Volume-2 (Second International Conference on Emerging Trends in Engineering' 2013)
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | COMPARATIVE STUDY OF TABLE DRIVEN ROUTING PROTOCOLS IN AD HOC WIRELESS NETWORKS |
Country | : | India |
Authors | : | Mr. Pradip A. Chougule, Mr. Rajesh A. Sanadi, Mr. U. H.Kamble |
Abstract:The recent advancements in wireless technology have lead to the development of a new wireless system called Mobile Adhoc Networks. A Mobile Adhoc Network is a self configuring network of wireless devices connected by wireless links. The traditional protocol such as TCP/IP has limited use in Mobile adhoc networks because of the lack of mobility and resources. In this paper we have compared the most popular protocols which come under table driven adhoc routing protocols for wireless networks. These comparisons is based on the some of the basic properties of the routing protocol such as the method of route establishment, method of updating the table, maintaining one or more tables, efficiency and some metrics which defines the performance of the protocol.
Keywords - CGSR, DSDV, FSR, GSR, Routing Protocol, WRP, HLS.
[ 1 ] C. Siva Ram Murthy and B.S. Manoj. Ad Hoc Wireless Networks: Architectures and Protocols.
[ 2 ] Rajmohan Rajaraman, "Topology Control and Routing in Ad hoc Networks: A Survey" ACM June 2002
[ 3 ] Elizabeth M. Royer, Chai-Keong Toh, A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks , Proc. IEEE,1999.
[ 4 ] Muhammad Mahmudul Islam, Ronald Pose and Carlo Kopp, (2008). Routing Protocols for Adhoc Networks.
[ 5 ] Abolhasam, M., Wysocki, T., & Dutkiewicz, E. (2004). A review of routing protocols for mobile adhoc networks. AdHoc Networks, 2(1), 1-22.
[ 6 ] Humayun Bakht, Madjid Merabti, and Robert Askwith. A routing protocol for mobile ad hoc networks. in 1st International Computer Engineering Conference. 27-30 December. Cairo , Egypt.
[ 7 ] S.Kannan, John E Mellor, and D.D.Kouvatsos, Investigation of routing in DSDV. 4th Annual Post-Graduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting, Liverpool UK, 2003.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Data Mining: You've missed it If Not Used |
Country | : | India |
Authors | : | Kanchan A. Khedikar ,Mr. L.M.R.J.Lobo |
Abstract: Mining data is related to extracting interesting patterns or knowledge from huge amount of data available on existing resources. By interesting we mean, patterns are non- trivial implicit, previously unknown and potentially useful facts. In Data Mining techniques, huge amounts of data is being mined. The goal of data mining is to convert such data into useful information & knowledge. This paper relates about data mining models, its applications in various fields and tools used for data mining. This survey paper gives explanation of different data mining techniques such as clustering, classification, association rule. Various tasks like Dependency analysis, Class identification, Concept description, Deviation detection and Data visualization are also touched. This paper also explains two very important data mining tools that is Weka and Orange.
Key Words- Data mining, Knowledge discovery database, classification, clustering, association rules, web mining
1] Osama K. Solieman, Data Mining in Sports: A Research Overview , MIS Masters Project ,August 2006.
[2]http://www2.cs.uregina.ca/~dbd/cs831/notes/kdd/1_kdd.html
[3] Michael J. Shaw, Knowledge management and data mining for marketing a,b,c,), Chandrasekar Subramaniam a, Gek Woo Tan a, Michael E. Welge b
[4]―Data Mining Classification Techniques Applied For Breast Cancer Diagnosis And Prognosis‖ Shelly Gupta, AIM & ACT, Banasthali University, Student M.Tech. (CS), Banasthali, India. Dharminder Kumar Dean, Faculty of Engineering and Technology, GJUS&T Hisar, India. Anand Sharma Department of CSE, GJUS&T, Project Fellow, Hisar, India.
[5]http://databases.about.com/od/datamining/g/classification.htm
[6] Data Clustering and Its Applications, Raza Ali (425), Usman Ghani (462), Aasim Saeed (464)
[7] Data mining tools, Ralf Mikut∗ and Markus Reischl.
