IJCST Logo

 

INTERNATIONAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY (IJCST)-VOL IV ISSUE II, VER. 1, APR. TO JUNE, 2013


International Journal of Computer Science and Technology Vol. 4 Issue 2, Ver. 1
S.No. Research Topic Paper ID
1 The Performance Evaluation of Bellman-Ford and ZRP Routing Protocols in MANETs using QualNet 5.0 Simulator

Mukesh Kumar Garg, Dharam Vir, Dr. Ela Kumar

Abstract

Mobile Ad-Hoc Network (MANET) is a collection of mobile wireless nodes, which communicate to each other using a wireless physical medium without having a route to a pre- existing network infrastructure. Mobile means moving and Ad Hoc means temporary without any fixed infrastructure, so mobile ad hoc networks are a kind of temporary networks in which nodes are moving without any fixed infrastructure or centralized administration. The highly dynamic nature of MANET coupled with limited bandwidth and battery power imposes severe restrictions on routing protocols especially on achieving the routing stability. Due to all these constraints, designing of a routing protocol is still a challenging task for researchers. Many protocols are reported in this field but it is difficult to decide which one is efficiently best. In this paper an attempt has been made to evaluate and compare the performance of Proactive routing protocols (Bellman-Ford) and Hybrid routing protocols (ZRP) on different parameters using QualNet 5.0 Simulator. The results show that neither of the protocol is better in all situations. For some parameters one outperforms the other and vice-versa as reported in the paper.
Full Paper

IJCST/42/1/B-1420
2 Design of Saturn Architecture over DHT Data System

Samim Ismat, Dr. Rajeswari Mukesh

Abstract

A large-scale network is one in which the automated network systems must be able to manage the network as a single entity rather than managing individual connections between networks. A large scale network consists of an overall architecture. An overlay architecture is used to improve internet routing and quality of service guarantees to achieve higher quality streaming media. The existing overlay architecture include skip graph, a Self Organizing Access Structure for P2P Information Systems etc. which suffers from load unbalancing. Hence in this project novel overlay architecture is proposed for large scale data networks called Saturn with secure query processing. Saturn represents overlay architecture for large-scale data networks maintained over Distributed Hash Tables (DHTs) which processes range queries and ensures load balancing and fault-tolerance. In DHTs the data values is placed consecutively in neighboring peers since it accelerates range query processing, but is highly susceptible to load imbalances, node departures, high data availability and fault tolerance. Saturn deals effectively with these problems through the introduction of a novel multiple rings, order-preserving architecture.
Full Paper

IJCST/42/1/B-1421
3 A Review of Color Image Quantization Using PBO

Gurjeet Kaur, Gaganpreet Kaur, Dr. Dheerendra Singh

Abstract

Quantization of a digital image is a process of generating optimal quantization levels. Generally when image is represented in a graphical device, quantization problem occurred because the resolution effects the image compression. The discretization of the color information reduces the image size and it is very much similar to normal compression process. Quantization is used for changing color resolution of an image with minimum distortion possible. Quantization process carries the process of discretization of the image’s color gamut which in turn used in a reduction of the color information linked with pixel in the particular image. Quantization is a challenging job for high resolution images these days. In our research, we will use new optimization method Pollination Based Optimization (PBO) to select best optimal quantization level of the image. Pollination based optimization will be used to find the optimal quantization level for best fit resolution and will try to decrease the quantization error over possible portions of the color space.
Full Paper

IJCST/42/1/B-1422
4 A Study on Importance of Software Testing in
Investment Banking

Manmeet Singh Gujrakh, Dr. Sawtantar Singh Khurmi

Abstract

Financial service providers operate highly complex IT environments and handle enormous volumes of data. As a result, effective software testing is essential whenever a new system is introduced, a new release or patch level is installed, or parameters are modified. So, in this paper, we have discussed the importance of Software Testing in Investment Banking.
Full Paper

