Version-10 (March-April 2014)
- Citation
- Abstract
- Reference
- Full PDF
[2] L.Lamport, R. Shostak, and M. Pease, "The byzantine generals prob-lem,"ACM Trans.Programming Languages Syst., vol. 4, no. 3, pp. 382–401, 1982.
[3] Y. Yang, C. Zhong, Y. Sun, and J. Yang, "Network coding based reliable disjoint and braided multipath routing for sensor networks,"J. Netw.Comput. Appl., vol. 33, no. 4, pp. 422–432, 2010.
[4] J. Deng, R. Han, and S. Mishra, "INSENS: intrusion-tolerant routing for wireless sensor networks," Computer Commun., vol. 29, no. 2, pp. 216–230, 2006.
[5] K. D. Kang, K. Liu, and N. Abu-Ghazaleh, "Securing geographic routing in wireless sensor networks," in Proc. 2006 Cyber Security Conf. Inf.Assurance.
[6] W. Lou and Y. Kwon, "H-SPREAD: a hybrid multipath scheme for secure and reliable data collection in wireless sensor networks,"IEEE Trans. Veh. Technol., vol. 55, no. 4, pp. 1320–1330, 2006.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Foreground detection by using multi features |
Country | : | Iraq |
Authors | : | Dr. Emad Kadum Jabbar, Dr. Ahmed Tariq Sadiq, Nuha Jameel Ibrahim |
: | 10.9790/0661-162100812 |
[2]. Martínez-Martín, Ester, Pobil, Ángel P. del,"Robust Motion Detection in Real-Life Scenarios", Series: SpringerBriefs in Computer Science,2012.
[3]. C.Stauffer, W.Grimson. "Adaptive background mixture models for real-time tracking". In Proc. CVPR, 1999.
[4]. Piccardi, M., "Background subtraction techniques: a review", Comput. Vision Group, Univ. of Technol., Sydney, NSW, Australia.
[5]. K. Toyama, J. Krumm. "Wallflower: Principles and practice of background maintenance". International Conference on Computer Vision, September 1999.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Relation Between '3utility problem' and 'Eulerian Trail' |
Country | : | India |
Authors | : | Yashasvini Sharma |
: | 10.9790/0661-162101322 |
[2] http://www.math.ku.edu/~jmartin/courses/math105-F11/Lectures/chapter5-part2.pdf
[3] http://watchknowlearn.org/Video.aspx?VideoID=32450&CategoryID=7030//eulerian trail
[4] http://mathforum.org/dr.math/faq/faq.3utilities.html
[5] http://www.cut-the-knot.org/do_you_know/3Utilities.shtml
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Face Recognition Techniques - A Review |
Country | : | India |
Authors | : | Taqdir, Dr Renu Dhir |
: | 10.9790/0661-162102327 |
[2]. M.Hotelling, "Analysis of a Complex of Statistical Variables into Principal Components", Journal of Educational Psychology, Vol.24, pp.498-520, (1933).
[3]. L. Sirovich and M. Kirby, "Low-dimensional Procedure for the Characterization of Human Faces", Journal of the Optical Society of America A- Optics, Image Science and Vision, 4, Vol.4, No.3, pp.519–524, March (1987).
[4]. J.L.Rodgers, and W.A. Nicewander, "Thirteen Ways to Look at the Correlation Coefficient", The American Statistician, Vol. 42, No. 1, pp.59-66, February 1988.
