Version-3 (Nov-Dec 2014)
Ver-1 Ver-2 Ver-3 Ver-4 Ver-5 Ver-6 Ver-7 Ver-8
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Privacy Security of Multiuser on Multilevel System using XOR |
Country | : | India |
Authors | : | Siji P.Raj |
: | 10.9790/0661-16630107 |
Abstract: Privacy security of multiuser on multilevel system is considered in this work. On communication there is a chance for the eavesdropper's to secretly listen to the conversation. In order to confuse the eavesdropper's, the transmitter sends information signal to both the receiver and eavesdropper. But the orginal message is send to the receiver and the information signal which looks same as the original message is send to the eavesdropper. The existing system says that if the eavesdropper is of lower quality than the transmitter that is transmitter having higher quality then it is easy for the transmitter to avoid the interface and send the information safely.
[1]. R. Negi, S. Goel, "Secret Communication using Noise," To appear in Proceedings VTC Fall ‟05, Sept. 2005.
[2]. I. Csiszar, J. Korner, "Broadcast Channels with Confidential Messages," IEEE Trans. Info. Theory, pp. 339-348, May 1978.
[3]. U. M. Maurer, "Unconditionally Secure Key Agreement and the Intrinsic Conditional Information," IEEE Trans. Info. Theory, pp. 499-514, March 1999.
[4]. A. E. Hero, "Secure Space-Time Communication," IEEE Trans. Info. Theory, pp. 3235-3249, Dec. 2003.
[5]. H. Koorapaty, A. A. Hassan, S. Chennakeshu, "Secure Information Transmission for Mobile Radio," IEEE Trans. Wireless Communications, pp. 52-55, July 2003.
[6]. G. J. Foschini, D. Chizhik, M. J. Gans, C. Papadias, R. A. Valenzuela, "Analysis and performance of some basic spacetime architectures," IEEE J. Select. Areas Commun., Special Issue on MIMO Systems, pt. I, vol. 21, pp. 303-320, Apr. 2003.
[7]. X. Tang, R. Liu, P. Spasojevic, and H. V. Poor, "Interference-assisted secret communication," in Proc. IEEE ITW, Porto, Portugal, May 2008, pp. 164–168.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Efficient Techniques for Service Oriented Application |
Country | : | India |
Authors | : | Anoop P |
: | 10.9790/0661-16630815 |
Abstract: A Service-Based application is composed of different services available in a network, which performing the required functions of the architecture. Web services composition is emerging as a technology for the effective automation of business to business co-operation. It allows organizations to form an alliances by connecting their databases, applications and systems to offer ``one stops shops" for their clients. In the business world, SLA binds the legal relationships between customer and service provider. This method is independent of specific programming language or operating systems. Preventing the chances for SLA violations is an important thing in business world to keep quality of services as good
[1]. M.P. Papazoglou, P. Traverso, S. Dustdar, and F. Leymann,"Service-Oriented Computing: State of the Art and Research Challenges,"Computer,vol. 40, no. 11, pp. 38-45, Nov. 2007.
[2]. A. Dan, D. Davis, R. Kearney, A. Keller, R. King, D. Kuebler, H. Ludwig, M. Polan, M. Spreitzer, and A. Youssef, "Web Services on Demand: WSLA-Driven Automated Management," IBM Systems J., vol. 43, no. 1, pp. 136-158, Jan. 2004.
[3]. L. Bodenstaff, A. Wombacher, M. Reichert, and M.C. Jaeger, "Analyzing Impact Factors on Composite Services,"Proc. IEEE Int‟l Conf. Services Computing (SCC ‟09), pp. 218-226, 2009.
[4]. B. Wetzstein, P. Leitner, F. Rosenberg, S. Dustdar, and F. Leymann, "Identifying Influential Factors of Business Process Performance Using Dependency Analysis,"Enterprise Information Systems,vol. 4, no. 3, pp. 1-8, July 2010.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Positioning of ecotourism destination is crucial to survival and success of business value chain of the cultural sites as alternative source of livelihood of the local communities in Kisumu County. This paper sought to establish significant factors to consider in branding cultural sites as ecotourism destinations for sustainable livelihood in Kisumu County and its environs. This study was anchored on Place Branding Theory and Social Exchange Theory. The study adopted descriptive embedded case design and cross-sectional survey in the three selected units of analysis methodology with both quantitative and qualitative approaches to source and analyze data. The finding established that positioning of ecotourism destinations will increase visitations in Kisumu County and create business value chain opportunities for sustainable source of livelihood.
