Volume 7 - Issue 4

IJERD : Volume 7 - Issue 4

Dr. Shamal K. Doifode

Synthesis of Aurone Dibromide from Aurone
  • Abstract
  • Keywords
  • Reference
  • Full Article
----------------------------------
---------------------------------
I
[1] Ghiya, B.J. and Marathey, M.G., J. Sci. Industrial research, 20B(1961) 41.
[2] Ghiya, B.J. and Marathey, M.G., J. Sci. Industrial research, 218(1962) 28.
[3] Kohr and mulley monatsch, 30 (1909) 407
[4] E. Schulrk and k. brger, Acla,China, Acad. Sci.Hung., 17(1958) 211 (chem.. Abst.m 55 (1960) 5391)
[5] Varlkrs Migradischian "organic synthesis‟ Vol. II, Reinhold publication Corp. New York, USA 1951.
[6] Tarent ev. A.P., chem.. Abstr., 47(1953) 8032h
[7] Doifode K.B., " Chemistry of diketones", Ph.D. thesis, Nagpur university,1965
Citation
Dr. Shamal K. Doifode "Synthesis of Aurone Dibromide from Aurone" published at International Journal of Engineering Research and Development, Volume 7, Issue 4 (May 2013)
MID 0704.067X.0001.India
Page 01-02
Download    
ANED 06.067X/A07040102 aned
aned 067X-0704-0102

 

S. Belinsha,Mr.A.P.V.Raghavendra

Search Log Publishing With Improved Utility Using Confess Algorithm
  • Abstract
  • Keywords
  • Reference
  • Full Article
Search engines are being widely used by the web users. The search engine companies are concerned to produce best search results. Search logs are the records which records the interactions between the user and the search engine. Various search patterns, user's behaviors can be analyzed from these logs, which will help to enhance the search results. Publishing these search logs to third party for analysis is a privacy issue. Zealous algorithm of filtering the frequent search items in the search log looses its utility in the course of providing privacy. The proposed confess algorithm extends the work by qualifying the infrequent search items in the log which tends to increase the utility of the search log by preserving the privacy. Confess algorithm involves qualifying the infrequent keywords, URL clicks in the search log and publishing it along with the frequent items.
utility, information service, privacy, search logs, search behaviour, infrequent items, search items, threshold
[1]. Michaela Gotz, Ashwin Machanavajjnala, Guozhang Wang, Xiaokui Xiao and Johannes Gehreke, "Publishing search logs – A comparative study of privacy guarentees", IEEE transactions on knowledge and data engineering,Vol.24, No.3, March 2012.
[2]. E. Adar, "User 4xxxxx9: Anonymizing Query Logs" Proc. World Wide Web (WWW) Workshop Query Log Analysis, 2007.
[3]. A. Korolova, K. Kenthapadi, N. Mishra, and A. Ntoulas, "Releasing Search Queries and Clicks Privately," Proc. 18th Int'l Conf. World Wide Web (WWW), 2009
[4]. C. Dwork, K. Kenthapadi, F. McSherry, I. Mironov, and M. Naor, "Our Data Ourselves: Privacy via Distributed Noise Generation" Proc. Ann. Int'l Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2006.
[5]. V. S. Iyengar, "Transforming data to satisfy privacy constraints" in ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2002.
Citation
S. Belinsha, Mr.A.P.V.Raghavendra "Search Log Publishing With Improved Utility Using Confess Algorithm" published at International Journal of Engineering Research and Development, Volume 7, Issue 4 (May 2013)
MID 0704.067X.0002. ,Karur
Page 03-08
Download
ANED 06.067X/B07040308 aned
aned 067X-0704-0308

 

Dr. A. R. Sudamani Ramaswamy, S.Jayasri

Time Truncated Chain Sampling Plans for Log - Logistic Distribution
  • Abstract
  • Keywords
  • Reference
  • Full Article
Chain sampling plan for Log - Logistic distribution when the life-test is truncated at a pre-specified time is discussed. The design parameters such as the minimum sample size and the acceptance number necessary to assure a specified mean life time are obtained by satisfying the producer's and consumer's risks at the specified quality levels, under the assumption that the termination time and the number of items are pre-fixed. The operating characteristic functions of the sampling plan according to various quality levels are obtained.
Truncated life test, Log - Logistic distribution, Operating characteristics, Consumer's risk, Producer's risk.
[1]. Baklizi,a. and El Masri,A.E.K. (2004), "Acceptance sampling plans based on truncated life tests in the
Birnbaum Saunders model", Risk Analysis, vol.24,1453-1457.
[2]. Baklizi,a. (2003), "Acceptance sampling plans based on truncated life tests in the Pareto distribution of
second kind ", Advances and Applications in Statistics, vol.3,33-48.
[3]. Balakrishnan, N., Leiva,V. and Lopez, J. (2007), "Acceptance sampling plans from truncated life tests
based on generalized Birnbaum Saunders distribution", communications in statistics – simulation and
computation, vol.36,643-656.
[4]. Dodge,H.F.(1955): Chain Sampling Plan.Industrial quality control.
[5]. R.R.L. Kantam, K. Rosaiah and G. Srinivasa Rao.(2001`) Acceptance sampling based on life tests:
Log-logistic models. Journal of Applied Statistics 28, 121-128.
[6]. Gupta,S.S. and Groll,P.A. (1961), "Gamma distribution in acceptance sampling based on life
tests",Journal of the American Statistical Association,vol.56,942-970.
[7]. M. Aslam and C.H. Jun. A group acceptance sampling plans for truncated life tests based on the
inverse Rayleigh and log-logistic distributions. Pakistan Journal of Statistics 25, 1-13, 2009.
[8]. Srinivasa Rao (2010), "Group acceptance sampling plans based on truncated life tests for Marshall –
olkin extended Lomax distribution",Electronic journal of Applied Statistical Analysis, Vol.3,Isse 1
(2010),18-27.
[9]. Srinivasa Rao (2011), "Double acceptance sampling plans based on truncated life tests for Marshall –
olkin extended exponential distribution",Australian journal of Applied Statistics, Vol.40 (2011),169-
176.
Citation
Dr. A. R. Sudamani Ramaswamy , S.Jayasri "Time Truncated Chain Sampling Plans for Log - Logistic Distribution" published at International Journal of Engineering Research and Development, Volume 7, Issue 4 (May 2013)
MID 0704.067X.0003. India
Page 09-13
Download
ANED 06.067X/C070409013 aned
aned 067X-0704-0913

