Volume-5 (International Conference on Advances in Engineering & Technology – 2014 (ICAET-2014))
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Challenges of Software Development Team in Agile Development |
Country | : | India |
Authors | : | Syed Rehan, Manish Assudani, Ritesh Shrivastav, Swapnil Deshmukh |
Abstract:There is a common perception that, while there may be some "teething‟ problems experienced during the initial transition to agile, people are much happier, engaged and ultimately more productive in these environments. This study shows that this belief may not always hold true, identifying many serious "people‟ challenges experienced by large multinational organisations, all using agile for years. The cases provide an interesting insight in that they involve instances where agile was implemented in a top-down manner across the organisations or at least across business units. This is in contrast to most accounts of agile which involve voluntary, bottom up adoption on small co-located teams developing systems deemed to be suitable for agile development. The people issues uncovered include a broad range of problems from recruitment of agile staff, to training, motivation and performance evaluation among others. The paper will conclude with a set of actionable recommendations as to how organisations can overcome these challenges, based on the better practices uncovered in the cases studied.
Keywords: agile, adoption, methodologies, people factors, Whiteboards
[I] Nerur, S., R. Mahapatra, et al. (2005). "Challenges of Migrating to Agile Methodologies." Communications of the ACM 48(5): 72-78.
[II] Schuh, P. (2004). Integrating Agile Development in the Real World, Charles River Media Inc. Tan, C. H. and H. H. Teo (2007). "Training Future Software Developers to Acquire Agile
[III] Development Skills." Communications of the ACM 50(12): 97-98.UXResearch September (2008). "DEEWR Tender Win." From
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Robotic Walking Aid for Visually Impaired |
Country | : | India |
Authors | : | Nikhil Mahalingam, Veera S. Kumar |
Abstract: In this fast developing world, it is hard for the people to help the physically challenged people in all aspects, since those people are totally dependent on others for their routine activities including their basic requirements. This project aims to provide a solution for the above problem by using the modern technology by developing a robot to assist the visually impaired people to fulfill their basic needs. This novel device helps visually impaired people to walk safely and quickly among obstacles and other hazards. The robotic model consists of compatible sensors for detecting the obstacles within the specified range and sends input as digital signals to microcontroller board which then calculates the distance of the obstacle and guides the user. The user feels the steering command as a very noticeable physical force through the handle and he/she is able to follow the system's path easily without any conscious effort. The proposed device overcomes the fundamental shortcomings of conventional electronic walking aids for the visually impaired people that relieves the user from making complex decisions. This device boosts the visually impaired people morally.
Keywords –Arduino processor, Chassis Fabrication, Distance Measurement, Motor Speed Control, Obstacle Detection.
[1]Iwan Ulrich1 and Johann Borenstein2, IEEE Member,Applying Mobile Robot Technologies to Assist the Visually Impaired.
[2] IwanUlrich ,A Computerized Travel Aid for the Active Guidance of Blind Pedestrians.
[3] ShragaShoval,Iwan Ulrich, Johann Borenstein, Robotics-Based Obstacle-Avoidance Systems for the Blind and Visually Impaired.
[4] Akihisa Ohya Akio Kosaka and Avi Kak, Vision-Based Navigation of Mobile Robot with Obstacle Avoidance by Single Camera Vision and Ultrasonic Sensing. [5]www.who.int/mediacenter/factsheets/fs282/en
[6]articles.timesofindia.indiatimes.com/2007-10-11/india/27977420_1_avoidabable_blindness_opthalmologists_eye_diseases [7]www.ncbi.nlm.nih.gov/pubmed/11804362
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Real Time Data Communication over Full Duplex Network Using Websocket |
Country | : | India |
Authors | : | Shruti M. Rakhunde |
Abstract: Internet offers the convenient way of transmitting the information between peers. There is an increased demand of real time data feeds, group communication and teleconferencing which requires a full duplex connection between client and server. But when the real time data transmission is concerned the latency becomes a major issue. The Web Socket offers the better solution as compared to the conventional methods that are considered to be the good solution or delivering real time information. Different methods that have been used over years are HTTP Polling, HTTP Long Polling, Comet etc., but the Web Socket protocol reduces Internet communication overhead and provides efficient, stateful communication between Web Servers and Clients. This paper gives a detailed discussion of various problems of the conventional methods used in real time data transmission and benefits offered by WebSocket with respect to real time data transmission.
