Loading...

Proceedings of

International Conference on Advances in Computer Science and Electronics Engineering CSEE 2013

Date
24-Feb-2013
Location
new delhi - NCR , India
Authors
125
ISBN
978-981-07-5461-7

49 Articles Published

1. XBEE BASED AUTOMATION FOR CONTROL OF HOME APPLIANCES

Authors: K.SRIKANTH , G.ANIL KUMAR , M.K.CHAITANYA PATNAIK , M.PADMAVATHI , S.JAGANADHAM

Abstract: The XBee based RF Modules were engineered to operate within the Zigbee protocol and support the unique needs of low-cost, low-power wireless sensor networks. The modules require minimal power and provide reliable delivery of data between remote devices. This paper investigated one scenario which mainly was used for controlling several home appliances like Fans & Bulbs. Other communicating mediums like IR, RF and Ultrasonic are not supportive for high speed transmission and two way transmission, but XBee supports high speed transmission and two way transmission.

Keywords: X bee, Control, Automation

Pages: 1 - 3 | DOI: 10.15224/978-981-07-5461-7-01

2. INTRUSION DETECTION SYSTEMS BY APPLYING AN IMPROVEMENT IN APRIORI ALGORITHM

Authors: AKBAR FARHOODI NEJAD , AHMAD FARAAHI , AMANEH S. ALAVIFAR

Abstract: For many years, researchers have used the discovery of intrusion technology to supply the security of networks and computer systems. Increasing Cyber threats has caused the need to have a flexible approach that can offer the efficiency of this type of attack and to deal with more complex and unknown attacks. On this basis, the systems of intrusion discovery based on data mining have been presented that derives the unknown patterns and Cyber attacks from the data network. What is presented in this paper is an improvement on Apriori algorithm to realize the intrusion pattern in less time in the network and take proper reaction against it.

Keywords: intrusion detection, data mining, Apriori algorithm, distributed systems

Pages: 4 - 8 | DOI: 10.15224/978-981-07-5461-7-02

3. COMPARISON OF SOFTWARE DEVELOPMENT LIFE CYCLE MODELS

Authors: HEENA , RAJ KUMARI

Abstract: Software has become the necessity part of modern society. There are several software development methodologies in use today. Software development models basically fall into two categories that are heavyweight and lightweight. Heavyweight methodologies are traditional methodologies such as Waterfall, Spiral, Iterative, RUP (Rational Unified Process) and lightweight are agile methodologies such as Feature Driven Development, Scrum, XP etc. This paper deals with unfolding Traditional methodologies- Waterfall model and Agile methodologies-Feature Driven Development with their advantages and disadvantages.

Keywords: Terms—SDLC, Phases of SDLC, Heavyweight methodologies, Lightweight methodologies, Waterfall model, Feature Driven Development

Pages: 9 - 12 | DOI: 10.15224/978-981-07-5461-7-03

4. SURVEY ON SOFTWARE TEST DESIGN METRICS

Authors: RAJ KUMARI , JASPREET KAUR

Abstract: Measurement has always been an integral part of software engineering. Software projects can be assessed and risks reduced by using software metrics. In this paper we discuss software test metrics and their impact on software testing. This paper focuses on software test design metrics its key role in software testing process along with classification and analysis of various test metrics.

Keywords: Software testing,Sofware metrics,software test design metrics.

Pages: 13 - 17 | DOI: 10.15224/978-981-07-5461-7-04

5. FINGERPRINT IDENTIFICATION SYSTEM IN BIOMETRIC SECURITY

Authors: MEERA P. DOBARIA

Abstract: The most important application of accurate personal identification is securing limited access systems from malicious attacks. Among all the presently employed biometric techniques, fingerprint identification systems have received the most attention due to the long history of fingerprints and their extensive use in forensics. This paper deals with the issue of selection of an optimal algorithm for fingerprint matching in order to design a system that matches required specifications in performance and accuracy. Two competing algorithms were compared against a common database using MATLAB simulations.