 

Dr.Osamah Rabab'ah , Maeed Said Alammary

Agile Methodology for Different Project Size
  • Abstract
  • Keywords
  • Reference
  • Full Article
Extreme programming (XP) is one of the most widely used agile methodologies for software development. It intends to improve software quality and responsiveness to changing customer requirements. Despite the facts that the use of XP offers a number of benefits and it has been a widely used agile methodology, XP does not offer the same benefits when it comes to medium and large software projects. Some of the reasons for this are weak documentation, lack of strong architecture and ignorance to risk awareness during the software development.
------------------------------------
[1]. Agile software development methodology for medium and large projects.
[2]. Deploying Agile Practices in Organizations: A Case Study
[3]. Software Quality Assurance in XP and Spiral - A Comparative Study
[4]. Agile Practices in Software Development – Experiences from Student Projects
[5]. Investigating the Long-Term Acceptance of Agile Methodologies: An Empirical Study of Developer Perceptions in Scrum Projects
[6]. What Do We Know about Agile Software Development?
[7]. Management challenges to implementing agile processes in traditional development organizations
[8]. Usage and Perceptions of Agile Software Development in an Industrial Context
[9]. K. Beck, "Embracing change with extreme programming," IEEE Computer, pp. 70-77, 1999.
[10]. R. Jeffries, A. Anderson, and C. Hendrickson, Extreme Programming Installed. Upper Saddle River, NJ: AddisonWesley, 2001.
Citation
Dr.Osamah Rabab'ah , Maeed Said Alammary "Agile Methodology for Different Project Size" published at International Journal of Engineering Research and Development, Volume 7, Issue 4 (May 2013)
MID 0704.067X.0004. Saudi Arabia
Page 14-18
Download
ANED 06.067X/D0704014018 aned
aned 067X-0704-1418

 

Vaishali V.Sarbhukan, Prof. V. B. Gaikwad

Video Fingerprint Extraction Using TIRI – DCT
  • Abstract
  • Keywords
  • Reference
  • Full Article
Nowadays copyright infringement and data piracy are major serious concerns. Thousands of videos are being uploaded to the internet and are shared every day. Out of these videos, considerable numbers of videos are illegal copies or some videos are manipulated versions of existing media. Due to these reasons copyright management on the internet becomes a complicated process. To detect such kind of infringements, there are two approaches. First is based on watermarking and other is based on content-based copy detection (CBCD). Video copy detection system relies on a fingerprint extraction algorithm. The fingerprint extraction algorithm extracts compact content- based signatures from special images constructed from the video. Each such image represents a short segment of the video and contains temporal as well as spatial information about the video segment. These images are denoted by temporally informative representative images. Existing video fingerprint extraction algorithms have certain limitations. Therefore temporally informative representative images - discrete cosine transform (TIRI-DCT) is developed. TIRI-DCT is based on temporally informative representative images which contains spatial and temporal information of a short segment of a video sequence
Fingerprinting System ,Video Copy Retrieval, Fingerprint Extraction Methods, TIRI-DCT, Content based Copy Detection

[1] Sunil Lee and Chang D. Yoo, "Robust Video Fingerprinting for Content-Based Video Identification",
IEEE Transactions Circuits And Systems For Video Technology, Vol. 18, NO. 7, July 2008
[2] J. Law-To, L. Chen, A. Joly, I. Laptev, O. Buisson, V. Gouet-Brunet, N. Boujemaa, and F. Stentiford,
"Video copy detection: A comparative study", in Proc. Conf. Image Video Retrieval (CIVR), 2007
[3] C. K. R. Lienhart and W. Effelsberg, "On the detection and recognition of television commercials", in
Proc. of the IEEE Conf. on Multimedia Computing and Systems, 1997.
[4] J. V. J. M. Sanchez, X. Binefa and P. Radeva., "Local color analysis for scene break detection applied
to TV commercials recognition" ,in Proceedings of Visual 99, June 1999.
[5] P. Indyk, G. Iyengar, and N. Shivakumar "Finding pirated video sequences on the internet", Technical
report, Stanford University, 1999.
[6] A. Hampapur and R. Bolle. "Comparison of sequence matching techniques for video copy detection",
In Conference on Storage and Retrieval for Media Databases, 2002
[7] Chen, L. and Stentiford, F. W. M., "Video sequence matching based on temporal ordinal measurement",
Pattern Recognition Letters, vol. 29, no. 13, Oct. 2008.
[8] Mani Malek Esmaeili, Mehrdad Fatourechi, and Rabab Kreidieh Ward, "A Robust
And Fast Video Copy Detection System Using Content-Based Fingerprinting", IEEE Trans. On
Information Forensics and Security", Vol. 6, No. 1, March 2011
[9] B. Coskun, B. Sankur, and N. Memon, "Spatiotemporal transform based video hashing", IEEE Trans.
Multimedia, vol. 8, no. 6, Dec. 2006.

