IOSR Journal of Computer Engineering (IOSR-JCE)

Volume 7 - Issue 4

Paper Type : Research Paper
Title : Performance Evaluation of Cryptographic Algorithms: AES and DES for Implementation of Secured Customer Relationship Management (CRM) System
Country : India
Authors : E. Kalai Kavitha
: 10.9790/0661-0740107       logo
Abstract:Implementation of Secured Customer Relationship Management (CRM) system is the core competitiveness of Small and Medium Enterprises (SME) to build an effective means. Main usage of CRM is to maintain the industry records and customer request. Those records are maintained very confidentially for other industries to increasing their growth. Existing system of CRM's are used to maintain records but they didn't concentrate on security criteria's. The Proposed idea of CRM is to implement security features on it (i.e.) encrypt the confidential data's of the industry using best encryption algorithm. For that best cryptographic algorithm is discovered and then use it over the CRM application. Cryptographic Techniques are evaluated on some points. These points are avalanche effect due to one bit variation in plaintext keeping the key constant, avalanche effect due to one bit variation in key keeping the plaintext constant, memory required for implementation and simulation time required for encryption. The secured CRM system builds a great help in the relationship between employees and companies and provide secured access of system and allow secured transactions..
Keywords: Advanced Encryption Standard (AES), Avalanche Effect, Data encryption standard (DES), CRM, SME.

[1] NeetuSettia.―Cryptanalysis of modern Cryptography Algorithms‖.International Journal of Computer Science and Technology.
December 2010.
[2] Diaasalama, Abdul kader, Mohiy Hadhoud, ―Studying the Effect of Most Common Encryption Alg orithms‖, International Arab
Journal of e-technology, Vol 2, No.1, January 2011.
[3] Kumar, ―Customer Relationship Management‖, Wiley International Encyclopedia of Marketing , 2010: 24 –30.
[4] Yang Jialu, ―Customer Relationship Management of Smail-Medium Enterprises,‖ Fudan University Press, 2004:113–120 (In
[5] Russell S.Winer, ―A framework for Customer Relationship Management ‖ California Management Review, 2001, Vol 43(4).
[6] PC Verhoef, ―Understanding the effect of customer relationship management efforts on customer retention and customer share
development,‖ Journal of marketing, 2003 Vol 74(2).

Paper Type : Research Paper
Title : Commodification of Indigenous Knowledge: It's Impact on Ethno- medicine
Country : India
Authors : Minaketan Bag and Rashmi Pramanik
: 10.9790/0661-0740815       logo
Abstract:Indigenous Knowledge (IK) can be broadly defined as the knowledge that an indigenous (local) community accumulates over generations of living in a particular environment. This definition encompasses all forms of knowledge – technologies, know-how skills, practices and beliefs – that enable the community to achieve stable livelihoods in their environment. The indigenous communities have always generated, refined and passed the knowledge from generation to generation. Such "traditional knowledge" is an important part of their cultural identity. Traditional knowledge has played a vital role in the daily lives of the vast majority of people. Traditional knowledge is essential to the food security and health of millions of people in the developing country like India and state like Orissa. In many countries, traditional medicines provide the only affordable treatment available to indigenous community.

[1] Botanical Survey of India. 2003. Flora of India, Introductory volume, Part II, 350.
[2] Daes Erica-Irene A. 1994. "Preliminary report of the Special Rapporteur on the protection of the heritage of indigenous people",
Geneva: UN Sub-Commission on Prevention of Discrimination and Protection of Minorities.
[3] Devraj R. 2000. US Corporate Biopirates Still Staking Claim on Basmati Rice, Common Dreams New Center, Available at 100900-01.htm.
[4] Dharmananda S. 2003. The Ayurvedic Medicine Industry in India, online paper. Available at:
[5] EXIM Bank of India. 2003. Export Potential of Indian Medicinal Plants and Products, pp.11-12.
[6] Gollin M. 1999. New Rules for Natural Products,. Sept. Vol. (17)9:.921.922, Available at: 0999_921.html
[7] Grain and Kalpavriksh. 2002. "Traditional Knowledge of Biodiversity in Asia Pacific: Problems of Piracy and Protection", Genetic
Resources Action International, October, Available at:
[8] Hansen S and VanFleet J. 2003. "Traditional Knowledge and Intellectual Property: A Handbook on Issues and Options for
Traditional Knowledge Holders in Protecting their Intellectual Property and Maintaining Biological Diversity", Association for the
Advancement of Science, American: Washington, DC Available at:
[9] Jain V. 2008. "Safeguarding the Traditional Knowledge in India" Paper Presented in the Seminar of Asia Pacific Jurist Association
(APJA): Delhi, on 28.04.2008.
[10] Ng'etich K A. 2005. Indigenous Knowledge Alternative Medicine and Intellectual Property Right Concern in Kenya. Paper
Presented at the Council for the Development of Social Science Research in Africa (CODESRIA) General Assembly, Maputo,
Mozambique, 6-10 December, 2005