IJCST/42/1/B-1423
5 Role of Internet in the Evolution of Indian IT Sector

Ramandeep Kaur, Sawtantar Singh Khurmi

Abstract

The Internet has revolutionized the computer and communications world like nothing before. The Internet is at once a worldwide broadcasting capability, a mechanism for information dissemination, and a medium for collaboration and interaction between individuals and their computers without regard for geographic location.
Full Paper

IJCST/42/1/B-1424
6 A Fast Compliant Memory Controller for AMBA AHB

Md. Asim Iqbal

Abstract

Microprocessor performance has improved rapidly these years. In contrast, memory latencies and bandwidths have improved little. The result is that the memory access time has been a bottleneck Abstract- Microprocessor performance has improved rapidly these years. which limits the system performance. Memory controller (MC) is designed and built to attacking this problem. The memory controller is the part of the system that, well, controls the memory. The memory controller is normally integrated into the system chipset. This paper shows how to build an Advanced Microcontroller Bus Architecture (AMBA) compliant MC as an Advanced High-performance Bus (AHB) slave. The MC is designed for system memory control with the main memory consisting of SRAM and ROM. Additionally, the problems met in the design process are discussed and the solutions are given in the paper.
Full Paper

IJCST/42/1/B-1425
7 Audio Watermarking Techniques: A Critical review

Navjot Kaur, Usvir Kaur

Abstract

In this paper, Various techniques of audio watermarking have been discussed along with their advantages and disadvantages for the protection of intellectual property rights of audio signal. This paper also include various applications and requirements for audio watermarking. The transformations that can be used on the audio watermarking can be DCT, DWT and Arnold transformation. Arnold transformation lower the autocorrelation coefficient of image and then strengthened the confidentiality of watermark . It also include the procedure to show how watermark is embedded, extract and detect from the host signal.
Full Paper

IJCST/42/1/B-1426
8 Title – A study of the Impact of Digital Asset Management (DAM) on the business of General Entertainment Channels (GECs) from the broadcasters’ perspective

Dr. Gowri Joshi, Nitin Tabib

Abstract

Digital Asset Management (DAM) is a system that allows media companies to manage their media assets effectively. Media assets include audio, video, images, etc. This exploratory research aims to understand broadcaster’s preferences for using new media for viewing television content, through a survey method. The researcher interviewed five top notch professionals from leading media houses for the study. This paper will particularly interest broadcasters to understand consumer preferences for digitization of content and monetization of the same. The paper will also interest academicians to research further in this relatively less explored area.
Full Paper

IJCST/42/1/B-1427
9 Mobility as a Service (MaaS) on Mobile Devices
using MapReduce

P. Dinkar R. Patnaik, Rahul Konapure

Abstract

Today’s fast advance of mobile computing and cloud computing is bring a new paradigm shift from conventional mobile computing and wireless communications services to mobile cloud computing and services over wireless internet in the real world. Many people believe that mobile cloud computing will not only completely change the current way of delivering mobile computing and communication services to global mobile users, but also alter their working and life styles with seamless global mobile resource sharing and accesses. In this we present a way of mobile resource sharing through a concept called “Mobility as a Service (MaaS)” which resembles the Platform as a Service (PaaS) mode of cloud computing using mobile resources.
Full Paper

IJCST/42/1/B-1428
10 Enhancement of Text Retrieval Methods by using Hybrid Approach in Data Mining

Kirti Joshi, Navjot Kaur, Rajneet Kaur

Abstract

Data mining, a branch of computer science [1], is the process of extracting patterns from large data sets by combining methods from statistics and artificial intelligence with database management. Research papers text retrieval refers to text retrieval techniques applied to research articles and literature available of the different research papers [2]. The volume of published different research papers in different areas especially in computers science, and therefore the underlying knowledge base, is expanding at an increasing rate. By discovering predictive relationships between different pieces of extracted data, data-mining algorithms can be used to improve the accuracy of information. This paper presents a technique for using soft clustering data mining algorithm to increase the accuracy of text extraction. In this proposed work, the work is done to increase the accuracy of text extraction by using KEA with the dictionary approach and by using Artificial Bees Colony algorithm.
Full Paper

