......

..

IJCTA-Volume 4 Issue 5/ September-October 2013
S.No
Title/Author Name
Page No
1
Gesture Based Authentication System
-Deepak Nair
Abstract
This document puts forth the idea of using gestures as an almost fool proof method of identifying and authorizing a person. A new practice is advocated which promises to increase the security many folds. The main front of focus is the use of all the possible gestures made with the help of hands for authenticating the user.
717-719

  PDF

2
Application Specific Text Relations using Real Time Group Editors
-K.Kumar,B.Vijayalakshmi
Abstract
Despite the significant progress that has been achieved over the past 15 years, a notable fact in the history of OT [1] is that the discovery and solution of various OT puzzles (i.e., correctness problems in previous OT algorithms) has been a main driver of research. However, the existence of OT puzzles can be largely attributed to the lack of a suitable theoretical framework for guiding the design and verification of OT algorithms. More specifically, the well-established frameworks rely on conditions that are difficult to verify in practice and do not address how to develop correct OT algorithms. In this research , a novel operation transformation framework is developed to overcome the weakness of existing system. The concept “operation effects relation”, defines two criteria, causality preservation and operation effects relation preservation, for verifying the correctness of OT algorithms. The OT framework comes with a practicable approach for developing and proving OT algorithms. In this approach, the sufficient conditions for transformation functions are first identified and a special transformation path is chosen to satisfy those conditions. Thus, the correctness of the whole algorithm is guaranteed.
Keywords : Group Editors , T(Operational Transformation), Collaborative Work, Google Wave, multicasting, unicasting
720-726

  PDF

3
Enabling Higher Education Leaders towards an Effective Web Presence Strategy
-Steve Fudally,Dr. Rao Nemani
Abstract
In recent years, Higher Education has been faced with enrolment and financial challenges. Higher Education leaders are seeking low cost, creative opportunities that provide a competitive advantage for the institution. Institutions have realized the devastating effect of a poorly designed web presence may have adverse effects on recruiting and retaining students. Institutions are finding they need to incorporate new strategy to better serve learners through data-driven analysis, behavioural insights, and improved user experience to enrich a student-centric web site environment. This paper outlines how the Chief Information Officer (CIO) may establish an effective web presence within a higher educational environment.
Key Words: Higher Education, Web Presence, Web Strategy
727-740


  PDF

4
Automated Parking Management System Using License Plate Recognition
-Deepak Harjani,Mohita Jethwani,Nikita Keswaney,Sheba Jacob
Abstract
Automated Parking Management System(APMS) uses image processing for recognizing license plates for efficient management of parking and billing. APMS is an independent stand-alone system which reduces human involvement in parking management. In this paper we propose a system which consists of a digital camera interfaced with the software module. The software module extracts the license plate, segments the characters on it and recognizes the characters. This module is interfaced with the database which is thereby used to manage the parking system. The concept of connected components is used for extraction. The characters are segmented using projection and connected components and recognized using neural networks. The algorithms are implemented using MATLAB. In this paper we have illustrated experimental results from the proposed model.
Keywords— Automated Parking System, License Plate Recognition, LPR, Character Segmentation.
741-745

  PDF

5
Classification Algorithms in Intrusion Detection System: A Survey
-V. Jaiganesh,Dr. P. Sumathi, A.Vinitha
Abstract
Intrusion Detection system is a software which helps us to protect our system from other system when other person tries to access our system through network. It secures our system resources without giving access to other system. Nowadays internet has becoming more popular and wide. Many of them try to access the resources of unauthorized person to win their business. In this paper the data mining algorithm which helps to secure our system. In data mining classification algorithms helps easily to secure the system. Classification predicts the future data what the output comes. Intrusion detection system can be used for both host and network. The two algorithms surveyed are ID3 and C4.5. There are two types of detection methods. One is misuse detection and another one is anomaly detection.
Keywords: Intrusion Detection System Architecture, Detection types, Attacks, Protocols, KDD cup data set, ID3 algorithm, C4.5 algorithm, Decision trees, Classification.
746-750

  PDF

6
Natural Language Processing
-Preeti, BrahmaleenKaur Sidhu
Abstract
Natural language processing (NLP) work began more than sixty years ago; it is a field of computer science and linguistics devoted to creating computer systems that use human (natural) language. Natural Language Processing holds great promise for making computer interfaces that are easier to use for people, since people will be able to talk to the computer in their own language, rather than learn a specialized language of computer commands. Natural Language processing techniques can make possible the use of natural language to express ideas
751-758

