IJCST Logo




IJCST 8.1 Ver -1 (Jan-March 2017) | International journal of computer science and information technology















International Journal of Computer Science and Technology
IJCST 8.1 Ver – 1 (Jan-March 2017)

S.No. Research Topic Paper ID Download
01

Study of Artificial Intelligence(AI) with Augmented Reality(AR)

Apoorva Jain

Abstract

Artificial Intelligence is the subarea of Computer Science, which deals with making machines work like humans. The concept of artificial intelligence has almost overruled the concept of typing on various Search Engine tools, rather people are interacting with computers like they interact with the humans. They give command to the systems and the systems respond accordingly, as humans does. So this artificial field has immensely grown in this real world. Nowadays a new concept has evolved i.e augmented reality. It means integrating the virtual things with the real environment. It is basically a sixth generation technology , which provides a real interface of virtual objects.Earlier it was not very much used but these days people are using this technology for education, for hospitals and in various other fields.This paper deals with the significance of integrating the technologies together.
Full Paper

IJCST/81/1/A-0789
02

Developing an Efficient Solution to Information Hiding through Text Steganography Along with Cryptography

Venkata Bhanu Chowdary Allada, Mallikarjun Susarla

Abstract

Now-a-days information security over unsecured channel is the most challenging issue. Most of the proposed algorithms in network security include only cryptography. Although cryptanalysis takes a lot of time to get back the plain text, the security given is not efficient in the conditions where the plain text is more important than the time. Therefore, we have proposed an efficient solution to use steganography along with cryptography for increased security. The proposed algorithm involves the pure format based text steganography along with the secret key cryptography. The cover text is made as ordinary as possible. The plain text from the sender is encrypted using DES algorithm which generates the cipher text. This cipher text is then embedded into the cover text using the embedding algorithm which generates the stego text which is sent through the unsecured channel. The receiver then receives the stego-text converts it into the cipher text using extraction algorithm which is then converted back to plain text using DES decryption. Instead of correct recipient if any third party or cracker or hacker obtains the stego text they may think that it is an ordinary text to teach English to the kids since we made it like that or if they try to extract the original message it requires a huge amount of computational time. The changes that can be made to the proposed algorithm is that we can make use of AES algorithm instead of DES algorithm since AES make use of 128-bit key and DES uses 64-bit key and increase in key length provides greater security.
Full Paper

IJCST/81/1/A-0790
03

Delegation of Software Projects in Software Production Corporations: A Paradox for Delegation of IT Projects

Muhammet Dursun KAYA, Hasan Asil

Abstract

Now-a-days information security over unsecured channel is the most challenging issue. Most of the Delegation enables managers to focus on their main business activities and assign support and minor jobs to experts outside their organization. Providing IT services and technical support and updating them are also other parts of an organization’s responsibilities but if the organization pays too much attention to these areas it is possible that the focus will shift from main activities to minor ones. This research has restricted its analysis to delegation of software projects in software production corporations and the results reveal that delegation, although advantageous, creates problems as well such as security, support, etc.
Full Paper

IJCST/81/1/A-0791
04

On Comparative Study of Breast Cancer Classification Using Ensembles in Statistical Modelling

Milan Joshi, Anurag Joshi

Abstract

Distinguishing different stages in cancer for medical professionals will require a reliable prediction methodology to diagnose cancer. To name a few, breast cancer is one of the most ordinary disease among women that leads to death. Hence, diagnosing it in earlier stage has become the certainty in cancer research,as to provide succeeding clinical approach to the patients. The classification of breast cancer is based on large number of parameters that characterize the tumour’s appearance. This helps the physician for diagnosis of breast cancer more easily. Hence automation of diagnostic system is needed for diagnosing tumours. Using automated computer tools and in particular machine learning to facilitate and boost medical investigation and detection is a
promising and important area. A variety of these techniques, including Artificial Neural Networks (ANNs), Decision Trees (DTs) and Support Vector Machines (SVMs) and have been broadly applied in cancer research for the development of predictive models, resulting in effective and accurate decision making. Our Papers aims to use a modern and effective technique called Random Rotation Ensembles as well as Deep Learning .In this domain we show that the performance of this method is better than that of previous methods, therefore encouraging a more comprehensive and generic approach for cancer diagnosis.
Full Paper

