......

..

IJCTA-Volume 3 Issue 3/ May-June 2012
S.No
Title/Author Name
Page No
1
Data Mining Practices for Effective Investigation of Crime
-Prof. Hanmant N. Renushe,Prof. Prasanna R. Rasal, Prof. Abhijit S. Desai
Abstract
This research paper highlights the importance of data mining technology to design proactive services to reduce crime incidences in the police stations jurisdiction. Crime investigation has very significant role of police system in any country. Almost all police stations use the CIPA system to store and retrieve the crimes and criminal data and subsequent reporting. It become useful for getting the criminal information but it does not help for the purpose of designing an action to prevent the crime. It has become a major challenge for police system to detect and prevent crimes and criminals. There is no any kind of information is available before happening of such criminal acts and it result into increasing crime rate. The presented paper highlights the use of data mining techniques for effective investigation of crimes.
Keywords: Crime, CIPA, CCIS, NCRB, Investigation, CrPC.
865-870

  PDF

2
Leader Election Algorithm in Wireless Environments Using Fibonacci Heap Structure
-Arihant Kumar Jain, Ramashankar Sharma
Abstract
Today is an era of wireless communication systems.The day is not so far when the whole distributed system of the world will goes wireless. Leader in a distributed system plays a vital role in various computing environments like wireless networks etc. The main focus of researchers is on electing a new leader with lesser time consumption and with transmitting minimum number of messages in the network. Election of a leader using binary heap tree mechanism has garnered attention recently. But there are many other variants of heaps available in the literature which has better running time as compared to binary heaps. This paper presents design of leader election algorithm using a better variant called Fibonacci heap structure. Our design elects a new leader in O(1) time by passing lesser number of messages. The design is suitable in wireless environments.
871-873


  PDF

3
An Efficient Transmission of Data for MANETs Using Human Based Recommendation Exchange Protocol
-R.Balaji, S.Kavin hari hara sudhan
Abstract
This paper analyzes a trust model for mobile ad hoc networks. We provide nodes with a mechanism to build a trust relationship with its neighbors. The proposed model considers the recommendation of trustworthy neighbors and the experience of the node itself. In order to give trust value beyond the neighbor circle we are using Recommendation Exchange protocol (REP) which is used to give recommendation about neighbor’s neighbor. In existing, every node is having full details about entire nodes present in the Mobile ad hoc network but in our proposed system the individual node is not needed to maintain trust information of the entire network instead it can maintain information about the nodes in the radio range. By doing like this we can reduce the memory usage, computation power, resources, time constraints, etc. In addition, we introduce the RSA algorithm for security so we mitigate the effect of colluding attacks. We show the correctness of our model in a multi-hop network through simulations.
Index terms- Trust, MANETs, REP, Security
874-879


  PDF

4
Highly secured crypto-IRIS based authentication system
-S.Kavin hari hara sudhan, K.P.Rajasekar, R.Balaji
Abstract
Nowadays bio-metric authentication systems are widely used in order to provide authentication without possessing any physical materials. Bio-metric authentication systems are mainly concentrating on security, revocability, privacy, and accuracy. In this paper, we propose a provably two way secured biometric authentication system, which addresses the concerns of user’s privacy, template protection, trust issues, network security, and accuracy. The system is highly secure in the sense, biometric details are going to be encrypted twice, the system won’t reveal any additional information about the user or biometric, to the authenticating server’s database or to the insecure network. In this system two different encryption algorithms have been used both in the client and server side. One is public key cryptography another one is private key cryptography. User’s privacy as concern it is revealing only the identity of the user. In template protection this protocol will store the template as encrypted form. Protocol will provide trust between remote user and server, while a remote user cannot be reliably identified without biometric information. Since network security as concern protocol is not revealing the plain biometric details while it is passed through the network. The proposed approach has no restrictions on the biometric data used and it is applicable for multiple biometrics(face, iris, hand geometry, and finger print).Authentication by using two way encryption will give additional layer of security when comparing with existing system.
KEY TERMS: accuracy, authentication, biometrics, crypto systems, privacy, protocol, public key cryptography, revocability, security.
880-886

