IOSR Journal of Computer Engineering (IOSR-JCE)

Volume 15- Issue 2

Paper Type : Research Paper
Title : A Synopsis of Simulation and Mobility Modeling in Vehicular Ad-hoc Networks (VANETs)
Country : Australia
Authors : Sabih ur Rehman, M. Arif Khan, Tanveer A. Zia, Rashid H. Khokhar
: 10.9790/0661-1520116      logo

Abstract: Vehicular communication is considered to be a backbone for many critical safety applications. In order to achieve a better implementation of any vehicular communication scenario, an efficient, accurate and reliable simulator is essential. Various open source and commercial simulating tools are available for this purpose. One of the key issues in this regard is the selection of a reliable simulator which implements all standard algorithms and paradigms giving accurate results. In this paper, we first present IEEE standard and protocols for vehicular communication, IEEE 802.11p and IEEE 1609.x, also known as WAVE protocol stack. The paper then discusses the necessary requirements for a generic discrete event simulator which can be used to simulate Vehicular Ad-hoc Networks. Since not all the network simulators can be used in the scenario of vehicular communication, we highlight the key features of some network simulators in the context of vehicular ad-hoc networks. The paper also highlights some of the implementation limitations in these simulators. Furthermore, the paper presents a discussion on traffic simulators by emphasizing on the underlying mobility models used in order to generate the realistic traffic patterns. A comparative study of both network and traffic simulators show the pros and cons of these simulation tools. The paper suggests the appropriate choice of a network simulator to be used as a VANET simulator.

Keywords: VANET, IEEE 802.11p, WAVE-PHY, WAVE-MAC, Simulators, Modeling

[1] "World Health Organization - Global Plan for the Decade of Action for Road Safety," http:www.who.int/roadsafety/decade of action/, 2010.
[2] "World Health Organization - Global Status Report on Road Safety: Time for Action," http://www.who.int/violence injury prevention/road safety status/2009/, 2009.
[3] ITS - Intelligent Transport Systems, http://www.its-australia. com.au, 2004.
[4] M. Watfa, "Advances in Vehicular Ad-Hoc Networks: Developments and Challenges", Intelligent Transport Systems. IGI Global, 2010.
[5] U. Lee, J. Lee, J. S. Park, and M. Gerla, "FleaNet: A Virtual Market Place on Vehicular Networks," IEEE Transactions on Vehicular Technology, vol. 59, no. 1, pp. 344–355, Jan. 2010.
[6] "Ford Accelerates Intelligent Vehicle Research, Creating 'Talking' Vehicle to Make Roads Safer," http://media.ford.com/ , 2010.
[7] X. Xian, W. Shi, and H. Huang, "Comparison of OMNET++ and other simulator for WSN simulation," 2008 3rd IEEE Conference on Industrial Electronics and Applications, pp. 1439–1443, Jun. 2008.
[8] K. Shafiee, J. B. Lee, V. C. M. Leung, and G. Chow, "Modeling and Simulation of Vehicular Networks," Network, pp. 77–85, 2011.
[9] F. J. Martinez, C. K. Toh, J.C. Cano, C. T. Calafate, and P. Manzoni, "A Survey and Comparative Study of Simulators for Vehicular ad hoc Networks ( VANETs )," Transportation, 2009.
[10] "IEEE STANDARD - Wireless Access in Vehicular Environments," http://grouper.ieee.org/groups/802/11.


Paper Type : Research Paper
Title : Defended Data Embedding For Chiseler Avoidance in Visible Cryptography by Using Morphological Transform Domain
Country : India
Authors : Nalla Bariki Praveen Kumar
: 10.9790/0661-1521721      logo

Abstract: This paper proposes a data-veiling technique for binate images in morphological transform domain for authen- tication purpose. To attain blind watermark drawing, it is difficult to use the detail coordinate precisely as location map to regulate the data-veiling locations. Thus, we look flipping an edge pixel in binate images as deviating the edge location one pixel horizontally ,one vertically. Positioned on this conclusion, we propose an interlaced morphological binate wavelet transform to path the alter edges, which thus ease blind watermark drawing and fusion of cryptographic indication.Unlike current block-based approach, in that the block size is given as 3 x 3 pixels and larger, we establish the image in 2 x 2 pixel blocks. It allows resilience in discovering the edges and also gets the low computational complication. There are two case that twisting the candidates of one do not change the flippability circumstances of other are engaged for orthogonal embedding, that deliver more relevant candidates can be determined so that a larger quqntity can be accomplished.A contemporary effective Backward-Forward Minimization method is suggested, which acknowledge the back-ward i.e enclose candidates and forward those twisted candidates that may be concerned by spining the present pixel. By this way, the complete visual bias can be minimized. Experimental results determine the validity of our arguments.