Keywords - Http Polling, Http Long Polling, WebSocket, HTML5
[1]Victoria Pimentel, Bradford G. Nickerson, Communicating and displaying real-time data with WebSocket, Internet Computing, IEEE, Vol. 16, Issue. 4, Jul-Aug 2012
[2]Bo Mao, Zhiang Wu, Jie Cao, A framework for online spatio-temporal data visualization based on HTML5, International Archieves of the Photography, remote Sensing and spatial information Science, Volume XXXIX-B2, 2012,123-127
[3]Andrew Wessels, Mike Purvis, Jahrian Jacksopn, Syed Rahman, Remote data visualization through WebSockets, Information Technology, New Generations (ITNG),8th International Conference, 2011,1050-1051
[4]Yan Zhangling,. Dai Mao, A real-time group communication architecture based on Websocket,, International Journal of Computer Engineering Vol. 1.No. 4. Nov 2012
[5] Charles Marion, Julien Jomier, Real-time collaborative scientific webgl visualization with websocket, Web3D'12 Proc. Of 17th International Conference on 3D Web Technology, 2012, 47-50
[6]Vinaitheerthan Sundaram,Lan Zhao, Carol X. Song, Bedrich Benes, Rakesh Veeramacheneni, peter Kristof, Real-time data delivery and remote visualization through multi-layer interfaces, proc. of Grid Computing Environments Workshop, 2008. GCE '08, Nov 2008, 1-10.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Strong password generator scheme Using image fusion |
Country | : | India |
Authors | : | Miss. Snehal A. Mahajan, M |
Abstract: Password strength is a measure of the effectiveness of a password in resisting guessing and brute-force attacks. The strength of a password is a function of length, complexity, and unpredictability. Using strong Passwords lowers overall risk of a security breach, but strong passwords do not replace the Need for other effective security controls. So, two or more images are used for this password. We perform Image Fusion Algorithm that combines all selected images into a single Image. Significance of image fusion algorithm is only to avoid the dependency of generated password on single image. Image fusion modifies input image pixels & at the result end, we find two images are mixed up. Once the images are fused, we will apply two shares Visual Cryptography that Encrypt the image & converts it into unreadable format. In proposed work; we will try to Mix up all the generated sections with permutations so that every time & in every round an Unique Password will generate. Once the password is generated we pass this password from strong password definition filter if it pass through it than we will use it for the Authentications else we forward it to proposed password generator algorithm again. This paper gives an idea about password generation by using image fusion technique.
[1] Arun Ross and Asem Othman, "IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY", VOL. 6, NO. 1, MARCH 2011.
[2] S.Pradeesh Hosea, S. Ranichandra, T.K.P.Rajagopal "International Journal of Scientific & Engineering Research Volume 2", Issue 3, March-2011 1 ISSN 2229-5518.
[3] Th. Rupachandra Singh "International Journal of Computer Applications (0975 – 8887) Volume 39– No.1", February 2012.
[4] Tranos Zuva, Oludayo O. Olugbara, SundayO. Ojo and Seleman M. Ngwira "Canadian Journal on Image Processing and Computer Vision Vol. 2", No. 3, March 2011.
[5] Subrahmanyam Murala, R. P. Maheshwari, and R. Balasubramanin, "IEEE TRANSACTIONS ON IMAGE PROCESSING", VOL. 21, NO. 5, MAY 2012
[6] "H. B. Kekre et al. "(IJCSE) International Journal on Computer Science and Engineering." ISSN : 0975-3397 368.Vol. 02, No. 02, 2010, 368-372.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Secure Method of Updating Digital Notice Board Through Sms With Pc Monitoring System |
Country | : | India |
Authors | : | Mayur R. Bhoyar, Suraj Chavhan,Vaidehi Jaiswal |
Abstract: This is the model for displaying notices in colleges on digital notice board by sending messages in form of SMS through mobile; it is a wireless transmission system which has very less errors and maintenance. The hardware board contains microcontroller AT89c52 at the heart of the system. The microcontroller is interfaced with GSM Modem via MAX232 level convertor. It is used to convert RS232 voltage levels to TTL voltage levels and vice versa. The hardware also has a 64K EEPROM chip AT24C64. This EEPROM is used to store the timings and messages to be displayed. Hardware also contains a real time clock DS1307 to maintain track of time. A 16x2 Character LCD display is attached to microcontroller for display. Microcontroller coding will be done using Embedded C and Kiel. PC Coding will be done using Visual Basic. Multiple Users are authorized to update notices on the digital notice board by providing them password. We can use a PC with an administrator for monitoring the system.
