IJCST Logo

 

INTERNATIONAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY (IJCST)-VOL V ISSUE I, VER. 1, JAN. TO MAR, 2014


International Journal of Computer Science and Technology Vol. 5 Issue 1, Ver. 1
  S.No. Research Topic Paper ID
    1 Novel Pre-Processing Operations for Detection of Handwritten Gujarati CharactersDr. Manish M. Kayasth

Abstract

The objective of preprocessing tasks is to remove noise or impurities of scanned image so that image has normalized characters and skew correction that would otherwise reduces the recognition rate of handwritten text image. This paper describes the different pre-processing operations and techniques for the handwritten Gujarati characters which would then be helpful in recognition task. The paper also presents few handwritten text issues and the characteristics of Gujarati language. The paper concludes with the experimental result and future enhancement in the same direction.
Full Paper

IJCST/51/1/A-1835
    2 Survey of Object Tracking and Feature Extraction Using Genetic AlgorithmAshish Shingade, Archana Ghotkar

Abstract

Object tracking and feature extraction are the important steps in any computer vision application. With availability of various object tracking and feature extraction techniques, in this paper genetic algorithm technique is explored. Genetic algorithm is used for optimization, searching, feature extraction, segmentation and classification. Traditional methods search from a single point where as genetic algorithm search parallel from a population of points and find the global optimum in relatively few evaluations. Genetic algorithm is robust and efficiently searches complex search space. Comparative study of feature extraction techniques with genetic algorithm is presented to give guidelines for the researchers in the same domain.
Full Paper

IJCST/51/1/A-1836
    3 Improved Hierarchical Data Divisive Soft Clustering AlgorithmSamta Khobragade, Prateek Gupt

Abstract

The process of grouping a set of physical or abstract object into classes of similar objects is called clustering. There are several techniques and algorithms are used for extracting the hidden patterns from the large data sets and finding the relationships between them. The main novelty of the Hierarchical Data Divisive Soft Clustering (H2D-SC) algorithm is that it is a quality driven algorithm, since it dynamically evaluates a multi-dimensional quality measure of the cluster to drive the generation of the soft hierarchy. Specifically, it generates a hierarchy in which each node is split into a variable number of sub-nodes. Cluster at the same hierarchical level share a minimum quality value: cluster in lower levels of the hierarchy have a higher quality, this way more specific clusters (lower level clusters) have a higher quality than more general clusters (upper level clusters). Further, since the algorithm generates a soft partition, a document can belong to several sub-clusters with distinct membership degrees. The proposed algorithm is divisive, and it is based on a combination of a modified bisecting K-Means algorithm with a flat soft clustering algorithm used to partition each node.
Full Paper

IJCST/51/1/A-1837
    4 Multi-View Face Authentication Using Gabor FiltersH.Girisha, B.Sreepathi, K.Karibasappa

Abstract

This paper proposes a classification based face recognition method using Gabor filter features. Considering the desirable characteristics of spatial locality and orientation selectivity of the Gabor filter, we design filters for extracting facial features from the local image. Gabor filter have also some shortcomings which crucially affect the characteristics and size of the Gabor representation of a given face pattern amongst these shortcomings the fact that the filters are not orthogonal one to another and are, hence, correlated is probably the most important. This makes the information contained in the Gabor face representation redundant and also affects the size of the representation. To overcome this problem we propose orthonormal linear combination of the original Gabor filters rather than the filter themselves for deriving the Gabor face representation. They are computed by means of principal component (PCA). Finally support vector machine (SVM) are trained with set of facial features and perform recognition task. The proposed system is evaluated with XM2VTS and ORL database. The experiment results demonstrated the efficiency and robustness of the proposed system with high recognition rates.
Full Paper

IJCST/51/1/A-1838
    5 Design of Qos Oriented Secure Data Transmission Protocol in MANETChukka Suresh Kumar

Abstract

The main characteristic of the ad-hoc network is dynamic topology. In this, nodes modifications its position typically and these nodes have to be compelled to adapt for the topology change. Nodes will change position quite oftentimes that mean the quality of the network. For fast information transmission, we’d like a routing protocol that adapts to topology changes. For our convenience, we’ve projected a quick and secure protocol that is proactive and reactive in nature. Proactive nature used for adding the node into list, as a result of it taking a while to line the choice regarding node. And reactive nature used for locating the trail for providing quick transmission.
Full Paper