IJCST/42/1/B-1429
11 A Survey of Association Rule Mining Using
Genetic Algorithm

Shruti Aggarwal, Babita Rani

Abstract

Association rule mining is the essential part of data mining process. In a given large database of customer transactions need huge optimization to make it better. Association Rules are called the Strong rules if the rules satisfy the minimum support threshold (min_sup) and a minimum confidence threshold (min_conf) value. Researchers developed a lot of algorithm to optimize the rules but genetic algorithm is one of the famous algorithm to optimization the rules. Genetic algorithm is an adaptive heuristic search algorithm based on the evolutionary ideas of natural selection and genetics. In this paper we represent a survey of association rule mining using genetic algorithm.
Full Paper

IJCST/42/1/B-1430
12 Role of Software Testing in Retail Banking: A Review

Manmeet Singh Gujrakh, Dr. Sawtantar Singh Khurmi

Abstract

The retail banking industry is undergoing a period of rapid change in market share, competition, technology, and the demands of the consumer and it is important that the Retailers provide the costumers with the most effective, user friendly and promising application. So, in this paper, we have discussed the role of software testing in retail banking.
Full Paper

IJCST/42/1/B-1431
13 Creation of a Crowdsource Web Application using Open Source Ushahidi platform

Harpinder Singh

Abstract

Crowdsourcing is an online engagement of large number of people to solve a problem/issue collectively. Wikipedia and Open Street Map (OSM) are good examples of crowd sourced work, where huge amount of useful information has been created by the public and not by any single company or organization. Crowdsourcing has the potential to help the citizens or masses to provide real time accurate information to the administration/government or other related organizations so that an issue/crisis can be solved. Crowdsourcing can help in environmental monitoring, public health mapping, monitor government projects, human rights monitoring, citizenbased election observation, nonviolent protests, disaster response and crisis mapping. Earlier the public were mere spectators but crowdsourcing can convert them to sensors so that they can collect useful information (text, images, locations, video files) and send it to the concerned organization This paper reviews Ushahidi an open-source platform with the help of which a crowdsource website can be created and information from web, email, SMS and twitter etc can be collected, managed and visualized in a map on a common platform in real time and with least resources.
Full Paper

IJCST/42/1/B-1432
14 Remote Control of Robot Based on Embedded Technology

Md. Asim Iqbal

Abstract

Along with the development of society, the remote control of mobile robot has broad prospect of application. With the continuous development of embedded system, the system provides excellent hardware platform for embedded mobile robot. With embedded WinCE5.0 operating system, This paper put forward a kind of remote control method of mobile robots. The experiments had proved the embedded mobile robot has low power consumption and strong real-time control. It also had proved the validity of this method.
Full Paper

IJCST/42/1/B-1433
15 A Review of Various Applications of Internet in the Indian IT Sector

Ramandeep Kaur, Sawtantar Singh Khurmi

Abstract

The growth of the Internet in terms of the traffic it carries over the past fifty years represents a remarkable example of the scalability of the Internet architecture. The Internet represents one of the most successful examples of the benefits of sustained investment and commitment to research and development of information infrastructure. This paper will give comprehensive overview of various applications of Internet in Indian IT Sector.
Full Paper

IJCST/42/1/B-1434
16 Audio Watermarking & its applications

Sanjay Kumar Ray, Tusar Dash

Abstract

With the increase of the Internet, the unauthorized copying and distribution of digital media is very difficult to stop, because the content can be played back in the original form and can be rerecorded and freely distributed. A solution for this problem is marking the media with a secret, imperceptible watermark. The media player can detect this mark and enforce a corresponding e-commerce policy. Audio watermarking is used as a multimedia copyright protection tool or as a system that embed metadata in audio signals. Here the challenge lies is to hide data representing some information without compromising the quality of the watermarked track. But to make sure that the embedded watermark is robust against removal attacks. Audio watermarking technique provides evidence for high audio quality.
Full Paper

