Version-3 (March-April 2015)
Ver-1 Ver-2 Ver-3 Ver-4 Ver-5 Ver-6
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | The Performance Analysis of Median Filter for Suppressing Impulse Noise from Images |
Country | : | India |
Authors | : | Vishwanath Gouda R Malipatil || Dr G.M.Patil || Renuka R Malipatil |
Abstract: The impulse noise suppression is a challenging task in digital image processing. In this paper, the median filtering is applied to low, medium and high detail images that are corrupted by low to high density impulse noise. The performance of a median filter is evaluated based on edge preserving capabilities, subjective and objective analysis. The simulation results indicate that the median filter preserves edges in all the categories of images.
Keywords: Image Processing, Impulse Noise, Salt & Pepper Noise, Mean and Median Filtering.
[1]. R.C.Gonzalez and R.E.Woods Digital Image Processing, second edition, Pearson Education 2002.
[2]. J.W.Tukey "Nonlinear Methods for Smoothing Data" Jn Congr Rec.EASCON,1974.
[3]. Bhausahed Shinde,Dynandeo Mhaske,A.R.Dani "Study of Noise Detection and Removal Techniques in Medical Images", IJIGSP Vol 2, page no 51-60, March 2012.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Cryptanalysis and Security Enhancement of a Khan et al.'s Scheme |
Country | : | Iraq |
Authors | : | Eman T. Jasim || Hameed A. Younis |
Abstract: Remote user authentication, in which the resources are distributed among the recipients and they are shared across the network in the form of network services provided by the remote systems. Before supply such services, the remote system should have the skill to authenticate the users. Otherwise, a discount could impersonate a legitimate user login to get access to the system. Currently, an efficient remote authentication in which using smart card have been widely adopted due to their low computational cost and convenient portability for the authentication purpose. In smart card this field, there are many studies have relied upon them, including a study by Khan et al. who claimed that he exceeded the weaknesses of Wang et al.'s scheme. But unfortunately Khan et al.'s scheme is still suffer from several the identified weaknesses which is include preserve anonymity of a user, efficiency for wrong password login, forward secrecy and efficiency session key agreement. So our propose which it includes the construction of authentication system depending on 2FA , which is authentication scheme based on smart card, where it is surpassed the identified weaknesses of Khan et al.'s scheme which including preserve anonymity of a user, efficiency for wrong password login, forward secrecy and efficiency session key agreement.
Keywords: 2FA , Authentication, Remote user authentication, Smart card, Password.
[1]. L. Lamport, Password authentication with insecure communication, Communications of the ACM 24 (11) (1981) 770–772.
[2]. M.S. Hwang, L.H. Li, A new remote user authentication scheme using smart cards, IEEE Transactions on Consumer Electronics 46 (1) (2000) 28–30.
[3]. T. El Gamal, A public-key cryptosystem and a signature scheme based on discrete logarithms, IEEE Transactions on Information Theory 31 (4) (1985)469–472. [4]. ML. Das, A. Saxena, and V.P. Gulati, " A Dynamic ID-based Remote User Authentication Scheme", IEEE Trans. Consumer Electron., 50(2),(2004) 629-631.
[5]. I. Liao, I., C.-C. Lee ,M.-S. Hwang, " Security Enhancement for a Dynamic ID-based Remote User Authentication Scheme", In Proceedings of the International Conference on Next Generation Web Services Practices, NWeSP'05, Seoul, Korea,(2005) 437–440.
[6]. E.J. Yoon, and K.Y. Yoo, "Improving the Dynamic ID-Based Remote Mutual Authentication Scheme", Proc.OTM Workshops, LNCS 4277,(2006) 499–507.
