Version-4 (Nov-Dec 2014)
Ver-1 Ver-2 Ver-3 Ver-4 Ver-5 Ver-6 Ver-7 Ver-8
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Video Steganography Using LSB Matching Revisited Algorithm |
Country | : | India |
Authors | : | R. Shanthakumari, Dr.S. Malliga |
: | 10.9790/0661-16640106 |
Abstract: Video Steganography deals with hiding secret data or information within a video. In this paper, a spatial domain technique for LSB Matching Revisited algorithm (LSBMR) has been proposed, where the secret information is embedded in the cover frames. LSB Matching Revisited(LSBMR) algorithm selects the embedding regions according to the size of secret message and the difference between two consecutive pixels in the cover image. For embedding rates is lower , only sharper edge regions are used while keeping the other smoother regions as they are. In the proposed approach, LSB Matching Revisited algorithm is used to embed the secret message into the video. Hence large amounts of data can be embedded and also preserving higher visual quality of stego images at the same time.
[1]. E. Cole and R.D. Krutz, Hiding in Plain Sight: Steganography and the Art of Covert Communication, Wiley Publishing, Inc., ISBN 0-471-44449-9, 2003.
[2]. Katzenbeisser and Fabien A. P. Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking, Artech House Books, ISBN 1-58053-035-4, 1999.
[3]. D. Stanescu, M. Stratulat, B. Ciubotaru, D. Chiciudean, R. Cioarga and M. Micea, Embedding Data in Video Stream using Steganography, in 4th International Symposium on Applied Computational Intelligence and Informatics, SACI-2001, pp. 241-244, IEEE, 2007.
[4]. Feng Pan, Li Xiang, Xiao-Yuan Yang and Yao Guo, Video Steganography using Motion Vector And Linear Block Codes, in IEEE 978-1-4244-6055-7/10/, pp. 592-595,2010.
[5]. A. Westfield, and A. Pfitzmann, Attacks on Steganographic Systems, in Proceedings of 3rd Info.Hiding Workshop, Dresden, Germany, Sept. 28−Oct. 1, pp. 61-75, 1999.
[6]. J. Fridrich, R. Du, and L, Meng, Steganalysis of LSB Encoding in Color Images, in Proceedings of ICME 2000, Jul.-Aug. 2000, N.Y., USA.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | An Efficient Model for Patent Search Pattern |
Country | : | India |
Authors | : | B.. Harika,, Mr.. M.V..Jagannathareddy |
: | 10.9790/0661-16640711 |
Abstract: Patents are very important for protecting the sophisticated property of individuals. Patent Search helps us to find the previously developed similar patents and used to certify the newly developing patent applications. As such it has gained both economical and technical attention. In the Existing system there is no proper attention to user's search purpose and searching time responsiveness.
..........................,
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Optimal Content Downloading in Vehicular Networks |
Country | : | India |
Authors | : | K.Vishal, Hanuman Prasad |
: | 10.9790/0661-16641220 |
Abstract: We consider a system where users aboardcommunication-enabled vehicles are interested in downloading different contents from Internet-based servers. This scenario captures many of the infotainment services that vehicular communication is envisioned to enable, including news reporting, navigation maps and software updating, or multimedia file downloading. In this paper, we outline the performance limits of such a vehicular content downloading system by modeling the downloading process as an optimization problem, and maximizing the overall system throughput.
[1]. M.Francesco.C. Claudio, C. Carla-Fabianaand F.Marco,"Optimalcontentdownloadinginvehicular networks," proc.IEEEINFOCOM,July2013.
[2]. U.Paul,A.P.Subramanian,S.R.DasandM.M.Buddhikot," Understanding Traffic Dynamicsi Cellular Data Networks,"Proc. IEEEINFOCOM,Apr.2011.
[3]. K.Pentikousis,M.Palola,M.Jurvansuu,andP.Perl,"Activegoodputmeasurementsfromapublic G/UMT Snetwork, "IEEECommunica-tionsLetters,vol. 9, pp.802–804,2005.
[4]. P.Reichl,M.Umlauft, J.Fabini,R.Lauster,andG.Pospischil,"Project WISQY:Ameasurement- basedend-to-endapplication-level performancecomparisonof2.5Gand3Gnetworks,"inProc. Fourth Ann. Wireless Telecomm. Symp(FTS),2005.