IJCST/51/1/A-1839
    6 Fast Data Collection in Energy Aware Wireless Sensor NetworksLokesh Kumar Alla

Abstract

In wireless sensor network, data aggregation is a commonly used technique. Data aggregation can minimize the number of transmissions and eliminate redundancy, thus saving energy and improving network lifetime, data collection is done in different methods, in that most of the system only concentrate on improve the life time of network. And most of the system fails to send the data in given dead line. In this paper, we proposed a method to collect data as faster as well as energy efficient life time handling. We first focus on periodic aggregated convergecast and then on one-shot raw-data convergecast. We focus on different methods to mitigate the effects of interference on the schedule length. In this paper, we proposed the scheme with less schedule length and tree based data collection model.
Full Paper

IJCST/51/1/A-1840
    7 Efficient Prediction of Collective Behavior of a User in Social Network Using Clustering With Representative PointsBitra Nagendra Babu, S.Rajesh

Abstract

These days people using social networks are increasing day by day. In this way huge amount of data generated by them is posing challenges at the same time opportunities to the user to study the collective behavior. Predicting collective behavior in a social network is a challenging task. Here the challenging task is given some behavior information of a user how can we imagine the remaining persons behaviors related to the given behavior within the same network. Relational learning methods with collective inference had been proposed to extract correlations existing in the network to predict the collective behavior. These methods failed to fulfill the needs of the heterogeneous network. These methods are only useful in homogeneous networks. Social dimension framework based on modularity maximization had been proposed to meet the heterogeneity. The social dimensions extracted from this method are dense. Due to the computational complexities, this method failed to provide the scalability. Sparse social dimensions based on edge centric clustering had been proposed to meet the scalability. Due to outlier problem this method failed to provide scalability to large amount of users. To protect the communities from outliers and providing scalability we propose scalability through clustering with representative points. The proposed approach can efficiently handle the millions of users.
Full Paper

IJCST/51/1/A-1841
    8 Creation of an Intranet Website for an Educational Institute Using Open Source Joomla CMSDheeraj Gambhir, Harpinder Singh

Abstract

A Content Management System (CMS) is a software which can be used by non-technical users to create, edit and manage web sites and web applications. There are many open source CMS available on the internet like Joomla, WordPress and Drupal etc. Joomla is one of the most popular content management system. Advantage of Joomla is that a complete website can be built without any programming skills and within a short period of time. This paper reviews Joomla and describes the methodology to build a website for an educational institute using it. The website will provide facilities like viewing information regarding the courses, teachers, time-table, sharing of information among the students, student’s login account, chat, important contact details, submission of IT and office related complaints, notice, downloading of various documents like leave application, examination forms, syllabus etc.

Full Paper

IJCST/51/1/A-1842
    9 An Approach to Recognize Characters based on Back Propagation Using Neural NetworkNeha Sharma, Neeraj Dahiya

Abstract

In this paper we propose an approach to recognize Handwritten English characters and digits using Multilayer Perceptron with one hidden layer. The feature extracted from the handwritten character is Fourier Descriptors. The use of artificial neural network in applications can dramatically simplify the code and improve quality of recognition while achieving good performance. Another benefit of using neural network in application is extensibility of the system ability to recognize more character sets than initially defined. Most of traditional systems are not extensible enough. In this paper recognition of characters is possible by using neural network back propagation algorithm.

Full Paper

IJCST/51/1/A-1843
    10 A Study on Some Concepts of Data Warehouses and Data Mining (Case Study of Data Mining for Environmental Problems)Pooja Shrivastava, Dr. Manoj Shukla

Abstract

We live in a world where vast amounts of data are collected daily. Data warehouses and Data mining given the important concepts analyzing such data. In this section we will gain a multidimensional view of data mining and data warehousing. In this paper we introduce a Data mining and Data warehousing some concepts and present a some few methods about this area and discuss case study of data mining for Environmental problems. In research field data mining has made significant progress and Data mining used in a vast array of areas include Biological and Environmental. Only a fewer research have focused on this area but analyzing such data is an important need. So we present how data mining can meet and gives an introduction to data warehouses.