IJCST/81/1/A-0792
05

The Enhanced Security Systemfor Multi-Owner Data Sharing for Various Groups in Cloud Storage

Laxmi Regadi, S. Seshagiri

Abstract

Cloud Patrons can fulfill a practical and effective viewpoint for information sharing in the cloud with the appeals of low upkeep and little organization cost. Since the code will be outsourced, we give an efforts to establish safety to the sharing information records. Tragically, because of the relentless change of the enlistment, ensuring the sharing information is a testing errand, especially for an untrusted cloud as a result of the connivance ambush. What’s more, to exist arranges, they utilize secure correspondence channels to give the secured key dissemination among the gathering, nevertheless, to have such channel is a strong assumption and is troublesome for practice. In this paper, we propose a protected information sharing arrangement for component people. In the first place, we propose a protected way for key appointment with no sheltered correspondence channels,and the customers can securely get their private keys from social occasion boss. Second, our arrangement can fulfill fine-grained get to control, any customer in the social event can use the source in the cloud and disavowed customers can’t get to the cloud again after they are denied. Third, we can secure the arrangement from interest strike, which infers that denied customers can’t get the main information record paying little mind to the likelihood that they conspire with the untrusted cloud. In our strategy, by using polynomial limit, we can fulfill a secured customer denial arrange. Finally, our arrangement can fulfill fine capability, which suggests past customers require not to redesign their private keys for the situation either another customer participates in the social affair or a customer is denied from the get-together
Full Paper

IJCST/81/1/A-0793
06

Cryptography: An Art of Writing a Secret Code

Samiksha Sharma

Abstract

In present era the requirement of internet for wireless communication is rising day by day and thus there is a need of security to guard such communication by users on insecure wireless channels. Data sent over the communication channels is susceptible to attacks because of sensitive information it contain.
Cryptography is an art of writing a secret code that defend the data getting exchanged between two communicating parties from external attack. Cryptography is used to hide the confidential details so that the information can be sent securely over the timid network. In this paper a brief review of cryptography is presented along with the study of various cryptography techniques which are widely used to protect data from intruder attack. Various
security threats to data over an insecure network are studied. In this paper different cryptography methods are discussed along with the data threats and how that data can be protected through different cryptography techniques.
Full Paper

IJCST/81/1/A-0794
07

Self Adaptive Utility-Based Routing Protocol (SAURP): A Result

Rakhi S. Belokar

Abstract

This report introduces a novel multi-copy routing protocol, called Self Adaptive Utility-based Routing Protocol (SAURP), for Delay Tolerant Networks (DTNs) that are possibly composed of a vast number of devices in miniature such as smart phones of heterogeneous capacities in terms of energy resources and buffer spaces. SAURP is characterized by the ability of identifying potential opportunities for forwarding messages to their destinations via a novel utility function based mechanism, in which a suite of environment parameters, such as wireless channel condition, nodal buffer occupancy and encounter statistics, are jointly considered. Thus, SAURP can reroute messages around nodes experiencing high buffer occupancy, wireless interference, and/or congestion, while taking a considerably small number of transmissions. The developed utility function in SAURP is
proved to be able to achieve optimal performance, which is further analyzed via a stochastic modeling approach. Extensive simulations are conducted to verify the developed analytical model and compare the proposed SAURP with a number of recently reported encounter-based routing approaches in terms of delivery ratio, delivery delay and the number of transmissions required for each message delivery. The simulation results show that SAURP outperforms all the counterpart multi-copy encounter-based routing protocols considered in the study.

