IJCST Logo

 

INTERNATIONAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY (IJCST)-VOL V ISSUE I, VER. 2, JAN. TO MAR, 2014


International Journal of Computer Science and Technology Vol. 5 Issue 1, Ver. 2
  S.No. Research Topic Paper ID
    21 Unethical Motives and the Management of Knowledge

Asm SAYEM

Abstract

This paper argues for a situationist understanding of the role and context of IS (Information Systems) development. Social philosophers’ analysis of ‘the machine’ and its dynamics indicate a mechanism of entrapment of human activity, to which information systems developments are uncritically referenced. Debord’s concept of the Spectacle is found helpful in analysing this and it is our contention that Information Systems development is one of the Spectacle’s most powerful contemporary mechanisms for self-preservation. Established power structure guarantee the maintenance of this, and the questions arises as to whether truly emancipatory developments are possible without a radical philosophy.
Full Paper

IJCST/51/2/A-1855
    22 Mobility Models and Performance of MANET Routing Protocols: A Review

Prabhdeep Singh, Gurpreet Singh

Abstract

Mobile ad hoc networks are self-organizing networks composed of independent mobile nodes. All mobile nodes act as router as well as hosts. The most important characteristic of MANETs is their dynamically changing topology. This characteristic has a huge impact on the performance of various MANET routing protocols. Thus, in order to efficiently calculate the performance of various MANET routing protocols, we need efficient mobility models to mimic the dynamically changing topology of MANETs. In this paper we are presenting a survey of three different types of Mobility Models and the performance of various MANET routing protocols with these mobility models.

Full Paper

IJCST/51/2/A-1856
    23 Detecting Idle Nodes in Distributed Systems For Load Balancing

Dr. Latha C A

Abstract

Load balancing is an important objective of a distributed system. To achieve that, idle and overloaded computers are to be identified. Due the dynamic nature of the system, there is a constant need to know about the status of each of the computers. The proposed work considers the thresholds of both sender and receiver nodes. The algorithm expects the computers to be logically connected in the form a ring. A token designated as idle token represents the idle status of the beholder node. Receiving the details of the idle computer, the overloaded computer will try to share its load with idle computer and get back the results. This is continued until either or both of them become moderately loaded.
Full Paper

IJCST/51/2/A-1857
    24 Limitation Associated with Wireless Sensor Network

Vipin Sharma

Abstract

In the recent years there has been growing interest in providing fine-grained metering and control of living environments using low power devices. Wireless Sensor Networks or WSN which consist of spatially distributed self-configurable sensors, perfectly meet the requirement. The intent of this paper is to investigate the drawbacks that are associated with the wireless sensor networks. Here, we mainly focus to identify the disadvantages of sensor node along with its limitations.
Full Paper

IJCST/51/2/A-1858
    25 Utilizing the TETRA Standards for Intercom Within a Campus

Pallob Baidya, Siladitya Sen

Abstract

In present days the Terrestrial Trunked Radio (Tetra) standards are mainly used in Emergency services like Police force, Fire department, Ambulance, Rail transportation etc. Researches shows that the voice quality of this standards are better than that of the GSM standards. In this paper a idea of utilizing the TETRA standards for communication within a campus(mainly Institutional) is shown. There are so many advantages we can get by this standards.
Full Paper

IJCST/51/2/A-1859
    26 Time Constrained Data Destruction in Cloud Using an Active Storage Object

S.Christina Suganthi Monica, M. Subasini

Abstract

Personal data stored in the Cloud may contain account numbers, passwords, notes, and other important information that could be used and misused by a miscreant, a competitor, or a courtof law. These data are cached, copied, and archived by Cloud Service Providers (CSPs), often without users’ authorization and control. A Time constrained data system are been used to help the data by protecting it, by destructing the data after the specific timeout . In addition, the decryption key is also destructed after the user-specified time. In the proposed system ,we present, a time constrained data system that meets this challenge through a novel integration of cryptographic techniques with active storage based model .Time constrained data system are used to meet all the privacy-preserving goals. Compared to the system withouttime constrained data mechanism, throughput for uploading and downloading with the proposed timeout data acceptably decreases by less than 72%, while latency for upload/download operations with time constrained data mechanism increases by less than 60%.
Full Paper

