IJCTA-Volume 5 Issue 6/ November-December 2014
Title/Author Name
Page No
Latest Information Summarization Using Modified Page Rank Algorithm
-Samina Mulla,Mukta Takalikar
This paper depicts a technique for dialect free extractive synopsis that depends on iterative chart based standing calculations. Through assessments performed on a solitary archive outline assignment for English, we demonstrate that the strategy for every structures just as well paying respect to the dialect. Additionally, we demonstrate how a metasummarizer depending on a layered provision of strategies for single-sentence rundown might be transformed into a viable technique for multisentences outline. We presented new approach of page rank as a modified page rank (MPR) to reduce server request delay in case of news blaster application.
Index Terms—Document Summarization, Update Summarization, Modified PageRank Algorithm, Novelty Detection, Sentence Updating
A Secured Application for Generating Acoustic Signal for Blind People
-Prachi Phursutkar,Apurva Bajaj,Priyanka Veer,Tai Chormale,Prof.G.M.Bhandari
Visionless people face many difficulties in their daily activities. This paper is basically designed to facilitate blind people for autonomous navigation. It is based on ‘image to sound’ conversion. The mobile camera is used to captures the image in front of the blind user. This image is then equated with the database and the processed information is fetched by blind user through a set of earphones. Color information of the object is also measured and it is informed to the blind user through the set of headphones.
Keywords—Color identification, edge detection, gray scale, object identification.
Survey Paper on Features and Security of Personal Cloud Storage Service Providers
-Sanjna Sinha,Puneet Gupta,Shivam Raj,Priyansh Bendre
Cloud computing holds the potential of eliminating the requirement of setting up high-cost and complex IT infrastructure for solutions and services. It provides flexible and scalable resources [1] for easy access and development through lightweight portable devices. In cloud computing the entire data resides on the networked resources, which can be shared over the internet [2].
The implementation and the extent of usability is limited for now, but is increasing over the period of time. The productivity can be increased by using the existing features of the cloud which is possible only after detailed study of the features, scope, security of the cloud and innovating a newer ideas to utilize the cloud to it’s full potential.
Keywords:Comparison; Dropbox; Google Drive; One Drive; iCloud; Personal Cloud
An Application For Customized Helpline
-Priyanka Nathani,Monika Chakhne,Pooja Patil,Sandhya Pati
Number of helpline numbers are available that provide services such as ambulance service, protection to girls etc. But this number lacks the feasibility and are unable to provide the service. So to overcome the drawback of this service,we propose a system that provides frequently needed help in our day to day life. This paper presents the design of our system that focuses on helping out people to track the location of a missing person or in need of any general help by using an Android or a Web application.
Keywords : Android, Long code Service, Helpline
Consumer‘s Trust in using E-Commerce Websites
-Lawanshwa Kharsahnoh,Gypsy Nandi
E-commerce plays a very important role in today’s world especially in the trading business such as in an online shopping business. For an Internet business to succeed, sellers have to gain consumer’s trust. The objective of this paper is to develop a framework on what is trust based on and how decision is made by a consumer when purchasing products from a website and the risk a consumer perceives while making online transactions. Several studies were made based on how trust and risk in e-commerce correlate with each other. One of the issues which are of most concern is privacy which is related to security of online transactions based on consumer’s trust. In this paper, the findings also show that consumer’s trust is negatively related to perceived risk where trust acts as an antecedent for the risk.
Keywords—E-commerce, B2C, trust, consumer, consumer risk, hypothesis, perceived, privacy
Cryptographic Securityby New Character Signs
-Priyanka Gupta,Anupam
The cryptography is the art and science of encrypting the image in such a way that no-one apart from the sender and intended recipient even realizes the original image, a form of security through obscurity.In present times, the protection of multimedia data is becoming very important. The protection of this multimedia data can be done with encryption.Inrapid development and wide use of Internet, information transmission faces a big challenge of security.
Keywords -Asymmetric key cryptography, Decryption, Encryption, Image encryption, Symmetric key cryptography.