Keywords: Verification, binate images, data cloaking, mor- phological binate wavelet transform, Quadrate embedding.

[1]. J. Cox, M. L. Miller, and J. A. Bloom, Digital Watermarking. San Mateo, CA: Morgan Kaufmann, 2001.
[2]. B. Furht and D. Kirovski, Multimedia Security Handbook, B. Furht and D. Kirovski, Eds. Boca Raton, FL: CRC, 2005.
[3]. Y. Liu, J. Mant, E. Wong, and S. H. Low, "Marking and detection of text documents using transform-domain techniques," in Proc. SPIE, San Jose, CA, 1999, vol. 3657, pp. 317–328.
[4]. Q. Mei, E. K. Wong, and N. Memon, "Data hiding in binary text doc- ument," in Proc. SPIE, 2001, vol. 4314, pp. 369–375.
[5]. Y. C. Tseng and H.-K. Pan, "Data hiding in 2-color images," IEEE Trans. Comput., vol. 51, no. 7, pp. 873–878, Jul. 2002.
[6]. K.-F. Hwang and C.-C. Chang, "A run-length mechanism for hiding data into binary images," in Proc. Pacific Rim Workshop on DigitalSteganography, Kitakyushu, Japan, Jul. 2002, pp. 71–74.
[7]. H. Lu, X. Shi, Y. Q. Shi, A. C. Kot, and L. Chen, "Watermark embedding in DC components of DCT for binary images," in Proc.,IEEE Workshop on Multimedia Signal Processing.
[8]. Ming-Shi Wang and Wei-Che Chen, "Digital image copyright protection scheme based on visual cryptography and singular value decomposition", Optical Engineering,Vol. 46, No. 6, 2007.
[9]. Zhe-Ming Lu, Wei-Min Zheng, Jeng-Shyang Pan and Zhen Sun, "Multipurpose Image Watermarking Method Based on Mean-removed Vector Quantization", Journal of Information Assurance and Security, Vol. 1, pp. 33-42-2006


Paper Type : Research Paper
Title : Load Balancing In Cloud Computing:A Review
Country : India
Authors : Shiny
: 10.9790/0661-1522229      logo

Abstract: As the IT industry is growing day by day, the need of computing and storage is increasing rapidly. The amount of data exchanged over the network is constantly increasing. Thus the process of this increasing mass of data requires more computer equipment to meet the various needs of the organizations. To better capitalize their investment, the over-equipped organizations open their infrastructures to others by exploiting the Internet and other important technologies such as virtualization by creating a new computing model: the cloud computing. Cloud computing is one of the significant milestones in recent times in the history of computers. The basic concept of cloud computing is to provide a platform for sharing of resources which includes software and infrastructure with the help of virtualization. This paper presents a brief review of cloud computing. The main emphasize of this paper is on the load balancing technique in cloud computing.

Keywords: Cloud Computing, Load Balancing, Dynamic Load Balancing, Virtualization, Data Center.

[1] A.T. Velte, T.J. Veltey and R. Elsenpeter, Cloud Computing: A Practical Approach (Tata McGraw-Hill Education Private Limited, New Delhi, Edition 2010).

[2] Y. Jadeja and K. Modi, "Cloud Computing-Concepts, Architecture and Challenges", International Conference on Computing, Electronics and Electrical Technologies, 2012, 877-880.

[3] F.B. Shaikh and S. Haider, "Security Threats in Cloud Computing", Internet Technology and Secured Transactions,2011, 214-219.

[4] J. Srinivas, K.V.S.Reddy and A.M. Qyser, "Cloud Computing Basics", International Journal of Advanced Research in Computer and Communication Engineering, 1(5), July 2012. [5] S. Ray and A.D. Sarkar, "Execution Analysis of Load Balancing Algorithms in Cloud Computing Environment",International Journal on Cloud Computing Services and Architecture, 2(5), October 2012.

