Version-3 (May-June 2014)
Ver-1 Ver-2 Ver-3 Ver-4 Ver-5 Ver-6 Ver-7 Ver-8 Ver-9
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Backtracking, Combinatorial problem, Graph Referencing algorithm, Optimization, Sudoku.
[2]. Y. Liu and S. Liu, Algorithm based on genetic algorithm for Sudoku puzzles, Computer Science, 37(3), 2010, pp. 225-226.
[3]. J. Xu, Using backtracking method to solve Sudoku puzzle, Computer Programming Skills & Maintenance, 5, 2009, pp. 17-21.
[4]. Z. Zhang, Solve & generate Sudoku puzzle by programming in AutoCAD, Computer Programming Skills & Maintenance, 17, 2008 pp. 16-18.
[5]. Z. Zhao, J. Guo and L. Yang, Study of algorithm about Sudoku generation, Neijiang Science and Technology, 7, 2008, pp. 22-23.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Vampire Attacks: Wearing Out Life of Wireless Adhoc Sensor Networks |
Country | : | India |
Authors | : | Aruna M.G , Nivedita G Y |
: | 10.9790/0661-16330813 |
workshop on security protocols, 1999.
[2] David R. Raymond, Randy C. Marchany, Michael I. Brownfield, and Scott F. Midkiff, Effects of denial-of-sleep attacks on
wireless sensor network MAC protocols, IEEE Transactions on Vehicular Technology 58 (2009), no. 1.
[3] Jing Deng, Richard Han, and Shivakant Mishra, Defending against pathbased Dos attacks in wireless sensor networks, ACM
workshop on security of ad hoc and sensor networks, 2005.
[4] ImadAad, Jean-Pierre Hubaux, and Edward W. Knightly, Denial of service resilience in ad hoc networks, MobiCom, 2004.
GergelyAcs, LeventeButtyan, and IstvanVajda, Provably secure ondemand source routing in mobile ad hoc networks, IEEE
Transactions on Mobile Computing 05 (2006), no. 11.
[5] Tuomas Aura, Dos-resistant authentication with client puzzles, International workshop on security protocols, 2001
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Haar-like classifier; Viola-Jones object detector; Eigenface; pricipal component analysis; Haar Cascade Classifier.
[2] P. Viola and M. Jones, "Robust real-time face detection," International journal of computer vision, vol. 57, pp. 137-154, 2004.
[3] P. Viola and M. Jones, "Rapid object detection using a boosted cascade of simple features," in Proc. IEEE CVPR, 2001, pp. I-511-I-518 vol.1.
[4] OpenCV Wiki: Face Recognition available at http://opencv.willowgarage.com/wiki/.
[5] G. Bradski and A. Kaehler, Learning OpenCV: Computer vision with the OpenCV library: O'Reilly Media, 2008.
- Citation
- Abstract
- Reference
- Full PDF
Keywords: End to end delay, frequent link failure, packet delivery ratio, packet salvaging, relay node.
[2] Genping Liu, Kai Juan Wong, Bu Sung Lee, Boon Chong Seet, Chuan Heng Foh, Lijuan Zhu, "PATCH: a novel local recovery mechanism for mobile ad-hoc networks", Vehicular Technology Conference, 2003. VTC 2003-Fall. 58th. Page(s):2995 – 2999 Vol.5. IEEE, 2003.
[3] Junjie Chen, Chang'en Zhou, Deli Chen, Bin Huang, Jiajun Hong, Chao Zhou1, Xiao Yang, "A Novel Routing Algorithm for Ad hoc Networks Based on the Downstream Nodes Information", International Conference on Multimedia information Networking and Security, 2009. 978-0-7695-3843-3/09 IEEE 2009.
[4] I.Vijaya , Amiya Kumar Rath, Pinak Bhusan Mishra, Amulya Ratna Dash, "Influence of Routing Protocols in Performance of Wireless Mobile Adhoc Network", Second International Conference on Emerging Applications of Information Technology. 978-0-7695-4329-1/11. DOI 10.1109/EAIT.2011.65. IEEE, 2011
[5] D.B. Johnson and D. A. Maltz, "Dynamic Source Routing Protocol for Mobile Ad Hoc Networks", Mobile Computing, T. Imielinski and H. Korth, Eds., Kluwer, 1996, pp. 153-81.
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Diversity, MRC, EGC, SC, BPSK, SER, SNR
[2]. A.Annamalai, C.Tellambura, and Vijay K.Bhargava, "A General Method for Calculating Error Probabilities Over Fading Channels", IEEE Transactions on Communications, Volume.53, May 2005.