IJCST/51/2/A-1860
    27 Qualitative Analysis on Log-Normal Indoor Propagation Model for WLAN

Shivashish Chakraborty, Siladitya Sen

Abstract

WLANs have gained strong popularity in various applications including health care, retail, manufacturing, academic areas etc. To know the behavior of WLAN properly, there are several indoor propagation models already exists. In this research paper we have used the log-normal propagation model to compare the Received signal strength which was measured inside a corridor of a building and calculations were done using the prediction software. The measurement results are compared to the calculations on several key points.
Full Paper

IJCST/51/2/A-1861
    28 Enhancement of Accuracy of ANN Data Mining Algorithm for Protein Classification Based on Architecture Optimization

Nandika Salwan, Jasmine Kaur

Abstract

Protein Classification is a very important aspect of Bioinformatics and no one has yet optimized the Architecture of Artificial Network Based Technique for protein classification. So there is a need for changing the architecture of ANN to increase the effectiveness of ANN for protein classification.
Full Paper

IJCST/51/2/A-1862
    29 Implementation issues of Improving Book OCR by Adaptive Language and Image Models on Mobile Devices

Mohammed Abdul Huq, GVNKV SUBBA RAO

Abstract

In order to cope with the vast diversity of book content and typefaces, it is important for OCR systems to leverage the strong consistency within a book but adapt to variations across books. In this work, we describe a system that combines two parallel correction paths using document-specific image and language models. Each model adapts to shapes and vocabularies within a book to identify inconsistencies as correction hypotheses, but relies on the other for effective cross-validation. Using the open source Tesseract engine as baseline, results on a large dataset of scanned books demonstrate that word error rates can be reduced by 25% using this approach.
Full Paper

IJCST/51/2/A-1863
    30 ECG Signal Denoising Based on Ensemble Averaging Method

N.Jagadesh Babu, G Naveen Reddy

Abstract

In this paper we proposed a method EAM (Ensemble Averaging Method) for noising reducing in ECG. Noise occurs especially from power line interfaces and electrodes.Ensemble Averaging Method ECG requires averaging of several cardiac cycles to be performed, no prior time reference is available for heart beats Information from the last cycle was stored the sum was divided by the total number of cycles in the sample and this ensemble average was presented to the graphics terminal display and stored for later analysis. Ensemble averaging provides some improvement in the stability of the signal and signal to noise ratio under conditions of non periodic influences of respiration and motion. Averaging reduces noise variance and thus more accurate signal estimates can be achieved. Ensemble averaging relies on the assumption that the noise is uncorrelated from Evoked Potential to Evoked Potential. No information is included that reflects the degree to which successive samples in an EP are correlated. Hence the noise level is reduced by averaging, while the stimulus-related Evoked Potential remains unchanged.
Full Paper

IJCST/51/2/A-1864
    31 Fractional Integro Differential Equation and Spectral Relationships

M. A. Abdou, M.A.Elsayed

Abstract

In this article, the authors established the sufficient conditions for the existence of a unique solution of the nonlinear fractional integral equation (NFrIE) of the third kind in the Hilbertspace. These conditions are established in view of the Spectrum Relations (SRs) of a linear self adjoint operator and other spectral parameters. Many special and new cases are considered. Moreover, numerical results are obtained and the error estimate, in each case, is computed.
Full Paper

IJCST/51/2/A-1865
    32 Black Hole Attack Solutions in Mobile Ad-Hoc Networks: A Survey