[6] e2networks.com/cloud-servers-india/cloud-computing-architecture/

[7] D.K. Kumar, G.V. Rao and G.S. Rao, "Cloud Computing: An Analysis of Its Challenges and Security Issues", International Journal of Computer Science and Network, 1(5), October 2012.

[8] K. Jamsa, Cloud Computing (Jones & Bartlett Learning, 5 Wall Street, Burlington, USA, 2013).

[9] http://cloud.siliconindia.com/forum/Cloud-Computing-Basic-Components-qid-7970-catid-39.html

[10] http://blog.appcore.com/blog/bid/167543/Types-of-Cloud-Computing-Private-Public-and-Hybrid-Clouds


Paper Type : Research Paper
Title : Recapitulating the development initiatives of a robust information security safeguard: RITSB-the proposed solution
Country : Bangladesh
Authors : Jahidul Arafat, Md. Ahsan Habib
: 10.9790/0661-1523034      logo

Abstract: Most current information security systems performance vary with the nature of the filed its being operating. With an increased emphasizes on the adoption of security tools and technologies, the anomalies and intrusion are mostly said defined to be detected on system's algorithm, when most systems have well defined mechanism for rapid reaction and identification of intrusions. However, despite this support for anomaly detection, this is usually limited and often require a full recompilation of the system to deploy a comprehensive framework of security governance, strategies and practices employing the policies in implementation. As a result, the absence of a robust security framework securing both the education and corporate resources has heightened the tension for a strategic information security solutions which might ends with cost, complexities and cumbersome to develop. This paper thereby presents an alternative comprehensive system namely RITS-B which accommodates both the nature of education and organizations without a need to for a further modification. Implication of the proposed approach at real time depicts its suitability in the arena of concern.

Keywords: Information Security, Governance, Strategies, Practices, Regional Cultures and Believes.

[1]. Arabasz, P., & Pirani, J. (2002). Wireless networking in higher education, EDUCAUSE Center for Applied Research, Vol. 2, Available from: http://www.educause.edu/ecar/> [accessed 11 June 2010].
[2]. Albrecht, B. & Caruso, J.B. (2003). Information Technology Security at Indiana University, Case Study, ECAR, No. 8.
[3]. Bellovin, S., Blaze, M., Brickell, E., Brooks, C., Cerf, V., Diffie, W., Landau, S., Peterson, J., & Treichler, J. (2006). Security implications of applying the Communications Assistance to Law Enforcement Act to voice over IP.
[4]. Dark, M., Epstein, R., Morales, L., Countermine, T., Yuan, Q., Muhammed, Ali., Rose, M., & Harter, N. (2006). A Framework for Information Security Ethics Education. 10th Colloquium for Information Systems Security Education- University of Maryland, 4, pp. 109-115.
[5]. Ellen E.C., & Luker M.A. (2000). Finding the Will and the Way: Preparing Your Campus for a Networked Future, EDUCAUSE Leadership Strategies Series- San Francisco: Jossey-Bass Inc. Publishers, Vol. 1, pp. 85.
[6]. EDUCAUSE. (2006). CALEA (Communications Assistance for Law Enforcement Act), [online], Available from:<http://www.educause.edu/Browse /645?PARENT_ID=698> [accessed 21 August 2010].
[7]. Fender, J. (2006, June 13). LSU beefs up computer security. Capitol News Bureau [online], Available from:<http://www.2theadvocate.com/news/3040126.html> [accessed 21 June 2010].
[8]. Gray, T. (2005). Network Security Credo, [online], EDUCAUSE Quarterly Publication, 14(2), 12-14, http://staff.washington.edu/gray
[9]. Executive Guide (1998). Information Security Management: Learning From Leading Organizations, GAO/AIMD-98-68, May.
[10]. Kvavik, R. B., & Voloudakis, J. (with Caruso, J. B., Katz, R. N., King, P., & Pirani, J. A.). (2003). Information technology security: Governance, strategy, and practice in higher education, EDUCAUSE Center for Applied Research, Vol. 5, Available from: <http://www.educause.edu/ecar>


Paper Type : Research Paper
Title : A novel fuzzy rule based system for assessment of ground water potability: A case study in South India
Country : India
Authors : G. Shobha, Jayavardhana Gubbi, Krishna S Raghavan, Lakshmikanth K Kaushik, M. Palaniswami
: 10.9790/0661-1523541      logo

Abstract: Groundwater is an important water resource for domestic, irrigation, and industrial needs. The most widely exploited use of this resource is for consumption. Assessment of potability of any ground water samples is a non-trivial task. A new fuzzy rule based system has been proposed to assess the quality of ground-water samples collected from the bore-wells across 24 districts of Karnataka (South India). Eight groundwater quality salts parameters are selected for water quality analysis. A membership function for the fuzzy rule based system for each salt is developed and the weights for each parameter was calculated using Analytic Hierarchy Process (AHP) that relies on pair wise comparison. The system showed that out of 24 districts of Karnataka state, ground water from 51.78% bore-wells was not feasible for consumption.