Keywords: Fingerprint Matching, Biometric System Design, MATLAB

Pages: 18 - 23 | DOI: 10.15224/978-981-07-5461-7-05

6. BANDWIDTH RESERVATION AND ENERGY CONSTRAIN DISTANCE VECTOR ROUTING PROTOCOL

Authors: ARSHAD AHMAD KHAN MOHAMMAD , MOHAMMED ABDUL RAZZAK

Abstract: The design goal of effective routing protocol is challenging task in MANET due to its dynamic challenging characteristics. To design an effective routing protocol which provide correct path between source nodes to destination node is not enough but to improve the quality of service, like bandwidth guarantee battery life and delay. In this paper we are going to improve QoS parameters with the use of cross layer approach. With the use of cross layer we are going to utilize the energy related information from physical and MAC layer of the data link layer which is the responsible of computing the power. And also we are calculating the bandwidth .Both of these parameters is used to detect the stable path from source to destination. We are avoiding the node which has less energy and path which has low bandwidth so as to improve the QoS parameters like network performance, stable route and better delivery of data packets. The routing protocol is built on the top of DSDV. Simulation is done us

Keywords: QoS, MANETs, vector, routing, bandwidth, energy

Pages: 24 - 27 | DOI: 10.15224/978-981-07-5461-7-06

7. VERTICAL HANDOFF ALGORITHMS IN WLAN/3G INTEGRATED NETWORKS

Authors: NEHA SINGH , S REDDY VAMSHIDHAR REDDY , SANJAY DHAR ROY , N V R KISHORE

Abstract: With the development of various heterogeneous wireless technologies, which are for different purposes, the integration of these networks will provide good service, connectivity and high date rates to users. In this paper we consider the integration of WLAN and 3G networks. We evaluate performance of two vertical handoff (VHO) algorithms for an integrated 3G and WLAN network. The number of handoffs and decision delay are estimated as the MT (mobile terminal) moves from the centre of 3G network towards the AP of WLAN.

Keywords: VHO-algorithm, wireless area network (WLAN), 3G network, decision delay, seamless handover, bandwidth conversion.

Pages: 36 - 40 | DOI: 10.15224/978-981-07-5461-7-08

8. PERFORMANCE IMPACT OF 2-D CODES ALONG WITH OPTICAL HARD LIMITER AS AN MAI CANCELLATION TECHNIQUES ON O-CDMA SYSTEM

Authors: SANDEEP SAROWA , SHAILESH TONDWAL

Abstract: Several channel interference cancelation techniques have been proposed in different journals aiming at lowering to asymptotic bit error floors in optical OCDMA systems. These interference cancellation techniques are classified into two groups. One is based on the use of properties of sequence codes and another is based on the use of non linear elements in OCDMA systems. Optical hard-limiter is such a non-linear optical device which is used to reduce the MAI to some extent in OCDMA systems. Purpose of this paper is to investigate the impact of channel interference cancellation techniques when used individually or together on Incoherent Optical CDMA systems.

Keywords: Channel interference (CI), Multiple Access Interference (MAI), Optical Code Division Multiple Access (OCDMA), Optical Orthogonal Codes (OOC), Two-Dimensional (2- D), Optical Hard limiter (OHL).

Pages: 41 - 45 | DOI: 10.15224/978-981-07-5461-7-09

9. MINIMIZATION OF TEST SUITE THROUGH REGRESS ANALYSIS OF REQUIREMENT COVERAGE

Authors: RAJAT SHEEL JAIN , AMIT GUPTA

Abstract: Requirements are very important features for the designing of any software application. Test suite creation is a big and hectic task for the Software Quality Analyst. We propose to develop a technique for analysis of Covered Requirement and its impact on the designed Test suite. The requirement associated with the test cases accepts specification like execution time, costing for minimization of test suite. The specification analyser compares the information about the techniques like Precision, Efficiency, Inclusiveness and Generality. By reducing the test suite size, we can reduce the execution cost and time, validation and management of the test cases from the suite for future releases of the software and able to maintain the fault detection capability by reusing the refined test cases. The requirement coverage will increase time-effectiveness in sorting the features of the application and reduces the duplicacy. An improved rate of testing activity will provide faster feedback of the

Keywords: Requirement Coverage, Retesting & Regression Testing, Data Flow Technique and Suite Refinement

