IJCST Logo

International Journal of Computer Science and Technology
Vol 6.1 ver – 2  (Jan to Mar, 2015)

S.No. Research Topic Paper ID Download
23

On-Demand Dynamic Frequency Allocation to Serve Drop Calls in Cellular Mobile Networks

Narayan Patra, B N Bhramar Ray, Shakti Prasad Mohanty

Abstract
The most challenging task of managing Frequency Division Multiple Access (FDMA) based cellular networks is to allocate the frequencies to the cells efficiently. In practical scenario, the number of frequencies that are available for allocation to the cells is finite. As a result the system could not satisfy the requirements of the cells as per their demands. As a result, some of the new calls drop due to the lack availability of free frequencies. In this paper, an on-demand dynamic frequency allocation algorithm is roposed and investigated. This method is also used to determine amount of drop calls and its probability.
Full Paper
IJCST/61/1/A-0420
24

Robust Defence against XSS through Context Free Grammar

Divya Rishi Sahu, Deepak Singh Tomar

Abstract
JavaScript is one of the world’s most widely adopted scripting languages among web developers. It is intended to provide enhanced user interface. On the other hand, researchers acquired that commonly used browser such as Chrome, Firefox, IE, etc. suffers from JavaScript bugs. Snippets written in JavaScript may also suffer from Cross Site Scripting potential security threat due to the security unconsciousness of developers. Cross Site Scripting occurs due to the injection of snippets such as JavaScript through the input field of web applications.
Full Paper
IJCST/61/1/A-0421
25

Climbable Face Image Retrieval From Sparse Impute

Vandana K. Shinde

Abstract
Social websites are popular due photo sharing facilities. People are interested in uploading there images on networks. Thus the photos get increases on network, large-scale content based face image retrieval is faciliting technology for many emerging application. In this attributes gets detected automatically which contain semantic cues of face images to improve content based image retrieval. For improving content based image retrieval two methods are used attributes enhanced sparse coding and attributes embedded inverted indexing in online and offline stage. This method gives more than 43.5% improvement over the current system.
Full Paper
IJCST/61/1/A-0422
26

RFID and EPC as key technology on Internet of Things (IoT)

Mohsen Hallaj Asghar

Abstract
The term Internet of things describes the global things which everything, including inanimate objects, has their own independent digital identities allowing computers to organize and manage them. With the increasingly widespread innovations in computer, every day we observe more efforts of academe, industry to optimize the use of RFID technology along with other technologies such as sensor technology.
Full Paper
IJCST/61/1/A-0423
27

Leakage-resilient Cryptosystem With Efficient and Flexible Key Delegation in Scalable Cloud Storage

V. Chandra Sreedevi, Ch. SitaKameswari

Abstract
Cloud computing technology is widely used so that the data can be outsourced on cloud can accessed easily. Different members can share that data through different virtual machines but present on single physical machine. But the thing is user don’t have physical control over the outsourced data. The need is to share data securely among users. The cloud service provider and users authentication is necessary to make sure no loss or leak of users data. Privacy preserving in cloud is important make sure the users identity is not revealed to everyone. On cloud anyone can share data as much they want to i.e. only selected content can be shared. Cryptography helps the data owner to share the data to in safe way. So user encrypts data and uploads on server. Different encryption and decryption keys are generated for different data.
Full Paper
IJCST/61/1/A-0424
28

Framework for Automatic Examination Paper Generation System

Ashok Immanuel, Tulasi.B

Abstract
Knowledge has considerable impact on functioning of society. Information and knowledge are two main pillars on which progress of mankind stands. To create competent citizens educational institutions play a pivotal role and they need to reinvent the process of teaching learning to achieve it. One of the means of identifying the impact of teaching learning is assessment. Assessment plays a pivotal role in complementing the learning process. With the evolution of technology, the assessment methodologies also have been transformed. Greater blending of technology into teaching learning process is inevitable. Standardization of test papers has always been an issue of concern. Assessment should be designed to test a learner on various aspects of learning. A manual approach for designing a test paper would not be able to cater to this requirement. An automated approach would allow the process of designing test paper to be more efficient and effective. It would also facilitate in generating a database of questions which could be further categorized for homogenization of test paper. This paper proposes a framework to automate summative test papers.
Full Paper
IJCST/61/1/A-0425
29