IJCST/42/1/B-1435
17 Single Sign-On Under Grid Security

Jaspreet Kaur

Abstract

Grid computing has appear as a very important field in computer science. It focuses on large scale resource sharing and coordinated problem saving among dynamic virtual organizations. In this article, we will review Grid Computing, Grid Security, Grid security Infrastructure and Single Sign On. Grid Computing is a kind of Distributed Computing where computing resources are shared across networks but it is not exactly same as distributed system. Grid Security means to provide security to the resources and information. From security, we want Authentication, Integrity Single Sign On, Delegation, Authorisation and Privacy. For Grid Security we will review Grid Security Infrastructure(GSI). GSI, is specification for confidential, non-interfered and authenticated communication. Under GSI, Single Sign-ON means to Logon once by providing Logon credentials and use any grid resource without typing password again and again.
Full Paper

IJCST/42/1/B-1436
18 Augmentation of Information Security by Cryptography in Cloud Computing

M. Bhavsingh, R. K. Anusha, R. Satish Kumar Reddy, S.Chaya Devi

Abstract

Cloud computing is that the use of computing resources that are delivered as a service over a network. Cloud service supplier and cloud service client ought to make certain that cloud is safe enough for all external threats in order that client doesn’t face any problem like loss of information or data thievery. This paper presents security problems affecting cloud computing and propose blowfish encryption scheme an extreme approach that has information security. Blowfish is symmetric block cipher which will be effectively used for encryption and safeguarding of information. It’s a quick free different to existed encryption algorithms, since it’s been analyzed significantly, nonproprietary and license free obtainable for all types of users.
Full Paper

IJCST/42/1/B-1437
19 Neural Network Technique: An Application of Medical Diagnosis System

Tanu Verma, R. K. Srivastava

Abstract

Future values of a various processes are neither exactly governed by mathematical function nor by probability distribution. The medical diagnosis is one of such processes, which is not governed by any deterministic process due to highly non linearity caused by various affective parameters of symptoms of disease. In such processes, the soft computing techniques : Fuzzy time series and Artificial neural network be preferred as these use the relation of dependency and knowledge by learning process of set of training data. The paper presents a method to have short term prediction of medical diagnosis system. The study uses artificial neural network for application of medical diagnosis. The diagnosis procedure usually starts with patient complaints and doctor learns more about the patient situation by an interaction based on symptoms of the disease. After selecting some symptoms related with disease a data set contains the information about the cases and applied a MLP neural network then results have been compared and discussed the performance obtained after getting Neural network application. Final result predicts the role of effective parameters and symptoms selection and the advantages of result obtained after application of MLP Network. The predicted values obtained through these processes have been compared with the observations and their robustness has been examined.
Full Paper

IJCST/42/1/B-1438
20 Probabilistically Admission Insure to Determine Real-Time Systems Under Overburden

Rahul Kumar Mishra, Dr. Udai Shanker

Abstract

Existing real-time explore focuses on how to develop, model and enforce timeliness insures for task sets whose rightness has a temporal aspect. However, the ensuing systems often demonstrate poor resource usage due to the resource scheduler reserving more imaginations than required in order to ensure that admitted agendas can be satisfied under worst case considerations. Weakening the guarantees leads to the known conceptions of firm and soft realtime tasks, but we think the paradigm needs to be shifted further, reifying efficient usage. With Quality-Assuring Scheduling (QAS) we demonstrated such an algorithm. However, its practical pertinency is limited to uniform and harmonic periods, due to its complexness for arbitrary periods. To over-come this restriction, we introduce Quality-Rate-Monotonic Scheduling (QRMS), which, although slightly more bearish, is less complex compared to QAS. The admission assures is again based on a probabilistic model to ensure that a requested fraction of jobs is successfully executed. Thus, the amount of missed deadlines can be outwardly con-trolled, even in sustained overload situations.
Full Paper