Keyword: Microcontroller 89c52, GSM Modem and MAX232 level converter, Embedded C, Keil.
[1] Books: The 8051 Microcontroller and System - Janice Gillispie Mazidi - Rolin D. McKinlay - Muhammad Ali
[2] Books: GSM and Personal Communications Handbook - SiegmundRedl, - Matthias Weber - Malcolm W. Oliphant
[3] Pawan Kumar, VikasBhrdwaj, Kiran Pal, Narayan Singh Rathor, Amit Mishra, "GSM based e-Notice Board" , International Journal of Soft Computing and Engineering (IJSCE) ISSN.
[4] Agamanolis.S, "Digital displays for human connect endless". In public and situated display Social and international aspects of shared display technology.
[5] Herman Chung- HwaRao, Di-Fa Chang and Yi-Bing Lin, "iSMS: An Integration Platform for Short Message Service and IP Networks", IEEE Network, pp.48-56, March/April (2001).
[6] Jeff Brown, Bill Shipman and Ron Vetter, "SMS: The Short Message Service", IEEE Computer Society, pp.106-111, December (2007).
[7] QianXu, Evan Wei Xiang, Qiang Yang, Jiachun Du, JiepingZhong, Agamanolis.S "SMS Spam Detection Using Noncontent Features", IEEE Computer Society, pp.44-51, (2012).
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Survey on AROSD Protocol |
Country | : | India |
Authors | : | Syeda Kaneez Khatoon, Nusrat Anju |
Abstract: A distributed adaptive opportunistic routing scheme for multi-hop wireless ad-hoc networks is proposed. The proposed scheme utilizes a reinforcement learning framework to opportunistically route the packets even in the absence of reliable knowledge about channel statistics and network model. This scheme is shown to be optimal with respect to an expected average per packet reward criterion. The proposed routing scheme jointly addresses the issues of learning and routing in an opportunistic context, where the network structure is characterized by the transmission success probabilities. In particular, this learning framework leads to a stochastic routing scheme which optimally "explores" and "exploits" the opportunities in the network.
Keywords - Ad-hoc Network, Adaptive Routing, Nodes, Unstable Routing.
[1] Ivan Stojmenovic " Handbook of Wireless Networks and Mobile Computing" Copyright © 2002 John Wiley & Sons, Inc. ISBNs: 0-471-41902-8 (Paper); 0-471-22456-1 (Electronic).
[2] C. Perkins and P. Bhagwat. " Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers." In Proc. of Conference on Communications Architectures, Protocols and Applications in conjunction with SIGCOMM 94, pages 234–244, 1994.
[3] J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine. MaxProp: Routing for Vehicle-Based Disruption-Tolerant Networking. In Proc. of IEEE INFOCOM 2006, 2006.
[4] S. Chen and K. Nahrstedt. A distributed quality-of-service routing in ad-hoc networks. IEEE Journal on Selected Areas in Communications, 17(8):547–560, August 1999.
[5] S. Jain, K. Fall, and R. Patra. " Routing in a delay tolerant network". In Proc. of ACM SIGCOMM, August 2004.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Security Aspects of Multi-Cloud Computing In Modern Computing Environment |
Country | : | India |
Authors | : | Swapnila Mirajkar, Santoshkumar Biradar |
Abstract: Cloud computing has been equated to the early proliferation of electricity. Businesses and towns began connecting into a greater power grid, supported and controlled by power utilities. There came time and cost savings, along with this utility connection in addition to greater access, and more reliable availability of power. Similarly, cloud computing represents a significant opportunity for service providers and enterprises. Relying on cloud computing, enterprises can achieve cost savings, flexibility, and choice for computing resources. A movement towards "multi-clouds", or in other words, "interclouds" or "cloud-of-clouds" is becoming popular now days. This paper focus the aspects related to security of single to multiple clouds
Keywords:Cloud Architecture, Cloud Security,Multi Clouds,Security Challenge.