[3]. DilipMandloi, Rajesh Kr. Nagar and Upasna Katare, "BER Performance Evaluation of Bpsk, Qpsk and Qam-16 for DS-CDMA system with MRC and EGC diversity techniques",in International Journal of Electrical, Electronics & Communication Engineering, Volume 2 October 2012.
[4]. Gayatri S. Prabhu and P. Mohana Shankar , "Simulation of Flat Fading using MATLAB for Classroom Instruction" in IEEE Transactions on Education, Volume 45, February 2002.
[5]. Soon H.Oh, Kwok H.Li and Wee S.Lee, "Performance of BPSK pre-detection MRC systems over Two-Wave with Diffuse power fading Channels", IEEE Transactions on wireless communications ,Volume 6 ,August 07.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Handwritten Bangla Character Recognition Using Artificial Neural Network |
Country | : | Bangladesh |
Authors | : | Md. Azher Uddin |
: | 10.9790/0661-16333338 |
Keywords: Artificial Neural Network, Multi Layer Perceptron classifier, OCR, Feature Extraction
[2]. Liu Cheng-Lin, Nakashima, Kazuki, H, Sako, H.Fujisawa, "Handwritten digit recognition: investigation of normalization and feature extraction techniques", Pattern Recognition, Vol. 37, No. 2, pp. 265-279, 2004.
[3]. Izakian, H., Monadjemi, S. A., Ladani, B. T. and Zamanifar, K., "Multi-Font Farsi/Arabic Isolated Character Recognition Using Chain Codes," World Academy of Science, Engineering and Technology, 43, 2008.
[4]. S. A. Husain, Asma Sajjad, Fareeha Anwar, "Online Urdu Character Recognition System", MVA 2007 IAPR Conference on Machine Vision Applications, Tokyo, JAPAN, May 16-18, 2007.
[5]. M Abdul Rahiman, M S Rajasree, ―OCR for Malayalam Script Using Neural Networks, IEEE, 2009.
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Security, Immigration, Control, Identity fraud, Fingerprint, Minutiae.
[2] L. Hong, Y. Wan & A. Jain, (1998). Fingerprint Image Enhancement: Algorithm and Performance Evaluation, IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 20, no. 8, pp.777-789.
[3] S. Prabhakar, A.K. Jain, J. Wang, S. Pankanti, & R. Bolle, (2000). Minutia Verification and Classification for Fingerprint Matching, In Proc. ICPR2000, 15th Int. Conf. Pattern Recognition, Barcelona, Spain.
[4] Frank Laczko, Abye Makonnen (2009). Migration in Nigeria: Thematic Document 2009 National Security and Migration: towards an Effective Cross-border management in Nigeria, © 2009 International Organization for Migration (IOM), International Organization for Migration, 17 route des Morillons 1211 Geneva 19, Switzerland.
[5] ICAO, (2006). "Machine readable travel documents", Technical report, ICAO 2006.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Evaluation of Bitmap Index Compression using Data Pump in Oracle Database |
Country | : | India |
Authors | : | Shivam Dwivedi , Dr. Savita Shiwani |
: | 10.9790/0661-16334348 |
Keywords: Bitmap Index, Compression, Data Pump, Query Performance
[2]. N. Koudas, Space efficient bitmap indexing, in: Proceedings of ACM Conference on Information and Knowledge Management (CIKM), 2000.
[3]. G. Navarro, E.S. de Moura, M. Neubert, N. Ziviani, R. Baeza-Yates, Adding compression to block addressing inverted indexes, Information Retrieval 3 (1) (2000) 49–77.
[4]. K. Wu, E.J. Otoo, A. Shoshani, Compressing bitmap indexes for faster search operations, in: Proceedings of International Confer- ence on Scientific and Statistical Database Management (SSDBM), 2002.
[5]. M. Stabno, R. Wrembel, RLH: Bitmap compression technique based on run-length and Huffman encoding, in: Proceedings of ACM International Workshop on Data Warehousing and OLAP (DOLAP), 2007.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Comparative Analysis of Feature Extraction Methods for Optic Disc Detection |
Country | : | India |
Authors | : | Harsha Panchariya , Sangita Bharkad |
: | 10.9790/0661-16334954 |
Keywords: Diabetic Retinopathy, fundus images, Glaucoma, non-invasive, Optic disc
[2] H.Ying, M.Zhang and J.-C Liu.,―Fractal-based automatic localization and segmentation of optic disc in retinal images,‖ in Proc. of IEEE Conf. on Engineering in Medicine and Biology Society(EMBS).,2007
[3] http://en.wikipedia.org/wiki/Fundus_photography
[4] F. Haar, ―Automatic localization of the optic disc in digital colour images of the human retina,‖ M.S. thesis, Utrecht University, Utrecht, The Netherlands,2005.