Citation
Vaishali V. Sarbhukan, Prof. V. B. Gaikwad "Video Fingerprint Extraction Using TIRI – DCT" published at International Journal of Engineering Research and Development, Volume 7, Issue 4 (May 2013)
MID 0704.067X.0005. India
Page 19-23
Download
ANED 06.067X/E0704019023 aned
aned 067X-0704-1923

 

N.Hamlil,M.Benabdellah

Implementation of Telemedical Network: Application for Health Smart Home
  • Abstract
  • Keywords
  • Reference
  • Full Article
This paper presents a health smart home (HSH) system represent a temporary or durable alternative to the hospitalization or the recourse to the establishments of lodging of long life – elderly people's homes or specialized centers. The patient is not then constrained any more to give up his residence and the life in society. He preserves a broad autonomy in his social environment and privative, while profiting from preventive services of health. These systems particularly concern the elderly, but more generally the people presenting of the risks of driving affection (falls for example) or cognitive (depression, senile insanity, etc), or requiring care or an special attention (diabetics, asthmatic, etc).
Telemedicine, microcontroller, biomedical sensor, networking, intelligent system, health smart home.
[1]. « ETUDE N° EP 02-17 » CNPP, expert en prévention et en maîtrise des risques – www.cnpp.com.
[2]. Vikas Singh, Telemedicine & Mobile Telemedicine System: AnOverview :Health Information Systems Department of Health Policy and Management, University of Arkansas for Medical Sciences (2006).
[3]. C. Franco, J. Demongeot, Y. Fouquet, C. Villemazet*, N. Vuillerme, "Perspectives in home TeleHealth Care system," 978-0-7695-3967-6/10 $26.00 © 2010 IEEE, DOI 10.1109/CISIS.2010.192.
[4]. XUAN HOA BINH LE,MARIA DI MASCOLO, ALEXIA GOUIN, NORBERT NOURY (Habitat Intelligent pour la Santé - Vers un outil d'aide à l'évaluation automatique de la dépendance d'une personne âgée) e-STA copyright 2007 by see Volume 4 (2007) , N 3 PP 7-12.
[5]. N. Demartinesa, E. Battegayb, J. Liebermannc, M. Oberholzerd, Th. Ruflie, F.Hardera « Télémédecine: perspectives et approche pluridisciplinaire » Schweiz Med Wochenschr 2000;130:314–23 Peer reviewed article.
[6]. N. Noury, G. Virone, J. Ye, V. Rialle et J. Demongeot, "Nouvelles Directions en Habitats intelligents pour la santé," revue ITBM-RBM, pp. 122-135, 2003.
[7]. Florence DUCHˆENE « Fusion de données multi capteurs pour un système de télésurveillance médicale de personnes à domicile » Thèse pour l'obtention du grade de docteur de l'université joseph fourier le vendredi 15 octobre 2004.
Citation
N.Hamlil, M.Benabdellah "Implementation of Telemedical Network: Application for Health Smart Home" published at International Journal of Engineering Research and Development, Volume 7, Issue 4 (May 2013)
MID 0704.067X.0006.Algeria
Page 24-31
Download
ANED 06.067X/F0704024031 aned
aned 067X-0704-2431

 

André Michaud

Deriving 0 and 0 from First Principles and Defining the Fundamental Electromagnetic Equations Set
  • Abstract
  • Keywords
  • Reference
  • Full Article
In 1941, renowned physicist Julius Adams Stratton wrote in his seminal work titled 'Electromagnetic
Theory' : "In the theory of electromagnetism, the dimensions of 0 and 0 that link respectively D and E and B
and H, in vacuum, are perfectly arbitrary." This assertion is still valid today in the context of classical
electrodynamics since these two constants have never been derived from first principles. It will be shown in this
paper how they can be derived from first principles
Permittivity constant, permeability constant, first principles, speed of light, Maxwell equations,
Lorentz equation, fundamental electromagnetic dimensions Cms.
[1]. Julius Adams Stratton. Electromagnetic Theory, McGraw-Hill, 1941.
[2]. Robert Resnick & David Halliday. Physics. John Wyley & Sons, New York, 1967.
[3]. André Michaud. The Expanded Maxwellian Space Geometry and the Photon Fundamental LC
Equation. International Journal of Engineering Research and Development, e-ISSN: 2278-067X, p-
ISSN: 2278-800X, www.ijerd.com, Volume 6, Issue 8 (April 2013), PP. 31-45.
(http://ijerd.com/paper/vol6-issue8/G06083145.pdf).
[4]. André Michaud. From Classical to Relativistic Mechanics via Maxwell. International Journal of
Engineering Research and Development e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 6, Issue 4 (March 2013), PP. 01-10 (http://www.ijerd.com/paper/vol6-issue4/A06040110.pdf).
[5]. André Michaud. The Mechanics of Electron-Positron Pair Creation in the 3-Spaces Model.
International Journal of Engineering Research and Development, e-ISSN: 2278-067X, p-ISSN: 2278-
800X, www.ijerd.com Volume 6, Issue 10 (April 2013), PP. 36-49, (http://ijerd.com/paper/vol6-
issue10/F06103649.pdf).
[6]. André Michaud. Field Equations for Localized Individual Photons and Relativistic Field
Equations for Localized Moving Massive Particles. International IFNA-ANS Journal, No. 2 (28),
Vol. 13, 2007, p. 123-140, Kazan State University, Kazan, Russia. (Also available online at
http://www.gsjournal.net/Science-Journals/Essays/View/2257).
[7]. André Michaud. Unifying All Classical Force Equations. International Journal of Engineering
Research and Development, e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com. Volume 6,
Issue 6 (March 2013), PP. 27-34. (http://www.ijerd.com/paper/vol6-issue6/F06062734.pdf).
[8]. André Michaud. On the Magnetostatic Inverse Cube Law and Magnetic Monopoles, The General Science
Journal 2006: (http://www.gsjournal.net/Science-Journals/Essays/View/2264).
[9]. André Michaud. Expanded Maxwellian Geometry of Space, 4th edition, SRP Books, 2004. Available
in various eBook formats at: https://www.smashwords.com/books/view/163704.
Citation
André Michaud "Deriving 0 and 0 from First Principles and Defining the Fundamental Electromagnetic Equations Set" published at International Journal of Engineering Research and Development, Volume 7, Issue 4 (May 2013)
MID 0704.067X.0007. Canada
Page 32-39
Download
ANED 06.067X/G0704032039 aned
aned 067X-0704-3239

