IJCST Logo










 

International Journal of Computer Science and Technology
IJCST Vol 10 Issue 2 (April-June 2019)

S.No. Research Topic Paper ID Download
01

Formal Verification of WiMAX Protocol Using Petri Nets

Hafiza Samavia Kaukab, Rao Sohail Iqbal, Furhan Ashraf, Ghulam Mujtaba, Muhammad Usman Saleem, Abdul Rehman

Abstract

WiMAX technology is growing rapidly and has much social influence on people (user) which offers high-speed internet service and also ignores Wi-Fi interrupts, therefore, it is assumed that it has some security issues like the man in the middle attack, DoS attack, Rouge Base attack etc. In this era of technology the reliability enhancement is very important and demand for user satisfaction. Formal methods are the mathematical language and identify the possible errors of the system at the conceptual modeling phase. These attacks can be identified at the conceptual modeling phase and the developed system maybe attack free and error free. Petri nets is the graphical representing language of the system which is under development and it also covers all the functionalities of the system. Petri nets is mostly used by the researchers for formalization purposes. In this research, the Diagram of WiMAX protocol will be first analysed and then its equivalent Petri net model will be developed which will cover all the working of the system. Finally, the model will be verified by designing a reachability tree. This will make the WiMAX system formally verified and we can then say the WiMAX system is formally verified.
Full Paper

IJCST/102/1/A-0948
02

An Overview of Big Data Characteristics and Enhancement of Big Data Application

G.Venkatesh, Dr. K. Arunesh

Abstract

Big Data has totally changed and revolutionized the businesses and organizations work. Here the major Big Data applications in various sectors and industries are given. In this era where every aspect of our day to day life has been technologized, there is a huge volume of data that has been emanating from various digital sources. We now feel it a necessity to have a tool to have this data in a systematic manner for applications in various fields including government, scientific research, industry, etc. This will help in a proper study, storage and processing of the same.in the traditional data processing tools there were a lot of challenges in the analysis and study of such a huge volume of data. To overcome these challenges, some big data solutions were introduced such as Hadoop. These big data tools really helped realize the applications of big data. Businesses are finding benefits which help them grow fast.
Full Paper

IJCST/102/1/A-0949
03

Combined Access Control of Time and Attributes for Time Sensitive Data in Cloud

K. Seema Sri Vatsavi, Dr. Ch. Niranjan Kumar, Dr. Prashanta Kumar Sahoo

Abstract

The brand-new pattern of deploy data to the cloud is a two edged sword. On the one hand, it enables data owners to share their information with desired individuals. On the various other hand, it posses brand-new is difficulties on personal privacy and also security protection. To protect information secretness versus the honest-but-curious cloud company, many jobs have actually been suggested to sustain great grained data access control. Nevertheless, till currently, no approaches can sustain both fine-grained accessibility control and also time-sensitive information posting. In this paper, by incorporating timed-release encryption right into CP-ABE (Ciphertext-Policy Attribute-based Encryption), we recommend a brand-new time and also attribute aspects consolidated gain access to control on time-sensitive information for public cloud storage (called TAFC).
Full Paper

IJCST/102/1/A-0950
04

Development of Smart Healthcare System

Dr. S. Brindha, T. P. Kamatchi, Hemashrree J, M.I.Shafreen

Abstract

The proposed healthcare system provides a smart bridge between the doctors and patients. The application software helps in collecting the patient information of rural area. The details of the patient will be stored in the backend even it is in offline mode. Since the patient information are highly confidential and as a security measure two way authentication is used. Along with the login/password, fingerprint authentication is also incorporated. This provides a team-based approach with information-sharing across different healthcare sectors, and offers maximum continuity of care for the patient.
Full Paper

IJCST/102/1/A-0951
05

Ensured Image Transmission for Visible Mosaic Images Using Pixel Color Transformations

Dr. Ch. Ramesh, Pudi Maneesha

Abstract

Image transmission is one of the critical segments in our day to day life. Essentially in the web, images are transmitting for different applications, for example, online individual photo collections, classified venture files, record storing frameworks, restorative imaging frameworks and military image databases and so on. Every one of these images contain some mystery so to ensure this mystery we need to give a few procedures that makes the images secret. Mosaic image transmission is another image transmission strategy, which changes a given vast volume secret image into a purported secret-fragment-visible mosaic image of a similar size. In any case, there are issue identified with lucidity and time take for delivering mosaic image is expansive. Here gifted procedures are intended to direct the shading change process so the secret edge might be recouped almost lossless. Albeit so much work has been completed in the writing to determine the issues like expanding the information limit, making the secret image alike of target image however the vast majority of the works neglects to meet the reasonable necessities. This paper displays a methodology that can change a secret image into a secret fragment-visible mosaic image of a similar size that has the visual appearance of any uninhibitedly chosen target image without need of a database. Where, this mosaic image age has done by isolating the secret image into fragments and changing their individual shading qualities into comparing squares of the objective image.
Full Paper

