Version-7 (March-April 2014)
Ver-1
Ver-2
Ver-3
Ver-4
Ver-5
6
7
8
9
10
11
12
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Multi-Tier Web Security on Web Applications from Sql Attacks |
Country | : | India |
Authors | : | S.Suganya, D.Rajthilak, G.Gomathi |
: | 10.9790/0661-16270104 |
Abstract: This paper deals with the techniques that are used to prevent the web applications from web security vulnerabilities caused by hackers which leads to the misusage of data. Web services and applications have increased in both popularity and complexity over the past few years. Daily tasks, such as purchasing, banking, travel, and social networking, are all done via the web. Web services have always been the target of attacks. These attacks have recently become more diverse, as attention has shifted from attacking the front end to exploiting vulnerabilities of the web applications in order to corrupt the back-end database system. We present Double Guard, a system used to detect attacks in multitier web services.
[1]. DoubleGuard: Detecting & Preventing Intrusions in Multitier Web Applications, Volume 2, No.2, February – March 2013
International Journal of Networks and Systems Available Online at http://warse.org/pdfs/2013/ijns02222013.pdf
[2]. Enhanced Security Model for SQL Injection attacks for web Database Deepti U Telang Prasanna Kumar H.R Research Scholar,
Dept.of CSE, HOD, Department of CSE NMAMIT, Nitte India, NMAMIT, Nitte India(International Journal of Advanced Research
in Computer Science and Software Engineering, Volume 3, Issue 6, June 2013).
[3]. Security Analysis of UBC Web Applications (November 2007) Jeffrey Qian, Je-Yu George Lee, William Ha and Phoebe Hsu,
University of British Columbia
[4]. Cross-Site Scripting Attacks in Social Network APIs Yuqing Zhang , Xiali Wang University of Chinese Academy of Sciences
Beijing, China, zhangyq@ucas.ac.cn
International Journal of Networks and Systems Available Online at http://warse.org/pdfs/2013/ijns02222013.pdf
[2]. Enhanced Security Model for SQL Injection attacks for web Database Deepti U Telang Prasanna Kumar H.R Research Scholar,
Dept.of CSE, HOD, Department of CSE NMAMIT, Nitte India, NMAMIT, Nitte India(International Journal of Advanced Research
in Computer Science and Software Engineering, Volume 3, Issue 6, June 2013).
[3]. Security Analysis of UBC Web Applications (November 2007) Jeffrey Qian, Je-Yu George Lee, William Ha and Phoebe Hsu,
University of British Columbia
[4]. Cross-Site Scripting Attacks in Social Network APIs Yuqing Zhang , Xiali Wang University of Chinese Academy of Sciences
Beijing, China, zhangyq@ucas.ac.cn
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Tracking of the object movement in the input frame of video is an important process for various real time application such as video-conferencing, human robotics or human computer interface or in the analysis of social interaction. The important step is to determine the path of the object. The various techniques to track the multiple moving objects in a input frame of video have been proposed. This paper gives a brief analysis of recent multi-object trackers algorithms based on markov model and particle filtering
Keywords: face tracking,HMM(Hidden markov model)MCMC(Markov Chain Monte Carlo), PF(Particle filtering), long term multi-object tracking.
Keywords: face tracking,HMM(Hidden markov model)MCMC(Markov Chain Monte Carlo), PF(Particle filtering), long term multi-object tracking.
[1 ] S. Duffner and J. M. Odobez, "Track Creation and Deletion Framework for Long-Term Online Multiface Tracking," Image Processing, IEEE Transactions on, vol. 22, pp. 272-285, 2013.
[2 ] C. Cuevas and N. Garcia, "Efficient Moving Object Detection for Lightweight Applications on Smart Cameras," Circuits and Systems for Video Technology, IEEE Transactions on, vol. 23, pp. 1-14, 2013.
[3 ] I. Ali and M. N. Dailey, "Multiple human tracking in high-density crowds," Image and Vision Computing, vol. 30, pp. 966-977, 2012.
[4] C.-H. Kuo and R. Nevatia, "How does Person Identity Recognition Help Multi-Person Tracking?," 2011.
[5] B. Benfold and I. Reid, "Stable multi-target tracking in real-time surveillance video," in Proc. Comput. Vis. Pattern Recognit., Jun. 2011, pp. 3457–3464.
[2 ] C. Cuevas and N. Garcia, "Efficient Moving Object Detection for Lightweight Applications on Smart Cameras," Circuits and Systems for Video Technology, IEEE Transactions on, vol. 23, pp. 1-14, 2013.
[3 ] I. Ali and M. N. Dailey, "Multiple human tracking in high-density crowds," Image and Vision Computing, vol. 30, pp. 966-977, 2012.
[4] C.-H. Kuo and R. Nevatia, "How does Person Identity Recognition Help Multi-Person Tracking?," 2011.
