IJCST Logo

 

INTERNATIONAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY (IJCST)-VOL IV ISSUE I, VER. 1, JAN. TO MARCH, 2013


International Journal of Computer Science and Technology Vol. 4 Issue 1, Ver. 1
S.No. Research Topic Paper ID
   1 Exploratory Failure Analysis of Apache Web Server

Dr. Sanjeev Jha, Dr. A K D Dwivedi

Abstract

Reliability growth modeling plays an important role in measuring and controlling software quality. One main approach to reliability growth modeling is based on the statistical correlation of observed failure intensities versus estimated ones by the use of statistical models. This research concentrates on identifying the best distribution from list of important life data distributions. The failure data collected are from apache web server which is important and popular Open Source Software (OSS) product. The objective of the research is to determine which of the available models best fits the failure data of the selected OSS products as well as analyzing the reliability analysis pattern based on available failure history. The outcome reveals that overall reliability on the basis of available failure data of Apache2 is very good and this can be one of the reasons of popularity of this version of Apache Web Server.
Full Paper

IJCST/41/1/A-1279
   2 Performance Evaluation of DVMRP, ODMRP & PIM-DM Routing Protocol on the Basis of Quality of Service

Garima Sharma, Dinesh Arora, Nagendra Sah

IJCST/41/1/A-1280
   3 Analysis & Simulated Designe of Number Plate Detection

Dr. Amit Verma, Ravi Kant, Parminder Kaur, Surinder Kaur, Iqbaldeep Kaur

Abstract

In real time number plate detection , some vehicle number plates can not be recognized due to very poor illumination, motion blurred effect, fade characters and so on. The key problem is that number plate can not be segmented accurately and correctly. Many techniques have been proposed. In this paper, we present a edge detection method based on neural network. In Neural network systems, each character is introduced as an input data to the system. The system learns these characters. After that, it compares the input data characters to the existing characters. As a result, the character which has very similar rate is activated. Neural Network. classifier is used to recognize the characters.in which adaboost and template matching techniques are also used for more accuracy and to extract the plate accurately [1]. This new approach provides a good direction for number plate detection.
Full Paper

IJCST/41/1/A-1281
   4 A Survey: Routing Protocols in MANET

Dr. Rupak Sharma, Rajeev Kr. Sharma, Manoj Kumar

Abstract

Mobile Ad-Hoc Network (MANET) is a collection of multi-hop wireless mobile nodes that communicate with each other without centralized control or established infrastructure. The wireless links in this network are highly error prone and can go down frequently due to mobility of nodes, interference and less infrastructure. Therefore, routing in MANET is a critical task due to highly dynamic environment. In recent years, several routing protocols have been proposed for mobile ad hoc networks and prominent among them are DSR, AODV and TORA, FSR, ZPR, WRP.
Full Paper

IJCST/41/1/A-1282
   5 A Survey of System on Chip and Network on Chip Architectures

Chandra Shekhar, Dr. Mohammad Hussain

Abstract

A recent trend in high performance computing has been towards the use of parallel processing to solve computationallyintensive problems. Several parallel architectures, which offer corresponding increases in performance as the number of processors is increased, have been designed in the last few years. As the number of components on a given chip increase in this billion transistor era, System on Chip (SoC) architectures become ever more powerful. Key to this architecture is the ability to integrate multiple heterogeneous components into a single architecture, which requires modularity and abstraction. An integral part of this architectural design is the methods by which the various components communicate with one another. Network on Chip (NoC) architectures attempt to address these concerns by providing various component level architectures with specific interconnection network topologies and routing techniques. The choice of architecture, design, and routing strategy can have a large impact on performance, power dissipation, and efficient usage of area on the silicon chip. Discussed will be the affects of topological, architectural and routing design choices on overall efficiency and performance.
Full Paper

IJCST/41/1/A-1283
   6 An Effort to Analyzing Data Mining Techniques for Better Customer Relationship Management

