......

..

IJCTA-Volume 7 Issue 4 / July-August 2016
S.No
Title/Author Name
Page No
1
Framework for Hybrid Network Intrusion Detection and Prevention System
-Gulshan Ansari,Prof. Tanveer Farooqui
Abstract
By the emerging uses of the information technology there is tremendous amount of data is being in used by the users in the internet which is also raising the risk of loss of data and various types of attacks over on those data and also on network have been raised. So a mechanism called the Intrusion-Detection-Systems has been developed few years again order to detect the abnormal activities over the network communication and hosts. Its major objective is to work as a computer network system which is used to gather information based on major basic points, for the analysis of this data or information in order to find out whether the network affected by attack or not, if found any attack then here also discussed some prevention mechanism in this paper. This article discusses various categories and types of the IDS based on different aspects.
Keywords: Intrusion, Detection, Prevention, Categories of IDS, Network.
502-507
PDF
2
Watermarking Scheme for Numerical and Non-Numerical Relational Database
-
Priyanka R.Gadiya,Prof.P.A.Kale
Abstract
Digitization and easy access to the internet leads to the excessive generation of data. The relational data is to be shared over internet, cloud for the purpose of research, business and decision making. The watermarking is technique which provides the protection to the database by embedding information. But during embedding data causes alternation which affect quality of data. Data recovery with the intended data quality is assured using the Reversible Watermarking. Robust Watermarking ensures the recovery against the attack that causes false insertion, alternation, deletion of the relational databases. As the relational database comprised of both numerical as well as non-numerical data so for watermarking both should be considered.
Keywords- Robust watermarking, Reversible watermarking, non-numerical, numerical, data quality
508-512
PDF
3
Domain Specific Bug Triage With Software Data Reduction Techniques
-
Supriya B.Boraste,P.B.Koli
Abstract
Bugs are very essential aspects in an software firm. Bug triage is an required step in an software company and it cannot be avoided. In bug triage a correct developer should be assigned for fixing the bug. So existing techniques uses text classification for performing bug triage. In this techniques automatic bug triage is performed. And even they perform data reduction in existing system which is essential for bug triage. Data reduction is performed using the instance selection and feature selection techniques. Low Scale data effects the technique of bug triage and also increases the quality of the bug triage. But still using the text classification for bug triage is not very accurate. So to improve the accuracy of bug triage in proposed system we are using domain specific class labels. Using Domain specific classification the accuracy is improved which is shown in the results.
Index Terms — Bug data reduction, attribute extraction, instance and feature selection, domain specific labels, developer assignment
513-516
PDF
4
A Robust Iterative Filtering Technique for Data Aggregation in Wireless Sensor Networks
-
Nikita Pareek, Prof N.R.Wankhade
Abstract
Wireless sensor node is a composition of many small sensor nodes, which are also known as motes. Each sensor node has a potential to sense and forward the data to the other nodes and a gateway (to send information globally on internet) which is commonly known as sink. For sensor nodes, the factors that need to be worked upon are limited energy and memory. If data by all sensor nodes is sent separately to the base station then energy consumption rate increases highly which reduces survival time of the node. This is problem is usually called as hot spot problem. On the other hand because of equal size of clusters energy is wasted according to the network density. This problem is known as equal size clustering problem. Here, both the equal clustering and the hot spot problems are addressed. And an Energy Efficient Orbital Unequal Clustering (EOUC) Algorithm is proposed. The network lifetime is increased by using EOUC when compared to other clustering protocols
517-521
PDF
5
Efficacious Unequal Clustering Algorithm for HWSN
-
Surabhi R Gosavi, Prof. N R Wankhade
Abstract
Bugs are very essential aspects in an software firm. Bug triage is an required step in an software company and it cannot be avoided. In bug triage a correct developer should be assigned for fixing the bug. So existing techniques uses text classification for performing bug triage. In this techniques automatic bug triage is performed. And even they perform data reduction in existing system which is essential for bug triage. Data reduction is performed using the instance selection and feature selection techniques. Low Scale data effects the technique of bug triage and also increases the quality of the bug triage. But still using the text classification for bug triage is not very accurate. So to improve the accuracy of bug triage in proposed system we are using domain specific class labels. Using Domain specific classification the accuracy is improved which is shown in the results.