Comparison of Data Duplication Algorithms

Madhuri Mane, Dr. V. R. Ghorpade

Abstract
Record matching, which identifies the records that represent the same real-world entity, is an important step for data integration. Most state of the art record matching methods are supervised, which requires the user to provide training data. The detection of similar duplicate records is a difficult task, especially when the records are domain independent. Unfortunately, domain knowledge is not always available. Moreover, domain-specific methodologies apply only for some particular domains, and the rules developed for one domain often do not hold for different domains. Nevertheless, currently so many different domains exist that the need for domain-independent research is undeniable. Although dealing with domain-independent techniques for similar duplicate record detection in database has received attention over the last few years.
Full Paper
IJCST/61/1/A-0426
30

Evolution of World Wide Web: Journey From Web 1.0 to Web 4.0

Pranay Kujur, Bijoy Chhetri

Abstract
The fast lane toward the development of Web is coined to be as an outright phenomenon in the today’s society with incorporated use of modern innovative technology and redefining the way of organizing, communicating and collaborating with individual which in terms lead us to mixture of spectacular successes and failures. The purpose of this paper is to understand and conceptualize the evolution of Web from the scratch to the upcoming trends in the field of Web Technology.
Full Paper
IJCST/61/1/A-0427
31

Wireless Sensor Networks – Scalability and Performance Issues: A Review

Noufal K.P

Abstract
A Wireless sensor Network is an organized collection of a large number of small nodes with a capability of sensing, measuring and computing. These networks are mostly used for tracking, monitoring and controlling. The WSNs collect information from unattended locations and disseminate information to a specific user depending on the requirement. Data are routed amongst the nodes by using an appropriate routing technique. A number of factors affect the design of the routing protocols. Scalability one such important factor which influence the routing protocols. Scalability is that increase in the number of nodes after the WSN was established. Whether or not the WSN support the expansion is a very important factor in the design of the protocol. The routing protocols consider the sensor node characteristics in the design of the protocols. A routing protocol is said to be good when it is scalable and adaptive to the changes made in the topology. The protocols must work intact even though the size of network grows and the workload is increased.
Full Paper
IJCST/61/1/A-0428
32

TinyOS: An Operating System for Wireless Sensor Networks

Praveen Budhwar

Abstract
TinyOS is an open-source, flexible and application-specific operating system for wireless sensor networks. Wireless sensor network consists of a large number of tiny and low-power nodes, each of which executes simultaneous and reactive programs that must work with strict memory and power constraints. The wireless sensor network’s challenges of event-centric concurrent applications, limited resources and low-power operation impel the design of TinyOS. TinyOS meets these challenges and has become the platform of choice for sensor network research. It is very prevalent in sensor networks these days and supports a broad range of applications and research topics.
Full Paper
IJCST/61/1/A-0429
33

Study of Role Based Joint Threshold Key Generation With System Hardware ID Verification for Data Security

Aishwarya Swaminathan, Divya Ulaganathan

Abstract
Individual reply for malicious revealing system is answerable for providing appropriate reply to an abnormal petition. We put forward database response object in intention to sustain our invasion response system for Relational database (RDBMS), contains lot of administrators to control every table. Individual admin is explicitly allowed to control their table only. If the administrator’s identification word is slashed, then malicious modification of data and data theft can be done easily in the database. Our analogue response object language make it very simple for database administrator to state suitable reply for various situation depending upon the nature of abnormal petition.
Full Paper
IJCST/61/1/A-0430
34

Fuzzy Pattern-Based with Laplacianfaces Biometric Pattern Matching Algorithm for Face Recognition

Ajit Kumar Tiwari, Shrikant Lade

Abstract
In face recognition system, the efficiency and face detection rate is the key issue for designing the algorithm because the computer can recognize very large number of faces with high computational speed but it is not as efficient as human. There are many modern face recognition algorithms which efficiently detect face but also have false recognition. In this paper, we propose a new hybrid algorithm and method FPBL (Fuzzy Pattern-Based with Laplacianfaces) for face detection to enhance the true recognition rate and minimize the false recognition rate. We analyze and compare the performance and results of modern pattern matching and face recognition algorithms like Eigenfaces, Fisherfaces, Laplacianfaces and Fuzzy method with FPBL. The implementation result shows that performance and accuracy of our proposed method gives the efficient and significant face recognition rate compared to other algorithms.
Full Paper
IJCST/61/1/A-0431
35