Keywords: Positioning, Ecotourism Destinations, Kisumu county, Cultural diversity
[1]. Aaker, D.A & Joachimsthaler, E (2004) Brand Leadership. Free Press Business, Sydney.
[2]. Abila, R (2003): Utilization and Economic Valuation of the Yala swamp Wetland, Kenya. Best practices in Participatory Management. Proceedings of a workshop held at 2nd International conference on wetlands and development, Dakar, Senegal. Wetland International 96-104 IUON- WWF publications No. 65 wageningen, The Netherlands.
[3]. Anholt, S. (2007). Competitive Identity: the new brand management for nations, Cities and regions. New York, NY: Palgrave MacMillan
[4]. Baker, M. & Cameron, E. (2008). Critical success factors in destination marketing.
[5]. Tourism and Hospitality Research: 8(2). 79-97
[6]. Blain, C. Stuart E. L, & Ritchie, J.R (2005). "Destination Branding: Insights and practices from Destination Management Organizations" Journal of Travel Research, 43, 328-338
- Citation
- Abstract
- Reference
- Full PDF
Abstract: This paper presents discussions on observed scenarios that characterize water-based recreational activities with an aim of laying grounds for appreciating relationships that enhance or hamper ecotourism development in Lake Victoria, Kisumu County. The study was premised from an argument that lake water resources demonstrate prospects for activities like swimming, boating, sunbathing, skiing, recreational fishing and visual amenities among others. The study was conducted through observations and confirmatory follow up queries from relevant stakeholders along Lake Victoria from Asat, Ogal, Usoma and Lwangni beaches of Lake Victoria. The main objective was to examine existing trends of water-based activities in relation to ecotourism and envisage potentials of each beach water front for recreation in Kisumu County
[1]. Ajzen, I., (1991): The theory of planned behaviour. Organ. Behav. Hum. Decis. Process. 50: 179–211.
[2]. Ajzen, I.; Driver, B.L., (1992): Applications of the theory of planned behaviour to leisure choice. J. Leis. Res. 24: 297–316.
[3]. Bahri, A (2012): Integrated urban Water Management. Glbal Water Partnership Technical Committee Background Papers No. 16.
[4]. Brown, Soaemalelagi & Wasco (2003); Ecotorism Plan Proposal for American Saoa, ECOCLUB.com E-Paper Series, Nr. 5.
[5]. Byrne, D. (2001): "Complexity science and transformation in social policy‟, Social Issues, Vol. 1, No. 2, Obtained through the internet: http:/www.whb.co.uk/ socialissues/ tb.htm (Accessed 24 December 2013)
[6]. De Young, R., (2000): Expanding and evaluating motives for environmentally responsible behaviour. J. Soc. Issues 56: 509–526.
[7]. Dustin, D.L., Bricker, K.S., & Schwab, K.A. (2010): People and nature: toward an ecological model of health promotion. Leisure Sciences, 32, 3 - 14.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Geographical Routing Technique is a new trend in Wireless Sensor Networks in which the sensor nodes are enabled using Global Positioning Systems (GPS). This helps to easily detect the position of their neighboring nodes. The power consumption is more in the existing routing algorithms, since the nodes build the routing tables and the neighboring node IDs are determined by searching the routing table. In this paper, we have proposed Secure Single-Copy Energy Efficient Geographical Routing (SSEGR) algorithm in which the data traffic and energy consumption is minimized using single copy data transfer.
[1]. M Ozaki, Y. Adachi, Y. Iwahori, and N. Ishii, Application of fuzzy theory to writer recognition of Chinese characters, International Journal of Modelling and Simulation, 18(2), 1998, 112-116. Note that the journal title, volume number and issue number are set in italics.
[2]. Xiaonan Wang and Huanyan Qian, Constructing a 6LoWPAN Network Based on a Cluster Tree, IEEE Transactions on Vehicular Technology, 61( 3), 2012, 1398-1405,
[3]. Matteo Lucchi and Marco Chiani, Distributed Detection of local Phenomena with Wireless Sensor Networks, Proc. IEEE ICC Conf. 2010, 1-6.
[4]. AVU Phani Kumar, Adi Mallikarjuna Reddy V and D Janakiram, Distributed Collaboration for Event Detection in Wireless Sensor Networks, Proc. 3rd International Workshop on Middleware for Pervasive and Ad-hoc Computing (MPAC), 2005, 1-8.