[5] A.Youssif, A Ghalwsh, and A Ghoneim,―Optic disc detection from normalized digitl fundus images by means of vessels' direction matched filter,‖ in IEEE Trans. on Medical Imaging, vol. 27, no. 1, pp. 11–18, 2008.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Handwritten Bangla Character Recognition Using Normalized Cross Correlation |
Country | : | Bangladesh. |
Authors | : | Md. Azher Uddin. |
: | 10.9790/0661-16335560 |
Keywords: Template matching, Normalized Cross-Correlation, OCR, Feature Extraction
[2]. Liu Cheng-Lin, Nakashima, Kazuki, H, Sako, H.Fujisawa, "Handwritten digit recognition: investigation of normalization and feature extraction techniques", Pattern Recognition, Vol. 37, No. 2, pp. 265-279, 2004.
[3]. Izakian, H., Monadjemi, S. A., Ladani, B. T. and Zamanifar, K., "Multi-Font Farsi/Arabic Isolated Character Recognition Using Chain Codes," World Academy of Science, Engineering and Technology, 43, 2008.
[4]. S. A. Husain, Asma Sajjad, Fareeha Anwar, "Online Urdu Character Recognition System", MVA 2007 IAPR Conference on Machine Vision Applications, Tokyo, JAPAN, May 16-18, 2007.
[5]. M Abdul Rahiman, M S Rajasree, ―OCR for Malayalam Script Using Neural Networks, IEEE, 2009
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Bluetooth Messenger: an Android Messenger app based on Bluetooth Connectivity |
Country | : | India |
Authors | : | Amrita Deb , Swarnabha Sinha |
: | 10.9790/0661-16336166 |
Keywords: Android, Bluetooth, Messenger, Python, Short distance communication, sl4a
[2]. http://www.tutorialspoint.com/python/
[3]. http://www.python.org/
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | An Efficient Hybrid Push-Pull Based Protocol for VOD In Peer-to-Peer network |
Country | : | Malaysia |
Authors | : | Mohamed Ghettas , Putra Sumari |
: | 10.9790/0661-16336773 |
Keywords: Video-On-Demand; Peer-to-Peer Network, Interactive videos; Video Streaming, P2P Streaming
[2]. Castro, M., et al. SplitStream: high-bandwidth multicast in cooperative environments. in ACM SIGOPS Operating Systems Review. 2003. ACM.
[3]. Tran, D.A., K.A. Hua, and T. Do. Zigzag: An efficient peer-to-peer scheme for media streaming. in INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies. 2003. IEEE.
[4]. Banerjee, S., B. Bhattacharjee, and C. Kommareddy, Scalable application layer multicast. Vol. 32. 2002: ACM.
[5]. Deshpande, H., M. Bawa, and H. Garcia-Molina, Streaming live media over a peer-to-peer network. Technical Report, 2001
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Constraint Satisfaction Problem, Genetic algorithms, Meta-heuristics, Mobile Robot, Neighbourhood method, Optimization, Path Tracking.
[2] D.E Smith, (2004). Choosing objectives in over-subscription planning, Proc. the Fourteenth International Conference on Automated Planning and Scheduling (ICAPS 2004), Whistler, British Columbia, Canada, June 3-7 2004, 393-401.
[3] S. Essayie, Politique de sélection dans les algorithmes génétiques – Application au Voyageur de commerce, Université de Havre, France, 2010.
[4] E. Chanthery, Planification de Mission pour un Véhicule Aérien Autonome, L'École Nationale Supérieure de l'Aéronautique et de l'Espace, France, 2006.
[5] Y. Lassoued, Etude de paramétrage d'un algorithme d'optimisation hybride, France, 2008.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Network Traffic Load Balancing In Gateways |
Country | : | India |
Authors | : | Jopxon P J, Arun Soman |
: | 10.9790/0661-16338487 |
Keywords: GLBP,OSPF, Emulator, Interface tracking, Network optimization.
[2]. Camellia Askarian and Hamid Beigy, "A Survey for Load Balancing in Mobile WiMAX Networks",Advanced Computing: An International Journal, Vol.3, No.2, March 2012.
