......

..

IJCTA-Volume 6 Issue 1/ January-February 2015
S.No
Title/Author Name
Page No
1
Performance Analysis of RIPv2 protocol in Wired Network Using Cisco Packet Tracer
-Jaswinder Kumar,Samiksha,Amandeep Kaur,Harsukhpreet singh
Abstract
In this research performance of RIPv2 Protocol is optimized using enhanced routing parameter like routing Update, convergence time, invalid timer, hold timer, Flushout timer .By review of RIP protocol the researcher use these value as 30sec update Timer, 180 sec invalid timer and 180 sec hold timer and 240 sec flushout timer, which result in low QoS and slow routing. This research paper mainly focuses on to optimize above mentioned Routing Parameter to enhance QoS parameter and make RIP Protocol routing fast.
Keywords: CISCO, RIP, RIPv1, RIPv2, EIGRP and OSPF
1-6
2
A New Digital Watermarking Algorithm Based on Image Comparison
Technique

-Dr. Abdul MonemS.Rahma,Dr.Matheel E.Abdulmunim,Rana J.S. Al-Janabi
Abstract
In this research, new watermarking algorithm for RGB image is created. The watermark is embedded into two stages. The first one is by taking the secret key that consists of eight number from (0..7) each number in it determines the particular bit position in specific pixel of cover image. If that bit is similar to the bit in watermark ,(0)it will be stored in the LSB of the watermarked image, otherwise (1) it will be stored .The second one is that it can provide multiple secret keys using shift and rotate operation. The watermark is embedded redundantly over all extracted blocks in image to increase image protection. This research provides high security for two reasons, the embedded bit will not be stored in LSB directly and this approach will use multiple secret keys.
Keywords: Watermark algorithm, Least Significant Bit Improvement, Watermark and Comparison Technique, Copyright Protection Watermarking image in spatial Domain
.
7-11
3
Performance Evaluation of Different Hybrid Gateway Discovery Methods
-Susmita Majumder
Abstract
Mobile Ad hoc Network (MANET) consists of a set of wireless nodes which are connected but can freely move. These mobile nodes include a particular type of nodes, known as ‘gateway’ nodes, which are directly connected with internet and other mobile nodes in a MANET get internet access through them. Prior to access, any mobile node requires discovering such a nearest gateway node using a gateway discovery method. Both proactive and reactive methods suffer from higher delay and poor packet delivery. Hybrid method addresses these issues where the gateway node proactively broadcasts gateway advertisement message to mobile nodes up-to a particular number of hops. Beyond that, the other mobile nodes send gateway discovery messages to gateway nodes so that the gateway nodes can reactively reply. Prior works on hybrid methods use static values as number of hops. In a state-of-the-art work, an adaptive hybrid method was proposed where values for number of hops were dynamic. This paper discusses the performance of this adaptive hybrid method with other hybrid methods which are based on static number of hops. Results show that the adaptive method outperforms other static hybrid methods.
Keywords- Adaptive hybrid method, Hybrid method with variable hop counts, Advertisement interval, TTL value, Hop count.
12-17
4
New Technique for Cross Platform Availability Control over Electronic
Messages

