Version-6 (May-June 2016)
Ver-1 Ver-2 Ver-3 Ver-4 Ver-5 Ver-6
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Study on Proposed Distributed Attack Detection Algorithm Using Experimental and Simulation Analysis |
Country | : | India |
Authors | : | Siva Balaji Yadav.C || R.Seshadri,PhD |
Abstract: The attack detection rates are higher for large node deployment densities, as compared to the low density counterparts. This is because the attack detection scheme relies on both the individual traffic observations by the detector nodes, as well as the subsequent verification and reconstruction of observed traffic sub patterns by the detector nodes as well as the mGN nodes, for classification purposes. In this work, we evaluated the performance of our proposed distributed attack detection scheme, through experiments and simulation analysis.............
Keyword: Algorithm, distributed denial of service attacks, wireless sensor networks, Map-based attack detection scheme
[1]. Jalili, R., Imani-Mehr, F., Amini, M. and Shahriari, H. (2005). Detection of distributed denial of service attacks using statistical pre-processor and unsupervised neural networks, In Proc. of the First Information Security Practice and Experience Conference, pp. 192-203.
[2]. Gligor, V. D. (1984). A note on the denial-of-service problem, IEEE Trans-actions on Software Engineering 10(3): 320-324.
[3]. Jung, J., Krishnamurthy, B. and Rabinovich, M. (2002). Flash crowds and denial of service attacks: Characterization and implications for cdns and web sites, In Proc. of the Intl' World Wide Web Conference, pp. 252-262.
[4]. Hill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D. and Pister, K. (2000). System architecture directions for networked sensors, Acm Sigplan No- tices 35(11): 93-104.
[5]. Intanagonwiwat, C., Govindan, R. and Estrin, D. (2000). Directed discussion: A scalable and robust communication paradigm for sensor networks, In Proc. of the Sixth Annual Intl' Conf. on Mobile Computing and Networks (MOBICOM'00), pp. 56-67.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Dark Secret of SNS's Popularity |
Country | : | India |
Authors | : | Sanjiv Kumar |
Abstract: Abstract Facebook pages promising possibility to reach mass audience simply by using Facebook advertising platforms. Lately, the number of likes in Facebook play it role as an analysis to check its demand and advantage, this conduces boosting page likes; such as farm comes into the surface. Based on what has been suggested by some reports, like Farm which using network profile that likes other many pages to stay away from spam detection system, although based on our awareness Facebook promotions of pages uses systematic analysis also. This paper compares the different measurement of the study of the page, Facebook by likes cumulate and by like bots. We create a page which is a honeypot page, analyse using Facebook and bot method and analyse gathered "likes" based on profiles background.
Keyword: ...................
[1]. [1] R. Olbrich and C. Holsing, 'Facebook Ads', WIST, vol. 43, no. 10, pp. 557-560, 2014.
[2] Docs.seleniumhq.org, 'Selenium WebDriver'. [Online]. Available:
https://seleniumhq.github.io/selenium/docs/api/java/org/openqa/selenium/safari/SafariDriver.html. [Accessed: 04- Sep- 2015].
[3] YouTube, 'Facebook Fraud', 2014. [Online]. Available: https://www.youtube.com/watch?t=19&v=oVfHeWTKjag. [Accessed: 13- Sep- 2015].
[4] Alex Beutel, 'Stopping Group Attacks by Spotting Lockstep Behavior in Social Networks', 2013. [Online]. Available:
http://alexbeutel.com/papers/www2013_copycatch.pdf. [Accessed: 07-Sep- 2015].
[5] V. Baker, 'Battle of the bots: Fake social media accounts on the attack', Index on Censorship, vol. 44, no. 2, pp. 127-129, 2015.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Web-Based Decision Support System for Water Quality Monitoring and Prediction for Outdoor Microalgae Cultivation |
Country | : | |
Authors | : | Beroña, Elyzer A || Buntag, Daibey Rose B || Felomina, Tan, Mary Jane M. || Coronado, Armin S. |
Abstract: In outdoor microalgae cultivation, water quality monitoring is essential for identifying any existing problem or any issues that could emerge in the future. It is very helpful in maintaining the water parameters to its optimum level to prevent unexpected death of microalgae. In outdoor cultivation, the temperature of the environment is changing which makes the blooming of microalgae less predictable. Since the environment is not controlled, the monitoring of water quality status becomes more demanding. There is a need for a web-based Decision Support System (DSS) that allows monitoringof water quality anytime, anywhere; andpredicts future water quality..........