[5] B. Benfold and I. Reid, "Stable multi-target tracking in real-time surveillance video," in Proc. Comput. Vis. Pattern Recognit., Jun. 2011, pp. 3457–3464.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Sharing of Medical Information on Cloud Platform-A Review |
Country | : | India |
Authors | : | Abhishek Kumar Gupta, Kulvinder Singh Mann |
: | 10.9790/0661-16270811 |
Abstract: At present hospitals store the physical fitness data in paper printed format and these formats are saved in archives in a very irregular manner. The present work aims at the application of cloud computing in a secure way to share and store the medical information. With the stored information concerned physician will be able to build better and deeper referral networks of online medical information transfer system. It results in increase of volume and opens more transferred platform for exchange and collaboration of medical information.
Keywords: Cloud Computing, Sharing of Medical Information, Benefits, Challenges.
Keywords: Cloud Computing, Sharing of Medical Information, Benefits, Challenges.
[1] http://www.who.int/inf-fs/en/fact135.html
[2] India's Population To Overtake China By 2020, http://www.insafbulletin.net/archives/1077
[3] Zhuo-Rong, En-Chi, Kuo-Hsuan Huang, Feipei Lai, A Secure Electronic Medical Record Sharing Mechanism in the Cloud Computing Plateform, IEEE 15th International Symposium on Consumer Electroncs 2011, pp. 450-457
[4] Mendelson DS, Bak, PRG, Menschil E and Siegel E, Image Exchange: IHE and evaluation of image sharing, J Radiographic, 2008, pp. 1817-1833
[5] Sodickson A, Opraseuth J, Ledbetter S, Outside Imaging in Emergency Department Transfer Patients:CD Import Reduces Rates of Subsequent Imaging Utilization, J radiology, 2011. Pp. 408-413.
[2] India's Population To Overtake China By 2020, http://www.insafbulletin.net/archives/1077
[3] Zhuo-Rong, En-Chi, Kuo-Hsuan Huang, Feipei Lai, A Secure Electronic Medical Record Sharing Mechanism in the Cloud Computing Plateform, IEEE 15th International Symposium on Consumer Electroncs 2011, pp. 450-457
[4] Mendelson DS, Bak, PRG, Menschil E and Siegel E, Image Exchange: IHE and evaluation of image sharing, J Radiographic, 2008, pp. 1817-1833
[5] Sodickson A, Opraseuth J, Ledbetter S, Outside Imaging in Emergency Department Transfer Patients:CD Import Reduces Rates of Subsequent Imaging Utilization, J radiology, 2011. Pp. 408-413.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Embedded products have different types of display screens like LCD, Touch screen, CRT etc. For automating the development testing of such devices, we need to recognize the text displayed on it using a camera. It is always a challenge to recognize the LCD display screen using OCR engines. Due to the custom display nature of these LCD controllers as well as the small font size, character recognition is a complex job. Traditional way of recognizing such screens uses template matching techniques. Such image matching techniques take precious time which drastically increases depending upon the number of characters and their size. In this paper, we are going to discuss an algorithm, which helps to recognize such small text in an accurate and speedy manner using low cost resources like webcam and open source software.
Keywords: Dot Matrix LCD, Dynamic Memory Image, Embedded, Image Processing, OCR.
Keywords: Dot Matrix LCD, Dynamic Memory Image, Embedded, Image Processing, OCR.
[1] Tekin, E. Smith-Kettlewell Eye Res. Inst., San Francisco, CA, USA; Coughlan, J.M. ; Huiying Shen, Real-time detection and reading of LED/LCD displays for visually impaired persons, Applications of Computer Vision (WACV), January 2011 IEEE Workshop.
[2] Daniel, David, Mahmood, Roy, Emami, Jason, Mastering OpenCV with Practical Computer Vision Projects (PACKT Publishing, December 2012)
[3] Gary Bradski & Adrian Kaebler, Learning OpenCV - Computer Vision with the OpenCV Library (O'REILLY 2008)
[4] Chapter 5: Number Plate Recognition Using SVM and Neural Networks
[5] Chapter 7: Histograms and Matching
[2] Daniel, David, Mahmood, Roy, Emami, Jason, Mastering OpenCV with Practical Computer Vision Projects (PACKT Publishing, December 2012)
[3] Gary Bradski & Adrian Kaebler, Learning OpenCV - Computer Vision with the OpenCV Library (O'REILLY 2008)
[4] Chapter 5: Number Plate Recognition Using SVM and Neural Networks
[5] Chapter 7: Histograms and Matching
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Advanced technology solutions will help in scaling implementation, to accommodate a lot of data and data analysis capabilities while not affecting the performance. Data analytics in the field of water resource management is been seen as the new area of study that may facilitate in optimally managing the provision of water based on availability. Cloud platform will reduce the cost of maintenance singly in isolated environments and with the application of big data will help in activity the data analytics fast. Exploitation technologies to display user friendly analytics results graphically and serving to in foretelling add feather in the cap for this architecture. Reservoirs forms the rear bone of the facility inside cities will significantly help the facility department's team in formulating advanced attending to manage the facility optimally if forecasted properly. The projected solution in this article helps in building a scalable software system platform for water reservoirs levels data analysis for foretelling future levels exploitation cloud based platform through massive data technologies landscape. The aim of this study is to develop models for predicting water levels in any reservoir. It applies Autoregressive Integrated Moving Average (ARIMA) algorithmic rule for creating predictions. It stores the historic huge data set inside massive information storage and uses big data technologies to review behavior and predict the future levels by applying data-driven analytics and data mining concepts.
