VOL5.2-3, Apr to June, 2014

International Journal of Computer Science and Technology Vol 5.2-3
S.No. Research Topic Paper ID

An Assessment of E-Accounting Practices in the Nigerian Deposits Money Banks

Oladejo, Moruf. O


The observation of Stefanou (2006) that a number of authors in various countries share similar views on the lack of research in the area of Accounting Information System is a pointer to the need for investigation in the Nigerian context. Further, studies of relationship between accounting procedure and e-accounting practices are new in a developing economy like Nigeria in this era of growing e-commerce. The current study remains germane by exploring the influence of e-accounting practices on the accounting procedure using the sampled Nigerian deposits money banks (DMB) for analysis. The research design is based on a survey methodology using a sample of purposively selected DMB in the country. Primary data were employed through structured questionnaire to elicit information from selected banks staff and used to achieve the study objectives. Data collected were sorted and coded and analysed using STATA 10 statistical package. The findings reveal that DMB banks put in place accounting softwares to generate their financial information. The results of data analysis and hypotheses tested showed that e-accounting will significantly improve accounting procedures in the Nigerian banks in terms of better cash management, cost saving, improved audit trails, convenient financial reporting and security. Bankers are therefore enjoined to prepare programs to develop staff at regular basis on the applications and uses of computerized information system so as to build confidence in the importance of computerized information system, in order to achieve efficiency in the work.


Personalized Image Explore from Photo Allocation Websites Using Ranking Based Tensor Factorization Form

T.Ramadevi, Dr. N.Chandra Shekar Reddy, Prof. T. Ramana Murthy


Social sharing websites like Flicker and YouTube allow users to form, share, tag, annotate, and comment Medias. The massive quantity of user-generated data assists users throughout sharing and organizing transmission substance and provides helpful data to progress media retrieval and management. The net search prevalence is improved by generating the same list consistent with the tailored user search intents victimization tailored search. During this paper, we advise a model at the same time leaving the user and question significance to be told to personalized image search. During this essential work is to imbed the user preference and query-related search arrange into user-specific topic areas.


Design of Novel Interface Engine to Generate Interoperability

Gurpreet Singh, Dr. K.S.Mann


With the development of Information Technology communication between different systems has becoming a major issue of concern in today’s era. This communication is also covered a major role in health informatics. This is due to the development of large number of technologies in healthcare systems. Doctor’s, physicians faces large number of problems in communication between these systems. The solution to this problem is design of an interface engine that will make the communication to be happened in an effective manner, between various systems. In this paper we proposed an Interface Engine that will solve the problem of interoperability between various systems.


Cloud Profit Maximization With Improved Resource Allocation Policies

Pulkit Garg, Kompal Ahuja


Cloud computing is a computing paradigm that becoming a concrete mechanism for wide array of enterprise applications. Cloud computing Providers offer varying services that differ in resource configurations and provided services for the same. Solutions for resource allocation are fundamental for any service provider. Every resource allocation model has to consider various computational resources including network resources to accurately mirror practical requirements. Other aspect that should be considered while provisioning resources is energy consumption. The Resource optimum Clouds are gaining momentum. Hence, the resource allocation algorithms aim to accomplish the task of managing virtual machines over cloud servers residing in data centers and allocating network resources remaining in specified constraints.


Implementation for Enhancement of Computation Technique By Combining Enhanced RSA and El-Gamal Public Cryptosystems

Parul Goyal, Dinesh Kumar


The paper proposed combining the two different asymmetric algorithms named enhanced RSA in which three prime numbers are used and other is El-Gamal based algorithm. This will increase the factoring complexity of the variable (n), where the process of its analysis with the development of equipment and tools becomes much easier nowadays.
The existence of three prime numbers will give the ability to the enhanced encryption method to increase the difficulty of factoring of the variable (n), as well as speed increasing in the process of encryption and decryption. To generate a variable (n) using the original RSA algorithm, which contributes generating the public and private key that have a number of 500 digits by using two primes number with 200 digits each. In this case the multiplication process will take longer than the time of generating the same variable (n) by using three prime numbers where each number with 200 digits. On the other hand the more complexity of the algorithm is to increased by combining the other asymmetric El- Gamal algorithm.
This combination of two different algorithms provide the good speed of computation because of combining the two respective problems known IFP (Integer Factorization Problem) of RSA and DLP (Discrete Logarithm Problem) of El-Gamal.