  PDF

5
Power Tracing in a Deregulated Power System : IEEE 14-Bus Case
-Satyavir Singh
Abstract
In this present era , a fair transmission pricing scheme is an important issue due to incresed deregulation and restructuring of power sector. In this view, issue of tracing the flow of electricity has been gain importance as its solution helps in evaluating a fair and transparent tariff.An electricity tracing method would make it possible to charge the generators and/or consumers on the basis of actual transmission facility used. This paper focuses on tracing of electricity using Bialek’s tracing algorithm .Case study is carried out using an IEEE 14-bus system with three simultaneous bilateral transactions simulated in Power world simulator
887-894

  PDF

6
Underwater Acoustic Sensor Networks: A Survey on MAC and Routing Protocols
-Lakshmi Movva,Chaithanya Kurra,Koteswara Rao G,Ramesh Babu Battula,Miriyala Sridhar,Paruchuri Harish
Abstract
In this paper, a detailed survey on the current protocols for medium access control layer and routing layer in the area underwater acoustic sensor networks are given. This survey is on some of the best MAC protocols and routing protocols and also it compares them based on some critical parameters which are considered a constraint in underwater acoustic communication Keywords: Medium access control protocol, network layer protocols, and underwater acoustics.
895-902



  PDF

7
High Dimensional Data Mining in Time Series by Reducing Dimensionality and Numerosity
-S. U. Kadam, Prof. D. M. Thakore
Abstract
Time series data is sequence of well defined numerical data points in successive order, usually occurring in uniform intervals. In other words a time series is simply a sequence of numbers collected at regular intervals over a period of time. For example the daily prices of a particular stock can be considered as time series dada. Data Mining, also popularly known as Knowledge Discovery in Databases (KDD), refers to the nontrivial extraction of implicit, previously unknown and potentially useful information from data in databases. Time series databases introduce new aspects and difficulties to data mining and knowledge discovery due to their high dimensionality nature. By using symbolic representation of time series data we reduce their dimensionality and numerosity so as to overcome the problems of high dimensional databases. We can achieve the goal of time series data mining by introducing a representation of time series that is suitable for streaming algorithms.
903-908


  PDF

8
Investigation of IT Auditing and Checklist Generation Approach to Assure a Secure Cloud Computing Framework
-Rajni Maheshwari,Dr. Suhas H Patil,Prof. S.S. Dhotre
Abstract
Recently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. In this project we are conducting the investigation studies over the IT auditing for assuring the security for cloud computing. During this investigation, we are implementing working of ID auditing mechanism over the cloud computing framework in order to assure the desired level of security. In the IT auditing mechanism, the concept of checklists are prepared for the cloud computing application and their lifecycle. Those checklists are prepared on the basis of models of cloud computing such as deployment models and services models. With this project our main concern is to present the cloud computing implications for large enterprise applications like CRM/ERP and achieving the desired level of security with design and implementation of IT auditing technique. As results from practical investigation of IT auditing over the cloud computing framework, we claim that IT auditing assuring the desired level of security, regulations, compliance for the enterprise applications like CRM, ERP, E-campus, E-learning etc..
Index Terms — IT Auditing, Cloud Framework, ERP. CRM. Checklists, Cryptography, ECAMPUS, ELEARNING.
909-915