Manu Chopra, Dr. Prashant Kumar Pandey

Abstract

The main goal of CRM is the capability to handle customer interaction across different channels and functions, for building loyal and profitable customer relationships. Although cost cutting and competitive pricing strategies may attract customers from competitors, in many services industries price advantages are not a sufficient reason for customers moving between suppliers. In these situations successful competitive strategies include developing strong relationships with customers and cross-selling them other services. Data mining technologies and techniques for recognizing and tracking pattern with in data helps business sift through layers of seemingly unrelated data for meaningful relationship, where they can anticipate rather than simply read to Customer needs In this paper we discuss a business and technological overview of data mining and outline how can we optimize Customer profitability through data mining application, along with sound business processes and complement technologies, data mining can reinforce and redefine Customer relationship. The aim of this research paper to find out the role of data mining in Customer focus business strategy because -With rapid globalization of business and product differentiation becoming less relevant and competitive, Customer relationship has become a factor of competitive advantage.
Full Paper

IJCST/41/1/A-1284
   7 Overview of Differential Cryptanalysis of Hash Functions Using SMART Copyback for Data

Rajashekarappa, Dr. K M Sunjiv Soyjaudah

Abstract

In this paper describes the principles of differential cryptanalysis of hash functions. First start with a description of the general idea of a characteristic which is a statistical tool that analyzes differences. In this paper, characteristics extend traditional characteristics and introduce the analysis of values and relations between pairs of values using only a single message of the pair. For the construction and representation of our characteristic, we introduce two new notions, duo bit and duo number that enable a consolidate description of values and differences of the data of two runs. It shows how these properties are used in the construction of high probability characteristics of these hash functions. Second explaining the application of hash functions. Finally the Cryptanalysis data could be store for long time with help of Self Monitoring Analysis and Reporting Technology (SMART) Copyback technique.
Full Paper

IJCST/41/1/A-1285
   8 Comparative Analysis of Facial and Fingerprint Biometric Identification Systems through Soft Computing Techniques

Jyoti Rajharia, P. C. Gupta

Abstract

Biometric identification refers to the automatic recognition of individuals based on their physiological and behavioral characteristics. A biometric system is essentially a pattern recognition system which has been used to identify a person. Fingerprint and face recognition are two different approaches through which a person can be recognized. This paper mainly aims how these approaches can be used and what are the limitations of each.
Full Paper

IJCST/41/1/A-1286
   9 FPGA Based HDLC Controllers: Comparative Review

S. D. Samudra

Abstract

For communication of data over a network a protocol is required. The layer 2 of OSI model defines such protocols. HDLC is one of these protocols. This protocol is commonly used in networking. Many chips have been designed for HDLC controllers. Not all the features of these controllers are always needed. With the increasing popularity of FPGA, controller chips are being designed according to the needs of the communication system. This paper discusses the design and implementation of some such HDLC controllers.
Full Paper

IJCST/41/1/A-1287
   10 Component Reusability for Component Based Software Engineering

Neeraj Mohan, Iqbaldeep Kaur, Mandeep Kaur, Dr. Amit Verma

Abstract

Purpose of Component-based software development (CBSD) focuses on building large software systems by integrating previouslyexisting software components and with help of enhancing the flexibility and maintainability of systems, this technique can potentially be referred to reduce software development costs, assemble systems rapidly, and reduce the spiraling maintenance burden associated with the support and upgrade of large systems. The main advantages of CBS are reduced development time, cost and efforts along with several others. CBSE approach is actually based on the principle of ‘Select and Use’ rather than ‘Design and Test’ as in traditional software development methods.
Full Paper

IJCST/41/1/A-1288
   11 An Efficient Sorting Algorithm for Positive Values

D Ravi Babu, R Shiva Shankar, V Priyadarshini, P Neelima

Abstract

In this paper we present a sorting algorithm for positive values, which uses the methodology of indexing of the array and insert that number into proper index of the array without performing any element comparisons and swapping. This algorithm efficiently to give a much better performance than the existing sorting algorithms of the O(n2 ) class, for large array size with same length of digits of input data for positive values.
Full Paper