Customization and Redevelopment of Android Operating System

Abhishek Tushar


Android has emerged as a strong competitor in mobile sector as it is supported by large companies especially by Google. Manufacturers can modify the system as per their needs due to Android’s openness and extensibility. Today Android operating system is not only used in Mobiles and tablets, its implementation in electronic devices is increasing rapidly. Smart TV and Smart Camera are examples of new implementation and in future android will be in many household devices like washing machine, Oven and many more. Android applications and games are getting more advance and complex bringing about utilizing more memory and battery. Mobile phones likewise require more advanced processors to run these high end Games and applications. As the mobiles are manufactured by distinctive manufacturers, they have their own particular user interface and pre installed applications and if more applications are installed the battery is consumed more and the phone becomes slow. So the motivation behind this paper is to increase the performance and working of Android OS by redoing the Stock ROM and making another and improved custom ROM.


Implementation of VANET-Inter Military Tanks Communication using Wireless Sensor Networks with Collision Prevention and Grenades Availability Protection

Sachin Jindal, Dinesh Kumar


The review paper is proposed to implement VANET in military applications at war time. VANET is an ad hoc network which consists of vehicular ad hoc network oriented military tanks. This type of VANET has different challenges if we compare with the normal tank war. To understand the problem the VANET is to be simulated using java socket programming in which various issues are described mainly consists of neighbor tank position updates, collision prevention between tanks and also the main security issue of availability of grenades in the tank. If any tank gets out of stock of grenades then automatically updates to be sent to the neighbor tanks so that the protection cover can be provided.
This review paper also discusses different number of scenarios of VANET which we implement in our simulation. In our simulation we use to implement VANET using different vehicles which communicate to the neighbor (WSN) wireless sensor network placed at distance apart. The vehicles are taken as tanks which are used for war. The neighbor updates are send via WSN which are placed under earth at war zone.


Sixth Sense Technology and its Challenges in Modern Era

A.Monika, Dr. N.Chandra Shekar Reddy, Santosh


The review paper is proposed to implement VANET in military applications at war time. VANET is an ad hoc network which consists of vehicular ad hoc network oriented military tanks. This type of VANET has different challenges if we compare with the normal tank war. To understand the problem the VANET is to be simulated using java socket programming in which various issues are described mainly consists of neighbor tank position updates, collision prevention between tanks and also the main security issue of availability of grenades in the tank. If any tank gets out of stock of grenades then automatically updates to be sent to the neighbor tanks so that the protection cover can be provided.
This review paper also discusses different number of scenarios of VANET which we implement in our simulation. In our simulation we use to implement VANET using different vehicles which communicate to the neighbor (WSN) wireless sensor network placed at distance apart. The vehicles are taken as tanks which are used for war. The neighbor updates are send via WSN which are placed under earth at war zone.


Energy Aware LEACH Protocol for Clustered Wireless Sensor Networks

Rekha Baghel, Bhawna Singh, Amreen Khan


Wireless Sensor Network (WSN) is the network consisting of wireless sensors which transmit and receive information among each other. Such networks are useful in various fields like civil and military applications for security systems; fault detections. Energy optimization is one of the major issues of WSNs to extend the lifetime of these networks. A number of clustering basedprotocols like LEACH and SEP are already developed and used to increase stability of the network. We have proposed a technique EA-LEACH (Energy Aware LEACH) in which the randomized selection of clusters is tried to be centralized. So, unlike LEACH, cluster heads are chosen based on their available energies which result in better distribution of cluster heads within the region.Simulations on MATLAB show that EA-leach depicts better results than the existing protocols like LEACH and SEP.