[5]. K.Mattar,A.Sridharan,H.Zang,I.Matta,andA.Bestavros,"TCPoverCDMA2000networks:A cross-layermeasurementstudy,"inProc.PAM, 2007
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Automated system for deployment of websites and windows services to the production servers |
Country | : | India |
Authors | : | Drumil V. Deshpande |
: | 10.9790/0661-16642123 |
Abstract: This paper is discussed on automated system for deployment of websites and windows services to the production servers. The aim of this paper is to develop and implement an automatic system for deployment of websites and windows services to the production servers.[1]-[2] In addition to that it also foresees the issues regarding re scheduling of errored windows services. The system is implemented using windows sql server as a database, asp.net as the front end technology and c# the used programming language.The paper presents a method to reduce human effort required in rescheduling running windows services on a server and also deployment to the production servers.
Keywords: Automated deployment, production servers , windows services , websites.
[1]. Automate your deployment process, http://www.rackspace.com/blog/automate-your-deployment-process/
[2]. Jez Humble, Chris Read, Dan North, The Deployment Production Line.
[3]. Architecture model,https://developer.ibm.com/urbancode/products/urbancode-deploy/features/architecture/
[4]. Microsoft Sql server 2008, http://msdn.microsoft.com/en-us/library/ff929050(v=sql.10).aspx
[5]. Common causes of network slowdown, http://www.techrepublic.com/article/common-causes-of-network-slowdowns/
[6]. The human impact of Automation, Harley Shaiken.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Impact Analysis of Dos & DDos Attacks |
Country | : | India |
Authors | : | Mrs.S.Thilagavathi, Dr.A.Saradha |
: | 10.9790/0661-16642433 |
Abstract: Denial of Service attacks constitutes one of the major threats, which poses immense threats to the Internet. In the present Internet has changed the way of traditional essential services such as banking, transportation and defense being operated. These operations are being replaced by cheaper, more efficient Internet-based applications. It is all because of rapid growth and success of Internet in every sector. Unfortunately with the growth of Internet, count of attacks on Internet has also increased incredibly fast. The researchers have to find details of these type of attacks because due to avoid the damaging reputation issues, In this paper, an overview of Denial-of-Service(DoS)&Distributed denial-of-service (DDOS) attacks are provided. Real distributed denial-of-service incidents with their financial impact are analyzed and finally DOS and DDOS solution is highlighted.
[1]. Daljeet Kaur , Monika Sachdeva., ‖Study of Recent DDoS Attacks and Defense Evaluation Approaches‖, International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459,ISO 9001:2008 Certified Journal, Volume 3, Issue 1, January 2013)
[2]. Monika Sachdev, Guruvinder Singh, Krishnan Kumar And Kuldip Singh.,
[3]. ―DDoS Incidents and their Impact :overview‖, The Internatonal Arab Journal of Information Technology, Vol.7, No.1, January 2010.
[4]. Daljeet Kaur, Monika Sachdeva Department of Computer Science and Engineering, SBS Stat Technical Campus, Ferozepur – 152004, Punjab, India
[5]. Jake Stein, ―DoS Attacks Trend Toward Politics‖.
[6]. Shiva kumar , Ritika singal, priyadharshini , ―Mitigate the Impact of DOS Attack by Verifying Packet Structure‖, ―ECE Department LCET Katani, Kalan, India.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: This paper proposes a new approach to provide an extra layer of security to steganographic techniques. Today, most of the data is sent over the internet, whether personal or professional. Protection of digital multimedia content has become an increasingly important issue for content owners and service providers; therefore; there is a never ending demand to make the transmission network more secure. Conventional cryptography methods are vastly open to unauthorized attacks as they are well known to attackers and many new kinds of attacks are being raised, exploiting the loop holes in the conventional techniques.
[1]. E. Winfree, and D. K. Gifford, "DNA Based Computers V, Massachusetts Institute of Technology," DIMACS Series in
DiscreteMathematics and Theoretical Computer Science, American Mathematical Society, vol. 54, 2000.
Books:
[2]. W. Peter, "Disappearing cryptography: information hiding: steganography and watermarking," Amsterdam:
MK/MorganKaufmannPublishers, 2002.