[1] (NIST), http://www.nist.gov/itl/cloud/.
[2] Akhila, B.V.SriRam ,Dr.N.Srinivasu , Nikita Mahajan , "Security Through Multiple Unrelated Clouds in Cloud Computing", International Journal of Computer Trends and Technology (IJCTT) - volume4Issue4 –April 2013
[3] S. Jaya Prakash, DrK.Subramanyam, U.D.S.V. Prasad, "Multi Clouds Model For Service Availability And Security", Department of Computer Science and Engineering,K.L.University, Vaddeswaram.
[4] Mohammed A. AlZain , Eric Pardede , Ben Soh , James A. Thom, "Cloud Computing Security From Single to Multi Clouds, Department of Computer Science and Computer Engineering, La Trobe University, Bundoora 3086, Australia.
[5] William R. Claycomb, "Tutorial: Cloud Computing Security" Lead Research Scientist CERT Enterprise Threat and Vulnerability Management Team
[6] " Security Guidance for Critical Areas of Focus in Cloud Computing V2.1", Prepared by theCloud Security Alliance December 2009, Mohammed A. AlZain, Ben Soh and Eric Pardede, "MCDB: Using Multi-Clouds to Ensure Security in Cloud Computing", Department of Computer Science and Computer Engineering, LaTrobe University, Bundoora 3086, Australia.
[7] "Security in Private Database Clouds", An Oracle White Paper, July 2012.
[8] "Making virtual machines cloud ready " , A trend Micro white paper , August 2009.
[9] "A Multi-Level Security Model for Partitioning Workflows over Federated Clouds" by Paul Watson, Technical Report, September 2011.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Managing the Threat of Denial of Service Attacks in MANETs |
Country | : | India |
Authors | : | Prof. Deepali O. Bhende |
Abstract: A Mobile Ad-hoc Network (MANET) is an independent and self-configurable network without any fixed infrastructure. Compared to traditional network, MANETs have unique characteristics such as wireless shared radio medium, limited communication range, highly dynamic topology, power constraints and lack of trusted centralized authority. In addition to ensuring confidentiality and fidelity of acquired data, there is a demand for smooth transmission of information throughout the network. This requires unscathed service and continuous availability of network resources for the full duration of the network's operation. In contrast to this crucial objective of MANET management, a Denial of Service (DoS) attack targets to jeopardize the efficient use of network resources and disrupts the essential services in the network. Because of the wide range of methods used for creating a denial of service situation in the network, DoS attack could be considered as one of the major threats against MANET security. This paper aims to classify DOS attacks on MANETs, which are primarily performed on network and lower layers. Counter measuring techniques of these DOS attacks are also presented.
Keywords – MANET attack, DoS attack.
[1] C. R. Dow, P. J. Lin, S. C. Chen*, J. H. Lin*, and S. F. Hwang. A Study of Recent Research Trends and Experimental Guidelines
in Mobile. Adhoc Networks. 19th International Conference on Advanced Information Networking and Applications, 2005. AINA 2010, Volume: 1, 72- 77 vol.1.
[2] B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, A. Jamalipour. A survey of routing attacks in mobile ad hoc networks. Security in wireless mobile ad hoc and sensor networks, October 2007, page, 85-91
[3] M. G. Zapata and N. Asokan, "Securing Ad-Hoc Routing Protocols," Proc. 2002 ACM Wksp. Wireless Sec., Sept. 2002, pp. 1–10.
[4] C. Siva Ram Murthy and B. S. Manoj, "Ad Hoc Wireless Networks, Architectures and Protocols", Low Price Edition, Pearson Education, 2007, pp. 521.
[5] A. J. Menezes, P. C. V. Oorschot, and S. A. Vanstone, "Handbook of Applied Cryptography", CRC Press, 1996 .
[6] S. Yi, P. Naldurg and R. Kravets, "Security-Aware Ad Hoc Routing for Wireless Networks", Proceedings of ACM MOBIHOC 2001, pp. 299-302, October, 2001.