An Open Source Approach to Build a Desktop GIS

Dheeraj Gambhir, Harpinder Singh


Students and Researchers in the field of Remote Sensing and GIS (Geographic Information System) usually have a need to develop a customized desktop GIS to view and analyze the geo-spatial data they have generated. This paper reviews the open source DotSpatial GIS library for the .NET framework to develop a desktop GIS application in Visual Studio Express edition using C# programming language. A reader working on Windows platform, with modest programming skills can follow the step-by-step instructions to develop a customized desktop GIS application within a short period of time.


Agricultural Android Application

Vimal B. Patel, Rahul G. Thakkar, Dr. Sangeeta Ahuja


Forecasting and technical information regarding farming can be provided by the experts of farming community to the farmers by using new development in Information and Communication Technology (ICT). Agriculture kiosk can be one of the route through which farmers in the rural areas are getting various agriculture information on the fly using IT based application installed in the Kiosk. There are certain disadvantages of kiosk like: a) It is not user friendly. b) Setup cost of kiosk is very high. c) Problem of internet network connection. d) Security cost for protecting kiosk. Here, in this research paper we have discuss to design IT based application which provide an information to the farmers overcoming the above problems by developing android application. Android operating system is an open source; using it we can design and develop a software having functionality similar to agriculture kiosk. After developing android application we can deploy it in an android market, so that everyone can download it freely. Research paper depicts to design and develop such a technique which will focus on mobile farming technology.


Preprocessing of Intraday Stock Market Data

Rahul Thakkar, Rustom Morena


In this paper, we want to portray the preprocessing steps to enriched numerical data to make it useful for Apriori algorithm in finding out the association rules. Processed data will be applied inassociation rule mining to generate rules which will give direction about how to do intraday trading on a company’s stock. Attributes like company, date, time, open, high, low and close were used for preprocessing of data and data of those attribute is on tick by tick (one minute) bases. Attribute can be used for mining and in generating associations with the day of week, which can be good for intra-day trading. Database was built up by past five years tick data of major 45 companies of NSE, which was used as a raw data for preprocessing of numerical data. Concept of data cleaning, data integration, data transformation (binning) and Data Reduction (Discretization & Concept Hierarchy Generation) was used to enrich the data to make it appropriate for analysis for Apriori algorithm to generate association rules.


A Secure Image Sharing Method for Authentication of Gray Scale Documents

CMAK Zeelan Basha, MD Zulfquar Ali


Important information is save in the form of digital image. However, advance of digital technologies it is easy to make modifications in digital image contents. There is challenge in security image. It is necessary to design methods to solve image authentication problem. Self repair capabilities are useful for protection of digital documents in many fields. Image content authentication also useful for protection of digital documents. A new blind authentication method based on the secret sharing technique with a data repair capability for grayscale document images via the use of the Portable Network Graphics (PNG) image is proposed. An authentication signal is generated for each block of a grayscale document image, which, together with the binarized block content, is transformed into several shares using the Shamir secret sharing scheme. The involved parameters are carefully chosen so that as many shares as possible are generated and embedded into an alpha channel plane. The alpha channel plane is then combined with the original grayscale image to form a PNG image. During the embedding process, the computed share values are mapped into a range of alpha channel values near their maximum value of 255 to yield a transparent stego image with a disguise effect. In the process of image authentication, an image block is marked as tampered if the authentication signal computed from the current block content does not match that extracted from the shares embedded in the alpha channel plane. Data repairing is then applied to each tampered block by a reverse Shamir scheme after collecting two shares from unmarked blocks. Measures for protecting the security of the data hidden in the alpha channel are also proposed.