[8]http://en.wikipedia.org/Association_rule_learning
[9] http://www.web-datamining.net/
[10]Web Mining Applications in E-Commerce and E-Services. ISBN 978-3-540-88080-6. Studies in Computational Intelligence, Vol. 172. Ting, I- Hsien; Wu, Hui-Ju (Eds.) 2009, VIII, 182 p. 54 illus.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Finding Attribute Selection Measures by Computing Loss of Information and Ambiguity for Data Clustering |
Country | : | India |
Authors | : | Mr. Mane S.G., Mr. Powar R.V. |
Abstract:In this paper, we propose a method for hierarchical clustering based by using measures for attribute selection and data partitioning algorithms after selecting the proper attribute. We have find these attributes by computing the loss of information and ambiguity. In this we have generated the decision tree (unsupervised) which will maintain the data available at each node , name of the attribute selected for partitioning available data, and rule used to partition data. We present two different measures for selecting the most appropriate attribute to be used for splitting the data at every branching node (or decision node), and two different algorithms for splitting the data at each decision node. At the last we have shown the performance of these measures and partitioning algorithms by using one sample labeled database.
Index Terms Unsupervised decision tree, entropy, data set segmentation, valley detection.
[1] Jayanta Basak and Raghu Krishnapuram, Interpretable Hierarchical Clustering by Constructing an Unsupervised Decision Tree,
IEEE Transactions On Knowledge And Data Engineering, Vol. 17, No. 1, January 2005
[2] U.M. Fayyad and K.B. Irani, On the Handling of Continuous values Attributes in Decision Tree Generation, Machine Learning,
vol. 8, pp. 87-102, 1992.
[3] L. Breiman, J.H. Friedman, R.A. Olshen, and C.J. Stone, Classification and Regression Trees. New York: Chapman & Hall, 1993.
[4] C.E. Brodley and P.E. Utgoff, Multivariate Decision Trees, Machine Learning, vol. 19, pp. 45-77, 1995.
[5] Y. Yang and J.O. Pedersen, A Comparatative Study on Feature Selection in Text Categorization, Proc. 14th Int'l Conf. Machine
Learning (ICML '97), pp. 412-420, 1997.
[6] P. Bellot and M. El-Beze, Clustering by Means of Unsupervised Decision Trees or Hierarchical and k-Means Like Algorithms,
Proc. RIAO 2000 Conf., pp. 344-363, 2000.
[7] B. Liu, Y. Xia, and P. Yu, Clustering through Decision Tree Construction, Technical Report RC 21695, IBM Research Report,
IBM, 2000.
[8] M.H. Law, A.K. Jain, and M.A.T. Figueiredo, Feature Selection in Mixture-Based Clustering, Proc. Advances in Neural
Information Processing, vol. 15, 2003.
[9] H.H. Bock, Information and Entropy in Cluster Analysis, Proc. First US/Japan Conf. Frontiers of Statistical Modeling, 1994.
[10] F.B. Baulieu, "A Classification of Presence/Absence Based Dissimilarity Coefficients," J. Classification, vol. 6, pp. 233 -246,
1989.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | GPS Trajectories Based System: T-Finder |
Country | : | India |
Authors | : | Ms. Chavan Mayuri, Mr. Gade Rajesh |
Abstract: This paper presents a recommender system for both taxi drivers and people expecting to take a taxi, using the knowledge of 1) passengers' mobility patterns and 2) taxi drivers' picking-up/dropping-off behaviors learned from the GPS trajectories of taxicabs. The objective of this paper is, 1) it provides taxi drivers with some locations and the routes to these locations, towards which they are more likely to pick up passengers quickly (during the routes or in these locations) and maximize the profit of the next trip. 2) It recommends people with some locations (within a walking distance) where they can easily find vacant taxis. In our method, we learn the above-mentioned knowledge (represented by probabilities) from GPS trajectories of taxis. We feed the knowledge into a probabilistic model which estimates the profit of the candidate locations for a particular driver based on where and when the driver requests the recommendation.
