Version-6 (Jan-Feb 2014)
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Study of Web Crawler and its Different Types |
Country | : | India |
Authors | : | Trupti V. Udapure || Ravindra D. Kale || Rajesh C. Dharmik |
: | 10.9790/0661-16160105 |
Keyword: Crawling techniques, Web Crawler, Search engine.
[2] Pavalam S. M., S. V. Kasmir Raja, Jawahar M., and Felix K. Akorli, "Web Crawler in Mobile Systems", International Journal of Machine Learning and Computing, Vol. 2, No. 4, August 2012.
[3] S.S. Dhenakaran1 and K. Thirugnana Sambanthan2, "WEB CRAWLER - AN OVERVIEW", International Journal of Computer Science and Communication Vol. 2, No. 1, January-June 2011, pp. 265-267.
[4] Ms. Swati Mali, Dr. B.B. Meshram, "Implementation of Multiuser Personal Web Crawler",CSI Sixth International Conference on Software Engineering (CONSEG), IEEE Conference Publications, 2012.
[5] Pooja Gupta and Mrs. Kalpana Johari, "Implementation of Web Crawler", Second International Conference On Emerging Trends In Engineering and Technology, ICETET-09, IEEE Conference Publications,2009.
- Citation
- Abstract
- Reference
- Full PDF
Keywords: NAMP, SPREAD, LINK FAILURE, DATA DELIVERY.
[2]. ImrichChlamtaca,MarcoContib,Jennifer J-N.Liuc," Mobile Ad hoc network imperatives and challenges",www.elsevier.com/locate/adhoc networks.2003 13-64.
[3]. Umang Singh" Secure routing protocol in mobile Ad hoc network - a survey and taxanomy".International Journal of reviews in Computing Sep 2011 Vol:7 IJRIC and LLS E-ISSN 2076-3336.
[4]. C.Sreedhar,Dr.S.MadhusudhanaVerma,Prof.N.Kasiriswanath" A survey an security issues in wireless Ad hoc network routing protocol"in IJCSE International Journal on Computer Science and Engineering vol 2,No.02,2010,224-232.
[5]. TanuPreetSingh,ShiraniDua,VikrantDas"Energy Efficient Routing Protocols in Mobile Ad hoc Networks",in IJAR CSSE International journal of Advanced research in Computer science and Software Engineering vol 2,Issue 1,January 2012 ISSN:2277 128X.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | LEXIMET: A Lexical Analyzer Generator including McCabe's Metrics |
Country | : | Iraq |
Authors | : | Rana khudier Abbass Ahmed |
: | 10.9790/0661-16161118 |
[2]. Alfred V. Aho, Monica S. Lam, Ravi Sethi, Jeffrey D. Ulman, "Compilers: Principles, Techniques, and Tools" 2nd Edition, Prentice Hall, 2007.
[3]. Ayman Madi, Oussama K. Zein and Seifedine Kadry, "On the Improvement of Cyclomatic Complexity Metric" ,International Journal of Software Engineering and Its Applications, Vol. 7, No. 2, March, 2013.
[4]. N Gayatri, S Nickolas, A.V.Reddy, "Performance Analysis and Enhancement of Software Quality Metrics using Decision Tree based Feature Extraction, "International Journal of Recent Trends in Engineering, Vol 2, No. 4, November 2009.
[5]. Reg. Charney, "Programming Tools: Code Complexity Metrics", Linux Journal, 2005.
- Citation
- Abstract
- Reference
- Full PDF
Keywords: business criteria, business structure, knowledge map, process map, strategy.
[2]. J. Aguilar, A survey about fuzzy cognitive maps papers,International Journal of Computational Cognition, vol. 3, no. 2, pp. 27-33, 2005.
[3]. L. Rodriguez-Repiso, R. Setchi, and J. L. Salmeron,Modelling IT projects success with fuzzy cognitive maps, Expert Systems with Applications, vol. 32, no. 2, pp. 543-559, 2007.
[4]. Z. Peng, B. Yang, C. Liu , Z. Tang, and J. Yang, Research on one fuzzy cognitive map classifier, (in Chinese), Application Research of Computers , vol. 26 , no. 5 , pp.1757-1759, 2009.
[5]. T. Hong and I. Han , Knowledge-based data mining of news information on the Internet using cognitive maps and neural networks, Expert Systems with Applications, vol. 23, no. 1, pp. 1-8, 2002.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Vtalk: Secure Deployment of VoIP over LAN'S |
Country | : | India |
Authors | : | Ms. Sassirekha S. M. || Ms. J. R. Thresphine |
: | 10.9790/0661-16162628 |
IndexTerms: VOIP, SSH, QOS, ITU, RSP, AARSP, FCC, PSTN.
[2]. M.J. Freedman and R. Morris, ―Tarzan: A Peer-to-Peer Anonymizing Network Layer,‖ Proc. Ninth ACM Conf. Computer and Comm. Security (CCS), 2002.
[3]. Stoeckigt, K.O. , Vu, H.L. , VoIP Capacity—Analysis, Improvements, and Limits in IEEE 802.11 Wireless LAN,‖ IEEE Transaction,pages 4553 – 4563,2010.