[7]. Y.P. Liou, J. Lin, and S.S. Wang, "A New Dynamic ID-Based Remote User Authentication Scheme Using Smart Cards", In Proceedings of 16th Information Security Conference, Taiwan,(2006)198–205.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Implementation of Intelligent Web Server Monitoring |
Country | : | India |
Authors | : | Rakhi Arya |
Abstract: Web sites are one of the most important tools for advertisements in international area for universities and other foundation. The quality of a website can be evaluated by analyzing user accesses of the website. To know the quality of a web site user accesses are to be evaluated by web usage mining. The results of mining can be used to improve the website design and increase satisfaction which helps in various applications. Log files are the best source to know user behavior. But the raw log files contains unnecessary details like image access, failed entries etc., which will affect the accuracy of pattern discovery and analysis. So preprocessing stage is an important work in mining to make efficient pattern analysis. To get accurate mining results user's session details are to be known.In our proposed work, user's browsing behavior on a web page is considered with different modes of actions on client side to calculate web page browsing time with more precision and accuracy. It helps us to maintain the accuracy in finding frequent web usage patterns and administrators to evaluate its website usage more effectively. In our proposed work we considered t, t1, t2 three time limits which are subjective to the website management. These values should be selected effectively because if we select small value it will increase load on client side and if we select large value it will not provide good results.
[1]. I-Hsien Ting, Chris Kimble and Daniel Kudenko, Applying Web Usage Mining Techniques to Discover Potential Browsing Problems of Users, Seventh IEEE International Conference on Advanced Learning Technologies (ICALT 2007)
[2]. R. Iváncy and I.Vajk.Frequent Pattern Mining in Web Log Data.ActaPolytechnica Hungaria, Journal of Applied Sciences at Budapest Tech Hungary, Special Issue onComputational Intelligence. Vol.4, No.1, pp.77-99, 2006.
[3]. Jaideep Srivastava, Robert Cooley, Mukund Deshpande, Pang-Ning Tan, Web Usage Mining: Discovery and Applications of Usage Patterns from Web Data, SIGKDD Explorations, Jan 2000, Volume 1, Issue 2 – page 12
[4]. Maximilian Viermetz, CarstenStolz, Relevance and Impact of Tabbed Browsing Behavior on Web Usage Mining, Proceedings of the 2006 IEEE/WIC/ACM International Conference on Web Intelligence
[5]. The Web Analytics Association (WAA). Web Analytics Definitions – Version 4.0.http://www.webanalyticsassociation.org/, 2007.
[6]. J.Srivastava, R.Cooley, M.Deshpande, P-N,Web usage mining:discovery and applications of usage patterns from web data,SIGKDD Explorations 1 (2) (2000) 12-23.
[7]. Demin Dong, "Exploration on Web Usage Mining and its Application, ",IEEE,2009.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Class Diagram Extraction from Textual Requirements Using NLP Techniques |
Country | : | India |
Authors | : | Vrushali Adhav || Darshana Ahire || Aarti Jadhav || Dipali Lokhande |
Abstract: A new method for translating software requirements to object-oriented model is proposed. Software requirements specified in a natural language using scenario like format will be transformed into class diagrams of Unified Modeling Language using specification transformation rule. The transformation rule is based on a grammatical analysis, more specifically syntactical analysis, of requirements specification. This paper proposes a new method for translating software requirements specified using natural language to formal specification (in this context is executable and translatable Unified Modeling Language Class Diagram). Requirements specification written in a scenario like format will be transformed into class diagram's components the automation of class generation from natural language requirements is highly challenging. This paper proposes a method and a tool to facilitate requirements analysis process and class diagram extraction from textual requirements supporting natural language processing techniques. Requirements engineers analyze requirements manually to come out with analysis artifacts such as class diagram.
Keywords: NL (Natural Language), NLP (Natural Language processing), POS (Part Of Speech), RACE (Requirement Analysis and Class Diagram Extraction), UML (Unified Modeling Language)
[1] Booch, G. Object-Oriented Analysis and Design with Applications, 2nd Ed., Benjamin Cummings.
[2] Ambriola, V. and Gervasi, V. "Processing natural language requirements", Proc. 12th IEEE Intl. Conf. on Automated Software Engineering, pp.
[3] Farid Meziane, Nikos Athanasakis, Sophia Ananiadou, 2007,Generating Natural Language specifications from UML class diagrams, Springer-Verlag London Limited .
[4] F Elizabeth D. Liddy & Jennifer H. Liddy, "An NLP Approach for Improving Access to Statistical Information for the Masses".
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Information technology implementation for educational development of rural India – A review |
Country | : | India |
Authors | : | Ms. Ashwini Bodkurwar || Dr. Rajeshkumar U. Sambhe |
Abstract: India as a developing country is on its path of revolution in every aspect. But the poor economy and low per capita income of families in India affects the quality of education. As India comprises 70% of rural area it is necessary to develop it so as to develop India as a whole. In this context, special concern is given to how Information Technology has proven beneficial in educational development of rural India also we provide in this chapter, an overview of educational progress of India over decades, facilities for rural children, projects undertaken by government to implement educational surveys and initiative measures. This paper concerns with the availability of education through Information Technology in rural India.