IJCST/102/1/A-0952
06

Development of a Web GIS Application using Web AppBuilder for ArcGIS (Developer Edition)

Taranjot Singh Bhatia, Harpinder Singh, P.K Litoria, Brijendra Pateriya

Abstract

Development of a web GIS (Geographic Information Systems) is a complex job and it requires specialized software. There are many software both commercial and FOSS (Free and open source software) available on the internet to develop a web GIS application. In this study an attempt has been made to review the process of development of a mobile friendly web GIS application using the ESRI Web AppBuilder for ArcGIS (Developer Edition). Web AppBuilder for ArcGIS (Developer Edition) is a part of the ESRI ArcGIS Enterprise collection of software. A basic application is developed using Web AppBuilder and then it is customized and extended. The various customizations described in this paper are, the creation of a new widget (tool), addition of a widget downloaded from the internet and modifications in the branding, headed, footer and sidebar of the application.
Full Paper

IJCST/102/1/A-0953
07

Adaptive Energy Efficient MAC Protocol for Increasing Life of Sensor Nodes in Wireless Body Area Network

Nagashetty B Kolar, Dr. Raju Ramakrishna Gondkar

Abstract

Vitality is uncommon in Mobile registering including wearable-devices and implantable-devices contraptions in a remote body zone. Here an adaptable directing show is made and inspected which confines the essentialness cost-par-bit of data by using the channel gathered data to pick the best system to course data. From this system, the source hub will change between organize what’s more, moved correspondence in perspective on the idea of the association and will undertake the exchange just if the channel strength is underneath a particular edge. The numerical model is then affirmed through diversions which exhibits that the adaptable directing scheme can upgrade imperativeness capability inside and out differentiated and existing procedures.
Full Paper

IJCST/102/1/A-0954
08

Automatic Bilingual Caption Generation

Hemant Kumar Kushwaha, Mahesh Dhumal, Vaibhav Gupta, Sona R Pawara

Abstract

In the past few years, the use of video sharing platform either for knowledge sharing or entertainment has in-creased exponentially. But the language barrier has made this growth useless for a major portion of the population. Also, the hearing impaired people can’t understand the content of the video. In such cases, Use of subtitle can be an effective way to resolve these issues. Currently, various video sharing platform are using either manual subtitle generation or automatic subtitle generation in the English language. This traditional approach increases the cost and also the time utilization for subtitle production. Therefore we have developed the system which instantly generates bilingual subtitles in various Indian regional languages like Marathi, Gujarati, etc. The proposed system consists of Audio extraction, Speech recognition, subtitle generation and translation subsystems which are based on Mel Frequency Cepstral Coefficient and Hidden Markov Model. In the end, implementation of the proposed system can significantly reduce the cost and time utilization for subtitle generation without any reduction in quality of subtitles.
Full Paper

IJCST/102/1/A-0955
09

Detection of Anemia from Image of Anterior Conjuctiva

Bhavana R, Sana Parveen

Abstract

The Haemoglobin fixation inside the person blood be consider the same as the best quality level designed for the recognition of anaemia. This be an intravenous procedure which require specific careful gear. test of the conjunctival whiteness of the eye be typically use towards quickly display used for level deficiency in numerous facilities. Because of absence of legitimate medicinal services and therapeutic offices in immature nations, numerous individuals are helpless against weakness. It would be an incredible assistance if the nearness of iron deficiency in a patient can be identified utilizing non-intrusive techniques which do exclude costly tests or even the nearness of a specialist or restorative laborer. The procedure includes snapping a photo of the conjunctival weakness of the eye utilizing the advanced cell with reasonable guideline in adequate lighting.
Full Paper

IJCST/102/1/A-0956
10

Remote Monitoring System for Autonomic Nervous System Disorders

Vasumathi Devi Majety, Dr. G.Murali

Abstract

The implementation of remote monitoring system for Autonomic Nervous system disorders is focused. Now a days people are suffering from sveral Neurological disorders due to high stress in their life style. So many remote monitoring devices are available but lack of concentration on the disease detection. In this work the main focus is to investigate which vital signs of the patients will effect the Autonomic Nervous System (ANS) disorders. The another aspect is, the physiological parameters threshold values are going to be decided by considering the real time data from hospital. Here the main focus is on detection of ANS disorders but not on communication part. Remote detection methodology is achieved using wireless sensor networks.
Full Paper

IJCST/102/1/A-0957