Keywords- Location-based services, recommender systems, trajectories, taxicabs, parking place detection
1] http://research.microsoft.com/apps/pubs/?id=152883.
[2] J. Yuan, Y. Zheng, C. Zhang, X. Xie, and G. Sun. An interactive-voting based map matching algorithm. In Proc. MDM 2010, pages 43–52.
[3] V. Cardellini, M. Colajanni, and P. Yu. Dynamic load balancing on web-server systems. Internet Computing, IEEE, 3(3):28–39, 1999.
[4] D. Grosu and A. Chronopoulos. Algorithmic mechanism design for load balancing in distributed systems. Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions on, 34(1):77–84, 2004.
[5] J. Yuan, Y. Zheng, X. Xie, and G. Sun. Driving with knowledge from the physical world. In Proc. KDD 2011, pages 316–324. ACM.
[6] C.P. Arora, Refrigeration and Air conditioningPHI Publications, 2010.
[7] J. Yuan, Y. Zheng, L. Zhang, X. Xie, and G. Sun. Where to find my next passenger? In Proceedings of the 13th international conference on Ubiquitous computing. ACM, 2011.
[8] K. Yamamoto, K. Uesugi, and T. Watanabe. Adaptive routing of cruising taxis by mutual exchange of pathways. In Knowledge- Based Intelligent Information and Engineering Systems, pages 559– 566. Springer, 2010.
[9] M. Ziegelmann. Constrained Shortest Paths and Related Problems. PhD thesis, Universit¨at des Saarlandes, 2001.
[10] S. Phithakkitnukoon, M. Veloso, C. Bento, A. Biderman, and C. Ratti. Taxi-aware map: Identifying and predicting vacant taxis in the city. In.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Green Computing-New Approaches of Energy Conservation and E- Waste Minimization |
Country | : | India |
Authors | : | Mr.N.P.Jadhav, Mr. R.S. Kamble,Mr.S.V.Kamble |
Abstract: Thrust of computing was initially on faster analysis and speedier calculation and solving of more complex problems. But in the recent past another focus has got immense importance and that is achievement of energy conservation of e-equipments. Green Computing is now under the attention of not only environmental organizations, but also businesses from other industries. It has also given utmost attention to minimization of e-waste and use of non-toxic materials in preparation of e-equipments. In recent years, companies in the computer industry have come to realize that going green is in their best interest, both in terms of public relations and reduced costs.
Keywords- Carbon, Conservation, E-waste, Environment, Efficiency.
1] http://www.wipro.in/Products/greenpc/in dex.htm#1[Last visited on 25th December, 2011]. [2]http://www.redbooks.ibm.com/abstracts/redp4413.html [Last visited on December, 2011].
[3] http://www.csi-india.org [Last visited on 24th October, 2011].
[4] Green Computing and Green IT Best Practices on Regulations and Industry Initiatives, Virtualization, Power Management, Materials Recycling and Telecommuting by Author Jason Harris , 2008 .
[5] http://green.wikia.com/wiki/Green_Computing. [Last visited on 2th January, 2012].
[6] http://thefutureofthings.com/articles/1003/green-computing.html
[7] Wu-chun Feng (Editor). Green Computing: Large-Scale Energy Efficiency. CRC Press. January 2011.
[8] John Lamb. The Greening of IT: How Companies Can Make a Difference for the Environment. IBM Press; May, 2009, ISBN-13: 978-0137150830.
[9] John Lamb. The Greening of IT: How Companies Can Make a Difference for the Environment. IBM Press; May, 2009, ISBN-13: 978-0137150830.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Handwritten Script Recognition |
Country | : | India |
Authors | : | Mr. Awasare Bhushan, Ms. Patil Kalyani, Ms. Jolapure Supriya |
Abstract: We can use the handwriting recognition process for a quick . Handwriting recognition is in research for over four decades and has attracted many researchers across the world. Handwriting recognition involves the automatic conversion of text as it is written on an application or a writing pad, where hand-movements play a vital role. The obtained signal is converted into letter codes which are usable within computer and text-processing applications. The elements of an on-line handwriting recognition interface typically include: a pen or stylus for the user to write with. a touch sensitive surface, which may be integrated with, or adjacent to, an output display. a software application which interprets the movements of the stylus across the writing surface, translating the resulting strokes into digital text.