IJCST/42/1/B-1439
21 Support Vector Machine Based Intrusion Detection System

Upendra Singh Aswal, Jaisankar Bhatt, Sanjiv Kumar Chauhan

Abstract

Due to world wide connectivity through Internet, the complexity of network attacks, as well as their sternness, has also increased recently. As such, more and more organizations are becoming vulnerable to attack. An intrusion detection system’s main goal is to classify activities of a system into two major categories: normal and suspicious (intrusive) activities. Intrusion detection systems usually specify the type of attack or classify activities in some specific groups The aim of this research paper is to classify network attacks using soft computing approach here we used two class classifier SVM(Support Vector Machine) which leads to a higher detection rate and a lower false alarm rate in a shorter time. This paper focuses on the classes, Normal, DoS (Smurf, Back), Probing (Ipsweep). Extensive analysis is conducted in order to assess the translation of symbolic data, partitioning of the training data. The experiments and evaluations of the proposed method were performed with the KDD Cup 99 intrusion detection dataset. Experimental result shows that system archive 25% improvement. If only 5% false prediction are used.
Full Paper

IJCST/42/1/B-1440
22 Semantic Text Recognition by Integrating
Multiple Contexts

M Bhavsingh, V.Kishankumar, Shaik Ruhina, B.Rajini

Abstract

In this document written word context is being converse, as well as its outcome on word recognition. Most terms in English are confusing between different interpretations terminology can mean different things in different contexts. However, over the last five decades, device reading has grown from a daydream to reality. Optical character recognition has turn into one of the most winning applications of technology in the ground of pattern recognition and artificial intelligence. The mean is to produce a structure that classifies a given input as belonging to a certain class quite then to identify them completely, as every input pattern and performs well on the task of regain the different meanings of unclear words, and is able to suggest data.
Full Paper

IJCST/42/1/B-1441
23 Designing Issues Associated with Very Large Scale Integrated Circuits

Arvind Singh Rawat, Amit Kumar

Abstract

The Very Large Scale Integration or VLSI is the process of placing thousands or hundreds of thousands of electronic components on a single chip. Nearly all modern chips employ VLSI architectures or ULSI i.e. Ultra Large Scale Integration. Very-large-scale integration (VLSI) is the process of creating integrated circuits by combining thousands of transistor-based circuits into on a single chip. VLSI began when complex semiconductor and communication technologies were being developed. The first semiconductor chips held one transistor each. Subsequent advances added more and more transistors, and as a consequence more individual functions or systems were integrated over time. The microprocessor is a VLSI device. In this paper we mainly focus on the designing issues associated with the VLSI.
Full Paper

IJCST/42/1/B-1442
24 A Novel Approach for Two Dimensional Discrete Wavelet Transform on FPGA

Alisha, Suresh Badugu

Abstract

Field Programmable Gate Arrays (FPGAs) provide a new implementation platform for the discrete wavelet transform. FPGAs maintain the advantages of the custom functionality of VLSI ASIC devices, while avoiding the high development costs and the inability to make design modifications after production. Furthermore, FPGAs inherit design flexibility and adaptability of software implementations. In this paper we describe a parallel and high speed implementation of the discrete wavelet transform and its inverse using Virtex FPGAs produced by Xilinx.
Full Paper

IJCST/42/1/B-1443
25 Design and Implementation of Third Party Contract Monitoring in B2B Interaction

K.Nagarjuna Rao, V.Adi SubaLakshmi V

Abstract

The paper describes the design and implementation of an independent, third party contract monitoring service called Contract Compliance Checker (CCC). The CCC is provided with the specification of the contract in force, and is capable of observing and logging the relevant business-to-business (B2B) interaction events, in order to determine whether the actions of the business partners are consistent with the contract. A contract specification language called EROP (for Events, Rights, Obligations and Prohibitions) for the CCC has been developed based on business rules, that provides constructs to specify what rights, obligations and prohibitions become active and inactive after the occurrence of events related to the execution of business operations. The system has been designed to work with B2B industry standards such as ebXML and RosettaNet.
Full Paper

IJCST/42/1/B-1444
26 Advanced Digital Signal Processing (ADSP) for Decreasing Power Dissipation