- Citation
- Abstract
- Reference
- Full PDF
[2] Krishna Nadiminti, Marcos Dias de Assunção, and RajkumarBuyya"Distributed Systems and Recent Innovations: Challenges and Benefits".LalanaKagal, Tim Finin and Anupam Joshi University of Maryland Baltimore County"
[3] LalanaKagal, Tim Finin and AnupamJoshiUniversity of Maryland Baltimore CountyMoving from Security to Distributed Trustin Ubiquitous Computing Environments"
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Heart Disease Risk Prediction System Based On Novel Technique Stratified Sampling |
Country | : | India |
Authors | : | Lalita Sharma, Vineet Khanna |
: | 10.9790/0661-162103237 |
[2] Shweta Kharya ―Using Data Mining Techniques For Diagnosis And Prognosis Of Cancer Disease Abdelghani Bellaachia, Erhan Guven‖ International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012
[3] Li, W., Han, 1., Pei, 1.: ―CMAR: Accurate and Efficient Classification Based on Multiple Association Rules‖. In: Proc. of 2001 International Conference on Data Mining, 2001
[4] Jyoti Soni, Ujma Ansari, Dipesh Sharma ―Predictive Data Mining for Medical Diagnosis: An Overview of Heart Disease Prediction‖ International Journal of Computer Applications (0975 – 8887) Volume 17– No.8, March 2011.
[5] Abdelghani Bellaachia,Erhan Guven ―Predicting Breast Cancer Surviability Using data Mining techniques‖ Software technology and Engineering (ICSTE),2010 2nd international Conference on 3-5 Oct,2010.
- Citation
- Abstract
- Reference
- Full PDF
Abstract:The symbiosis between communication technologies and vehicles offers opportunity to improve assistance to people injured in traffic accidents, by providing information about the accident to reduce the response time of emergency assistance services. Determining the required resources for accident could significantly reduce the number of casualties. This paper presents a system prototype especially designed to detect and provide faster assistance to traffic accident victims. The proposed system requires each vehicle to be endowed with a control unit (CU) responsible for detecting accident and onboard unit (OBU) reporting accident location for providing the necessary resources for the rescue operation.
Keywords: Control Unit, Emergency Assistance Service, Onboard Unit, Traffic Accidents,
[2] Tanushree Dalai, "Emergency Alert and Service for Automotives for India", International Journal of Advanced Trends in Computer Science and Engineering (IJATCSE), Mysore, India, Vol.2, No.5, Pages: 08-12 (2013) Special Issue of ICETCSE 2013.
[3] R. Grzeszczyk, J. Merkisz, P. Bogus, and T.Kaminski ""Methods and Procedures for testing the E- call in-vehicle unit for The purpose of its performance assessment and certification,‟‟ in Proc. 21st Int. Technical Conf. Enhanced Safety of Vehicles (ESV), Stuttgart, Germany, June 2009, Paper 09- 0332
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | CEET: A Compressed Encrypted & Embedded Technique for Digital Image Steganography |
Country | : | India |
Authors | : | Palak Mahajan, Dr. Ajay Koul |
: | 10.9790/0661-162104452 |
[2] Fangjun Huang, Jiwu Huang, and Yun-Qing Shi, "New Channel Selection Rule for JPEG Steganography", IEEE Transactions on Information Forensics and Security, Vol. 7, No. 4, pp. 1181-1191 August 2012.
[3] Avinash Srinivasan, Srinath Thirthahalli Nagaraj, and Angelos Stavrou, "HIDEINSIDE – A Novel Randomized & Encrypted Antiforensic Information Hiding", International Conference on Computing, Networking and Communications, Communications and Information Security, 2013.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Monitoring Wireless Sensor Network using Android based Smart Phone Application |
Country | : | India |
Authors | : | Sonali Tembekar, Amit Saxena |
: | 10.9790/0661-162105357 |
[2] AKhan AkBULUT, M. A. (2012). Accessing to DATA in WSN's.
[3] Kevin Lee1 David Murray, Danny Hughes, Wouter Joosen (2010). Extending Sensor Networks into the Cloud using Amazon web services.
[4] Carlos Oberdan Rolim, Fernando Luiz Koch, Carlos Becker Westphall, Jorge Werner, Armando Fracalossi, Giovanni Schmitt Salvador (2010). A Cloud Computing Solution for Patient's Data Collection in Health Care Institutions.
[5] Wei Wang, Kevin Lee, David Murray (2011). Integrating Sensors with the Cloud UsingDynamic Proxies.