[3]. P. Fabian and A. P. Katzenbeisser, Stefan, "Information Hiding Techniques for Steganography and Digital Watermarking,"
ArtechHouse Publishers, 2000.
Chapters in Books:
[4]. S. Singh "The code book. The science of secrecy from ancient Egypt to quantum cryptography", SwiatKsiazki, pp. 19 -21, 2003.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: In Data Mining, the effectiveness of association rules is limited by the huge quantity of delivered rules. In this manuscript, we propose a new approach to prune and filter discovered rules. An interactive and iterative framework is designed to assist the user along the analyzing task. The manuscript focus on medical data test set for detailed analysis and formation of the ontologies. In the proposed approach, the data set of medical records is entered in the back – end database. The development of associations and the ontology is fully dynamic.
[1]. Baesens, B., S. Viaene, and J. Vanthienen. (2000). Post-Processing of Association Rules. The Sixth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD'2000), pages 2 - 8.
[2]. Piatetsky-Shapiro, G. and C.J. Matheus. (1994). The Interestingness of Deviations. In U. M. Fayyad and R. Uthurusamy (eds.), Knowledge Discovery in Databases, Papers from AAAI Workshop (KDD ' 94), pages 25 – 36.
[3]. Klemettinen, M., H. Mannila, P. Ronkainen, H. Toivonen, and A. I. Verkamo. (1994). Finding Interesting Rules from Large Sets of Discovered Association Rules. International Conference on Information and Knowledge Management (CIKM), pages 401-407.
[4]. Padmanabhan, B. and A. Tuzhuilin. (1999). Unexpectedness as a Measure of Interestingness in Knowledge Discovery. Decision Support Systems, Volume 27, Number 3, Elsevier, pages 303-318.
[5]. Toivonen, H., M. Klementinen, P. Ronkainen, K. Hatonen, and H. Mannila. (1995). Pruning and Grouping of Discovered Association Rules. Mlnet Workshop on Statistics, Machine Learning, and Discovery in Databases, pages 47 - 52.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Getting clear images in underwater environments is an important issue in ocean engineering . The quality of underwater images plays a important role in scientific world. Capturing images underwater is difficult, generally due to deflection and reflection of water particles, and color change due to light travelling in water with different wavelengths. Light dispersion and color transform result in contrast loss and color deviation in images acquired underwater. Restoration and Enhancement of an underwater object from an image distorted by moving water waves is a very challenging task.
[1] John Y. Chiang and Ying-Ching Chen, "Underwater Image Enhancement by Wavelength Compensation and Dehazing" IEEE Transactions on Image Processing, Vol. 21, No. 4, April 2012
[2] K. Lebart, C. Smith, E. Trucco, and D. M. Lane, "Automatic Indexing of Underwater Survey Video: Algorithm and Benchmarking Method," IEEE J. Ocean. Eng., Vol. 28, No. 4, Pp. 673–686, Oct. 2003.
[3] Baharum B Baharudin, "Significance Level of Image Enhancement Techniques for Underwater Images" 2012 International Conference on Computer & Information Science (Iccis)978-1-4673-1938-6112/$3l.00 ©20 12 IEEE
[4] Kaiming He, Jian Sun,Xiaoou Tang, "Single Image Haze Removal using Dark Channel Prior" Vol.3 Issue.2, February- 2014, Pg. 603-605
[5] Rajesh Garg, Bhawna Mittal, Sheetal Garg, "Histogram Equalization Techniques for Image Enhancement"
[6] Http://Science.Kennesaw.Edu/~Jdirnber/Limno/Lecphy/Lecphy.Html
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Novel identity based secure distributed data storage scheme |
Country | : | India |
Authors | : | M. Ramadevi, D. Bulla Rao |
: | 10.9790/0661-16645359 |
Abstract: Secure distributed data storage can shift the burden of maintaining a large number of files from the owner to proxy servers. Proxy servers can convert encrypted files for the owner to encrypted files for the receiver without the necessity of knowing the content of the original files. In practice, the original files will be removed by the owner for the sake of space efficiency. Hence, the issues on confidentiality and integrity of the outsourced data must be addressed carefully.