Pages: 46 - 49 | DOI: 10.15224/978-981-07-5461-7-10

10. REVIEW OF MAN-IN-THE-BROWSER ATTACK USING SECURITY ATTACK SCENARIOS

Authors: ANIL SAINI , MANOJ SINGH GAUR , VIJAYALAKSHMI

Abstract: A Web browser is an important component of every computer system as it provides the interface to the Internet world. Browsers facilitate the web users through online services like e-mail, banking and shopping. The new unforeseen functionalities may be added to the web browsers in the form of extensions. The extensions have access to sensitive browser APIs and untrusted web page content, which may result in browser attack like Man-in-the-Browser attack. The major target of this attack is customers of Internet banking. This paper makes two major contributions. First, it presents the threat model for Man-in-the-Browser (MITB) attack. This model identifies various threats and point of attacks used by MITB attack. The major cause of MITB attack is malicious extensions and vulnerabilities found in benign-but-buggy browser extensions. In our study we find that the current browser security model is not secure enough to protect against MITB attack. Second, this paper presents the possible secur

Keywords: Threat model, Browser extensions, Vulnerabilities, Browser attack, Security attack scenarios

Pages: 50 - 54 | DOI: 10.15224/978-981-07-5461-7-11

11. VALIDATION OF RNA-FINNT FOR REDUCTION IN ERROR PERCENTAGE AUTHOR(S) : KULJEET KAUR, G.GEETHA

Authors: G.GEETHA , KULJEET KAUR

Abstract: Fingerprint is used as an Identity Authentication Parameter. RNA-FINNT is a Fingerprint Hash Algorithm which is used to extract the hash code value of fingerprint when it is used for identity authentication. This algorithm is already validated on two parameters: reduction in number of angles and removal of dependency on global features. But this paper elucidates the third parameter which is error percentage that how RNA-FINNT has resulted in reduction in error percentage. Detailed analysis of existing algorithms (Grid Hash, Angle Hash and Minimum Distance Hash) is done on the basis of number of minutiae points extracted and on the behalf of which corresponding error percentage is calculated. Proof is generated through mathematical calculation that increase in the number of minutiae points in RNA-FINNT would result in decrease of error percentage. Validation is done that execution of RNA-FINNT results in reduction of error percentage.

Keywords: Network Security, Reduction in Error Percentage, Minutiae Points, Algorithm, Fingerprint Hash, Error Percentage

Pages: 55 - 59 | DOI: 10.15224/978-981-07-5461-7-12

12. CLOUD DATABASE MANAGEMENT SYSTEM ARCHITECTURE

Authors: KASHISH ARA SHAKIL , MANSAF ALAM

Abstract: One of the major challenges for the IT companies today is how to manage large growing volumes of data and how to produce a quality driven software product ensuring optimal utilization of resources with minimum cost. The database management system is a software system i.e. a set of programs that provides its users with processes for defining, building, manipulating and sharing databases amongst the users and applications. A cloud data base management system is a database management system for management of cloud data and provides delivery of computing as services rather than as product. In this paper we have proposed an architecture for management of data in cloud termed as “Cloud Database Management System Architecture”. The cloud database management system provides an approach for management of cloud data. The cloud data are spread over the internet and are stored to a remote server managed by a third party. Hence, the cloud data management is a major issue which needs to be catered t

Keywords: hree Schema architecture, cloud system architecture, green computing, three level object oriented database architecture

Pages: 60 - 64 | DOI: 10.15224/978-981-07-5461-7-13

13. IDENTIFYING SOLAR SUITABILITY OF A REGION USING FUZZY LOGIC

Authors: DHANYA SUNIL , SHIPRA JAIN

Abstract: Identification of solar potential of a region is important so as to reduce the return period of investment and to identify untapped regions like Himalayas, Tibet, Southern Andes etc. which were not considered to be good enough to tap the energy economically. This paper encompasses the use of fuzzy with weighted functions in identifying the same. The proposed method used various environmental constraints like solar irradiance, solar hour, latitude etc. for identifying the potential. For the sake of simplicity we have used only three of the above mentioned parameters but these parameters can be scaled up to any level, as desired by the experts, and also weights assigned to every parameter can be varied as per requirements and application area.

Keywords: solar, potential, classification, fuzzy, weights, estimation, solar hour, latitude, irradiance

Pages: 65 - 69 | DOI: 10.15224/978-981-07-5461-7-14

14. A COMPARATIVE STUDY ON ORACLE AND IBM-DB2 DATABASES

Authors: LAVANYA PAMULAPARTY , P.VIJAYA BABU VARMA , T.PRAVEEN KUMAR

Abstract: As storage of data plays a key role in databases, security and maintenance issues becomes major concerns. Relational databases hold a significant portion of data stored in software, therefore today’s database purchase decisions revolve around how secure the product is. This paper provides a categorical head to head feature comparison between Oracle Database (Oracle) and IBM DB2 Universal Database (DB2), in terms of performance, scalability, manageability and consistency features provided in the Secure Way with emerging trends in technology. It explores the impact of IBM’s and Oracle’s transaction security models on users seeking to protect their critical information systems and contrasts IBM’s strategy of building security outside of the DB2 database against Oracle’s strategy of securing information in the database server[6].

