Vol 4 Issue 3 July 2016-September 2016
Nandhini P, Dr. B. Jagadhesan, Anusuja D
Abstract: The purpose of this study is to review contemporary wireless network protocols and areas that affect the ability of wireless fidelity (Wi-Fi) technology to secure data transmitted over wireless networks. The research approach takes the form of a case study, in collating the methods used by existing protocols in the implementation of wireless Security Trust Models within their networks Wireless protected access Wi-Fi protected access; version 2 (WPA2) protocol has provided a more secure means for securing wireless networks but has only provided stronger encryption as it has a longer key which takes longer to decipher. In the current world, the high value objects such as ipads, laptops, are prone to the theft and are required to be monitored to ensure safety. Monitoring the objects within a short distance by the use of a wireless security system is implemented with the help of modules which are capable of communicating with each other.
Keywords: wifi, wimax, wireless network equipments, wireless networks attacks.
Title: AN OPTIMIZATION OF WIRELESS NETWORK SECURITY SYSTEM
Author: Nandhini P, Dr. B. Jagadhesan, Anusuja D
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 4 Issue 3 July 2016-September 2016
Okon, E.O, Momoh S. Yusuf, Joshua B. Agbogun
Abstract: This research paper is an evaluation of computer-based test software in Kogi state university. A user- driven assessment of software quality and usability questionnaires were randomly administered to a sample of 200 undergraduate students of KSU who were sitting for the second semester GST entrepreneurship examination for the academic year 2013–2014. With help of descriptive statistics and graphical illustrations, the data derived were critically analyzed. It was discovered that a large number of participants were of the opinion that the information on the software is clear and at the same time informative enough and that the capacity of language that the software offers is simple to understand. Similarly, the major facts about students are incorporated in the software in addition to scoring of answers. Also invalid commands are resolved by the software constructively. However, a reasonable quantity of participants was not of the opinion that it is easy navigating through the software/program. An unprecedented percentage of participants strongly think that the software is run on obsolete computer and that the internet connectivity required for the computer used in conducting CBT with the applied software is slow. To advance the software quality and usability further, it will entail more IT infrastructures, and particularly a more flexible data base, sufficiently large bandwidth, network structure adjustability, feedback mechanism and back-up systems, highly sophisticated computers with high speed.
Keywords: paper pencil test, computer-based test, software quality and usability, Kogi State University.
Title: AN EVALUATION OF COMPUTER-BASED TEST SOFTWARE IN KOGI STATE UNIVERSITY: USER’S VIEW
Author: Okon, E.O, Momoh S. Yusuf, Joshua B. Agbogun
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 4 Issue 3 July 2016-September 2016
Datukun Kalamba Aristarkus, Sellappan Palaniappan, Tatchanaamoorti Purnshatman
Abstract: This paper is about the computer network of Salem University Lokoja, which is located in Kogi State, Nigeria, in the western part of Africa. The existing computer network topology of Salem University Lokoja (SUL) is being investigated via interview and observation methods of survey. With the help of the Technical Staff of the University, information about the topology are being collected and confirmed via observation. The confirmed topology or layout is being design and simulated for behavioural outputs. Then, the outputs of the simulation of the topology will be analyzed, towards proposing a better topology for improving performance of the University’s network. CISCO Packets Tracer simulator will be used for all the designs and simulation. In the end a suitable topology requirement will be proposed for improving network performance in Salem University Lokoja.
Keywords: Campus Area Network, Network Simulation, Topology Upgrade.
Title: Towards proposing network topology upgrade in Salem University Lokoja
Author: Datukun Kalamba Aristarkus Sellappan Palaniappan, Tatchanaamoorti Purnshatman
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 4 Issue 3 July 2016-September 2016
Anusuja D, Dr.B.Jagadhesan, Nandhini P
Abstract: The “G” stands for generation, meaning 4G is the most current generation of cell phone network coverage and speeds. 3G technology created the first networks fast enough to make Smartphone. The fifth generation wireless 5G development initiative is based upon 4G, which at present is struggling to meet its performance goals. The comparison between 3G and 4G wireless communication systems in relation to its architecture, speed, frequency band, switching design basis and forward error correction is studied, and were discovered that their performances are still unable to solve the unending problems of poor coverage, bad interconnectivity, poor quality of service and flexibility. An ideal 5G model to accommodate the challenges and shortfalls of 3G and 4G deployments is discussed as well as the significant system improvements on the earlier wireless technologies. The radio channel propagation characteristics for 4G and 5G systems are discussed.
