Version-2 (March-April 2014)
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | E-Admission System |
Country | : | India |
Authors | : | Chandraganga Mirji, Vaibhavi Deshpande, Supriya Walunj, Ankita Ambavane |
: | 10.9790/0661-16220103 |
Keywords: DTE, CET, AIEEE, C4.5 algorithm, Centralized data handling.
[2] Ragab, A.H.M. , Hybrid recommender system for predicting college admission, Intelligent Systems Design and Applications (ISDA), 29 Nov. 2012, 107-113.
[3] Rensong Dong,The module of prediction of College Entrance Examination aspiration, Fuzzy Systems and Knowledge Discovery (FSKD), 31 May 2012 ,1559-1562.
- Citation
- Abstract
- Reference
- Full PDF
Keywords: e-Government, SOA, Business Process Management, Software architecture.
[2] Kavantzas, D. Burdett, and G. Ritzinger 2004. WSCDL v1.0. Available: http://www.w3.org/TR/2004/WD-ws-cdl-10-20040427/
[3] Ankolekar et al., 2007, DAML-S: Web Service Description for the Semantic Web in Proc.
[4] WSMO working group, 2008. Available: http://www.wsmo.org. Accessed Sep 2011
[5] Bartalos et al. 2011. Effective Automatic Dynamic Semantic Web Service Composition. Information Sciences and Technologies Bulletin of the ACM Slovakia, Vol. 3, 2011, No. 1, pp. 61–72.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Enhanced Data Processing Using Positive Negative Association Mining on AJAX Data |
Country | : | India |
Authors | : | Sumayya Khan, Shrikant Lade |
: | 10.9790/0661-16221518 |
Index Terms: Association rules mining, Ajax data stream, horizontal tree approach, Apriori algorithm.
[2]. Jesse James Garrett (18 February 2005). "Ajax: A New Approach to Web Applications". AdaptivePath.com. Archived from the original on 2 July 2008. Retrieved 19 June 2008.
[3]. Samet Cokpinar, Taflan Imre Gunden, "Positive and negative rule mining on XML data streams in database as a service concept", Expert Systems with Applications, Vol.39, pp.7503-7511, 2012.
[4]. "Data Processing", Available: http://wiki.answers.com/Q/What_are_the_importance_of_data_processing_in_the_society
[5]. Rakesh Agrawal and Ramakrishnan Srikant Fast algorithms for mining association rules in large databases. Proceedings of the 20th International Conference on Very Large Data Bases, VLDB, pages 487-499, Santiago, Chile, September 1994
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Secure Data Transmission Using Dna Sequencing |
Country | : | India |
Authors | : | Bama R., Deivanai S., Priyadharshini K. |
: | 10.9790/0661-16221922 |
Keywords: Access Control , Mobile Agent, DNA Sequence.
[2] Jin-Shiuh Taur, Heng-Yi Lin, Hsin-Lun Lee and Chin-Wang Tao, "Data Hiding In Dna Sequences Based On Table LookUp Substitution", International Journal of InnovativeComputing, Information and Control, Volume 8, Number 10(A), October 2012
[3] M. H. Kao, "The Study of Agent-based Secure Schemes on ElectronicMedical Records System", Master Thesis, Tunghai University,Taichung, 2010.
[4] Monica BORDA, Olga TORNEA, "DNA Secret Writing Techniques", Technical University of Cluj-Napoca,2010.
[5] Ban Ahmed Mitras , Adeeba Kh. Aboo, "Proposed Stenography Approach using DNA Properties", College of Computer & Mathematic Science-Mosul Univ./ IRAQ, 2013.
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Big Data, Economy, Infrastructure, Investment, Technological Advancement.
[2] Tekiner, Firat ; Keane, John A., Big Data framework, IEEE International Conf. on Systems, Man, and Cybernetics (SMC), 2013.
[3] Wielki, Implementation of Big Data concept in organizations – possibilities, impediments and challenges, IEEE Federated Conf. on Computer Science and Information Systems, Conference,2013
[4] Jay Lee, Edzel Lapira, Behrad Bagheri, Hung-an Kao, Recent advances and trends in predictive manufacturing systems in big data environment, ScienceDirect Journal, 1(1),October 2013.