[5]. Brad Karp and H T Kung, GPSR: Greedy Perimeter Stateless Routing for Wireless Network, Proc. 6th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom), 2000, 243-254.
[6]. Tain He, John A Stankovic, Chenyang Lu and Tarek Abdelzaher, SPEED : A Stateless Protocol for Real-Time Communication in Sensor Networks, Proc. 23rd International Conference on Distributed Computing Systems (ICDCS), 2003, 46-55.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Data storage security in Cloud |
Country | : | India |
Authors | : | Mrs. Niyamat Ujloomwale, Mrs. Ranjana Badre |
: | 10.9790/0661-16635056 |
Abstract: Cloud computing is worthy of consideration and try to build business systems as a way for businesses in this way can undoubtly bring about lower costs, higher profits and more choice; for large scale industry, Data security has become the most important issue of cloud computing security. Though many solutions have been proposed, many of them only considers one side of security ;this paper proposes the cloud data security must be considered to analyze the data security risk, the data security requirements, deployment of security functions and the data security process through encryption.
[1] Cong Wang Qian Wang kui Ren Wenjing Lou "Ensuring Data storage Security in cloud computing" Dept of ECE, Illinois Inst. Of Technol., Chicago, Il, USA 17th Internationalconference in Quality of service, Aug 2009.
[2] K. D. Bowers, A. Juels, and A. Oprea, "Proofs of Retrievability: Theory and Implementation," Cryptology ePrint Archive, Report 2008/175,2008.
[3] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z.Peterson, and D. Song, "Provable Data Possession at Untrusted Stores," Proc. Of CCS '07, pp. 598–609, 2007.
[4] T. S. J. Schwarz and E. L. Miller, "Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage," Proc.of ICDCS '06, pp. 12–12, 2006.
[5] M. Lillibridge, S. Elnikety, A. Birrell, M. Burrows, and M. Isard, "A Cooperative Internet Backup Scheme," Proc. of the 2003 USENIX Annual Technical Conference (General Track), pp. 29–41, 2003.
[6] K. D. Bowers, A. Juels, and A. Oprea, "HAIL: A High- Availability and Integrity Layer for Cloud Storage," Cryptology ePrint Archive, Report 2008/489, 2008, http://eprint.iacr.org/.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Data Trawling and Security Strategies |
Country | : | India |
Authors | : | Venkata Karthik Gullapalli, Aishwarya Asesh |
: | 10.9790/0661-16635759 |
Abstract: The amount of data in the world seems increasing and computers make it easy to save the data. Companies offer data storage by providing cloud services and the amount of data being stored in these servers is increasing rapidly. In data mining, the data is stored electronically and the search is automated or at least augmented by computer. As the volume of data increases, inexorably, the proportion of it that people understand decreases alarmingly. This paper presents the data leakage problem arises because the services like Facebook and Google store all your data unencrypted on their servers, making it easy for them, or governments and hackers, to monitor the data.
[1] Brijesh Kumar Baradwaj, and Saurabh Pal, Mining Educational Data to Analyze Students Performance, International Journal of Advanced Computer Science and Applications (IJACSA), Vol. 2, No. 6, 2011.
[2] V. Sangamithra, T. Kalaikumaran and S. Karthik, Data mining techniques for detecting the crime hotspot by using GIS, ISSN 2278 - 1323, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), Volume 1, Issue 10, December 2012.
[3] Amit Kapoor, Data Mining: Past, Present and Future Scenario, ISSN 2278-6856, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), Volume 3, Issue 1, January – February 2014.
[4] Naveeta Mehata, and Shilpa Dang, Data Mining Techniques for Identifying the Customer Behavior of Investment in Stock Market in India, ISSN 2277 3622, International Journal of Marketing, Financial Services & Management Research, Vol.1 Issue 11, November 2012.
[5] Kapil Sharma, Sheveta Vashisht, Heena Sharma, Richa Dhiman, and Jasreena Kaur Bains, A Hybrid Approach Based On Association Rule Mining and Rule Induction in Data Mining, ISSN: 2231-2307 International Journal of Soft Computing and Engineering (IJSCE), Volume-3, Issue-1, March 2013.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Researchers are needed for settling on the choice of information mining. In any case a few associations to help with some external counsellor for the procedure of information mining on the grounds that they don't have their consultant. At the time of getting counsel from the outside counsellor it may have to face risks. The loss of business intelligence and client information security and security related issues are emerging. In mining it is the main challenging issue. The owner of the data has some private information or property like association rule contained outsources database. However the mining results integrity can influence gravely if the administration supplier is not reliable. To overcome this problem we are planning to use AMDSRRC. In this paper, we propose a heuristic based algorithm named AMDSRRC (Advanced Modified Decrease Support of R.H.S. item of Rule Clusters) to conceal the exceedingly association rules with different items in consequent (R.H.S) and antecedent (L.H.S).