Emerging Paradigms and Opportunities in Mobile Game Development

Rupali Sunil Wagh, Kavitha R, Neha Shukla, Gorang Gupta

Abstract
Technology advancements in every sphere are reforming our lives. Mobile technology and smartphones particularly has been the biggest game changer. It changed the way we worked, the way we communicated, the way we learned and also the way we played games. Mobile games development is primarily rooted in console or PC based game development approaches. But few specific characteristics of mobile devices can be exploited for truly “mobile” gaming experiences. Technological support in the form of gaming engines is instrumental in providing the required abstraction and framework which resulted into much needed acceleration to the mobile gaming development. Though the increase in the mobile game development market is significant, the success rate of such apps is relatively low. Developing games is not easy and requires entirely different computing paradigms and complex game logic. The paper discusses emerging paradigms, opportunities and challenges in mobile game development.
Full Paper
IJCST/61/1/A-0432
36

Examining Latent Networks and Human Behavior by Mining Online Social Networks

Kumud Jaglan, Dr. Kulvinder Singh

Abstract
Online Social Networks (OSNs) span constituent a singular internet and social development, stirring tastes and behaviors of their users and serving to them to maintain/create friendships. It’s attentiongrabbing to investigate the expansion and evolution of on-line social networks each from the purpose of read of promoting and provide of recent services and from a scientific assurance, since their formation and evolution might share similarities with reallife social networks. Identifying human behavior on social media has wide range of application such as identifying the individual or groups familiarities, views, beliefs etc. This paper is a study on social networks and their analysis techniques.
Full Paper
IJCST/61/1/A-0433
37

Survey of Methods in Medical Image Segmentation

Swati Deendyal, Dr. Sona Malhotra

Abstract
Image segmentation is an important research area because it plays a fundamental role in image analysis, and understanding. Segmenting an image is. S the most challenging and difficult task because there exist different objects and a huge variations between them using a general framework. With the advent of modern publishing technologies, the layout of today’s documents has never been more complex. Most of them contain not only text and background regions, but also graphics, tables and pictures. Therefore scanned documents must often be segmented before other document processing techniques, such as compression or rendering, can be applied. Traditional approaches to document segmentation, usually involve partitioning the document images into blocks, and then classifying each block.
Full Paper
IJCST/61/1/A-0434
38

Tertiary Incentive For Data Transmission Using Switches

L. Sesha Gopal, Ravi Prakash, Abraar.S

Abstract
Load-Balancing switch is a simple architecture and have high forwarding bandwidth. The original Load-balancing switch has mis-sequencing problem which hinders the performance of underlying TCP applications. This problem has been solved at the cost of either algorithmic complexity or special hardware requirements. In this paper we introduce three stage load balancing switch architecture to solve this mis-sequencing problem. It achieves a high forwarding capacity while preserving the order of packets without the need of costly online scheduling algorithms. ThExternal Outputretical analysis and experimental results show that this three stage load balancing switch provides a transmission delay which can be solved by output queued switch plus a constant, indicating the same forwarding capacity as an output-queued switch. Therefore 100 % throughput has been obtained while using this three stage load balancing switch.
Full Paper
IJCST/61/1/A-0435
39

Intrusion Detection and Severity Analysis in Cloud

Prof S K Wagh, Ankita Nickey, Sagar Uttekar, Rohit Chawla

Abstract
Cloud computing takes the technology, services and applications that are close to those on the internet and turns them into a selfservice utility. Hence, cloud management and security has become an important and growing area of technology. However, Clouds introduce security challenges which need to be addressed to facilitate widespread adoption. This paper underpins the efforts to address one of the important and significant issue of cloud security i.e. intrusion detection and severity analysis in cloud. An integrated intrusion detection and severity analysis model has been presented which is expected to facilitate minimal intrusion response time while preserving the overall security of cloud infrastructure. Moreover, a novel method to address this challenge in accordance with specific requirements for clouds for intrusion severity analysis has been presented.
Full Paper
IJCST/61/1/A-0436
40

Java Coding Ground With Security Editor

I.Surya Prabha, G.Prabhakar Reddy, V. Ramakrishna, Y.Deepika

Abstract
In the present days every one are using internet to make their work easy. In the present days all the things are made online. Everyone are using internet to do their work as early as possible in a easy way. Everything is available in the online. In this paper we discussed about “Java coding ground with security editor”.
In this paper we are also discussed about security editor. This editor perform the encryption and decryption operations on the required fie. In this RSA algorithm is used to perform encryption and decryption. There is a lot of security algorithms, but RSA is very efficient to encrypt and decrypt the file. In this we are going to view all types of java API. It is very useful for writing the java program easily.
Full Paper
IJCST/61/1/A-0437
41

