Version-2 (Nov-Dec 2016)
Ver-1 Ver-2 Ver-3 Ver-4 Ver-5 Ver-6
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Face Detection and Recognition using Viola-Jones algorithm and fusion of LDA and ANN |
Country | : | India |
Authors | : | Narayan T.Deshpande || Dr. S.Ravishankar |
Abstract: Building a computational model for recognizing a face is a complicated task as the face is a complex multidimensional visual model. The proposed paper focuses on human face recognition by calculating the features present in the image and identifying the person using these features. Face detection and identification is performed in two stages. In the first stage, presence of face in a given image is detected using Viola-Jones algorithm and in the next stage, the detected face is identified using Linear Discriminative Analysis (LDA) and Artificial Neural Network (ANN). Proposed methodology uses fusion of LDA and ANN and best identification rate is realized in comparison with the existing methods. Bio ID-Face-Database is used as the standard image database.
Keywords: Artificial Neural Network, Face recognition, Linear Discriminative Analysis, Viola-Jones algorithm.
[1]. Anil K. Jain, "Face Recognition : Some Challenges in Forensics", IEEE International Conference On Automatic Face and Gesture Recognition, pp 726-733,2011.
[2]. Suen.C.Y, Langaroudi.A.Z, Changhua Feng, Yuxing Maoand, "A Survey of techniques for face reconstruction", IEEE International Conference on Systems, Man and Cybernetics, pp 3554-3560, 2007.
[3]. Abhishek Bansal, Kapil Mehta, Sahil Arora, " Face Recognition using PCA and LDA algorithms", IEEE International Conference On Advanced Computing and Communication Technologies, 2012.
[4]. Janarthany Nagendrajah, " Recognition of Expression Variant Faces- A Principle Component Analysis Based Approach for Access Control" IEEE International Conference On Information Theory and Information Security, pp 125-129,2010.
[5]. Maria De Marsico, Michele Nappi, Daniel Riccio and Harry Wechsler, " Robust Face Recognition for Uncontrolled Pose and Illumination Changes" IEEE Transaction on Systems, Man and Cybernetics, vol.43,No.1,Jan 2013..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Green Cloud Computing: Making Cloud as Environmental Friendly |
Country | : | India |
Authors | : | Valarmathi K || Haritha Sankar S || Kayalvizhi E || Pavithra M || Gemila B |
Abstract: Cloud computingis a type of internet based computing that provides shared computer processing resources and data to computers and other devices on demand [pay per-use model] which is changing the world around us. The reason to go for cloud computing is that it gives cost effective, flexible, mobility, secure, scalable, etc. However, the growing demand of cloud infrastructure has considerably increased the energy consumption of data centers, that has become a critical issue and thereby it increased the emission of carbon dioxide (co2) which is not environmentally friendly.......
[1]. Application of Green Cloud Computing in Energy Efficiency and Environmental Sustainability by Kalange Pooja R.(Department of Information Technology, LNBCIET Satara Maharashtra.
[2]. Mell, P. and T. Grance. The NIST Definition of Cloud Computing, 2009.
[3]. International Journal of Computer Applications (0975 – 8887) Volume 115 – No. 11, April 2015 24.
[4]. http://www.koomey.com; Last accessed on Jonathan Koomey, Ph.D. Research fellow, Steyer-Taylor Center for Energy Policy and Finance, Stanford University, Presented at The Physics Of Sustainable Energy III University of California, Berkeley, March 8 2014.
[5]. Sindhu s. and s.mukherjee "efficient task scheduling algorithms for cloud computing environment" 2011. Commun.comput.inform.sci.,
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Effective Crypto Systemfor Achieving Security and Performance over Market Basket Data Analysis |
Country | : | India |
Authors | : | N.Swetha || Prof. S Ramachandram |
Abstract: Nowadays Cloud computing plays a vital role in diverseareaslike Personal Health,Social applications,enterprise,Finacial and Public domains etc.,Security is an important province in as far as cloud computing is concerned , Nevertheless one of the biggest issues is while implementing cloud remains data security i.e Leading data integrity and Privacy plays a Keyrole. In this connection,secure cryptographic algorithms could be used to ensure the data privacy such as play fair cipher.In this paper, we focus on to explore efficient cryptographic algorithm for protecting cloud data over homomorphic encryption scheme and also explore the Keymanagement and system performance for market basket analysis i.e on customer purchased product data
Keyword: Crypto System,Homomorphic Encryption, Cloud Security, market basket analysis,Porticor Homomorphic Key Management(PHKM)
[1]. Singh Narjeet, Raj Gaurav. "Security On Bccp Through Aes Encryption Technique". International Journal Of Engineering Science & Advanced Technology Volume-2, Issue-4, 813 – 819. pp. 817.