 

Pvl Narayana Rao, Mayank Singh, Salehu Anteneh

Strategic Information Planning: Alignment of IT Planning with Business Planning
  • Abstract
  • Keywords
  • Reference
  • Full Article
The lives of the human beings has affected by the information technology in their day-today lives, because of its progression. The technology has changed vastly, when time passes and so have the chances. The demand of increase in IT/IS has made the top management of the more and more complex and difficult. Strategic information systems planning (SISP) is a real way of emerging and upholding the IS/IT systems that support the business operations. The key aspect of SISP in the changing business scenario examined by the research. Main things for improved business performance are the alignment of the IS/IT plans and the business plans. We can find key aspects of the study in India by triangulation approach. The Data sets included the questionnaire to the IT and business managers of the three companies. IT and Business Managers views are compared with the literature and the available business documents for consistency to answer the research question. Questionnaires were sent to the respective IT and a business manager of the three companies. And other data was collected from the three companies. There was similarity in terms of planning and implementation of the IS/IT and business processes. ERP, SCM and CRM applications are useful to support the business processes. The Conclusion tells that there is no formal planning process in the three companies.
Strategic information systems planning, Enterprise Resource Planning, Supply Chain Management, Customer Relationship Management
[1]. Creswell, J. W. [1994]. Research design qualitative & quantitative approaches.London:Sage.
[2]. Kearns, G. S., &Lederer, A. L. The effect of strategic alignment on the use of ISbased resources for competitive advantage.Journal of Strategic Information, 9(4), 265-293, [200].
[3]. Nolan, R. L. Managing the crisis in data processing. Harvard Business Review, 57(2), 115-126, [1979].
[4]. Norman, D., &Scadden, D. [2005]. Is there a place for academic theory in the real world?, Proceedings of the 18th NACCQ conference. Hamilton: NACCQ. Retrieved August 1, 2005, from http://www.naccq.ac.nz/conference05/proceedings_04/norman.pdf
[5]. Rockart, J. The line takes leadership- IS management in a wired society. Sloan Management Review, 29(4), 57-64, [1988].
[6]. Tan, F. B. [1999]. Exploring business-IT alignment using the repertory grid. Proceedings of the10th Australasian Conference on Information Systems, Retrieved August 1, 2005, from http://www2.vuw.ac.nz/acis99/Papers/PaperTan-187.pdf
[7]. Teo, T. S. H., & King, W. R. . Integration between business planning and information systems planning: An evolutionary- contingency perspective. Journalof Management Information Systems, 14(1), 185-214, [1997].
[8]. Turban, E., McLean, E., &Wetherbe, J. [2004]. Information technology for managementtransforming organizations in the digital economy (4th ed.). Hoboken, NewJersey: John Wiley.
[9]. Tyre, M. J., &Orlikowski, W. J. Exploring opportunities for technical improvement in organizations. Sloan Management Review, 35(1), 13-26, [1993].
Citation
Pvl Narayana Rao, Mayank Singh, Salehu Anteneh "Strategic Information Planning: Alignment of IT Planning with Business Planning" published at International Journal of Engineering Research and Development, Volume 7, Issue 4 (May 2013)
MID 0704.067X.0008.India
Page 40-46
Download
ANED 06.067X/H0704040046 aned
aned 067X-0704-4046

 

N.Prasanna Kumari

Data Classification with Genetic Programming (Gp) – A Case Study
  • Abstract
  • Keywords
  • Reference
  • Full Article
Classification is one of the most researched questions in data mining. A wide range of real problems have been stated as classification problems, for example credit scoring, bankruptcy prediction, medical diagnosis, pattern recognition, text categorization, software quality assessment, and many more. The use of evolutionary algorithms for training classifiers has been studied in the past few decades. Genetic programming is a technique to automatically discover computer programs using principles of evolution. Genetic operations like crossover, mutation, reproduction are carried out on population to get the best fitting results. In this GP is used for developing a classification model for a data set and also used for function generation to study its automatic code generation capability.
Classification, data mining, Genetic Programming

[1]. R. Aler, D. Borrajo, and P. Isasi, "Using Genetic Programming to learn and improve control knowledge," Artif. Intell., vol. 141, no. 1–2, pp.29–56, Oct. 2002.
[2]. H. Forrest, J. R. Koza, Y. Jessen, and M.William, "Automatic synthesis,placement and routing of an amplifier circuit by means of genetic programming,"in Lecture Notes in Computer Science, vol. 1801,Evolvable Systems: From Biology to Hardware, Proc. 3rd Int. Conf.(ICES), pp. 1–10, 2001.
[3]. J. K. Kishore, L. M. Patnaik, V. Mani, and V. K. Agrawal, "Application of genetic programming for multicategory pattern classification," IEEE Trans. Evol. Comput., vol. 4, pp. 242–258, Sept. 2000.
[4]. P. J. Rauss, J. M. Daida, and S. Chaudhary, "Classification of spectral imagery using genetic programming," in Proc. Genetic Evolutionary Computation Conf., pp. 733–726, 2000.
[5]. D. Agnelli, A. Bollini, and L. Lombardi, "Image classification: an evolutionary approach," Pattern Recognit. Lett., vol. 23, pp. 303–309, 2002.
[6]. T.-S. Lim, W.-Y. Loh, and Y.-S. Shih, "A comparison of prediction accuracy, complexity and training time of thirty-three old and new classification algorithms," Mach. Learning J., vol. 40, pp. 203–228, 2000.
[7]. D. E. Goldberg, Genetic Algorithm in Search, Optimization and Machine Learning. Reading, MA: Addison-Wesley, 1989.
[8]. J. Eggermont, J. N. Kok, and W. A. Kosters. Genetic programming for data classification: partitioning the search space. In Proceedings of the 2004 ACM symposium on Applied computing, SAC '04, pages 1001–1005, New York, NY, USA,2004.
[9]. A. S. Kumar, S. Chowdhury, and K. L. Mazumder, "Combination of neural and statistical approaches for classifying space-borne multispectral data," in Proc. ICAPRDT, Calcutta, India, pp. 87–91, 1999.
[10]. T M Khoshgoftaar and E B Allen A practical classification rule for software quality models IEEE Transactions on Reliability, 49(2),2000.

