IJCST Logo

International Journal of Computer Science and Technology
Vol 7.1 Ver 2 (Jan – Mar 2016)

S.No. Research Topic Paper ID Download
28

The Possibilities and Chances of Adopting the Sharing Economy Concept in Higher Education in the Gulf Region

Dr. Ashraf Badawood

Abstract
This study sought to establish the possibilities of using the sharing economy concept in institutions of higher education with the aim of improving their operations. The discussion was based on the higher education industry in the Gulf Region, with a focus on the ways that technology can be used to bring out the sharing economy concept. It aimed at establishing the status of higher education in the Gulf region, how the model of sharing economy can be applied to education, the significance of technology in the sharing of educational resources across different geographical locations and among teachers and students, and the benefits of sharing economy in education. In addressing the objectives of this research, a secondary research approach was used. It was considered as being the most ideal due to the fact that a wide range of information could be accessed in a relatively short period of time and on a reduced budget. Based on the findings that were established in the course of this research, relevant recommendations are made.
Full Paper

IJCST/71/2/A-0650
29

Image Processing and Watermark

Dr. Amit Verma, Navdeep Kaur Gill

Abstract
The process of embedding the information into the carrier signal is watermarking. The information that is send should be secure from any unauthorized access. Various watermarking techniques have been proposed earlier but the security of the system was not achieved as required. So in this paper a new method of watermarking is introduced in which the encoding algorithms have been used. Before embedding the data into the carrier signal, the data is firstly encoded with the help of the encoding algorithm .In this approach the Fractal image Compression (FIC) and run length coding(RLE) is used for the data compression. Fractal encoding is a lossy compression method that explores the self-similar property for natural image. Run Length Encoding (RLE) is the lossless compression technique that used for reducing the size of the data. From the results obtained it is concluded that proposed algorithm is better and efficient than the traditional algorithm of the video watermarking as the security of the network is increased.
Full Paper

IJCST/71/2/A-0651
30

Enhanced Cultural Algorithm of Data Mining for Intrusion Detection System

Gurmeet Gill, Prateek Gupta

Abstract
Classification rule mining is a class of problems which is the most sought out by decision makers since they produce comprehensible form of knowledge. The user should be ready to specify the properties of the foundations. The foundations discovered should have a number of these properties to render them helpful. This work proposes to enhance the cultural algorithm by application of ANT clustering mechanism to improve the performance of the system. Simple Ant clustering without cultural algorithm has also been implemented for comparison of the system.
Full Paper
IJCST/71/2/A-0652
31

Analysis of Watermarking Techniques

Dr. Amit Verma, Navdeep Kaur Gill

Abstract
ClaWatermarking is a technique of embedding data or bits of data in a carrier signal. The carrier signal can be any i.e image, video or an audio. The data that is encrypted by employing the watermarking techniques may be visible or non-visible depending upon the type of technique used. The techniques of watermarking have undergone several changed with time and this has improved the efficiency of hidden data which in turn have improved the reliability of the system. Watermarking was done earlier in images for encrypting or hiding data and was used purposely for authentication. It was with the advent of time that watermarking was used for transmitting data securely so that no other user except the authorized person has the access to that data. Image watermarking was done earlier but now video watermarking is also done. The introduction of video watermarking has taken security to higher levels improving reliability to a certain extent. This paper is a review of different video watermarking techniques. The techniques of video watermarking that have been introduced till date are studied and comparison between all of them is made out to find the best efficient technique. The analysis of the results is done and the implementation is done using the MATLAB software.
Full Paper
IJCST/71/2/A-0653
32

Use of Ant Colony Optimization for High Performance Web Usage Mining

Rakhi Chourasia, Brajesh Patel

Abstract
Web mining is important in current era for the ease of users of the web to achieve fast and accurate searches. Since web data is huge and requires online presence therefore it is difficult for the developers to process web data directly. Web Log mining is therefore applied to work offline to process web data. The process of web log mining is also involved as lot of information is collected in web logs and therefore mining and clustering techniques are applied for the same. This work proposes to apply Ant Clustering mechanism to extract relevant information from the web log dataset available for researchers over the Internet. The focus of this work is achieving highly efficient web log mining for usage of the web. For efficient web mining this work uses data cleaning and analyzing steps with the application of the Ant Clustering mechanism which applies parallel processing of the different characteristics of the web logs for mining of information as per the usage by the users. For usage mining, characteristics such as unique IP Addresses, URL, Time spent, Http Method used, status message generated and sent etc. have been used
Full Paper
IJCST/71/2/A-0654
33

Factorizing RSA Key Using Prime Database

Habibollah Lotfi, Smita Bedekar, Abdullah Ansari

Abstract
Nowadays prime numbers have significant role in security fields. In security, factorizing a key is a tough challenge and various methods like ECPP, NFS and etc has been developed and tested theoretically as well as practically. The method that we have considered for factorization uses a database of prime numbers for generated keys which applied in RSA [1].Full Paper
IJCST/71/2/A-0655
34

Proxy Server Protection for Web Search

Amrutha Ashok, Ashna John, Pretty Joy, Reshma K Vijayan, Amrutha V V, Deepa K Daniel, Jooby E