Keywords: Analytics, ARIMA, Big Data, Cloud Computing, Data Mining, Hadoop, Time Series Modeling, Water Reservoirs.
Keywords: Analytics, ARIMA, Big Data, Cloud Computing, Data Mining, Hadoop, Time Series Modeling, Water Reservoirs.
[1] Hydrological analysis for water level projections in Taihu Lake, China (Journal of Flood Risk Management )by L. Liu, Z.X. Xu, N.S. Reynard, C.W. Hu and R.G. Jones (March 2013)
[2] Stochastic modeling of Lake Van water level time series with jumps and multiple trends (Hydrology and Earth System Sciences (An Interactive Open Access Journal of the European Geosciences Union)) by H. Aksoy, N. E. Unal, E. Eris, and M. I. Yuce (February 2013)
[3] Hadoop-based ARIMA Algorithm and its Application in Weather Forecast (International Journal of Database Theory and Application) by Leixiao Li, Zhiqiang Ma, Limin Liu and Yuhong Fan(2013)
[4] Cloud-Based Software Platform for Big Data Analytics in Smart Grids (IEEE) by Yogesh Simmhan, Saima Aman, Alok Kumbhare, Rongyang Liu, Sam Stevens, Qunzhi Zhou, Viktor Prasanna
[5] Predicting Water Levels at Kainji Dam Using Artificial Neural Networks (Nigerian Journal of Technology (NIJOTECH)) by C.C. Nwobi-Okoye, A.C. Igboanugo (March 2013).
[2] Stochastic modeling of Lake Van water level time series with jumps and multiple trends (Hydrology and Earth System Sciences (An Interactive Open Access Journal of the European Geosciences Union)) by H. Aksoy, N. E. Unal, E. Eris, and M. I. Yuce (February 2013)
[3] Hadoop-based ARIMA Algorithm and its Application in Weather Forecast (International Journal of Database Theory and Application) by Leixiao Li, Zhiqiang Ma, Limin Liu and Yuhong Fan(2013)
[4] Cloud-Based Software Platform for Big Data Analytics in Smart Grids (IEEE) by Yogesh Simmhan, Saima Aman, Alok Kumbhare, Rongyang Liu, Sam Stevens, Qunzhi Zhou, Viktor Prasanna
[5] Predicting Water Levels at Kainji Dam Using Artificial Neural Networks (Nigerian Journal of Technology (NIJOTECH)) by C.C. Nwobi-Okoye, A.C. Igboanugo (March 2013).
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Video Surveillance for Effective Object Detection with Alarm Triggering |
Country | : | India |
Authors | : | B. Priyanka, A. Ramya, J. Sri Katheswari |
: | 10.9790/0661-16272125 |
Abstract: This paper presents a novel algorithm for detection and segmentation of foreground objects from a video which contains both stationary and moving background objects and under- goes both gradual and sudden "once-off" changes with fixed background and static cameras. Our method achieves complete detection of moving objects by involving three significant proposed modules: a background modeling (BM) module, an alarm trigger (AT) module, and an object extraction (OE) module For our proposed BM module, a unique two-phase background matching procedure is performed using rapid matching followed by accurate matching in order to produce optimum background pixels for the background model. Next, our proposed AT module eliminates the unnecessary examination of the entire background region, allowing the subsequent OE module to only process blocks containing moving objects. And the alarm triggers while a new object enters into the frame, the foreground information and background information are identified using the reference frame as background model . Here , both visual as well as quantitative measures show an improved performance and the scheme has a strong potential for applications in real time surveillance.
Index Terms: Background modeling, background subtraction, video segmentation, video surveillance, Alarm Triggering ,Shadow Removal.
Index Terms: Background modeling, background subtraction, video segmentation, video surveillance, Alarm Triggering ,Shadow Removal.
[1] A. Yilmaz, O. Javed, and M. Shah, "Object tracking: A survey," ACM Comput. Surv., vol. 38, Dec. 2006.
[2] C.Wren, A. Azarbayejani, T. Darrell, and A. Pentland, "Pfinder: Realtime tracking of the human body," IEEE Trans. Patt. Anal. Mach. Intell., vol. 19, no. 7, pp. 780–785, Jul. 1997.
[3] C. Stauffer and W. Grimson, "Adaptive background mixture models for real-time tracking," in IEEE Comput. Soc. Conf. CVPR, 1999, pp. 246–252.
[4] I. Haritaoglu, D. Harwood, and L. Davis, "W4: Real-time surveillance of people and their activities," IEEE Trans. Patt. Anal. Mach. Intell., vol. 22, no. 8, pp. 809–830, Aug. 2000.
[5] J. Jacques, C. Jung, and S. Musse, "Background subtraction and shadow detection in grayscale video sequences," in Eighteenth Brazilian Symp. Computer Graphics and Image Processing, Oct.2005, pp. 189–196.
[2] C.Wren, A. Azarbayejani, T. Darrell, and A. Pentland, "Pfinder: Realtime tracking of the human body," IEEE Trans. Patt. Anal. Mach. Intell., vol. 19, no. 7, pp. 780–785, Jul. 1997.