Citation
N.Prasanna Kumari "Data Classification with Genetic Programming (Gp) – A Case Study" published at International Journal of Engineering Research and Development, Volume 7, Issue 4 (May 2013)
MID 0704.067X.0009.  India
Page 47-54
Download
ANED 06.067X/I0704047054 aned
aned 067X-0704-4754

 

Parimita Das, Prof. Kavita P. Shirsat

Image Based Authentication for E-Mail System
  • Abstract
  • Keywords
  • Reference
  • Full Article
Secure environments protect the resources against unauthorized access by enforcing access control mechanisms. Therefore, when increasing security is an issue, text based passwords are not enough to counter such problems. Security has always been an issue since Internet and Web Development came into existence, numeric based passwords is not enough to counter such problems, which is also an out dated approach now. Therefore, this demands the need for something more secure along with being more user- friendly. Therefore, we have tried to increase the security by involving an image based authentication approach, involving text based password , Image Based Authentication and automated generated one-time password (received through an automated process on mobile of the authentic user). And an assiduous effort has been done for preventing Shoulder attack, Tempest attack, and Brute-force attack at client side , through the use of unique image in the Image Based Authentication (IBA) System for e-mail communication.
Image Based Authentication system (IBA), AJAX , Keystroke Logging, One Time Password, Tempest Attack, shoulder Attack and Brute force Attack.
[1] Charles P. Pfleeger, Shari Lawrence Pfleeger, "Security in Computing".
[2] William Stalling, "Cryptography and Network Security", Pearson Education.
[3] B. Clifford Neuman n and Theodore Ts'o , Kerberos: An Authentication Service for Computer Networks, IEEE Communications, 32(9)pp33-38.September 1994.
[4] U. Manber. A simple scheme to make passwords based on one-way functions much harder to crack. Computers & Security, 15(2):171{176, 1996.
[5] Nitin, Durg Singh Chauhan, Sohit Ahuja, Pallavi Singh, Ankit Mahanot, Vineet Punjabi, Shivam Vinay, Manisha Rana, Utkarsh Shrivastava and Nakul Sharma, Security Analysis and
Image Based Authentication for E-Mail System
58
Implementation of JUIT-IBA System using Kerberos Protocol, Proceedings of the 7th IEEE International Conference on Computer and Information Science, Oregon, USA, pp. 575-580, 2008.
[6] http://en.wikipeddia.org/wiki/attacks.
[7] Information Service Enterprise Network Security Guidelines: Prevention and Response and HackerAttacks, Digital Edition, June 2001
[8] Nitin, Durg Singh Chauhan and Vivek Kumar Sehgal, On a Software Architecture of JUIT-Image Based Authentication System, Advances in Electrical and Electronics Engineering, IAENG Transactions on Electrical and Electronics Engineering Volume I-Special Edition of the World Congress on Engineering and Computer Science, IEEE Computer Society Press, ISBN: 978-0-7695-3555-5, pp. 35-46, 2009.
[9] N. Haller. The s/key(tm) one-time password system. In Proceedings of the 1994 Symposium on Network and Distributed System Security, pages 151{157, February 1994.
Citation
Parimita Das, Prof. Kavita P. Shirsat "Image Based Authentication for E-Mail System" published at International Journal of Engineering Research and Development, Volume 7, Issue 4 (May 2013)
MID 0704.067X.0010.India
Page 55-58
Download
ANED 06.067X/J0704055058 aned
aned 067X-0704-5558

 

Ritu Rani, S. K. Grewal, Indiwar

Implementation of SIFT In Various Applications
  • Abstract
  • Keywords
  • Reference
  • Full Article
Features are the foremost vital keypoints which can provide the whole information of the image and should be uniquely recognizable. Scale Invariant Feature Transform (SIFT) is an approach proposed by David Lowe in 1999 which proved to be very rewardable for detecting and extracting local feature descriptors that are reasonably invariant to changes in illumination, rotation, scaling, small changes in viewpoint and image noise. This paper is an endeavor to bring under spotlight varied application areas like face recognition, iris recognition, ear recognition, fingerprint recognition, real time hand gesture recognition wherein SIFT has been successfully used as a feature descriptor. Some efforts have also been done to highlight the few limitations of SIFT and certain incentives to introduce the readers to the alternatives of this technique.
Object recognition, SIFT, recognition, iris recognition, ear recognition, fingerprint recognition, real time hand gesture recognition
[1]. Lowe, D.G., "Distinctive Image Features from Scale-Invariant Keypoints", International Journal of Computer Vision, 2004, pp 91-110.
[2]. Rajeshwar Dass, Ritu Rani, Dharmender Kumar , "Face Recognition Techniques: A Review", International Journal of Engineering Research and Development, 2012, pp 70-78 [3]. Mohamed Aly, "Face Recognition using SIFT Features", Technical report, California Institute of Technology.
[4]. Matthew A. Turk and Alex P. Pentland., "Face Recognition using Eigenfaces" In Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 1991.
[5]. Peter N. Belhumeur, Joao P. Hespanha, and David J. Kriegman. , "Eigenfaces vs. Fisherfaces: Recognition using Class Specific Linear Projection." IEEE Transactions on Pattern Analysis And Machine Intelligence, 1996, pp 711–720.
[6]. Geng C., Jiang X., "SIFT Features for Face Recognition", IEEE Conference CSIT, 2009, pp 598–602.
[7]. Kisku D.R., Rattani A., Grosso E., Tistarelli M., " Face Identification by SIFT-based Complete Graph Topology", IEEE Workshop AIAT, 2007, pp 63–68.
[8]. Rattani A., Kisku D.R., Lagorio A., Tistarelli M., "Facial Template Synthesis based on SIFT Features", IEEE Workshop AIAT, 2007, pp 69–73.
[9]. F. Samaria and A. Harter., " Parameterisation of a Stochastic Model for Human Face Identification", In 2nd IEEE Workshop on Applications of Computer Vision, 1994.
[10]. H. C. Lee and R. E. Gaensslen., "Advances in Fingerprint Technology". Elsevier, New York, 1991.
Citation
Ritu Rani, S. K. Grewal, Indiwar "Implementation of SIFT In Various Applications" published at International Journal of Engineering Research and Development, Volume 7, Issue 4 (May 2013)
MID 0704.067X.0011.India
Page 59-64
Download
ANED 06.067X/K0704059064 aned
aned 067X-0704-5964