Keywords: Groundwater quality, Fuzzy rule based system

[1] Anastassia Ailamaki. Christos Faloutsos, Paul S. Fischbeck, Mitchell J. Small, Jeanne VanBriesen, An environmental sensor network to determine drinking water quality and security, SIGMOD Record, Vol. 32, No. 4, December 2003, pp. 47-52.

[2] Expert System for Water Treatment Plant Design - A dissertation, Rand Affrikans University, Sept 2001.

[3] Ghisi E, Cardoso KA, Rupp RF, Short-term versus long-term rainfall time series in the assessment of potable water savings by using rainwater in houses, Journal of Environment management, 2012 Jun 15;100:109-19.D.O.I. : 10.1016

[4] Han, J.; Kamber, M. Data Mining: Concepts and Techniques; Morgan Kaufmann: 2000.

[5] L.A. Zadeh, "Fuzzy algorithms," Info. & Ctl, Vol. 12, 1968, pp. 94-102.

[6] M. C. L. Yu, I. Cartwright, J. L. Braden, and S. T. de Bree, Examining the spatial and temporal variation of groundwater inflows to a valley-to-flood plain river using 222Rn, geochemistry and river discharge: the Ovens River, southeast Australia, Hydrol. Earth Syst. Sci. Discuss, 10, 5225–5267, 2013.D.O.I. :10.5194/hessd-10-5225-2013.

[7] Manoucher A, Mini karim C, Annette John, A comparison on a different rule based statistical models for modeling geogenic groundwater contamination, Journal of Environmental modeling & Software, Vol 25, Issue 12, December 2010, pp. 1650-1657.

[8] Molina JL, Pulido-Velazquez M, LiopisAlbert C , Periahero S,Stochastic hydro-economic model for groundwater quality management using Bayesian networks., Journal of Water Science technology, 2013;67(3):579-86. doi: 10.2166/wst.2012.598

[9] NatarajanVenkat Kumar, Samson Mathew, Ganapathiram Swaminathan, A Hybrid Approach towards the Assessment of Groundwater Quality for Potability: A Fuzzy Logic and GIS Based Case Study of Tiruchirappalli City, India. Journal of Geographic Information System, 2010, 2, 152-162.

[10] Oliver Meixner, Fuzzy AHP Group Decision Analysis and its Application for the Evaluation of Energy Sources, Proceedings of the 10 th International Symposium on the Analytic Hierarchy/Network Process Multi-criteria Decision Making, July 29 - August 1 2009, University of Pittsburgh


Paper Type : Research Paper
Title : Modelling and Control of a Robotic Arm Using Artificial Neural Network
Country : India
Authors : Satyajit Bhowmick, Rajesh Bag, S. K. Masud Hossain, Subhajit Ghosh, Shanta Mazumder, Sauvik Das Gupta
: 10.9790/0661-1524249      logo

Abstract: Often it can be seen that men with a lost arm face severe difficulties doing daily chores. Artificial Intelligence could be effectively used to provide some respite to those people. Neural networks and their applications have been an active research topic since recent past in the rehabilitation robotics/machine learning community, as it can be used to predict posture/gesture which is guided by signals from the human brain. In this paper, a method is proposed to estimate force from Surface Electromyography (s-EMG) signals generated by specific hand movements and then design and control a Robotic arm using Artificial Neural Network (ANN) to replicate human arm. Here the force prediction is a Regression process. A hand model has been successfully moved using servo motor that has been programmed based on the results obtained from sample data. The results shown in this paper illustrate how the Robotic arm performs.

Index Terms: Surface EMG, Artificial Neural Network, Robotic arm, Regression.