IJCST/41/1/A-1289
   12 Cloud Security Risk Assessment using FAIR

Ishan Rastogi, Adesh Chandra, Anurag Singh

Abstract

Cloud computing is a very powerful concept but with it comes various security scares which are enough to keep most of the perspective users at bay.This paper tries to calculate the additional risk which an organization might have to face when shifting to cloud computing, by performing cloud security risk assessment using the FAIR model.
Full Paper

IJCST/41/1/A-1290
   13 Transient Analysis of a Communication Network with Dynamic Bandwidth Allocation Having Bulk Arrivals Using Zero Truncated Binomial Distribution

N.Thirupathi Rao, Kuda Nageswara Rao, P. Srinivasa Rao

Abstract

Analysis of any communication system with respect to time is highly significant and closer to the realistic situations. The data switching nodes plays a vital role in forwarding the data from the sender to the receiver located at different places. In this paper we developed and analyzed a two node communication network. Considering two communication nodes in series makes the model applicable to any of the modern communication networks. We assume that the input data arrival is in batch and the batch size distribution is zero truncated binomial distribution. The performance measures of the communication network like the joint probability generating function of the buffer size distribution, the average content of the buffers, the mean delays in transmission, the throughput of the nodes and utilization are derived explicitly under transient conditions. This network is much useful in satellite communications and Internet service providing, etc.
Full Paper

IJCST/41/1/A-1291
   14 Mass Detection of Breast Cancer Using Memography

Gurjinder Singh, Saurabh, Parminder Singh

Abstract

Cancer is a general term that refers to cells that grow and multiply out of control and possibly spread to other parts of the body. Breast cancer continues to be a significant public health problem in the world. Breast cancer is a malignant cell growth in the breast and if left untreated the cancer spreads to other areas of the body. The incidence of breast cancer rises after age forty. The highest incidence approximately 80% of invasive cases occurs in women over age fifty. According to a survey, the life time probability of developing breast cancer is 1 in 8 and the probability of death due to breast cancer is 1 in 26. Segmentation of a mass is an essential preliminary step for automated detection. Mass segmentation remains a difficult task due to both variability of the shape and variation in the image quality. The mass detection is an essential step in breast cancer detection which is used mostly to assist the radiologist for second opinion. Because their judgment depends on training, experience and subjective criteria. Approximately 1/3rd of mammography image has dark background which does not provide any information about diagnosis. Inspite of the most complex algorithm developed mass segmentation continues being too dependent on application. In the recent years there has been fair amount of research has been done on breast cancer detection but the mass detection continues to be a hot area of research due to varying shape, sizes and margins of masses. Several breast segmentation techniques has been developed but the researches for better segmentation of masses and its feature extraction has shown that it suffers from then limitation of finding the pixels with highest intensity. The mass segmentation using the present techniques give better result in terms of visual quality, in general the more accurate the segmentation better the chances to retrieve the area showing the signs of malignancy.
Full Paper

IJCST/41/1/A-1292
   15 Early Brain Cancer Detection In MRI

Parminder Singh, Gurjinder Singh, Kumar Saurabh

Abstract

This project work presents an extension in computer-aided diagnosis for early prediction of cancer cells in brain using Texture features and neuro classification logic. The project extracts the texture from the given brain MRI sample using discrete wavelet transform and morphological operation followed by neuro classification for prediction of Cancer for a given sample. The task works on the extraction of five distinct features with calculation of minimum distance for the prediction of brain cancer.This project work is to be implemented on matlab environment with biological toolbox support for the implementation and verification of proposed system. This project work is to be implemented on matlab environment with biological toolbox support for the implementation and verification of proposed system.
Full Paper

IJCST/41/1/A-1293
16 Extraction of Features (Pattern Recognition) From Web Data Using Neural Expert System (NES)

Manoj Kumar Sharma, Vishal Shrivastav

IJCST/41/1/A-1294
   17 Soft Computing: Constituent and Applications of Soft Computing

