IJARCCE adheres to the suggestive parameters outlined by the University Grants Commission (UGC) for peer-reviewed journals, upholding high standards of research quality, ethical publishing, and academic excellence.
Nikita Patel, Prof. Shivshakti Shrivastava, Prof Hitesh Gupta Department of Computer Science & Engineering, Patel College of Science & Technology, Bhopal, India
J.SRINIVAS, K.VENKATA SUBBA REDDY, Dr.A.MOIZ QYSER Assistant Professor, Dept. of CSE, M. J College of Engg & Tech, Hyderabad, India Assistant Professor, Dept. of CSE, M. J College of Engg & Tech, Hyderabad, India Professor, Dept. of IT, M. J College of Engg & Tech, Hyderabad, India
Dr.S.SARAVANAKUMAR, Mr.PAZHANIVE, Mr. S.ELANGO, Dr.R.SUGUMAR Professor, Department of IT,Panimalar Institute Of Technology, Chennai Assistant professor, Department of MCA, Dr. Ramadoss arts and Science College. Virudhavhalam Lecturer, Department of CSE, St. Joseph College Of Engineering and Technology College, Chennai Associate Professor, Department of CSE, Veltech Mutitech SRS Engineering College, Chennai
Mr. Prafull D.Patinge and Ms. N.R.Kolhare ME, Electronics Engg. Dept. of Electronics and Telecommunication Engineering, Govt. College of Engineering, Aurangabad (M.S.),India. Asst. Professor, Dept. of Electronics and Telecommunication Engineering, Govt. College of Engineering Aurangabad (M.S.), India
Dr.S.SARAVANAKUMAR, JERRIN SIMLA.A, L.MEGALAN LEO, Dr.A.REGARAJAN Professor, Dept of IT, Panimalar Institute of Technology ,Chennai Asst.Professor, Department of CSE, Panimalar Institute of Technology, Chennai Asst.Professor, Department of ECE, St.Joseph College of Technology, Chennai Associate Professor, Department of IT, Veltech Multitech SRS engineering college, Chennai
Mouli De Rizka Dewantoro, Nur Mohammad Farda Undergraduate Program Cartography and Remote Sensing Universitas Gadjah Mada, Indonesia Doctoral Program of Geography, Universitas Gadjah Mada, Indonesia
Adel Hassas, Farzane Kabudvand, Carlo Lucas Department of Computer, Zanjan Branch, Islamic Azad University, Zanjan, Iran
|
Abstract
An Approach of Preventing Code Injection Attack in Web Environment
Nikita Patel, Prof. Shivshakti Shrivastava, Prof Hitesh Gupta Department of Computer Science & Engineering, Patel College of Science & Technology, Bhopal, India
Abstract: Accuracy of the object classification is depend upon the feature vector of the object. Poroscopy is the method of pattern matching of the fingerprint images based upon pores. Pores of the fingerprint image are extracted by using Marker Controlled Watershed Segmentation. The features of the pores are extracted by various methods which are rotation variant. To improve the accuracy of the pattern matching we propose an technique based upon PHT (polar harmonic transform) which is an rotation invariant transform that provide many numerical stable features. The kernel functions of PHTs consist of sinusoidal functions that are inherently computation intensive. The proposed Method will reduce the FAR and FRR.
Connectivity Preserving Distributed Maximizing Coverage Algorithm for Three Dimensional Mobile Sensor Networks
Mohammad Javad Heydari, SaeidPashazadeh Faculty of Electrical and Computer Engineering, University of Tabriz, Tabriz, Iran
Abstract: Accuracy of the object classification is depend upon the feature vector of the object. Poroscopy is the method of pattern matching of the fingerprint images based upon pores. Pores of the fingerprint image are extracted by using Marker Controlled Watershed Segmentation. The features of the pores are extracted by various methods which are rotation variant. To improve the accuracy of the pattern matching we propose an technique based upon PHT (polar harmonic transform) which is an rotation invariant transform that provide many numerical stable features. The kernel functions of PHTs consist of sinusoidal functions that are inherently computation intensive. The proposed Method will reduce the FAR and FRR.
J.SRINIVAS, K.VENKATA SUBBA REDDY, Dr.A.MOIZ QYSER Assistant Professor, Dept. of CSE, M. J College of Engg & Tech, Hyderabad, India Assistant Professor, Dept. of CSE, M. J College of Engg & Tech, Hyderabad, India Professor, Dept. of IT, M. J College of Engg & Tech, Hyderabad, India
Abstract: Interacting with machines with voice as interface is one of the prominent and emerging trends, having voice as interface between man and machine makes the work simpler. Many applications were developed which have voice as the mode of communication. Here we have discussed a novel methodology that provide a suitable way of accessing internet contents by giving voice as input through normal phone calls , here to work with this system , it’s just enough for the user to have a normal phone which is sufficient enough to make voice calls . Voice recognition is then made from the input (user’s voice from the call) to retrieve the proper contents from the internet, then which it is used by the parser to extract the needed information from the WebPages. The text information extracted is then converted to audio which will be delivered to the user by automated voice system .We have also discussed about our ongoing work for this paper and at last we have set the outlined direction for the future development of this paper , i.e., to improve the voice control over the system .