Keywords: Network Role, Impact of 4G, GPRS, Wi-Fi vs. WiMax, 1G TO 5G,4G trends.
Title: An Optimization concept for capacity analysis of (3G-4G) in relation to Quality of service
Author: Anusuja D, Dr.B.Jagadhesan, Nandhini P
International Journal of Computer Science and Information Technology Research
ISSN 2348-120X (online), ISSN 2348-1196 (print)
Research Publish Journals
Vol 4 Issue 3 July 2016-September 2016
N. Assimakis, G. Tziallas, M. Adam, A. Polyzos, C. Papanastasiou
Abstract: Time invariant models describing constant velocity and constant acceleration movements in two dimensions are presented. Mobile position tracking is realized for position estimation or prediction using steady state Kalman filter, concluding that the obtained estimates are very close to the real position.
Keywords: Kalman filter, steady state, position estimation, prediction.
Title: MOBILE POSITION ESTIMATION AND PREDICTION USING STEADY STATE KALMAN FILTER
Author: N. Assimakis, G. Tziallas, M. Adam, A. Polyzos, C. Papanastasiou
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 4 Issue 3 July 2016-September 2016
Dr. Md. Emdad Hasnayen, Mst. Saria Sultana
Abstract: Bangladesh is one of the most densely populated countries in the world. Most of the people live in villages. Most of the city dwellers also come from villages. Bangladesh is a small but resourceful country of South Asia. Internet is very essential in modern world it gives this world in our doorsteps. There is a internet user between developed and developing countries. The digital divide around the world is usually measured through statistical indices such as the number of telephone lines, personal computers, websites and Internet users and their ratio to the total population. With an estimated internet user-base of around 10 million coming into 2013, representing just under 6.6% user penetration by population, the local internet industry has been preparing to move into the next stage of its development. Internet is a part of our life in present day. If we have an internet connection, the whole world in our hand. If most of the people of the country get the facility of internet, they get a digital life and we get a digital life and we get a digital Bangladesh, which is a developed country. Digital Bangladesh should be the first step towards the death of distance particularly for the rural people with the secretariat or any other powerhouse with whom the citizens are involved for Governance.
Keywords: Internet User, Population, Digital divide, Internet services, Problems and Prospects.
Title: INTERNET USE IN BANGLADESH: PROBLEMS AND PROSPECTS
Author: Dr. Md. Emdad Hasnayen, Mst. Saria Sultana
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 4 Issue 3 July 2016-September 2016
Saranya. A, K. Rajasekaran, Selin Chandra C S
Abstract: MANET is a rapidly emerging mobile communication technology which offers fruitful services in various fields like military battle field, emergency services, entertainment, sensor networks, home and internetworking etc., Due to dynamic topology, open environment, infrastructure less network and lack of centralized administration MANETs are susceptible to various attacks. This paper describes the various types and tools of MANET and it presents an overview of MANET applications, technological challenges and different security attacks.
Keywords: Applications, Attacks, Challenges, MANET, Tools.
Title: An Overview of Mobile Ad Hoc Networks
Author: Saranya. A, K. Rajasekaran, Selin Chandra C S
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 4 Issue 3 July 2016-September 2016
Christos Papanastasiou
Abstract: Many different schemes have been developed and used in distributed database systems to coordinate the execution of subtransactions of a global transaction. On this paper I present an algorithm for the distributed two-phase commit protocol to give a chance to some transactions to complete when they are ready to abort. First I count the number of transactions who have decided to abort. If this count is less than 35 percent of the total participants, then for only these transactions I suggest to prepare again for a completion. In this way, we can ensure that a 30 percent of transactions who had decided to abort, can complete their execution.
Keywords: two-phase commit protocol, transactions, transaction files, distributed database.