[1] I.M. Rezazadeh, M. Firoozabadi, H. Hu and M. Reza Hashemi Golpayegani, "Co-Adaptive and Affective Human-Machine Inter-face for Improving Training Performances of Virtual Myoelectric Forearm Prosthesis", IEEE Transactions on Affective Computing, Vol. 3, No. 3, 2012, pages 285-297.

[2] F. Mobasser and K. Hashtrudi-Zaad, "Rowing Stroke Force Estimation with EMG Signals using Artificial Neural Networks", in Proc. 2005IEEE Conference on Control Applications, Toronto, Canada, August 28-31, 2005, pp. 825-830.

[3] D. Yang, J. Zhao, Y. Gu, L. Jiang and H. Liu,"Estimation of Hand Grasp Force based on Forearm Surface EMG", in Proc. 2009 IEEE International Conference on Mechatronics and Automation, Changchun, China, August 9-12, pp. 1795-1799.

[4] Haritha Srinivasan., Sauvik Gupta, Weihua Sheng and Heping Chen, "Estimation of Hand Force from Surface Electromyography Signals using Artificial Neural Network", The 10th., World Congress on Intelligent Control and Automation (WCICA), 2012, Bei-jing, China, 6-8 July 2012, pages 584-589.

[5] "Kendall ARBO disposable EMG/EKG Electrodes", [Online], Available:http://bio-medical.com/products/kendall-tyco-arbodisposable-electrodes-50pkg.html
[6] "NI USB-6008 DAQ", [online], Available: http://sine.ni.com/nips/cds/view/p/lang/en/nid/201986

[7] Servomotor http://en.wikipedia.org/wiki/ServoMotor
[8] Arduino http://www.arduino.cc/
[9] "NuPrep skin preparation gel" [Online].Available: http://biomedical.com/products/nuprep-eegecg-skin-prep-gel-3-pack-of-4oztubes.html
[10] "Ten20 Conductive Paste" [Online]. Available: http://www.doweaver.com/ten20.html


Paper Type : Research Paper
Title : Brain Bridge: A Comparative Study between Database Querying and Human Memory Querying.
Country : India
Authors : Suhas Suresh, Pavan Kumar B. S., Aishwarya U.
: 10.9790/0661-1525053      logo

Abstract: The human memory is always been subject to many innovations and research since a very long time. As far as our knowledge exceeds, it is the fastest information retrieval system present. Further, the database management systems are specially designed applications that interact with the user to retrieve and analyze data. Its working can be best understood with the help of a human memory structure. While the database system itself is conceptualized from the human memory, it is important to know the similarities and working principles between these two. In this paper, we throw some light on the context of database structure, it working and we refer it with respect to the human memory system.

Keywords: Brain mapping, database system, human memory, indexing, and information retrieval.

[1] Bainbridge W., Isola P., Blank I., & Oliva, A. (2012). Establishing a Database for Studying Human Face Photograph Memory. Poster presented at the 34thAnnual Conference of the Cognitive Science Society. Sapporo, Japan

[2] Brady, T. F., Konkle, T., Alvarez, G. A., & Oliva, A. (2008). Visual long-term memory has a massive storage capacity for object details. Proceedings of the National Academy of Sciences, 105(38), 14325-14329

[3]. Philip J Hilts, A Brain unit Seen As Index For Recalling Memories, September 24, 1991, New York Times

[4]. Hans Moravec, When Will Computer Harware Match the human Brain, Journal of Evolution and Technology, 1998, Volume-1.


Paper Type : Research Paper
Title : Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Routing In Wireless Sensor Networks For Energy Efficient Data Collection
Country : India
Authors : Ashutosh Kumar Shrivastava, Dr. Rajeev Paulus, Prof A. K. Jaiswal
: 10.9790/0661-1525458      logo

Abstract: In Wireless sensor network sensor nodes have a limited battery life and their efficient utilization is a very much importent task. Their are many ways are proposed for efficient utilization of energy.For efficient energy utilization many topologies,protocals are proposed by the help of which we can maximize the battery life. In this paper we propesed a methode in which a correlation is made between all the sensor nodes including ME(mobile element). A Vector Quantization methode are used for distance calculation between all the sensor nodes and mobile element. After finding the corrélation we used the DSR & AODV routing Protocol. The performance of the proposed protocol has been examined and evaluated with the NS-2 simulator in terms of packet drop ratio and energy consumption. The simulation result shows that the proposed protocol with AODV routing gives a batter result compared with same protocol with DSR routing.