[6] Sanjay Kumar Dash,Subasish Mohspatra and Prashant Kumar Pattnaik (2010) "A Survey on Application of Wireless Sensor Network Using Cloud Computing".
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Performance Analysis of Parallel Algorithm over Sequential using Open MP |
Country | : | India |
Authors | : | Pranav Kulkarni, Sumit Pathare |
: | 10.9790/0661-162105862 |
Keywords: Multi-core, Multiprocessor, OpenMP, Parallel programming.
[2] D. Dheeraj, B. Nitish, Shruti Ramesh, "Optimization of Automatic Conversion of Serial C to Parallel OpenMP", International Conference on Cyber-Enabled Distributed Computing and Knowledge Discover, PES Institute of Technology Bangalore, India, Dec 2012.
[3] Suneeta H. Angadi, G. T. Raju Abhishek B, "Software Performance Analysis with Parallel Programming Approaches", International Journal of Computer Science and Informatics, ISSN (PRINT): 2231 -5292, Vol-1, Iss-4, 2012.
[4] Sanjay Kumar Sharma, Dr. Kusum Gupta, "Performance Analysis of Parallel Algorithms on Multi-core System using OpenMP Programming Approaches", International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.5, October 2012.
[5] Han Cao1a, Fei Wangb, Xin Fang, Hong-lei Tu, "OpenMP Parallel Optimal Path Algorithm and Its Performance Analysis", Jun Shi World Congress on Software Engineering, DOI 10.1109, WCSE, 2009.
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Authentication, graphical passwords, guessing attacks, computer security.
[2] S. Akula and V. Devisetty, "Image Based Registration and Authentication System", in Proceedings of Midwes Instruction and Computing Symposium, 2004.
[3] S. Man, D. Hong and M. Mathews, "A Shoulder surfing resistant graphical password scheme," in Proceedings of International conference on security and management." Las Vegas, NV, 2003.
[4] R. Dhamija and A. Perrig, "Deja Vu: A User Study Using Images for Authentication," in Proceedings of 9th USENIX Security Symposium, 2000.
[5] Real User Corporation: Passfaces. www.passfaces.com.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Cloud Data Sharing in a Dynamic Group with a Dual Secure Technology |
Country | : | India |
Authors | : | Ravi C. B., Mohan K. |
: | 10.9790/0661-162107073 |
Keywords: Cloud computing, privacy-preserving, dynamic groups, data sharing, access control, image conversion.
[2] Vijay Kumar Sharma, Vishal Shrivastava, "A Steganography Algorithm For Hiding Image In Image By Improved LSB Substitution By Minimize Detection" Journal of Theoretical and Applied Information Technology 15th February 2012. Vol. 36 No.1
[3] M. Kallahalla, E. Riedel, R. Swami Nathan, Q. Wang, and K. Fu, "Plutus: Scalable Secure File Sharing on Untrusted Storage," Proc. USENIX Conf. File and Storage Technologies, pp. 29-42, 2003.
[4] E. Goh, H. Shacham, N. Modadugu, and D. Boneh, "Sirius:Securing Remote Untrusted Storage," Proc. Network and Distributed Systems Security Symp. (NDSS), pp. 131-145, 2003.
[5] G. Ateniese, K. Fu, M. Green, and S. Hohenberger, "Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage," Proc. Network and Distributed Systems Security Symp. (NDSS), pp. 29-43, 2005.
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Feed forward neural network, handwritten character recognition, image centroid zone, zone centroid zone.
[2] M. Patil, V. Narawade, Recognition of Handwritten Devanagari Characters through Segmentation and Artificial neural networks , International Journal of Engineering Research and Technology (IJERT) , ISSN:2278-0181,Vol. 1 Issue 6, August 2012.
[3] K. Y. Rajput, S. Mishra, Recognition and Editing of Devanagari Handwriting Using Neural Network, Proceedings of SPIT-IEEE Colloquium and International Conference, Vol. 1.
[4] S. Arora, D. Bhattacharjee, M. Nasipuri, L. Malik and B. Portier, A Two Stage Classification Approach for Handwritten Devanagari Characters.