-Ward Ahmed,Dr Hebah H. O. Nasereddin
Abstract
In this research, a new technique is proposed to grant email senders control over sent messages even after they arrive at the receiver’s mailbox, the method suggests that the email gets encrypted by AES using a randomly generated key, the key is then stored on the sender server and an identifier is added to the header of the email, if the receiver wishes to read the email the receiver’s server must request the key from the senders server by sending the identifier, the sender can control the availability of the key and thus the ability of the receiver to read the email. The experimental results suggest that the process of encryption has little impact on the overall time required to send the email, however, the process of requesting the key and decrypting he email required slightly more time than the normal process
18-22
5
Saliency of Scene Object
-Ashwini Nanaware,Harish Barapatre
Abstract
Computationally detecting salient object from confusing background is most important in computer vision system. Salient object is unique object which stands out different and having closed boundary in space. Saliency at a given location is determined primarily by how different current location is from its surround in color, orientation, motion, etc. There are various approaches of visual attention like top-down approach, bottom-up approach and hybrid approach. Various object detection tasks use attention models very effectively. In this paper, we review three state-ofthe- art attention models for their response to scene images. Early results indicate that saliency maps produced by these attention models can be used for salient object detection algorithms.
Keywords – visual attention models, saliency map,state-of-the-art model, salient object detection
23-26
6
Threshold Based Face Detection
-R.Vinodini,Dr.M.Karnan
Abstract
Face detection is one of the significant applications of image processing and plays an important role in biometric systems. It is an interesting field of research that verifies the presence of faces and locates their positions in an image. This paper describes a face detection method based on image segmentation and threshold value. The experimental result of the proposed system gives an excellent result in terms of increased accuracy of face detection system both in still images and in video frames. It was tested using MATLAB with huge number of input images.
Keywords: Image segmentation, Morphological Operation, Threshold.
27-31
7
Performance Evolution of Bee Colony Optimization for Fuzzy Clustering
-R. Prabhu
Abstract
Bee Colony Optimization algorithm is a population based swarm intelligent family, it has to solve local optima problem and which is inspired by the principles of natural biological behaviour and circulated communal behaviour of social colonies has shown superiority in production with complex optimization problems. In this paper, have to studied Fuzzy Bee Colony Optimization (FBCO) was wished-for that algorithm furnished incredibly shining effect.
32-34
8
Design and Simulate Cloud Computing Environment using Cloudsim
-Jayshri Damodar Pagare,Dr. Nitin A Koli
Abstract
Cloud computing has been emerging as powerful computational architecture which will be a major technology in the development of the future Internet of Services. In order to save energy consumption we need to apply new energy efficiency mechanism and observe its effects on a datacenter. As it is difficult to test new mechanism in real cloud computing environment and researchers often cannot reach the real cloud environment, simulation to model the mechanism and evaluate the results is necessary. Simulating a datacenter avoids spending time and effort to configure a real testing environment. This paper propose an extensible simulation framework called CloudSim which supports simulation, modelling of cloud computing and creation of one or more virtual machines(VMs) on a simulated node of a Data Center, jobs, and their mapping to suitable VMs, power to manage services and modeling of cloud infrastructure. Also manage your own mechanism in cloud computing. It also allows simulation of multiple Data Centers.
IndexTerms—Cloud computing, Cloudsim, Datacenter, Simulation
35-42
9
Mobile HealthCare Monitoring System in Mobile Cloud Computing
-D.Hari Prasad,M.Srikanth
Abstract
Cloud computing is on-demand computing that does not reside at the users’ premise. Instead of the computing resources are owned and managed by a cloud service provider and the user’s access the resources via the Internet. Cloud-Assisted m(Mobile)- Health Care Monitoring System, it concern the current promising areas Mobile Communications and Cloud Computing Technologies to provide feedback, decision support, has been considered as a revolutionary approach to improving quality of health care services while lowering the health care cost. Unfortunately, it also cause a serious risk on both patients or clients privacy and intellectual property of monitoring service providers, which could deter the wide adoption of m- Health Care technology. This paper is explore this particular important problem and to design and implement a Cloud-Assisted Privacy preserving m (Mobile) Health Monitoring System to protect the privacy of the involved stakeholders and their sensitive and critical data. Moreover, the outsourcing decryption technique and a newly proposed key private proxy reencryption are adapted to shift the computational complexity of the involved stakeholders to the cloud without compromising patients or clients’ privacy and service providers’ intellectual property.
43-46
10
Distributed Cooperative Caching In Social Wireless Networks
-Adhika Dongare,Priti Gavasane,Komal Mhaske,Pooja Wankhade
Abstract
This paper introduces cooperative caching policies for minimizing electronic content provisioning cost in Social Wireless Networks (SWNET). SWNETs are formed by group of machines, such PC’s, Laptop’s, mobile phones etc., sharing common interests in electronic content, and physically gathering together in public places. Electronic object caching in such SWNETs are shown to be able to reduce the content provisioning cost which depends heavily on the service and pricing dependences among various stakeholders including content providers (CP), network service providers, and End Consumers (EC). Drawing motivation from Amazon’s Kindle electronic book delivery business, this paper develops practical net4work, service, and pricing models which are then used for creating two object caching strategies for minimizing content provisioning costs in networks with homogenous and Heterogeneous object demands. The paper constructs analytical and simulation models for analyzing the proposedcaching strategies in the presence of selfish users that deviate from network-wide cost-optimal policies. It also reports results from an Android phone based Prototype SWNET,validating the presented analytical and simulation results.
Keywords—Social wireless networks, cooperative caching, content provisioning, ad hoc networks
47-50
11
Implementation of Adaptive filtering algorithms for removal of Noise from ECG signal
-Pramod R. Bokde,Nitin K. Choudhari
Abstract
Electrocardiography (ECG) is a non-invasive technique which is used for reading the electrical activity of the heart. It can be detected by several electrodes attached to the body surface and recorded using an external electronic circuit. This real noise free ECG signal can be used to detect different heart diseases, but a recorded ECG signal is not noise free. Noise existing in ECG signals can be removed using analog devices or using digital filters. As computational microprocessor power increases, the need to remove noise has been shifted to the use of digital filters. One of the very effective digital filters to remove the ECG noise is adaptive filtering techniques. In this paper, several adaptive filtering algorithms are proposed for noise cancellation of ECG signals and determining the accuracy of ECG signal features. Different adaptive filter algorithms used in this research work re Least Mean Square (LMS), Normalized Least Mean Squares (NLMS), Kernel Least Mean Squares (KLMS) and Normalized Kernel Least Mean Squares(NKLMS). The main focus of this paper is to compare the performance of the proposed kernel adaptive filter to already existing least mean squares filter and demonstrates usage of different adaptive filtering techniques to cancel noise sources from an ECG signal and to accurately detect its characteristics.
Keywords: Artifact, Kernel, Accuracy, Baseline wander, PLI, QRS Complex, Adaptive filters etc.
51-56
12
Wireless Sensor Networks: Principle and Challenges
-Ruby Singh,Shashi Kant Gupta,Pallavi Khatri
Abstract
The esteem of Wireless Sensor Networks has increased tremendously in recent time due to growth in Micro-Electro- Mechanical Systems technology. WSN has the potentiality to connect the physical world with the virtual world by forming a network of sensor nodes. In this paper there is a study of issues and challenges of security attack on wireless sensor network .After that study of some routing protocols in wireless sensor network and comparison between multipath routing protocols are also discussed in this paper. General Terms Wireless Sensor Network, Routing Protocol, Security in WSN
Keywords:Wireless Sensor Network, Routing, LEACH , DSR, SPIN
57-63
13
Strength Estimation of the Waves for the Ultra-Relativistic Euler Equations
-Mahmoud A.E. Abdelrahman,M.E.El-Shafei y,Maryam M. Alshaibani
Abstract
We study the ultra relativistic Euler equations for an ideal gas, which is a system of nonlinear hyperbolic conservation laws. We first give the parametrizations of single shocks and rarefaction waves and we give the solution of the Riemann problem in a constructive way. A sharp estimates of the strengths of the waves of the ultra-relativistic Euler equations are derived. Keywords: Relativistic Euler equations, conservation laws, hyperbolic systems, Lorentz transformations, shock waves, entropy conditions, rarefaction waves, Riemann solutions.
AMS subject classifications: 35L45, 35L60, 35L65, 35L67, 76Y05
64-72
14
Intrusion Detection in Data Mining using Log Mining
-Bhavana Kathwate,Manisha pathare,Mitali Tarkar,Sanyukta Kate
Abstract
A considerable effort has been recently devoted to the development of database management systems (DBMS) which guarantee high assurance security and privacy. Huge amount of resources are dedicated by organizations in securing their servers and networks. An important component of any strong security solution is represented by intrusion detection (ID) systems, able to detect anomalous behavior by applications and users. To date, however, there have been very few ID mechanisms specifically tailored to database systems. In this paper, we propose a mechanism which not only detects intrusion and malicious transactions done on the database, but also restores the original data, identifies the intruder and the IP address of machine from which the data is been altered. The approach we propose to ID, is based on mining database traces stored in log files.
Keywords- Log Files, Data Mining, Log Mining,Intrusion Detection, Database.
73-75
15
Broadband Bow-Tie Antenna with Tapered Balun
-Hussein Mohammed AL-Dahhan,Basher B.Qas Elias
Abstract
This letter presents a new broadband Bow Tie Antenna with high performance characteristics, such as high gain and wideband to cover wireless applications at 2.4 GHz (ISM) band. Tee-Junction Balun technique is used to reduce the power loss due to the radiation which occurs on feed excitation of the antenna. Tapering technique is used on the Balun to reduce the effect of discontinuity on the power flow. From the simulation results of a Bow Tie Antenna we can conclude that our proposed antenna has met the desired specifications; antenna bandwidth1.89-3.25 GHz and 3.5-3.67 GHz for operating frequency 2.45 GHZ. Maximum gain achieved at 2 GHz is 4.8 dB and the gain for 2.5 GHz, 3 GHz and 3.5 GHz are 4.8 dB, 4.1 dB and 3.8 dB respectively.
Index Terms—Broadband, Bow-Tie, ISM, Balun, Taper
76-80
16
Study of Design and Implementation Techniques for WiFi based PC and
Mobile Control