  PDF

9
Web page analyser for protocols on ENC28J60 based AVR microcontroller
-Mohammed Rahmatullah
Abstract
Because the Internet is becoming more widespread, there was the possibility of communication with automation systems for configuration, reprogramming or control in real time. For this, the automation system needs a physical communication port with the network. This paper presents the design and implementation of such Ethernet interface for automation system with microcontroller, mainly analysing web page by making use of Protocols on AVR microcontroller and it focuses on the adoption of Agent Technology to analyse and evaluate the Web Content Traditional Web traffic analysis metrics such as page views, unique browser, visitor loyalty, etc have been used to analyse the Web traffic behaviour for a long time since the birth of World Wide Web, but the emersion of software robots and Web crawlers trigger a huge impact on the integrity and correctness of these traditional Web statistics. The connection between the automation system and the interface is made via an SPI (Serial Peripheral Interface) port. The main element of the interface is a chip named ENC28J60 manufactured by Microchip. It is designed to serve as an Ethernet network interface for any controller equipped with SPI. ENC28J60 meets all specifications of IEEE 802.3 having incorporated MAC and PHY modules. It also provides an internal mode DMA for fast data transfer and hardware for TCP/IP. With ENC28J60, an RJ45 connector and a few passive components we can connect a microcontroller to a 10 Mbps network. The access of ENC28J60 controller is done through configuration registers and memory. The interpretation of data to extract useful information is done by software routines. These interfaces have multiple applications: Remote monitoring of a system or industrial process, can be accessed on mobiledevices with Internet connection, domestic applications.
916-924

  PDF

10
Provable secure certificateless generalized signcryption scheme
-Prashant Kushwah,Sunder Lal
Abstract
Generalized signcryption is a new cryptographic primitive, which works as a signcryption scheme, a signature scheme and an encryption scheme as per need. It is more suitable for some storage constrained environments, e.g. smart cards, WSN (Wireless sensor networks) etc. Recently, Ji et al. proposed a security model for certificateless generalized signcryption scheme and also proposed a scheme, which they claim to be secure under the proposed security model. In this paper we show that there security model is not complete and propose a modified security model. We also prove that Ji et al. scheme is not existentially unforgeable against Type-I adversary and propose new efficient certificateless generalized signcryption scheme and prove the security of the proposed scheme under the new security model. Thus our proposed scheme is the first provable secure certificateless generalized signcryption scheme. Keywords: signcryption, generalized signcryption, certificateless cryptography.
925-939

  PDF

11
New Aggregation Operator for Trapezoidal Fuzzy Numbers based on the
Geometric Means of the Left and Right Apex Angles

-Manju Pandey,Dr. Nilay Khare,Dr. S.C. Shrivastava
Abstract
In previous work, authors have proposed two new aggregation operators for a class of LR fuzzy numbers known as triangular fuzzy numbers (TFNs) in which the L- and R- apex angles of the piecewise continuous linear membership function of the composite or resultant or aggregate TFN are the arithmetic means [1] and the geometric means [2] of the L- and R- apex angles of the individual TFNs. In another paper [3] the concept of an aggregation operator for triangular fuzzy numbers based on the arithmetic means of the corresponding L- and R- apex angles has been extended for a class of Interval Fuzzy Numbers known as Trapezoidal Fuzzy Numbers (TrFNs) with the left and right side angles treated independently. This paper extends the concept further for TrFNs and an aggregate based on the geometric means of the left and right side apex angles of the individual TrFNs is proposed. The left and right side apex angles have been treated independently. Computation of the aggregate is demonstrated with a numerical example. Corresponding arithmetic and geometric aggregates of the TrFNs and the aggregate of [3] have also been computed.
Keywords: LR Fuzzy Number, Interval Fuzzy Number, Triangular Fuzzy Number, Trapezoidal Fuzzy Number, Apex Angle, Left Apex Angle, Right Apex Angle, Aggregation Operator, Arithmetic and Geometric Mean
940-943


  PDF

12
Security Threats in Volunteer Computing Environments Using the Berkeley Open Infrastructure for Network Computing (BOINC)
-Paulo Picota Cano,Miguel Vargas-Lombardo
Abstract
Volunteer Computing is a low cost and easy deployable solution for scientific projects that require large amounts of computational power. Volunteer computing public access capabilities comes with several security threats to the projects, thus, this projects must be designed and focused towards security in order to be able to stand against this threats. The following paper presents a summary of the security threats identified in volunteer computing environments deploying the Berkeley Open Infrastructure for Network Computing (BOINC) and some solutions implementing Sanboxing Techniques on distributed computing environments.
Keywords: BOINC; security; Volunteer Computing; sandbox; virtual machine
944-948