Nandinii Alla, Suresh Badugu

Abstract

The design of the core of a fixed point general purpose Advanced Digital Signal Processing (ADSP) processor and its instruction set. This processor employs parallel processing techniques and specialized addressing models to speed up the processing of multimedia applications. The ADSP has a dual MAC structure with one enhanced MAC that provides a SIMD, Single Instruction Multiple Data, unit consisting of four parallel data paths that are optimized for accelerating multimedia applications. The SIMD unit performs four multimedia-oriented 16-bit operations every clock cycle. This accelerates computationally intensive procedures such as video and audio decoding. The ADSP uses a memory bank of four memories to provide multiple accesses of source data each clock cycle. Various techniques have been developed for reducing the power consumption of VLSI designs, including voltage scaling, switched-capacitance reduction, clock gating, powerdown techniques, threshold-voltage controlling, multiple supply voltages, and dynamic voltage frequency scaling These low-power techniques have been proven to be efficient at certain expense and are applicable to multimedia/ Digital signal processing designs. Among these low-power techniques, a promising direction for significantly reducing power consumption is reducing the dynamic power which dominates total power dissipation. This Proposed paper can obviously decrease the switching (or dynamic) power dissipation, which comprises a significant portion of the whole power dissipation in integrated circuits.
Full Paper

IJCST/42/1/B-1445
27 Radio-Frequency Identification Incorporation with Wireless Sensor Networks and Devices

Singavarapu Navya, Suresh Badugu

Abstract

Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSN) are two important wireless technologies that have a wide variety of applications and provide limitless future potentials. RFID facilitates detection and identification of objects that are not easily detectable or distinguishable by using current sensor technologies. However, it does not provide information about the condition of the objects it detects. Sensors, on the other hand, provide information about the condition of the objects as well as the environment. Hence, integration of these technologies will expand their overall functionality and capacity. RFID and WSN are two important components of pervasive computing, since both technologies can be used for coupling the physical and the virtual world. However, RFID and WSN almost are under development in parallel method, few integration schemes and related opportunities are investigated in detail.
Full Paper

IJCST/42/1/B-1446
28 Cooperative Sybil Attack Detection in Privacy Preserved VANETs

V.Venkat Gopi, Ch. Sita Kumari

Abstract

In VANET, many attacks rely on having the attacker generate multiple identities to simulate multiple nodes: this is called the Sybil attack. By creating a large number of nameless identities, using them to gain large influence to the system.In this paper, we propose a light-weight and scalable framework to detect Sybil attacks. Utilizing social relationship among trajectories according to the similarity definition of two trajectories, Footprint can recognize and therefore dismiss “communities” of Sybil trajectories To prevent a vehicle from abusing the pseudonyms to launch a Sybil attack, hashing is used. In our objective system, the Department of Motor Vehicle provides vehicles with a unique pool of pseudonyms, used for hiding a vehicle’s unique identity. Vehicle pseudonym is stored in RSU. Now RSU evaluate hashed values and then determine pseudonyms of same pool to desrease symble attack Our proposed schema mainly focuss on detecting sybil attack and provide security.
Full Paper

IJCST/42/1/B-1447
29 Implementing Human Motion Tracking by Using Novel Mixture of Local GP Experts

B. Pavani Pursuing, N. Bujjibabu

Abstract

We describe a learning-based method for recovering 3D human body pose from single images and monocular image sequences. Our approach requires neither an explicit body model nor prior labeling of body parts in the image. Instead, it recovers pose by direct nonlinear regression against shape descriptor vectors extracted automatically from image silhouettes. For robustness against local silhouette segmentation errors, silhouette shape is encoded by histogram-of-shape-contexts descriptors. We evaluate several different regression methods: ridge regression, Relevance Vector Machine (RVM) regression, and Support Vector Machine (SVM) regression over both linear and kernel bases. The RVMs provide much sparser regression without compromising performance, and kernel bases give a small but worthwhile improvement in performance. The loss of depth and limb labeling information often makes the recovery of 3D pose from single silhouettes ambiguous. To handle this, the method is embedded in a novel regressive tracking framework, using dynamics from the previous state estimate together with a learned regression value to disambiguate the pose. We show that the resulting system tracks long sequences stably. For realism and good generalization over a wide range of viewpoints, we train the regression on images re-synthesized from real human motion capture data. The method is demonstrated for several representations of full body pose, both quantitatively on independent but similar test data and qualitatively on real image sequences.
Full Paper

