Version-4 (May-June 2017)
Ver-1 Ver-2 Ver-3 Ver-4 Ver-5 Ver-6
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Image Encryption using RSAA |
Country | : | India |
Authors | : | Vishal Snedan Robertson || Krishnakant Vilas Redkar |
: | 10.9790/0661-1903040105 |
Abstract: Information security has become very important nowadays in storage and transmission of data. Images are used everywhere around us. The security of certain images from unauthorised users is important. We present a variable key length cryptosystem based on Block Cellular Automata. It encrypts images by dividing it up into blocks 50 X 50pixels and encrypting each block at a time. It provides high security even with a key which is a single character. It is highly robust as it produces similar distorted cipher images for any type of input image. Cipher images aren't distinguishable to the naked eye. It can be used to store personal images securely on one's system and large scope for storing images securely on a server or cloud storage. Brute forcing this algorithm will take a lot of time due to the immense rule space of Block Cellular Automata and due to the variable sized key.
Keyword: Key, Encryption; Decryption; Cipher Image; Cellular Automata; Block Cellular Automata; Margolus neighbourhood; Rule Generator, Add Key, Hashing.
[1]. Shreedatta Sawant, Vaishnavi Kamat, Vishal Snedan Robertson, Sneha Kamat, Anish Thali, Anuj Shetgaonkar, "RSAA Symmetric Key Cryptosystem" IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p-ISSN: 2278-8727, Volume 19, Issue 3, Ver. III (May - June 2017), pg 53-57
[2]. Said Bouchkaren and Saiida Lazaar, "A Fast Cryptosystem Using Reversible Cellular Automata" in (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 5, No. 5, 2014
[3]. S. Nandi, B. K. Kar, and P. Pal Chaudhuri, "Theory and Applications of Cellular Automata in Cryptography" IEEE TRANSACTIONS ON COMPUTERS, VOL. 43, NO. 12, DECEMBER 1994.
[4]. Marcin Seredynski and Pascal Bouvry, "Block Encryption Using Reversible Cellular Automata"
[5]. Valloriw J. Peridier, "Basic Schemes for Reversible Two-Dimensional Cellular Automata", Complex Systems, 18, 2008, pg 47-48
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Companies that utilize automated IVR systems have a veritable treasure trove of data that can be analyzed to improve the quality of the customer experience.After all, many customers who are greeted by linear thinking IVR systems instead of human voices already assume that their self-service experience is going to be less than favorable.Analyse the call Centre Performance includes various parameters like Cross-Team Visibility, Monitor Interactions in Real Time, Simplify reporting, Evaluate and streamline journeys etc. This paper focus on an approach in which IVR data is analysed and comparison is done based on HIVE, SPARK and FLINK frameworks.
[1] Tom White, "Hadoop Definitive Guide". O'Reilly.
[2] XiaopengLi(2015) et. al" Performance Comparison of HiveImpala and Spark SQL". 2015 7th International Conference on Intelligent Human-Machine Systems and Cybernetics.
[3] Dillon Chrimes(2016) et. al . , "Interactive Healthcare Big Data Analytics Platform under Simulated Performance", 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress.
[4] Kuo M.H., Sahama T., Kushniruk A.W., Borycki E.M., Grunwell D. Health Big Data Analytics: Current Perspectives, Challenges and Potential Solutions. Int J Big Data Intelligence 2014; 1(12): 114–126.
[5] Sun J., Reddy C.K. Big Data Analytics for Healthcare. Tutorial presentation at the SIAM International Conference on Data Mining, Austin, TX, 2013..
- Citation
- Abstract
- Reference
- Full PDF
Abstract: This paper derives exact shape functions for both non-uniform (non-prismatic section) and inhomogeneous (functionally graded material) Timoshenko beam element formulation explicitly. In this paper, the shape functions formula embedded the explicit functions and its derivatives describing the non-uniformity and inhomogeneity of a beam element. The shape functions are made interdependent by requiring them to satisfy three homogeneous differential equations associated with the Timoshenko's beam theory. With the formulated axial, transverse and rotational displacement shape functions, the stiffness and mass matrices and consistent force vector for a two-node Timoshenko beam element are developed based on Hamilton's principle. Comparison studies with reference work on the accuracy..........