Keywords: Database security, Oracle Security, DB2 Security, Database Tuning, Partitioning, Database Cost.

Pages: 70 - 75 | DOI: 10.15224/978-981-07-5461-7-15

15. SIX SIGMA IN SOFTWARE ENGINEERING: TURNING A DREAM INTO REALITY

Authors: KALAIMAGAL SIVAMUNI , JAGAN AMGOTH

Abstract: The software industry is a multibillion industry today .All organizations, individuals and businesses use software today for a variety of purposes that range from paying bills online to managing aerospace systems. However, software by itself is prone to errors and bugs leading to disastrous results at times. This has caused many software agencies to look for standardized software engineering processes which result in increased reliability, less debugging and improved quality control. Six Sigma has taken the manufacturing world by storm with its proven results in increasing quality and reducing defects. It is therefore natural that in the past few years, software corporations and firms are now looking to see how Six Sigma methods can be incorporated into the software engineering process. Many companies have tried and successfully implemented Six Sigma methods in the software development , design and testing processes in Software Engineering. However there is still a lot of skepticism wi

Keywords: Six Sigma, DMAIC, DFSS, Lean Six Sigma, Software Process, Software Development

Pages: 76 - 80 | DOI: 10.15224/978-981-07-5461-7-16

16. RE-ENGINEERING LEGACY SYSTEMS FOR MODERNIZATION:THE ROLE OF SOFTWARE REUSE

Authors: MEENA JHA , LIAM O’BRIEN

Abstract: In this paper we outline our legacy modernization approach that incorporates our reuse process and repository which we have called the Knowledge Base Software Reuse (KBSR) Process and the KBSR Repository. The KBSR Process and Repository aim to give software engineers easy access to reusable software artefacts and reusable components within a defined process which we have incorporated into our modernization process. We outline how software re-engineering of legacy systems is used to populate the repository through the use of architecture reconstruction techniques to identify and categorize legacy components and other artefacts and save the components and associated information in the KBSR Repository to support modernization. The KBSR Repository can contain all categories of reconstructed software artefacts which have the potential to be reusable assets. In the context of modernization software re-engineering through architecture reconstruction has a major role to play in software reuse.

Keywords: Software Re-engineering, Software Reuse, Knowledge Based Software Reuse Repository, Knowledge Based Software Reuse Process

Pages: 81 - 86 | DOI: 10.15224/978-981-07-5461-7-17

17. CLUSTERS OF AYURVEDIC MEDICINES USING IMPROVED K-MEANS ALGORITHM

Authors: MEGHANA NAGORI , KAJAL C. AGRAWAL

Abstract: Clustering analysis method is one of the main analytical methods in data mining, the method of clustering algorithm will influence the clustering results directly. This paper discusses the importance of Ayurveda, standard k-means and improved k-means clustering algorithm and its implementation to form clusters of ayurvedic medicine for four disease. The improved method avoids computing the distance of each data object to the cluster centers repeatedly.

Keywords: clustering; k-means algorithm; Updated KMeans Algorithm; distance.

Pages: 87 - 93 | DOI: 10.15224/978-981-07-5461-7-18

18. THE USE OF FUZZY LOGIC FOR EFFECTIVE GATE OPENING CONTROL IN DAMS

Authors: PURVA SONTAKKE , AMEYA CHOUDHARY

Abstract: This paper endeavours to provide a solution to the manual adjustment of gate opening settings due to silting on the dam bed. The sources of silting in the catchment area and the rainfall statistics in the region can give a probabilistic model sufficient to develop a fuzzy logic for the effective control of gate opening without manual intervention and prevent wastage of water.