Index Terms — Bug data reduction, attribute extraction, instance and feature selection, domain specific labels, developer assignment
522-525
PDF
6
R-Tree Based Filtering Algorithms for Location-Aware Based System
-
Priya H Jagtap, Prof.N.K.Zalte
Abstract
Location Based System (LBS) have attracted a worthful attention from both industrial and academic communities. Current LBS systems used a pull model also called as user-initiated model, from where a user can issues a query system which replies with Location-aware answer. A push model also called as server-initiated model is becoming an unavoidable computing model in LBS to provide users with instant replies and subscribes register spatio-textual subscription to capture their interest. Multiple research problems arises while designing this system. Efficient filtering algorithms and pruning techniques are used to accomplish high performance and to render users with instant reply. Further propose another algorithm called FlexRPset, which gives one extra parameter to allow users to make a trade-off between result size and efficiency. FlexRPset generate fewer representative patterns than RPLocal and MinRPset is designed to improve scalability
526-529
PDF
7
Proposal of an Approach of Online Course Design and Implementation:
A Case Study of an Algorithmic Course

-
Mohamed BENSLIMANE, Kamar OUAZZANI, Mehdi TMIMI, Mohammed BERRADA
Abstract
Online learning continues to be emulated. It not only fits better to the expectations of teachers and students, but it also develops promising concepts.In this paper we will meet a set of very important issues, bearing in online learning (eLearning), while starting from the comparison between the face-to-face courses, distance courses and online courses, through the good pedagogical practices that allow us to develop a solid set of specifications for our course (algorithmic course), and ending with its implementation on the LMS (Learning Management System) Moodle.
KEYWORDS: Online learning, Face-to-face Learning, Distance Learning, Pedagogy, LMS, eLearning, Hypermedia
530-536
PDF
8
Fault Tolerant Middleware Multicast Routing in WSN
-
Sushmita T Mahajan,Prof. N R Wankhade
Abstract
Wireless sensor node is a composition of many small sensor nodes. Each sensor node has a potential to sense and forward the data to the other nodes and a gateway (to send information globally on internet) which is commonly known as sink. For sensor nodes, the factors that need to be worked upon are limited energy and memory. If data by all sensor nodes is sent separately to the base station then energy consumption rate increases highly which reduces survival time of the node. So to improve the network lifetime and also to minimum consumption of energy to survive the node in network the middleware multicast routing algorithm is proposed. In Proposed approach by using a clustering based middleware multicast technique allows any cluster head to be a multicast source with an unlimited number of subscribers for optimized group communication in WSN’s. And also ensures that, the sensor nodes do not deprecate rapidly in energy levels
537-541
PDF
9
A Hybrid Packet Value based Data Dissemination with Fuzzy Inference and Genetic Algorithm in VANET
-
Sakshi Rathi,Dr. Paras Chawla
Abstract
Vehicular Ad-hoc Networks (VANETs) consist of sets of various mobile nodes which communicate with other nodes in the area. The information packets which mobile nodes transmit can be of two types- safety information packets and infotainment packets. Both type of information is essential for the traffic network or intelligent transport system (ITS). The communication between nodes is prone to disruptions due to high mobility of nodes and data transmission through wireless channel within the network area. Due to dynamic nature of VANETs efficient data dissemination between desired nodes is a new challenge. To overcome this challenge hybrid of Packet Value based dissemination with Genetic algorithm and fuzzy inference system is used. This paper presents HPVD (Hybrid Packet Value based Data Dissemination Algorithm) a robust technique that uses value of packet to generate various fuzzy rules to give optimized packet value for data dissemination with the help of GA optimization. The performance of HPVD is evaluated by equating it with three different data dissemination techniques on NS-2 platform. Simulation results of HPVD provide a notable advancement in Packet Delivery Ratio (PDR), Throughput and small End to End Delay.
542-548
PDF
10
Automatic Diagnosis of Skin Lesion Segmentation using Textural Distinctiveness
-
S.Amanda Elsa Nivitha,V.Mercy Rajaselvi
Abstract
Melanoma a potentially fatal form of cancer has many diagnostic approaches. But they still lacks in efficiency due to factors like complex visual patterns, streaks, presence of hair and cost of dermatological examining. This paper describes a method that differentiates a normal skin from that of a malignant type. With the acquired image, pre-processing is done by converting them to gray scale and dull razor algorithm is applied to remove fine hair, small glows and noises. Features are extracted by acquiring the darker pixels found on the surface following which the radial distance between each dark spot is calculated. Segmentation is done using textural distinctiveness algorithm that calculates the local texture vectors by TD metrics and by computing the regional TD metrics the resultant map is acquired. Finally, classification of the segmented image is done with the use of support vector machine, where dataset is trained and their feature vectors are used to deduct generic equations, when a new dataset is tested in the system it predicts if the acquired image is melanoma or non-melanoma.
Keywords: Melanoma, Skin Lesion, Textural Distinctiveness, Image processing.
549-556
PDF
11
A Key Management Scheme in Wireless Sensor Networks Using Symmetric and Asymmetric Key Cryptography
-
Rajalaxmi Mishra,Dr. Jibendu Kumar Mantri
Abstract
Wireless Sensor Networks (WSN) are network of sensor node having very low computing power, memory and battery power. In order to achieve security in WSNs, it is required to encrypt and send data among the sensor nodes. In this paper we present a novel scheme for key management to achieve secure communication, by using both symmetric key and asymmetric and symmetric key. Our scheme provides integrity, confidentiality and authenticity. Also it is robust to various attacks in WSN.