Nanocrystalline CuSe Thin Film Used as P-type Photoelectrode in Photoelectrochemical Solar Cell

Kavita Gour, Preeti Pathak, Dr. M.Ramrakhiani, Dr. P. Mor


The new and emerging technology is nanocrystalline thin film technology. The development of thin film solar cell is an active area of research at this time. Much attention has been paid to the development of low cost high efficiency thin film solar cell. Nanocrystalline thin films of copper selenide have been grown on glass and Indium Tin Oxide (ITO) substrates using chemical method. At ambient temperature, golden films have been synthesized and annealed at 200 ºC for 2H and were examined by means of X-ray diffraction (XRD) and (AFM) micrographs for their structural and morphological properties. Average spherical grains of the order of 15 nm in size aggregated over about 120 ± 10 nm islands were seen by AFM images. Conductivity in copper selenide thin films make it a suitable candidate for solar cells. Their photoelectrochemical performance was investigated in standard two electrode configuration with redox electrolyte. The investigation may be useful in obtaining efficient, stable and low cost solar cell to compete with the existing technology.


Privacy Enabling Social Networking Over Untrusted Networks

CMAK Zeelan Basha, MD Zulfquar Ali


Participation in social networking sites has dramatically increased in recent years. Services such as Twitter, Tribe, or the Facebook allow millions of individuals to create online profiles and share personal information with vast networks of friends and, often, unknown numbers of strangers. In this paper, we first provide an introduction to the surveillance and social privacy perspectives emphasizing the narratives that inform them, as well as their assumptions, goals and methods.


A Technological Shortcuts to Knowledge Management

Rohit Seth, Ujjal Sandhu


Knowledge management is one of the most up-to-date topics in both business world and technological research world. In our routine life we daily meet up with huge data and information for our varied requirements time to time. Merely data and information is not knowledge unless or until we are not making its appropriate use. In order to make its effective utilization one has to understand its relevance and need to dig it out appropriate and utilize efficiently. So here comes the role of Knowledge Management. The main role of IT here is to help people share knowledge through common storage so as to achieve economic reuse of knowledge.


A Novel Approach for People Interaction in Meeting

K. Venkata Raju, K Aparna


Mining person Interaction in Meetings is useful to recognize how a person reacts in different conditions. Activities represents the nature of the person and mining helps to scrutinize, how the person demonstrates his/her opinion. Detecting semantic knowledge is important. Meeting interactions are categorized as propose, comment, acknowledgement, request-information, askopinion, post-opinion and negative opinion. Semantic knowledge of meetings can be discovered interaction patterns from these meetings.
The interaction related tree mining algorithms are designed to analyze the structures of the trees and to extract interaction flow patterns. The sequence of human interactions is represented as a Tree. Tree structure is used to capture how the person interacts in Meetings and to discover the interaction flow often occurs in a Meetings and to reveal the relationship exist among the interactions. Tree pattern mining and sub tree pattern mining algorithms are automated to analyze the structure and to extract interaction flow patterns. The extracted patterns are interpreted from human interactions. The frequent patterns are used as an indexing tool to access a particular semantics.


Dynamically Managing the Software Components in Deployment

G.Siva Nageswara Rao, M.Sri Lakshmi


Application disruption can be reduced to improve Quality of Service during the system transformation using the technique of Dynamic reconfiguration. This technique has the capability of changing the system functionality and topology as required and involves inclusion, elimination and substitution of components during the system is executing. The objective of dynamic reconfiguration technique is to maintain completeness, consistency and service continuity of applications which increase the Quality of Service during system functionality. Adaotability and high availability are the basic characteristics for quality of service which attained our focus towards dynamic reconfiguration. This model is competent of runtime reconfiguration and works in any type of environments. To minimize down time while rebooting the system and improve reliability and high availability of distributed components are supported by dynamic reconfiguration. Set of tools and services are provided in dynamic reconfiguration to enhance the dynamic changes in the application with stopping the system. These changes are processed only to a part of a system while the whole system will be executed normally. This paper focuses on three major components of quality of services that include (i) define the complete range of quality of service (ii) analyzing the physical and logical requirements of the system requirements for Quality of Service characteristics are analyzed and solutions to achieve them are proposed. (iii) Substitute the abstract components with the prior components.