[7] Y.C. Hu, D.B. Johnson, and A. Perrig, "SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad hoc Networks," Proc. 4th IEEE Workshop on Mobile Computing Systems and Applications, Callicoon, NY, June 2002, pp. 3-13.
[8] Kimaya Sanzgiti, Bridget Dahill, Brian Neil Levine, Clay shields, Elizabeth M, Belding-Royer, "A secure Routing Protocol for Ad hoc networks", In Proceedings of the 10th IEEE International Conference on Network Protocols (ICNP' 02), pp. 78-87, November 2002.
[9] P. Michiardi and R. Molva, "CORE: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks", IFIP-Communication and Multimedia Security Conference 2002.
[10] S. Buchegger and J. Boudec, "Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks", Proc. of the 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing, Canary Islands, Spain, 2002.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Comparative Cost Analysis of TEXT (Template Extraction) Based On Clustering and Entropy Model |
Country | : | India |
Authors | : | Ashish Pabitwar, Santosh Biradar, Swapnila Mirajkar |
Abstract: To achieve high productivity in publishing the web pages are automatically methods such as clustering and classification and badly impact the performance and re-sources of tools that processes the web pages. Thus, the template detection techniques have received a lot of attention to improve the performance of search engines, clustering and classification of web documents. Here, project is presenting the approach to detect and extract the templates from heterogeneous web documents and cluster them into different group. The pages belong to each group should possess the same structure evaluated using common templates with contents. The templates are considered harmful because they compromise the relevance judgment of many web information retrieval and web mining.
Keywords: Clustering, Minhash, Minimum Description Length Principle, Template Extraction.
[1] J. Rissanen, Stochastic Complexity in Statistical Inquiry. World Scientific, 1989.
[2] J. Rissanen, "Modeling by Shortest Data Description," Automatica, vol. 14, pp. 465-471, 1978.
[3] T.M. Cover and J.A. Thomas, Elements of Information Theory. Wiley Interscience, 1991.
[4] H. Zhao, W. Meng, Z. Wu, V. Raghavan, and C. Yu, "Fully Automatic Wrapper Generation for Search Engines," Proc. 14th Int'l Conf. World Wide Web (WWW), 2005.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Hand Gesture Recognition Approach towards Shoulder Wearable Computing |
Country | : | India |
Authors | : | Humera Syed, M. S. Khatib |
Abstract: Human Computer Interaction needs computer systems and sensing devices. HCI has the limitation of front face interaction with system camera. Since it is not possible to carry out the complete computer system and display system everywhere, therefore there is need of designing and implementing shoulder wearable HCI device. The proposed system can detect hand gestures through short ranged camera. Display of the output will be through mini projection system. Using mini projector we can plot the output almost on any platform. Objectives like visual paint brush application for drawing purpose can be achieved due to which user get more flexibility to draw than a mouse control. This application consists of color selector, brush width, etc. Another objective which can be achieved is developing a call dialing application using GSM modem and GUI application to interact. This application consists of a GSM modem connected to the main processing system and the use of earphone and mike for calling purpose. For achieving these two objectives, two modules, skin detection module and edge detection module is developed initially which contributes to the interactive environment. Keywords -Wearable Computing, Human Computer Interaction, Hand Gesture Recognition, Skin Detection, Edge Detection.
[1] Vladimir I. Pavlovic , Rajeev Sharma , Thomas S. Huang ,―Visual Interpretation of Hand Gestures for Human-Computer Interaction: A Review‖, VOL. 19, NO. 7, JULY 1997,IEEE.
[2] Dan Ionescu, ―Gesture Control and the New and Intelligent Man-Machine Interface‖, 6th IEEE International Symposium on Applied Computational Intelligence and Informatics • May 19–21, 2011,IEEE.
[3] Sushmita Mitra, ―Gesture Recognition A Survey‖, VOL. 37, NO. 3, MAY 2007,IEEE.
[4] Dan Ionescu ―Gesture Control and the New and Intelligent Man-Machine Interface‖, 6th IEEE International Symposium on Applied Computational Intelligence and Informatics, May 19–21, 2011.
[5] Carlo Colombo, Alberto Del Bimbo, and Alessandro Valli ―Visual Capture and Understanding of Hand Pointing Actions in a 3-D Environment‖ VOL. 33, NO. 4, AUGUST 2003,IEEE.
