stage and finally propose a five stage fingerprinting system involving - Fingerprint Acquisition, Fingerprint Representation using Mosaicing, Storage using classification, Fingerprint Matching using Singularity Point Detection and Watermarking of Fingerprints using Discrete Wavelet Transform for security.

Keywords- Biometrics, Minutiae, Mosaicing, Watermark.

[1] Monowar Hussain Bhuyan, Sarat Saharia, Dhruba Kr Bhattacharyya, An Effective Method for Fingerprint Classification, International Arab Journal of e-Technology, Vol. 1, No. 3, January 2010
[2] Jitendra P. Chaudhari, Pradeep M. Patil, Y.P.Kosta Charotar, Singularity Points Detection in Fingerprint Images,International Journal of Computer Applications (0975 – 8887) Volume 45– No.5, May 2012
[3] Uma Maheswari, E. Chandra, A Review Study on Fingerprint Classification Algorithm used for Fingerprint Identification and Recognition, IJCST Vol. 3, Issue 1, Jan. - March 2012
[4] Raffaele Cappelli, Matteo Ferrara, Davide Maltoni, Minutiae-Based Fingerprint Matching, IEEE Transactions On Pattern Analysis And Machine Intelligence, Vol. 21, No. 5, May 1999 [5] Abhishek Rawat, A Hierarchical Fingerprint Matching, Indian Institute of Technology Kanpur July 2009
[6] Arun Abraham Ross, Information Fusion in Fingerprint Authentication, Michigan State University 2003
[7] Khalil Zebbiche, Lahouari Ghouti, Fouad Khelifi, Ahmed Bouridane, Protecting Fingerprint Data using Watermarking,First NASA/ESA Conference on Adaptive Hardware and Systems (AHS'06)

Paper Type : Research Paper
Country : India
Authors : Ms. P. G.Gomase, Ms. N. R. Wankhade

Abstract: The use of digital photography has increased over the past few years, the trend which opens the door for new and creative ways to forge images. Now a day's several software's are available that are used to manipulate image so that the image is look like as original. Images are used as authenticated proof for any crime and if these image does not remain genuine than it will create a problem. Detecting these types of forgeries has become serious problem at present. To determine whether a digital image is original or doctored is a big challenge. To find the marks of tampering in a digital image is a challenging task. A copy-move image forgery is done either for hiding some image entity, or adding more minutiae resulting in forgery. In both the case, image reliability is lost. Although this technology brings many advantages but it can be used as a confusing tool for hiding facts and evidences. In the paper, first, classification of Image forgery detection techniques is discussed and the two important techniques for pixel based forgery detection are discussed. A technique for copy-move forgery detections discussed.

Keywords- copy-move forgery, forensic, forgery detection techniques, image forgery, tampering.

[1] HanyFarid, "Image Forgery Detection", IEEE SIGNAL PROCESSING MAGAZINE, MARCH 2009, pp. 16-25.
[2] Ashima Gupta, NisheethSaxena, S.K Vasistha, "Detecting copy move forgery using DCT",International Journal of Scientific and Research Publications, Volume 3, Issue 5, May 2013 1 ISSN 2250-3153
[3] PradyumnaDeshpande,PrashastiKanikar,"Pixel Based Digital Image Forgery DetectionTechniques", International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 Vol. 2, Issue 3, May-Jun 2012, pp. 539-543.
[4] Nair S. Rajlaxmi and Vijaya C, "Detection of Forgeries in Digital Color Image", World Journal of Science and Technology 2011, 1(8): 32-36 ISSN: 2231 – 2587
[5] Sunil Kumar, P. K. Das, Shally, S. Mukherjee, "Copy-Move Forgery Detection in Digital Images: Progress and Challenges", International Journal on Computer Science and Engineering (IJCSE) ISSN : 0975-3397 Vol. 3 No. 2 Feb 2011.
[6] S.Murali,Govindraj B. Chittapur ,Prabhakara H. S and Basavaraj S. Anami, "Comparison And Analysis Of Photo Image Forgery Detection Techniques", International Journal on Computational Sciences & Applications (IJCSA) Vo2, No.6, December 2012..

Paper Type : Research Paper
Country : India
Authors : Ajay Karare, Prof. Shrikant Sonekar

Abstract: The architecture of two-tiered sensor networks, consist of three types of nodes: Sensor, Storage node and a sink, where storage nodes serve as an middle layer between sensors and a sink for storing data and for processing queries, this has been widely used and adopted because of the power and storage saving benefits for sensors as well as the efficiency of query processing. In this paper, we have discussed about the different mechanisms and algorithms through which the security and integrity has been provided to the Wireless Sensor Networks, and also discussed about the drawbacks in the existing system, along with the additional mechanism to provide the Privacy to the network. To preserve the Privacy and Integrity we have mainly considered a SafeQ protocol that prevents attackers from gaining information from both sensor collected data and sink issued queries. SafeQ also allows a sink to detect compromised storage nodes when they misbehave. To preserve privacy, SafeQ uses a novel technique to encode both data and queries such that a storage node can correctly process encoded queries over encoded data without knowing their values. To preserve integrity, and security SafeQ propose two schemes—one using Merkle hash trees and another using a new data structure called neighborhood chains—to generate integrity verification information so that a sink can use this information to verify whether the result of a query contains exactly the data items that satisfy the query. To maintain the security of the network we have discussed mechanism a Watchdog that is a kind of behavior monitoring mechanism which is the base of many trust systems in ad hoc and wireless sensor networks. Watchdog is able to protect against a wide range of attacks and memory efficiency.

Keywords -Integrity, privacy, Security, sensor networks, SafeQ, Watchdog, Merkle hash trees.

[1]The Fei Chen and Alex X. Liu,‖Privacy- and Integrity-Preserving Range Queries in Sensor Networks‖, IEEE/ACM TRANSACTIONS ON NETWORKING , DECEMBER 2012.

[2]Sheng and Q. Li, ―Verifiable privacy-preserving range query in two tiered sensor networks,‖ in Proc. IEEE INFOCOM, 2008, pp. 46-50.

[3]Fei Chen and Alex X. Liu, ―SafeQ: Secure and Efficient Query Processing in Sensor Networks,‖ at IEEE INFOCOM 2010.

[4]M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, ―Plutus: Scalable secure file sharing on untrusted storage,‖ in Proc. FAST, 2003, pp. 29–42.

[5]Youngho Cho, Gang Qu and Yuanming Wu, ―Insider Threats against Trust Mechanism with Watchdog and Defending\ Approaches in Wireless Sensor Networks,‖ in IEEE Symposium on Security and Privacy W,2011.

IOSR Journals are published both in online and print versions.