Yashpal Singh Rathore, Nikhil Ranjan, Indresh Singh Rawat

Abstract

Soft computing differs from conventional (hard) computing in that, unlike hard computing, it is tolerant of imprecision, uncertainty and partial truth. In effect, the role model for soft computing is the human mind. The guiding principle of soft computing is: Exploit the tolerance for imprecision, uncertainty and partial truth to achieve tractability, robustness and low solution cost.
Full Paper

IJCST/41/1/A-1295
   18 Analysis of FIR Filter Design Techniques

Kanu Priya, Lajwanti Singh

Abstract

This paper deals with some of the techniques that are used to design FIR filters. In the paper the windowing method, the frequency sampling methods and optimal filter design methods are discussed in detail with their merits and demerits. Each method has its own
advantages and disadvantages.
Full Paper

IJCST/41/1/A-1296
   19 Comparative Analysis of Threshold Based, K-means and Level Set Segmentation Algorithms

Rajeshwar Dass, Vikash

Abstract

Image segmentation algorithms provide a mean to segment the images of different formats. The beauty of an algorithm lies within the quality of segmentation it performs. The large number of segmentation algorithms are available, analysis of algorithms is emerging as an interesting field. A number of algorithms are available for segmenting an image but there is not a single algorithm which performs better for all applications. In this paper, the comparative analysis of level set, K-means and Thresholding based algorithms has been presented for standard Lena and Cameraman image. The performance of the algorithms measured in form of white pixel ratio and processing time.
Full Paper

IJCST/41/1/A-1297
   20 Evaluation of Changes on Annual Change Traffic in Calculating Maintenance Cost in Man-Months Based on Constructive Cost Model

C. V. S. R Syavasya

Abstract

Software maintenance is becoming crucial factor in software industry. Many companies came to know the importance of software maintenance. Software maintenance is the process of modifying, for update or repair, existing operational software, but leaving its primary functions intact. The fraction of a software product’s source instructions which undergo change during a year either through addition, deletion or modification is the Annual Change Traffic. The main aim of finding annual change traffic by varying parameters is to estimate maintenance cost in manmonths. Here we vary the parameters of Annual Change Traffic by taking random range of values. We calculate development costs in man-months in three modes: organic, semidetached and embedded and compare the results obtained in each mode. Finally maintenance cost is obtained by the product of annual change traffic and development cost.
Full Paper

IJCST/41/1/A-1298
   21 Recognizing Decisive Challenges for Software Engineering of Self-Adaptive Systems

Akhilesh

Abstract

Software’s ability to adapt at run-time to changing user needs, system intrusions or faults, changing operational environment, and resource variability has been proposed as a means to cope with the complexity of today’s software- intensive systems. Such self-adaptive systems can configure and reconfigure themselves, augment their functionality, continually optimize themselves, protect themselves, and recover themselves, while keeping most of their complexity hidden from the user and administrator The goal of this paper is to summarize and point out the current stateof- the-art, its limitations, and identify critical challenges for the software engineering of self-adaptive systems. Specifically, we intend to focus on development methods, techniques, and tools that seem to be required to support the systematic development of complex software systems with dynamic self-adaptive behaviour. In contrast to merely speculative and conjectural visions and ad hoc approaches for systems supporting self-adaptability, the objective of this paper is to establish a road map for research and identify the main research challenges for the systematic software engineering of self-adaptive systems.
Full Paper

IJCST/41/1/A-1299
   22 FIR Filter Design and IIR Filter Design

Lajwanti Singh, Kanu Priya

Abstract

In this paper, explanation and comparison of IIR Filter and FIR Filter has been done. Steps to design a filter has been given. Characteristics comparison of filters have been done and advantages of both the filters are explained. Both filters are important but use of the filter depends upon the circumstances. Where the system response is infinite, IIR Filters is used and where the system response is zero FIR Filter is used.
Full Paper

IJCST/41/1/A-1300
   23 Energy Efficient Faulttolerance Techniques in Wireless Sensor Networks and its Issues

Kandarpa Gowri Rama Lakshmi, V.V Syam

Abstract

In this paper, we give a survey on various fault tolerance techniques and related issues in distributed systems and WSNs. More specially speaking, we describe multiple fault handling capability and performance which are two major issues. This survey provides the related research results and also explored the future directions about fault tolerance techniques, and it is a good reference for researcher.
Full Paper