  PDF

13
Next Generation Mobile Application in Cloud Computing using RESTful Web Services
-Arvind D Meniya,Prof. H.B.Jethva
Abstract
Mobile devices, especially smart mobile devices, becoming very popular nowadays. Web services that are used to provide a service for an application running on smart mobile devices also becoming very popular. There are some limitations of the current smart mobile devices, such as limited storage capacity, low processor speed, limited memory, limited battery and slow wireless connection. The current mobile application running on a smart mobile devices uses a services which traditionally built using SOAP based, which takes much size of the data to deliver as a service and time to deliver that service. This will lead to build a new type of web services over this traditional web services, and the solution is making a web services using REST way. This paper focus on the performance evaluation of the REST web services over the traditional web services by storing the RESTful web services in Cloud Computing.
Keywords-Web Service, SOAP,REST,WSDL
949-952


  PDF

14
A New Model for Software Risk Management
-Bharat Singh, Kapil Dev Sharma, Subhash Chandra
Abstract
In the modern time of software engineering, the development of software in static and dynamic environment results in several vulnerabilities that need to be handled so that they do not step in with the clear defined project goals. Previous studies show that the wide variety of different risk analysis strategies provide a valid solution to address the lack of risk management strategies in Software risk assessment model (SRAM), Software risk assessment and estimation model (SRAEM) etc. In this paper we proposed a new model (SRAIEM) software risk assessment identification and estimation model for the software risk management. This paper focus on take care of most frequently occurring risks and it is possible to predict the possible result of software projects with good accuracy proposed model not only access the risk but also identify and estimate the risk. This model provides a way to managing all of them. In order to cover some perspectives of the software industry which have not been covered up to now.
Keywords: Software, Risk estimation, Risk management, SRAIEM.
953-956

  PDF

15
Forecasting Enrollments based on Fuzzy Time Series with Higher Forecast Accuracy Rate
-Preetika Saxena,Kalyani Sharma,Santhosh Easo
Abstract
The Time-Series models have been used to make predictions in whether forecasting, academic enrollments, etc. Song & Chissom introduced the concept of fuzzy time series in 1993[11]. Over the past 19 years, many fuzzy time series methods have been proposed for forecasting enrollments. But the forecasting accuracy rate of the existing methods is not good enough. These methods have either used enrollment numbers or difference or percentage change of enrollments as the universe of discourse. In this paper, we proposed a method based on fuzzy time series, which gives the higher forecasting accuracy rate than the existing methods. The proposed method used the percentage change as the universe of discourse and mean based partitioning. To illustrate the forecasting process, the historical enrollment of University of Alabama is used.
Keywords- fuzzy set, fuzzy time series, time variant model, first order model, forecast error
957-961


  PDF

16
A Model and Framework for Reality-Oriented Web Services
-Takahiro KOITA, Tatsuya Izumori, Kenya SATO
Abstract
Mobile devices that use information from sensors such as GPS and accelerometers are becoming widespread today, and web services using a variety of sensor information have appeared. This paper refers to these web services as reality-oriented web services. Since existing frameworks not designed to handle sensor information are useless when developing reality-oriented web services, high development costs are a problem. This paper proposes a model for configuring reality-oriented web services, making a comparison with existing frameworks. We discuss the design of a framework using this model and study its application to an actual web service.
Keywords: Google Maps, Ubiquitous Network, Ajax, Distributed Device Control
962-967

  PDF

17
An Improvement in AOMDV with Randomization
-Pinesh A Darji,Sumitra Menaria
Abstract
Mobile ad hoc networks (MANETs) consist of a collection of wireless mobile nodes which dynamically exchange data among themselves without the reliance on a fixed base station or a wired back-bone network. Multipath routing allows the establishment of multiple paths between a single source and single destination node. It is typically proposed in order to increase the reliability of data transmission (i.e., fault tolerance) or to provide load balancing. To avoid frequent route discovery, various multipath routing protocol has been proposed based on the existing single path routing protocol in ad hoc networks. Ad hoc On-demand Multipath Distance Vector (AOMDV) is one of extension to the well-studied Ad hoc On Distance Vector (AODV). Security has become one of the major issues for data communication over MANET. Different from the past work on the designs of cryptography algorithms and system infrastructures, we will propose a multipath routing algorithm that could randomize delivery paths for data transmission as well as use cryptographically secured traffic load.
968-972