IJCST/42/1/B-1448
30 Data Mining in Web Applications for Business Intelligence Operations

V Veera Ankalu, K Ravikiran, K Rama Rao

Abstract

The exponential explosion of various contents generated on the Web, Recommendation techniques have become increasingly indispensable. Innumerable different kinds of recommendations are made on the Web every day, including movies, music, images, books recommendations, query suggestions, tags recommendations, etc. Over the last decade, there has been a paradigm shift in business computing with the emphasis moving from data collection to knowledge extraction. Central to this shift has been the explosive growth of the World Wide Web, which has enabled myriad technologies, such as Web services and enterprise server applications. These advances have improved data collection frameworks and resulted in new techniques for knowledge extraction from large databases. A popular and successful technique which has showed much promise is Web mining. Web mining is essentially data mining for Web data, thus enabling businesses to turn their vast repositories of transactional and Website usage data into actionable knowledge that is useful at every level of the enterprise – not just the front-end of an online store. To this end, the chapter provides an introduction to the field of Web mining and examines existing as well as potential Web mining applications applicable for different business function, like marketing, human resources, and fiscal administration. Suggestions for improving information technology infrastructure are made, which can help businesses interested in Web mining hit the ground running.
Full Paper

IJCST/42/1/B-1449
31 Firewall: Software and Hardware Implementations

Dhiraj Kumar Banwal, Sanjay Kumar, Indresh Singh Rawat

Abstract

A firewall is simply a program or hardware device that filters the information coming through the Internet connection into the private network or computer system. If an incoming packet of information is flagged by the filters, it is not allowed through. In this research paper we mainly focus on the working of the firewall along with its software and hardware type.
Full Paper

IJCST/42/1/B-1450
32 Effective Multimedia Recommendation Based on User Interactivity

Bandi Krishna, Dr. V.B.Narasimha

Abstract

In this paper we present a novel multimedia (text, images, audio&video) recommendation for users based on user’s flavor. Typical quantity-driven keyword query search approaches return popular words in the results as expanded queries. This leads to a subset of possible query search misleading to an ambiguous search. The central idea of this paper is to recommend an effective multimedia content to the user, based on user ratings, flavor and hit ratio. This paper aims at establishing a relation between user’s first click to recommendations using Effective Multimedia Recommendation algorithm (EMR). Every image, video & audio is given a unique identification number which helps in categorization and recommendation. The proposed algorithm can be utilized in many recommendation tasks on the World Wide Web. The experimental analysis on large data sets shows the promising future of our work.
Full Paper

IJCST/42/1/B-1451
33 Genetic Algorithm Decryption Based Watermarking Scheme for Sound Signals Using Closest Approach

Pooja Wadhwa, Rama Chawla

Abstract

Security is the main concern in many researches as we are getting day by day enhanced and more secure data protection and encryption algorithms, here we are going to present a noble technique to encrypt data in sound signals, till yet many researchers presented several algorithms in this field here we are going to use GA (genetic algorithm) to have optimized and closest match where to hide which block in speech signals. GA is fast and better way to optimized closet match approach as compare to any other method.
Full Paper

IJCST/42/1/B-1452
34 Disaster Prediction System Using IBM SPSS Data Mining Tool for Cholera

Dr. M Nagabhushana Rao, Dr. M Muralidhara Rao, Vedavathi P

Abstract

During the past few years Special-purpose data mining systems have drawn great attention in the research and industrial area for their application into real environments and more spatial data is used with the application and development of modern science and technology. Therefore, obtaining the spatial knowledge becomes more important and meaningful. Data mining is the process of analyzing data from different perspectives and summarizing it into useful information. Spatial data mining is the extraction of hidden, useful and interesting spatial or non-spatial patterns from large amount of incomplete and noisy spatial databases. Spatial data mining presents new challenges due to the large size of spatial data, the complexity of spatial data types, and the special nature of spatial access methods. By collecting patients’ data, we analyze, predict and interpret the data to the health organizations for conducting Campaigns. Our contribution is to design disaster prediction system to identify the Cholera disease using Data mining tools i.e SPSS Modeler and Data mining algorithms.
Full Paper