Keywords: ME, DVT, DSR, AODV, Wireless Sensor Network, Efficient Energy Utilization

[1] A.Rajeswari, P.T.Kalaivaani,, ―Energy Efficient Routing Protocol for Wireless Sensor Networks Using Spatial Correlation Based Medium Access Control Protocol Compared with IEEE 802.11‖, , 978-1-61284-764-1/11/$26.00 ©2011 IEEE
[2] Mehmet C. Vuran, Member, IEEE, and Ian F. Akyildiz, ―Spatial Correlation-Based Collaborative Medium Access Control in Wireless Sensor Networks‖, IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 14, NO. 2, APRIL 2006
[3] Samir R. Das,Charles E. Perkins, Elizabeth M. Royer, Mahesh K. Marina,‖ Performance Comparison of Two On-demand Routing Protocols for Ad Hoc Networks‖ IEEE INFOCOM 2000 conference
[4] David B. Johnson, David A. Maltz, Josh Broch, ―DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks‖ http://www.monarch.cs.cmu.edu
[5] Charls E. Perkins,Elizabeth M. Royer‖Ad-Hoc on demand Distence Vector Routing‖ google based search on ―Ad-Hoc on demand Distence Vector Routing‖
[6] Rajeev K. Shakya, Yatindra Nath Singh, and Nishchal K. Verma,‖ A Novel Spatial Correlation Model for Wireless Sensor Network Applications‖, 978-1-4673-1989-8/12/$31.00 ©2012 IEEE
[7] The ns Manual, http://www.isi.edu/nsnam/ns/ns-documentation.html
[8] The Network Simulator—ns-2. [Online]. Available:http://www.isi.edu/nsnam/ns/index.html


Paper Type : Research Paper
Title : Methods of Gathering Data for Research Purpose and Applications Using IJSER Acceptance Rate of Monthly Paper Publication (March 2012 Edition-May 2013 Edition)
Country : Nigeria
Authors : Osang, J. E., Udoimuk, A. B., Etta, E. B., Ushie, P. O., Offiong N. E.
: 10.9790/0661-1525965      logo

Abstract: A good number of scientist or researchers find it very difficult in carrying on their research work successfully due to lack of good knowledge of data collection method and application. Data is referred to as a collection of facts, such as values or measurements, observation or even just descriptions of things. Various ways are used for data collection in research work or designs depending on the research being done by the researcher. This study focus on the qualitative and quantitative approach examine by researchers during data collection methods (or ways) which are: Observation, Survey, Interview, Experiment, etc. The definition of data collection, ways and advantages of each as well as the importance of each method are discussed. All the information in this study was sourced in current books, publications and professional experience. The result shows that Quantitative analysis is considered to be objective, without any human bias attached to it, because it depends on the comparison of numbers according to mathematical computations. While Analysis of qualitative data is generally accomplished by methods more subjective, dependent on people's opinions, knowledge, assumptions, and inferences (and therefore biases), than that of quantitative data.

Key words: Data, qualitative and quantitative approach, Observation, Survey, Interview, Experiment, etc.

[1]. Collecting and analyzing data. http://ctb.ku.edu. Retrieved 09/06/2013 01:59pm.
[2]. Data collection method.www.twely. Co. uk/ data + collection + method retrieved 09/06/2013; 03:30pm.
[3]. Data collection methods; http//people.uwec.edu Retrieved 9/06/013: 01:50pm.
[4]. Data collection, compilation and dissemination http://wwww.tffs.org retrieved 09/006/2013;02:50pm.
[5]. Data collection.http:// psychology.about com retrieved 09/06/2013, 02:30pm.
[6]. Data winners; https://www.datawinners.Retrieved 09/06/2013 01:47pm.
[7]. Data, its collection, and related issues http://www.wwetc.com.retrieved 09/06/2013 02l:10pm
[8]. Evaluation 4-H youth development programs http:// 4h. uwex. Edu.retrieved 09/06/2013;02:35pm.
[9]. Method of data collection.wwwfreapp. Com retrieved 09/06/2013; 03:40pm.
[10]. Methods of collecting data interviews and questionnaires in practice.http://www.eghid.edu. Retrieved 02:05pm, 09/06/2013.