[5] IDC. Worldwide Big Data Technology and Services 2012-2015 Forecast. <http://www.idc.com.>
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Congestion Control Technique for Wireless Networks |
Country | : | India |
Authors | : | Alhamali Masoud Alfrgani Ali, Raghav Yadav, Hari Mohan Singh |
: | 10.9790/0661-16223133 |
Analysis and improvements. Proceedingsof IEEE INFOCOM, 1998
[2]. Chandran, K. and Raghunathan, S. and Venkatesan, S. and Prakash, R.: AFeedback-based Scheme for Improving TCP Performance
in Ad Hoc Wireless Networks.Proceedings of ICDCS, 1998
[3]. Chen, K. and Nahrstedt, K. and Vaidya, N.: The Utility of Explicit Rate-BasedFlow Control in Mobile Ad Hoc Networks.
Proceedings of IEEE WCNC, 2004322 Y. Su and T. Gross
[4]. D. Kim, C.-K. Toh, and Y. Choi. "TCP-BuS: improving TCP performance in wireless ad hoc networks".journal ofcommunications
and networks, vol. 3, no.2, june 2001.
[5]. Dina Katabi, Mark Handley, and Charlie Rohrs. "Congestion control for high bandwidth delay product networks."SIGCOMM
COMPUT.COMMUN.REV.,32(4):89–102,2002.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Study on Face Recognition Algorithm |
Country | : | India |
Authors | : | Mr. Sarath P. S., Ms. Kumary R Soumya |
: | 10.9790/0661-16223439 |
Keywords: Face Recognition, Biometrics, PCA, LDA, ICA, BIC, AAM.
[2] Lindsay I Smith ," A tutorial on Principal Components Analysis" , February 26, 2002
[3] Maricio Luis Teixeira,"The Bayesian intrapersonal/extrapersonal classifier" colorado state university, 2003
[4] Marcio L. Teixeira and J. Ross Beveridge ," An Implementation and Study of the Moghaddam and Pentland Intrapersonal/ Extrapersonal Image Difference Face Recognition Algorithm" , may 2003.
[5] R. Duda et al. ,John Wiley, "Pattern Classification", 2001 (pp. 117-124, soft copy).
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Efficient Detection of Internet Worms Using Data Mining Techniques |
Country | : | India |
Authors | : | B. Sujatha, G.Rajitha devi |
: | 10.9790/0661-16224046 |
[2] ExEinfo PE. http://www.exeinfo.go.pl/.
[3] Generic Unpacker Win32. http://www.exetools.com/unpackers.htm.
[4] IDA Pro Disassembler. http://www.datarescue.com/idabase/index.htm.
[5] PEiD. http://peid.has.it/.
[6] UPX the Ultimate Packer for eXecutables. http://www.exeinfo.go.pl/.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: The prevalence and severity of mental health problems in college and university communities are alarming. How-ever, the majority of students with mental disorders do not seek help from professionals. To help students assess their mental conditions and encourage them to take an active role in seeking care, we developed a web-based self-screening, referral, and secure communication application. The proposed system will do the self screening of the student by asking them question in the area of anxiety, depression, attention deficit disorder, alcohol use, eating disorder. If system found any student with mental disorder then that student will be refer to doctor for further checkup.
Index Terms: College, Internet, mental health, referral, screening, university, World WideWeb.
[2] [11] K. Zivin, D. Eisenberg, S. E. Gollust, and E. Golberstein, "Persistence of mental health problems and needs in a college student population," J. Affective Disorders, vol. 117, pp. 180–185, 2009.
[3] American College Health Association, "National college health assessment spring 2007 reference group data report," J. Amer. Coll. Health, vol. 56, pp. 469–479, 2008.
[4] R. Kadison and T. F. DiGeronimo, College of the Overwhelmed: The Campus Mental Health Crisis and What to Do about it. San Francisco, CA: Jossey-Bass, 2004.
[5] E. Kim, A. Mayani, S. Modi, C. Soh, and Y. Kim, "Evaluation of patientcentered electronic health record to overcome digital divide," Conf. Proc. IEEE Eng. Med. Biol. Soc., pp. 593–596, 2005.
[6] J. R. Fann, D. L. Berry, S. Wolpin, M. Austin-Seymour, N. Bush, B. Halpenny, W. B. Lober, and R. McCorkle, "Depression screening using the Patient Health Questionnaire-9 administered on a touch screen computer," Psychooncology, vol. 18, pp. 14–22, 2009.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Secure Code Based Mostly Information Forwarding System in Cloud Storage |
Country | : | India |
Authors | : | G.Shaik Abdullah |
: | 10.9790/0661-16225357 |
Abstract: Cloud Computing may be a technology that treats the resources on the net as a combined entity, a cloud. This project addresses the matter of forwarding information to a different user by storage servers directly beneath the management of the info owner. With this thought, we tend to propose a completely unique proxy re-encryption theme and integrate it with a secure redistributed code to create a secure distributed wares area structure. The coding set up chains indoctrination operations over encrypted messages and forwarding operations over encrypted and encoded messages. It makes the storage system expeditiously meet the wants of knowledge strength, information confidentiality, and information forwarding. Achieving the mixing considerately of a distributed structure is difficult. Our system meets the wants that storage servers severally perform re- coding and key servers severally perform partial coding. The planned system permits additional versatile adjustment between the quantity of storage servers and strength.