Keywords – Digital pen, Handwritten script, PDA, Stylus, Writer-Independent
1] Tappert, C. C., Suen, C. Y., and Wakahara, T., 1988. Online Handwriting Recognition- A Survey. International Conference on Pattern recognition, vol. 2, pp. 1123-1132.
[2] Tappert, C. C., Suen, C. Y., and Wakahara, T., 1990. The State of the Art in Online Handwriting Recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 12, no. 8, pp. 787-808.
[3] Palmondon, S.N. Srihari: "Online and Offline Handwriting Recognition: A Comprehensive Survey", IEEE Transactions on pattern Analysis and Machine Intelligence, Vol. 22, No-1, 2000.
[4] A. Drissman, "Handwriting Recognition Systems: An Overview", availablefromwww.drissman.com/avi/school/HandwritingRecognition.pdf
[5] C.C. Tappert, C.Y. Suen, T.Wakahara, "The State of the Art in Online Handwriting Recognition", IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 12, No. 8, August, 1990.
[6] "Pen Technologies", IBM Pen Technologies, Available from www.research.ibm.com/electricInk/
[7] H. Shu, "On-line Handwriting Recognition Using Hidden Markov Models", (Master Thesis), Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, 1997.
[8] Scott D.Connell, "Online Handwritten Recognition Using Multiple Pattern Class Models", (Doctor of Philosophy Dissertation), Department of Computer Science and Engineering, Michigan State University, 2000.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Improvement of network efficiency by modified architecture for mobile IP |
Country | : | India |
Authors | : | Dange Laxmikant Madhavrao, Shetiye Praveen Chhatanrao |
Abstract: The proposed article address the issue of routing data to and from mobile network using a global IPv6 network. The authors have suggested network architecture for routing data for mobile nodes, connectivity and authentication for mobile nodes. The methodology proposed is self-advertising, self-routing IPv6 based mobile IP. The proposed routing protocol manages connections while moving mobile node from one network to another.
Keywords –Addressing, global connectivity, Mobile-IPv6, Internet protocol version 6 (IPv6), routing.
[1] Pablo Vidales, Javier Baliosian, Joan Serrat, Glenford Mapp, Frank Stajano, and Andy Hopper; "Autonomic System for Mobility Support in 4G Networks", IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 23, NO. 12, DECEMBER 2005
[2] Jie Li, Hsiao-Hwa Chen; "Mobility Support for IP-Based Networks", IEEE Communications Magazine, October 2005
[3] Juha Ala-Laurila, Jouni Mikkonen, and Jyri Rinnemaa; "Wireless LAN Access Network Architecture for Mobile Operators", IEEE Communications Magazine November 2001
[4] TAO ZHANG AND PRATHIMA AGRAWAL, JYIH-CHENG CHEN; "IP-Based Base Stations and Soft Handoff in All-IP Wireless Networks", IEEE Personal Communications October 2001.
[5] Prasan de Silva and Harsha Sirisena; "A Mobility Management Protocol for IP-Based Cellular Networks", ICCCN, 2001.
[6] BEHCETSARIKAYA, "Home agent placement and IP address management for integrating WLAN's with cellular networks", IEEE Wireless Communications, December 2006
[7] MASSIMOBERNASCHI, GIULIO IANNELLO, AND STEFANO ZA, ANTONIOPESCAP`E; "Seamless internetworking of WLAN's and cellular networks: Architecture and performance issues in a mobile IPv6 scenario", IEEE Wireless Communications, June 2005
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Security in Cloud Computing |
Country | : | India |
Authors | : | Mr. Rajesh A.Sanadi, Mr.Pradip A.Chougule, Mr. Bhaskar D. Paranjape, Miss. Sonali P. Pawar |
Abstract:The National Institute of Standards and Technology (NIST) defined cloud computing as a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or cloud provider interaction . Cloud computing has the potential to change how organizations manage information technology and transform the economics of hardware and software at the same time. Cloud computing promised to bring a new set of entrepreneurs who could start their venture with zero investment on IT infrastructure. However this captivating technology has security concerns which are formidable. The promises of cloud computing, especially public cloud can be shadowed by security breaches which are inevitable. As an emerging information technology area cloud computing should be approached carefully. In this article we will discuss the security and privacy concerns of cloud computing and some possible solutions to enhance the security. Based on the security solutions suggested i have come up with a secured framework for cloud computing.