[3]. Chengjie Gu, Shunyi Zhuang, Yanfei Sun, Chao Liu and Nan Sun "Pricing Incentive Mechanism Supporting Load Balancing for QoS-Enabled Networks ,"July 31 2008-Aug. 1 2008.
[4]. Cisco papers "Quality of Service Networking ,"August 26, 2012.
[5]. Cisco Network Academy Explorations, CCNA Guides.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Study on Mobile Telecom Network Traffic Using Mobility Pattern |
Country | : | India |
Authors | : | K.Ramya, Ms. R.Asmetha Jeyarani, M.TECH |
: | 10.9790/0661-16338891 |
Index Terms: Gradient Adaptive protocol, routing information, time limit
[1]. Yi-Bing Lin, Fellow, IEEE, Chien-Chun Huang-Fu, and Nabil Alrajeh" Predicting Human Movement Based on Telecom's Handoff in Mobile Networks" ieee transactions on mobile computing, vol. 12, no. 6, june 2013.
[2]. M.C. Gonzalez, C.A. Hidalgo, and A.L. Barabasi, "Understanding Individual Human Mobility Patterns," Nature, vol. 453, pp. 779-782, 2008.
[3]. Salathe.M, M. Kazandjieva, J.W. Lee, P. Levis, M.W. Feldman, and J.H. Jones, "A High-Resolution Human Contact Network for Infectious Disease Transmission," Proc. Nat'l Academy of Science of the United States of Am., vol. 107, no. 51, pp. 22020-22025, 2010.
[4]. Y.-C. Lai, P. Lin, and S.-M. Cheng, "Performance Modeling for Application Level Integration of Heterogeneous Wireless Networks, "IEEE Trans. Vehicular Technology, vol. 58, no. 5, pp. 2426-2434, June 2009
[5]. Y.-B. Lin and A.-C.Pang, Wireless and Mobile All-IP Networks. JohnWiley and Sons, 2005.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | An Applied Method of Gaussian Noise by Fuzzy Filter |
Country | : | India |
Authors | : | Anita Pati Mishra, Sangita Gupta ,Vini Malik |
: | 10.9790/0661-16339296 |
Keywords: Additive noise, moving window, fuzzy inference rule, peak signal to noise ratio
[2]. H.K.Kwan and Y. Cai,"Fuzzy filtering for image filtering,' presented in proc.MWSCAS,pp 672-675,2002.
[3]. Gonzalez and Woods,Digital Image Processing, Third Edition,Pearson Education 2008.
[4]. M. S. Alani, Digital Image Processing using Matlab university Bookshop,sharqa,USA 2008
[5]. S.Mohapatra, P. K. Sa and B Majhi,Impulsive noise Removal Image Enhancement Tech, 6th WSE As (ICCSE,control & signal processing (CSE CS 2007) 2007,Cairo,Egypt.
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Wireless Sensor Network, Vampire attack, Adaptive power multicast, DDOs
[2]. I. Aad, J.-P. Hubaux, and E.W. Knightly, "Denial of Service Resilience in Ad Hoc Networks," Proc. ACM MobiCom, 2004.
[3]. G. Acs, L. Buttyan, and I. Vajda, "Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks," IEEE Trans. Mobile Computing, vol. 5, no. 11, pp. 1533-1546, Nov. 2006.
[4]. T. Aura, "Dos-Resistant Authentication with Client Puzzles," Proc. Int‟l Workshop Security Protocols, 2001.
[5]. J. Bellardo and S. Savage, "802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions," Proc. 12th Conf. USENIX Security, 2003.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Digital watermarking now-a-days become more and more important due to tremendous availability of digital data on internet. The use of databases in various internet base applications has increased tremendously and theft of the data from database is a main concern for the database owners. Therefore, it is crucial to protect the piracy of the database. Most important technique in watermarking is its secret key and insertion location. In this paper, a new relational database watermarking method for non-numeric data is proposed based on nonnumeric attributes. A mark is computed based on the hill cipher technique. The position where mark is to be inserted is taken by the user. Our method is effective as it is robust and secure against different forms of malicious attacks.
Keywords: Copyright, Digital Watermarking, Hill Cipher, Phonemes, Relational Database.
[1]. Potdar, V. M., Han, S., and Chang, E., A survey of digital image watermarking techniques, in Proceedings of the 3rd IEEE International Conference on Industrial Informatics (INDIN ‟05), Peth, Australia.IEEE Press, 2005, pages 709–716.