Efficiently Preventing the Inference Attacks on Social Network

N.Himabindhu, B.V.Srinivasulu


The increasing popularity of social networks, such as Facebook and Orkut, has raised several privacy concerns. Traditional ways of safeguarding privacy of personal information by hiding sensitive attributes are no longer adequate. Research that probabilistic classification techniques can effectively infer such private information. The disclosed sensitive information friends, group affiliations and even participation in activities, such as tagging and commenting, are considered background knowledge in this process. As the privacy concerns related to information release in social networks become a more mainstream concern, data will need to utilize a variety of privacy-preserving methods of examining this data. Here, we propose a method of data generalization that applies to social networks and present some initial findings for the utility/privacy tradeoff required for its use.


Routing Optimization Using Hybrid GA and PSO

Pardeep Kaur, Surinder Kaur


MANET became the main target of researchers as a promising technology for a broad range of applications owing to selfconfiguring and self-organizing capability in numerous networks. One vital space of analysis at intervals Ad-Hoc networks is energy consumption issue. The PUMA (protocol for unified multicasting through announcement in MANET establishes and maintains a shared mesh for each multicast group. Nodes in MANET networks are primarily battery operated so have access to restricted quantity of energy. This may lead nodes to drain their energy completely within short period, due to this lack of energy, communication between the two nodes get blocked. In this paper we propose hybrid of Genetic Algorithm (GA) and Particle Swarm Optimization (PSO) to consider only those nodes in the routing which have less distance from destination and thus have high energy (based
on their fitness function).


An Optimistic Approach of DDOS Attack Detection and Mitigation

Sakshi Kakkar, Dinesh Kumar


DDoS attacks is a grave network security problem that comprised a serious threat to reliability of services deployed on server.Flooding attack with Spoofed and Non-spoofed packets is a very harmful type of the DDoS attack.In this paper we consider the flooding attack with IP Spoofing packets.In IP Spoofing ,the attacker forged its IP address and flood the packets continuously towards the victim Server.Various number of techniques have been proposed by various researchers in the literature.In this study,we discuss how the DDos attack launched in real time environment using GNS3 emulator tool and its detection using packet analyser tool .Two techniques have been implemented on cisco router to mitigate the attack (i)Filtering based on source IP address intergrated with ports in Access control list(ii)Filtering Based on source IP address integrated with flags in access control lists .with the thereotical analysis and simulation the results show that second approach dropped spoofed packets with respect to previous approach.In this paper the parameters considered are traffic rate, No. of rules in the list,No. of bytes transfered in particular time.


Energy Efficient Vice Cluster Head Selection Method for Wireless Sensor Network

Nancy Bindal, Parveen Toor


Routing technique is one of the mainly demanding in wireless sensor network. Energy expenditure and network life time are major issues in design of routing protocols for Wireless sensor network. This paper presents a new version of LEACH protocol called A-LEACH which aspires to reduce energy consumption within the wireless network. Comparison of various network parameters is done in the form of graphs. The simulation work has been carried out by using own set of parameters and in the last of the paper conclusions is drawn. The simulation tool we used for the purpose is MATLAB.


Location Tracking System For Envrionment Sources Through Manets

V. Tejaswi, M.Vamsi Kiran, V. Neelima


Thousands of self-organizing sensor nodes may collaborate and establish a distributed monitoring, Wireless Sensor Network (WSN) in the future. Of late, numerous WSN applications have been using GPS devices to track and locate the position of the remote sensor nodes. Due to expensive hardware resources and power constraints of the sensor nodes, the usage of GPS hardware in WSN application is still unattainable. The target tracking systems which are already in use estimating the position of moving target based on measurements on Received Signal Strength (RSS), Time of Arrival (TOA), Angle of Arrival (AOA) and Time Difference of Arrival (TDOA). These measurements are less prudent for the application, which requires highly accurate target tracking. This paper proposes a Target Movement Prediction Algorithm (TMPA) based on topological coordinates. TMPA uses Topological Preserving Maps (TPM) to track and navigate the location of the target and Adaptive Weighted Target Tracking (AWTT) methodology condenses fault and improves the accurateness in the prediction.