Paper Type : Research Paper
Title : The Negative Impact of Missing Value Imputation in Classification of Diabetes Dataset and Solution for Improvement
Country : India
Authors : Angeline Christobel. Y, Dr.P.SivaPrakasam
: 10.9790/0661-0741623       logo
Abstract:The common problem for data quality is missing data. The real datasets have lot of missing values. Missing values imputation is a challenging issue in machine learning and data mining. Missing data should be carefully handled; otherwise it affects the quality of the mining process or the performance of classification algorithms. Mean method of imputation is the most common method to replace the missing values. In this paper, we address the negative impact of missing value imputation and solution for improvement while evaluating the performance of kNN algorithm for classification of Diabetes data. We selected diabetes dataset because it contains lot of missing values and the impact of imputation is very obvious. To measure the performance, we used Accuracy and Error rate as the metrics.
Keywords: Data Mining, Classification, kNN, Imputation, Data Normalization and Scaling

[1] Roshawnna Scales, Mark Embrechts, "Computational intelligence techniques for medical diagnostics".
[2] World Health Organization. Available:
[3] G. Ssali, T. Marwala. "Estimation of missing data using computational intelligence and decision trees." Proceedings of IEEE
International Joint Conference On Neural Networks, Hong Kong.
[4] R. J. Little and D. B. Rubin. "Statistical Analysis With Missing Data", Hoboken, NJ: Wiley,(1987).
[5] Gustavo E. A. P. A. Batista and Maria Carolina Monard, An Analysis of Four Missing Data Treatment Methods for Supervised
Learning, Applied Artificial Intelligence 17(5-6): 519-533 , 2003
[6] Alireza Farhangfar, Lukasz Kurgan, Jennifer Dy,"Impact of imputation of missing values on classification error for discrete data",
Pattern Recognition, Volume 41, Issue 12, December 2008, Pages 3692–3705
[7] Qinbo Song, Martin Shepperd."A new imputation method for small software project data sets", Journal of Systems and Software,
Volume 80, Issue 1, January 2007, Pages 51–62
[8] José M. Jerez Ignacio Molina ,, Pedro J. García-Laencina ,Emilio Alba, Nuria Ribelles, Miguel Martín, Leonardo Franco," Missing
data imputation using statistical and machine learning methods in a real breast cancer problem", Artificial Intelligence in Medicine,
Volume 50, Issue 2, October 2010, Pages 105–115
[9] Bhekisipho Twala, Michelle Cartwright,"Ensemble Imputation Methods for Missing Software Engineering Data", 11th IEEE
International Software Metrics Symposium (METRICS'05)
[10] Vidan Fathi Ghoneim, Nahed H. Solouma, Yasser M. Kadah," Evaluation of Missing Values Imputation Methods in cDNA
Microarrays Based on Classification Accuracy", 978-1-4244-7000-6/11 IEEE.