 

Monika, Yashpal Singh, S Niranjan

A Practical Approach for Personalized Access to Agent-Based Composition of Semantic Web Services for MANET
  • Abstract
  • Keywords
  • Reference
  • Full Article
Web services are dominating the current web scenario. Web services are independent and autonomous, designed to perform a specific task. Discovery, integration and execution of web services is known as semantic web. Composition of these web services are required complex system. The Composition of semantic Web services (SWS) has received much interest to support business-to-business or enterprise application integration. The Composition way that we used in this paper is the Orchestration which deals with describing how a number of services, two or more, cooperate and communicate with the aim of achieving a common goal. The proposed technique considers complex composition by including web services with multiple inputs in composition process. In this paper, we propose an ontology-based framework for the automatic composition of Web services. JADE is an agent development environment where Web services and agents can be linked together to enable semantic Web applications.
Semantic Web Service, JADE Agents, Composition Web Service, Integration Gateway
[1]. Dominic Greenwood, Jozef Nagy, Monique Calisti. "Semantic enhancement of a Web Service Integration Gateway", Whitestein Technologies AG.
[2]. E. Cortese, F. Quarta, G. Vitaglione, P. Vrba. "Scalability and Performance of the JADE Message Transport System. Analysis of Suitability for Holonic Manufacturing Systems", exp, 3(3), pp. 52-65, 2002.
[3]. B. Arpinar, B. Aleman-Meza, R. Zhang, A. Maduko. "Ontology-Driven Web Services Composition Platform. In 2004 IEEE International Conference on E-Commerce Technology (CEC'04)", July 6-9, 2004, San Diego, California, USA, pp. 146-152, IEEE Computer Society Press, 2004.
[4]. Rao, J., et al., "A Mixed Initiative Approach to Semantic Web Service Discovery and Composition: SAP's Guided Procedures Framework, in The IEEE Intl Conf on Web Services (ICWS'06)". 2006.
[5]. S. R. Ponnekanti, and A. Fox. SWORD: "A Developer Toolkit for Building Composite Web Services". 11th WWW Conference, Honolulu, 2002.
[6]. M. Paolucci, J. Soudry, N. Srinivasan, K. Sycara. "A Broker for OWL-S Web Services. In Proceedings of the First International Semantic Web Services Symposiu"m, AAAI 2004 Spring Symposium Series, March 22-24, 2004, pp. 92-99, AAAI Press, 2004.
[7]. S. Thakkar, C. A. Knoblock, J. L. Ambite, C. Shahabi. "Dynamically Composing Web Services from On-line Sources. In Proceeding of 2002 AAAI Workshop on Intelligent Service Integration", Edmonton, Alberta, Canada, 2002.
[8]. K. Sycara, M. Paolucci, A. Ankolekar, N. Srinivasan. "Automated Discovery, Interaction and Composition of Semantic Web Services". Journal of Web Semantics, 1(1), pp. 27-46, 2003.
[9]. Shenghua Liu, Peep Kungas, Mihhail Matskin. "Agent-Based Web Service Composition with JADE and JXTA". KTH,Sweden and NTNU, Norway.
[10]. "Composing Web Services on the Semantic Web", The VLDB Journal (2003) 12: 333-351 / Digital Object Identifier (DOI) 10.1007/s00778-003-0101-5.
Citation
Monika, Yashpal Singh, S Niranjan "A Practical Approach for Personalized Access to Agent-Based Composition of Semantic Web Services for MANET" published at International Journal of Engineering Research and Development, Volume 7, Issue 4 (May 2013)
MID 0704.067X.0012.INDIA
Page 65-70
Download
ANED 06.067X/L0704065070 aned
aned 067X-0704-6570

 