[2]. Pascal Paillier. Public-key cryptosystems based on composite degree residuosity classes. In 18th Annual Eurocrypt Conference (EUROCRYPT'99), Prague, Czech Republic , volume 1592, 1999
[3]. Julien Bringe and al. An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication, Springer-Verlag, 2007.
[4]. R. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM, 21(2) :120-126, 1978. Computer Science, pages 223-238. Springer, 1999.
[5]. Taher ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 469-472, 1985.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Mobility Management Schemes for WMNS Using Pointer Forwarding Techniques |
Country | : | India. |
Authors | : | B. Mounika || A. Harathi || S.G. Nawaz || R. Ramachandra |
Abstract: The efficient mobility management schemes based on pointer forwarding for wireless mesh networks (WMNs) with the objective to reduce the overall network traffic incurred by mobility management and packet delivery. The proposed schemes are as per-user-based, i.e., the optimal threshold of the forwarding chain length that minimizes the overall network traffic is dynamically determined for each individual mobile user, based on the user's specific mobility and service patterns. Wireless Mesh Networks (WMN's) are achieving swiftly developing focus in current years, and are commonly recognized as an advanced option for nest era wireless networks. Contrasted with regular wireless and mobile networks, eg .Wi-Fi based wireless networks and mobile IP networks, WMN's have the advantages of low price, easy implementation, self organization and self healing, and being compatible with current wired and cordless networks by the gate way/bridge circuit feature of mesh network routers..
Keyword: Mobility Management, Wireless Mesh Networks, Pointer Forwarding, Mobile Internet Protocol.
[1] I.F. Akyildiz, X. Wang, and W. Wang, "Wireless Mesh Networks: A Survey," Computer Networks, vol. 47, no. 4, pp. 445-487, Mar. 2005.
[2] A. Raniwala and T.-c. Chiueh, "Architecture and Algorithms for an ieee 802.11-Based Multi-Channel Wireless Mesh Network," Proc. IEEE INFOCOM, vol. 3, pp. 2223-2234, Mar. 2005.
[3] I. Akyildiz, J. McNair, J. Ho, H. Uzunalioglu, and W. Wang, "Mobility Management in Next-Generation Wireless Systems," Proc. IEEE, vol. 87, no. 8, pp. 1347-1384, Aug. 1999.
[4] I. Akyildiz, J. Xie, and S. Mohanty, "A Survey of Mobility Management in Next-Generation All-IP-Based Wireless Systems," IEEE Wireless Comm., vol. 11, no. 4, pp. 16-28, Aug. 2004.
[5] D. Huang, P. Lin, and C. Gan, "Design and Performance Study for a Mobility Management Mechanism (WMM) Using Location Cache for Wireless Mesh Networks," IEEE Trans. Mobile Computing, vol. 7, no. 5, pp. 546-556, May 2008.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Design Ofaccounting Information System Forzakat In Amil Zakat Institution In Lhokseumawe City |
Country | : | |
Authors | : | Edi Abral || Anwar || Syawal Harianto |
Abstract: Factor that affects optimizing of zakat funds collection in Indonesia is the level of muzakki confidence tozakat management institution, not least in Acehprovince. Many amil zakat institutions that havenot publishedyet the report of zakat funds to the public. Management of zakat from the collection, distribution, and utilization of Zakat funds should be published regularly to the public. If the zakat fund management is done professionally expected can raise awareness of muzakki in carrying out zakat. The research was carried out in several stages, namely a literature review, analysis of weaknesses, needs and feasibility of system, system design, making of prototype application, prototype testing application. At this stage, researcher will design some things based on a need analysis of SIA Zakat........