Keyword: Decision Support System, Water Quality Monitoring, Forecasting System, Microalgae Cultivation, K-Nearest Neighbors
[1]. Gross, M. "Development and Optimization of Algal Cultivation Systems." Graduate Theses and Dissertations, Iowa State
University. 13138 (2013) p. 4.
[2]. Enzing, C., M. Ploeg , M. Barbosa, and L. Sijtsma. "Micro-algae based products for the food and feed sector: an outlook for
Europe." Institute for Prospective technological Studies, Joint Research Centre (2014)
[3]. Wolskers H., M. Barbosa, D. Kleinergins, R. Bosma and R. Wiuffels. "Microalgae: the green gold of the future" Wageningen UR
[4]. "EnAlgae: Decision Support Toolset," AIN: Algal Information Network, www.algae- network.eu/cms/?page_id=169, last
accessed October 11, 2015.
[5]. Booth N., E. Everman, I. Kuo, L.Sprague and L. Murphy. "A Web-based Decision Support System for Accessing Regional Water
Quality Conditions and Management Actions". Journal of the American Water Resources Association. Volume 41. Issue 5.
(October 2011) pp. 1136-1150
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Balancing Load in Computational Grids: A New Approach |
Country | : | India |
Authors | : | Debashreet Das || C.R.Tripathy |
Abstract: The emergence of grid computing over the internet needs a hybrid load balancing algorithm which can take into account the various characteristics of the grid computing environment. Hence, this paper proposes a load balancing strategy called Match-Maker Algorithm, which takes into account the grid architecture, resource availability and job characteristics. More focus has been given to module migration algorithm in an automated dynamic manner for the problem of allocating software modules to the processing nodes.
Keyword: Grid computing, Load Balancing, Reference optimization problem
[1]. Yagoubi B., Slimani Y, "Load Balancing Strategy in Grid Environment", Journal of Information Technology and Applications, Vol.1, No. 4, 2007, pp.285-296.
[2]. Yagoubi et.al., "Load Balancing in Grid Computing", Asian Journal of Information Technology, 5(10), 2006, pp. 1095-1103.
[3]. Patel D., Das D., Tripathy C.R., "A new Approach for Grid Load Balancing among Heterogeneous Resources with Bandwidth Consideration",
[4]. Shirazi B.A. et.al., "Scheduling and Balancing in Parallel and Distributed Systems", IEEE Computer Society, 1995.
[5]. Kameda et.al., "An Algorithm for optimal static load balancing in distributed computing systems", IEEE Transactions on Computers, 1992.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Exploring Different Forms of Trust towards Trusting Intention in Social Media for E-Commerce Purpose |
Country | : | Malaysia |
Authors | : | Fatima Riike Muraina || Mohd Khairudin Bin Kasiran |
Abstract: Social media has been described as a platform for sharing information, buying and selling of goods and services through the internet. Thus, it has been described as a place where electronic commerce is been taken place. However, consumers in social media have been facing lots of risks while transacting on social media due to failure of current studies to establish the need for trusting intention of consumers of online products. Hence, this research is conceptually presented four different forms of trust as the main factors to be taken into consideration towards achieving trusting intention of buyers of online product
Keyword: Calculus-Based Trust, Disposition to Trust, E-Commerce, Institution-Based Trust, Interpersonal Trust, Social Media.
[1]. F. Abedi, and J. Zeleznikow, The Provision of Trustworthy Online Dispute Resolution for Business to Consumer Electronic Disputes, Proceedings of 7th Asia-Pacific Business Research Conference, 2014, 25-26.
[2]. Z.M. Aljazzaf, M. Perry, and M.A.M. Capretz, Online Trust: Definition and Principles, Proceedings of the Computing in the Global Information Technology, 2010, 163-168.
[3]. A. Aris, N. Mustaffa, and N.S.M. Zabarudin, Concepts and Constructs in Online Trust, Proceedings of International Conference on Research and Innovation in Information System, 2011, 1-6.