[1] H. Hacig¨um¨us, B. R. Iyer, C. Li, and S. Mehrotra, "Executing SQL over encrypted data in the database-service-provider model," in Proceedings: SIGMOD Conference - SIGMOD'02 (M. J. Franklin, B. Moon, and A. Ailamaki, eds.), vol. 2002, (Madison, Wisconsin, USA), pp. 216–227, ACM, Jun. 2002.
[2] L. Bouganim and P. Pucheral, "Chip-secured data access: Confidential data on untrusted servers," in Proc. International Conference on Very Large Data Bases - VLDB'02, (Hong Kong, China), pp. 131– 142, Morgan Kaufmann, Aug. 2002.
[3] U. Maheshwari, R. Vingralek, and W. Shapiro, "How to build a trusted database system on untrusted storage," in Proc. Symposium on Operating System Design and Implementation - OSDI'00, (San Diego, California, USA), pp. 135–150, USENIX, Oct. 2000.
[4] A. Ivan and Y. Dodis, "Proxy cryptography revisited," in Proc. Network and Distributed System Security Symposium - NDSS'03, (San Diego, California, USA), pp. 1–20, The Internet Society, Feb. 2003.
[5] G. Ateniese, K. Fu, M. Green, and S. Hohenberger, "Improved proxy re-encryption schemes with applications to secure distributed storage," in Proc. Network and Distributed System Security Symposium - NDSS'05, (San Diego, California, USA), pp. 1–15, The Internet Society, Feb. 2005.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | DBET: Demand Based Energy efficient Topology for MANETs |
Country | : | India |
Authors | : | Pawar Priyanka, Auti Sarika, Jadhav Roshana, Dighe Snehal |
: | 10.9790/0661-16646064 |
Abstract: Energy efficient topology in Ad-hoc networks can be achieved mainly in two different ways. In the first method, network maintains a small number of nodes to form a connected backbone and the remaining nodes sleep to conserve energy. This method is effective for low traffic networks. Energy efficiency in the second method is achieved by power control technique. This technique is effective in high traffic conditions. The first method is not effective in high traffic conditions.
[1] The network simulator - ns-2.33. http://www.isi.edu/nsnam/ns.
[2] Douglas M. Blough, Mauro Leoncini, Giovanni Resta, and Paolo Santi. The k-neighbors approach to interference bounded and symmetric topology control in ad hoc networks. IEEE Transactions on Mobile Computing, 5(9):1267–1282, 2006.
[3] Benjie Chen, Kyle Jamieson, Hari Balakrishnan, and Robert Morris. Span: An energy-efficient coordination algorithm for topology mainte-nance in ad hoc wireless networks. ACM Wireless Networks, 8:85–96, September 2001.
[4] H. P. Gupta and S. V. Rao. Pclr: Power control-based locally customize routing for manet. In Proc. IEEE International Conference on RF and Signal Processing Systems, pages 632–637, 2010.
[5] N. Li, J.C. Hou, and L. Sha. Design and analysis of an mst-based topology control algorithm. In INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, pages 1702 – 1712, mar. 2003.
[6] Xiang-Yang Li and Peng-Jun Wan. Constructing minimum energy mobile wireless networks. SIGMOBILE Mob. Comput. Commun. Rev., 5(4):55–67, 2001.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Community question answers have become extremely popular over the some past few years. It allows community members to share their thoughts by answering given question or acquire information from a set of answered questions. However, existing cQA forum support only textual answer which is not so informative for many community users. The cQA forum can be enhanced by adding suitable multimedia data. Multimedia question answer (MMQA) provides intuitive information with more appropriate image or video.
[1]. Nie, Liqiang, et al. "Beyond text QA: Multimedia answer generation by harvesting Web information." Multimedia, IEEE Transactions on 15.2 (2013): 426-441..
[2]. Chua, Tat-Seng, et al. "From text question-answering to multimedia QA on web-scale media resources." Proceedings of the First ACM workshop on Large-scale multimedia retrieval and mining. ACM, 2009.
[3]. Nie, Liqiang, et al. "Multimedia answering: enriching text QA with media information." Proceedings of the 34th international ACM SIGIR conference on Research and development in Information Retrieval. ACM, 2011.