[6] Luigi Gallo and Mario Ciampi, ―Wii Remote-enhanced Hand-Computer Interaction for 3D Medical Image Analysis‖,
2009,IEEE.
[7] Deliang Zhu, Zhiquan Feng, Bo Yang, Yan Jiang, Tiantian Yang, ―The Design and Implementation of 3D Hand-based Human-Computer Interaction Platform‖ 20IO International Conference on Computer Application and System Modeling (ICCASM 2010).
[8] P. Dietz and D. Leigh, ―Diamondtouch: a multi-user touch technology,‖ in Proceedings of the 14th annual ACM symposium on User interface software and technology. 2001. Orlando, Florida: ACM.
[9] J. Y. Han, ―Low-cost multi-touch sensing through Frustrated Total Internal Reflection,‖ in Proceedings of the 18th annual ACM symposium on User interface software and technology. 2005. Seattle,WA, USA: ACM.
[10] C. Pinhanez, et al., ―Creating touch-screens anywhere with interactive projected displays,‖ in Proceedings of the eleventh ACM international conference on Multimedia. 2003, ACM: Berkeley, CA, USA.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Importance of Iris Recognition against Technology Failure |
Country | : | India |
Authors | : | N. PRASANTH |
Abstract: It is undeniable that among the science and technology the role and importance of iris recognition is most reliable and accurate biometric recognition process. Iris recognition captures the iris region in the particular portion of an eye. The capture of the iris pattern should be done accurately. In this paper I explained about the importance of iris recognition in Indian Armed Weapons specially used in artillery guns of Indian army against technology. The iris coded of artillery soldiers are encoded with biometric devices is attached to the artillery weapons. It seems that the artillery gun will be triggered only when the iris pattern is matched with iris codes. By applying this biometric methodology we can protect Indian Armed Weapons in highly secure manner and also Indian Armed Weapons are utilize only by Indian soldiers. Therefore choosing the iris recognition is highly efficient and secure level of Future Warfare.
Keyword: Artillery, Biometrics,Computation, Iris Recognition,Image Processing.
[1]NSTCSubcommittee on Biometrics, can be found at
http://www.biometricscatalog.org/NSTCSubcommittee
[2] InternationalJournal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, Volume 2, Issue 6, June 2012)DAUGHMAN'S ALGORITHMMETHOD FOR IRIS RECOGNITION-A BIOMETRIC APPROACH.
[3]IEEE Transaction On Circuits and systems for Technology, VOL. 14, NO. 1, JANUARY 2004 How Iris Recognition Works John Daugman
[4]Artificial Intelligence A Modern Approach Third Edition Stuart J. Russell and Peter Norvig Copyright c_ 2010, 2003, 1995 by Pearson Education, Inc., Upper Saddle River, New Jersey 07458.
[5] BIOINFOMATICS: New Technology Models for Research, Education and Science
[6]MARK GERSTEIN, 1999, Yale, bioinfo.mbb.yale.edu
[7] www.indianarmy.nic.in/notification/Future Technology Requirements of the Indian Army.
[8]www.indianarmy.nic.in
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Everything Can Be Hacked |
Country | : | India |
Authors | : | Saquib Shakil Ahmed |
Abstract: The devices in modern world are no longer safer to use in day to day life. As the technology is enhancing rapidly, this comes with a price i.e. risks of getting hacked and the vulnerabilities in those devices can be easily found. This paper will concentrate on demonstrating the attacks on real world devices which people in society generally don't know. These devices are automobiles and medical implanted devices. All of these devices possess networking capabilities therefore they are bound to have a buzz because devices in a network can be accessed by a hacker by applying network hacking techniques. This paper will show snapshots of live attacks on automobiles with software interfaces. The paper would try to show the sensitivities and consequences of the attacks on these devices like medical devices and automobiles. The attacks could be even life threatening to a person if someone gains illegal access to patient's implanted medical (like pacemaker) device or automobile of a person while he/she is driving.
Keywords: Automobiles, Hacks, Implanted medical devices, Networking capabilities, Vulnerabili
[1]"Experimental Security Analysis of Modern Automobile", Karl Koscher, Shwetak Patel, Franzika Rosener, Brain Kantor, Stefan Savage,IEEE Symposium on Security and Privacy
[2] "Adventures in automobile network and control units", Dr. Charlie Miller & Chris valasek
[3] R. Charette. This car runs on code. Online: http://www.spectrum.ieee.org/feb09/7649, Feb. 2009.