Keywords - Cloud computing, Information Technology, IT, Security and Privacy, Software as a service,).
[1] Peter Mell, Tim Grance, The NIST Definition of Cloud Computing, Version 15, October 7, 2009, [2]URL:http://csrc.nist.gov/groups/SNS/cloud-computing, http://www.labnol.org/internet/cloud-computing-legal-issues/14120 [3].http://www.readwriteweb.com/cloud/2010/12/3-legal-issues-to-consider
[4] http://www.cnbc.com/id/43139361/Reducing_Security_Risks_in_Cloud_Computing Wayne Jansen, Timothy Glance The NIST Guidelines on Security and Privacy in Public Cloud Computing
[5] "Security Guidance for Critical Areas of Focus in Cloud Computing". Cloud Security Alliance. 2011. Retrieved 2011-05-04.
[6] Winkler, Vic (2011). Securing the Cloud: Cloud Computer Security Techniques and Tactics. Waltham, MA USA: Elsevier. pp. 65, 68, 72, 81, 218–219, 231, 240. ISBN 978-1-59749-592-9.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Social Media Marketing: The Next Generation of Business Trends |
Country | : | India |
Authors | : | Mr.N.P.Jadhav, Mr.R.S.Kamble, Ms.M.B.Patil |
Abstract: Social media marketing is the marketing strategies that smart businesses are employing in order to be a part of a network of people online. Just as friends gather in public pubs, coffee shops, or barber shops, groups of people are gathered and connected through various online tools and websites. These people rely on their online network of friends for advice, sharing, and socializing. Many different styles of online communities have surfaced over the years. However within the last few years, newly created communities are offering more rich interaction. Social Media marketing strategies allow conversation, connection, and a sense of community among its members.
Keywords- Community, Business, Media, Market.
[1] Social Media Marketing Dave Evens & Jake Mackee
[2] Trattner, C., Kappe, F.: Social Stream Marketing on Facebook: A Case Study. International Journal of Social and Humanistic Computing (IJSHC), 2012.
[3] Social Media Marketing Industry Report by Michael A.Stelzner,March 2009.
[4] What Is Social Media Marketing, by Rob Williams of Orangejack LLC, Updated Feb 2009.
[5] ―A Simple Way to Calculate Social Media Return on Investment". Social Media Examiner. Retrieved 30 October 2012.
[6] "Formulas Revealed: The Facebook and Twitter Engagement Rate". Socialbakers. Retrieved 30 October 2012.
[7] Kaplan, Andreas M. (2012) If you love something, let it go mobile: Mobile marketing and mobile social media 4x4, Business Horizons, 55(2), p. 129-139.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Software Engineering Metrics: Introduction |
Country | : | India |
Authors | : | Rahul N. Lokhande |
Abstract: Constructing validity in the software systems are moving around the questions, What efforts have to take for analyzing the software system and to evaluate the performance of the system? The discussion for constructing validity starts with the discussion of measuring the attributes of the software system which are known as the software metrics. This paper presents the introduction to the software metrics as the key point for evaluation of validity, performance , analysis and protection from faults in the software systems. There is also classification of the software metrics, collection of metrics using software metric tools. A model is proposed for fault detection using software metrics, this paper also enlighten various applications of software metrics.
Keywords– Fault detection , lines of code,OOO meter ,Software metrics, Software metrics tools
[1] Cem Kaner, "Software Engineering Metrics : What do They Measure and How Do We Know?", 10th International software metrics symposium, Metrics 2004.