[3] C. Stauffer and W. Grimson, "Adaptive background mixture models for real-time tracking," in IEEE Comput. Soc. Conf. CVPR, 1999, pp. 246–252.
[4] I. Haritaoglu, D. Harwood, and L. Davis, "W4: Real-time surveillance of people and their activities," IEEE Trans. Patt. Anal. Mach. Intell., vol. 22, no. 8, pp. 809–830, Aug. 2000.
[5] J. Jacques, C. Jung, and S. Musse, "Background subtraction and shadow detection in grayscale video sequences," in Eighteenth Brazilian Symp. Computer Graphics and Image Processing, Oct.2005, pp. 189–196.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Secure Data Transmission by Embedding Marked Encrypted Image on Cloak Image |
Country | : | India |
Authors | : | Fameela K. A., Reshma V. K. |
: | 10.9790/0661-16272631 |
Abstract: Data hiding is the method of embedding confidential information into a set of host data such as photograph, television signal or any other identity card Reversible data hiding in images is a technique, by which the original cover can be losslessly recovered after the embedded message is extracted. To ensure security, we propose a novel method in which the marked encrypted image is embedded on a cloak image.
Keywords: Reversible data hiding; Image encryption; cloak image.
Keywords: Reversible data hiding; Image encryption; cloak image.
[1] Kede Ma, Weiming Zhang, Xianfeng Zhao, "reversible Data Hiding In Encrypted Images By Reserving Room Before Encryption" Ieee Transactions On Information Forensics And Security, Vol. 8, No. 3, March 2013
[2] Z. Ni, Y. Shi, N. Ansari, and S. Wei, "Reversible data hiding," IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354–362, Mar.2006.
[3] L. Luo et al., "Reversible image watermarking using interpolation," IEEE Trans. Inf. Forensics Security, vol. 5, no. 1, pp. 187–193, 2010 .
[4] X. Zhang, "Reversible data hiding in encrypted images," IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255–258, Apr. 2011.
[5] W. Hong, T. Chen, and H.Wu, "An improved reversible data hiding in encrypted images using side match," IEEE Signal Process. Lett., vol.19, no. 4, pp. 199–202, Apr. 2012.
[2] Z. Ni, Y. Shi, N. Ansari, and S. Wei, "Reversible data hiding," IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354–362, Mar.2006.
[3] L. Luo et al., "Reversible image watermarking using interpolation," IEEE Trans. Inf. Forensics Security, vol. 5, no. 1, pp. 187–193, 2010 .
[4] X. Zhang, "Reversible data hiding in encrypted images," IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255–258, Apr. 2011.
[5] W. Hong, T. Chen, and H.Wu, "An improved reversible data hiding in encrypted images using side match," IEEE Signal Process. Lett., vol.19, no. 4, pp. 199–202, Apr. 2012.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: A mobile WSN is considered as a collection of wireless mobile nodes and a base station forming an ad-hoc network. This type of network is used in various areas; such as underwater and underground. Each node has a limited energy and a random mobilization. Since the energy consumption is a very important factor, the Hierarchical protocols can solve this problem for instance the LEACH protocol. W-LEACH is a LEACH extension which extends the network lifetime but this protocol uses sensor location to organize the network so it is not effective in an area where the location of nodes is impossible with mobility. In this paper, we improve an old algorithm (W-LEACH) to a new protocol called W-LEACH Decentralized to increase network lifetime without the use of maps. Besides, we are going to compare this protocol with LEACH in term of network lifetime and energy dissipation using Network Simulator.
Keywords: W-LEACH, W-LEACH Decentralized, WSN.
Keywords: W-LEACH, W-LEACH Decentralized, WSN.
[1] W. Heinzelman, A. Chandrakasan, H. Balakrishnan, "Energy-efficient communication protocol for wireless microsensor networks", the 33rd Hawaii International Conference on System Sciences (HICSS '00), Maui, HI, USA, 2000.
[2] W. B. Heinzelman, A. Chandrakasan, H. Balakrishnan, "An application specific protocol architecture for wireless microsensor networks," IEEE Transactions on Wireless Communications, vol. 1, pp. 660–670, Oct. 2002.
[3] G Haosong, L Gang, Y Yonghwan "A partition based centralized LEACH algorithm for wireless sensor netoworks using solar energy", ICHIT, Korea, Aug, 2009.
[4] Nutan Sindhwani, Rohit Vaid, "V Leach: An Energy Efficient Communication Protocol For Wsn", Vol. 2, No. 2, February-March 2013, ISSN: 2320-2491
[5] D. S. Kim and Y. Chung, "Self-organization routing protocol supporting mobile nodes for wireless sensor network," in Proc. of 1st Int'l Multi-Symposium on Computer and Computational Sciences (IMSCCS'06), 2006.
[2] W. B. Heinzelman, A. Chandrakasan, H. Balakrishnan, "An application specific protocol architecture for wireless microsensor networks," IEEE Transactions on Wireless Communications, vol. 1, pp. 660–670, Oct. 2002.
[3] G Haosong, L Gang, Y Yonghwan "A partition based centralized LEACH algorithm for wireless sensor netoworks using solar energy", ICHIT, Korea, Aug, 2009.