A Survey on Touch Based Hand Gesture Recognition Using ANNs

Shilpi Garg, Pankaj Dev Chaddha


A gesture recognition system where each gesture specifies a word. Gesture recognition is more difficult than posture recognition because it has to handle dynamic processes. To deal with dynamic processes we use a recurrent neural network. Here, we describe a gesture recognition method which can recognize continuous gesture. The Pattern recognition by any computer or machine can be implemented via various methods such as Hidden Harkov Models (HMM), Linear Programming (LP) and Neural Networks(NNs). This paper reviews why using ANNs in particular is better suited for analyzing human motions patterns.


Yesterday’s Technology is Today’s Social Problem: Compelling Need to Incorporate Ethical Theories in Information Systems

Devashish Gosain, Mohit Sajwan, Sagarkumar Surani


The premise of this paper is that information technology is currently moving beyond the familiar main frame, pc, laptop and networked paradigms and that these new development require ethical reflection. We are now witnessing an arena of the mobile and wireless revolution, the ubiquitous computing revolution as well as revolutionary new uses of IT in biomedicine, crime and terrorism, entertainment and other arena. We are anticipating a nanotechnology revolution as well as convergence between IT, biotechnology and nanotechnology together as “converging technologies”. These new developments require ethical reflection, even before their consequences become visible [1]. This digital convergence and globalization in the emerging knowledge society has raised complex ethical, legal and societal issues. We are faced with complex and difficult questions regarding the freedom of expression, access to information, the right to privacy, intellectual property rights and cultural diversity. So we believe, whenever a new technology is created or a new invention in IT is forked, there must be an “IMPACT ANALYSIS” of this technological object on society, environment, culture and various walks of life. If one wants a direct development in information system, it would be a good point of departure to look at the system development process, which eventually will lead to the creation of system with proper knowledge of its probable impact on society. We suggest a new phase “IMPACT ANALYSIS” to be incorporated in SDLC (software development life cycle).The proposed SDLC (with ethical analysis of impact) is called as ISDLC (Impactful


Enhancing Security in Personal Health Record (PHR) for Mobile Health Monitoring (MHM) Systems in Cloud Computing Using Key Private Proxy Re-Encryption Algorithm

P. Prem Kumar


Mobile Health Monitoring (MHM), which applies the prevailing mobile communications and cloud computing technologies to provide feedback decision support, has been considered as a revolutionary approach to improving the quality of healthcare service while lowering the health care cost. Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those third party servers and to unauthorized parties. To assure the patients’ control over access to their own PHRs, it is a promising method to encrypt the PHRs before outsourcing. Unfortunately, it also poses a serious risk on both clients’ privacy and intellectual property of monitoring service providers, which could deter the wide adoption of mobile health technology. This paper is to address this important problem and design for enhancing security in Personal health record (PHR) for mobile health monitoring (MHM) system to protect the privacy of the involved parties and their data. Moreover, the outsourcing decryption technique and a newly proposed key private proxy re-encryption are adapted to shift the computational complexity of the involved parties to the cloud without compromising clients’ privacy and service providers’ intellectual property. Finally, our security and performance analysis demonstrates the effectiveness of our proposed design.


Revised Paper Published in IJCST Vol 5.4 Ver 1, Oct-Dec 2014


Feature Significance Based Ranking Method Using Fuzzy Rule Based Classifier

P.Amudha, S.Karthik, S.Sivakumari


The computer networks usage has grown enormous and widespread in recent years which have increased the number of new threats to a great extent. Intrusion detection is an important technique for network security. In recent years, data mining techniques have been used as a new approach for intrusion detection. As the quality of the feature affect the effectiveness of the Intrusion Detection system (IDS), feature selection methods are used to reduce the dimensionality of the data. In this paper, Feature Significance Based Ranking Method (FSBRM) is proposed to select optimal features. To investigate the performance of the proposed method, fuzzy rule based classifier is used on intrusion detection KDDCup’99 benchmark dataset. The performance of proposed method is compared with various feature selection methods in terms of accuracy, detection rate and false alarm rate.