Keywords: Cloud computing, Erasure code, Proxy re- coding techniques, Redistributed Storage system.
[2] Ateniese, G., Benson, K., and Hohenberger, S. (2009) "Key-private proxy reencryption," in Proceedings of Topics in Cryptology - CT-RSA, vol. 5473 of Lecture Notes in Computer Science, p. 279–294.
[3] Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z. and Song, D. (2007) "Provable data possession at untrusted stores," in Proceedings of the 14th ACM Conference on Computer and Communications Security - CCS, p. 598–609.
[4] Ateniese, G., Kamara, S. and Katz, J. (2009) "Proofs of storage from homomorphic identification protocols," in Proceeding of the 15th International Conference on the Theory and Application of Cryptology and Information Security - ASIACRYPT, vol. 5912 of Lecture Notes in Computer Science, p. 319–333.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Security-Aware Packet Scheduling Scheme with Multi-Level Queuing and RSA |
Country | : | India |
Authors | : | J. Antony Suganiya, J. Viji Priya |
: | 10.9790/0661-16225863 |
Abstract: Emerging security-aware packet scheduling algorithms can efficiently improve the security measures while forwarding the packets over wireless links. Existing scheduling algorithms for real-time wireless networks are not capable of providing higher level of security. The proposed methodology overcomes the difficulties in the existing scheduling algorithm with the security enhancements. A multilevel queue scheduling algorithm is used to partition the ready queue into several separate queues.For security reasons, the proposed methodology uses the RSA algorithm for encrypting and decrypting the packets. The proposed Security-aware Packet Scheduling (SPS) methodology strives to improve the security levels while achieving high schedulability for real-time packets. The proposed model reduces the congestion occurred during scheduling the packets.The performance of the proposed method results better security than the existing Quality Based Searching algorithm. Also, the system takes lesser time, reduces congestion and traffic also provides higher arrival rate for scheduling the packets.
Index Terms: Encryption, Decryption, Multilevel queue scheduling, RSA, Real-time packets, andScheduling algorithms
[2] T. Nelms and M. Ahamad, "Packet scheduling for deep packet inspection on multi-core architectures," in Proceedings of the 6th ACM/IEEE Symposium on Architectures for Networking and Communications Systems, 2010, p. 21.
[3] W. Jiang, G. Xiong, X. Ding, Z. Chang, and N. Sang, "Confidentiality-aware message scheduling for security-critical wireless networks," Systems Engineering and Electronics, Journal of, vol. 21, pp. 154-160, 2010.
[4] G. R. Gupta and N. B. Shroff, "Delay analysis and optimality of scheduling policies for multihop wireless networks," IEEE/ACM Transactions on Networking (TON), vol. 19, pp. 129-141, 2011.
[5] Z. Wang, W. Hu, W. Sun, H. He, and L. Yi, "An efficient aggregation scheduling algorithm for unbalanced traffic distribution in optical packet switch network," in Communications and Photonics Conference and Exhibition (ACP), 2010 Asia, 2010, pp. 635-636.
- Citation
- Abstract
- Reference
- Full PDF
[1] H. Almuallim and T.G. Dietterich (1992),Algorithms for IdentifyingRelevant Features.
[2] H. Almuallim and T.G. Dietterich (1994), Learning Boolean Concepts inthe Presence of Many Irrelevant Features.
[3] A. Arauzo-Azofra, J.M. Benitez, and J.L. Castro (2004),A Feature SetMeasure Based on Relief.
- Citation
- Abstract
- Reference
- Full PDF
[2] S. Balasubramaniam, W. Donnelly, D. Botvich, N. Agoulmine, and J. Strassner, "Towards integrating principles of Molecular Biology for Autonomic Network Management," in Hewlett Packard university Association (HPOVUA) conference, Nice, France., 2006.
[3] P. Boonma and J. Suzuki, "MONSOON: A CoevolutionaryMultiobjective Adaptation Framework for Dynamic Wireless Sensor Networks," in In Proc. of the 41st Hawaii International Conference on System Sciences (HICSS) Big Island, HI, 2008.