Keywords: Education, ICT, Rural Development.
[1]. Mohit Kumar*, "Study of past and present education system in India" August 2012, IJPSS Volume 2, Issue 8 ISSN: 2249-5894, pp.85-91
[2]. Available at www.indianjournals.com- Nirvikar Singh, "Information Technology and Rural Development in India." March 2004, 1-35.
[3]. Available at www.iitk.ac.in- 12|Michael Ward1, "Rural education", pp. 286-317.
[4]. EFA Global Monitoring Report, 2011.
[5]. Mayuri Tawri*, Richa Sharma, Charandas Pote, "EduPad- "A Tablet Based Educational System for Improving Adult Literacy in Rural India"‟ IJCSMC, Vol. 3, Issue 2, February 2014, pp. 568 – 574.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Review on Evolution and Versioning of Ontology Based Information Systems |
Country | : | India |
Authors | : | Aastha Mahajan || Parminder Kaur |
Abstract: This paper presents the survey of evolution and versioning of ontology based information systems (ISs). With change being the inherent property of each system, it becomes indispensable to keep the information base of the ontology state-of-the-art. Ontology versioning and evolution is an important area of research as ontology progress is a collaborative and ubiquitous process. Therefore, question of maintaining ontologies gained more magnitude. As a result , multiple scenarios for ontology maintenance and evolution are emerging. This paper presents the work previously taken on ontology evolution and versioning. This study reveals the current approaches for handling ontology in an unfailing manner and tools developed for its evolution and versioning. The main incentive behind this work is to summarize the previous approaches in this field of research, challenges faced and to motivate this research further.
Keywords: change management, evolution, ontology, semantics, tools, versioning.
[1]. Spinellis, D. (2005). Version control systems. Software, IEEE, 22(5), 108-109. [2]. Vinoski, S. (2004). The more things change. Internet Computing, IEEE, 8(1), 87-89.
[3]. OSGi Alliance, May 6, 2010 ― Semantic Versioning – Technical whitepaper ‖ Revision 1.0,.
[4]. Stuckenholz, A. (2005). Component evolution and versioning state of the art.ACM SIGSOFT Software Engineering Notes, 30(1), 7.
[5]. Brahmia, Z., Bouaziz, R., Grandi, F., & Oliboni, B. (2011, May). Schema versioning in τxschema-based multitemporal XML repositories. In Research Challenges in Information Science (RCIS), 2011 Fifth International Conference on (pp. 1-12). IEEE.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Web Server for Remote Monitoring and Control |
Country | : | Iraq |
Authors | : | Bassam Talib Sabri |
Abstract: This paper presents an implementation of a platform independent embedded web server and its integration into a network of wireless sensor nodes. The embedded web server is designed and built as an expansion module for one of the nodes in the wireless sensor network (WSN). It allows authorized Internet users to establish two-way communication with the sensor network. The server uses limited available hardware resources to implement an interface to the WSN node and to serve dynamic HTML pages to the remote user. This allows the user to monitor the operation of the WSN remotely, to periodically download the sensed data, and to change the operation mode of the network. In addition to providing monitoring and data collection services, the embedded web server can generate email alerts about critical issues in the WSN, provide secure access to modules that change the operation of the WSN, shut down sensor nodes, and log data from the network into an on-board flash memory.
Keywords: wireless sensor networks; embedded web server; remote monitoring and control
[1]. J. Hong-Taek, C. Mi-Joung, and J. W. Hong. (2000). "An Efficient and Lightweight Embedded Web Server for Web-based Network Element Management," International Journal of Network Management. 10, pp. 261-275.
[2]. K. Tim et. all., "People, Places, Things: Web Presence for the Real World," ACM MONET (Mobile Networks & Applications Journal). 7(5), pp. 365-376.
[3]. R. Janne, M. Peri, M. J. Saaranen, R. Jussi and S. Juha-Pekka. (2001, October). "Providing Network Connectivity for Small Appliances: A Functionally Minimized Embedded Web Server," IEEE Communication Magazine.