Paper Type : Research Paper
Title : Implementing Security on a Voice over Internet Protocol (VoIP) Network: A Practical Approach
Country : Nigeria
Authors : Osanaiye Opeyemi Ayokunle
: 10.9790/0661-0742430       logo
Abstract:The internet has been undergoing rapid and continuous growth over the past few years. The most significant development the telecommunication industry has witnessed is the evolution of Voice over IP technology. This technology uses the internet as a medium for transmitting voice during a telephone conversation between two or more parties. VoIP technology comes with numerous benefits like reduced call cost and wide variety of add-ons to both the service providers and the end users. Despite all these, the technology is subjected to security risk because of the open nature of the internet. Much emphasis has been placed on the quality of service of VoIP over the years and dark eyes have been turned on its security. This study therefore aims to identify the security threats and attack VoIP can be exposed to during transmission, produce a VoIP system using the open source Asterisks before securing the network using IPSec VPN
Keywords: VoIP, SIP, H323, QoS, PSTN, VPN tunnel, IPSec, Encryption, Internet, Asterisks

[1] Hallock, J. (2004) A brief history of VoIP, Evolution and Trends in Digital Media Technologies, University of Washington
[2] La Corte, A., & Sicari, S. (2006), "Assessed quality of service and voice and data integration: a case study‟, Computer
Communications, 29(11). pp. 1992-2003.
[3] Ranganathan, M. & Kilimartin, L. (2003) "Performance analysis of secure session initiation protocol based VoIP networks‟,
Computer Communications 26(6), pp. 552-565.
[4] Amarandei-Stavila, M. (2005) Voice over IP Security A layered approach, xmco partners.Amoroso, E. (1994) A book introducing
critical issues in computer security technology, Fundamentals of Computer Security Technology, Bell Laboratories.
[5] Karapantazis, S. & Pavlidou, F. (2009) "VoIP: A comprehensive survey on promising technology‟, Computer Networks, 53(12),
[6] Ansari,S. , Khan ,K. , Rehana,J. , Lisa,J. , & Kaisar, S. (2009) "Different Approaches of Interworking between SIP and H323 ‟
International journal of Computer Science and Network Security, 9(3),pp.232-239.
[7] Geneiatakis, D., Lambrinoudakis, C. & Kambourakis, G. (2007) "An ontology-based policy for deploying secure SIP-based VoIP
services‟, Computer & Security, 2006(27), pp.285-297.
[8] Wisely, D. (2001)‟SIP and conventional internet application‟ BT Technology journal, 19(2), pp.107-118.
[9] Stallings W., (2003) "The Session Initiation Protocol‟, The internet protocol journal, 6(1), pp.5-38.
[10] Borthick, S. (2003) SIP for the Enterprise: Work in Progress, Business Communications Review.

Paper Type : Research Paper
Title : A comprehensive method for discovering the maximal frequent set
Country : India
Authors : Nivedita Pandey, Prof. Love Verma
: 10.9790/0661-0743139       logo
Abstract:The association rule mining can be divided into two steps.The first step is to find out all frequent itemsets, whose occurrences are greater than or equal to the user-specified threshold.The second step is to generate reliable association rules based on all frequent itemsets found in the first step. Identifying all frequent itemsets in a large database dominates the overall performance in the association rule mining. In this paper, we propose an efficient method, INCREMENTAL PINCER, for discovering the maximal frequent itemsets. The INCREMENTAL PINCER method combines the advantages of both the DHP and the Pincer-Search algorithms. The combination leads to two advantages. First, the INCREMENTAL PINCER method, in general, can reduce the number of database scans. Second, the INCREMENTAL PINCER can filter the infrequent candidate itemsets and can use the filtered itemsets to find the maximal frequent itemsets. These two advantages can reduce the overall computing time of finding the maximal frequent itemsets. In addition, the INCREMENTAL PINCER method also provides an efficient mechanism to construct the maximal frequent candidate itemsets to reduce the search space.
Keywords: association rules, data mining, frequent itemsets, the INCREMENTAL PINCER method