[4]T. Hoppe, S. Kiltz, and J. Dittmann. Security threats toautomotive CAN networks –practical examples and selectedshort-term countermeasures in SAFECOMP, 2008.
[5]S. Mollman. From cars to TVs, apps are spreading to the realworld. Online: http://www.cnn.com/2009/TECH/10/08/apps. realworld/, Oct. 2009.
[6]M. Wolf, A. Weimerskirch, and T. Wollinger. State of theart: Embedding security in vehicles. EURASIP Journal on Embedded Systems, 2007.
[7] Y. Zhao. Telematics: safe and fun driving. Intelligent Systems,IEEE, 17(1):10–14, Jan/Feb 2002.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Review of Multicasting in Network Communication |
Country | : | India |
Authors | : | Ritesh G.Shrivastava, M.S.Khatib, Kamlesh Kelwade |
Abstract: Multicasting is fundamental communication paradigm for supporting one to many communications. A better way to transmit data from one source to many destinations is to provide a multicast transport service. With a multicast transport service one node can send data to many destinations' by making just a single call on the transport service. Thus for those applications which involves a single node sending to many recipients, a multicast facility is clearly a more natural programming paradigm than unicast (point to point). Many underlying transmission media provide support for multicast and broadcast at hardware and media access level. When a multicast service is implemented over such a network, there is a huge improvement in performance. If hardware supports multicast, a packet which is destined for N recipients can be sent as just a single packet. IP MULTICAST PROTOCOL (RFC 1112) was adapted by Internet Engineering Task Force (IETF) in March 1992 as a standard protocol for building multicast applications on the internet. Keywords-Communication, Multicast Routing Algorithm, Multicast Protocol.
[1]Osamah S. Badarneh and Michel Kadoch "Multicast Routing Protocols in Mobile Ad Hoc Networks: A Comparative Survey and Taxonomy" EURASIP Journal on Wireless Communications and Networking Vol. 2009.
[2] V. Ramesh, Dr. P. Subbaiah N. Sandeep Chaitanya K. Sangeetha Supriya4 "An efficient energy management scheme for mobile ad-hoc networks". International Journal Of Research And Reviews In Computer Science (Ijrrcs) Vol. 1, No. 4, December 2010.
[3] Weifa Liang, Senior Member, IEEE "Approximate minimum-energy multicasting in wireless ad hoc networks" IEEE Transactions On Mobile Computing, Vol. 5, No. 4, April 2006.
[4] Weifa Liang, Senior Member, IEEE, Richard Brent, Fellow, IEEE, Yinlong Xu, and Qingshan Wang "Minimum-energy all-to-all multicasting in wireless ad hoc networks" IEEE Transactions On Wireless Communications, Vol. 8, No. 10, October 2009.
[5] Yongwook Choi, Maleq Khan, V.S. Anil Kumar, and Gopal Pandurangan," Energy-optimal distributed algorithms for minimum spanning trees" IEEE Journal On Selected Areas In Communications, Vol. 27 [6]Hassan Artail, and Khaleel Mershad "MDPF: Minimum Distance Packet Forwarding for Search Applications in Mobile Ad Hoc Networks" IEEE Transactions On Mobile Computing, Vol. 8, No. 10, October 2009
[7] Maleq Khan, Gopal Pandurangan, S. Anil Kumar "Distributed Algorithms for Constructing Approximate Minimum Spanning Trees in Wireless Networks" IEEE Transactions On Parallel And Distributed Systems.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Deployment of Application and Review of Different Security Mechanism for Cloud |
Country | : | India |
Authors | : | Neha Puri, Prof.R.C.Dharmik |
Abstract:Day-by-Day the cloud computing is been used widely in various areas because of its ability to reduce the costs associated with computing along with by increasing the scalability and flexibility for computing services. Cloud computing is a dynamic internet based computing where different services are provided to the user anywhere anytime when demanded. Because of the open environment of the cloud the biggest issue in the cloud computing is security. This paper will explore on efficient way of deployment of the application on the cloud and the review of the different security mechanism available for the cloud with their limitations and the drawbacks along with the some improvement factors in the available security mechanisms. Paper also focused on the literature on the new proposed technique for providing the advance security to the cloud which based on the encryption technique which will provide the very high security to the cloud
Keywords - Cloud Computing, Encryption, Decryption, Cloud Security, Encryption Algorithms
[1] Aman Kumar, Dr.suresh. Jakhar, and Sunil Makkar Comparative Analysis between DES and RSA Algorithms, International Journal of Advanced Research in Computer Science and Software Engineering, volume 2.Issue 7 ,July 2012.