  PDF

18
A Study of Viterbi Decoder Algorithm for Wireless LANs
-B. Jyothi, P. Sridhar Reddy
Abstract
Viterbi Decoders are commonly used to decode convolutional codes in communications systems. This Viterbi Decoder is a fully parallel implementation which gives fast data throughput. The decoder is targeted for WiMAX and Wireless LAN applications. Input symbol metric pairs are decoded into output data bits by the maximum likelihood Viterbi processor core. Decoder supports both hard and soft inputs. This decoder supports configurable traceback buffer size allowing performance to be fine tuned for different applications. Codes with symbol erasures (punctured code) can be decoded by this decoder. This decoder is written in VHDL, capable of being used on any FPGA/ASIC architecture. A Viterbi decoder uses the Viterbi algorithm for decoding a bitstream that has been encoded using a convolutional code. There are other algorithms for decoding a convolutionally encoded stream (for example, the Fano algorithm). The Viterbi algorithm is the most resource-consuming, but it does the maximum likelihood decoding. It is most often used for decoding convolutional codes with constraint lengths k<=10, but values up to k=15 are used in practice. This paper presents an overview of viterbi decoder and viterbi algorithm for wireless LANs.
Keywords: Viterbi decode, wireless LANs, Convolutional code.
973-977

  PDF

19
Analysis of Wind Farm to Weak-Grid Connection Using Fuzzy Based Unified Power Quality Compensator (UPQC)
-G.Satyanarayana, Siva Karthik.K
Abstract
In this paper a compensation strategy based on a particular CUPS device, the Unified Power Quality Compensator (UPQC) has been proposed. A customized internal control scheme of the UPQC device was developed to regulate the voltage in the WF terminals, and to mitigate voltage fluctuations at grid side. The voltage regulation at WF terminal is conducted using the UPQC series converter, by voltage injection “in phase” with PCC voltage. On the other hand, the shunt converter is used to filter the WF generated power to prevent voltage fluctuations, requiring active and reactive power handling capability. The sharing of active power between converters is managed through the common DC link.
Therefore the internal control strategy is based on the management of active and reactive power in the series and shunt converters of the UPQC, and the exchange of power between converters through UPQC DC–Link. This approach increases the compensation capability of the UPQC with respect to other custom strategies that use reactive power only. The proposed compensation scheme enhances the system power quality, exploiting fully DC–bus energy storage and active power sharing between UPQC converters, features not present in DVR and D–Statcom compensators. Simulations results show the effectiveness of the proposed compensation strategy for the enhancement of Power Quality and Wind Farm stability.
978-986


  PDF

20
Mining of Sentence Level Opinion Using Supervised Term Weighted Approach of Naïve Bayesian Algorithm
-Trivedi Khushboo N,Swati K. Vekariya,Prof.Shailendra Mishra
Abstract
Mining is used to help people to extract valuable information from large amount of data. As the addictive use of computers and 3G high speed internet have taken place in our day to day life, so there are so many user generated opinions on the web for the popular product. Now, from all those opinions , it is so difficult to know, how many opinions are negative, positive. It makes tough for them people to take conform decision about the purchasing of the product. And at the same time it is also difficult for the manufacturer to keep the track of the opinions and manage the opinions. For that, in this paper to help the people for making correct decision for the product, analysis and mining of the opinions are done at sentence level , because by this, we can come to know the views of so many people. This is done by the term counting based approach, in which total no of negative and positive words are count and then compared. If the dictionary is good then, it really gives good result. The algorithm used over here is naïve Bayesian algorithm, which is supervised. And for increasing the accuracy of this algorithm , it is changes in the terms of parameter which are passed to the algorithm.
Keywords: Sentence Level opinion mining, naïve Bayesian algorithm, Supervised Learning, Term Counting Based approach
987-991


  PDF

 
 
     
IJCTA © Copyrights 2010| All Rights Reserved.

This work is licensed under a Creative Commons Attribution 2.5 India License.