Full Paper

IJCST/81/1/A-0795
08

Text Steganography Basedon Inter-Word Space Statistics

K.Kavitha, B. Kishore Kumar

Abstract

Steganography can be used for hiding the secret message within a larger one in such a way that others can’t discern the presence or contents of hidden message. The Steganography algorithms employ multimedia as the medium to ensure hidden exchange of information between multiple contenders and to protect the data from unauthorized access. Text documents can be watermarked by patterning the inter word spaces. Steganography with watermarking adds additional security to the document and it provides high levels of exploitation of novel concepts of word classification and inter-word space statistics. The text steganography algorithms are based on modification of word style, spaces etc. Here, the nonlinear word positions of data in the document are targeted with insignificant modifications and by grouping into segments and their classification using word class information where the amount of information is dependent on requirement. This information is encoded by modifying some statistics of inter-word spaces of segments belonging to same class.

Full Paper

IJCST/81/1/A-0796
09

Energy – Saving Smart Street Light Intensity Control System using Arduino

S. Naveen Kumar

Abstract

Lightening the outdoor, consumes a significant amount of energy on the highways. During the nights all the lights remain ON for the vehicles, but when there is no vehicle movement there will be a lot of energy wasted. So, to address outdoor lightening issue the best approach is the smart control of public lighting. For achieving an energy efficient system smart lighting uses electronically intensity controlled Light Emitting Diode (LED). This project explains the circuit that switches the street lights ON when there is a vehicle
movement and OFF after a fixed time. The hardware section includes the Arduino Galileo Gen2 from Intel, LED, PIR sensor and LDR sensor.

Full Paper

IJCST/81/1/A-0797
10

The Significance and Future of Network Security

Nnabuife Godfrey Somtochukwu

Abstract

Network security is increasingly becoming ever more crucial to individuals and various administrations. An increasing number of organisations, including governmental organisations, store, manipulate and communicate valuable and confidential information electronically. However, a number of threats compromise the
security of this information making network security of great importance. Through examination of the times gone by of security permits a better understanding of the emergence of security innovations and technologies. Understanding the architecture of the internet paves ways for modifications that can reduce conceivable attacks that can be sent across the network. Being aware methods, of attacks permits for suitable securities to emerge.
Various administrations protect their activities from the internet through the use of encryption mechanisms and firewalls. For a better understanding and a careful evaluation, the internet, its weaknesses, threats via the internet and security technology is critically examined to reach a conclusion.

Full Paper

IJCST/81/1/A-0798
11

Revolution in Renewable Energy Fuel Cell

Dr.Ashok.J, Suhas Katkar

Abstract

A fuel cell is an electrochemical device that converts the chemical energy of a fuel and oxidant directly into electric energy. Besides being efficient and clean, fuel cells are also compatible with renewable energy sources and carriers for sustainable development and energy security. Fuel cells offer additional advantages for both mobile and stationary applications, including quiet operation without vibration and noise; they are therefore candidates for onsite applications. Whereas the 19th Century was the century of the steam engine and the 20th Century was the century of the internal combustion engine, it is likely that the 21st Century will be the century of the fuel cell. Full cells are now on the verge of being introduced commercially, revolutionizing the way we presently produce power. Fuel cells can use hydrogen as a fuel, offering the prospect of supplying the world with clean, sustainable electrical power.

Full Paper

IJCST/81/1/A-0799
12

Evaluation of Hybrid Security Mechanism for AODV in MANET

Shelbala Solanki, Anand Gadwal

Abstract

Mobile ad-hoc network is used for communication between the short range devices without having any infrastructural support. Here the devices directly exchange the data and routing information between neighbourhood devices which was there in defined range. Such network lacks with centralized controls and hence the information regarding the nodes leaving the range or nodes coming into the ranges are maintained by each node in their routing tables. In some situations, dynamic topologies and heavy movement causes security degradations because to verify the authenticity of each node participating in communication is not possible. Thus to have effective authentication and confidentiality is became a challenging task. This work uses RSA public key cryptosystem and SHA-I as digital signature for verification of hash codes of identity information’s. It is capable of handling both the information of data and control packets. After the robust analytical evaluation and quantitative measurement the effectiveness of the tool and its workability is verified.