[4]. M. Srivatsa, A. Iyengar, and L. Liu, ―Privacy in VOIP Networks: A k-Anonymity Approach,‖ Technical Report IBM Research RC24625, 2008.
[5]. Chacon, Sergio University of Houston, USA, Benhaddou, Driss ; Gurkan, Deniz ,‖ Secure voice over Internet Protocol (voIP) using virtual private networks (VPN) and Internet Protocol Security (IPSec),‖IEEE conference,2006.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Novel Approach to Design Time Efficient and Secure encryption Algorithm (T-SEA) |
Country | : | India |
Authors | : | Prachi Saxena || Sini Shibu |
: | 10.9790/0661-16162934 |
Keywords: Computer Security, Network, Encryption, Decryption, Algorithm, Cryptography, Symmetric.
[2] Akhil Kaushik, Manoj Bamela and AnantKumar "Block Encryption Standard for Transfer of Data" IEEE International Conference on Networking and Information Technology 2010.
[3] G. RAMESH and Prof. Dr. R. UMARANI "UMARAM: A Novel Fast Encryption Algorithm for Data Security in Local Area Network" IEEE ICCCCT'2010
[4] P.P Charles & P.L Shari, "Security in Computing: 4th edition", Prentice-Hall, lnc.,2008.
[5] Neeraj Khanna, Joel James,Joyshree Nath, Sayantan Chakraborty, Amlan Chakrabarti and Asoke Nath : "New Symmetric key Cryptographic algorithm using combined bit manipulation and MSA encryption algorithm: NJJSAA symmetric key algorithm" Proceedings of IEEE CSNT-2011 held at SMVDU(Jammu) 03-06 June 2011, Page 125-130.
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Requirement engineering, Agent based systems, Tropos, Adaptive software environment, Security Requirements.
[2]. Federico Bergenti, M.-P.G., Zambonelli, and F. (eds.): Methodologies and Software Engineering for Agent Systems: The Agent-Oriented Software Engineering Handbook. Springer, Heidelberg (2004)
[3]. P. Bresciani, P. Giorgini, F. Ginuchiglia, J. Mylopoulos, and A. Perini, "TROPOS: An Agent-Oriented Software Development Methodology", In International Journal of Autonomous Agents and Multi Agent Systems, 8(3):203–236, 2004
[4]. JoséM.Pérez,FélixGarcía-Carballeira, "Branch replication scheme: A new model for data replication in large scale data grids", Future Generation Computer Systems vol.26(2010)
[5]. P. Kokkinos, K. Christodoulopoulos, E.Varvarigos, "Efficient data consolidation in grid networks and performance analysis" in FutureGenerationComputerSystems, vol 27, 2011.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Survey on Routing Protocols for Under Water Sensor Networks |
Country | : | Pakistan |
Authors | : | Kifayat Ullah Jan || Zahoor Jan |
: | 10.9790/0661-16164446 |
Keywords: UNSW, Terrestrial, Acoustic channels.
[2]. Performance of computer and communication networks; mobile and Wireless communications systems. Berlin/Heidelberg: Springer; 2006a. P. 1216–1221
[3]. Nikolaou N, et al. Improving the robustness of location-based routing for underwater sensor networks. In: Proceedings of the OCEANS. – Europe; 2007.
[4]. I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "A survey on sensor networks," IEEE Communications Magazine, Volume: 40 Issue: 8, Pp. 102-114, August 2002.
[5]. J. Heidemann, W. Ye, J. Wills, A. Syed, Y. Li, Research challenges and applications for underwater sensor networking, in: Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC2006), Las Vegas, Nevada, USA, April 3–6, 2006.
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Biometrics, Iris, Sclera, Retina and Facial Recognition.
[2] S. Crihalmeanu,A.Ross,R.Derakhshani, Enhancement and registration schemes for matching conjunctival vasculature,in:Proceedingsofthe3rd IAPR/IEEE International Conferenceon Biometrics(ICB2009),Italy,2009, pp. 1240–1249.
[3] N.L. Thomas, Y. Du, Z. Zhou, A new approach for sclera vein recognition, in: Proceedings of the International Society for Optical Engineering (SPIE), vol. 7708, 2010.
[4] Z. Zhou,E.Y.Du,N.L.Thomas,A comprehensive sclera image quality measure, in: proceedings of the 11th International Conference on Control, Automation, Robotics and Vision(ICARCV2010),Singapore,2010,pp.638–643.
[5] S.Crihalmeanu,A.Ross,Multispectral scleral patterns for ocular biometric recognition, PatternRecognit.Lett.33(14)(2012)1860–1869.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | RED TACTON (An avant-garde Human Area Networking technology) |
Country | : | India |
Authors | : | Mrignayani Chhotwani || Anshul Vyas |
: | 10.9790/0661-16165361 |
[2]. www.taipeitimes.com/News/biz/archives/2005/03/20/2003247076
[3]. http://www.ntt.co.jp/news/news05e/0502/050218.html
[4]. http://www.physorg.com/news3153.html
[5]. http://www.ntt.co.jp/RD/OFIS/active/2005pdfe/pdf/h_ct02_e.pdf
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Use Map EstimationFor Image Sharpening |
Country | : | India |
Authors | : | Mrs. Kshirsagar P. G. || Dr. Ashok Gaikwad |
: | 10.9790/0661-16166265 |
Keywords: Step-Edge Based Filter (SEBF), Sample Number (SN), Bounded-Input Bounded-Output (BIBO).