[1]. Mr. Pravin R. Ponde and Dr. S. M. Jagade, "Privacy Preserving by Hiding Association Rule Mining from Transaction Database" In International Organisation of Scientific Research Journal. Vol-16, Issue 5, V2, Sep-Oct 2014, PP 25-31
[2]. Mr. Pravin R. Ponde and Dr. S. M. Jagade, "Maintaining Privacy and Data quality to hide sensitive items from Database" in International Journal of Application or Innovation and Engineering and Management, Vol-3, Issue-7, July 2014. PP. 355-361.
[3]. Nikunj H. Domadiya, U. P. Rao,"Hiding Sensitive Association Rules to Maintain Privacy and Data Quality in Database" in IEEE Third International Advace Computing Conference (IACC), PP 1306-1310, 2013.
[4]. C. N. Modi, U. P. Rao, and D. R. Patel, "Maintaining privacy and data quality in privacy preserving association rule mining," 2010 Second Iternational conference on Computing, Communication and Networking Technologies, pp. 1–6, Jul. 2010.
[5]. X. Sun and P.S. Yu "A Border-Based approach for hiding the frequent item sets" In Proc. Fifth IEEE Int‟I conf. data mining (ICDM "05), pp. 426-433 Nov 2005.
[6]. V. Verkios and A. Gkoulalas- Divanis, A Survey of association rule hiding method for privacy, ser. Advance in database systems. Springer US, 2008, vol. 34.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Using Daub achy Wavelet for Shot Boundary Detection |
Country | : | Iraq |
Authors | : | Ahmed Tariq, Nada Flail, Amaal Ghazi |
: | 10.9790/0661-16636670 |
Abstract: SHOT Boundary Detection Is A Fundamental Step In Most Video Processing And Manipulation Applications. With The Wide Spread Of Video Usage Nowadays, The Rise For Automated Video Shot Boundary Detection Becomes An Essential. This Paper Summarises The Mostly Used Shot Boundary Detection Techniques, Then Suggests The Implementation Of Daubachy 4 Wavelet Along With Hsv Color Space In Order To Presents An Automated Shot Boundary Technique.
Keywords: Video Processing, Shot Boundary Detection, Daubechies Wavelet, Hsv
[1]. Yi Zhang And Tat-Seng Chua, " Video Modeling And Retrieval", Multimedia Image And Video Processing, CRC Press, 2001.
[2]. Eyas EL-QAWASMEH," Scene Change Detection Schemes For Video Indexing In Uncompressed Domain", INFORMATICA, 2003, Vol. 14, No. 1, 19–36.
[3]. Farag & Abdel-Wahab," Video Shot Boundary Detection", Idea Group Inc., 2005.
[4]. Haiyan Xie, " Key Frame Segmentation In Video Sequences– Applied To Reconstruction Of 3D Scene", M.SC. Thesis, Department Of Technology, University Of Kalmar, Sweden, 2008.
[5]. Hartmann, "Wavelets", ATMS 552 Notes, P 255-275, 2014
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Modified Leach in Wireless Sensor Network |
Country | : | India |
Authors | : | Nabeela Ansari, Raj Kumar Paul |
: | 10.9790/0661-16637178 |
Abstract: Wireless sensor network consists of large number of sensor nodes which is used to capture environmental conditions, process and transfer it to base station. These sensor nodes are sensitive to energy consumption and gets exhausted on working. So we need to emphasize on reducing energy dissipation of sensor nodes in order to improve network lifetime. Various routing protocols are developed to enhance network scalability and stability. The cluster based routing is an efficient way of reducing energy dissipation by limiting data transmission from nodes to base station.
[1]. M. Aslam, N. Javaid, A. Rahim, U. Nazir, A. Bibi, Z. A. Khan "Survey of extended LEACH – based clustering routing protocols for wireless sensor network" IEEE transaction on Antennas and propagation ,vol 50 No 5 May 2012.