Keyword: Zakat, Accounting Information System, Waterfall Model, data flow diagram, entity relationship diagram, codeigniter, Accountability, Transparency
[1]. Abdul Rahman, A.R. (2002), "Zakat accounting, creating business wealth", Akauntan Nasional, August, pp. 11-16.
[2]. Abdul Rahman, A.R. (2007), "Pre-requisites for effective integration of zakah into mainstream Islamic financial system in Malaysia", Islamic Economic Studies, Vol. 4 No. 2, pp. 91-107.
[3]. Abu Bakar, N.B. (2007), "A zakat accounting standard (ZAS) for Malaysian companies",American Journal of Islamic Social Sciences, Vol. 24 No. 4, pp. 74-92.
[4]. Al-Habshi, S.M. (2005), "Zakat recognition and measurement of business wealth: an analysis of the growth condition", in Shanmugam, B. et al. (Eds), Issues in Islamic Accounting, University Putra Malaysia Press, Serdang
[5]. Al-Moghaiwli, M.H. (2001), "Accounting for zakat and earnings management in Saudi Arabia",
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Survey of Clustering Scheme for Manets |
Country | : | India |
Authors | : | Sanehi Sirohi || Manoj Yadav |
Abstract: Mobile adhoc network is a network in which nodes are dynamic in nature and has limited bandwidth and battery power. They are used in different situations such as military services, medical or embedded applications. For providing the scalable routing the nodes are divided into clusters, in clusters there should be a cluster head which contains all the information of nodes of its cluster, as in the flat routing every node perform the same role therefore network lifetime is less.........
Keyword: Algorithms, Cluster head, Mobile Ad hocNETworks
[1]. A. K. Gupta, H. Sadawarti, and A. K. Verma "Review of Various Routing Protocols for MANETs" in International Journal of Information and Electronics Engineering, Vol. 1, No. 3, November 2011.
[2]. Mobile ad-hoc network [online]. Available: https://www.techopedia.com/definition/5532/mobile-ad-hoc-network-manet
[3]. A. Bentaleb, A. Boubetra, and S. Harous, "Survey of Clustering Schemes in Mobile Ad hoc Networks," Commun.Netw., vol. 05, no. 02, pp 8-14, May 2013.
[4]. R. Agarwal and Dr. M. Motwani " survey of clustering algorithms for manets" in International Journal on Computer Science and Engineering, vol. 2, pp 98-104, 2009.
[5]. M. Alinci, E. Spaho, A. Lala and V. Kolinci "clustering algorithms in MANETs:A review" in International Conference on Complex, Intelligent and Software Intensive Systems,pp 330-335,2015.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Evaluation of Convertibility Issues Between IFPUG and Cosmic Function Points |
Country | : | SPAIN |
Authors | : | Md. Forhad Rabbi || Shailendra Natraj || Olorisade Babatunde Kazeem |
Abstract: Software industry has matured with time, from small application of few lines of codes to software application of millions of lines of code. In the past few years, the concern of the industry regarding software size estimation has been the convertibility issue between the International Function Point User Group (IFPUG) and the COmmon Software Measurement International Consortium (COSMIC) in order to leverage their huge investment on the IFPUG. Since there is still no cost and effort estimation tool for COSMIC function points. IFPUG is one of the early estimation methods, however, with the introduction of a more scientific method like COSMIC which has a wider applicability than the IFPUG and both method using the same measuring unit and principle, the continued relevancy of the IFPUG is called to question.......
Keyword: IFPUG, COSMIC, Project Estimation.
[1] Everald E. M., Software Metrics: SEI Curriculum Module SEI-CM-12-1.1, Software Engineering Institute, Carnegie Mellon University. December 1988.
[2] The COSMIC Functional Size Measurement Method Version 3.0, Measurement Manual, Common Software Measurement International Consortium, September 2007.
[3] Vogelezang F. W., COSMIC Full Function Points The next generation of functional sizing Software, Measurement European Forum SMEF 2005, January 28-30, Rome (Italy), 2005.