Implementing Artificial Intelligence based DBN Models: An Experimental Analysis

Khaled M. Alhawiti

Abstract
The Deep belief networks (DBNs) are found to be the most prominent techniques, which are being used in natural language understanding. Natural language understanding has become one of the greatest priorities for businesses, particularly for call centers and customer services sector. It has been observed that various traditional classifiers have been adopted by the businesses, including maximum entropy (MaxEnt), boosting, support vector machines (SVMs). These techniques or traditional classifiers are not found to be effectual, in terms of their accuracy and reliability. However, the emergence of deep belief networks are considered as the most effective and integrated approaches, which are proved to provide higher accuracy. This study has helped in examining the accuracy of all of these approaches by conducting an experiment.
Full Paper
IJCST/61/1/A-0438
42

Transitioning to IPV6

Pulkit Gupta, Satyateja Pothuru, Sathvik Reddy, Srinivas Devineni, Rajeev Reddy, 6Amit Sharma

Abstract
Internet is moving from IPv4 to IPv6. Due to increasing number to users every day, IPv4 is facing the problem of address exhaustion. IPv4 Internet is handling more number of people than it was designed to handle. IPv4 has outgrown. So now we need to make a transition to IPv6 as it has become a necessity. But due to some reasons, the deployment of IPv6 has been happening at a slow rate. This paper explains and provides information about the transitioning to IPv6 from IPv4. The paper also explains about IPv4 and IPv6 with their features and also explains the short comings or the reasons due to which this transition became a necessity. It also discusses the advantages of IPv6. In the end, it explains the different mechanisms that are specified by IETF for transition of IPv4 to IPv6 and the merits and demerits for the same.
Full Paper
IJCST/61/1/A-0439
43

Enhanced Agent Based Scheduling & Monitoring System in Cloud Computing

Sonali Agrawal, Deepak Choubey

Abstract
Scheduling and monitoring is the main challenge in cloud computing paradigm. Various methods have been proposed but they have their own pros and cons. The main challenge is distributive nature of the cloud computing that create the problem to implement the proper scheduling of the service (mainly SaaS) and their efficient monitoring. Various users have access the service of the cloud simultaneously and scheduling monitoring of at the same time is bit challenging. Proposed system has adopted the idea of software agent to gain the high efficiency in the same direction (scheduling and monitoring).This article presents the method for computing number of resources used and the solution for better elasticity and their efficient monitoring of the resources in the cloud which helps to gather analytical statistics of the resources currently held and will be used such a memory, number of instances and CPU. Proposed mechanism has influences from the working of Aneka framework. For evaluation of the proposed work, the components has been used, first the data set which is the web application (jsp) developed for testing in cloud environment.
Full Paper
IJCST/61/1/A-0440
44

Quality of Service and Performance in Wireless Sensor Networks: A Study

Noufal. K.P.

Abstract
Quality of Service (QoS) is challenging aspect of Wireless Sensor Networks. Wireless Sensor Networks are required to provide different levels of Quality of service depending on the nature of application. QoS is an interesting feature of the WSNs because of the restricted resources like power backup, processing speed and memory etc. Some of the routing protocols available for WSNs are aware of the QoS. The QoS performance is evaluated at two levels one at the node level and the other at the network level. In the node level, the features like single node energy consumption and life time are analysed. In the network level end to end delay and network life time are analysed.
Full Paper
IJCST/61/1/A-0441
45

Application Migration over the Cloud With High Performance and Reliability

Yogita Kastor, Prof. Deepak Choubey

Abstract
Cloud Computing has been discussed and researched majorly in areas of security, performance, application management & deployment, Virtual Machine Migration etc. Along with these rominent researches it also needs to focus on application migration with reliability over the cloud. This is needed for fault tolerance in applications and keeping the high performance related application on same virtual machine. A proactive migration of applications according to the various parameters helps the users of the cloud to work smoothly with least delay.
Full Paper
IJCST/61/1/A-0442
46

NeuroDSO:A hybridized Artificial Neural Network For Data Classification

Soumya Sahoo, Bijayalaxmi Panda, Sovan Kumar Patnaik

Abstract
A Directed Searching Optimization algorithm (DSO) algorithm basically includes two important operations position updating and genetic mutation. Position updating finds the way for the non-best solution vectors to move towards the best one, which is beneficial to the convergence of the DSO and genetic mutation increases the diversity of individuals, which is beneficial to preventing the premature convergence of the DSO. We know that the objective of classification is to analyze the input data and to develop an accurate model for each class using the features present in the data. In this paper we have proposed a hybrid model called Neuro DSO approach which is classifying 3 data sets Iris, Wine and Habermann. Experimental results indicate that the proposed algorithm gives better classification results than only classifying through ANN.
Full Paper
IJCST/61/1/A-0443