Full Paper

IJCST/81/1/A-0800
13

The Design and Implementation of a Computer Based Testing System Using Component-Based Software Engineering

Michael Ajinaja

Abstract

Technology as we know today has come a long way in changing different aspect of lives and helping in human efficiency and accuracy. There is a growing need for educators and stakeholders to explore other means of assessment of students using different medium to help students. Examination is the major and widely accepted use of measuring student ability and understanding of a subject initially taught to him/her. The use of Information and Communication Technology registering and administering examinations helps in attaining efficiency and error-free results and computation. Flexible timing functionality, stand-alone subject module, robustness and scalability are some of the major advantages of the Computer based Test software. The CBT was developed using both the widely accepted Waterfall Model and Reuse-oriented software process models. The whole implementation of the software was achieved using Source Based technologies such as XAMP server, PHP, MySQL, JavaScript, Hypertext Markup Language and Cascading Style Sheet as template design. It provides immediate notification of the student’s final score based on what was provided as well as report. It also provides diagrammatic questions as well as mathematical symbols in all subjects. The paper focuses on using Component-Based software model in development of a Computer based Test software, that is, reuse of single core component of the software over and over to develop multiple components of the software. No two component areas (subject) are the same but all (sub-component) follow the template-component.

Full Paper

IJCST/81/1/A-0801
14

An Approach to Guarantee Quality of Service & Future Enhancement of Storage Area Network

B. Preethi, B.Revanth

Abstract

The purpose of this research is to high light the importance of SAN in the network world. A SAN is a Storage Area Network which involves the attachment of different memory devices to the server. At present we are using DAS & NAS technologies which are dedicated and that are behind the server and are not connected in the Network. A SAN is that which keeps the resources away from the common user and are connected in the network and that is a “block storage device”. It is very fast when compared to the DAS & SAN as it is using the Fibre Channel, iSCSI, ATA over Ethernet (AoE) and Hyper SCSI. It creates a data & workload Isolation due to its Design. So the SAN promises to the dynamic Network.

Full Paper

IJCST/81/1/A-0802
15

Pre-calculated Spelling Correction Algorithm (PSC)

Liny Varghese, Supriya M.H, K Poulose Jacob

Abstract

Spell correction algorithms provide a way to correct misspelled words. This paper proposes a modified symmetric delete spell correction algorithm which uses delete and transposes algorithm with pre-calculated dictionary.

Full Paper

IJCST/81/1/A-0803
16

A Review on Handwritten Character Recognition

Anisha Sharma, Soumil Khare, Sachin Chavan

Abstract

The paper contains a detailed review of Handwritten Character Recognition using Neural Network in Matlab. There has been sufficient research done in this field but it still remains an open research problem as handwriting styles vary of each and every individual. Achieving the character recognition accuracy rate to the best extent possible is the major challenge, which will eventually lead to the decrease in manual paper work. The paper describes the various phases of character recognition and compares the differed accuracy rate achieved using different methodologies by various researchers. The purpose is to develop Handwriting Character Recognition Software with a higher accuracy rate reducing its space and time complexities; making it optimal. A new diagonal based feature extraction method has been implemented in several papers that generates better accuracy rate compared to the traditional methods of feature extraction.

Full Paper

IJCST/81/1/A-0804
17

Design and Implementation SVM Based Genetic Algorithm for Forensic Investigation Cloud Data

Anwar Khan, Savita Rathore

Abstract

In this research to evaluate the problem of forensics in cloud computing and devise efficient explanation to permit for efficient investigation of cybercrimes in cloud compute environment. To overcome these limitations, aproposedNarrative is proposed in this research. Our proposed approach improves classification performance SVM is collective with Genetic Algorithm to. According to the obtained performance outcomes the system works accurately and efficiently as compared to traditional system but the performance is not much acceptable due to high time complexity. Effort to make less complex system for improving the current issues of the computational complexity. After implementation of the system the performance of the system in terms of accuracy, error rate, space complexity and time complexity is estimated and compared with a traditional classifier namely SVM is collective with Genetic Algorithm and applying cyber Forensic investigation.

Full Paper

IJCST/81/1/A-0805