Devang S. Patel, N. D. Mehta

Abstract

A Mobile Ad-Hoc Network (MANET) is an autonomous network that consists of mobile nodes that communicate with each other over wireless links. In the absence of a fixed infrastructure, nodes have to cooperate in order to provide the necessary network functionality. MANET is particularly vulnerable to security threats due to its fundamental characteristics such as open medium, dynamic topology, distributed cooperation and constrained capability. Due to the inherent characteristics, MANET is unprotected to various types of security attacks. Black hole is one of these attacks in which a malicious node announces the fresh and shortest path to a destination node and then drops/discards all data packets that subsequently go through it. Many researchers have proposed different techniques for preventing and detecting this attack. In this paper, we have surveyed and discussed the existing solutions to black hole attacks in mobile ad hoc networks.
Full Paper

IJCST/51/2/A-1866
    33 Data Security and Privacy Protection Issues in Multi Cloud Computing Environment

G.Ashok Kumar

Abstract

Cloud computing characteristics include a ubiquitous (networkbased) access channel; resource pooling; multi tenancy; automatic and elastic provisioning and release of computing capabilities; and metering of resource usage (typically on a pay-per-use basis). Virtualization of resources such as processors, network, memory, and storage ensures scalability and high availability of computing capabilities. Clouds can dynamically provision these virtual resources to hosted applications or to clients that use them to develop their own applications or to store data. Rapid Provisioning and dynamic reconfiguration of resources help cope with variable demand and ensure optimum resource utilization.
Full Paper

IJCST/51/2/A-1867
    34 A Novel Discriminant Non Negative Matrix Factorization Method For Perceptual Image Hashing

M. Subasini, S. Christina Suganthi Monica

Abstract

This paper designs an efficient image hashing based on non-Negative Matrix Factorization (NMF), which is with both the rotation robustness and good discriminative capability. It is a novel construction of rotation-invariant secondary image, which is used for the first time in image hashing and helps to make image hash resistant to rotation.NMF coefficients are approximately linearly changed by content-preserving manipulations, so as to measure hash similarity with correlation coefficient. Our experiments show that the proposed hashing is robust against content-preserving operations, such as image rotation, JPEG compression, watermark embedding, Gaussian low-pass filtering, gamma correction, brightness adjustment, contrast adjustment and image scaling. And also we implement the watermarking in the image. Receiver Operating Characteristics (ROC) curve comparisons are also conducted with the state of- the-art algorithms, and demonstrate that the proposed hashing is much better than all these algorithms in classification performances with respect to robustness anddiscrimination.
Full Paper

IJCST/51/2/A-1868
    35 Gesture Recognition: A Review

Mital Upadhyay, Vaishali Kalariya

Abstract

In a Human Computer interaction application to detected Gesture of human body part and according to computer work without touch any hardware part. Gesture recognition pertains to recognizing meaningful expressions of motion by a human, involving the hands, arms, face, head, and/or body. It is of utmost importance in designing an intelligent and efficient human–computer interface. The applications of gesture recognition are manifold, ranging from sign language through medical rehabilitation to virtual reality.
Full Paper

IJCST/51/2/A-1869
    36 Real Time Object Tracking Based on Inter-frame Coding: A Review

Shraddha Mehta, Vaishali Kalariya

Abstract

Inter-frame Coding plays significant role for video Compression and Computer Vision. Computer vision systems have been incorporated in many real life applications (e.g. surveillance systems, medical imaging, robot navigation and identity verification systems). Object tracking is a key computer vision topic, which aims at detecting the position of a moving object from a video sequence. The application of Inter-frame Coding for low frame rate video, as well as for low resolution video. Various methods based on Top-down approach just like kernel based or mean shift technique are used to track the object for video, So, Inter-frame Coding algorithms are widely adopted by video coding standards, mainly due to their simplicity and good distortion performance for object tracking.
Full Paper

IJCST/51/2/A-1870
    37 Cross Platform Mobile Cloud Based App Development Using Titanium