IJCST/41/1/A-1301
   24 Query Optimization in Cloud Computing Using Pareto Function

Navneet Mehta, Kewal Krishan

Abstract

As the data grow day by day in database, it becomes difficult to handle it. One solution is to use cloud computing. The data are stored in different storage space on the servers. In this paper, the graphs are created by using two methods. One method is statistical information and second method is Pareto function. When the user enters the query in its own virtual machine, the result is found using statistical size estimation formulae used for simple query and complex query such as conjunction, disjunction and negation. After finding the values, then a graph is created for relate the size with money using histogram.
Full Paper

IJCST/41/1/A-1302
   25 IDS using Hybrid Ant Colony-Genetic Algorithm (GAAPI) for Attack Classification and Detection

M. S. Kale, Dr. P. K Deshmukh, S. B. Javheri

Abstract

In recent fast growing internet world network security is become an essential need. Latterly one of the most popular research topics in network security is Intrusion Detection Systems (IDSs) which try to keep safe our network from intruders. This paper describes an IDS using Hybrid Ant Colony Genetic algorithm (GAAPI). It is hybridization of a special class of ACO called API and a Real- Coded Genetic Algorithm (RCGA). To use characteristics of both algorithms to solve unconstrained problems. The proposed system is evaluated by KDD cup dataset. It is therefore the goal of this paper to provide a comprehensive overview of the application of GAAPI to solve complex global continuous problems. Proposed GAAPI is to detect and classify attacks of KDD dataset. Aim is to minimize the time and classify attacks with global optimal solution.
Full Paper

IJCST/41/1/A-1303
   26 An analysis of 3D Symbolic Representation of Geographical Information and Visualizing 3D Building Models with CityGML

Saumya Pareek, Priyanka Mehta

Abstract

In 3D GIS, all geographic phenomena and spatial entities need to be represented by the corresponding 3D symbol models. So establishing a complete set of 3D map symbolic database with expression becomes critical in technology development of 3D map visualization. Based on the theory of map information transmission, an analysis of 3D symbol is presented in this paper. Scientists and engineers have discovered the value of the Google Earth application and Keyhole Markup Language as a medium for research and teaching in earth science, life science, and environmental science. Google SketchUp, on the other hand, has been used for 3D modelling. This paper deals with the development of 3D model of a building. This work was done to experiment the use of Google Earth by developing 3D model of BISAG building and mashing it up with Google Earth using Google SketchUp, KML and Google Earth API.
Full Paper

IJCST/41/1/A-1304
   27 Survey of Routing Protocol in Vehicular Ad-Hoc Networks

Meenakshi Pareek

Abstract

Vehicular ad hoc network is one of the most promising application of MANET that an inter communication system. In VANET nodes which are Vehicles can move safety with high speed and generally must communicate quickly reliably. VANET is a sub class of Mobile Ad hoc Network which provides a distinguished approach for a Intelligent Transportation System(ITS). The survey of routing protocol in VANET is important and necessary for smart ITS. This technology will be useful for Police and fire vehicles to communicate with each other for safety purpose. Vehicular Ad hoc Network architecture and cellular technology to achieve intelligent communication and improve road traffic safety and efficiency. To organize their in vehicular computing system, vehicle to vehicle ad hoc networks, hybrid architecture with special properties such as high mobility network portioning and constrained topology. Vanet can perform effective communication by utilizing routing information. This paper discusses the advantages/disadvantages and the application of various routing protocols for VANET. This paper explore on focusing on significant features, performance improvement in comparisons of routing protocol for vehicular ad hoc network(VANET).
Full Paper

IJCST/41/1/A-1305
   28 An Improved Method of Pre-Filter Based Image Watermarking in DWT Domain