[4] N. Mazhar and M. Farooq, "BeeAIS: Artificial Immune System Security for Nature Inspired, MANET Routing Protocol, BeeAdHoc," Springer-Verlag Berlin Heidelberg, vol. LNCS 4628, pp. 370–381, 2007.
[5] G. Chen, T.-D. Guo, W.-G. Yang, and T. Zhao, "An improved ant-based routing protocol in Wireless Sensor Networks," in Collaborative Computing: International Conference on Networking, Applications and Worksharing, 2006. CollaborateCom2006., New York, NY, 2006, pp. 1-7.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Collective Behavior of social Networking Sites |
Country | : | India |
Authors | : | Ashwini Vispute, Prerna Jadhav, Prof. P. V Kharat |
: | 10.9790/0661-16227579 |
Abstract: Now a days a huge data is generated by social media like Facebook, Twitter, Flickr, and YouTube .This big data present opportunities and challenges to study collective behavior of data. In this work, we predict collective behavior in social media. In particular, given information about some individuals, how can we infer the behavior of unobserved individuals in the same network? A social-dimension-based approach has been shown effective in addressing the heterogeneity of connections presented in social media. However, the networks in social media are normally of colossal size, involving hundreds of thousands of actors. The scale of these networks entails scalable learning of models for collective behavior prediction. To address the scalability issue, we propose an edge-centric clustering scheme to extract sparse social dimensions. With sparse social dimensions, the proposed approach can efficiently handle networks of millions of actors while demonstrating a comparable prediction performance to other non-scalable methods.
Index Terms: Classification with Network Data, Collective Behavior, Community Detection, Social Dimensions.
[2] ——, ―Relational learning via latent social dimensions,‖ in KDD '09: Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining. New York, NY, USA: ACM, 2009, pp. 817–826.
[3] M. Newman, ―Finding community structure in networks using the eigenvectors of matrices,‖ Physical Review E (Statistical, Nonlinear, and Soft Matter Physics), vol. 74, no. 3, 2006. [Online]. Available: http://dx.doi.org/10.1103/PhysRevE.74.036104
[4] L. Tang and H. Liu, ―Scalable learning of collective behavior based on sparse social dimensions,‖ in CIKM '09: Proceeding of the 18th ACM conference on Information and knowledge management. New York, NY, USA: ACM, 2009, pp. 1107–1116.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: In a distributed system, there are numerous service provider. The user must be authenticated to entrance the services provided by the service provider. It is challenging to recall all secret words for users. So to clarify this problem single sign on is used which is an authentication contrivance in that permit a single license to be validated by multiple service provider. The Wang, Yu, and Qi Xie find that Chang – Lee Scheme undergoes from two attacks one of which is that the aggressor is outside service provider converses with the authenticated user twice and get the license necessary to right to use data in distributed systems. The second attack is the outsider easily receiving right to use to, use services without any license by mimicking authenticate user. This violence also associated with Hsu and Chang Scheme. To sidestep these attacks Wang, Yu, and Qi Xie employed RSA-VES. For enhancement and soundness of authentication, this paper services One Time Password to Wang, Yu, and Qi Xie Method. Now a days OTP plays important role in an authentication, so that using OTP for secure single sign on its easy to provide soundness for authentication.
Index Terms:Authentication, RSA-VES, distributed system, Security, Single Sign On(SSO),One Time Password(OTP).
[2] L. Lamport, "Secret word authentication with insecure communication," Commun. ACM, vol. 24, no. 11, pp. 770– 772, Nov. 1981.
[3] W. B. Lee and C. C. Chang, "User identification and key distribution maintaining anonymity for distributed systems," Comput. Syst. Sci. Eng., vol. 15, no. 4, pp. 113–116, 2000.
[4] W. Juang, S. Chen, and H. Liaw, "Robust and efficient secret word authenticated key agreement using smart cards," IEEE Trans. Ind. Electron., vol. 15, no. 6, pp. 2551–2556, Jun. 2008.
[5] X. Li,W. Qiu, D. Zheng, K. Chen, and J. Li, "Anonymity enhancement on robust and efficient secret word-authenticated key agreement using smart cards," IEEE Trans. Ind. Electron., vol. 57, no. 2, pp. 793–800, Feb. 2010.
- Citation
- Abstract
- Reference
- Full PDF
[2] Jiyou Jia, "CSIEC: A computer assisted English learning chatbot based on textual knowledge and reasoning", Knowledge-Based Systems, ELSEVIER, Volume 22, Issue 4, May 2009, Pages 249–255.