Video sharing in Cloud Based Mobile Social TV (Cloud MoV)

Rohit Lanjewar, Ashish S. Sambare, Sachin R. Jain


The latest mobile devices (Smartphone, tablets, etc.) which are built in with most advanced features are in more in demand. This development however is suppressed by the limited battery lifetime of mobile devices and very much variable wireless connectivity, which makes the highest possible quality of service experienced by mobile users not viable. The current cloud computing technology, with its rich resources to offset for the limitations of mobile devices and using these connections the technology can potentially provide n ideal platform for the support the desired mobile services. In this paper we discuss the design of a Cloud-based novel Mobile social TV system (Cloud MoV) which utilizes both PaaS (Platform-asa- Service) and IaaS (Infrastructure-as-a-Service) cloud services to offer the living-room experience of video watching to a group of mobile users. We have implemented H.264 algorithm at server side which encodes videos. These videos are stored in online web hosting server. In CloudMoV, mobile users can import a live or on-demand video to watch from any video streaming site like YouTube, Vimeo, Ustream etc and invite their friends and family for watching the video concurrently. They can also chat with each other while enjoying the video.


Automated Cloudlet Resource Optimization in Virtualized Cloud Computing Environments

Salony Rana, Mohinder Singh


These days many virtual servers can be run over the same hardware while using small resources. Applications and software are being developed and deployed through the web interfaces over virtual datacenters. Cloud computing has the ability to use applications and software over the Internet which can store and protect the data while providing a service. It improves energy efficiency and lows management costs. The aim to build a cloud computing network and provide a security service through the platform. As today the traditional systems are being replaced with the cloud systems. It has introduced some major changes in the way enterprises are handling their information system and assets.


A Novel Approach of Sentiment Mining for Service Opinions

Nancy, Dr. Kiran Jyoti


Sentiments are always valuable, but how valuable it remains after extraction of hidden values or patterns using sentiment extractor. As people spend their time on web in posting sentiments or opinions because their thinking motivates them to help others in becoming more familiar with new launched products. Social website or micro blogging site plays great role in sentiment mining. Sentiments are the attributes or properties attached that describes the emotions of user. The selected attributes that are related to our research work as sentiment mining for service opinions that could prove valuable for marketing research. Region of interest in SM is frequency & polarity evaluation of sentiments that are further processed. If these sentiments are not analyzed properly then none organization can judge there service or product reputation in the market. SVM algorithm is proposed for sentiment mining and mainly discussed the frequency and polarity evaluation for service opinions and results are compared with state-of-art-existing technique in the same field.


Survival Modeling of Competing Risk Using R: An Undemanding Simulation Approach

Ponnuraja C, Valarmathi S, Babu C Lakshmanan, Venkatesan P


Simulating survival data are necessary for considerate and to evaluate for statistical models. Additionally, inadequate to have real data and also want to know the real status, it leads for simulation. We simulate Competing Risks (CR) survival data with the intention to understand the key concepts. Simulation can be viewed as the practical aspect of probabilistic task of constructing CR process. Simulation done using R and its add-on packages of Scrucca et al. (2007) and analyze them to observe whether the proposed methodology works well. It illustrates with R which allows the user to simulate survival times from parametric models. Standard parametric distributions are used to generate Survival times by Bender et al. (2005), Burton et al. (2006) and Beyersmann et al. (2009). Finally it accomplished with few highlights using simulated data on how to execute competing risk regression analysis with R.


Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment

Ravi B Nangre, Syed A.H, Kadam S.H


Cloud computing is on demand service as it offers dynamic, flexible and efficient resource allocation for reliable and guaranteed services in pay-as-you-use manner to the customers. In Cloud computing multiple cloud users can request number of cloud services simultaneously, so there must be a provision that all resources are made available to requesting user in efficient manner to satisfy their need without compromising on the performance
of the resources. Cloud computing has its era and become a new age technology that has got huge importance and potentials in enterprises and markets. Clouds can make it possible to access applications and associated data from anywhere, anytime. One of the major challenges in cloud computing is related to optimizing
the resources being allocated. The other challenges of resource allocation are meeting customer demands, data center management and application requirements.
Here the design, implementation, and evaluation of a resource management system for cloud computing services is presented.
System multiplexes virtual to physical resources adaptively based on the changing demand. Skewness metric is used to combine Virtual Machines with different resource characteristics appropriately so that the capacities of servers are well utilized. This algorithm achieves both overload avoidance and green computing
for systems with multi resource constraints.