Somnath Maiti, Arindam Bose, Chirag Agarwal, Subir Kumar Sarkar, Nurul Islam

Abstract

In recent years the study of watermarking using CDMA technique in transform domain is a widely popular method. We incorporated modification in existing algorithm with improved imperceptibility of embedded image while making it capable to extract the hidden image by using correlation technique. The original cover image is decomposed in two stages, firstly into appropriate mid-frequency sub-band and secondly into three hierarchical levels of DWT. The logo image is scrambled by PN sequence and then it is embedded in the decomposed cover image. The wavelet coefficients are chosen experimentally for better imperceptibility and robustness against intentional attacks. The result shows a remarkable improvement over the existing methods using similar technique.
Full Paper

IJCST/41/1/A-1306
   29 Understanding KANBAN in Industries

Ajinkya Edlabadkar, Ku. Sneha Wankhede

Abstract

KANBAN (kahn-bahn) is a Japanese word. KAN means “card” & BAN means “signal”. So it stands for “card signaling” or “visual record”. It is used in manufacturing to mean a visual signal that tells when it is time to get or make more of something. Kanban is a signaling system used in manufacturing environments to regulate production and movement of items in a pull system. As an information-relay device and an inventory-control mechanism, the kanban system works on the principle that each process in the
production line pulls just the number and type of components the production process requires in just the right time. As a lean tool
to improve the manufacturing process, the kanban system has its problems.
Full Paper

IJCST/41/1/A-1307
   30 An Approach to Implement Photo Voltaic System using Arduino

Neeraj Vijay Kale, Prashant Shivasharan Malge

Abstract

Today, people are more concerned about fossil fuel exhaustion and environmental problems caused by conventional power generation and renewable energy sources than ever before. Among the renewable resources, photovoltaic panels are primary contenders. They have the advantage of being maintenance and pollutionfree, but their installation cost is high and, in most applications, they require a power conditioner (dc/dc or dc/ac converter) for load interface. Photovoltaic modules (PV Modules) also have relatively low conversion efficiency. Overall system cost can be reduced using high efficiency power conditioners which are designed to extract the maximum possible power from the PV module using maximum power point tracking (MPPT) techniques. To maximize power output from the solar panels, one needs to keep the panels aligned with the sun. This paper will describe the Design and Implementation of PV system using Maximum Power Point Tracking and Sun Tracking technique for maximum power output with Power Monitoring using Arduino.
Full Paper

IJCST/41/1/A-1308
   31 Cost Metrics Related to Software Project

Jyoti, Navneet Mehta, Rupinder Kaur

Abstract

Information management systems should be reconfigured rapidly to respond to changes of requirements in business process reengineering domain. A number of metrics are used by differently activity issues and phases preliminary project stage to final implementation activity. In software industry, the effective tools and techniques are need according to mature sate of software and advanced stage. Different types of metrics validate that different requirements are recommended to be access the software in reliable manner. Reengineering related to existing system that approaches to developed the new techniques with an integrated to legacy system. The metrics of cost and quality measure the correlation between specification and final product. In this paper, we explore how different metrics especially cost and quality related to different areas and how effect of these metrics implemented an existing system or to developed a new software system. We have to evaluate different tools that correlate within an existing system and understand the improved functionality, performance and implementation of software project. Different factors such as internal, external productivity, functionality related metrics and developing effort metrics and predicting metrics have greater impact on the overall cost and quality of software project according to time.
Full Paper

IJCST/41/1/A-1309
   32 Software Re-Engineering Metrics

Jyoti, Rupinder Kaur

Abstract

Software Reengineering is a term which is used to analysis of legacy system or an existing software. The Reengineering encompasses of other processes such as Forward and Reverse Engineering. This approach to understand the existing overall structure and then we have to compute the optimal metrics of cost and quality to related software system .Reverse engineering is an efficient technique to find the best documentation approach of any software. In this paper, we explore how different metrics related to different area of software project ,can be useful to manage the software within our requirement. The focus of our requirement is ability to meet the target value which is our propose to cost of project
Full Paper