[4]. Blunk Microsystems – TargetWeb, http://www.blunkmicro.com/web.htm, September, 2006.
[5]. Moteiv – Tmote Connect, "Tmote Connect – Data Sheet," http://www.moteiv.com/products/docs/tmote-connect-datasheet.pdf, February 2006.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Internet-Based Geographical Information Systems for the Real Estate Marketing |
Country | : | Saudi Arabia |
Authors | : | Abdelmoty M.Ahmed || Reda Hussien Abo Alez || Bijoy Babu |
Abstract: In this paper , a user-friendly Geographic Information Systems (GIS) program was developed to manipulate the property listing for sale geographically, to display the property listing in relation to other social and environmental features including topography, ways, types of unit ,ways, gardens and/or shopping centers, and to provide tools for the houses buyers to search and inspect properties and make choices without the need of getting into the houses or without their need to travel to place of houses. This study combines four luminous areas Geographic Information Systems (GIS), Electronic business System, Management Information System (MIS) and Internet and applies the combined technology in the business of real state to make system this system called (GEMI).The first section explains the methodology and prototypes development for Sherouk Beach Resort Planning and Management (SBRPM) with GIS and how the GIS software program was developed. Secondly various application scenarios were provided to test the program developed. It proves that the GIS program developed in this paper provides a good and convenient option in the search of properties based on different selection criteria as concluded in the final sections.
Keywords: Geographic Information Systems (GIS), Electronic business, MIS, Real state, GEMI, SBRPM.
[1]. Bernhardsen, T., 2002, Geographic Information Systems: An Introduction, John Wiley and Sons, Inc., p.4.
[2]. Speier, C., & Morris, M. G. (2003). The influence of query interface design on decision making performance. MIS Quarterly, 27(3), 397-423.
[3]. Carlson, E. (2000): Kohonen Maps, Real Estate Market and the Effect of Individual Components. In: H. Hyötyniemi (ed), Proceedings of the Finnish Artificial Intelligence Symposium SteP 2000, (Espoo, 28-31 August 2000). Finnish Artificial Intelligence Society, Vol. 3, pp. 227-234.
[4]. Heng Li1; C. W. Kong2 (2003) Internet-Based Geographical Information Systems System for E-Commerce Application in Construction Material Procurement, JOURNAL OF CONSTRUCTION ENGINEERING AND MANAGEMENT © ASCE
[5]. Keenan, P. B. (2003). Spatial decision support systems. In M. Mora, G. Forgionne, & J. N. D. Gupta (eds.), Decision Making Support Systems: Achievements and Challenges for the New Decade (pp. 28-39). Hershey, PA: Idea Group Publishing.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Particle Swarm Optimization based K-Prototype Clustering Algorithm |
Country | : | India |
Authors | : | K. Arun Prabha || N. Karthi Keyani Visalakshi |
Abstract: Clustering in data mining is a discovery process that groups a set of data so as to maximize the intra-cluster similarity and to minimize the inter-cluster similarity. The K-Means algorithm is best suited for clustering large numeric data sets when at possess only numeric values. The K-Modes extends to the K-Means when the domain is categorical. But in some applications, data objects are described by both numeric and categorical features. The K-Prototype algorithm is one of the most important algorithms for clustering this type of data. This algorithm produces locally optimal solution that dependent on the initial prototypes and order of object in the data. Particle Swarm Optimization is one of the simple optimization techniques, which can be effectively implemented to enhance the clustering results. But discrete or binary Particle Swarm Optimization mechanisms are useful for handle mixed data set. This leads to a better cost evaluation in the description space and subsequently enhanced processing of mixed data by the Particle Swarm Optimization. This paper proposes a new variant of binary Particle Swarm Optimization and K-Prototype algorithms to reach global optimal solution for clustering optimization problem. The proposed algorithm is implemented and evaluated on standard benchmark dataset taken from UCI machine learning repository. The comparative analysis proved that Particle Swarm based on K-Prototype algorithm provides better performance than the traditional K-modes and K-Prototype algorithms.
Keywords: Clustering, K-Means, K-Prototype Algorithm, Centroid, Particle Swarm Optimization.