[5] V. Agnihotri, Offline Handwritten Devanagari Script Recognition, IJITCS, 2012, 8, 37-42.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Blowfish Algorithm |
Country | : | India |
Authors | : | Ms. NehaKhatri – Valmik, Prof. V. K. Kshirsagar |
: | 10.9790/0661-162108083 |
Index Terms: blowfish, encryption, security, algorithm, cryptography
[2] The homepage of description of a new variable-length key, 64-bit block cipher http://www.counterpane.com/bfsverlag.html
[3] Patterson and Hennessy, "Computer Organization & Design: The Hardware/ Software Interface", Morgan Kaufmann, Inc. 1994.
[4] B. Schneier, "Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish)," Fast Software Encryption: Second International Workshop, Leuven, Belgium, December 1994, Proceedings, Springer-Verlag,1994, pp.191-204.
[5] S. Vaudenay, "On the Weak Keys in Blowsh," Fast Software Encryption, Third International Workshop Proceedings, Springer-Verlag, 1996, pp. 27-32.
- Citation
- Abstract
- Reference
- Full PDF
Index Terms: Cloud Computing ,SLAs,DDOS ,IaaS, Virtual machine, Vulnerability, Command And Control.
[2] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A.Konwinski,G. D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia "A view of cloud computing," ACM Commun., vol. 53, no. 4, pp. 50–58, Apr. 2010.
[3] B. Joshi, A. Vijayan, and B. Joshi, "Securing cloud computing environment against DDoS attacks," IEEE Int'l Conf. Computer Communication and Informatics (ICCCI '12), Jan. 2012.
[4] H. Takabi, J. B. Joshi, and G. Ahn, "Security and privacy challenges in cloud computing environments," IEEE Security & Privacy, vol. 8, no. 6, pp. 24–31, Dec. 2010.
[5] Z. Duan, P. Chen, F. Sanchez, Y. Dong, M. Stephenson, and J. Barker,"Detecting spam zombies by monitoring outgoing messages," IEEE Trans. Dependable and Secure Computing, vol. 9, no. 2, pp. 198–210, Apr. 2012. IEEE TRANSACTIONS ON DEPEDABLE AND SECURE COMPUTING.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | RKO Technique for Color Visual Cryptography |
Country | : | India |
Authors | : | Ms. Moushmee Kuri, Dr. Tanuja Sarode |
: | 10.9790/0661-162108993 |
Keywords: Visual Cryptography , Overlapping , Shares, Image Encryption, Keyless Encryption, Color images.
[2] Jaya, Siddharth Malik, Abhinav Aggarwal, Anjali Sardana, " Novel Authentication System Using Visual Cryptography", in 2011 World Congress on Information and Communication Technologies.
[3] F. Liu1, C.K. Wu X.J. Lin , "Colour Visual Cryptography Schemes", IET Information Security, vol. 2, No. 4, pp 151-165, 2008.
[4] Y. C. Hou, "Visual cryptography for color images," Pattern Recognition, vol. 36, pp. 1619-1629, 2003.
[5] Siddharth Malik, Anjali Sardana, Jaya "A Keyless Approach to Image Encryption", 2012 International Conference on Communication Systems and Network Technologies.
- Citation
- Abstract
- Reference
- Full PDF
[2]. Daily Champion (2011): "West Africa – The nations ranks third on internet penetrations", Friday March 4, 2011.
[3]. Odachi, (2011): "ATM Technology and Banking System in West African sub region; Prospect and Challenges", African Research Review – An International Multi-Disciplinary Journal, Ethiopia, Vol 5(2), no 19 pp104 – 114
[4]. Oketola, D. (2013): Poor Fixed Infrastructure Hinders Internet Penetration Twinpine www.integaxjubilation-homes.com Accessed 11/3/2013 (Daily punch March 10, 2013)
[5]. Walker, G. (2010): Cloud Computing Fundamentals; http://www.ibm.com/developerworks/cloud/library/cl_cloudintro/ind Accessed 1/3/2013.