Index Terms— Confidentiality, authenticity, integrity, Symmetric key cryptography, Asymmetric key cryptography, RSA algorithm
557-562
PDF
12
Efficient Resource Allocation in Overlay Routing Relay Node Networks
-
Ujwala M.Halde, N.R.Wankhade
Abstract
Current survey on overlay networks has exposed that user-perceived network performance could be ameliorated by an overlay routing mechanism. In the massive distributed simulation, the way in which constituent parts are interrelated or arranged of the overlay network cant continuously and promptly adjust to route the traffic to reduce the overall traffic cost. Overlay routing has been suggested over the last few years as powerful approach to accomplish definite routing attributes, also going with drawn-out and effortful method of standardization and universal deployment of a new routing protocol. To Develop Internet traffic path over good quality is a commitment to succeed greater-quality streaming, we have proposed Overlay network. Implementing overlay routing needs the placement and maintenance of overlay infrastructure rise to the optimization problems like catch a least group of overlay nodes such that the needed sending the way properties are pleased. It is NP-hard and deduces a nontrivial approximation algorithm for it, where the approximation ratio depends on particular properties of the problem at hand. In this Paper I examine the practical aspects of the scheme by evaluating the gain one can get over several real scenarios.
Index Terms—Overlay routing, Resource Allocation, Network Nodes
563-567
PDF
13
Iris Recognition using Four Level Haar Wavelet Transform
-
Anjali Soni, Prashant Jain
Abstract
There is considerable rise in the research of iris recognition system over a period of time. Most of the researchers has been focused on the development of new iris pre-processing and recognition algorithms for good quail iris images. In this paper, iris recognition system using Haar wavelet packet is presented. Wavelet Packet Transform (WPT ) which is extension of discrete wavelet transform has multi-resolution approach. In this iris information is encoded based on energy of wavelet packets. And then matching of this iris code with the stored one is performed using hamming distance . Our proposed work significantly decreases FAR and FRR values as compared to previous work. Experimental results are demonstrating significant improvements in iris verification process
568-575
PDF
14
Information Technology in the Deontological Training of Prosecutors
-
Baigaliyev Alibek
Abstract
In the context of the implementation of innovative educational projects, modernization of the education system, the transition to multi-level higher education and its transformation in the context of the Bologna agreement the problem of quality of professional training of prosecutors for the law enforcement system assumes a special role. Increasing requirements of the state and society to the quality of training of prosecutors is in the first place, due to the global processes of humanization of education. Professional career of prosecutors should be characterized by a high level of competence, including readiness for social interaction, cooperation and resolution of issues in the social and professional spheres on the basis of the rules of professional conduct; capacity for tolerance, empathy, to correct with respect to the people that actualizes the problem of deontological training of prosecutors as a means of improving the quality of special education. [1]
Under the deontological training of prosecutors is meant its readiness to implement the normative professional behavior in the field of professional activity through the formation of the system of value motives of ethical knowledge, skills and professionally significant qualities.
The purpose of deontological training of prosecutors is to form deontological competence, which, in our opinion, should not be considered as a separate component of the overall professional competence, as well as competence of meta professional level,which is expressed in all kinds of professional work of prosecutors. [2].
The purpose of this article is to consider the problem of deontological training of prosecutors from the standpoint of current trends in the development of information technologies and their application in the deontological professional training of prosecutors.
Keywords: deontology, information technology, competence, professionalism, the prosecutor
576-581
PDF
15
Implementation of Modern Computer Science and Information Technolgies in Teaching
-
Abdrakhmanova Zh,Aisultanova K.,Chaltikenova Lyazat,Satkenova Zh
Abstract
In this paper we set a goal: to bring language teaching methodology in accordance with the development of modern information technology. In the classroom language by means of the Internet can solve a variety of teaching tasks: develop the skills and reading skills, using materials of the global network; improve writing skills students; replenish the vocabulary of students; to shape students' sustained motivation for language learning. Students may participate in the test, quizzes, competitions, contests, conducted over the Internet, chat with peers from other countries, participate in chat rooms, video conferencing, etc. Students can obtain information on the issue, on which work is currently in the project. This may be the joint work of Kazakhstan's students and their foreign peers in one or more countries.This paper also reviews lingua-cultural status of Kazakh idioms. The author gives the analysis of idioms usage samples by students in the oral speech and writing. Based on detection of mistaken applications the author concludes that cognitive analysis of idioms discursive environment is vital for the determination of exact meaning of an idiom and situation of its applicability. The cognitive study of phraseologisms implies usage of framed analysis methods and prototype semantics analysis. For the correct application of idioms knowledge of its internal form is required. Based on the data of the modern onomasiological theory the author extracts the core and periphery in the phraseological concept’s field structure. The cognitive study of idioms materials must be conducted in close connection with the natural language environment, created them. Discursive environment is a reflection in human minds of internal and external perception of its living space and their interpretation by means of linguistic knowledge. Background knowledge is required for understanding of a many of phraseological units. The author says that the modern Kazakh youth lacks linguistic intuition, and poor awareness of many concepts of the national culture inhibits to its representatives to realize lingua-cultural status of the idiomatic plethora of the native language.