[4]. A. Beldad, M.D. Jong, and M. Steehouder, How Shall I Trust the Faceless and the Intangible? A Literature Review on the Antecedents of Online Trust, Computers in Human Behavior. Vol. 26, No. 5:857-869, 2010.
[5]. H.H Chang, and S.W. Chen, The Impact of Online Store Environment Cues on Purchase Intention: Trust and Perceived Risk as a mediator," Online information review, Vol. 32 Issue 6: 818 - 841, 2008.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Hiding the Data into Meaningful Encrypted Image Using Reversible Data Hiding Technique |
Country | : | India |
Authors | : | G.Malathi || Dr.S.Raju |
Abstract: Data hacking is one of the challenging problems in Internet world. It is possible to greatly improve our understanding and also should provide security to network data. The most existing encryption algorithms designed to protect image contents transform original image into a texture-like or noise-like image which results in a significantly large number of attacks..........
Keyword: New Image Encryption System, Reversible Data Hiding
[1]. Y. Chen, Comment on ''Cheating prevention in visual cryptography'', IEEE Trans. Image Process. 21 (7) (2012) 3319–3323.
[2]. X. Zhang, Scalable coding of encrypted images, IEEE Trans. Image Process. 21 (6) (2012) 3108–3114.
[3]. M. Zanin, A. N. Pisarchik, Gray code permutation algorithm for high-dimensional data encryption, Information Sciences 270 (0) (2014) 288–297.
[4]. Y. Q. Zhang, X. Y. Wang, A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice, Information Sciences 273 (0) (2014) 329–351.
[5]. S. Tedmori, N. Al Najdawi, Image cryptographic algorithm based on the haar wavelet transform, Information Sciences 269 (0) (2014) 21–34.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Virtual Watermarking for Color images |
Country | : | India |
Authors | : | Ms. Rakshitha || Ms. Sharanya P.S |
Abstract: This work proposes a virtual watermarking technique for colored images. In the proposed work, sender uses two images one is cover image and other is secret image. Let us consider the secret image to be embedded as sub image and the cover image as master image. The master image is chosen such that it is common to both sender and receiver such as Lena image which is used in most of the image processing projects. In the first phase of the project an index array is derived by applying virtual watermarking process..........
Keyword: Index array, Key exchange protocol, Master image, Sub image, Virtual watermarking process.
[1] Dhruv Arya, 2010 : A Survey of Frequency and Wavelet Domain Digital Watermarking Techniques, International Journal of Scientific & Engineering Research, Vol. 1, Issue 2.
[2] Dr. M. Mohamed Sathik, S. S. Sujatha, 2010 : An Improved Invisible Watermarking Technique for Image Authentication , International Journal of Advanced Science and Technology, vol. 24.
[3] G. Rosline Nesa Kumari, B. VijayaKumar, L. Sumalatha, Dr V.V. Krishna, 2009 : Secure and Robust Watermarking on Grey Level Images, International Journal of Advanced Science and Technology, Vol. 11.
[4] Keshav S Rawat, Dheerendra S Tomar, Digital Watermarking Schemes for Authorization Against Copying or Piracy of Color Images, Indian Journal of Computer Science and Engineering, Vol. 1 No. 4 295-300.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Studying the Performance of a Local Area Network through a Statistical Results of a Simulation Program |
Country | : | Saudi Arabia |
Authors | : | Othman AL-Rusaini || Adnan Affandi |
Abstract: The ring topology was selected among several topologies,since in the ring topology easy to isolate faults and it has good performs under heavy network load, but the most problem that face in the ring topology is the system delay. Two ways offdecreasing the time delay have been proposed. The first way is changing the address field, a modification in both the hardware and the software are essential to implement that. The second way is utilizing combination of twoor more topologies at same time such ring and bus or double ring ..etc. in order to reduce as much as possible..........
Keyword: Standby ring, Double ring, Self-heal technique, Optical fiber
[1] D. D. Clark, K. T. Pogran and D. P. Reed, "An Introduction to Local Area Networks", Proceedings of the IEEE, vol. 66, no. 11, pp.1497-1517, 1978
[2] Kartik Pandya, "Network Structure or Topology", International Journal of Advance Research in Computer Science and Management Studies, vol. 1, issue 2, pp.22-27, 2013
[3] Forouzan, "Data Communication and Networking", 5th Edition, Tata McGraw-Hill.