[2] Leena Khanna, Prof.Anant Jaiswal, Cloud Computing: Security Issues and Description of Encryption Based Algorithms To Overcome Them. International Journal of Advanced Research in Computer Science and Software Engineering, volume3,no 3,March 2013.//*
[3] Veerraju Gampala, Srilakshmi Inuganti, Satish Muppidi, Data Security in Cloud Computing with Elliptic Curve Cryptography International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-3, July 2012
[4] Ashish Bhagat, Ravi Kant Sahu, Using Third Party Auditor for Cloud Data Security: A Review, International Journal of Advanced Research in Computer Science and Software Engineering ,volume3,no 3,March 2013.
[5] EmanM.Mohamed ,Hatem S. Abdelkader, Sherif EI-Etriby" Enhanced Data Security Model for Cloud Computing"The 8th International Conference on Informatics and Systems (INFOS2012) - 14-16 May Cloud and Mobile Computing Track
[6] N. Ram Ganga Charan , S. Tirupati Rao, Dr .P.V.S Srinivas " Deploying an Application on the Cloud" International Journal of Advanced Computer Science and Applications, Vol. 2, No. 5, 2011
[7] N. Jenefa, J. Jayalakshmi ,A Cloud Storage System with Data Confidentiality and Data Forwarding, International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-3, Issue-1, March-2013
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Comparative Study of Languages & SOA Specific Exception Handling |
Country | : | India |
Authors | : | Vinod S. Patil, Prof. Sulabha V. Patil |
Abstract:Service-Oriented Architecture (SOA) is a popular design paradigm to simplify the process of creating and maintaining distributed software systems. Exception handling is one of the powerful means of achieving high dependability and fault-handling in service-oriented architecture. This paper introduces the comparative study of exception handling related to languages & SOA specific results. This result is due to experimental analysis of the SOA-specific exceptions and fault-tolerance of Web Services. It is implemented by use of different development toolkits and also discusses how SOA is used to simplify the process of servicing the various types of software users. Finally, we conclude with the benefits of our fault taxonomy for designing and testing SOA-based systems.
Keywords - Error Handling, Services, SOA, SOAP, WSDL.
[1] Stefan Bruning, S. W., and Malek, M. "A Fault taxonomy for service-oriented architecture". IEEE (2007). [2] W3C, "Web services architecture," Febuary 2004. [Online]. Available: http://www.w3.org/TR/ws-arch/ [3] Avizienis A., Laprie J.-C., Randell B., Landwehr C. "Basic Concepts and Taxonomy of Dependable and Secure Computing", IEEE Trans. on Dependable and Secure Computing. Vol.1, № 1. – P. 11-33, 2002. [4] V. S. Patil, P. Patil & P. Bhanarkar, "Survey On Exception Handling In SOA". International Journal of Engineering Research & Technology –IJERT, Vol. 1 Issue 9, November- 2012ISSN: 2278-0181. [5] http://msdn.microsoft.com [6] L. Srinivasan and J. Treadwell, "An overview of service-oriented architecture, web services and grid computing". HP Software Global Business Unit, 2, 2005 [7] F. Curbera, M. Duftler, R. Khalaf, W. Nagy, N. Mukhi, and S. Weerawarana, "Unraveling the web services web: an introduction to soap, wsdl, and uddi". Internet Computing, IEEE, 6(2):86–93, 2002. [8] http://theopentutorials.com/examples/java-ee/jax-ws/create-and-consume-web-service-using-jax-ws/ [9] V. S. Patil and P. Patil "Handling Exception using Service Oriented Architecture" 2nd National Conference on Emerging Trends In Computing 2013(NCETIC 13), June 2013 ISBN:978-93-82338-64-2.