Paper Type : Research Paper
Title : IPv6: Threats Posed By Multicast Packets, Extension Headers and Their Counter Measures
Country : India
Authors : Santosh Naidu P., Amulya Patcha
: 10.9790/0661-1526675      logo

Abstract: Security issues concerning the spreading Internet Protocol version 6 (IPv6) is one of the major issues in the world of networking today. Since it is not the default network protocol deployed nowadays (but systems are migrating slowly from ipv4 to ipv6) there are no best practices from the point of network administrators, nor are any guarantees that implemented IPv6 protocol stacks and security techniques without any bugs. This paper addresses some security concerns like extensive use of multicast packets and extension headers and its countermeasures.

Keywords: multicast, extension headers, reconnaissance, rogue dhcpv6 server spoofing, dual-stack, tunnels, Nat, ping of death

[1] Request for Comments: 2460, Internet Protocol Version 6 (IPv6) Specification, December 1998: Internet Engineering Task Force.

[2] Gordon Fyodor Lyon. Nmap - Network Mapper, 2012.

[3] Marc Van Hauser Heuse. The IPv6 Attack Toolkit. 2012.

[4] Serdar Cabuk, Carla E. Brodley, and Clay Shields. IP Covert Channel Detection. ACM Trans. Inf. Syst. Secure 12(4):22:1{22:29, April 2009.

[5] Matt Bishop, Security: Art and Science. Addison Wesley Professional, 2003.

[6] Philippe Biondi. Scapy 2011.

[7] Van Jacobson, Craig Leres, and Steven McCanne. Tcpdump - command-line packet analyzer. 2012.

[8] Scott Hogg and Eric Vyncke. IPv6 Security. Cisco Press, 2009. [9] Judy Novak. Target-Based Fragmentation Reassembly. 2005.

[10] Source fire. Snort - an open source network intrusion prevention and detection system (IDS/ IPS). 2012.


Paper Type : Research Paper
Title : Bluetooth Based Automatic Hotel Service System Using Python
Country : India
Authors : Rajesh Bag, Satyajit Bhowmick, Rahul Ghosh, Abhishek Kumar Gond
: 10.9790/0661-1527680      logo

Abstract: This paper describes a Bluetooth based automatic hotel service system. This paper describes the protocol and provides the implementation details. Nowadays hotels are spending lot of money for the attendance, tracking of the employees and apart from that, there is no fully satisfied service for customers. Instead of using manual power if we apply Bluetooth technology, then the proposed system will cut off the daily wages of hotels. We hope that the implementation and protocol details will aid the wireless technology community in near future.

Index: Bluetooth, Python Technology, Arduino.

[1] KAREN SCARFONE & JOHN PADGETTE, "Guide to Bluetooth Security", U.S. Department of Commerce, National Institute of Standards and Technology (NIST), Special Publication 800-121, September2008,[online],available: http://bluetoothpentest.narod.ru/doc/guide_to_bluetooth_security.pdf [2] Nateq Be-Nazir Ibn Minar & Mohammed Tarique, "BLUETOOTH SECURITY THREATS AND SOLUTIONS: A SURVEY", International Journal of Distributed and Parallel Systems (IJDPS) Vol.3, No.1, January 2012, pages127-148. [3] Trishna Panse, Vivek Kapoor, "A REVIEW ON SECURITY MECHANISM OF BLUETOOTH COMMUNICATION", Trishna Panse et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 3 (2), 2012, pages 3419-3422.
[4] Bluetooth Technology, [online], Available: http://www.bluetooth.com/Pages/what-is-bluetooth-technology.aspx
[5] "Man in the Middle" Attacks on Bluetooth, [online], Available: http://link.springer.com/chapter/10.1007%2F978-3-540-45126-6_11#page-1
[6] Artificial Intelligence, [online], Available; http://artint.info/html/ArtInt.html
[7] Python, [online], Available: http://docs.python.org/2/tutorial/
[8] RS-232, [online], Available: http://en.wikipedia.org/wiki/RS-232
[9] Bluetooth security review, [online], Available: http://www.symantec.com/connect/articles/bluetooth-security-review-part-1
[10] Arduino, [online], Available: http://www.arduino.cc/


Paper Type : Research Paper
Title : Removal of Gaussian noise on the image edges using the Prewitt operator and threshold function technical
Country : Iraq
Authors : H. A. Alshamarti
: 10.9790/0661-1528185      logo

Abstract: Image edge detection algorithm is applied on images to remove Gaussian noise that is present in the image during capturing or transmission using a method which combines Prewitt operator and threshold function technique to do edge detection on the image. This method is better than a method which combines Prewitt operator and mean filtering. In this paper, firstly use mean filtering to remove initially Gaussian noise, then use Prewitt operator to do edge detection on the image, and finally applied a threshold function technique with Prewitt operator.