[4] Abran, A., Symons, C., Oligny, S., An Overview of COSMIC-FFP Field Trial Results, 12th European Software Control and Metrics Conference ESCOM 2001, April 2-4, London (England), 2001.
[5] Vogelezang F. W., Implementing COSMIC-FFP as a replace-ment for FPA, International workshop on software measurement, IWSM/MetriKon 2004..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | SMS EncryptionUsing One-Time Pad Cipher |
Country | : | Malaysia |
Authors | : | Muhammad Iqbal || Muhammad Akbar Syahbana Pane || Andysah Putera Utama Siahaan |
Abstract: The content of the SMS is very crucial. It consists of an imperative information. Unknown participants can not retrieve it. To protect the SMS content, the sender must provide the unique character before it is completely sent. The cryptography technique is needed. The plaintext has to be encrypted before transmitted. The one-time pad method can be applied to the plaintext. The one-time pad is one of the easiest cryptography methods. It turns the plaintext into the ciphertext by doing XOR operation to every character. It generates the new ASCII as the cipher character.
Keyword: One-Time Pad, Cryptography, Security
[1]. Forouzan, Cryptography and Network Security, McGraw-Hill, 2006.
[2]. Z. Ghadialy, "The SS7 Flaws that Allows Hackers to Snoop on Your Calls and SMS," The 3G4G Blog, 29 12 2014. [Online]. Available: http://blog.3g4g.co.uk/2014/12/the-ss7-flaws-that-allows-hackers-to.html. [Diakses 15 7 2016].
[3]. H. M. E. Bakry, A. E. T. E. Deen dan A. H. E. Tengy, "Implementation of a Hybrid Encryption Scheme for SMS / Multimedia Messages on AndroidI," International Journal of Computer Applications, vol. 85, no. 2, pp. 1-5, 2014.
[4]. S. Jha dan U. Dutta, "Review on SMS Encryption using MNTRU Algorithms on Android," International Journal of Computer Science and Information Technologies, vol. 6, no. 4, pp. 3855-3858, 2015.
[5]. A. P. U. Siahaan, "RC4 Technique in Visual Cryptography RGB Image Encryption," International Journal of Computer Science and Engineering, vol. 3, no. 7, pp. 1-6, 2016..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Primal-Dual Asynchronous Particle Swarm Optimization (pdAPSO) Algorithm For Self-Organized Flocking of Swarm Robots |
Country | : | Nigeria. |
Authors | : | Emmanuel Gbenga Dada |
Abstract: This paper proposed a hybrid PSO algorithm that combines the Primal-Dual method with APSO algorithm to address the problem of swarm robotics flocking motion. This algorithm combines the explorative ability of APSO with the exploitative capacity of the Primal Dual Interior Point Method. We hypothesize that the fusion of the two algorithms (APSO and Primal Dual) offers a robust prospect of preventing premature convergence of robots, and also make sure that the robots are not stuck in their local minimal. We did a comparison of the performances of the total iteration for pdAPSO, PSO, APSO and Primal Dual algorithms as the robots flock from the centre of the search space to the various zones (z1, z2, z3, and z4). In three (3) out of the four (4) cases, the pdAPSO proves to be more effective for the flocking of the robots than the PSO, APSO and Primal Dual algorithms for the fifty (50) simulations that was done.........
Keyword: Flocking, Asynchronous Particle Swarm Optimization (A-PSO), Swarm Robots, Interior Point Method, Primal-Dual, gbest, and lbest.
[1]. L. Bayindir, E. Şahin, A Review of Studies in Swarm Robotics, Turk. J. Elec. Engin. 15(2), 2007, 115–147.
[2]. Şahin E. Swarm Robotics. From Sources of Inspiration to Domains of Application. In: Şahin, E., Spears, W. M. (eds.) Swarm Robotics (2004) Springer, Heidelberg, LNCS, 3342, 2005,10–20.
[3]. C.W. Reynolds, Flocks, Herds, and Schools: A Distributed Behavioural Model, Computer Graphics, 21(4), 1987, 25–34.
[4]. T. Vicsek, A. Czirok, E. B. Jacob, I. Cohen, O. Schochet, Novel Type of Phase Transitions in a System of Self-Driven Particles, Physical Review Letters, 75, 1995, 1226–1229.