[2]. Nilesh Kumar,Mamta Katiyar "An Energy Efficiency Routing Protocol for Improving Lifetime of Wide Area Wireless Sensor Networks: A Review" International Journal of Engineering Trends and Technology (IJETT) – Volume 11 Number 2 - May 2014
[3]. Hyunjo Lee, Miyoung Jang, and Jae-Woo Chang, "A New Energy-Efficient Cluster-Based Routing Protocol Using a Representative Path in Wireless Sensor Networks" International Journal of Distributed Sensor Networks Volume 2014 (2014), Article ID 527928
[4]. Mahmood Ali and Sai Kumar Ravula" Real –time support and energy efficiency in wireless sensor networks.
[5]. Kemal Akkaya and Mohamed Younis "A Survey on Routing Protocols for Wireless Sensor Networks"
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Reliable SPIN in Wireless Sensor Network: A Review |
Country | : | India |
Authors | : | Jitender Grover, Mohit Sharma, Shikha |
: | 10.9790/0661-16637983 |
Abstract: Wireless sensor network (WSN) is becoming famous because of its use in various applications of different areas such as environment, defense, medical, house, media and education. WSN is a structure free network where requirement of application decides the network structure, topology and routing protocols. Data transmission in sensor network is possible with the help of routing protocols. There are multiple routing protocols in WSN which provide efficient data delivery but reliability is still a major constraint of WSN. When data is transmitted from source node to the sink or Base Station (BS), some data packets may lost due to some reason such as failure of node, dead node.
[1] Martin Enzinger, "Energy-efficient communication in Wireless Sensor Networks", Proceedings of the Seminar Sensor Nodes - Operation, Network and Application (SN), Summer Semester 2012, volume NET-2012-08-2 of Network Architectures and Services (NET), pp. 25-31, August 2012.
[2] Jyoti, Harkesh Sehrawat and Devender Sharma, "Energy Efficient M-SPIN Protocol", International Journal of Scientific & Engineering Research, Volume 3, Issue 10, pp. 1-9, October 2012.
[3] K. Vinoth Kumar and S.Karthikeyan, "Multihop Energy Efficient Reliable and Fault Tolerant Routing Protocol for Wireless Sensor Networks" International Journal of Emerging Technology and Advanced Engineering, Volume 3, Issue 2, February 2013.
[4] Nihal Srivastava, Sandeep Seth, Mohit Kumar and Rakesh Kumar, "Energy Efficient Protocols for Wireless Sensor Networks: A Review", International Journal of Computer Technology & Applications, Volume 4, Issue 3, pp. 434-444, May-June 2013.
[5] Jamal N. Al-Karaki and Ahmed E. Kamal, "Routing Techniques in Wireless Sensor Networks: A Survey" IEEE Conference on Wireless Communications, Volume 11, Issue 6, pp. 6-28, December 2004.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: This paper proposes a new filter for noisy imagescorrupted with salt and pepper noise which are caused due to flaws in sensor, transmission. Proposed algorithm (Decision Based Expanded Window Median Filters (DBEWMF) with multiple scanning) works on noisy pixel and noise free pixel left unchanged. Filteruses an expanded window, where processed pixel is a central pixel follows with multiple scanning of same image. Filter Expands the window size (up to 7 x 7), if window contains noisy pixels equal to or more than three forth of total pixels in orderto find more noise free pixels if still window has more noisy pixels than it will place as it is in de-noise image in first and second scanning but in third scanning replacement of processed pixel with mean value of window else window contains less than three forth noisy pixels than processed pixel is replaced using median value of window. The Proposed scheme shows better quantitatively and qualitatively in the image than standard and other algorithm.
[1] Lei Zhang a, _, WeishengDong a,b, DavidZhang a, GuangmingShi, "Two-stage image denoising by principal component analysis with local pixel grouping,"Elsevier 2009
[2] Charu Khare, Kapil Kumar Nagwanshi, "Implementation and Analysis of Image Restoration Techniques", International Journal of Computer Trends and Technology- May to June Issue 2011, ISSN:2231-2803
[3] Pitas, I.: Digital Image Processing Algorithms and Applications.Wiley, Hoboken (2000)
[4] Pomalaza-Racz, C.A., Macgillem, C.D.: An adaptive non linear edge preserving filter. IEEE Trans. ASSP 32(3), 571–576 (1984)
[5] Raymond H. Chan, Chung-Wa Ho, and Mila Nikolova, "Salt-and-Pepper Noise Removal by Median-Type Noise Detectors and Detail-Preserving Regularization, IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 14, NO. 10, OCTOBER 2005
[6] Taeg Sang Cho et al. "Image Restoration by Matching GradientDistributions." IEEE Transactions on Pattern Analysis andMachine Intelligence 34.4 (2012): 683–694.