[4]. Moschitti, Alessandro, and Silvia Quarteroni. "Linguistic kernels for answer re-ranking in question answering systems." Information Processing & Management 47.6 (2011): 825-842.
[5]. Hsu, Chih-Hao, et al. "Using domain ontology to implement a frequently asked questions system." Computer Science and Information Engineering, 2009 WRI World Congress on. Vol. 4. IEEE, 2009.
[6]. R. C. Wang, N. Schlaefer, W. W. Cohen, and E. Nyberg, "Automatic set expansion for list question answering," in Proc. Int. Conf. Empirical Methods in Natural Language Processing, 2008.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: In the recent past there has been a revolution in software industries. This is because of the software industries have increasingly been adopting agile practices. Scrum is the most widely adopted agile method which is said quick and interactive way for developing software. This paper aims measuring efficiency of scrum as efficiency is one of the most important principle for getting economic advantage. To meet our set goal we will use data envelopment analysis (DEA) in concern with scrum.
Keywords: Agile, Data Envelopment Analysis (DEA), Efficiency, Key performance indicator (KPI), Scrum.
[1] Ken Schwaber and Jeff Sutherland, The Scrum Guide™ (July 2013).
[2] Beck, K., Beedle, M., van Bennekum, A., Cockburn, A., Cunningham, W., Fowler, M., Grenning, J., Highsmith, J., Humt, A., Je®
ries, R., Kern, J., Marick, B., Martin, R.C., Mellor, S., Schwaber, K., Sutherland, J., Thom, D., Manifesto for agile software
development. Website (2001) http://agilemanifesto.org/.
[3] http://en.wikipedia.org/wiki/Scrum_(software_development)
[4] Hugo Hollanders and Funda Celikel Esser, Measuring innovation efficiency INNO-Metrics Thematic Paper (December 2007).
[5] Ž. Antolić, An Example of Using Key Performance Indicators for Software Development Process Efficiency Evaluation. R&D
Center Ericsson Nikola Tesla d.d.
- Citation
- Abstract
- Reference
- Full PDF
Abstract:The detection of oceanic structures, such as upwelling's or eddies, from satellite images has significance for marine environmental studies, coastal resource management, and ocean dynamics studies. There is a lack of tools that allow us to retrieve automatically relevant structures from large satellite image databases. This Paper focuses on the development and validation of a Content-Based Image Retrieval (CBIR) system to classify and retrieve oceanic structures from satellite images with improved accuracy. The image we obtain from http://oceancolor.gsfc.nasa.gov/, which give images from different satellite like Sea-viewing Wide Field-of-view Sensor (SeaWiFS), Moderate Resolution Imaging Spectroradiometer (MODIS), or MEdium Resolution Imaging Spectrometer (MERIS). During the processing of satellite images, different types of imperfection (uncertainties, ambiguities and vagueness) can occur.
[1] Patricia Melin, and Oscar Castillo, "Type-2 Fuzzy Logic in Image Analysis and Pattern Recognition" Advances in Type-2 Fuzzy Sets and Systems, Studies in Fuzziness and Soft Computing 301, DOI:10.1007/978-1-4614-6666-6_12, Springer Science+Business Media, New York 2013
[2] Jose A. Piedra-Fernandez, Gloria Ortega, James Z. Wang, and Manuel Canton-Garbin, "Fuzzy Content-Based Image Retrieval for Oceanic Sensing" IEEE Transactions On Geo-Science And Remote Sensing, VOL. 52, NO. 9, September 2014
[3] Patricia Melin, Claudia I. Gonzalez, Juan R. Castro, Olivia Mendoza, and Oscar Castillo, "Edge Detection Method for Image Processing based on Generalized Type-2 Fuzzy Logic" IEEE Transactions on Fuzzy Systems,TFS-2013-0313.R2
[4] Maowen Nie, and Woei Wan Tan, "Analytical Structure and Characteristics of Symmetric Karnik–Mendel Type-Reduced Interval Type-2 Fuzzy PI and PD Controllers" IEEE Transactions on Fuzzy Systems, VOL. 20, NO. 3, June 2012
[5] Zhengyu Huang, Kwang Y. Lee, and Robert M. Edwards, "Fuzzy Logic Control Application in Nuclear Power Plant"15th Triennial World Congress, Barcelona, Spain 2002