Keywords: Fuzzy logic, silting, flood level, gate control Introduction

Pages: 94 - 94 | DOI: 10.15224/978-981-07-5461-7-19

19. CONTAINER ARCHITECTURE FOR DETECTION AND PREVENTION OF INTRUSIONS USING VIRTUALIZATION TECHNIQUE

Authors: BASKAR.M , GNANASEKARAN.T , M.RAMAKRISHNAN , S.SARAVANAN

Abstract: Network Intrusion Detection Systems (IDSs) which are based on sophisticated algorithms rather than current signature-base detections are in demand. Web services have moved to a multi-tiered design wherein the webserver runs the application front-end logic and data are outsourced to a database or file server in order to enable communication and the management of personal information from anywhere. The proposed system is Container based Intrusion Detection System, an IDS system that models the network behavior of user sessions across both the front-end webserver and the back-end database. This system used to detect attacks in multi-tiered web services. Our approach can create normality models of isolated user sessions that include both the web front-end (HTTP) and back-end (File or SQL) network transactions. For websites that do not permit content modification from users, there is a direct causal relationship between the requests received by the front-end webserver and those generated fo

Keywords: doubleguard, multi-tiered web services, virtualization

Pages: 100 - 104 | DOI: 10.15224/978-981-07-5461-7-21

20. BIOMETRICS IN INDIA : AN OVERVIEW

Authors: B K CHAUHAN , M. HANMADLU , MRIDULA SINGH

Abstract: Biometrics has been used in western countries for almost a century for public safety purpose. Its use as mainstream technology for public and private organizations has increased phenomenally in last decade. In India also, number of projects using biometrics are increasing and becoming voluminous with elapse of time. The initiatives pertaining to the identity of citizens, employee benefit schemes, and growing security concerns are pushing the envelope for Biometrics. Private organizations are also using it for the variety of purposes. This study attempts to find a general view of current scenario of Biometrics in India and various factors contributing to its unprecedented growth and its pervasiveness.

Keywords: Biometrics, Identity projects, Security projects, Indian perspective

Pages: 105 - 108 | DOI: 10.15224/978-981-07-5461-7-22

21. FACE IDENTIFICATION USING WAVELET TRANSFORM & PCA

Authors: DINESH SHARMA , NAINA GOEL , PURNIMA K SHARMA , JASLEEN KAUR

Abstract: Face recognition has recently attracted increasing attention and is beginning to be applied in a variety of domains, predominantly for security. In the past few decades’ people used to create some passwords, key words or some other security measures to prevent maltransactions. But now a days with the advanced technology it is better to know the persons physical identity by recognizing some physical features. Because of the problem with traditional password/PIN system, biometric based technologies gained advantage. Face recognition is one of the biometric based technologies which use human faces for authentification. We use wavelet transform for the decomposition of images. Principal Component Analysis is used for the actual recognition. We considered Eigen faces as principal components Face images are projected onto a feature space (“face space”) that best encodes the variation among known face images. This approach transforms face images into a small set of characteristic feature imag

Keywords: Wavelet Transform (WT), Principal Component Analysis (PCA), Face Recognition, Eigen value, Eigen Face

Pages: 109 - 113 | DOI: 10.15224/978-981-07-5461-7-23

22. DETECTION OF IP ADDRESS SPACE EXHAUSTION ATTACK TO ADDRESS ALLOCATION SCHEMES IN MANET

Authors: MOHIT SATI , KINNARI VAISHNAV

Abstract: Mobile Adhoc Network (MANET) is a network without any infrastructure and no central authority. Absence of central authority makes MANET more vulnerable to various security attacks. MANET uses one of the address allocation schemes for configuration of new node. Address allocation schemes have several threats e.g. Address space exhaustion attack, IP spoofing, Address conflict threat, Address spoofing threat, etc. This paper suggests a novel approach that uses routing table based solution to detect address space exhaustion attack. Our solution uses three fields of routing table: destination address, hop count, hop limit. An ensuring mechanism is suggested in this paper to ensure detection of address space exhaustion in the network.

Keywords: MANET, Address space exhaustion attack, malicious node.