[2]Rudiger lincke,Jonas Lundber and Welf Lowe, " Comparing Software Metrics Tools".
[3] Everald E. Mills, "Software Metrics",SEI curriculum Module SEI-CM-12-1.1, Dec 1988.
[4]Alberto Sillitti, Barbara Russo, Paolo Zuliani, Giancarlo Succi, "Deploying, Updating, and Managing Tools for Collecting Software Metrics".
[5]Tracy Hall, Norman Felton, " Implementing Effective Software Metrics Programs" IEEE Software,1997.
[6] Istevan Siket, "Applying Software Product Metrics in Software Maintenance",2010.
[7] Z.Guo, G. Jiang and K.Yoshihira, "Tracking Probabilistic Correlation of Monitoring Data for Fault Detection in Complex Systems", Proc int'l Conf. Dependable Systems and Networks (DSN '06). 2006.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | SQLIA: Detection And Prevention Techniques: A Survey |
Country | : | India |
Authors | : | Pushkar Y.Jane , M.S.Chaudhari |
Abstract: SQL injection is an attack methodology that targets the data residing in a database through the firewall that shields it. The attack takes advantage of poor input validation in code and website administration. SQL Injection Attacks occur when an attacker is able to insert a series of SQL statements in to a "query‟ by manipulating user input data in to a web-based application, attacker can take advantages of web application programming security flaws and pass unexpected malicious SQL statements, Query through a web application for execution by the back-end database. And attacker get full access of the backend database. In this way,SQL Injection Attack performed.
Keywords: SQL injection, database security, authentication.
[1] Indrani Balasundaram, Dr.E.Ramaraj "An Approach to Detection of SQL Injection Attacks in Database Using Web Services"(IJCSNS,VOL. 11 No.1,January 2011).
[2] Rahul Shrivastava, Joy Bhattacharyji, Roopali Soni "SQL INJECTION ATTACKS IN DATABASE USING WEB SERVICE: DETECTION AND PREVENTION – REVIEW" Asian Journal Of Computer Science And Information Technology 2: 6 (2012) 162 – 165. Also Available at http://www.innovativejournal.in/index.php/ajcsit.
[3] Shubham Srivastava, Rajeev Ranjan Kumar Tripathi "Attacks Due to SQL Injection & Their Prevention Method for Web-Application" (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 3 (2) , 2012,3615-3618. [4]Prasant Singh Yadav, Dr pankaj Yadav, Dr. K.P.Yadav "A Modern Mechanism to Avoid SQL Injection Attacks in Web Applications" (IJRREST Volume-1 Issue-1, June 2012)
[5] V.Shanmughaneethi ,S.Swamynathan "Detection of SQL Injection Attack in Web Applications using Web Services" (ISSN : 2278-0661 Volume 1, Issue 5 (May-June 2012), PP 13-20).
[6] William G.J.Halfond and Alessandro Orso "AMNESIA: Analysis and Monitoring for Neutralizing SQL-Injection Attacks"
[7] X. Fu, X. Lu, B. Peltsverger, S. Chen, K. Qian, and L. Tao. "A Static Analysis Framework for Detecting SQL Injection Vulnerabilities", COMPSAC 2007, pp.87-96, 24-27 July 2007.
[8] S. Thomas, L. Williams, and T. Xie, "On automated prepared statement generation to remove SQL injection vulnerabilities." Information and Software Technology 51, 589–598 (2009).
[9] A.SRAVANTHI, K.JAYASREE DEVI,K.SUDHA REDDY, A.INDIRA, V.SATISH KUMAR "DETECTING SQL INJECTIONS FROM WEB APPLICATIONS" [IJESAT Volume-2, Issue-3, 664 – 671].