[1] A. Savasere, E. Omiecinski, and S. Navathe, "An Efficient Algorithm for Mining Association Rules in Large Databases", In
Proceedings of 21st VLDB, pp. 432-444, 1995. [2] D. Lin and Z. M. Kedem, "Pincer-Search: A New lgorithm for
Discovering the Maximum Frequent Set", In Proceedings of VI Intl. Conference on Extending Database Technology, 1998.
[2] Eui-Hong Han, George Karypis and Vipin Kumar, "Scalable Parallel Data Mining for Association Rules", IEEE Transactions on
Knowledge and Data Engineering, Vol. 12, No. 3, MAY/JUNE 2000.
[3] H.Toivonen,"Sampling Large Databases for Association Rules", VLDB, pp.134-145, 1996.
[4] IBMQuest Data Mining Project, "Quest Synthetic Data Generation Code", "http"// com/cs/quest/syndata.
html", 1996
[5] J. S. Park, M. S. Chen, and P. S. Yu, "An Effective Hash Based Algorithm for Mining Association Rules", Proceedings of the ACM
SIGMOD, pp. 175-186, 1995.
[6] M. Houtsma and A. Swami, "Set-Oriented Mining of Association Rules in Relational Databases," 11th Int'l Conference on Data
Engineer, 1995.
[7] M.J. Zaki, S. Parthasarathy, M. Ogihara, and W. Li, "New Algorithms for Fast Discovery of Association Rules", 3rd Int'l
Conference on Knowledge Discovery & Data Mining (KDD), Newport, CA, August 1997.
[8] MohammedJ.Zaki, "Scalable Algorithm for Association Mining", IEEE Transactions on Knowledge and Data Engineering, Vol.
12, No. 3, MAY/JUNE2000.
[9] M. S. Chen, J. Han, and P. S. Yu, "Data Mining: An Overview from a Database Perspective", IEEE Transactions on
Knowledge and Data Engineering, Vol. 8, No. 6, December 1996.
[10] M. S. Chen, J. S. Park, and P. S. Yu, "Efficient Data Mining for Path Traversal Patterns", IEEE Transactions on Knowledge and
Data Engineering, Vol. 10, No. 2, 1998, pp. 209-220.

Paper Type : Research Paper
Title : A Study on Various protocols Developed under Intrusion Detection System in Adhoc Networks
Country : India
Authors : Jatinder Singh, Bobson Gandhi, Shailender Kumar
: 10.9790/0661-0744045       logo
Abstract:In Computer Networks a number of security techniques provide security consolation but not up to optimal security extent. There are massive attacks and efficient viruses travel across the network which incapacitates computer system and default configuration of the operating system. Preceding techniques can capture anomalous activities and previous known attacks but unknown Security attacks have learned to survive in a high secure precinct, it must be noticed that virus has an augmenting influence, so it is very difficult to detect unknown attacks at application layer on the run time.
Keywords: Security, Intrusion Detection, Attacks, Routing.

[1] Pasquale Donadio,Antonio Cimmino and Giorgio Ventre "Enhanced Intrusion Detection Systems in Ad Hoc Networks using a Grid
Based Agnostic Middleware".
[2] S.Sen and John Andrew Clark "A Grammatical Evolution Approach to Intrusion Detection on Mobile Ad hoc Networks" March
2009, WiSec ‟09: Proceedings of the Second ACM Conference on Wireless Network Security.
[3] Sneha Kumari1, Dr. Maneesh Shrivastava Secure DSR Protocol in MANET Using Energy Efficient Int.rusion Detection System
Volume 1, No.1, July August- September 2012
[4] Prajeet Sharma Niresh Sharma And Rajdeep Singh A Secure Intrusion detection system against DDOS attack in Wireless Mobile
Ad-hoc Network Volume 41– No.21, March 2012
[5] Intrusion Detection Technique in Mobile Adhoc Network based on Quantitative Approach Volume 37– No.8, January 2012
[6] Vikas Beniwl, Ashwani Garg A Review on Security Issues of Routing Protocols in Mobile Ad-Hoc Networks, Volume 2, Issue 9,
September 2012
[7] D.Md Farid,N.HuuHoa,J.Darmount,N.Harbi, and M.ZahidurRahman, "scaling up detectionrates and reducing false positives in
intrusion detection using NBTree",ICDMKE April 2010
[8] K.KGupta,B.Nath,andK.Ramamohanarao "Conditional Random Fields for Intrusion Detection",In International Conference on
Advanced Information Networking and Applications Workshops,IEEE,2007
[9] C.Kruegel,D.Mutz,W.Robertson, and F. Valeur,"Bayesian event classification for intrusion detection",In Proc. Of the19th Annual
Computer Security Applications Conference,Las Veges,nv,2003
[10] Amrita Anand* Brajesh Patel An Overview on Intrusion Detection System and Types of Attacks It Can Detect Considering
Different Protocols Volume 2, Issue 8, August 2012