  PDF

7
The Formalization of the Problem area, Implementation and Maintenance of Business process by a group of unmanned vehicles
-Kuandykov A.A,Kassenkhan A.M,Mukazhanov N.K.,Kozhamzharova D.K,Kalpeeva Zh.B.Sholpanbaev A.T
Abstract
This paper addresses the formalization of the problem domain in which there is a business process that is similar in structure.For research and formalization selected a specific type of subject area in which at random time occurs the business processes that are close on the abstract structure.
Keywords – area of concern, unmanned vehicles (UV), models, agents, agent-based technologies and systems.
759-763



  PDF

8
A Comparative Analysis of Low Power and Area Efficient Digital Circuit Design
-B. Dilli Kumar,A. Chandra Babu,V. Prasad
Abstract
Low power consuming devices are playing a dominant role in the present day VLSI design technology. If the power consumption is less, then the amount of power dissipation is also less. The power dissipation of a device can be reduced by using different low power techniques. In the present paper the performance of 4x1 multiplexer in different low power techniques was analyzed and its power dissipation in those techniques is compared with the conventional CMOS design. Each of these techniques has different advantages depending on their logic of operation. The simulation results show that the proposed techniques have less power dissipation compared to the conventional CMOS with reduction in area also.
Keywords- Low power, Power dissipation, GDI, PTL, Adiabatic, Charge recovery
764-768


  PDF

9
Intricate Port Scanning
-Pratik Kanani,Hiral Raveshiya
Abstract
In today’s scenario due to advancement in computing power, technology, advance tools and coding techniques password cracking and finding vulnerability has become simpler. One of the most common techniques used by intruders is port scanning, by which attacker identifies running applications and makes entry in the system.In this paper the idea of random port selection is suggested to make the port scanning more difficult for intruders
769-771

  PDF

10
A New Architecture of Simplified Fuzzy ARTMAP with the Extended Definition of Complementation
-Pranamika Kakati
Abstract
Simplified Fuzzy ARTMAP is an architecture which synthesizes Fuzzy Logic with ART Neural Networks. This is one of the most researched form of Neuro-Fuzzy hybrid system and has resulted in a stupendous quantity of publications and research results. The existing Simplified Fuzzy ARTMAP architecture is based on traditional Zadehian Theory of Fuzzy sets where it is believed that there is no difference between Fuzzy membership function and Fuzzy membership value for the complement of a Fuzzy set which is already proved to be wrong. In this article, our objective is to present a new architecture of Simplified Fuzzy ARTMAP with the help of extended definition of complementation of Fuzzy sets using reference function. Our proposed architecture is based on the fact that Fuzzy membership function and Fuzzy membership value for the complement of a Fuzzy set are two different things. Also, an effort has been put forward to demonstrate the application of the proposed architecture with the evaluation of some example data.
Keywords: Complement of a Fuzzy set, Fuzzy membership function, Fuzzy membership value, Fuzzy reference function, Fuzzy set, Simplified Fuzzy ARTMAP.
772-784


  PDF

11
Performance Evaluation of Real Time database Systems in Distributed Environment
-Shetan Ram Choudhary,C.K. Jha
Abstract
Transaction scheduling plays an important role in deciding the performance of a real time database system (RTDBS) in distributed environment. It has been demonstrated that the priority based scheduling enhances the performance of a RTDBS in distributed environment. The performance is primarily measured by the number of transactions completed within a unit time. In real-time applications, timing and criticality characteristics of transactions must be taken into account. In this paper, we examine the performance of real time database systems in distributed environment. The deadline guarantee ratio and average response times are the primary performance measures. There have been performance studies on real-time database systems, but most of them were performed using simulation. This work demonstrates the feasibility of developing real time database systems in distributed with an acceptable performance.
Keywords: Real Time Database System, Transaction Scheduling, Distributed Environment.
785-792


  PDF

12
Symptoms Based Detection and Removal of Bot Processes
-T Ravi Prasad,Adepu Sridhar
Abstract
Botnet is one of the most dangerous threats in internet. Botnet [10] consists of a network of compromised computers connected to the network that is controlled by a remote attacker (Botmaster). Botnets perform various attacks such as DDoS attacks, Click Fraud attacks, and are also involved in distribution of spam emails, key loggers etc. Existing techniques for the detection of bot includes deployment of Honey pots, Usage of signatures for detection of various attacks, Monitoring Network traffic for anomaly detection. Disadvantage in Honey pot detection is to captures and tracks the activity only attacker directly interact with it. In Signature based detection only known attacks can be detected and further, it needs regular update of rules. A network-based detection monitors the network traffic which involves deep packet inspection requires high computing performance. To overcome the disadvantages of the existing solutions, A new Symptoms Based Detection and Removal of Bot Processes algorithm is proposed. The proposed algorithm provides a host based solution, which enables online bot process detection and its removal. The Detection process is based on the detection of illegitimate process which uses TCP connections. This involves observing the Digital signature of the process, installed Programs path and also the registry entries associated with the process. The proposed solution when tested on a bot infected machine, was found to detected as well as remove the malicious Bot processes.
Keywords: Botnet, Digital Signature, Honey pots, Bot.
793-797