Abstract
The web search engines has long become the most important portal for ordinary people looking for useful information on the web. But there are certain reluctance shown by the users towards disclosing their private information during searching. In this paper we present a search engine which provides privacy to the users as well as serve as a perfect search engine. We propose a framework called UPS that provides runtime generalization along with two algorithms namely GreedyDP and GreedyIL. Extensive experiments demonstrate the effectiveness of our framework
Full Paper
IJCST/71/2/A-0656
35

A Document Proximity Based Approach and Location Aware Keyword Query Suggestion in Web Enviroment

Swathi.S, Vallarmathi.V, Raja.R, Selvakanmani.S

Abstract
We design a location-aware keyword query suggestion framework. We propose a weighted keyword-document graph, which captures both the semantic relevance between keyword queries and the spatial distance between the resulting documents and the user location. The graph is browsed in a random-walk-with-restart fashion to select the keyword queries with the highest scores as suggestions. To make our framework scalable, we propose a partition-based approach that outperforms the baseline algorithm by up to an order of magnitude. The appropriateness of our framework and the performance of the algorithms are evaluated using real data.
Full Paper
IJCST/71/2/A-0657
36

Review Paper on Different CAPTCHA Techniques

Anvesh Sinha, Dr. Sandhya Tarar

Abstract
CAPTCHA is a program or a system that protects against automated scripts (or bots). It generates tests that humans can pass but computer programs cannot. CAPTCHA systems are widely used nowadays for protecting and providing security to internet based services for humans from abuse by bots. Different types of CAPTCHA technologies are discussed in this paper and a detailed analysis on their reliability is performed. Subsequently, a new CAPTCHA technique is proposed which is based on facial expression detection.
Full Paper
IJCST/71/2/A-0658
37

Enhancement in Decision of Zero-Sum Game Using Alpha-Cuts

Lata Singhal, Surmeet Kaur

Abstract
Decision making plays an important role in human life at any stage. Game theory has an important role in decision issues such as economy and management. For being successful in game completely depends on the strategies taken by the player. Strategy depends on the information in hands of player by the past experience. In this article gaming decision making will be enhanced by fuzzy alpha cut set. In order to increase research, the data set is about the position of the opponent in the previous phase and step will be taken by the system automatically in next phase of the game with human interaction. In this article we use fuzzy alpha cut set method for ranking fuzzy numbers. They are not able to determine the risk amount which actually decision maker has in their mind and involve their opinions about the risk with more flexibility and ease in the decision making. Moreover we obtain an efficient degree of security with a certain amount of risk taken.
Full Paper
IJCST/71/2/A-0659
38

Cloud Adoption by Startups in India – Adoption, Preferred Cloud Models, Challenges and Business Transformation: A Survey Based Investigation and Recommendation

Jipson George Thoomkuzhy, Lokesh V

Abstract
There was a time when start-ups had to keep aside a large portionof their capital for their IT infrastructure. It’s no secret that the cloud has become a major component of a typical company’s IT Planning. Startups neither can afford the money nor time to build their own IT infrastructure as their primary focus should ideally be on their Core Domain – Product or a Service. Cloud computing is emerging as a powerful computing Standard with its aim of efficient utilization and Cost-Effective Solution. Cloud computing is viewed as a significant change in the way future businesses are going to be managed. The concept of cloud computing is based on the idea that computing resources will reside somewhere other than the Local computer room and that the users will connect to it using the IT resources as and when required. It promises increased flexibility, scalability, and reliability, at the same time offering decreased operational cost and support cost but the research on adoption of cloud computing is at its infancy stage. Many potential cloud users are reluctant to move to cloud computing due to Reliability of the service provider, Support Concerns, unawareness on adaptability, Security issues and so on. The scale of adaptability may range from fully featured applications, to Software development and Deployment environments and to computer Infrastructure such as Servers, Network, Storage and Processing.
In this paper, we present a survey on Adoption of Cloud computing by start-up companies in India, highlighting the key Cloud concepts, suitable Cloud model for Start-ups, Challenges that Start-ups face in Adopting Cloud and the Business Transformation. A survey conducted with 150 Indian startups show that majority of the startups are interested in adopting the cloud technology. However startups showed concerns on security, interoperability, Support capability and quality of the cloud service providers. The findings are expected to assist startups in their adoption of cloud computing services.
Full Paper
IJCST/71/2/A-0660
39

Global Data Transfers through Cloud and Grid Computing

Rohit Seth

Abstract
Networks form the global communications infrastructure that assistsmillions of phone calls each day and, even more significantly, the enormous global data transfers, chiefly resulting via Internet. These networks are operated by hundreds of companies and placed them on top of physical infrastructure(cabling and switches). These infrastructures are usually not owned by the network operator but have to follow different regulations in each country and probably traverse several billing domains at any given pointto- point connection. This global integrated system operates with extremely low down time and transparently to the end users. This has been achieved through decades of development and standardization of interfaces, a process which has now become well established in the telecommunications industry. The latest evolution of the global communications networks, the Next Generation Network (NGN), is designed to support converged fixed and wireless networks carrying both voice and data traffic. Furthermore, these future networks are beneficial to customers and the network providers both. Increased flexibility around network-level services has also opened the door to third party services built on top of the NGN infrastructure. With growing interest in grid computing over the past several years and more recently, cloud computing, a major question that needs to be answered is how these technologies, concepts, and capabilities can be incorporated into NGN.
Full Paper
IJCST/71/2/A-0661