-Kanad Bapat,Shruti Bhutada,Prachi Birla,Devyani Parchani,Prof.A.S.Hanwate
Abstract
Managing your device can also easily get in the way of productivity or efficiency if, for example, you are working at your desktop computer and you need to frequently pick up your phone to reply to text messages. This application lets you use and manage your device over the air. It’s a handy solution for those who hate having to switch between computer and phone frequently. In this application one can manage the functionalities of his device from the PC, such as messaging, managing files, enabling or disabling device modes etc.
81-84
17
Graphical Password Authentication System using Cued-Click Point
-Amol D Bhand,Vaibhav A Desale,Ganesh D Hajare,Prashant S Karne,Prof.Swati D Shirke
Abstract
In this paper proposed here the graphical password authentication system in replacement/alternative of the text password using Cued Click Point (CCP) method[1]. It based on cued click points. Users click on point of the image from the sequence of the images. The next image/input depends on the past click or past input. It is simply nothing but the use of image or sequence of images appearing one by one in a sequence and task related it to drive the password authentication activity. The main purpose of this system is generating complex to guess to hackers but easy to remember the password to user. User preferred to select using one point rather on image rather than selecting multiple points. Cued click point is easy for user to use and implement as well as it is easy to recognize. CCP is best than pass point because maximum number of images can reduce the guessing attacks and makes it confusable to the hackers.
Keywords: Graphical Password, Computer security, Cued Click Point (CCP), Computer Authentication.
85-88
18
A High Security Prison Management System Implementation Using RFID
CARD