  PDF

13
Efficient Machine Learning Approach for Contour-Based Image Segmentation
-D. Baswaraj,Dr. A. Govardhan,Dr. P. Premchand
Abstract
This paper identifies the comprising shape priors in image segmentation has become a key problem in computer vision. Most of the researchers were focuses number of existing works and those were limited to a linearized shape space with small distort modes around a mean shape.These approaches are relevant only when the learning set is composed of very similar shapes. Also, there is no guarantee on the visual quality of the resulting shapes. We introduce a non-linear shape prior for the deformable model framework that we learn from a set of shape samples using recent manifold learning techniques.Our method computes a Delaunay triangulation of the reduced space, considered as Euclidean, and uses the resulting space partition to identify the closest neighbors of any given shape based on its Nystrom extension. First, we propose a solution to the pre-image problem and define the projection of a shape onto the manifold. Based on nearest neighbors for the Diffusion distance, we then describe a variant framework for manifold de-noising. Finally, we introduce a shape prior term for the distort framework through a non-linear energy term designed to attract a shape towards the manifold at given constant implanting
798-804


  PDF

14
An Efficient Approach Optimized Performance with SAP Net Weaver BI
Accelerator

-Prof.B.Lakshma Reddy,Dr.T.Bhaskara Reddy,M.Victoria Hebseeba,Dr. S.Kiran
Abstract
This paper describes the SAP Net weaver BI accelerator and its features and how the accelerator can be used for optimized performance in any IT industry. The objective is to provide the best practices and solutions for current challenges in using SAP Net weaver BI Accelerator in any large scale business industries across the world.
805-816


  PDF

15
Comparative study of Barcode, QR-code and RFID System
-Trupti Lotlikar,Rohan Kankapurkar,Anand Parekar,Akshay Mohite
Abstract
Wireless sensors are standard measurement tools equipped with transmitters to convert signals from process control instruments into a radio transmission. The radio signal is interpreted by a receiver which then converts the wireless signal to a specific, desired output, such as an analog current or data analysis via computer software. The paper gives a brief on wireless sensors and their types like Barcode, QR code, RFID along with their characteristics and working components. The Barcode is an optical machine-readable representation of data relating to the object to which it is attached. On the other hand the Radio-frequency identification (RFID) is the use of a wireless non-contact system that uses radio-frequency electromagnetic fields to transfer data from a tag attached to an object, for the purposes of automatic identification and tracking. Quick response (QR) codes are a very convenient way to display a small bit of information that is easily scanned and processed typically by mobile devices allowing physical items to almost become interactive, by providing information that is easily scanned like a website URL. Finally this paper will compare all the three technologies on various grounds like durability, cost, information capacity, read range etc. to determine best out of it.
Keywords- Wireless sensors, Barcode, QR-code, RFID
817-821

  PDF

16
Understanding various Techniques for Background Subtraction and Implementation of Shadow Detection
-Harsha Varwani,Heena Choithwani,Tina Gyanchandani,Dashrath Mane,Kajal Sahatiya,Shruti Gangan
Abstract
In this paper, we present steps involved in Background Subtraction and their techniques. However, a prominent problem in these is presence of shadow in the foreground. Hence, we discuss two techniques for efficient shadow removal. Further, we conclude with a method to reduce considerably the processing overhead. Here, we take alternate frames and apply background subtraction algorithms on them. This does not impact much on the output data, however, resources are greatly saved.
Keywords: Background subtraction, shadow removal
822-827



  PDF

17
CDRAMM: Character And Digit Recognition Aided by Mathematical Morphology
-Richa Sharma,Arun Jain,Ritika Sharma,Jyoti Wadhwa
Abstract
A Character recognition system takes input in the form of scanned images of handwritten, printed or typewritten text and outputs some form of machine editable text. In this work, a set of prominent structural features are extracted to precisely distinguish one character from the other. The classification process makes use of a decision tree classifier where at each node the decision rules are defined by some morphological operations till the final realization is done. The results obtained are prominent and the accuracy of our CR system is on an average 95% for handwritten text and for printed text, it achieves an accuracy of 99%. The recognition is affine transformation invariant with the assumption that individual characters are not overlapping.
Keywords—CR-Character Recognition, OCR-Optical Character Recognition, IG -Information Gain, IGR-Information Gain Ratio, B-Blob Presence.
828-832