Communication with Reality Data Information Extraction System with Voice Interface
Dr.S.SARAVANAKUMAR, Mr.PAZHANIVE, Mr. S.ELANGO, Dr.R.SUGUMAR Professor, Department of IT,Panimalar Institute Of Technology, Chennai Assistant professor, Department of MCA, Dr. Ramadoss arts and Science College. Virudhavhalam Lecturer, Department of CSE, St. Joseph College Of Engineering and Technology College, Chennai Associate Professor, Department of CSE, Veltech Mutitech SRS Engineering College, Chennai
Abstract: Grid Computing means pools of distributed computer resources with multiple administrative domains. Grid computing over the internet requires more extensive security than within a single enterprises and robust authentication is employs in such a system security is the major issue related to and computing authentication is the important part in gird security. Other process in grid are depends on authentication. The aim of this proposed system is to enhance the security of the grid using facial bio metric. In this proposed system the study is done on existing grid security infrastructure. Simple user authentication using certificate has been selected as the reference for the enhanced authentication scheme. Here we have developed a system that uses a biometric input of user for authentication. We have use use’s face as biometric input
Conceptual Design of MIMO Wireless Communication System
Pooja S.Suratia, Satish K.Shah Department of Electrical Engineering, The Maharaja Sayajirao University of Baroda, India
Abstract: Next-generation communication evolution towards 4G promises to meet the demands for ubiquitous communication. MIMO technology has become a mandatory requirement to achieve the goals of future wireless communication. This paper describes the System design methodology for MIMO Wireless platform. Software simulations provide flexibility, but the true performance of the system can only be known by developing a hardware wireless platform and performing measurements and tests in the target environment. Hardware Implementation concept of MIMO Wireless platform based on DSP and FPGA is presented, various development tools available for system simulation and analysis is discussed. This paper gives an overview of Conceptual System Design Methodology, Software simulation tools and hardware implementation strategy for developing MIMO Wireless Communication System.
Secure Path with Time-Space Cryptography for Mobile Ad-hoc Networks
K.Ramakrishna, M.Srinivasa Rao, Y.Rokesh kumar, U.Rakesh M.Tech (SE), Computer Science Department, Hyderabad, India M.Tech (CSE), Computer Science Department, Hyderabad, India M.Tech (SE), Computer Science Department, Hyderabad, India M.Tech (SE) Computer Science Department, Hyderabad, India
Abstract: This Paper describes the design and performance of a secure path with time-space cryptography for mobile ad-hoc networks. It works in the time domain for key distribution between source and destination as well as in the space domain for intrusion detection along the route between them. Even if public key encryption is more powerful and superior in distributing keys, our scheme relies on symmetric key encryption because it is highly efficient and simple to implement. Thus, each node does not require any powerful hardware, thereby leading to a small and light device. The symmetric key cryptography shares a common secret key between source and destination.
A Transactional Model for Online Healthcare Organization: Using Actor Network Theory
Saman Foroutani, Noorminshah A.Iahad, Azizah Abdul Rahman Universiti Teknologi Malaysia, Malasyia
Abstract: Recently in switching the information between patients, staffs and hospitals, the Healthcare Web Portals (HWP) play a crucial role as a media tool to attain the challenging objectives of the quality of patient care and controlling operating costs. Looking wisely at literature shows that most prior researches have only focused on dimensions of e-service quality as the non-human actors. However, due to socio-political reasons, online HOs are positioned in a heterogeneous network, the social and technical or in other words human and non- human actors are equally important in the network. The main objective of this research is to propose a model for the online Healthcare Organizations (HO) with the view to make patients more attractive, trust and loyal to the online HO. Therefore, based on the extend review of literature, the initial research model adapted from the online shopping context and will extend to the online HO context. The initial research model is divided into three transaction stages such as pre-HO transaction, HO transaction and post-HO transaction stage. In addition, at each transaction stage human and non-human actors may influence patients’ satisfaction and as a result, make patients more attractive, trust and loyal to the online HO. In terms of human actors, at each transaction stage, friends and family members impact on patients’ satisfaction. In terms of non-human actors, dimensions of e-service quality influence patients’ satisfaction. For example, at pre-HO transaction stage (1) information, (2) usability and (3) efficiency, at HO transaction stage (1) security, (2) system availability, (3) fulfilment, (4) privacy and (5) reliability and at post-HO transaction stage (1) responsiveness, (2) empathy, (3) compensation and (4) contact impact on patients satisfaction and make patients more attract, trust and loyal to the online HO accordingly.