[4] Nutan Sindhwani, Rohit Vaid, "V Leach: An Energy Efficient Communication Protocol For Wsn", Vol. 2, No. 2, February-March 2013, ISSN: 2320-2491
[5] D. S. Kim and Y. Chung, "Self-organization routing protocol supporting mobile nodes for wireless sensor network," in Proc. of 1st Int'l Multi-Symposium on Computer and Computational Sciences (IMSCCS'06), 2006.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Intelligent Database Driven Reverse Dictionary |
Country | : | India |
Authors | : | Mr. R. Thanigaivel, Mr. S. A. Ramesh kumar |
: | 10.9790/0661-16274044 |
Abstract: The reverse dictionary identifies a concept/idea/definition to words and phrases used to describe that concept. You can enter a single word, phrase, or a few words to get the correct meanings for that sentence. The proposed concepts similarity is applied using similarity for computing the relevancy between concepts verses and the documents or verses in English collections. Reverse Dictionary (RD) is a non alphabetic order dictionary. We present a set of algorithms and the results of a set of experiments showing the retrieval accuracy of our methods and the runtime response time performance of our implementation. Our experimental results show that our approach can provide significant improvements in performance scale without sacrificing the Quality of the result. Our experiments comparing the quality of our approach to that of currently available reverse dictionaries show that of our approach can provide significantly higher quality over either of the other currently available implementations.
Index Terms: Rd,Rms,Dictionaries,Filtering.
Index Terms: Rd,Rms,Dictionaries,Filtering.
[1] Anindya Datta, Ryan Shaw, Debra VanderMeer and Kaushik Dutta (2013) "Building a Scalable Database-Driven Reverse Dictionary‟-VOL. 25, NO. 3, pp.528-540
[2] D.M. Blei, A.Y. Ng, and M.I. Jordan, "Latent Dirichlet Allocation," J. Machine Learning Research, vol. 3, pp. 993-1022, Mar. 2003.
[3] J. Carlberger, H. Dalianis, M. Hassel, and O. Knutsson, "Improving Precision in Information Retrieval for Swedish Using Stemming," Technical Report IPLab-194, TRITA-NA-P0116, Interaction and Presentation Laboratory, Royal Inst. of Technology and Stockholm Univ., Aug. 2001.
[4] H. Cui, R. Sun, K. Li, M.-Y. Kan, and T.-S. Chua, "Question Answering Passage Retrieval Using Dependency Relations," Proc. 28th Ann. Int‟l ACM SIGIR Conf. Research and Development in Information Retrieval, pp. 400-407, 2005.
[5] T. Dao and T. Simpson, "Measuring Similarity between Sentences," http://opensvn.csie.org/WordNetDotNet/trunk/Projects/Thanh/Paper/WordNetDotNet_Semantic_Similarity.pdf (last accessed 16 Oct. 2009), 2009.
[2] D.M. Blei, A.Y. Ng, and M.I. Jordan, "Latent Dirichlet Allocation," J. Machine Learning Research, vol. 3, pp. 993-1022, Mar. 2003.
[3] J. Carlberger, H. Dalianis, M. Hassel, and O. Knutsson, "Improving Precision in Information Retrieval for Swedish Using Stemming," Technical Report IPLab-194, TRITA-NA-P0116, Interaction and Presentation Laboratory, Royal Inst. of Technology and Stockholm Univ., Aug. 2001.
[4] H. Cui, R. Sun, K. Li, M.-Y. Kan, and T.-S. Chua, "Question Answering Passage Retrieval Using Dependency Relations," Proc. 28th Ann. Int‟l ACM SIGIR Conf. Research and Development in Information Retrieval, pp. 400-407, 2005.
[5] T. Dao and T. Simpson, "Measuring Similarity between Sentences," http://opensvn.csie.org/WordNetDotNet/trunk/Projects/Thanh/Paper/WordNetDotNet_Semantic_Similarity.pdf (last accessed 16 Oct. 2009), 2009.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Fetching the hidden information of web through specific Domains |
Country | : | India |
Authors | : | Usha Gupta |
: | 10.9790/0661-16274550 |
Abstract: Now days, most of the people find the information over the internet by visiting various number of web pages and also by following the links under those web pages. A user has the ability to browse for data through the web pages he/she requires by following these web links. Even though, if the web page requested is not made public. There are various resources over the internet; most of them are hidden behind the database. Because of it, the user is only able to access it after making a query in to the database. With the help of search engines, this problem of finding required and necessary data is been resolved. This paper presents a method to retrieve such hidden data from web.
Keywords: DSIM, Request URL generator, Response agent, SFE, SFI.
Keywords: DSIM, Request URL generator, Response agent, SFE, SFI.
[1] Barbosa, L AND Freire, J.Searching for Hidden-Web Databases, Eight International Workshop on Web and Databases, 2005
[2] Kobayashi, M. AND Takeda, K.Information Retrieval of the Web, ACM. Computing Surveys, 2000
[3] Barbosa, L AND Freire, J. Siphoning Hidden-Web Data through Keyword-Based Interfaces. In Proc. of SBBD, 2004
[4] Raghavan, S AND Garcia-Molina,H. Crawling the Hidden Web. In Proc. Of VLDB, 2001
[5] He, B AND Chang, K.Statistical Schema Matching across Web Query Interfaces. In Proc. of SIGMOD, 2003.