[5]. A. Jadbadaie, J. Lin, A. S. Morse, Coordination of Groups of Mobile Autonomous Agents Using Nearest Neighbor Rules, IEEE Transactions on Automatic Control, 48(6), 2003, 988–1001.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Dynamic Weighted Query Process in Personalized Privacy Protection in Data Retrieval |
Country | : | India |
Authors | : | B.Bhanupratap Reddy |
Abstract: Customized web look for (PWS) has demonstrated its efficiency in improving the quality of various look for services on the Internet. However, facts show that users' desire not to reveal their personal details during look for has become a major hurdle for the wide growth of PWS. We research privacy protection in PWS programs that model customer choices as ordered customer information. Customers are increasingly seeking complex task-oriented goals on the Web, such as making routes, managing financial situation or planning buys. To better support users in their long-term details missions on the Web, Google keep track of their concerns and mouse clicks while searching on the internet.........
Keyword: Privacy Protection, Web search, Greedy DP and Greedy IL, User Profile construction
[1]. ―Supporting Privacy Protection in Personalized Web Search‖, by Lidan Shou, He Bai, Ke Chen, and Gang Chen, in IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING VOL:26 NO:2 YEAR 2014.
[2]. J. Teevan, S.T. Dumais, and E. Horvitz, ―Personalizing Search via Automated Analysis of Interests and Activities,‖ Proc. 28th Ann. Int'l ACM SIGIR Conf. Research and Development in Information Retrieval (SIGIR), pp. 449-456, 2005.
[3]. M. Spertta and S. Gach, ―Personalizing Search Based on User Search Histories,‖ Proc. IEEE/WIC/ACM Int'l Conf. Web Intelligence (WI), 2005.
[4]. B. Tan, X. Shen, and C. Zhai, ―Mining Long-Term Search History to Improve Search Accuracy,‖ Proc. ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining (KDD), 2006.
[5]. K. Sugiyama, K. Hatano, and M. Yoshikawa, ―Adaptive Web Search Based on User Profile Constructed without any Effort from Users,‖ Proc. 13th Int'l Conf. World Wide Web (WWW), 2004.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Web Usability Recommendation Model: An Approach to Enhance Web Usability |
Country | : | India |
Authors | : | Ketan D. Patel || Ketan J. Patel || Dr. Satyen M. Parikh |
Abstract: The success of any business mainly e-business is mostly depends on its website. To attract and sustain web users is one of the biggest challenges for any e-business. Web Usability plays key role to retain web user. Amongst all parameters Web site Navigation is one of the crucial parameter of web usability which needs to be improved for better web usability. Unstructured navigation path increase navigation burden on the users and leads them to leave the site without finishing their intended purpose to visit the web site. In this paper we proposed a recommendation model to overcome the issues of web site navigation. Web mining techniques like pattern discovery and pattern analysis are used to provide useful recommendations to web admin. The model collects row usage data from server log files and user actions data by performing cognitive walkthrough then analyze data and offer web usability recommendations which will supportive to improve overall web usability.
Keyword: Web Usability, Pattern Analysis, Pattern Discovery, Cognitive Walk Through
[1] Charles E. Downing and Chang Liu, Assessing Web Site Usability in Retail Electronic Commerce, 35th IEEE Annual Computer Software and Applications Conference, 2011.
[2] Rashid Ahmad, Zhang Li and Farooque Azam, Measuring 'Navigational Burden' Proceedings of the Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06), 2006 IEEE.
[3] Jian-Li Duan and Shu-Xia Liu, Application On Web Mining For Web Usability Analysis, Proceedings of the 2012 International Conference on Machine Learning and Cybernetics, Xian, 15-17 July, 2012 IEEE.
[4] Rajni Pamnani, Pramila Chawan, Web Usage Mining: A Research Area in Web Mining, in International Conference on Recent Trends in Computer Engineering, ISCET 2010, RIMT, Punjab, ISBN 978-81- 910304-0-2.
[5] Babak Abedin, and Babak Sohrabi, A Web Designer Agent, Based on Usage Mining Online Behavior of Visitors, World Academy of Science, Engineering and Technology 6 2005..