IJCST/41/1/A-1310
   33 Mobile Ad-Hoc Networks: A Survey

Dinesh, Ajay Kumar, Jatinder Singh

Abstract

One of most exciting and active new field of research is that of ad hoc networks. Within few years this field has seen a fast expansion in the field of mobile computing due to fast growth of inexpensive, easily available devices. An Ad-Hoc network is collection of mobile nodes(laptops, smart phones etc.) without the existing infrastructure. This type of network with multiple points of attachment to cellular networks or the Internet. This makes the way for large new applications. Applications include emergency and rescue operations, an infrastructure less network of notebook computers in a conference, military soldiers in the field. This paper provides insight into applications of ad hoc networks and discusses technological challenges that network developers are faced with. These challenges include routing, quality of service, scalability, service and route discovery, security.
Full Paper

IJCST/41/1/A-1311
   34 Implementation of Image Compression Using Haar and Daubechies Wavelets and Comparitive Study

Ramaninder Singh Gill, Navneet Singh Randhawa, Manish Mittal, Manvir Singh Punia

Abstract

Design of image compression using discrete wavelet transform have been presented in this paper and Lifting schema of DWT has been recognized as a faster approach is used to perform the DWT to factorize the polyphase matrix of a wavelet filter into a sequence of alternating upper and lower triangular matrices and a diagonal matrix to achieve efficient compression. This leads to the wavelet implementation by means of banded-matrix multiplications. Algorithm follows a quantization approach that divides the input image in 4 filter coefficients and then performs further quantization on the lower order filter or window of the previous step. MATLAB software has been used to compress the input image. Qualitative analyses have been performed by obtaining the compressed version of the input image by DWT Technique and comparing it with the input image used. The compressed image has been reconstructed into an image similar to the original image by employing wavelet reconstruction. Quantitative analysis has been performed by checking attained Peak Signal to Noise Ratio (PSNR) and Compression Ratio of the compressed image.
Full Paper

IJCST/41/1/A-1312
   35 Protecting Decentralized Peer-To-Peer Networks in Malware Spread

P. Sailaja Rani, T. Y. Srinivas Rao

Abstract

In this paper, Malicious software or Malware is the software developed with malicious intentions. Hackers use it for spoiling computer programs or to get access to sensitive information. Towards this end this paper presents an analytical model which can effectively characterize the true nature of malware and how it spreads in P2P networks such as Gnutella. The detection of such malware can be done by writing program which can understand the dynamics of malware. Gnutella sort peer-to-peer networks and learning the charismatic allied with widen of malware. We develop the method constant or network conditions beneath which the peer-to-peer network could accomplish a malware free equilibrium. Sculpt also appraise the effect of control artifice like node quarantine on oppressive the widen of malware. The sculpt is then unmitigated to consider the brunt of peer-to-peer networks on the malware widen in networks of smart cell phones. The empirical results revealed that the proposed model is effective and useful.
Full Paper

IJCST/41/1/A-1313
   36 Protecting Location Privacy in Large Scale Sensor Network Against a Global Eavesdroppe

Suresh Babu, M. Mohana Venkateswara Rao

Abstract

Wireless Sensor Networks (WSN) have been widely used in many areas for unattended event monitoring. Mainly due to lack of a protected physical boundary, wireless communications are vulnerable to unauthorized detection, interception and even node capture. Privacy is becoming one of the major issues that jeopardize the successful deployment and survivability of wireless sensor networks. While confidentiality of the message can be ensured through content encryption, it is much more difficult to adequately address the source-location privacy. For WSN, source-location privacy service is further complicated by the fact that the sensor nodes consist of low-cost and lowpower radio devices, computationally intensive cryptographic algorithms (such as public-key cryptosystems) and large scale broadcasting-based protocols are not suitable for WSN. We first argue that a strong adversary model, the global eavesdropper, is often realistic in practice and can defeat existing techniques. We then formalize the location privacy issues under this strong adversary model and show how much communication overhead is needed for achieving a given level of privacy. We also propose two techniques that prevent the leakage of location information: periodic collection and source simulation. Periodic collection provides a high level of location privacy, while source simulation provides trade-offs between privacy, communication cost, andlatency. Through analysis and simulation, we demonstrate that the proposed techniques are efficient and effective in protecting location information from the attacker.
Full Paper

IJCST/41/1/A-1314