-Anu PS,Shibu V,Jabir K V T,Preetha Mathew
Abstract
Very recently certain allegations aroused regarding the security system within the prisons. Prisoners are reported to be indulging in various malpractices even inside the jail boundary that require immediate attention. The traditional methods for getting the appropriate report usually take long time to process which helps the prisoner to escape. It is observed that applications which require high traceability can very well use RFID (Radio Frequency Identification) technology. This system is developed for high security prison management using the RFID along with the Global Positioning System (GPS) and Global System for Mobile Communications (GSM).
89-92
19
Information Theoretical Complexities in Developing a Bilingual Corpus: Critical comparison Hindi and Marathi
-Sonal Khosla,Haridasa Acharya
Abstract
A critical comparison of Hindi and Marathi languages and its implications for building a bilingual corpus with IT perspective is presented here. We strongly believe that the efforts required to build a corpus can be reduced if the similarities between the languages can be properly accommodated in the design and development of the corpus. If the corpus is domain specific then the similarities can further be exploited to arrive at a more practicable design and the efforts can be reduced. The paper also attempts to discuss challenges faced in building the corpus due to the dissimilarities of the two languages. As a first step towards such design, we have attempted to provide formal definitions of the basic concepts in terms which could be understood better by IT designers. Results from two elementary experiments have been used to get insight into the complexities involved in the design of a bilingual corpus. Hypothesis have been laid and established which could help in understanding the complexities involved in design and development of a bilingual corpus.
93-110
20
Efficient Shortest Path Routing (ESPR) Algorithm for Multicasting in Wireless Mesh Network
-Geetanjali Rathee,Ninni Singh,Hemraj Saini
Abstract
Today’s fast and mobility oriented era of communication the networking infrastructure requires efficient communication. SPT and MCT are the two standard algorithms to provide efficient communication in wireless networking. SPT provides communication by recognizing the shortest path in a tree and propel the packet throughout this path. Since failures exist in the network, the SPT algorithm resists the failure by sending an ICMP messages which increases congestion ratio and rerouting of the packets while MCT algorithm forwards the packets on the basis of least number of transmissions. As the MCT algorithm transmits by consuming less number of cost, but during failure of intermediate links, it is also having the scope of improvement in the efficiency, i.e. transmission cost, rerouting cost and complexity of the network. These drawbacks are overcome by the proposed algorithm which works efficiently during failure of intermediate links. NS-2 is used to simulate the results and shown the results with comparative analysis of three algorithms
Keywords: WMN, SPT, MCT, Congestion, ESPR.
111-115
 
 
IJCTA © Copyrights 2010| All Rights Reserved.

This work is licensed under a Creative Commons Attribution 2.5 India License.