[2]. C. Liu,W. T. Freeman, R. Szeliski, and S. B. Kang. Noise estimation from a single image. In Proc.IEEE Conf. Computer Vision and Patter Recognition, pages 901–908, Jun 2006.
[3]. BEN-EZRA, M., AND NAYAR, S. K. 2004. Motion-based motion deblurring. TPAMI 26, 6, 689–698.
[4]. JIA, J. 2007. Single image motion deblurring using transparency. In CVPR.
[5]. LUCY, L. 1974. Bayesian-based iterative method of image restoration. Journal of Astronomy 79, 745–754.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Mapping Procedural Modules To Storage |
Country | : | India |
Authors | : | Vijaylaxmi Bittal || Shruti Mittal |
: | 10.9790/0661-16166669 |
Abstract: Majors in computer science accept structured programming as a subset of procedural programming paradigm and it is intended for complex system design and development. But as everyone is moving towards object orientation so as to model real world , which will be easily mapped to database So we also need to have a conversion tool for mapping procedural modules to storage. Our goal is to design a methodology to convert (map) structure/record to storage.
Index Terms: Structure, Record, procedural paradigm, storage.
[1]. Su Jian; Weng Wenyong;Wang Zebing "A Teaching path for Java object oriented Programming" Information Technology and Applications 2009
[2] Whity R.W; Fenton, N.E; Kapsi, A.A,"Structured Programming: A tutorial Guide" Volume 3, Issue 3, 1984
[3] Dewan, RM; Gavish B"Modules for the combined logical and physical design of the database "Volume 38, Issue 7, 1989.Computers IEEE
[4] Pan S, Dromey R G "Structured Programming" Software Engineering 1996 18th International Conference
- Citation
- Abstract
- Reference
- Full PDF
[1] Youssef Bassil "Image Steganography Method based on Brightness Adjustment" Advances in Computer Science and Application (ACSA),ISSN:2166-2924,Vol. 2,No. 2,2012.
[2] Dr. Sudeep D. Thepade,Smita S. Chavan "Cosine, walsh and Slant Wavelet Transforms for Robust Image Steganography" International Conference on wireless and Optical Communication Networks, 26-28 July 2013.
[3] V.Lokeswara Reddy, Dr. A. Subramanyam and Dr. P. Chenna Reddy, "Implementation of LSB Steganography and its evaluation for various file formats" Int. J. Advanced Networking and Application,Vol. 2,pp. 868-872,2011.
[4] Dr. DiwediSamidha, DipeshAgrawal, "Random Image Steganography in Spatial Domain", International Journal of Computer Science and Information Security Publication March 2010, Volume 7 No. 3, March 2013.
[5] Ali K. Hmood, B.B Zaindan "An Overview on hiding information techniques in images" Journal of applied Science 10(18):2094-2100, 2010 ISSN 1812-5654, 2010 Asian Network for scientific information.
[6] Mohammad TanvirParvez,Adnan Abdul-Aziz Gutub,-"RGB intensity based variable bits image steganography", IEEE Asia Pacific Services Computing Conference,2008.
- Citation
- Abstract
- Reference
- Full PDF
[2] D'Roza, T., and Bilchev, G. An overview of location-based services. BT Technology Journal 21, 1 (2003), 20_27
[3] Schwinger, W., Grin, C., Prll1, B., and Retschitzegger, W. A light-weight framework for location-based services. In Lecture Notes in Computer Science (Berlin, 2005), Springer, pp. 206_210
- Citation
- Abstract
- Reference
- Full PDF
[2] K. Nishant, P. Sharma, V. Krishna, C. Gupta, K. P. Singh,N. Nitin, and R. Rastogi, Load balancing of nodesin cloud using ant colony optimization, in Proc. 14thInternational Conference on Computer Modelling andSimulation (UKSim), Cambridgeshire, United Kingdom,Mar. 2012, pp. 28-30
[3] M. Randles, D. Lamb, and A. Taleb-Bendiab, Acomparative study into distributed load balancingalgorithms for cloud computing, in Proc. IEEE 24thInternational Conference on Advanced InformationNetworking and Applications, Perth, Australia, 2010,pp. 551-556
[4] Ms. Parin V. Patel, Mr. Hitesh. D. Patel, Pinal. J. Patel,A Survey On Load Balancing In Cloud Computing, International Journal of Engineering Research & Technology (IJERT)Vol. 1 Issue 9, November- 2012ISSN: 2278-0181
[5] Microsoft Academic Research, Cloud computing,http://libra.msra.cn/Keyword/6051/cloud-computing?query= cloud%20computing, 2012