[4] Andrew S. Tanenbaum, "Computer Networks", 4th Edition, Prentice Hall PTR.
[5] Francis Idachaba, Dike U. Ike, and Orovwode Hope, "Future Trends in Fiber Optics Communication", Proceedings of the World Congress on Engineering 2014, vol. I, 2014.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | More General Sophisticated Method of Implementation of Fiber to the Homes |
Country | : | Saudi Arabia |
Authors | : | Othman AL-Rusaini || Adnan Affandi |
Abstract: Fiber to the Homes (FTTH) is one of the most important fiber optic applications, since FTTH provides huge bandwidth. The single fiber offering multi services such as :( Data, Voice, Video etc.).Comparing FTTH and copper network fiber provides the highest reliability, the lowest maintenance costs, the highest security and the most revenue potential. It will mainly be used for broadband services such as high speed internet access, cable TV etc..........
Keyword: FTTH, Access Networks, Optical Networks, Passive Optical Network (PON).
[1] M. Chardy et al., "Optimizing splitter and fiber location in multilevel optical FTTH network", European Journal of Operational Research: Elsevier B.V, pp. 430-440, 2012.
[2] K. Casier, S. Verbrugge, R. Meersman, D. Colle, M. Pickavet and P. Demeester, "A clear and balanced view on FTTH deployment costs", Proceedings of FITCE Congress, pp.109-112, 2008.
[3] Andrew S. Tanenbaum, "Computer Networks", 4th Edition, Prentice Hall PTR.
[4] Behrouz A. Forouzan, "Data Communication and Networking", 5th Edition, Tata McGraw-Hill.
[5] P. Sharma, R. Arora, S. Pardeshi and M. Singh, "Fibre Optic Communications: An Overview", International Journal of Emerging Technology and Advanced Engineering, vol. 3, issue 5, pp. 474-479, 2013.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Developed Tool Matrix for Enhancing the Penetration Testing Methodology |
Country | : | Egypt |
Authors | : | Ayman Al-ahwal |
Abstract: Penetration testingis the science of insecurity that finds the vulnerabilities in the target of evaluation (ToE).Open Source Security Testing Methodology Manual (OSSTMM)is the standardof pen-testing methodology. It consists of four phases: discovery, enumeration, vulnerability mapping, and exploitation. Itsuffers from no formal, accurate way to do the pen-testing. It depends on the tool selection experience of the pen-testers who take a long time to search for the up-to-date tools that need a virtual environment to test before execution on the real environment to ensure they do not have malicious code and to verify those give the required results...........
Keyword: Penetration testing, pen-testing, pen-testing phases, OSSTMM, pen-testing baseline, pen-testing tools, pen-testing limitations, pen-testing advantages.
[1] Herbert H. Thompson, "Software Security Assurance," Security innovation (SI), Inc. The application Security Company, www. securityinnovation.com, November 2006.
[2] A. Vorobiev and J. Han, "Specifying Dynamic Security Properties of Web Service Based Systems," SKG2006, Guilin, China, 2006.
[3] Stuart McClure, Joel Scambray, and George Kurtz, "Hacking Exposed: Network Security Secrets and Solutions," Osborne/McGraw-Hill, Fifth Edition, USA, 2006.
[4] John Chirillo, "Hack Attacks Revealed," Wiley computer publishing, USA, 2001.