Energy Optimization Framework For Wireless Sensor Networks

P.Gayathri, K. Narasimha Rao, M.Srinivasa Rao


Wireless Sensor Networks (WSNs) are increasingly used in dataintensive applications such as micro-climate monitoring, precision agriculture, and audio/video surveillance. A key challenge faced by data-intensive WSNs is to transmit all the data generated within an application’s lifetime to the base station despite the fact that
sensor nodes have limited power supplies. We propose using lowcost disposable mobile relays to reduce the energy consumption of data-intensive WSNs. Our approach differs from previous work in two main aspects. First, it does not require complex motion planning of mobile nodes, so it can be implemented on a number of
low-cost mobile sensor platforms. Second, we integrate the energy consumption due to both mobility and wireless transmissions into a holistic optimization framework. Our framework consists of three main algorithms. The first algorithm computes an optimal routing tree assuming no nodes can move. The second algorithm
improves the topology of the routing tree by greedily adding new nodes exploiting mobility of the newly added nodes. The third algorithm improves the routing tree by relocating its nodes without changing its topology. This iterative algorithm converges on the optimal position for each node given the constraint that the routing
tree topology does not change.


Deployment Issues in Underwater Wireless Sensor Networks: A Survey Report

Arvind Sharma, Amit Kumar Bindal


From the past few years wireless sensor network (WSN) fetches the huge attention of many researchers. Sensor network has emerged as a very powerful technique for many application including monitoring, surveillance and control. The idea of applying sensor networks into underwater environments has received increasing interests; Underwater Wireless Sensor Network (UWSN) presents a novel-networking paradigm, when compared to the terrestrial WSN. This paper elaborates some of the constraint factors in
underwater networks. The objective of this paper is to discuss the various deployment models and challenges on different aspects of UWSN including communication protocol and architecture, and proposes research direction in this field.


Identifying Errors in Software Modules by Using K-Means Clustering Algorithm

Pusparaju Mellaki, S.Bosubabu, M.Srinivasa Rao


Unsupervised techniques like clustering may be used for fault prediction in software modules more so in those cases where fault labels are not available. In this paper Quad Tree-based K-Means algorithm has been applied for predicting faults in program modules. The aim of this paper are twofold. First Quad Trees are applies for finding the initial cluster centers to be input to the K-Means Algorithm. Input threshold parameters govern
the number of initial cluster centers and by varying the user can generate desired initial cluster centers. The concept of clustering is gain has been used to determine the quality of clusters for evaluation of the Quad Tree-based initialization algorithm as compared to other initialization techniques. The clusters obtaines
by Quad Tree-based algorithm were found to have maximum gain values. Second the Quad Tree-based algorithm is applied for predicting faults in program modules. The overall error rates of this prediction approach are compared to other existing algorithms and are found to be better in most of the cases.


Security & Efficiency of Mobile Agents Over Network for E-Learning

Neha Sharma, Aviral Dubey


A variety of e-learning advantages have been recognized for a long time and many advances in E-learning system have been implemented, the needs on security and privacy protecting which provide new challenges, have begun to be studied. In E-learning system, identity verification of the learner is an important part
of the operation of e-learning security. The learner’s identity information is inspected by the firewall system till now. Mobile agent systems have many advantages over traditional distributed computing environments.
In this work we combine mobile agent and e-learning system and define a new Secured E-learning system which applies security using mobile agent. The agent works at both the client and server.
It will be helpful in avoiding various attacks such as eavesdropping and increasing availability, authentication & confidentiality of the system.