Pushpa Rani, Yashpal Singh, S Niranjan

A Review on Honeypot as an Intrusion Detection System for Wireless Network
  • Abstract
  • Keywords
  • Reference
  • Full Article
Honeypots are decoy computer resources set up for the purpose of monitoring and logging the activities of entities that probe, attack or compromise them. Honeypot does work as an Intrusion Detection System which detect the attacker in a network. Activities on honeypots can be considered suspicious by definition, as there is no point for users to interact with these systems. In this paper, we proposed a honeypot system in the wireless network to attract the attackers. We have used different fake websites to do so. Honeypot helps in detecting intrusion attacking on the system. The information gathered by watching a honeypot being probed is invaluable. The honeypot act as a normal system in the network having fake detail or invaluable information. It gives information about attacks and attack patterns. The Honeypot will make the attacker to attack the particular sites and side by side monitor its illegal steps to confirm about its identity. This proposed work will make the IP address of attacker to be blocked for further access of any site in the network. The proposed model has more advantages that can response accurately and swiftly to unknown attacks and lifetime safer for the network security. In future the network can be preserved by getting the information regarding the attacker from the Honeypot system.
Honeypot, Network, Security, Wireless.
[1]. Kyi Lin Lin Kyaw, Department of Engineering Physics, Mandalay Technological University, Pathein Gyi, Mandalay., "Hybrid Honeypot system for network Security," World Academy of Science, Engineering and Technology 48 2008.
[2]. "Securing WMN using Hybrid Honeypot System", Paramjeet Rawat, Sakshi Goel, Megha Agarwal and Ruy Singh, International Journal of Distributed and Parallel Systems (IJDPS), May 2012.
[3]. Sebring, Michael M., and Whitehurst, R. Alan., "Expert Systems in Intrusion Detection: A Case Study," The 11th National Computer Security Conference, October, 1988.
[4]. Thomas M. Chen and John Buford, "Design Considerations for a honeypot for SQL Injection Attacks", LCN Workshop on Security in communications Networks, Switzerland; 20-23 October 2009.
[5]. Wei Huang and Jiao Ma, "High-Interaction Honeypot System For SQL Injection Analysis", International Conference of Information Technology, 2011.
[6]. "Honeypots, Honeynets", Honeypot & Honeynet Articles, Honeypot Links, Honeypot Whitepapers (Honeypots, Intrusion Detection Incident Response), Web, 27 july 2011,<http://WWW.honeypots.net>
[7]. From Wikipedia en.wikie,"en.wikipedia.org/wiki/wireless_network".
Citation
Pushpa Rani, Yashpal Singh, S Niranjan "A Review on Honeypot as an Intrusion Detection System for Wireless Network" published at International Journal of Engineering Research and Development, Volume 7, Issue 4 (May 2013)
MID 0704.067X.0013.India
Page 71-74
Download
ANED 06.067X/M0704071074 aned
aned 067X-0704-7174

 

S.A. Sai Sowmeyaa, S. Senthil Kumar

Source Location Privacy Preservation in Wireless Sensor Network Using Computer Based Image Recognition
  • Abstract
  • Keywords
  • Reference
  • Full Article
Abrupt due to the open nature of the sensor network, the adversary can eavesdrop and track the information. In this paper, an algorithm called computer based image recognition is introduced to overcome such problem. Here the traffic is analysed using this method. In proposed scheme, the adversary model is considered where it is assumed that the adversary can monitor the small area or the entire network. Then introducing the hotspot-Locating attack, considering that through the network traffic the adversaries identify the object's location. Finally for the effective source location privacy, the irregular shapes of fake packets are sent in the form of clouds. Insertion of cloud provides more privacy and it is made active only at the need of transmission.
Wireless Sensor Network Security, Source location Privacy, Content privacy, Data oriented privacy, Adversary scheme.
[1]. Na Li, Nan Zhang, Sajal K. Das, Bhavani Thuraisingham, "Privacy preservation in wireless sensor networks: A state-of-the-art survey in Ad Hoc Networks" (2009), p. 1501–1514, 2009.
[2]. C. Karlof and D. Wagner "Secure routing in wireless sensor networks: Attacks and countermeasures". Elsevier's Ad-Hoc Networks Journal, Special Issue on Sensor Network Applications and Protocols, (2–3) 293–315, September 2003.
[3]. C. Ozturk, Y. Zhang, and W. Trappe, "Source-location privacy in energy constrained sensor network routing" in Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks (SASN), October 2004, pp. 88-93.
[4]. M. Shao, Y. Yang, S. Zhu and G. Cao, "Towards statistically strong source anonymity for sensor networks", Proc. of IEEE INFOCOM'08, pp. 51–59, Phoenix, Az, USA, April 2008
Source Location Privacy Preservation in Wireless Sensor Network Using Computer...
79
[5]. T. Roosta, S. Shieh, S. Sastry: "Taxonomy of Security Attacks in Sensor Networks", 1st IEEE Int. Conference on System Integration and Reliability Improvements 2006, Hanoi (2006) pp. 13–15.
[6]. M. Mahmoud and X. Shen, "Lightweight privacy-preserving routing and incentive protocol for hybrid ad hoc wireless networks", Proc. of IEEE INFOCOM, International Workshop on Security in Computers, Networking and Communications (SCNC), Shanghai, China, April 10-15, 2011.
[7]. Y. Jian, S. Chen, Z. Zhang, and L. Zhang, "A Novel Scheme for Protecting Receiver's Location Privacy in Wireless Sensor Networks" IEEE Trans. Wireless Comm., vol. 7, no. 10, pp. 3769-3779, Oct. 2008.
[8]. Y. Li and J. Ren, "Source-Location Privacy through Dynamic Routing in Wireless Sensor Networks" Proc. IEEE INFOCOM '10, Mar. 2010.
[9]. Mohamed M.E.A. Mahmoud and Xuemin (Sherman) Shen, "A Cloud-Based Scheme for Protecting Source-Location Privacy against Hotspot-Locating Attack in Wireless Sensor Networks", IEEE transactions on parallel and distributed systems, vol. 23, no. 10, pp. 1805-1818, Oct. 2012.
Citation
S.A. Sai Sowmeyaa, S. Senthil Kumar" Source Location Privacy Preservation in Wireless Sensor Network Using Computer Based Image Recognition" published at International Journal of Engineering Research and Development, Volume 7, Issue 4 (May 2013)
MID 0704.067X.0014.India
Page 75-79
Download
ANED 06.067X/N0704075079 aned
aned 067X-0704-7579

 