A.Manavendranadh Roy, Dr. P.Harini

Abstract

The project investigates the benefits and drawbacks of developing cloud based cross-platform mobile application using the Titanium mobile framework. There have been multiple mobile development platforms exist to develop cloud based apps, but this project is unique in developing a cloud based backend mobile app using Open Source Titanium Framework, which enables us to develop and deploy apps for Android, IOS, Blackberry and Mobile web with maximum amount of code shared between the platforms. The compatibility of the application on any tablets is not tested. In this project I will focus on developing an Online Shopping system using cloud based services. The project will explain the core features of Titanium mobile framework and the data integration techniques with cloud storage as backend. A working mobile application will be demonstrated in the Google Android Emulator/device and Apple IOS simulator/device. In our project we develop a cross platform mobile application and then connect to the cloud and then packaging and running the application in popular mobile phone simulators.
Full Paper

IJCST/51/2/A-1871
    38 A Comparative Study of Various Data Encryption Techniques in Cloud Computing

Nidhi Grover

Abstract

Cloud computing is a new revolutionary model that enables easy on-demand access to a shared set of computing resources such as storage structures, network support, services, software, applications etc. Cloud provides all resources as a service that can be accessed remotely over the internet. It offers numerous advantages such as location independence, reduced cost, increased efficiency, high scalability and computing capability. At the same time cloud data is more vulnerable to attacks from various attackers leading to loss of data privacy, confidentiality and data integrity. Many data encryption algorithms have been proposed to preserve confidentiality of user data in cloud architecture. In this paper some of the most popular encryption algorithms such as AES, DES, RSA and Blowfish have been discussed. A comparative study of these algorithms has been presented in this paper.
Full Paper

IJCST/51/2/A-1872
    39 Survey Paper on Music Browsing

Saba Mohammadi, Supreethi K.P

Abstract

Music browsing can be done efficiently and much faster by using a technique that automatically generates music image that matches the lyric contents. Text mining technique is used for structuring the input text which is music lyrics to obtain a structured music image as output on consumer electronic devices. Scene knowledge is used to extract scene theme from the lyrics and create a scene score and object score which is synthesized to represent a music image. Image synthesis is used to create sound from pictures.
Lossless processing of sounds based on images can be done by just transforming their images into lyrics.
Full Paper

IJCST/51/2/A-1873
    40 A Secure Key Distribution and Management Scheme for Neighborhood Area Network in Smart Grid

Halim Halimi, Aristotel Tentov

Abstract

Cyber security for smart grid communication systems is one of the most critical requirements in smart grid. To secure the network communication for the smart grid, it is important that a secure key distribution and management scheme is needed. In order to achieve data confidentiality, privacy, and authentication in AMI, various crypto algorithms are used, such as demand key distribution and management schemes. Investigation on properly designed key distribution and management scheme for securely gathering both individual and aggregated meter’s readings is one of the critical requirements. The focus of this paper is the secure key distribution for smart grid. In this paper, we propose a new key distribution and management scheme, which uses identification scheme of Wu – Hsu and tailored to smart grid. We also give the scheme for key update/freshness and key revocation. Specifically, a group ID based mechanism is proposed to establish the keys for a large amount of users with small overload.
Full Paper

IJCST/51/2/A-1874
    41 Comparative Study of Various Enhanced K-Means Clustering Algorithms

Shruti Aggarwal, Parminder Singh

Abstract

Clustering is an unsupervised learning technique used to place data elements into related groups without advance knowledge of the group definitions. Among various types of clustering techniques, K-Means is one of the most popular algorithms. The objective of K-Means clustering algorithm is to make the distances of objects in the same cluster as small as possible. In this review paper, we present the K-Means clustering algorithm and enhancements of K-means clustering algorithm given by various researchers.
Full Paper

IJCST/51/2/A-1875
    42 A Survey on Data Mining Techniques used in Higher Education System