Detection and Suppression of Blackhole Attack in Leach based Sensor Network
-Vipul Sharma,Kirti Patil,Ashish Tiwari
Wireless sensor networks are broadly cast-off in numerous applications like battlefield monitoring, environment monitoring. Nodes in sensor network works cooperatively for a single goal with whose objective is to forward the data packets to the base station. However, it requires different resources of a sensor node such as battery power, storage, and processing power. In order to conserve its own resources a node may not forward the data to the others. Such sort of attack has serious consequences if the attacker node is the cluster head. In the presence of BlackHole attack the base station will not be able to get the data from the persecuted cluster head while resources of the cluster are being consumed. In this paper we recommend a scheme to detect this kind of misconduct in WSN. Our recognition mechanism is energy efficient since most computations parts are assigned to the base station.
Clustering Software Methods and Comparison
-Rachana Kamble,Mehajabi Sayeeda
Document clustering as associate not supervised approach extensively won’t to navigate, filter, summarize and manage huge group of document repositories just like the World Wide Web (WWW). Recently, Document clustering is that the method of segmenting a selected group of texts into subgroups as well as content based mostly similar ones. the aim of document clustering is to fulfil human interests in info looking and understanding. element based mostly software system development has gained lots of sensible importance within the field of system engineering from educational researchers and additionally from business perspective. Finding parts for economical code utilize is one among the necessary issues aimed by researchers. Clump reduces the search area of parts by grouping similar entities along so guaranteeing reduced time complexness because it reduces the search time for part retrieval. This work can study the key challenges of the clustering drawback, because it applies to the text domain. Additionally can discuss the key ways used for text clustering, and their relative benefits.
A Novel Technique: Data Leakage Hindering in Cloud computing using Swarm Intelligence
-C. Suresh Kumar,K. Iyakutti
Cloud computing is based on network based computing with the intention of takes place over the Internet. The cloud computing is a culmination of numerous attempts at large scale computing with seamless access to virtually limitless resources. It has many of the assistances such as cost effective, increased storage, shared resources, easy backup and restoration. Although there would be some challenges at some point in of the data diffusion in the cloud computing. The main objective of this context is to spotlight the issue of data security and privacy, probable to be data leakages in the cloud services. This paper initiates a novel scheme, Impeding Data Leakage technique in the cloud computing. This novel technique involved in hampering the leakage of data due to intrusions in the transmission pathway and not to detect or prevent the intrusion, it would lead to halt the entire data leakage with that meticulous path. The objective of this paper is to integrate ant colony optimization technique (ACO) with artificial bee colony technique (ABC), for the intention of hampering the communication path which is interrupted/ the data is leaked. Thus, the ABC crafts the probable and conscientious path to the server and the ACO responses for the requested path and it would back forward the information if the data leakage arises. The leakage of data would be originated with the security restraints by the ACO. Therefore, the ABC and ACO are integrated to make a halt to the data leakage in the cloud service.
Keywords: Cloud Computing, Data leakage, Data leakage hindering, Data leakage Prevention
Image File Security using Base-64 Algorithm
-Pooja Guwalani,Rohit Chandrashekar,Maya Kala,Jayashree Shinde,Dashrath Mane
Information security is becoming a vital component of any data storage and transmission operations. Since visual representation of data is gaining importance, data in the form of images are used to exchange and convey information between entities. As the use of digital techniques for transmitting and storing images are increasing, it becomes an important issue to protect the confidentiality, integrity and authenticity of images. There are various techniques which are discovered to encrypt the images to make them more secure. The primary goal of this paper is security management. A mechanism to provide authentication of users and ensure integrity, accuracy and safety of images. Moreover, an image-based data requires more effort during encryption and decryption. In this paper, we describe how Base64 algorithm can be used to achieve this purpose.
Keywords-component— Base64, Image File Security System.