Full Paper

IJCST/51/1/A-1844
    11 An Open Source Approach to Build a Web GIS ApplicationHarpinder Singh, Dheeraj Gambhir

Abstract

Deployment of Free and Open Source GIS (Geographic Information Systems) tools (FOSS-GIS) is increasing day by day. Technical features provided by FOSS software are comparable to their proprietary peers. There is a variety of open source web GIS software available on the internet and they differ on parameters like ease of use, technology, complexity and support etc. In this paper review of open source software combination of MapServer and pmapper has been done. A reader working on Windows platform, with no prior technical web GIS and programming skills can use this simple and easy to use software combination to build a web GIS application within a short period of time.

Full Paper

IJCST/51/1/A-1845
    12 An Energy Saving Embedded System For LightsArun Radhakrishnan

Abstract

Recently, many researches have been carried out to save the energy in many aspects such as producing a device which consumes very less energy or designing a system which helps to reduce the power consumption using the existing devices. An Embedded System can be designed to control and to maintain enough lighting in a room which is named as an automatic Light Management System (LMS) based on a real time clock, a Light sensor and a PIR sensor. This system will be able to provide the necessary intensity of light on various timings and environmental conditions with satisfaction of users and will save a large amount of energy also. The system will follow an algorithm in order to check whether any occupants are there in the room and if any occupants are there, then it will check the current time in that particular area and it will identify whether it is day or night. Based on the time it will decide whether the light has to be turned ON or not. Sometimes enough lighting will not be there even during the midday due to less sunshine. To overcome this problem our system is incorporated with a light sensor and this parameter will also be considered to switch ON the lights. Our proposed system can promise to minimize the energy consumed for lighting in a room and to provide it efficiently with user satisfaction.

Full Paper

IJCST/51/1/A-1846
    13 A Performance Comparison between Rule Based and Association Rule Mining Algorithms in Extracting Knowledge from Stock Market DatabaseRahul Thakkar, Rustom Morena

Abstract

Generating rules with higher accuracy for stock market databases can be done using different techniques of data mining. It is always difficult to select the appropriate data mining algorithm for the specific database, there can be many algorithms through which rules can be generated but it is always a problem to get rules with higher accuracy. Research mainly emphasizes on selecting appropriate algorithm for mining intraday stock market data. Researcher gets the best rules with higher accuracy after comparing the rules generated from classification and association rule mining algorithms. Database contains the records (Attributes: open, high, low, close, volume) on one minute basis for companies listed in NSE from January 2008 to January 2013. In terms of accuracy it is observed that Apriori is a better choice as compared to ID3 and C4.5 for rule based mining task on studied database.

Full Paper

IJCST/51/1/A-1847
    14 Dynamic Life Time Management for Wireless Sensor NetworkK.R.Senthilnathan

Abstract

In wireless sensor networks, a host may exhaust its power or move away without giving any notice to its cooperative nodes, causing changes in network topology, and thus, these changes may significantly degrade the performance. The key challenge in the design of wireless sensor networks is maximizing their lifetime. Since, how to prolong the lifetime of wireless sensor networks is an important issue in designing environmental monitoring applications. A technique is proposed to evaluate the node lifetime prediction and the link lifetime prediction utilizing the dynamic nature. During data gathering, sensors have the ability to perform in network aggregation of data packets en-route to the base station. RNG is a sparse connected overlay network which is defined based on local information at each node, which includes distance to each neighbor. Each sensor node predicts the values of the data to be sensed according to its recorded historical information. When getting the sensory data, the node compares it with the predicted data. The simulation results show that the proposed technique outperforms previous methods to maximize network lifetime.

Full Paper

IJCST/51/1/A-1848
    15 An Analysis of Covert Techniques Used by Malicious SoftwareAsha Devi, Gaurav Aggarwal

Abstract

There are a number of covert launching techniques.But the most popular one is process injection.Process injection is a technique which inject malicious code into another running process and that process execute that malicious code. This technique conceals malicious behavior of their code and may bypass firewalls and other process-specific security mechanisms. Certain Windows API calls are commonly used for process injection. For example, the VirtualAllocExfunction can be used to allocate space in a remote process’s memory, and WriteProcessMemorycan be used to write data to that allocated space.

Full Paper

IJCST/51/1/A-1849
    16 Investigating the Correlation Between DFA and FD in the Non-Linear Analysis of Heart Rate VariabilitySubhojit Sarker, Ankur Ganguly, D.N. Tibarewala

Abstract

The Heart Rate Variability signal (HRV) measures the spontaneous variability between successive beats, as they are revealed by the presence of an R wave in the Electrocardiographic ECG signal. Recent researches on HRV have suggested that besides traditional Linear analysis techniques, the Non-Linear parameters can also provide valuable information for the physiological interpretation of heart rate fluctuations. The paper focuses on a comprehensive characterization of HRV using Fractal Dimension (FD) which is computed using two different methods. First, the intrinsic relation between Detrended Fluctuation Analysis, Power Law Index and Fractal Dimension is utilized to determine the value of FD. In the second approach, the results obtained using the proposed method is established by computing the value of Fractal dimension using a standard approach as proposed by the Higuchi’s algorithm. The aim is to establish the proposed method as a standard one for computing Fractal dimension and associate it with other existing well-defined FD computation techniques. Current study amongst male and female subjects leads us to identify non-linear HRV measures that may provide powerful insights into cardio-autonomic activity.

Full Paper

IJCST/51/1/A-1850
    17 Reduction of Overhead Caused by Enhanced Adaptive Acknowledgement With Broadcast Algorithm for Mobile Ad-Hoc NetworksKavitha.S, Bharathi.E

Abstract

The self configuring mechanism causes several issues in MANET, such as energy utilization, secure routing and node authentication. Security challenge is a primary concern in MANET to provide secure communication. Based on this case, it is very important to develop efficient intrusion-detection mechanisms to protect MANET from attacks. In this paper we propose a new algorithm which reduces the computational overhead of Enhanced Adaptive Acknowledgement and provides energy efficient secure routing in MANET. The proposed scheme reduces the bandwidth overhead caused by extra data with EAACK making up the network as congested and increases in packet delivery ratio of the protocol with secure routing.

Full Paper

IJCST/51/1/A-1851
    18 Efficiency Analysys Using XTC Algorithm in Multicasting Ad-Hoc NetworksSeeni Selvi.T, D.Nethra Pingala Suthishni

Abstract

In modern networks, data are transferred using packet switching. Messages are broken into units called packets, and sent from one computer to the other. At the destination, data are extracted from one or more packets and used to reconstruct the original message. Each packet has a maximum size, and consists of a header and a data area. The header contains the addresses of the source and destination computers and sequencing information necessary to reassemble the message at the destination. Density is the number of network nodes per unit area. For a given transmission range as density increases each node gets a smaller fraction of the channel for itself On the other hand the average number of hops for each packet decreases The decrease in path length however is linear in the transmission range whereas the increase in number of nodes contending is quadratic in the range and so one expects that an increase in density would result in reduced capacity after a certain point. XTC algorithm is chosen to reduce the network density and hence simulated. The Ad-hoc network using XTC provides a confirmed data transmission without any loss of data despite any sort of hindrances.

Full Paper

IJCST/51/1/A-1852
    19 Design and Implementation of SHA2 IP Core for Lightweight ApplicationsDhanishKarunan, Minu R Raju, Ananthu R Krishnan, Nandakumar.R

Abstract

Protecting a system against intrusion and data theft requires it to provide appropriate levels of both design security and data security. To achieve this, an efficient crypto system should be employed in the design of embedded systems. In this paper, the design and implementation of a crypto hash SHA-256 logic core suitable for embedded environment in reconfigurable hardware is presented. It also discusses the various applications of the design in the embedded areas. Verilog HDL was used to model the hardware. With the Crypto SoC implemented in Altera Cyclone II FPGA running on 50 MHz system clock, a throughput of 560 Mbps was obtained for the SHA-256 core.

Full Paper

IJCST/51/1/A-1853
    20 Modelling, Analysis and Optimization of Web Based Service Adaptation: A ReviewP John Augustine, Dr. K.Bommanna Raja

Abstract

The rapid rises of the smart phone industry in the global market has paved platform for various changes in the field of web sites and web applications. Since these devices are capable of viewing web sites there is a need of mobile compactable websites and there are wide possibilities in web based industry there are also various technologies to develop web application, such as Wap, Web2, Html5, Android etc. But in the web already there are many numbers of websites in-service and ready to access; there is also an optional method to convert the website into a mobile compactable site. Hence in this paper, we have analyzed the methods of converting the existing website to a mobile compactable website and various processes in developing responsive websites.

Full Paper

IJCST/51/1/A-1854