Paper Type : Research Paper
Title : Performance analysis of N-computing device under various load conditions
Country : India
Authors : Snigdha Srivastava, Saumya Srivastava & Sneha Mani Tripathi
: 10.9790/0661-0744652       logo
Abstract:In the present time, a personal computer has a very high processing power than required for a single user system. Hence, it can be effectively used as a multiuser system which serves several users concurrently. This can be achieved by N-computing. We will create a multiuser environment on a uniprocessor system; this can be achieved, when there is a separate kernel for each user in the same operating system. This concept is related to the concept of mapping between user level thread and kernel level thread, which is discussed in this paper. Further the system's performance under various load conditions will be analyzed. In other words we want to utilize the full processing power of a personal computer for number of users simultaneously and also provide better performance at less cost.
Keywords: Kernel, mapping, n-computing, thread, uniprocessor.

Journal Papers:
[1] K. Schwan and H. Zhou [Georgia Institute of Technology], "Dynamic scheduling of hard real-time tasks and real-time threads", IEEE
transactions on Software Engineering, Aug. 1992, Volume 18, Issue 8, p. 736-748.
[2] K.Debattista, K.Vella and J.Cordina, "Wait-free cache-affinity thread scheduling", IEEE Proc., Softw.-April 2003, Volume 150, Issue
2, p. 137-146.
[3] Christopher Small and Margo Seltzer, "Scheduler Activations on BSD:Sharing Thread Management Between Kernel and Application", Harvard University.
[4] L. Mangeruca, A. Ferrari and A. L. Sangiovanni-Vincentelli, "Uniprocessor scheduling under precedence constraints", RTAS'06, p.
157-166, IEEE Computer Society, Washington DC, USA.
[5] Thomas E. Anderson, Brian N. Bershad and others, "Schedular activations: effective kernel support for the user-level management of
parallelism", ACM Transactions on Computer Systems [New York, USA], Feb. 1992, Volume 10, Issue 1, p. 53-79.
[6] Thomas Riechman, Jurgen Kleinoder, "User-Level Scheduling with Kernel Threads", Department of Computer Science, University of Erlangen-Nurnberg, Germany.
[7] D. Kang and J.L.Gaudiot [University of California], "Speculation- aware thread scheduling for simultaneous multithreading",
Electron. Lett. 4 March 2004, Volume 40, Issue 5, p. 296-298.

Paper Type : Research Paper
Title : Analyzing the Assessment Criterion for Web-based Distributed Software Development
Country : India
Authors : Dillip Kumar Mahapatra, Tanmaya Kumar Das, Gurudatta Lenka
: 10.9790/0661-0745359       logo
Abstract:Globalization has brought changes to the software development era. The traditional software development processes are greatly incorporated with the distribution policy of software development though WEB based technology and applications. A distributed system is a computing system in which a number of components cooperate by communicating over a network. The explosive growth of the Internet and the World Wide Web in the mid-1990's moved distributed systems beyond their traditional application areas, such as industrial automation, defense, and telecommunication, and into nearly all domains, including e-commerce, financial services, health care, government, and entertainment. This paper analyses the key criterion of developing different software projects through web-based development strategies and evaluates the key factors to resolve its associated challenges, including distributed object computing middleware, component middleware, publish/subscribe and message-oriented middleware and web services
Keywords: Distributed software development, Complexity, Inter-disciplinary collaboration, Success factors, System architecture

[1] Apache: The Apache DB project: ObJectRelationalBridge OJB.
[2] Apache: Struts.
[3] Apache: Tiles guide.
[4] Apache: What is Torque?
[5] Alexander Schatten, Marian Schedenig, Amin And jomshoa: Open Science Workplace: Building an Web-Based Open Source Tool to
Enhance Project Management, Monitoring and Collaboration in Scientific Projects.
[7] Galileo computing: Java ist auch eine Insel.
[8] James Holmes: Struts console.
[9] Iana: Internet assigned numbers authority. Ibim: Warum Project management.
[10] IETF: Post Office Protocol Version 3.