Pages: 114 - 118 | DOI: 10.15224/978-981-07-5461-7-24

23. CLUSTERING ALGORITHM IN WIRELESS SENSOR NETWORK: A SURVEY

Authors: PRITI KUMARI

Abstract: In this survey paper, various challenges to wireless sensor networks are considered and Clustering as a solution to one of them has been introduced. The wireless sensor network is divided into clusters in order to reduce energy consumption as well as to increase coverage area to larger extent. The various clustering schemes with different parameters and in different environments such as static and mobile are discussed. The fuzzy approach in cluster head selection has overcome uncertainty of wireless sensor network at different levels

Keywords: wireless sensor network, clustering, cluster head, sensor node, hop, fuzzy approach

Pages: 119 - 124 | DOI: 10.15224/978-981-07-5461-7-25

24. AN ENERGY EFFICIENT STRATEGY FOR GRID-BASED DATA DISSEMINATION SUPPORTING MOBILE SINKS IN WIRELESS SENSOR NETWORKS

Authors: T. P. SHARMA , KULWARDHAN SINGH

Abstract: Wireless Sensor Networks are made up of small sensor nodes with sensing capability. These sensor nodes have limited power supply, computational capability and storage. Due to constrained energy source in wireless sensor nodes, the design and implementation of energy efficient protocols is one of the most important challenge in Wireless Sensor Networks. Mobility of sink in wireless sensor networks brings new challenges in the form sink location maintenance, continuous data delivery, avoiding/reducing detour problem but reduces the hotspot problem. In this paper, we propose an Energy-Efficient strategy for Grid-based Data Dissemination supporting Mobile sinks (EEGDD) in wireless sensor networks which is more energy efficient in data dissemination to the mobile sink. This strategy is based upon permanent virtual grid structure and disseminates data from source to sink using optimal path with minimum path delay. This strategy sends query/data announcements across the certain axis only for

Keywords: Wireless Sensor Network, Sink Mobility, Data Dissemination, Energy Efficient

Pages: 125 - 129 | DOI: 10.15224/978-981-07-5461-7-26

25. IMPROVED PATTERN MATCHING ALGORITHM FOR INTRUSION DETECTION SYSTEM

Authors: HOSSIEN GHARAEE , SHOKOUFEH SEIFI

Abstract: IDS is a protective system which identifies the occurring violations on the network and its performance is based on different methods. The most common method of IDS performance relies on patter compatibility in which the ordinary behaviors are recognized so that the abnormal behaviors are identified and specific patterns are found for them. In this paper, through a proposed algorithm, we aim at presenting an improved algorithm from combination of two different algorithms of HC and QWM and clustering the data base of attack signature using decision tree for the operations of pattern compatibility in IDS. The benefit of using this method is that compatibility can be managed in such a way that the extra searches are prevented and the best result is obtained during the overlapping of known attacks with main pattern in high speed.

Keywords: Intrusion Detection Systems, Pattern Matching, QWM Algorithm, HC Algorithm.

Pages: 130 - 132 | DOI: 10.15224/978-981-07-5461-7-27

26. MODIFIED AES WITH KEY DEPENDENT S-BOX, ROTOR DEPENDENT SUBKEYS AND FREQUENCY ANALYSIS RESISTANCE

Authors: FATMA AHMED , DALIA ELKAMCHOUCHI

Abstract: With the widespread use of computers and Internet as well as electronic commerce, computer security becomes more and more important. In this paper, we introduce AES with key dependent S-box, rotor dependent subkeys and frequency analysis resistance (AES-KSF). The AES-KSF algorithm is compared with AES and gives excellent results from the viewpoint of the security characteristics and the statistics of the ciphertext. Also, we apply the randomness test to the AES-KSF algorithm and the results shown that the new design passes all tests which proven its security.

Keywords: Advanced Encryption Algorithm (AES), key dependent S-box, rotor, frequency analysis, inverse power function.

Pages: 133 - 137 | DOI: 10.15224/978-981-07-5461-7-28

27. A MODIFIED ECHO HIDING TECHNIQUE FOR HEXADECIMAL DATA

Authors: KAPIL DAVE , NIKITA SAKHARE , PRAGATI PEJLEKAR , VIVEK SAMPAT

Abstract: Various techniques for information hiding in audio files are available and are widely used for secure communication and digital identification. Commonly used methods of steganography add data into a cover file in the form of noise. However, retaining the information hidden in a particular signal after compression or other processing performed on the latter is inevitable. Echo hiding introduces change in the cover audio, rather than adding noise to it, which makes the hidden information immune to any kind of processing performed on the signal. We provide an enhancement to the conventional technique for echo hiding and the method of finding suitable parts in the file fit for hiding data without loss.