[2]. R. Agrawal and J. Kiernan, Watermarking Relational Databases, Proceeding of the 28th VLDB Conference, VLDB Endowment Press, 2002, pp. 155-166.
[3]. Radu Sion , Mikhail Atallah , Sunil Prabhakar, Rights Protection for Categorical Data, IEEE Transactions on Knowledge and Data Engineering, 7(7), July 2005,p.912-926.
[4]. http://en.wikipedia.org/wiki/Hill_cipher
[5]. Forouzan B.A. and Mukhopadhyay D., Cryptography and Network Security, McGraw Hill, Second Edition
- Citation
- Abstract
- Reference
- Full PDF
Keywords: encryption, partial image encryption, selective image encryption, matlab
[2]. Gaurav Bhatnagar , Q.M. Jonathan Wu, Selective image encryption based on pixels of interest and singular value decomposition, Digital Signal Processing 22 (2012) 648–663.
[3]. Priyanka Agrawal and Manisha Rajpoot A Fast and Secure Selective Encryption Scheme using Grid Division Method, IJCA vol.51 no.4,pp 29-33, Aug -2012.
[4]. Panduranga H T et al. / International Journal of Engineering and Technology (IJET) "Selective Image encryption for medical and satellite images".
[5]. Marc Van Droogenbroeck and Raphaël Benedett "Techniques for a selective encryption of uncompressed and compressed images".
[6]. Rafael_C._Gonzalez,_Richard_E._Woods,_Steven_L._E "Digital image processing
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Analysis of Alignment of TEM Image using ECC |
Country | : | India |
Authors | : | Garima Goyal |
: | 10.9790/0661-1633112115 |
Index Terms: TEM Image, Alignment, ECC, Information, Signal to Noise Ratio
[1]. R. Szeliski, H andboo k of Mathematical Models of Computer Vision, N. Paragios, Y. Chen, and O. Faugeras , eds., chapter 17. Springer, 2005.
[2]. G.D. Hager and P.N. Belhumeur, "Efficient Region Tracking with Para metric Models of Geo metry and Illumination," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 20, no. 10, pp. 1025-1039,M Oct. 1998
[3]. B.D. Lucas and T. Kanade, "An Iterative Image Registration Technique with an Application to Stereo Vision," Proc. Seventh Int'l Joint Conf. Artificial Intelligence, 1981.
[4]. M. Gleicher, "Projective Registration with Difference Deco mposition," Proc .IEEE Int'l Conf. Computer Vision and Pattern Recognition, 1997.
[5]. H. Shum and R. Szeliski, "Construction of Panoramic Image Mosaics with Global and Local Alignment," Int'l J. Computer Vision, vol. 36, no. 2, pp. 101130, 2000.
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Fabric defect detector, Genetic Algorithm, Subset of fabric, Wavelet transformer
[2] Narges Heidari, Reza Azmi & Boshra Pishgoo "Fabric Textile Defect Detection, By Selecting A Suitable Subset of Wavelet Coefficients, through Genetic Algorithm", International Journal of Image Processing (IJIP), Volume (5): Issue (1): 2011
[3] Z. Michalewicz, "Genetic Algorithms + Data Structures = Evolution Programs", AI Series.Springer-Verlag, New York, 3rd edition, (1996)
[4] Lijing Wang, Zhongmin Deng and Xungai Wang "Application of Wavelet Transform Method for Textile Material Feature Extraction".
[5] B.V. Ramana Reddy1, A. Suresh2, M. Radhika Mani3, and V.Vijaya Kumar4 "Classification of Textures Based on Features Extracted from Preprocessing Images on Random Windows", International Journal of Advanced Science and Technology Volume 9, August, 2009.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Integrated Test Frame Work for defect free Embedded Product delivery |
Country | : | India |
Authors | : | A.chandra suresh ,Dr. Kvnm.Prasad |
: | 10.9790/0661-163312128 |
Due to this embedded product margin being minimized to the manufacturing Industries and is going to be a non profit product.Hence there is immense need to deliver defect free product by the manufacturers .There is a need to maintain or adopt sophisticated/test Proven test process, test coverage techniques.This paper proposes an integrated test frame work which fills the gap among Test levels,process,Testcoverage,Prototype testing, Virtual testing model based testing etc,… to deliver defect free embedded product
Keywords: Test process,proto type testing, test iterations, test coverage, test levels, virtual testing
[2] E. Bayse, A. R. Cavalli, M. N´u˜nez, and F. Za¨ıdi. A passivetesting approach based on invariants: application to the wap.Computer Networks, 48(2):235–245, 2005.