[3] T Thornburgh, "Social engineering: the Dark Art". Paper presented at InfoSecCD '04 Proceedings of the 1st annual conference on Information Security Curriculum Development
[4] Rusch, J, "The "social engineering" of Internet fraud". Paper presented at the 1999 Internet Society's INET'99 conference. Retrieved from http://www.isoc.org/isoc/conferences/inet/99/proceedings/3g/3g_2.htm
[5] Manske, K, "An introduction to social engineering", Information Systems Security 9, Pages 53-59. Retrieved from GALILEO: Computer Source database.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Semantic based Automated Service Discovery |
Country | : | India |
Authors | : | Mr.Likhesh N. Kolhe, Prof. Sachin M. Bojewar |
: | 10.9790/0661-16229499 |
Abstract: A vast majority of web services exist without explicit associated semantic descriptions. As a result many services that are relevant to a specific user service request may not be considered during service discovery. In this paper, we address the issue of web service discovery given no explicit service description semantics that match a specific service request. Our approach to semantic based web service discovery involves semantic-based service categorization and semantic enhancement of the service request. We propose a solution for achieving functional level service categorization based on an ontology framework. Additionally, we utilize clustering for accurately classifying the web services based on service functionality. The semantic-based categorization is performed offline at the universal description discovery and integration (UDDI). The semantic enhancement of the service request achieves a better matching with relevant services. The service request enhancement involves expansion of additional terms (retrieved from ontology) that are deemed relevant for the requested functionality. An efficient matching of the enhanced service request with the retrieved service descriptions is achieved utilizing Latent Semantic Indexing (LSI). Our experimental results validate the effectiveness and feasibility of the proposed approach.
Keywords: Semantic Matching, Semantic Web services, Service-oriented Computing, SVM, UDDI
[2] R. Agrawal, T. Imielinski, and A. Swami, "Mining Association Rules Between Sets of Items in Large Databases," Proc. ACMSIGMOD Int'l Conf. Management of Data, 1993.
[3] E. Al-Masri and Q.H. Mahmoud, "Investigating Web Services on the World Wide Web," Proc. 17th Int'l Conf. World Wide Web (WWW '08), Apr. 2008.
[4] M.-L. Antonie and O.R. Zaane, "Text Document Categorization by Term Association," Proc. IEEE Int'l Conf. Data Mining (ICDM '02), 2002.
[5] K. Anyanwu, A. Maduko, and A. Sheth, "SemRank: Ranking Complex Relationship Search Results on the Semantic Web," Proc. 14th Int'l Conf. World Wide Web (WWW '05), 2005.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Experimental study of Web Page Ranking Algorithms |
Country | : | India |
Authors | : | Rachna Singh Bhullar, Dr. Praveen Dhyani |
: | 10.9790/0661-1622100106 |
Abstract: Today's life is very much influenced by the internet. Everything can be accessed by making a search on the Internet. Web browsers and web search engines are the two major components of web searching. Web browsers are the software applications and web search engines are the software itself. To achieve the goal of web searching web indexer plays a very important role of indexing the web pages by making use of link analysis algorithms. In this paper we are going to compare the three most commonly used link analysis algorithms which are page rank, weighted page rank and the hub & authority algorithms.
Keywords: Page Rank Algorithm, Weighted Page Rank Algorithm, Link Analysis Algorithm, Hub and Authority Algorithm.
[2]. Study of Page Rank Algorithms, A Power Point Presentation.
[3]. Web Page Rank Algorithm based on number of visits of links of web page by Neelam Tyagi in International Journal of Soft Computing and Engineering(IJSCE), ISSN:2231-2307, Vol2, Issue3, July 2012.
[4]. A Survey Paper on Hyperlink Induced Topic Search Algorithm for Web Mining by Ramesh Prajapati in International Journal of Engineering Research and Technilogy, ISSN 2278-0181, volume 1, Issue 2, April2012,
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Audio Denoising, Recognition and Retrieval by Using Feature Vectors |
Country | : | India |
Authors | : | Shruti Vaidya, Dr. Kamal Shah |
: | 10.9790/0661-1622107112 |
[2] Guodong Guo and Stan Z. Li, "Content-Based Audio Classification and Retrieval by Support Vector Machines", IEEE Transactions On Neural Networks, Vol. 14, No. 1, January 2003
[3] Vaishali Nandedkar, "Audio Retrieval Using Multiple Feature Vectors", International Journal of Electrical and Electronics Engineering (IJEEE) ,Volume-1 ,Issue-1 ,2011
[4] Hariharan Subramanian, Prof. Preeti Rao and Dr. Sumantra. D. Roy, "Audio Signal Classification", M.Tech. Credit Seminar Report, Electronic Systems Group, EE. Dept, IIT Bombay, Submitted November2004