IJCST/42/1/B-1453
35 Ubiquitous Networking and Security Parameters

Mayur Dabhade, Wrushal Kirnapure, Jayendra Khandare, Pooja Dange, Swapnil Dabhade

Abstract

The paper discusses about the future generation of networking based the current scenario in the form of omnipotent network. But still something is lacking, which could be “Exotic Networks”. The central idea is ‘connectivity’ that is available everywhere and in any form. Also, this paper explains the concept of ubiquitous network implementation, along with the intermediate state i.e. ubiquitous computing and then the obstacles to this idea.
Full Paper

IJCST/42/1/B-1454
36 Genetic Algorithm Encryption Based Watermarking Scheme for Sound Signals Using Closest Approach

Pooja Wadhwa, Rama Chawla

Abstract

Security is the main concern in many researches as we are getting day by day enhanced and more secure data protection and encryption algorithms, here we are going to present a noble technique to encrypt data in sound signals, till yet many researchers presented several algorithms in this field here we are going to use GA (genetic algorithm) to have optimized and closest match where to hide which block in speech signals. GA is fast and better way to optimized closet match approach as compare to any other method.
Full Paper

IJCST/42/1/B-1455
37 Web Content Mining Techniques: A Survey

Manjot Kaur, Navjot Kaur

Abstract

As years passed World Wide Web became overloaded with information and it became hard to retrieve data according to the need. Web mining came as a rescue for the above problem. Web content mining is a subdivision under web mining. This paper deals with a study of different techniques and pattern of content mining and the areas which has been influenced by content mining. The web contains structured, unstructured, semi structured and multimedia data. This survey focuses on how to apply content
mining on the above data.
Full Paper

IJCST/42/1/B-1456
38 The Evolution of e-Commerce Towards
Protection of Consumers

V. Srikanth, R. Dhanapal

Abstract

The internet will emerge as a new platform for marketing of products and services that will displace and rebuild existing economy. It will affect organizational structure; require different skills for negotiation, new regulatory and legal framework, electronic money, taxation and many other things. The evolution of e-commerce will have profound impact on competition, mobility of enterprises, effect on consumer behavior, changes in the way the work is defined and managed. The net will enable businesses to save time on product design, design according to the individual customer specification, order and delivery of components, tracking sales and getting feedback from customers. In this paper we analyze in detail as how the evolution of ecommerce will have greater impact towards protecting the consumers.
Full Paper

IJCST/42/1/B-1457
39 Optimize Pattern Dicovery for Mining Text

Dr. A. Rama Murthy, K.T.V. Subba Rao

Abstract

The optimize use and discover of pattern in data mining concept is a challenging issue in recent days, especially for mining useful patterns in text is an well known problem. Most of the existing text mining methods adopted term-based approaches, which has a disadvantage of synonymic problem. In pattern based approach that disadvantage will be taken care and present an innovative approach by the help of the processes of pattern deploying and pattern evolving, to improve the effectiveness of the method we have taken an experiments on RCV1 data collection and demonstrate that the proposed solution performs better than the existing one.
Full Paper

IJCST/42/1/B-1458
40 Online Interference Aware Aggregation With Generative Data Stream Modeling

V. Chiranjeevi, K. Bharagav Ram, V. Swapna

Abstract

Meta-alerts is the basis for reporting to security experts or for communication within a distributed intrusion detection system. . With three benchmark data sets, we demonstrate that it is possible to achieve reduction rates of up to 99.96 percent while the number of missing meta-alerts is extremely low. In addition, meta-alerts are generated with a delay of typically only a few seconds after observing the first alert belonging to a new attack instance. Metaalerts can be generated for the clusters that contain all the relevant information whereas the amount of data (i.e., alerts) can be reduced substantially. Intrusion detection can be used to identify the types of hackers attempting to tress pass into the system, thus we use the concept of alerts to cluster the types of attacks and the further counter measures, by using the concept of firewalls. . In addition, even low rates of false alerts could easily result in a high total number of false alerts if thousands of network packets or log file entries are inspected
Full Paper

IJCST/42/1/B-1459