Varun J. Patel, Mehul L.Patel

Low Power Wide Frequency Range Current Starved CMOS VCO in 180nm, 130nm and 90nm CMOS Technology
  • Abstract
  • Keywords
  • Reference
  • Full Article
This paper describes a design and implementation of Five Stage Current Starved CMOS Voltage Controlled Oscillator for Phase Locked Loop. Current starved VCO is simple ring oscillator consisting of cascaded inverters.The performance comparision is done with repect to power dissipation and phase noise characteristics for three different technology The design is implemented in Mentor Graphics using ELDO SPICE simulator with high oscillation frequency, low power consumption, and low area.
Current starved VCO, oscillators, phase noise, Source Coupled VCO, ring oscillators,
[1]. B .Razvi, Design of ANALOG CMOS Integrated Circuits,
[2]. William Shing, Tak Yan, and Howard Cam Luong, "A 900-MHz CMOS low-phase- noise voltage-controlled ring oscillator", IEEE Transactions on Circuits and System II: Analog and Digital Signal Processing,, vol. 48, pp. 216-221,Feb. 2001.
[3]. M. Wegmuller, J. P. von der Weid, P. Oberson, and N. Gisin, "High resolution fiber distributed measurements with coherent OFDR," in Proc. ECOC'00, 2000, paper 11.3.4, p. 109.
[4]. T. C. Weigandt, B. Kim, and P. R. Gray, ―Analysis of timingjitters in cmos ring oscillators, In Proc. ISCAS, pp. 27-30, June 1994.
[5]. R. Jacob Baker, Harry W. Li & David E. Boyce, CMOS Circuit Design Layout, and Simulation, IEEE Press, 2002.
[6]. W. Xin, Y. Dunshan and S. Sheng, "A Full Swing And Low Power Voltage-Controlled Ring Oscillator", Electron Devices and Solid-State Circuits, 2005 IEEE Conference on 19-21 Dec. 2005 Page(s):141 – 143
[7]. Huang Shizhen , Lin Wei , Wang Yutong ,Zheng Li , "Design Of A Voltage-controlled Ring Oscillator Based On MOS Capacitance", IMECS 2009, March 18 - 20, 2009, Hong Kong.
[8]. Jayna Chawla, "Comparative Study of CMOS Voltage Controlled Oscillators", Thapar Institute of Engineering & Technology, June, 2006.
[9]. Yalcin Alper Eken, "High Frequency Voltage Controlled Ring Oscillators in Standard CMOS", Georgia Institute of Technology, November 2003.
[10]. Rashmi K Patil, Vrushali G Nasre, "Current Starved Voltage Controlled Oscillator for PLL Using 0.18μm CMOS Process", NCIPET-2012.
Citation
Varun J. Patel, Mehul L.Patel "Low Power Wide Frequency Range Current Starved CMOS VCO in 180nm, 130nm and 90nm CMOS Technology" published at International Journal of Engineering Research and Development, Volume 7, Issue 4 (May 2013)
MID 0704.067X.0015.India
Page 80-84
Download
ANED 06.067X/O0704080084 aned
aned 067X-0704-8084

 

Rajesh Kumar, Yashpal Singh, S Niranjan

Review of Security Issues for Mobile Agent Technology
  • Abstract
  • Keywords
  • Reference
  • Full Article
In the recent time the computer systems have evolved from monolithic computing device to much complex client-server environment. Mobile-agent paradigm is one such technology. It has numerous application where it can be beneficial, to name a few areas where the mobile-agents have potential deployment are database search, distributed systems and e-commerce. This technology has given a new direction to networking. Because of mobility of mobile agent, the security problems becomes more complicated and have become a bottleneck for development and maintenance of mobile agent technology especially in security sensitive applications such as e-commerce, military application scientific applications etc. This paper discusses about the mobile-agent, architecture of mobile agent, what are the various security issues that should be resolve for better performance, that can affect the transmission and reception of information. In last, in this paper we discuss the counter measures for above mentioned security issues for better performance of the mobile agent technology.
Authentication, Cryptography, access control, trust management, privacy, and signature schemes, DOS (Denial of Service), Intrusion detection, FIPA (Foundation for Intelligent and Physical Agent).
[1]. Object Management Group, NEEDAM MA, Agent Technology Green Paper 1 Sept 2010, PP. 8-11
[2]. Hyacinth S. Nwana, "Software Agents: An Overview", Intelligent systems Research, Advanced Applications & Technology Department, Ipswich, Suffolk U.K. Cambridge University Press 2011.
[3]. The Foundation for Intelligent Physical Agents (FIPA), http://www.fipa.org/.
[4]. James Odell, "Objects and Agents: How Do They Differ?". 2010
Review of Security Issues for Mobile Agent Technology
89
[5]. Danny B.Lange and Mitsuru Oshima, "Programming and Developing Java Mobile Agents with Aglets". (Addison Wesley publication). Reprint 2012
[6]. Luca Ferrari, "The Aglets 2.0.2 User's Manual", October 2011.
[7]. General Magic Inc. Odyssey http://www.genmagic.com/agents.
[8]. William M.Farmer, Joshua D. Guttman, and Vipin Swarup, "Security for Mobile Agents: Authentication and State Appraisal", pp. 5-11, European Symposium on Research in Computer Security (ESORICS).
[9]. T. Sander and C. F. Tschudin, "Protecting Mobile Agents Against Malicious Hosts". G. Vigna, editor, Mobile Agents and Security, volume 1419 of LNCS, pp. 44–60. Springer-Verlag, June 1998.
Citation
Rajesh Kumar, Yashpal Singh, S Niranjan "Review of Security Issues for Mobile Agent Technology" published at International Journal of Engineering Research and Development, Volume 7, Issue 4 (May 2013)
MID 0704.067X.0016.India
Page 85-89
Download
ANED 06.067X/P0704085089 aned
aned 067X-0704-8589