Relevance of Computational Model for Detection of Optic Disc in Retinal Images
-Nilima Kulkarni,Amudha J
Optic Disc (OD) detection is a key pre processing component in many algorithms designed for automatic extraction of retinal anatomical structures and lesions thus, reliable and efficient OD localization is significant tasks in ophthalmic image processing. We aim to investigate the relevance of computational saliency model in retinal images in the context of OD detection. The optic disc in a retinal image is characterized as high contrast region. This approximately corresponds to disjunctive targets in a visual search task. Saliency maps were computed using popular model Itti-Koch. Then mathematical morphology and Otsu’s algorithm used on the saliency map for OD detection. The resulted images satisfactorily showed OD detection. The results are promising and give new insight to the use of the saliency map for medical images.
Risk Perception in the Correlation between the Tendency of using Internet and Customer's Willingness to use Online Payment System
-Herison Surbakti
This study aims to determine the extent of the influence of risk perception on the willingness of customers to use online payment system and online purchases, as well as to measure whether the experience and the tendency to use the internet have a significant effect in increasing the willingness of customers to use the online banking facilities and online payments.
There are several things that affect the willingness of customers to use the online payment system services; those are, the tendency factor of using the internet and experience factor of using the internet. Those factors have a positive influence on the willingness of customers to use online payment system facility.Perception of risk in using the online payment system service facilities has a negative influence on the willingness of customers to use online payment system facility because the use of the internet has several types of risks that should be acceptable to customers.The tendencies to use the internet and the internet experience factors have a negative influence on the perception of risk in the willingness of customers to use online payment system facilities. Does the perception of risk have a mediation role in the relationship between the tendency to use and experience to use the internet to customers’ willingness to use online payment system? This is a kind of interesting question to study.This research uses a model from a previous study[22]. The willingness of using online payment system service is a big opportunity for the E-Business development, especially in Yogyakarta, Indonesia.
Keywords: Online payment system, risk perception, willingness to use online payment system services, e-business
Scheduling Tasks in Embedded Systems based on NoC Architecture
-Dariusz Dorota
This paper presents a new method to generate and schedule task in the architecture of embedded systems based on the simulated annealing. This novel method takes into account the attribute of divisibility of tasks. A proposal of represent the process in the form of trees. Despite the fact that the architecture of Network-on-Chip (NoC) is an interesting alternative to a bus architecture based on multi-processors systems, it requires a lot of work that ensures the optimization of communication. This paper proposes an effective approach to generate dedicated NoC topology solving communication problems. Network NoC is generated taking into account the energy consumption and resource issues. Ultimately generated is minimal, dedicated NoC topology. The proposed solution is assumed to be a simple router design and the minimum number of lines.
A Novel Approach for Integrating Image Steganography and Encryption
-Obaidah A. Rawashdeh,Dr. Nedhal A. M. Al-Saiyed
Information security plays an important task in protecting data resources shared through insecure channels. Information security has two main approaches; Cryptography and Steganography, which help to ensure efficient and adequate level of security. In this paper, a novel approach for integrating image steganography and encryption techniques are used to achieve higher security. The approach uses primitive roots of prime numbers in selecting the secret key to encrypt a text message and to scatter the encrypted message across the cover PNG colored image. The pixels that are candidate to hide the data are selected randomly based on the randomization characteristics of exponentiation of the primitive root numbers. The new technique provide higher security because without any knowledge about the used stego key. It is very difficult to extract the sensitive text data on just knowing the algorithm. The technique also presents an acceptable level of image quality since the produced quality results are similar to the results of LSB technique, but with more robustness and security. The performance of the proposed approach is compared with the normal LSB.
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP
-Aakanksha Vijay,Savita Shiwani
Today, organizations find it necessary to protect your valuable information and internal resources from unauthorized as the deployment of firewall access. As use of the Internet is growing rapidly the possibility of attack is also growing in this. Signatures may be present in different parts of the data packet depending on the nature of the attack. The main role intrusion detection systems on the network to help computer systems to prepare for and cope with network attacks. Intrusion Detection Systems (IDS) have become the key to the security of systems and network components. These systems ensure compliance with security policies by checking the arriving packets for known signatures (patterns). Snort is mostly used signature-based IDS, because the software is open source and easy. Basic Analysis and Security Engine (BASE) is also used to view alerts generated by Snort. In this work, we launched intrusion detection signature-based network using Snort and WinPcap.