[10] Diallo Abdoulaye Kindy and Al-Sakib Khan Pathan "A SURVEY ON SQL INJECTION: VULNERABILITIES, ATTACKS, AND PREVENTION TECHNIQUES"
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Using Linked Data to Context-Aware Annotate and Search Educational Video Resources |
Country | : | India |
Authors | : | Mr. Prasad V. Phalle, Mr. Somanath J. Salunkhe |
Abstract: Video resources play an important role in education. Large number of educational video resource is created by different organizations and institutions for study that are available through the multimedia web. Most of them video resources are annotated which lack semantic connection. Thus, facilitating for annotating such video resources is needed. Most of the educational video resources are available as non-semantic, non-linked manner and without context-aware technique. Using Linked Data technology we can semantically annotate video resources as well as these annotated resources linked to other video resources that are available on web. These facilities provide semantic connection between videos and their metadata understood globally. Here two online tools to be developed. First online tool used to context-aware annotate educational video resources and another tool for semantically searching these video resources.
Keywords - Educational video resources, linked data, semantic search, web services.
[1] T. Berners-Lee, J. Hendler, and O. Lassila, The Semantic Web. 2001, Scientific Am. Magazine.
[2] F. Baader, D. Calvanese, D.L. McGuinness, D. Nardi and P.F. Patel-Schneider, The Description Logic Handbook: Theory, Implementation, and Applications. 2003, Cambridge Univ.
[3] L. Ballan, M. Bertini, A.D. Bimbo, and G. Serra, Video Annotation and Retrieval Using Ontologies and Rule Learning. IEEE Multimedia, Vol. 17, no. 3, 2010, pp. 72-76.
[4] J. Hunter, R. Schroeter, B. Koopman, and M. Henderson, Using the Semantic Grid to Build Bridges Between Museums and Indigenous Communities. Proc. 11th Global Grid Forum on Semantic Grid Applications Workshop, 2004, pp. 46-61.
[5] J. Hunter, Enhancing the Semantic Interoperability of Multimedia through a Core Ontology, IEEE Trans. Circuits and Systems for Video Technology, Vol. 13, no. 1, 2003, pp 49-58.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Web Video Discovery, Visualization and Monitoring |
Country | : | India |
Authors | : | Mr.V.C.Patil, Miss.B.K.Ugale |
Abstract: Now a day's the massively growth of web-shared videos in Internet (such as Face book , YouTube users), efficient organization and monitoring of videos remains a practical challenge. Because these days the cyber crime security is mostly important issue over Internet .While now a days broadcasting channels and social sites are keen to monitor online events, identifying topics of interest from very big volume of user uploaded videos, pictures, images and giving recommendation to emerging topics are by no means easy , such process involves discovering of new topic, visualization of the topic content and incremental monitoring of topic evolution. The studies of web shared videos problem from three aspects. First, given a large set of videos collected over months, an efficient algorithm based on salient trajectory extraction on a topic evolution link graph is proposed for topic discovery. Second, topic trajectory is visualized as a temporal graph in 2D space, with one dimension as time and another as degree of hotness, for depicting the birth, growth and decay of a topic. Finally, giving the previously discovered topics, an incremental monitoring algorithm is proposed to track newly uploaded videos, while discovering new topics and giving recommendation to potentially hot topics. We demonstrate the application on videos crawled from YouTube or Face book during three months. Both objective and user studies are conducted to verify the performance.
Keywords - Topic trajectory, Video recommendation, Visualization.
[1] . J. Cao, C. W. Ngo, Y. D. Zhang, D. M. Zhang, and L Ma, "Trajectory based visualization of web video topics," in Proc. Int. Conf. Multimedia,2010,
[2]. K. Y. Chen, L. Luesukprasert, and S. T. Chou, "Hot topic Extraction based on timeline analysis and multi- dimensional sentence modeling," IEEE Trans. Knowledge Data Eng., vol. 19, no. 8, pp. 1016–1025, Aug.2007.
[3]. Q. He, K. Chang, and E. P. Lim, "Analyzing feature trajectories for event detection," in Proc. ACM SIGIR Conf., 2007.
[4]. Q. Mei and C. Zhai, "Discovering evolutionary theme patterns from text: An exploration of temporal text mining," in Proc. ACM SIGKDD Int. Conf. Knowledge Discovery Data Mining, 2005, pp. 198–207.