[2] Kobayashi, M. AND Takeda, K.Information Retrieval of the Web, ACM. Computing Surveys, 2000
[3] Barbosa, L AND Freire, J. Siphoning Hidden-Web Data through Keyword-Based Interfaces. In Proc. of SBBD, 2004
[4] Raghavan, S AND Garcia-Molina,H. Crawling the Hidden Web. In Proc. Of VLDB, 2001
[5] He, B AND Chang, K.Statistical Schema Matching across Web Query Interfaces. In Proc. of SIGMOD, 2003.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Mine music |
Country | : | India |
Authors | : | Saurav Roy, Subhajit Pal |
: | 10.9790/0661-16275158 |
Abstract: This technical report describes the implementation details of a music recommendation system based on data mining techniques. The system enables the user to receive a playlist depending on his mood and age. Mood and age, these two parameters were considered by the system to recommend a song to a specific user. The proposed application also uses encryption and decryption technique to prevent outside attacks and secure its dataset from the attackers. The methodology section of this report describes the step algorithm along with the data flow diagram. We hope that the design and development concept described in this project will aid the developers' community in near future.
Keywords: Python, Data mining, Recommendation system, Encryption Decryption, SQL, Cryptography.
Keywords: Python, Data mining, Recommendation system, Encryption Decryption, SQL, Cryptography.
[1] A Method for Bypassing Keystroke Recognition Based Security System Using Social Engineering Page number: 87-93
- Citation
- Abstract
- Reference
- Full PDF
Abstract: In this paper, a new face recognition system based on Wavelet transform (HWT) and Principal Component Analysis (PCA) is presented. The image face is preprocessed and detected. The Haar wavelet is used to form the coefficient matrix for the detected face. The image feature vector is obtained by computing PCA for the coefficient matrix of DWT. A comparison between the proposed recognition system using DWT, PCA and Discrete Cosine Transform (DCT) is also made.
Keywords: Wavelet Transform, Principal Component Analysis.
Keywords: Wavelet Transform, Principal Component Analysis.
[1] Xiaoyang Tana, Songcan Chena, Zhi-Hua Zhou, Fuyan Zhang, 2006. "Face recognition from a single image per person: A survey, Pattern Recognition", Vol. 39, 2006, pp. 1725 – 1745.
[2] Mohamed Rizon, Muhammad Firdaus Hashim, Puteh Saad, Sazali Yaacob, Mohd Rozailan Mamat, Ali Yeon Md Shakaff, Abdul Rahman Saad, Hazri Desa and M. Karthigayan, 2006. "Face Recognition using Eigenfaces and Neural Networks", American Journal of Applied Sciences, Vol. 2, No. 6, 2006, pp. 1872-1875.
[3] R. Sanjeev Kunte,R. D. Sudhaker Samuel, 2007. "Wavelet Descriptors For Recognition Of Basic Symbols In Printed Kannada Text", International Journal of Wavelets, Multiresolution and Information Processing, Vol. 5, No. 2, 2007, pp. 351–367.
[4] S. T. Gandhe, K. T. Talele, and A.G.Keskar, 2008, "Face Recognition Using Contour Matching", IAENG International Journal of Computer Science, Vol. 35, No. 2, 2008.
[5] M. Almas Anjum, M. Younus Javed, and A. Basit, 2006, "A New Approach to Face Recognition Using Dual Dimension Reduction", International Journal of Signal Processing Vol. 2, No.1, 2006, pp1-6.
[2] Mohamed Rizon, Muhammad Firdaus Hashim, Puteh Saad, Sazali Yaacob, Mohd Rozailan Mamat, Ali Yeon Md Shakaff, Abdul Rahman Saad, Hazri Desa and M. Karthigayan, 2006. "Face Recognition using Eigenfaces and Neural Networks", American Journal of Applied Sciences, Vol. 2, No. 6, 2006, pp. 1872-1875.
[3] R. Sanjeev Kunte,R. D. Sudhaker Samuel, 2007. "Wavelet Descriptors For Recognition Of Basic Symbols In Printed Kannada Text", International Journal of Wavelets, Multiresolution and Information Processing, Vol. 5, No. 2, 2007, pp. 351–367.
[4] S. T. Gandhe, K. T. Talele, and A.G.Keskar, 2008, "Face Recognition Using Contour Matching", IAENG International Journal of Computer Science, Vol. 35, No. 2, 2008.