Key words: phrazeologisms, speech culture, linguacultural status, language environment, kazakh.
582-589
PDF
16
Protecting the Rights of Consumers of Transport Services
-
cls. Aralbayeva Aigerim,cls. Moldakhmetova Zhanar
Abstract
This concept in the theory of civil law, as protection of passengers' rights in the sphere of transport service appeared relatively not long ago, but it occupies an important place in modern society.Passenger traffic has a significant place in the activity of transport organizations. For the ever-increasing demand for passenger transport and to improve the quality of their organization in recent years has been updated and supplemented rolling stock for rail, road, air and water transport, improved travel and other devices. Some railways and shipping lines, as well as some types of transport as a whole (eg, air), passenger traffic more than trucks, and it determines the general character of the production work.Background research can not be overestimated. The significance of the proposed work is both theoretical and practical terms, the need for a complete and comprehensive study of the designated problem.
590-595
PDF
17
Secured Deduplication with Enhanced Reliability in Cloud Storage System
-
B Jothi,S Amudha
Abstract
Uploading of an Existing Record In Cloud Storage.The Technique is to Eliminate Duplicate Entries and records in order to reduce Data Storage.Any Data Uploaded in Cloud has only Single record of Uploading Data, even though there are thousands of user,Data is found to have single record copy for proof,No overlapping data allowed.Every time Data is uploaded on Cloud, Chunks, i.e. Separate Unique number is applied to every word using Chunks,So for duplicate entry same Chunk is applied.So through Chunk Strategy we can eliminate duplicate entries.We Propose new Security systems with higher Reliability and same technique is applied further.For security Reasons,The privacy of Data is taken care through Attribute Based Encryption Algorithm.The Data uploaded is confidential and no De-duplication is allowed.We propose hashing technique split the data into fragments and their fragment is matched with others data, then the matched data is denoted for previous file name and extra content added as a chunk.
Keywords: Secure De-Duplication , Single Record , Chunks , Attribute Based Encryption.
596-600
PDF
18
Improved Resource Provisioning Scheme In Hybrid Cloud Based Environment
-
Pooja Chopra,Dr.RPS Bedi
Abstract
Cloud Resource Provisioning is an important but challenging task in our IT world. The hybrid cloud environment for resource provisioning scheme improve scalability and also reduce cost. Our proposed scheme will increase resource utilization thereby enhance performance in hybrid cloud based environment.
Keywords: Cloud computing, Provisioning,, RPM
601-604
PDF
19
Securing Life by Digitally Connecting Hospitals
-
S Amudha,B Jothi
Abstract
This paper aims to connect hospitals by digitally connecting doctors, there are certain cases were a patient has to run to a nearby hospital, were he/she can encounter a case in which a specialist may not have witnessed a case like that before. Through this paper we are aiming to connect doctors where they can communicate with each other’s and come to a conclusion, The platform also gives privilege to general public to ask there query’s as well as to seek solutions from expert doctors. We are using two main algorithm serpent and sha-3 to secure this application.Serpent is used to secure all the communication between doctors where as SHA-3 will be used to store all the information of the user as well as the doctors safely.
Keywords:Serpent,SHA-3,Keccak,Spong, XORED.
605-609
PDF
20
Prevention of IP Spoofing Attack under DDoS Using IP and MAC Address
-
Dr.S.Malathi
Abstract
With the tremendous growth of technology, many new things have been emerging and one among them is the networking. This is important in order to communicate among group of nodes from anywhere and in anytime. Whenever new things emerge problems associated with them cannot be helped. One of the problems on this networking is hacking the information by unauthorized persons. This problem is commonly termed as DDoS attack. One common type of DDoS attack is IP spoofing. In network, each node is identified through its IP address. Users can access to the information on the particular node through this IP address. IP spoofing is the technique to hack the information from the node by providing fraudulent IP address on it. This paper proposes a methodology to prevent the illegal access of spoofing the IP address. By using this methodology, the information on the network can be prevented from unauthorized people.
610-616
PDF
 
 
IJCTA © Copyrights 2015| All Rights Reserved.

This work is licensed under a Creative Commons Attribution 2.5 India License.