Title: AN ALGORITHM FOR THE DISTRIBUTED TWO-PHASE COMMIT PROTOCOL
Author: Christos Papanastasiou
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 4 Issue 3 July 2016-September 2016
Jaspreet Kaur, Pravin S. Metkewar
Abstract: Organizations, nowadays, strive for excellence in their operations. But, with the increasing complexity in business, they are unable to gain significant competitive advantage. And, this has created a need to evaluate and select an appropriate data warehouse architecture. However, deciding the most suitable data warehouse architecture that fits your business needs – is perhaps, the most crucial activity in the Data Warehouse lifecycle. An architecture best describes the requirements and specifics of an organization. In fact, it helps the management in making right decisions. Thus, organizations should aim at selecting an architecture that is robust, flexible and scalable. Any mistake in this area may affect the overall business goals and performance of the organization. The aim of this research paper is to better understand the factors that must be considered before selecting any data warehouse architecture.
Keywords: Architecture, Data Warehouse, Data Mart, ETL, Selection Factors.
Title: One-Step Ahead Approach for Selection of Data Warehouse Architecture
Author: Jaspreet Kaur, Pravin S. Metkewar
International Journal of Computer Science and Information Technology Research
ISSN 2348-120X (online), ISSN 2348-1196 (print)
Research Publish Journals
Vol 4 Issue 3 July 2016-September 2016
Almuthanna A. Alageel, Linah M. Alhazzaa
Abstract: With the advanced research in Wireless Sensor Networks (WSN), Radio-Frequency Identification (RFID) and other enabling technologies, Internet of Things (IoT) becomes a promising service to most kind of users. In this paper, the definition of the IoT is introduced with tracing back where it is come from. In addition, it covers a brief description of the current enabling technologies that support the infrastructure of the IoT. Moreover, the current architecture of the IoT is explained with two proposed architecture that exploit Cloud Computing to enhance the scalability and flexibility. Furthermore, health care and medicine, transportation and equipment maintenance applications have been discussed and how they could enhance to each industry. This paper ends the body of the topic by identifying the challenges and future work of the IoT i.e. issues related to security, privacy, self-management capabilities, power consumption, heterogeneity issues, scalability, naming and identification and communication connectivity are all covered.
Keywords: Internet of Things; Wireless Sensor Networks; Ubiquitous Computing; Pervasive Computing; RFID; Security.
Title: A Survey on The Internet of Things: Technologies, Architecture, Applications and Challenges
Author: Almuthanna A. Alageel, Linah M. Alhazzaa
International Journal of Computer Science and Information Technology Research
ISSN 2348-120X (online), ISSN 2348-1196 (print)
Research Publish Journals
Vol 4 Issue 3 July 2016-September 2016
Benoît Martin AZANGUEZET QUIMATIO, Laure Pauline FOTSO
Abstract: The access control models like DAC, MAC, RBAC, TBAC, TMAC or OR-BAC does not permit to define security policies that will enable to control the activities of a super-user or Database Administrator (DBA). Moreover, the super-user has more rights and powers over the information system resources than its hierarchical superiors. This paradox exposes the organisation to attacks targeting the information system. We propose a concept of electronics signature book based on an extension of the Or-BAC model, that we developed and called HOr-BAC to specify security policies capable of solving these problems control of super-user activities. We implemented this concept into a Postgres SQL Database System Manager, for controlling the super-user activities in bank information system with success.
Keywords: component; access control model, on hierarchical Organization, operational unit, administrative unit, computer as information system, request, validation, treatment mode, electronic signature-book.
Title: HOr-BAC : An access control based on hierarchical Organizational
Author: Benoît Martin AZANGUEZET QUIMATIO, Laure Pauline FOTSO
International Journal of Computer Science and Information Technology Research
ISSN 2348-120X (online), ISSN 2348-1196 (print)
Research Publish Journals
Vol 4 Issue 3 July 2016-September 2016
Detty Susan George
Abstract: In this work it describes a complete framework for detecting objects in images and videos. Here the proposed approach is based upon ideas in computer vision, image processing and machine learning. These ideas provide an easy to use, simple and fast method for object detection. The main objective of this project is developing robust images feature sets for the task of object detection. And well normalized grids of gradient orientation histograms are used for proposed feature sets. These features helps to provide invariance in object location, changes in shape and good resistance to illumination changes and shadowing, background clutter and camera view point. For automatic/semi-automatic face detection here face recognition algorithms and motion detection algorithm are integrated. Here face detection technology is used to sort faces by their similarity to a chosen face or live webcam reducing user workload to search faces that belongs to the same person. Even many progress made in recent years, face recognition is a challenging topic in computer vision research.