[5] M. Almas Anjum, M. Younus Javed, and A. Basit, 2006, "A New Approach to Face Recognition Using Dual Dimension Reduction", International Journal of Signal Processing Vol. 2, No.1, 2006, pp1-6.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Measuring Maintainability Index of a Software Depending on Line of Code Only |
Country | : | Iraq |
Authors | : | Nahlah M.A.M.Najm |
: | 10.9790/0661-16276469 |
Abstract: Maintainability Index (MI) has been proposed to calculate a single number that expresses the maintainability of a system. MI is calculated as a factored formula consisting of Lines of Code (LOC), Cyclomatic Complexity (CC)and Halstead Volume (HV). In this paper, we present a new method to find MI with respect to LOC only. To validate the method Measuring Maintainability Index Software (MMIS) is developed, that first finds MI with respect to (LOC, CC, and HV); secondly find MI with respect to LOC only. As the result has been compared they were closed but the new method was easy to understand, fast to count, and independent on the program language. In addition to many well-known programs, the MMIS was used to test itself and the result demonstrates that the program used to calculate MI value with respect to LOC only tend to be maintainable while the lexical analyzer the major step in calculating MI with regard to (LOC, HV, CC) is difficult to maintain.
[1] ISO, "ISO/IEC 9126-1: Software Engineering - Product Quality - part 1: Qualitymodel," Geneva, Switzerland, 2003.
[2] ISO, "ISO/IEC TR 9126-2: Software engineering - product quality -part 2: External metrics," Geneva, Switzerland, 2003.
[3] ISO, "ISO/IEC TR 9126-3: Software engineering - product quality -part 3: Internal metrics," Geneva, Switzerland, 2003.
[4] Boehm, B. W., J. R. Brown, H. Kaspar, M. Lipow, G. J. Macleod and M. J. Merit,1978, Characteristics of Software . Amsterdam: North Holland.
[5] G. M. Berns,"Assessing software maintainability", ACM Communications, 27(1), 1984.
[2] ISO, "ISO/IEC TR 9126-2: Software engineering - product quality -part 2: External metrics," Geneva, Switzerland, 2003.
[3] ISO, "ISO/IEC TR 9126-3: Software engineering - product quality -part 3: Internal metrics," Geneva, Switzerland, 2003.
[4] Boehm, B. W., J. R. Brown, H. Kaspar, M. Lipow, G. J. Macleod and M. J. Merit,1978, Characteristics of Software . Amsterdam: North Holland.
[5] G. M. Berns,"Assessing software maintainability", ACM Communications, 27(1), 1984.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Secure Personal Health Records access in Cloud Computing |
Country | : | India |
Authors | : | R. Shreelakshmi, S. Pandiyarajan M.E, Dr. J. Jagadeesan |
: | 10.9790/0661-16277074 |
Abstract: Patient Health Record (PHR) is a complete Patient related health data, which is getting stored in cloud computing to gain cost benefit and better access control. In maintaining PHR, cloud computing plays an inevitable role, since small hospitals and physicians are not affordable to maintain own servers to keep PHRs for cost and security reasons . Providing accessibility to variable stake holders like Patients, Physicians, Hospitals and Insurance Providers, become a tedious process in private individual servers with encryption mechanisms. Cloud solution ensures that PHRs ' availability to the necessary stake holders at any point of time. In any country , there are laws which governs to maintain privacy of patient health records, and hence maintaining PHRs in cloud are subjected to privacy concerns and high risk of getting exploited. There are various encryption schemes exist to preserve PHR's security and privacy in Cloud computing. In this paper, we propose a secure PHR accessing scheme for dynamic environment to preserve privacy in semi trusted cloud servers.
Keywords: Personal Health Record, Cloud computing, dynamic group, secure access control.
Keywords: Personal Health Record, Cloud computing, dynamic group, secure access control.
[1]. Xuefeng Liu, Yuqing Zhang, Member, IEEE, Boyang Wang, and Jingbo Yan, "Mona: Secure Multi-Owner Data Sharing for dynamic groups in the cloud ", published in IEEE Transactions on parallel and distributed systems, Vol 24, No.6, in June 2013
[2]. S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving Secure, Scalable,and Fine-Grained Data Access Control in Cloud Computing," Proc. IEEE INFOCOM '10, 2010.
[3]. Encryption for Fine-Grained Access Control of Encrypted Data," Proc. 13th ACM Conf. Computer and Comm. Security (CCS '06), pp. 89-98, 2006.
[4]. M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, "Plutus: Scalable Secure File Sharing on Untrusted Storage," proc. USENIX Conf. File and Storage Technologies, pp. 29-42, 2003.
[5]. Securing Remote Untrusted Storage," Proc. Network and Distributed Systems Security Symp. (NDSS), pp. 131-145, 2003.
[2]. S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving Secure, Scalable,and Fine-Grained Data Access Control in Cloud Computing," Proc. IEEE INFOCOM '10, 2010.
[3]. Encryption for Fine-Grained Access Control of Encrypted Data," Proc. 13th ACM Conf. Computer and Comm. Security (CCS '06), pp. 89-98, 2006.
[4]. M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, "Plutus: Scalable Secure File Sharing on Untrusted Storage," proc. USENIX Conf. File and Storage Technologies, pp. 29-42, 2003.
[5]. Securing Remote Untrusted Storage," Proc. Network and Distributed Systems Security Symp. (NDSS), pp. 131-145, 2003.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: This paper proposed a new blind authentication method based on the secret sharing technique with a data repair capability for grayscale document images .Shamir proposed threshold secret sharing scheme in which a secret message is transformed in to shares for keeping by participants, and when some of the shares, not necessarily all of them, are collected, the secret message can be lossless recovered.. This secret sharing scheme is useful for reducing the risk of incidental partial data loss. In additional image transformed in to a stego-image in the PNG format with an additional alpha channel for transmission on networks. For tampered block data repairing is applied by reverse Shamir scheme. It also presents the security issues and discuss on keeping high quality visual effect.