[1]. Amir Ahmad and Lipika Dey, Algorithm for Fuzzy Clustering of Mixed Data with Numeric and Categorical Attributes, Proceedings of ICDCIT, 561-572 (2005)
[2]. Anil K. Jain, Data Clustering: 50 Years Beyond K-Means, Pattern Recognition Letters, (2009)
[3]. Arun Prabha K. and Karthikeyani Visalakshi N., Improved Particle Swarm Optimization based K-Means Clustering, International Conference on Intelligent Computing Applications, (2014)
[4]. Han J. and Kamber M., Data Mining: Concepts and Techniques, Morgan Kaufmann Publishers, San Francisco, (2006)
[5]. He Z., Xu X., Deng S., Scalable Algorithms for Clustering Mixed Type Attributes in Large datasets, International Journal of Intelligent Systems, 20, 1077-1089 (2005)
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Secure Data Storage in Cloud Using Encryption and Steganography |
Country | : | India |
Authors | : | Akhil S. Killawala || Kaustubh R. Kulkarni || Nishant D. Gohel |
Abstract: In this project, we focus on cloud data storage security, which has always been an important aspect of quality of service. To ensure the correctness of users' data in the cloud, we propose an effective and flexible scheme combining cryptography and steganography. Encryption module encrypts the files before they are uploaded and decryption module decrypts them when they are downloaded. The text steganography inserts a watermark within an html file to uniquely identify it's owner. The image steganography embeds the watermark within an image file.
Index Terms: Secure Storage, Cloud, Encryption, Text Steganography, Image Steganography.
[1]. Patidar Shyam,Rane Dheeraj,Jain Pritesh,A Survey Paper on Cloud Computing, Second International Conference on Advanced Computing & Communication Technologies (ACCT),7-8 Jan 2012
[2]. Wojciech Mazurczyk, Krzysztof Szczypiorski, Is Cloud Computing Steganography-proof?,Third International Conference on Multimedia Information Networking and Security,2011
[3]. Krešimir Popović, Željko Hocenski, Cloud computing security issues and challenges, MIPRO 2010, May 24-28, 2010, Opatija, Croatia
[4]. Atallah M. Al-Shatnawi,A New Method in Image Steganography with Improved Image Quality, Applied Mathematical Sciences, Vol. 6 no. 79, 3907 – 3915, 2012
[5]. Souvik Roy, P.Venkateswaran, A Text based Steganography Technique with Indian Root, International Conference on Computational Intelligence: Modeling Techniques and Applications (CIMTA) 2013.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Lossless Image Compression Using Data Folding Followed By Arithmetic Coding |
Country | : | India |
Authors | : | Richa Goyal || Sourav Garg |
Abstract: The paper presents a lossless image compression technique using the hybridization of two different entropy coding techniques. Initially data folding technique has been applied to the image. A row folding is applied on the image matrix followed by a column folding. Multiple iterations of this process is applied on the image. After completing the data folding process another entropy coding technique known as arithmetic coding has been applied to the resultant image to get better results.
Keywords: Lossless image compression, data folding, arithmetic coding, compression ratio, bits per pixel.
1]. Suresh Yerva, Smita Nair, Krishnan Kutty "Lossless Image Compression based on Data Folding" IEEE-International Conference on Recent Trends in Information Technology, ICRTIT 2011 MIT, Anna University, Chennai. June 3-5, 2011
[2]. Sonal, Dinesh Kumar Department of Computer Science & Engineering Guru Jhambheswar University of Science and Technology, Hisar "A STUDY OF VARIOUS IMAGE COMPRESSION TECHNIQUES"
[3]. V. Singh* VNR Vignana Jyothi Institute of Technology, Hyderabad, India "Recent Patents on Image Compression – A Survey"
[4]. Asadollah Shahbahrami, Ramin Bahrampour, Mobin Sabbaghi Rostami, Mostafa Ayoubi Mobarhan, Department of Computer Engineering, Faculty of Engineering, University of Guilan, Rasht, Iran " Evaluation of Huffman and Arithmetic Algorithms for Multimedia Compression Standards"
[5]. K.Uma, **P.Geetha palanisamy***P.Geetha poornachandran "Comparison of Image Compression using GA, ACO and PSO techniques" IEEE-International Conference on Recent Trends in Information Technology, ICRTIT 2011 978-1-4577-0590-8/11 ©2011 IEEE MIT, Anna University, Chennai. June 3-5, 2011