Survey on Semantic Content Extraction in Videos
-Priyanka Nikam,B. R. Nandwalkar
Increase in the use of video-based applications has shown the need for modelling and querying the semantic content in videos. Extracting the semantic content from video is difficult task as video is a temporal sequence of frames and has no any direct relation to its semantic content. So, intelligent methods to model and extract video content are required. Many different techniques are used to model semantic content those are manual extraction, automatic extraction using spatial and temporal relations, ontology based extraction etc. All these techniques are overviewed which allow user to retrieve information from huge amount video data and content extraction.
Keywords: Semantic content extraction, video content modelling, ontology, Event, Spatial relation
Association Rule Mining in Medical Data Analysis
-Harsha Varwani,Heena Choithwani,Kajal Sahatiya,Shruti Gangan,Tina Gyanchandani,Prof. Dashrath Mane
The wide availability of data in today’s world has motivated this data to turn into imminent information. This is achieved through Data Mining. The process of Data Mining involves extracting of useful information from large data sets. This technique is used in many fields like Marketing, Customer Relationship Management, Sales, Production and more. In this paper, we shall see the use of Data Mining, specifically, Association Rule Mining in Medical Sciences. We shall see the use of Apriori Algorithm which leads to the discovery of associations and correlations among items in large transactional or relational data sets and finds patterns among the frequent item sets. In our case, the data set is {Patient_Id, Medical_Conditions}.
Keywords— Data Mining, Apriori Algorithm, Medical Data Set Mining, Heart Disease
Survey: Retrieval of Video Using Content (Speech &Text) Information
-Bhagwant B. Handge,Prof.N.R.Wankhade
Video is becoming a prevalent medium for e-learning. Lecture videos contain text information in both the visual and aural channels: the presentation slides and lecturer's speech. This paper examines the relative utility of automatically recovered text from these sources for lecture video retrieval. To extract the visual information, we apply video content analysis to detect slides and optical character recognition to obtain their text. We extract textual metadata by applying video Optical Character Recognition (OCR) technology on key-frames and Automatic Speech Recognition (ASR) on lecture audio tracks. The OCR and ASR transcript as well as detected slide text line types are adopted for keyword extraction, by which both video- and segment-level keywords are extracted for content-based video browsing and search.
Index Terms—Lecture videos, automatic video indexing, content-based video search, lecture video archives
A Survey on Multimedia Information Retrieval System
-Pooja Shinde,Prof.J.V. Shinde
This survey paper aims to provide the multimedia researcher with the different fusion approaches. The different fusion approaches are used to have multiple modalities are used to accomplish various multimedia related analysis tasks. Fusion method are describe by using different perspective .The problem of metadata based image retrieval system and a very rapid growth in the quantity and availability of digital image involves the researches into the multimedia information system. Finally in last section we are discussing on the multimedia information retrieval based on late semantic fusion approaches.
Index Terms— Late Fusion, Multimedia Information Retrieval, Content based retrieval, Text based retrieval.
Survey on Optimized Solution for Efficient Detection of Text from Images
-Aarti Arjun Andhale,Prof. Rishikesh Yeolekar
Text detection and recognition is a hot topic for researchers in the field of image processing. Text detection and extraction is performed in a four-step approach that consists of the pre-processing which include binarization and noise removal of an image, image segmentation using connected component analysis, feature extraction using variance generation and finally classification by choosing a threshold value of variance property. The goal of the project is to develop an Android-platform based text detection application that will be able to recognize the text captured by a mobile phone camera. Optical character recognition (OCR) methods recognize the characters and can be really useful when you have got a paper document you want in digital, editable form.
Index Terms— Pre-processing, Segmentation, Optical Character Recognition (OCR)
IJCTA © Copyrights 2010| All Rights Reserved.

This work is licensed under a Creative Commons Attribution 2.5 India License.