Keywords: Online Transaction, Online healthcare, ANT, Attraction, Trust and Loyalty
Smart Onboard Public Information System using GPS & GSM Integration for Public Transport
Mr. Prafull D.Patinge and Ms. N.R.Kolhare ME, Electronics Engg. Dept. of Electronics and Telecommunication Engineering, Govt. College of Engineering, Aurangabad (M.S.),India. Asst. Professor, Dept. of Electronics and Telecommunication Engineering, Govt. College of Engineering Aurangabad (M.S.), India
Abstract: This paper describes challenges of urban transportation and one of the cost effective approach to intelligently manage the public transpiration in the city. The GPS based urban transportation management system in which the fleet tracking using GPS & GSM/GPRS technology and public information system unit mounted at bus. The real-time co-ordinates help to guide the onboard commuter to destination. The unit mounted on bus sends the data using GSM/GPRS module to central monitoring system & displays it on City Map. This application is easy to deploy and provide effective management tool to urban transportation authorities for optimal utilization of present resources for improvements in term of load management, optimal route designing & real-time monitoring and control of the fleet.
Keywords: GPS tracking , GSM/GPRS , public informaiton system, fleet management, maps , central monitoring & control
Network Weight Updating Method for Intrusion Detection Using Artificial Neural Networks
Dr.S.SARAVANAKUMAR, JERRIN SIMLA.A, L.MEGALAN LEO, Dr.A.REGARAJAN Professor, Dept of IT, Panimalar Institute of Technology ,Chennai Asst.Professor, Department of CSE, Panimalar Institute of Technology, Chennai Asst.Professor, Department of ECE, St.Joseph College of Technology, Chennai Associate Professor, Department of IT, Veltech Multitech SRS engineering college, Chennai
Abstract: Application of Artificial Neural Networks (ANN) to intrusion detection has been considered in this research work. Experimental data were collected using KDD database.Using the data collected, the training patterns and test patterns are obtained. An ANN has been used to train the data offline. The weight updating algorithms developed for the ANN are based on the back propagation algorithms, echo state neural network and the functional update method. The method of presenting the patterns to the input layer of the network has been analyzed. The different methods of presenting the input patterns, such as reducing the dimension of the input patterns by a transformation and preprocessing of the input patterns for non linear classifiers have been investigated.In order to find the optimum number of nodes required in the hidden layer of an ANN a method has been proposed, based on the change in the mean squared error dynamically, during the successive sets of iterations. Two classification and four classification problems for training an ANN at different levels have been studied. Optimal discriminant plane technique which is a classical method has been used to reduce the dimension of the input pattern and then used to train an ANN. This reduces the size of the network and the computational effort is reduced drastically.The training of an ANN has been considered by splitting the single configuration into two configurations. The convergence rates of the split network are faster than that of single configuration network.The input patterns are preprocessed and presented to the input layer of ANN. Various types of preprocessing of the patterns are investigated. Comparisons of the classification performance and computational effort of the different weight updating algorithms with different training methods have been given. Several algorithms developed in this research work may find other application areas and in security with little modifications.
Keywords: ANN, weight updating, input layer, network, KDD
Keyword Extraction through Applying Rules of Association and Threshold Values
Mr. J.Naveenkumar BharatiVidyapeeth Deemed University, College Of Engineering, Pune
Abstract: Keywords are a set of significant words in an article that gives high-level description of its contents to readers. They provide a concise and precise high-level summarization of a document. Keywords are useful tools as they give the shortest summary of the document. A keyword is identified by finding the relevance of the word with or without prior vocabulary of the document or the web page. Generating the word statistics as well associating the words and categorizing it is the main focus which is pinned down in this paper.
Keywords: Keywords, Keyword extraction, threshold, association rules.
ALOS PALSAR Image for Landcover Classification Using Pulse Coupled Neural Network (PCNN)
Mouli De Rizka Dewantoro, Nur Mohammad Farda Undergraduate Program Cartography and Remote Sensing Universitas Gadjah Mada, Indonesia Doctoral Program of Geography, Universitas Gadjah Mada, Indonesia
Abstract: This research examined the landcover classification using remote sensed image radar system and using a computational vision system of cortex. The aims of this research, 1) to use SAR (Synthetic Aperture Radar) Image for landcover classification using PCNNN, 2) to utilize image processing software for landcover classification using PCNN, 3) to analyze the ability of SAR image for landcover classification using PCNN. Method was used in this research, remote sensed image processing using artificial neural network with PCNN architecture. The field sampling frame work of the landcover classes using stratified random sampling. The field data were analyzed by confusion matrix to determine the level of accuracy. The results of this research are landcover classes of SAR image classification using PCNN, landcover classification using SAR image and PCNN utilized by image processing software, produce three classes of landcover consist of buildings, vegetation, and open land/water body, with an accuracy level of 70,03%.
A New Approach of Internet Firewalls based on Biological Computation
Adel Hassas, Farzane Kabudvand, Carlo Lucas Department of Computer, Zanjan Branch, Islamic Azad University, Zanjan, Iran
Abstract: The purpose of this paper is to find a new technique on issue of network security using Biological algorithm of bees and presenting new methods of establishing security in a network and reduce its amount of traffic by eliminating the presented disruptive packets. A sample of an application to this method is discussed in continue.