  PDF

18
The Log Polar Transformation for Rotation Invariant Image Registration of Aerial Images
-B. Janardhana Rao,O.Venkata Krishna
Abstract
Aerial image registration requires a high degree of precision. To improve the feature-based registration accuracy, this paper proposes a novel Log-Polar Transform (LPT) based image registration. Instead of using the whole image in the conventional method, feature points are used here, which reduces the computational time. It is not important how the image patch is rotated for rotation invariance. The key is focusing on the feature points. So a circular image patch is used, instead of using square image patches as used in conventional methods. In the existing techniques of registration always do FFT first and then Log-Polar Transformation (LPT). In this proposed technique does LPT first and then the FFT.The proposed technique contains four steps. First, feature points are selected in both the reference image and the sensed image with corner detector. Secondly, using feature point positions as centers image patches are created. Circular image patches are cropped choosing a feature point as center. Then the circular images are transformed from Cartesian co-ordinates to Log-Polar co-ordinates. Next, the LPT images are dealt using phase correlation. Experimental results demonstrate the reliability and rotation invariance of the proposed method.
IndexTerms—Image registration, Log-Polar Transformation (LPT), Fast Fourier Transform (FFT), Phase correlation
833-840


  PDF

19
Multiple Regression Analysis on Heart Rate Signal using Hand GSR and R peak of ECG signals
-Karthik Soman
Abstract
This paper proposes a mathematical model for the heart rate signal using hand GSR and power samples of the R peak of the ECG through multiple regression analysis. Mathematical model helps to study the relation of the dependent function with its independent functions and to correlate with the biological processes. The paper proposed four models for heart rate. Each model had R2 values such as 0.0594, 0.2169, 0.9296 and 0.9962 respectively. The fourth model was robust and quite acceptable because of its high goodness of fit. The study also proved a non linear relationship of the heart rate signal with the hand GSR and R peak of the ECG signal.
Keywords: GSR, ECG, Hear rate, Multiple Regression analysis.
841-845


  PDF

20
Biometric Dynamic Personality Authentication in Open Information Space
-Akhmetov B.S.,Ivanov A.I.,Kartbaev T.S.,Malygin A.U.,Mukapil K
Abstract
The protection methods of personal data in open information spaces with the using of biometric identity authentication technology. An analysis of biometric methods using static biometrics person. Celebrated their potential danger due to the threat of loss of base biometric templates. For the protection of personal data is proposed to use dynamic biometric characteristics of the person, which are well suited for remote user authentication. These parameters are sensitive to the current psychophysical state of man, and at the same time can be changed by the will of man. Especially given the dynamic neural network biometric identity authentication on the example of the biometric characteristics such as signature, handwriting keyboard, voice.
846-855

  PDF

21
Energy Efficient Enhanced AODV Routing Protocol for maximize the lifetime of Mobile Ad hoc Networks
-R.Rajeshkanna,Dr.A.Saradha
Abstract
A Mobile Ad-hoc Network (MANET) is a self-configuring network collected of mobile nodes without any fixed Environment. Energy efficiency is a major problem of mobile ad hoc networks as mobile nodes rely on batteries, which are insufficient sources of energy, and in several environments, it is relatively a unmanageable task to replace or renew them. Energy is inadequate factor in case of Ad-hoc networks. The life of a node is straightly relative to the battery in the device operating at the node. Maximize the use of power and maximize the life of network is still the key challenge of Mobile Ad hoc network. Various routing protocols for mobile adhoc networks could be contrast depending upon the network design and the purpose. This paper presents a improve the energy conservation techniques using the enhanced AODV energy efficient routing protocols in MANETs to maximing the life time of networks. This EEAODV protocol use energy optimal routes to reduce the energy consumption of nodes.
Keywords: Mobile Ad-hoc Network; On-demand Routing; Energy Efficient Routing; Routing Protocols; Power Aware Routing
856-863


  PDF

22
Outsourcing and Discovering Storage Inconsistencies in Cloud Through TPA
-Sumathi Karanam,GL Varaprasad
Abstract
Cloud computing has changed the way computing takes place. It is the technology that enables outsourcing of computing and storage to a public cloud maintained by cloud service providers. Cloud users can use cloud storage and other facilities without capital investment in pay as you use fashion. As the data is stored in remote server in the data center of cloud service provider, there is security concern among the cloud users. Wang et al. studied this problem and ensured data integrity in cloud storage by proposing third party auditing concept. The third party auditor is responsible to verify the integrity of data on behalf of cloud data owners. The auditing mechanism monitors the data dynamics. The solution makes use of bilinear aggregate signature for simultaneous auditing and Merkle Hash Tree for secure block level authentication. In this paper we implement a prototype, Java custom simulator, which implements the proof of concept proposed by Wang et al. The empirical results revealed that the prototype is effective to demonstrate the efficiency of auditing mechanism to ensure data integrity.
Index Terms – Cloud computing, outsourcing data, cloud storage security, public auditability
864-868


  PDF

   

 

 

 

IJCTA © Copyrights 2010| All Rights Reserved.

This work is licensed under a Creative Commons Attribution 2.5 India License.