Keywords: HOG, LBP, face recognition, feature sets.
Title: HOG Based Face Detection in Live Video Streaming
Author: Detty Susan George
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 4 Issue 3 July 2016-September 2016
Anjali U
Abstract: Contrast enhancement is usually used to adjust the global brightness and contrast of digital images. Malicious users may also locally perform contrast enhancement for creating a realistic composite image. As such it is necessary to detect contrast enhancement for verifying the authenticity and originality of the digital images. to detect the contrast enhancement involved manipulations in digital images here two novel algorithms are proposed.First one focus on the detection of global contrast enhancement, which is applied to the previously JPEG-compressed images. Second, is to identify the composite image created by making contrast adjustment on either one or both source images. Titanium-coated surfaces are prone to minute defects such as tiny cracks, which are not easily recognizable by the naked eye or optical microscopy. Two new thresholding methods, namely contrast-adjusted Otsu’s method and contrast-adjusted median-based Otsu’s method are proposed, for defect detection in the titanium-coated aluminium surfaces.
Keywords: Contrast Enhancement, Composite image, Edge Detection, Defect Detection.
Title: Contrast Enhancement Based Forensic Detectability And Image Quality
Author: Anjali U
International Journal of Computer Science and Information Technology Research
ISSN 2348-120X (online), ISSN 2348-1196 (print)
Research Publish Journals
Vol 4 Issue 3 July 2016-September 2016
Aswathy Mohan, Sankari S
Abstract: Cooperation among nodes is the fundamental requirement for the Opportunistic Mobile Networks (OMNs).Here using the store-carry-and-forward mechanism, messages are processing the communication. Each and every node in the network has a mobility and range of region in which each node communicate with other node or its neighbour node. Due to the dynamic nature, several security threats arise in such networks. The selfish behaviour of nodes affects the overall performance of the packet transmission. In OMNs, truthfully detected the packet dropping on the basis of holding procedure schemes. When sensor data is transmitted towards the sink along the tree structure, each packet sender or forwarder adds a small number of additional bits, to the packet, which is called packet marks. Packet marks is each time modified by the corresponding node. Using Packet marks the sink can figure out the dropping rate associated with every sensor node. Packet mark based on CR Score, it indicates how much we can trust the node and measures the degree of selfishness. After detecting the selfish node and create SCF tree and allocate the replica to overcome the selfish nodes. Identifying the packet dropper and runs node categorization algorithm and heuristic ranking algorithm for providing the knowledge that which nodes are bad for sure and which nodes are suspiciously bad. Proposed method identifying the multiple selfish node attacks and overcome these selfish nodes using replica allocation and credit risk score techniques.
Keywords: Cooperation, Opportunistic Mobile Network, Credit Risk Score, Self Centered Friendship Tree.
Title: Truthful Detection of Packet Dropping Attacks in Opportunistic Mobile Networks
Author: Aswathy Mohan, Sankari S
International Journal of Computer Science and Information Technology Research
ISSN 2348-120X (online), ISSN 2348-1196 (print)
Research Publish Journals
Vol 4 Issue 3 July 2016-September 2016
Tincy Chinnu Varghese
Abstract: Today in the field of information filtering topic modeling is widely used. Topic modeling helps to generate models which can discover the hidden topics in a document collection and each of these topics are represented by word distribution. There are term-based and pattern-based approaches in information filtering. Patterns are more discriminative than single words. In many pattern-based methods the patterns in the documents are considered. But the pattern which occurs multiple times in a document which has to be filtered is also given equal importance. Another problem which the existing pattern-based methods face is that the semantics of a term in a pattern is not considered. Another limitation is that the distribution of a pattern in a document is not given any importance. To overcome the above mentioned problems a new ranking method which considers the number of frequency of the patterns, distribution of patterns and semantic based pattern representation to estimate the relevance of the documents based on the user information needs is introduced. This helps to remove the irrelevant documents effectively. TREC data collection Reuters Corpus Volume 1 is used to do the extensive experiments to evaluate the effectiveness of the proposed method. The result says that the proposed model works better than the existing pattern-based topic for document modeling in information filtering.
Keywords: Topic Model, Information Filtering, Pattern mining, relevance ranking, user interest model.
Title: SEMANTIC BASED PATTERN TOPIC MODEL
Author: Tincy Chinnu Varghese
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals