Vol 4 Issue 3 July 2016-September 2016
Nadhiya Nazeer Khan
Abstract: Alteration may be encountered with other biometric modalities which includes face, iris and fingerprints etc. The problem of alteration is especially significant in the case of fingerprints and this is due to the extensive deployment of AFIS in government applications and the simplicity with which fingerprints can easily be complicated. So, here developed an algorithm to automatically detect alteration in fingerprints which is based on the characteristics of the fingerprint features like orientation field and minutiae distribution. The proposed algorithm satisfies the three essential requirements for alteration detection algorithm. They are fast operational time, high true positive rate at low false positive rate, and ease of integration into AFIS (Automated Fingerprint Identification Systems). Fingerprint obfuscation refers to the deliberate alteration of the fingerprint arrangement by a distinct for the purpose of masking his /her identity. Several cases of alterations have been reported. Orientation field describes the ridge movement of fingerprints. Good quality fingerprints offers smooth orientation fields but poses exception near the singular points (core and delta). Gradient-based method is used for computing the orientation field. Mainly it uses the difference between the observed orientation field extracted from the image of fingerprint and the orientation field estimated by the model. The estimated value is represented as a feature vector for classifying the available fingerprint as natural or altered one. In addition, feature extracted from minutiae distribution can also be used for this purpose. Here, minutiae density map is firstly constructed using uniform kernel function and feature vectors from both orientation field discontinuity map and the minutiae density map are shared by concatenating local histograms in each cell which is then fed into a support vector machine (SVM) for further classification.
Keywords: Alteration, Fingerprint obfuscation, NFIQ.
Title: ANALYSIS AND DETECTION OF ALTERED FINGERPRINT MATCHING
Author: Nadhiya Nazeer Khan
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 4 Issue 3 July 2016-September 2016
Ansiya Mohammed Ali
Abstract: An increasing share of non- dispatchable and intermittent renewable energy plants cause probabilistic behaviour at the power grids’ supply side and therefore the expected penetration of electric mobility at the demand side offers the opportunity of controllable load. For future smart grids their optimal coordination is one major concern. Therefore, a multi-agent system is proposed. In this system, according to a given strategy, each electric vehicle (EV), i.e., the agent acts in response to dynamic condition in its environment. Optimizing these strategies based on evolutionary computation is used. For representing the problem and evaluating the solution simulation models are applied. It allows the modelling of complex as well as probabilistic systems, necessary for the defined problem. In the end, the optimized strategies satisfies the energy demand of individual vehicles end-users and secure power grid operation is guaranteed throughout the considered grid using power from renewable plants.
Keywords: EV, Charging Control, Grid, Policy Optimization.
Title: Optimization of Multi- Agent Control for Electric Vehicle Charging
Author: Ansiya Mohammed Ali
International Journal of Computer Science and Information Technology Research
ISSN 2348-120X (online), ISSN 2348-1196 (print)
Research Publish Journals
Vol 4 Issue 3 July 2016-September 2016
Mumthas B
Abstract: Today’s cloud storage service become popular. In cloud environment , cloud service provider maintains multiple number of copies of data on multiple distributed servers. The main problem of using replication technique, achieving strong consistency is difficult. So we propose a novel consistency as a service model which contains a large data cloud maintained by cloud service provider and group of users that constitute audit cloud. Audit cloud verify that data cloud provides maximum level of consistency. Between data cloud and audit cloud there will be a service level agreement engaged. For verify consistency properties two level auditing structure is used here. For this it only required a loosely synchronized clock. To avoid inconsistency in the cloud environment, gossip protocol is used. Gossip is style of computer- to -computer communication protocol. Modern distributed system use gossip protocol to solve their problems that might be difficult to solve in other ways.
Keywords: Cloud Storage, Gossip Protocol, SLA.
Title: Distributed Gossip Protocol for Inconsistency Avoidance in Cloud Environment
Author: Mumthas B
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 4 Issue 3 July 2016-September 2016
Nerin Thomas
Abstract: In a Wireless Sensor Networking (WSN) environment, the network consists of a set of many sensors that gather data and collaborate together. In wireless sensor and ad hoc networks, broadcasting is one of the fundamental operations. In order to disseminate a message from a node also called a source to all other nodes in the network, it uses the broadcasting mechanism. In computer networks, the broadcast or multicast procedures are much more important than traditional point-to-point communication. In this project, two types of broadcasting methods are combined. Here, a two stage execution of a new algorithm is defined; construction of backbone is the beginning. Then from sink node, it broadcast the packets using this backbone. For performing basic data communication operation, backbones will be used here. This paper mainly focuses on the structured WSNs broadcasting. So the procedures of data communication in network are much easier than in unstructured WSNs. It will make an overview of Multi Point Relay (MPR) in order to show its weakness. Then, a cluster-based architecture is defined which is constructed using MPR. Based on the previous cluster architecture, a new broadcast algorithm is provided called 3B (Backbone Based Broadcasting) using HEATE algorithm. By the end, an illustration of this shows that the energy consumption will be minimized for accomplishing broadcast compared to MPR.
Keywords: Wireless Sensor Networks, backbone, MPR, 3B, HEATE.
Title: Backbone Based Broadcast Synchronization Algorithm for Wireless Sensor Networks
Author: Nerin Thomas
International Journal of Computer Science and Information Technology Research
ISSN 2348-120X (online), ISSN 2348-1196 (print)
Research Publish Journals
Vol 4 Issue 3 July 2016-September 2016
Haritha G
Abstract: The Secret Mosaic Image Transmission through Network using Attribute key encryption is the most secure technique for the confidential data transfer across the network. Create the Mosaic image same as that of the target image. It is completely a client-server communication system. The sender side include embedding part and receiver side include extraction part. The receiver will open a port and will wait for the response from the sender. For the smooth functioning of client and server it is designed as separate threads in the application. The user can select a file and then specify compression to encrypt it. The secret key is encrypted using the key. He can then specify a recipient and a title for the message and send the file and the encrypted secret key. In receiver end the decryption process is done automatically when a user is downloading a document. Then the key is used to decrypt the encrypted file to obtain the plain text file. If the keys don’t match then a message will be displayed. For establishing the communication the sender system will open a port and will wait for the response from the client. Then the encrypted file will be captured at the client, save it in to the system with the relevant information and send a message to server. When the message is received the client will display it and go back to client mode. For the smooth functioning of client and server it is designed as separate threads in the application. For encryption we are using attribute key encryption method, we associate each data file with a set of attributes, and then assign each user an expressive access structure which is defined over these attributes. To enforce such kind of access control, we utilize KP-ABE to escort data encryption keys of data files. This construction enables us to immediately enjoy fine-graininess of access control.
Keywords: Attribute Key Encryption, Client Server Communication, MFT Protocol Image Encryption, Mosaic Image, Secure Image Transmission.
Title: SECURE MOSAIC IMAGE TRANSMISSION THROUGH NETWORK
Author: Haritha G
International Journal of Computer Science and Information Technology Research
ISSN 2348-120X (online), ISSN 2348-1196 (print)
Research Publish Journals
Vol 4 Issue 3 July 2016-September 2016
H.M Chandrasena, D.M.J. Wickramasinghe
Abstract: Drowsiness of the drivers is the main cause of accidents in the world as well as Sri Lanka. Due to lack of sleep and tiredness, drowsiness can occur while driving. The best way to avoid accidents caused by drivers’ drowsiness is to detect drowsiness of the driver and warn him before fall into sleep. To detect drowsiness many techniques like eye retina detection, facial feature recognition has been used. Here in this paper, we propose a method of detecting driver drowsiness using eye retina detection and pulse rate detection of the driver. In this report, we propose a more accurate drowsiness detection method which is a hybrid approach of eye retina detection and pulse pattern detection.
Keywords: Drowsiness, Driver, Detection.
Title: Driver’s Drowsiness Detecting and Alarming System
Author: H.M Chandrasena, D.M.J. Wickramasinghe
Journal of Computer Science and Information Technology Research
ISSN 2348-120X (online), ISSN 2348-1196 (print)
Research Publish Journals
Vol 4 Issue 3 July 2016-September 2016
Rethish Kumar S., Dr. R. Vijayakumar
Abstract: Cloud Computing presents a new approach to allow the development of dynamic, distributed and highly scalable software. For this purpose, Cloud Computing offers services, software and computing infrastructure independently through the network. To achieve a system that supports these characteristics, Service-Oriented Architectures (SOA) which provides tools for developing distributed systems that can be used for the establishment of Cloud Computing environments. This paper presents a CISAB (Cloud Computing Interface with Service Oriented Audio accepted By-Connections) architecture set on top of the platforms and frameworks by adding new layers for integrating a SOA and Cloud Computing approach and facilitating the distribution and management of functionalities. CISAB has been applied to the real case study consisting of the analysis of microarray data and has allowed the efficient management of the allocation of resources to the different system agents.
Keywords: Cloud Computing, SOA, Bioinformatics, Network Security, Distributed Computing & Micro-array Clustering of Voice signals.
Title: Cloud Interrelated Service Oriented Audio Accepted By-Connections
Author: Rethish Kumar S., Dr. R. Vijayakumar
International Journal of Computer Science and Information Technology Research
ISSN 2348-120X (online), ISSN 2348-1196 (print)
Research Publish Journals
Vol 4 Issue 3 July 2016-September 2016
Monika, Preeti Sharma
Abstract: Many object-oriented metrics were proposed to assess the quality of the software design such as the fault-proneness and the maintainability of classes. Software metrics can serve many purposes for software engineers. Many software metrics have been validated theoretically and empirically as good predictors of quality factors. The object-oriented metrics software provides useful information to developers and managers about the quality and object oriented structure of the design and code, but without interpretation guidelines metrics are of little value. Our main aim to analyze the object oriented metrics is that we should be able to predict the quality attributes of system so that we are able to capture the faults & defects early in the design phase. Many object-oriented metrics proposed in literature lack a theoretical basis, while other has not yet been validated. This work describes how object-oriented metrics given by CK is useful to illustrate fault-proneness of the system. Once faults are detected, then we can easily correct them out and improve the quality and reliability of the software. In this dissertation, we have measured the bugs per class per metric with the help of well known object-oriented CK metrics.
Keywords: object-oriented design, fault prediction, attributes, coupling, cohesion, size, inheritance.
Title: Prediction of Fault-Proneness using CK Metrics
Author: Monika, Preeti Sharma
International Journal of Computer Science and Information Technology Research
ISSN 2348-120X (online), ISSN 2348-1196 (print)
Research Publish Journals
Vol 4 Issue 3 July 2016-September 2016
Samuel Soma Ajibade, Anthonia Adediran
Abstract: The analytics of data holds an important function by the reduction of the size and complicated nature of data in data mining. Data Visualization is a major method which aids big data to get an absolute data perspective and as well the discovery of data values. Since the visualization techniques are so enormous, it can at times be difficult to know what appropriate technique to be used to visualize data. The purpose of representing data visually is to basically give an interpretation to what is insight without difficulties. At different point in time, the visualization techniques are being used to carry out different task which as well communicates different level of understanding. In this paper, we examined various data mining visualization techniques and how they can be well understood and utilized and then we made discussed our contributions in making research about the adequacy and inadequacy of data visualization technique in handling big data.
Keywords: Data Visualization, data mining, Big Data, visualization technique.
Title: An Overview of Big Data Visualization Techniques in Data Mining
Author: Samuel Soma Ajibade, Anthonia Adediran
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 4 Issue 3 July 2016-September 2016
K.Vanitha, R.Valli
Abstract: While P2P video streaming systems have achieved promising results, they have several drawbacks. First, there is a large number of unnecessary traverse links within a provider’s network. As observed in, each P2P bit on the Verizon network traverses 1000 miles and takes 5.5 metro-hops on average. Second, there is a huge number of cross Internet Service Provider (ISP) traffic. With high scalability, high video streaming quality, and low bandwidth requirement, peer-to-peer (P2P) systems have become a popular way to exchange files and deliver multimedia content over the internet. However, current P2P systems are suffering from “free-riding” due to the peers’ selfish nature. In this paper, we propose a credit-based incentive mechanism to encourage peers to cooperate with each other in a heterogeneous network consisting of wired and wireless peers. The proposed mechanism can provide differentiated service to peers with different credits through biased resource allocation. A Stackelberg game is formulated to obtain the optimal pricing and purchasing strategies, which can jointly maximize the revenue of the up loader and the utilities of the down loaders. In particular, peers’ heterogeneity and selfish nature are taken into consideration when designing the utility functions for the Stackelberg game. It is shown that the proposed resource allocation scheme is effective in providing service differentiation for peers and stimulating them to make contribution to the P2P streaming system.
Keyword: Network Optimization, Credit-based Incentive Mechanism, Peer to- Peer Networks, Heterogeneous Networks.
Title: INDUCEMENT MECHANISM INTEND FOR DIVERSE P2P STREAMING SYSTEM
Author: K.Vanitha, R.Valli
International Journal of Computer Science and Information Technology Research
ISSN 2348-120X (online), ISSN 2348-1196 (print)
Research Publish Journals
Vol 4 Issue 3 July 2016-September 2016
S.Vijayalakshmi, M.Gomathy
Abstract: In mobile and pervasive computing environments, understanding and measuring users’ quality of experience (QoE) is an important and challenging task. Quality of Experience (QoE) as an aggregate of Quality of Service (QOE) and human user-related metrics will be the key success factor for current and future mobile computing systems. QoE measurement and prediction are complex tasks as they may involve a large parameter space such as location, delay, jitter, packet loss, and user satisfaction just to name a few. These tasks necessitate the development of practical context-aware QoE models that efficiently determine relationships between user context and QoE parameters. In this paper, we propose, develop, and validate a novel decision-theoretic approach called CaQoEM for QoE modelling, measurement, and prediction. We address the challenge of QoE measurement and prediction where each QoE parameter can be measured on a different scale and may involve different units of measurement. CaQoEM is context-aware and uses Bayesian networks and utility theory to measure and predict users’ QoE under uncertainty. We validate CaQoEM using extensive experimentation, user studies and simulations. The results soundly demonstrate that CaQoEM correctly measures range-defined QoE using a bipolar scale. For QoE prediction, an overall accuracy of 98.93% was achieved using 10-fold cross validation in multiple diverse network conditions such as vertical handoffs, wireless signal fading and wireless network congestion.
Keyword: Bayesian networks, context-awareness, decision theory, quality of experience, simulations, prototyping, user tests.
Title: ENHANCE QOE IN MOBILE COMPUTING VIA REPRODUCTION, DIMENSION, AND CALCULATION
Author: S.Vijayalakshmi, M.Gomathy
International Journal of Computer Science and Information Technology Research
ISSN 2348-120X (online), ISSN 2348-1196 (print)
Research Publish Journals
Vol 4 Issue 3 July 2016-September 2016
Ms. Suchitra B, Ms. Anita Madona M
Abstract: As digital information and data are transferred over the internet and securing sensitive messages need to discover and developed more often than even before. So new technologies for protecting and securing the sensitive messages need to realize and develop. Here we were using the cryptography and Steganography techniques to hide the information from source to destination in a secure manner. Cryptography and Steganography are the two important methods for secure communication. In this proposed system we develop highly secure model by combining AES cryptographic security and LSB Steganography security. In cryptography we are using Advanced Encryption Standard (AES) algorithm to encrypt secret message that is to convert plain text to a cipher text. Then Pixel Value Differencing (PVD) with K-bit LSB (Least-Significant-Bit) substitution is used to hide the cipher text into true color RGB image. Our proposed model gives security at two levels to sensitive information.
Keyword: Cryptography, Steganography, AES algorithm, PVD Method.
Title: Effective AES Cryptography and Pixel Value Differencing Steganography Techniques for Secure Data Transmission
Author: Ms. Suchitra B, Ms. Anita Madona M
International Journal of Computer Science and Information Technology Research
ISSN 2348-120X (online), ISSN 2348-1196 (print)
Research Publish Journals
Vol 4 Issue 3 July 2016-September 2016
Varshitha V, Mrs.Renuka K H
Abstract: Wireless sensor network is a network used to communicate various wireless sensors through radio link. In WSN the efficient routing willing status (WSN) is used as a proactive routing protocol. The Hello Messages are used in ERWS. The ERWS is extended to the Energy Efficient-ERWS (EE-ERWS). The ERWS is prone to various attacks. The severe attack is the Sleep Deprivation Torture attack. In this paper we are mainly concentrated on the Sleep Deprivation Torture attack. The low energy node is targeted by the Sleep Deprivation Torture attack. The low energy node is taken as the victim by the attacker and moves permanently to the sleep mode. All energy of the node is exhausted by the sleep deprivation attack. These type of attack is also possible at the routing level. The willing property of each nodes is known by the broadcasting Hello messages to all the nodes. So here we are proposing Intrusion Detection System (IDS). The IDS is used to detect the Sleep Deprivation Torture attack. The Network Simulator (NS 2) is used for the simulation for the performance and the existing is compared for the performance.
Keywords: Wireless Sensor Network (WSN); Efficient Routing Willing Status (ERWS); Energy Efficient-ERWS (EE-ERWS); Sleep Deprivation Torture Attack.
Title: Energy Efficient Routing by Taking Willing Status of Node in WSN
Author: varshitha V, mrs.Renuka K H
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 4 Issue 3 July 2016-September 2016
Rini S
Abstract: This article gives you a basic idea on what multicast authentication means. We can provide many methods for authentication like digital signature, batch wise authentication, encryption and decryption using L-A-R algorithms or simply simple encryption and decryption techniques. The primitive packet sending techniques are not attack resistant, we need a good protocol that will perform authentication in real time, so that we can resist packet loss and pollution attacks. Multicasting is one of the techniques for sending confidential data to multiple users in a secure way if encryption is done in a good way. Here we will be discussing about batch signature its drawbacks and L-A-R protocol, also some simple cryptographic techniques.
Keywords: Batch Signature, cryptography, L-A-R protocol, Digital Signature.
Title: Multicast Authentication-A Comparative Study
Author: Rini S
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 4 Issue 3 July 2016-September 2016
Felix Mmanuoma Eke, Ifeoma Stella Njoku, Gertrude C. Umunnakwe, Emeka Ogueri
Abstract: The study investigated information resources and services in academic libraries in Imo State, Nigeria. Descriptive survey research method and interview schedule was used to elicit responses. About 316 respondents, representing 10% of a total of 3160 lecturers in the 6 academic institutions in the state were sampled based on proportionate sampling technique. Consequently, 316 copies of questionnaire were administered and 260 were returned and found usable. Descriptive statistics was used to analyze the data gathered. The results indicated that more of information resources in print format were provided at the expense of those in non-print. Conventional services such as loan of books and photocopying were adequately provided while selective dissemination of information (SDI), indexing and abstracting and ICT services were inadequately provided. Certain factors such as inadequate funding of the libraries amidst others were found to be militating against the provision and utilization of information resources and services. The study recommended among others that academic libraries should be adequately funded while qualified and experienced staff should be employed to provide required resources and services.
Keywords: Academic Libraries, Information Resources, Information Services, Lecturers Assessment.
Title: LECTURERS ASSESSMENT OF INFORMATION RESOURCES AND SERVICES IN ACADEMIC LIBRARIES IN IMO STATE, NIGERIA
Author: Felix Mmanuoma Eke, Ifeoma Stella Njoku, Gertrude C. Umunnakwe, Emeka Ogueri
International Journal of Computer Science and Information Technology Research
ISSN 2348-120X (online), ISSN 2348-1196 (print)
Research Publish Journals