S.Nagaparameshwara Chary

Abstract

Now a days we are looking for improving the importance of Higher Education and improve the quality of Higher Education and improvement of student performance in Higher Education. It is very useful the concepts of Data Mining in Higher Education system. Data Mining techniques are analysis tools that can be used to extract meaningful knowledge from large amount of data. It can be used as a decision support tool for a higher educational system to develop a Data Mining system.
Full Paper

IJCST/51/2/A-1876
    43 Clustering Based Routing Protocols in WSNs: A Review

Jaskaran Singh, Gurpreet Singh

Abstract

This paper consist a review on the major problem of network lifetime with the WSNs. Due to restricted battery time of nodes, utilization of the energy in efficient manner found to be major
constraint in WSNs. Therefore the principle emphasis of the current work is to discover the different methods to diminish the energy consumption problem. Many researchers have projected
several kinds of the protocols to improve the network lifetime supplementary. The general objective of this paper is to assess the gaps in existing techniques of WSNs. This paper has estimated the problems which have been mistreated in the field of the WSNs.
Full Paper

IJCST/51/2/A-1877
    44 Tabu Artificial Bee Colony Algorithm Based Record Deduplication in Data Mining Approach

Lalitha.L, Sivaparthipan C.B, K.Sathyaseelan, Dr. Kalaikumaran.T

Abstract

Deduplication is the key operation in data integration from multiple data sources. To achieve higher quality information and more simplified data representation, data preprocessing is required. Data cleaning is one among the data preprocessing steps. Data cleaning includes the process of parsing, data transformation, duplicate elimination and statistical methods. If two records represent the same real world entity then it is called duplicated records. The problem of detecting and eliminating duplicate records is called record deduplication. This paper presents a new combination algorithm called Tabu Artificial Bee Colony. It improves the optimization performance in detecting and removing the duplicate records.
Full Paper

IJCST/51/2/A-1878
    45 ZigBee Sensor Network: A Review

Sandeep Kaur, Harinderpal Singh, Amritpal Kaur, Gurjeevan Singh

Abstract

ZigBee is based on IEEE 802.15 standard and specified to use in WPAN using digital radios. ZigBee devices transmit data over longer distances by passing data to the intermediate device. It
is used only in those specified areas which require long battery life, low power, and secure networking and low data rate. There specifications are proposed to be simpler and cheaper than Bluetooth and Wi-Fi. This network has a wide area of applications like in industries, health care, and home automation and in consumer electronics. It also provides security to the network using 128 bit symmetric encryption keys. This paper describes the concept of ZigBee and its applications in detail. First, the architecture of IEEE802.15.4/ZigBee protocols stack and how they work in combined form. Then, we describe the infrastructure level of security mechanism and suggest the name of different software useful in ZigBee wireless sensor network simulation. This review paper is an attempt to provide a systematic understanding of ZigBee, which can be helpful to the researchers.
Full Paper

IJCST/51/2/A-1879
    46 Reaching Rural Population for E-Governance Through E-Panchayat:
A Review Paper

Resham Dhillon, Vijay Laxmi

Abstract

E-panchayat is the lowest tier for rural development. Use of Information Communication Technology (ICT) in e-governance/ e-panchayat is providing fast services to the citizens. These tools make delivery of government services to citizens in transparent and efficiency in effective way. The results of previous studies on E-panchyat show that urban citizens are taking a lot of benefits from these services in comparison to rural population. The rural population is not getting advantages from modern ICT services. There are many reasons for this gap. It has been seen that this difference in utility of ICT services is because of local language problems, lack of awareness of public services and sometimes availability of proper infrastructure. It has been suggested by several scholars that these problems can be overcome by greater participation of the people in awareness related public functions at panchayat level through dedicated ICT services that makes them aware about the proper use of available resources. They should be trained in such a way that knowledge about the government services is shared amongst them. Since rural communities are the closest to bottom level problems.
Full Paper

IJCST/51/2/A-1880