Keywords: Exact shape functions, Timoshenko beam, FEM, Functionally graded material
[1] D.K. Nguyen, B.S. Gan and T.H. Le, Dynamic Response of Non-Uniform Functionally Graded Beams Subjected to a Variable Speed Moving Load, Journal of Computational Science and Technology, 7(1), 2013, 12-27.
[2] D.K. Nguyen and B.S. Gan, Large deflections of tapered functionally graded beams subjected to end forces, Applied Mathematical Modelling, 38(11-12), 2013, 3054-3066.
[3] D.K. Nguyen, B.S. Gan and T.H. Trinh, Geometrically nonlinear analysis of planar beam and frame structures made of functionally graded material, Structural Engineering and Mechanics, 49(6), 2014, 727-743.
[4] T.H. Le, B.S. Gan, T.H. Trinh and D.K. Nguyen, Finite element analysis of multi-span functionally graded beams under a moving harmonic load, Mechanical Engineering Journal, 1(3), 2014, 1-13.
[5] B.S. Gan and D.K. Nguyen, Large Deflection Analysis of Functionally Graded Beams Resting on a Two-Parameter Elastic Foundation, Journal of Asian Architecture and Building Engineering, 13(3), 2014, 649-656..
- Citation
- Abstract
- Reference
- Full PDF
Abstract: This paper considers block ciphers and key schedule algorithm that is one of the crucial components of a block cipher. It computes round keys/subkeys for relevant round from a short key. The presented experiments show that proposed key schedule algorithm which inspired by Advanced Encryption Standard's (AES) key schedule has desirable properties: Avalanche Effect and Strict Avalanche Criterion (SAC). It satisfies good bit confusion and diffusion. The average success rate of the proposed key schedule algorithm for the SAC test is 95%. As a side result it was found that while testing SAC effect computed values that lie between confidence lower and upper bounds, greater than upper bounds and less than lower bound all of them reach normal distribution. Also based on example given experimental result, proposed structure exhibits a very strong Avalanche Effect because almost at the first round approximately half the bits are changed in the key.
Keywords:AES, Avalanche Effect, Key Expansion Algorithm, Key Schedule, SAC
[1] K. Auguste, La cryptographie militaire I-III (Military cryptography, Parts I-III, Journal des Sciences Militaires, IX:5–38,1883).
[2] K. Auguste, La cryptographie militaire IV (Military cryptography – Part IV, Journal des Sciences Militaires, IX:161–191, 1833).
[3] R. Avanzi. 2016, A salad of block ciphers-the state of the art in block ciphers and their analysis (http://eprint.iacr.org/2016/1171.pdf, 2016).
[4] C.E. Shannon, Communication theory of secrecy systems (Bell System Technical Journal, 28:656–715, 1949).
[5] F. Büyüksaraçoğlu Sakallı, E. Buluş, T. Sakallı, H. Vural, AES blok şifresinin anahtar genişletme rutininin geliştirilmesi ve bir blok şifreden bağımsız anahtar genişletme rutininin tasarımı, 6. Uluslararası Bilgi Güvenliği ve Kriptoloji Konferansı, Ankara, Türkiye, 2013, 347-353
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Survey Paper on Various Algorithm's based Recommender System |
Country | : | India |
Authors | : | Priyanka |
: | 10.9790/0661-1903042732 |
Abstract: Recommender systems have become extremely common in recent years. It helps the customer to discover information and settle on choices where they do not have the required learning to judge a specific item. It can be utilized as a part of different diverse approaches to encourage its customer with effective information sorting. It is a software tool and techniques that provide suggestion based on the customer's taste to discover new appropriate thing for them by filtering personalized information based on the user's preferences from a large volume of information. Users taste and preferences should be constructed accurately in order to provide most relevant suggestions. This survey paper compares and details the various type of recommender system and popular recommendation algorithms and its uses.
Keywords: Feedback techniques, Recommender system, Types of the recommender system.
[1] Website link https://en.wikipedia.org/wiki/E-commerce_in_India.
[2] Website link https://www-01.ibm.com/software/data/bigdata/what-is-big-data.html.
[3] TechAmerica Foundation's Federal Big Data Commission.(2012). Demystifying big data: A practical guide to transforming the business of Government retrieved from :http://www.techamerica.org/Docs/fileManager.cfm?f=techamerica-bigdatareport-final.pdf.
[4] Schafer, J. Ben, Joseph A. Konstan, and John Riedl. "E-commerce recommendation applications." Applications of Data Mining to Electronic Commerce. Springer US, 2001. 115-153.
[5] Fernández, Alberto, et al. "An overview on the structure and applications for business intelligence and data mining in cloud computing." 7th International Conference on Knowledge Management in Organizations: Service and Cloud Computing. Springer Berlin Heidelberg, 2013.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Comparison between Adaptive and Conventional RBFNN Based Approach for Short-Term Load Forecasting |
Country | : | Jordan |
Authors | : | Eyad Almaita |
: | 10.9790/0661-1903043340 |
Abstract: In this paper, a comparison between novel adaptive Radial Basis Function Neural Networks (RBFNN) algorithm and conventional RBFNN is conducted. Both algorithms are used to forecast electrical load demand in Jordan. The Same forecasting features are used in both algorithms. Most of the forecasting models need to be adjusted after a period of time, because the change in the system parameters. The data used in this paper is real data measured by National Electrical Power co. (Jordan). The data is divided into two sets. Set for a training and the other for testing..........
Keywords: Load Forecasting, Neural Network, Radial Basis Function, Short-Term, adaptive.
[1] Abderrezak Laouafi, Mourad Mordjaoui, Farida Laouafi and Taqiy Eddine Boukelia, "Daily peak electricity demand forecasting
based on an adaptive hybrid two-stage methodology", International Journal of Electrical Power & Energy Systems, vol. 77, pp.
136, 2016, ISSN 01420615.
[2] http://www.memr.gov.jo
[3] S. Kumar, S. Mishra and S. Gupta, "Short Term Load Forecasting Using ANN and Multiple Linear Regression," 2016 Second
International Conference on Computational Intelligence & Communication Technology (CICT), Ghaziabad, India, 2016, pp. 184-
186.
[4] T. Haida and S. Muto, "Regression based peak load forecasting using a transformation technique," IEEE Trans. Power Syst., vol. 9,
no. 4, pp. 1788–1794, 1994.
[5] Taylor, J.W.; Buizza, R., "Neural network load forecasting with weather ensemble predictions," Power Systems, IEEE Transactions
on, vol.17, no.3, pp.626,632, Aug 2002.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Research on Moving Pedestrian Identification Based on Bayesian Classifier |
Country | : | China |
Authors | : | Wu Hua-zhi |
: | 10.9790/0661-1903044147 |
Abstract: Pedestrian identification systemplays an important role in vehicle safetyassistant driving technology. In order toidentify the movement of pedestriansmore quickly and easily, motion pedestrian identification is carried out based on the Bayesian classifier. The identificationprocess was realized in two steps. Firstly, Bayesian classifier is designed based on the HOG feature. Secondly, the image captured by the camera is processed by taking the five-frame difference methodto extract the identification target from the pre-processed images and the HOG feature of the identification target is extracted as the input of the classifier to identify the target. The results show that this method can achieve the goal of identifying pedestrians quickly and simply.
Keywords: Pedestrian identification; moving target; HOG features; Bayesian classifier.
[1] GuoQiang. Based on the characteristics of pedestrian detection technology research. Jilin University, 2011.
[2] Li Chunming. Pedestrian detection under camera movement. Computer Engineering and Design, 2013 (09), 3333-3337.
[3] Guo Lie. Pedestrian detection method based on the combination of typical features of human body. Automotive Engineering, 2014 (04), 496-502.
[4] Jiang Ailian, Yang Xingtong. Pedestrian detection based on AdaBoost-SVM cascade classifier. Computer Engineering and Design, 2013 (07), 2547-2550.
[5] GavrilaD.Pedestriandetectionfromamovingvehicle.ProceedingsofEuropeanConferenceComputerVision.Dublin,Ireland:LectureNotesin Computer Science, 2000, 37-49.
[6] Oren M, Papageorgiou C, Sinha P, et al. Pedestrian detection using wavelet templates. Proceedings of IEEE Conference on Computer Vision and Pattern Identification, San Juan, Puerto Rico. USA: IEEE, 1997, 193-199.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Intrusion Detection Systems considered as an indispensable field of network security to detect passive and anomaly activities in network traffics and packets. In this paper a framework of network based intrusion detection system has been implemented using Logistic Model Trees supervised machine learning algorithm."NSL-KDD" dataset which is an updated dataset from "KDDCup 1999" benchmark dataset for intrusion detection has been used for the experimental analysis using percent of 60% for training phase and the rest for testing phase. The testing and experimental..........
Keywords: Intrusion Detection System (IDS), Logistic Model Trees (LMT), Logistic Regression, NSL-KDD
[1] P. Kabiri, and A. Ghorbani, Research on Intrusion Detection and Response: A Survey, International Journal of Network Security, 1(2), 2005, 84-102.
[2] Gaikwad, S. Jagtap, K. Thakare, and V. Budhawant, Anomaly Based Intrusion Detection System Using Artificial Neural Network and Fuzzy Clustering, International Journal of Engineering Research & Technology (IJERT), 1(9), 2012,
[3] S. Sonawane, Sh. Pardeshi, and G. Prasad, A Survey on Intrusion Detection, World Journal of Science and Technology, 2(3), 2012,
[4] Ch. Gu, and X. Zhang, A Rough Set and SVM Based Intrusion Detection Classifier, Second International Workshop on Computer Science and Engineering, 18(2),2009.
[5] KDDCup99 Dataset Features, http://kdd.ics.uci.edu/databases/kddcup99/task.htm
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Noise is the major problem in the field of image processing. In Medical image such as Ultrasound image are contaminated by different types of noise. The usefulness of US imaging is degraded by the presence of signal dependence noise known as speckle noise. In the presence of such noise it is difficult to diagnosis. To acquire a better performance we state another method that works efficiently to reduce noise an image without blurring the frontiers between different regions. This paper demonstrates wavelet based thresholding technique for de-noising and improving visual image quality in ultrasound images. This proposed method is compared to other existing approach and give superior..........
Keywords: US images, Speckle noise, dwt, threshold
[1] R. C. Gonzalez and R. E. Woods, Digital Image Processing. Upper Saddle River, NJ: Prentice-Hall, 2001, pp. 572-585.
[2] J. W. Goodman, " Some fundamental properties of speckle," J. Opt. Soc. Amer., vol. 66, no. 11, pp. 1145–1149, 1976.
[3] Pitas, and AN Venetsanopoulos, "Order Statistics in Digital Image Processing", Proceed of the IEEE, Vol. 80, No. 12, Dec. 1992.
[4] "Image Independent Filter for Removal of Speckle Noise ". IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 5, No 3, September 2011.
[5] MICHAILOVICH O., TANNENBAUM A.: Despeckling of medical ultrasound images. IEEE Transactions on Ultrasonics,Ferroelectrics, and Frequency Control 53, 1 (2006), 64–78.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Image fusion is the process of integrating two or more images of a specific scene, captured from different sensors to form a single image that contains all the details of the source images. In satellite remote sensor images, this technique is used in the integration of the geometric detail of a high-resolution panchromatic (PAN) image and the spectral information of a low resolution multi -spectral (MS) image to form a single high resolution multispectral image. For satellite images, wavelet based fusion methods have shown to produce better results...........
Keywords: Remote sensing, Image fusion, Discrete wavelet packets, Dual Tree Complex Wavelet Packet Transform.
[1]. Ivan W. Selesnick, Richard G. Baraniuk, and Nick G. Kingsbury "The Dual –Tree complex wavelet transform," IEEE signal processing magazine, Nov. 2005,pp.123-151
[2]. Edwards and P.A.Davis, "The use of Intensity-Hue-Saturation transformation for producing color shaded-relief images," Photogramm. Eng. Remote Sens., vol. 60, no. 11, 1994, pp. 1369–1374
[3]. P. D. Shukla, "Complex wavelet transforms and their applications", PhD Thesis, The University of Strathclyde, 2003.
[4]. N.G. Kingsbury, "Image processing with complex wavelets," Philos. Trans. R.Soc. London A, Math. Phys. Sci., vol. 357, no. 1760, Sept. 1999, pp. 2543–2560.
[5]. Peter de Rivaz and Nick Kingsbury, "Bayesian image deconvolution and denoising using complex wavelets", Proc. IEEE Conf. on Image Processing, Greece, Oct 2001, paper 2639.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Mobile Commerce (M-Commerce) Interface Design: A Review of Literature |
Country | : | Malaysia |
Authors | : | Zaifulasraf Ahmad || Roslina Ibrahim |
: | 10.9790/0661-1903046670 |
Abstract: Advances in wireless technology have led to rapid growth on various mobile services. This includes changes of shopping activities by the online shopper. Previously, shoppers use in-store shopping or through web shopping sites which is electronic commerce (e-commerce). Nowadays, with the increased use of smartphones and mobile application, the popularity of mobile commerce (m-commerce) is increased among consumer. Due to growth of m-commerce, it is crucial to ensure the m-commerce applications are highly usable and friendly. Therefore, it is important to properly design the interface of the apps...........
Keywords: Interaction Design, Interface Guideline, Issues, Mobile Commerce, User Experience
[1] A. Meola, "http://www.businessinsider.com/," 21 December 2016. [Online]. Available: http://www.businessinsider.com/mobile-commerce-shopping-trends-stats-2016-10?IR=T&r=US&IR=T.
[2] P. Tarasewich, R. C.Nikerson and M. Warkentin, "Issues in Mobile E-Commerce," Communications of the Association for Information Systems, vol. 8, pp. 41-64, 2002.
[3] N. Z. b. Ayob, A. R. C. Hussin and H. M. Dahlan, "Three Layers Design Guideline for Mobile Application," 2009 International Conference on Information Management and Engineering, pp. 427-431, 2009.
[4] Y. E. Lee and I. Benbasat, "Interface Design for Mobile Commerce," Communications of the ACM - Mobile computing opportunities and challenges, vol. 46, pp. 48-52, 01 December 2003.
[5] J. Buranatrived and P. Vickers, "An investigation of the impact of mobile phone and PDA interfaces on the usability of mobile-commerce applications," Proceedings 3rd IEEE International Workshop on System-on-Chip for Real-Time Applications, pp. 90-95, 30 October 2002.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: WSN consists of hundreds / thousands of wireless nodes distributed within the geographical area. The wireless nodes gather information and supply towards the central node for further processing. There are different factors that affect the WSN design like transmission media, power consumption, routing protocols etc. Congestion in WSNs can lead to packet losses and increased transmission latency. Different type of congestion is present like node level, Link level, etc. Lot of work is performed by the different researchers to detect the congestion and remove or decrease the effect of congestion. The congestion gives the energy loss and packet drop over the communication...........
Keywords: Wireless Sensor Network, Congestion, NS-2, Adaptive Approach, Routing.
[1]. C. Chong, S. Kumar and B. Hamilton, "Sensor networks: Evolution, opportunities and challenges," Proceedings of the IEEE, 9(18), p p.247-256, 2003.
[2]. Kamal Kumar Sharma, Dr. Harbhajan Singh and Dr. R.B Patel "A Hop by Hop Congestion Control Protocol to Mitigate Traffic Contention in Wireless Sensor Networks" , in Proceedings of International Journal of Computer Theory and Engineering, December, 2010.
[3]. Basaran, kyoung-Don Kang, Mehmet H. Suzer "Hop-by-Hop Congestion Control and Load Balancing in Wireless Sensor Networks", in proceedings of 2010 IEEE 35th conference on Local Computer Networks, 2010.
[4]. Chieh-Yih Wan, Shane B. Eisenman, Andrew T. Campbell," Energy-Efficient Congestion Detection and Avoidance in Sensor Networks ", in proceedings of ACM Transactions on Sensor Networks2011.
[5]. Muhammad Monowar, Obaidur Rahman, Al-Sakib Khan Pathan, and Choong Seon Hong "Prioritized Heterogeneous Traffic-Oriented Congestion Control Protocol for WSNs" in proceedings of The International Arab Journal of Information Technology, 2012.