Keywords: Data hiding, data repair, grayscale document image, image authentication, Portable Network Graphics (PNG) image, secret sharing.
Keywords: Data hiding, data repair, grayscale document image, image authentication, Portable Network Graphics (PNG) image, secret sharing.
[1] C. S. Lu and H. Y. M. Liao, "Multipurpose watermarking for image authentication and protection," IEEE Trans. Image Process., vol. 10,no. 10, pp. 1579–1592, Oct. 2001.
[2] M. U. Celia, G. Sharma, E. Saber, and A. M. Tekalp, "Hierarchical watermarking for secure image authentication with localization," IEEE Trans. Image Process., vol. 11, no. 6, pp. 585–595, Jun. 2002.
[3] Z. M. Lu, D. G. Xu, and S. H. Sun, "Multipurpose image watermarking algorithm based on multistage vector quantization," IEEE Trans. Image Process., vol. 14, no. 6, pp. 822–831, Jun. 2005.
[4] M. Wu and B. Liu, "Data hiding in binary images for authentication and annotation," IEEE Trans. Multimedia, vol. 6, no. 4, pp. 528–538,Aug. 2004.
[5] H. Yang and A. C. Kot, "Binary image authentication with tampering localization by embedding cryptographic signature and block identifie,"IEEE Signal Process. Lett., vol. 13, no. 12, pp. 741–744, Dec.2006.
[2] M. U. Celia, G. Sharma, E. Saber, and A. M. Tekalp, "Hierarchical watermarking for secure image authentication with localization," IEEE Trans. Image Process., vol. 11, no. 6, pp. 585–595, Jun. 2002.
[3] Z. M. Lu, D. G. Xu, and S. H. Sun, "Multipurpose image watermarking algorithm based on multistage vector quantization," IEEE Trans. Image Process., vol. 14, no. 6, pp. 822–831, Jun. 2005.
[4] M. Wu and B. Liu, "Data hiding in binary images for authentication and annotation," IEEE Trans. Multimedia, vol. 6, no. 4, pp. 528–538,Aug. 2004.
[5] H. Yang and A. C. Kot, "Binary image authentication with tampering localization by embedding cryptographic signature and block identifie,"IEEE Signal Process. Lett., vol. 13, no. 12, pp. 741–744, Dec.2006.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: The amount and variety of data in natural sciences increases rapidly. Data abstraction, data manipulation and pattern discovery techniques are of great need in order to deal with such large quantities. Integration between different sources of data is also of major interest, as complex relations may arise. Biology is a good example of a field that provides extensive, highly variable and multi-sources data. The scope of these investigations has now expanded greatly owing to the development of high throughout sequencing techniques and novel statistical and computational methods. These methods require easy-to-use computer programs. We have developed a new software package, molecular genetics analysis to integrate their diverse data and tools under Common Graphical User Interfaces (GUIs) by using BLAST, FASTA data searches. One of the most exciting things about being involved in computer programming and biology is that both fields are rich in new techniques and results. The illumina is sequence analyzer in Next Generation Sequence Technology.
Keywords: DNA, RNA, BLAST, NCBI, EMBL, Biological datasets.
Keywords: DNA, RNA, BLAST, NCBI, EMBL, Biological datasets.
[1]. Arua, Uche and Chinaka, George I. (2011). Use of Library Resources by Staff and Students of Secondary Schools in Umuahia North Local Government Area of Abia State. Library Philosophy and Practice. 1-7.
[2]. Edem, Nkoyo, Ani, Okon and Ocheibi, Jonathan A. (2009). Students' perceived effectiveness in the use of library resources in Nigerian universities. Educational Research and Review, 4(6), 322-326.
[3]. http://en.wikipedia.org/wiki/Indian_Institute_of_Management_Rohtak
[4]. Oyesiku FA, Oduwole AA (2004).Use of an Academic Library: A Survey on the Olabisi Onabanjo University Libraries. Lagos J. Libr. Info. Sci., 2(2): 96-101.
[5]. Ugah D (2007). Evaluating the Use of University Libraries in Nigerria: A Case Study of Michael Okpara University of Agriculture, Umudike. Library Philosophy and Practice 1-8.
[2]. Edem, Nkoyo, Ani, Okon and Ocheibi, Jonathan A. (2009). Students' perceived effectiveness in the use of library resources in Nigerian universities. Educational Research and Review, 4(6), 322-326.
[3]. http://en.wikipedia.org/wiki/Indian_Institute_of_Management_Rohtak
[4]. Oyesiku FA, Oduwole AA (2004).Use of an Academic Library: A Survey on the Olabisi Onabanjo University Libraries. Lagos J. Libr. Info. Sci., 2(2): 96-101.
[5]. Ugah D (2007). Evaluating the Use of University Libraries in Nigerria: A Case Study of Michael Okpara University of Agriculture, Umudike. Library Philosophy and Practice 1-8.