Keywords: Gaussian noise, Prewitt operator, edge detection, threshold function

[1] R. Gonzalez, R. E. Woods. Digital Image Processing. Addison-Wesley, 2nd Ed., 2002.

[2] W. Gao, L. Yang, X. Zhang, H. Liu, 2010. An Improved Sobel Edge Detection. 978-1-4244-5540-9/10. IEEE.

[3] D. Ziou, S. Tabbone, 1998. Edge detection techniques – an overview, International Journal of Pattern Recognition and Image Analysis, 8, 537–559.

[4] M. Qasim, W. L. Woon, Z. Aung, V. Khadkikar, 2013. Intelligent Edge Detector Based on Multiple Edge Maps. 978-1-4673-5157-7/13. IEEE.

[5] S. Dangeti, 2003. De-noising Techniques: a Comparison. M.S. Thesis. Louisiana State University.

[6] S. Kumar, P. Kumar, M. Gupta, A. K. Nagawat, 2010. Performance Comparison of Median and Wiener Filter in Image De-noising. International Journal of Computer Application, 12, 4.

[7] S. Zhong, V.Cherkassky, 2000. Image de-noising using wavelet thresholding and Model selection. IEEE.


Paper Type : Research Paper
Title : Automatic DNA Sequence Generation for Secured Effective Multi
-Cloud Storage
Country : India
Authors : D. Sureshraj, Dr. V. Murali Bhaskaran
: 10.9790/0661-1528694      logo

Abstract: The main target of this paper is to propose an algorithm to implement data hiding in DNA sequences to increase the confidentiality and complexity by using software point of view in cloud computing environments. By utilizing some interesting features of DNA sequences, the implementation of a data hiding is applied in cloud. The algorithm which has been proposed here is based on binary coding and complementary pair rules. Therefore, DNA reference sequence is chosen and a secret data M is hidden into it as well. As result of applying some steps, M´´´ is come out to upload to cloud environments. The process of identifying and extracting the original data M, hidden in DNA reference sequence begins once clients decide to use data. Furthermore, security issues are demonstrated to inspect the complexity of the algorithm. In addition, providing better privacy as well as ensure data availability, can be achieved by dividing the user's data block into data pieces and distributing them among the available SPs in such a way that no less than a threshold number of SPs can take part in successful retrieval of the whole data block. In this paper, we propose a secured cost-effective multicloud storage (SCMCS) model in cloud computing which holds an economical distribution of data among the available SPs in the market, to provide customers with data availability as well as secure storage.

Keywords: DNA sequence; DNA base pairing rules; complementary rules; DNA binary coding; cloud service provider.

[1]. C.C. Chang, C.C. Lin, C.S. Tseng, W.L. Tai, Reversible hiding in DCTbased compressed images, Information Sciences 177 (2007).
[2]. C.C. Chang, W.C. Wu, Y.H. Chen, Joint coding and embedding techniques for multimedia images, Information Sciences 178 (2008).
[3]. A. Leier, C. Richter, W. Banzhaf, H. Rauhe, Cryptography with DNA binary strands, BioSystems 57 (2000).
[4]. I. Peterson, Hiding in DNA, Muse (2001).
[5]. Chunye Gong; Jie Liu; Qiang Zhang; Haitao Chen; Zhenghu Gong; , "The Characteristics of Cloud Computing," Parallel Processing
[6]. Workshops (ICPPW), 2010 39th International Conference on , vol., no., pp.275-279, 13-16 Sept. 2010.
[7]. Amazon.com, "Amazon s3 availablity event: July 20, 2008", Online at http://status.aws.amazon.com/s3-20080720.html, 2008
[8]. .http://csrc.nist.gov/groups/SNS/cloud-computing/index.html, 2009. [16] P. F. Oliveira, L. Lima, T. T. V. Vinhoza, J. Barros, M. M´edard, "Trusted storage over untrusted networks", IEEE GLOBECOM 2010, Miami, FL. USA.


IOSR Journals are published both in online and print versions.