[5] Helen J. Wang, Chuanxiong Guo, Daniel R. Simon, and Alf Zugenmaier, " Shield: Vulnerability Driven Network Filters for Preventing Known Vulnerability Exploits," Microsoft Research, SIGCOMM'04, ACM conference, USA, 2004.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Properties of an Alluminium Metal Matrix and Hybrid Composites Reinforcement using Friction Stir Processing |
Country | : | India |
Authors | : | Asmeeta Jagdev || Ramesh Chandra Kar |
Abstract: Aluminium metal matrix and hybrid composites (AMMHCs) are new materials used in recent time that
have the capacity to meet the demand of advancement in processing applications. Several types of reinforcement
have been used since the inception of friction stir processing (FSP). The most widely used reinforcing material
is inorganic (metallic) powders such as silicon carbide, titanium alloy, graphene, iron , stainless steel, nitrides,
oxides etc and fewer works have been reported on organic powders (i.e. bioprocessing using agro-wastes
powders) such as fly ash, palm kernel shell ash, coconut shell ash, rice husk ash etc. Many researchers have
established the roles of reinforcements in the modification of surface and texture of the reinforced metal matrix
or hybrid composite material and how it enhanced the mechanical and metallurgical properties of the materials
via intense, localized plastic deformation.........
Keyword: Aluminium Metal Matrix, Hybrid Composites, Friction Stir Processing, Reinforcement Phases
[1]. A.A.Cerit,M.B.Karamiş,N.Fehmi,andY.Kemal,―Effectofreinforcementparticlesizeandvolumefractiononwearbehavior of metal
matrix composites,‖ Tribol. Ind., vol. 30, no. 3–4, pp. 31–36, 2008.
[2]. D. N.Sun and Apelian, ―Friction Stir Processing of Aluminum Cast Alloys for High-Performance Applications,‖ Alum. Form., pp.
44– 50,2011.
[3]. R. M. Miranda, T. G. Santos, J. Gandra, N. Lopes, and R. J. C. Silva, ―Reinforcement strategies for producing functionally graded
materials by friction stir processing in aluminium alloys,‖ J. Mater. Process. Technol., vol. 213, no. 9, pp. 1609–1615,2013.
[4]. R. Casati and M. Vedani, ―Metal Matrix Composites Reinforced by Nano-Particles—A Review,‖ Metals (Basel)., vol. 4, no. 1, pp.
65– 83,2014.
[5]. Sudhakar.M; Srinivasa Rao.CH; Meera Saheb.K, ―Production of Surface Composites by Friction Stir Processing,‖ Mater. Today
Proc., vol. 5, no. 1, pp. 929–935,2018.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Review of Methods of Retinal Image Processing for Diabetic Retinopathy with Research Datasets |
Country | : | India |
Authors | : | Ipsita Samal || Pravat Kumar Subudhi |
Abstract: From the recent studies, the automatic extraction of features and lesions from the input retinal
image can resulted into the early detection of disease and hence the screening of disease called as Diabetic
Retinopathy (DR). The DR is consisting of lesions characteristic group extracted from the retinal image of
individual person had diabetes for several years. In this paper we are aiming to present the different
techniques for automatic localization of different retinal features as well as lesions. As this is first review
paper, during this paper we are discussing the process of automated retinal disease recognition in DR in terms
of different steps involved. Further this paper address different research retinal images datasets those are
widely used by researchers for evaluation of their different techniques. The survey is presented on various
methods used for the identification of macular edema as well. The detection of macular edema assists
ophthalmologists in order to apply proper treatments which resulted into the elimination of disease completely
or minimize its severity. 2mg. (10).
Keyword:Diabetic Retinopathy, Retinal Image, Features Extraction, Blood Vessels, Exudates, Optic Disc, Macular Edema, World Health Organization
[1]. Saiprasad Ravishankar, Arpit Jain, Anurag Mittal"Automated feature extraction for early detection of diabetic retinopathy in funds
images, IEEE 2009.
[2]. D. Welfer and D. R Marinho "A course to fine strategy for automatically detecting exudates in color eye funds images",
computerized medical imaging and graphics, vol 34, 2010.
[3]. Banumathi A, Karthika, R., Kumar.A , (2003), Performance analysis of matched filter techniques for automated detection of blood
vessels in retinal images, Conference on Convergent Technologies for Asia Pacific Region, 2, pp 543–546.
[4]. Bevilacqua V., Combo, S.Cariello, L.Mastronardi, G., (2005), A combined method to detect Retinal Fundus Features, Conference
on EACDA, Italy.
[5]. Chaudhury S, Chatterjee S, Katz N., Nelson M, Goldbaum, M, (1989), Detection of blood vessels in retinal images using two
dimensional matched filters, IEEE Transactions on medical imaging, 8, pp 3