[3] B. Beizer. Software Testing Techniques (2nd ed.). Van Nostrand Reinhold Co., New York, NY, USA, 1990.
[4] A. Belinfante, L. Frantzen, and C. Schallhart. Tools for test case generation. In [21].
[5] S. Berner, R.Weber, and R. Keller. Observations and lessons learned from automated testing. In Proc. 27th Int. Conf. onSw. Eng., pages 571–579. ACM, 2005.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Enhancement in Extraction of Top-K List |
Country | : | India |
Authors | : | Dipali Patil , Nitin Dhawas |
: | 10.9790/0661-1633129133 |
Keywords: Candidate picker, parser,ranker, top-k list, title classifier
[2] Zhixian Zhang, Kenny Q. Zhu , Haixun Wang , Hongsong Li ,"Automatic Extraction of Top-k Lists from the Web",, IEEE , ICDE Conference, 2013, 978-1-4673-4910-9.
[3] G. Miao, J. Tatemura, W.-P. Hsiung, A. Sawires, and L. E. Moser,"Extracting data records from the web using tag path clustering".
[4] Z. Zhang, K. Q. Zhu, and H. Wang, "A system for extracting top-k lists from the web," in KDD, 2012
[5] C.-H. Chang and S.-C. Lui, "Iepad: information extraction based on pattern discovery," in WWW, 2001, pp. 681–688.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | An Efficient Method to Prevent Information Leakage in Cloud |
Country | : | India |
Authors | : | Nina Pearl Doe , Sumaila Alfa , V. Suganya |
: | 10.9790/0661-1633134139 |
Keywords: Authentication, Cloud Security Issues, Elliptic Curve Cryptography, MD5, Risk Assessment, Role Based Access Control, Secure Disposal
[2] IEEE CloudCom 2012, 4th IEEE International Conference on Cloud Computing Technology and Science Advances in Computer Science and its Applications , vol. 1, No. 1, World Science Publisher, United States, March 2012.
[3] V. Gampala, et al., Data Security in Cloud Computing with Elliptic Curve Cryptography, International Journal of Soft Computing and Engineering (IJSCE), vol 2, Issue 3, July 2012.
[4] R. Sridevi and V. Bande, Comparative Study Of Various Existing Security Scenarios In Cloud Computing Environment, Journal of Global Research in Computer Science, vol 3, No. 9, September 2012.
[5] R. Sunita and G. Ambrish, Cloud Security with Encryption using Hybrid Algorithm and Secured Endpoints, International Journal of Computer Science and Information Technologies, vol. 3, pp. 4302 – 4304, 2012
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Cloud Computing, Data sharing, Access control, Privacy preserving, Dynamic subgroups
[2]. S. Kamara and K. Lauter, "Cryptographic Cloud Storage," Proc. Int'l Conf. Financial Cryptography and Data Security (FC), pp. 136149, Jan. 2010.
[3]. S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing," Proc. IEEE INFOCOM, pp. 534-542, 2010.
[4]. M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, "Plutus: Scalable Secure File Sharing on Untrusted Storage," Proc. USENIX Conf. File and Storage Technologies, pp. 29-42, 2003bservations and lessons learned from automated testing. In Proc. 27th Int. Conf. onSw. Eng., pages 571–579. ACM, 2005.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Security Analysis of a Single Sign-On Mechanism For Distributed Computer Networks |
Country | : | India |
Authors | : | C. Ramakrishnan , S. Dhanabal |
: | 10.9790/0661-1633146149 |
[2]. W. Juang, S. Chen, and H. Liaw, "Robust and efficient password authenticated key agreement using smart cards," IEEE Trans. Ind. Electron., vol. 15, no. 6, pp. 2551–2556, Jun. 2008.
[3]. M. Cheminod, A. Pironti, and R. Sisto, "Formal vulnerability analysis of a security system for remote fieldbus access," IEEE Trans. Ind. Inf., vol. 7, no. 1, pp. 30–40, Feb. 2011.
[4]. A. Valenzano, L. Durante, and M. Cheminod, "Review of security issues in industrial networks," IEEE Trans. Ind. Inf., vol. PP, no. 99, 2012,DOI 0.1109/TII/2012.2198666.
[5]. A. C. Weaver and M. W. Condtry, "Distributing internet services to the network's edge," IEEE Trans. Ind. Electron., vol. 50, no. 3, pp. 404–411, Jun. 2003.