Keywords: Echo hiding, audio steganography

Pages: 138 - 142 | DOI: 10.15224/978-981-07-5461-7-29

28. DESIGN OF SEQUENTIAL CIRCUITS USING THRESHOLD LOGIC

Authors: MILI SARKAR , SHILPI RAJ , PRASENJIT SENGUPTA

Abstract: In this paper we propose an implementation technique for sequential circuit using threshold logic. With the advancement of nano technology threshold gate based logic design has got a new direction. In this paper first negative edge triggered D flip-flop has been designed. Then negative edge triggered T flip-flop has been designed .Finally threshold gate based counter has been realized. The proposed design has been verified by means of simulation using VHDL.

Keywords: Threshold logic gates, Single electron tunneling (SET), Resonant tunneling diode (RTD), Counter, Very Large Scale Integration (VLSI)

Pages: 149 - 154 | DOI: 10.15224/978-981-07-5461-7-31

29. PROBLEM SOLVING USING HYBRID REASONING MODELS

Authors: KAPIL KHANDELWAL , DURGA PRASAD SHARMA

Abstract: A single type of knowledge and reasoning method is often not sufficient for a decision support system to address the variety of tasks a user performs. It is often necessary to determine which reasoning method would be the most appropriate for each task, and a combination of different methods has often shown the best results. In this study CBR was mixed with other RBR and MBR approaches to promote synergies and benefits beyond those achievable using CBR or other individual reasoning approaches alone. Each approach has advantages and disadvantages, which are proved to be complementary in a large degree. So, it is well-justified to combine these to produce effective hybrid approaches, surpassing the disadvantages of each component method. In this paper, we briefly outlined popular case-based reasoning combinations. More specifically, we focus on combinations of case-based reasoning with rule based reasoning, and model based reasoning.Further we examined the strengths and weaknesses of var

Keywords: knowledge based systems, hybrid reasoningmodels, case based reasoning, model based reasoning, rule based reasoning, sustained learning, problem solving

Pages: 155 - 159 | DOI: 10.15224/978-981-07-5461-7-32

30. FAULT LOCATION IN SUB-STATION USING ARTIFICIAL NEURAL NETWORKS

Authors: FARHEEN , M.A.ANSARI , NEHA KARDAM

Abstract: In a power system the detection of the faults is very important. The faults occurred should be detected and corrected as soon as possible in order to protect further damage to the system. The faults can cause very adverse effects to the system. However the fault detection is not an easy task. In this paper we have considered a sub-station and the detection of the faults within that sub-station is done with the help of Artificial Neural Networks. The purpose of using ANN in this work is very simple, As ANN has various advantages like it can handle huge amount of data without any difficulty and it also takes less execution time. The sub-station considered in this work is the 500kV gas-insulated substation of the Itaipu system. The MATLAB software and the ANN toolbox within it is used here and the network is trained and tested.

Keywords: Faults, Fault location, Neural Networks

Pages: 160 - 165 | DOI: 10.15224/978-981-07-5461-7-33

31. A SURVEY OF COMPARATIVE SEGMENTATION ANALYSISFORMAGNETIC RESONANCE IMAGES

Authors: MANOJKUMAR S KATHANE , VILAS M THAKARE

Abstract: Now-a-days, almost all biomedical science use magnetic resonance image for diagnosis. Segmentation plays a vital role in such biomedical science.. Hence, there is a need to improved result by proposed method as suggested by authors.. Various approaches have been reported in literature for segmentation of brain, where main objective is separating the pixels associated with different types of tissues like white matter (WM), gray matter (GM) and cerebrospinal fluid (CSF). This paper introduces an automatic model based technique for brain tissue segmentation from cerebral magnetic resonance (MR) images by using support vector machine (SVM) based classifier. A new and powerful kind of supervised machine learning with high generalization characteristics, is employedby SVM. Another classifier such as neural network plays an important role in biomedical science for improved result for health care system. This paper will analyseSegmentation algorithm and Proved comparative study.

Keywords: Magnetic Resonance Images,whitematter,graymatter,cerebrospinal fluid,Support vector machine,Neural network

Pages: 166 - 170 | DOI: 10.15224/978-981-07-5461-7-34

32. GAIT ANALYSIS AND REHABILITATION: A SURVEY

Authors: VILAS M THAKARE , SHRIKRISHNA.D.PATIL

Abstract: This paper is focused on gait analysis methodologies for clinical use. For the purpose of explanation instrumented measurement of the movement patterns that make up walking and the associated interpretation of the same are considered. In this paper, Brand\'s four reasons for clinical tests, gait cycle and analysis of the varying characteristics are considered as a basis for determining what methodologies are required for gait analysis in a clinical rehabilitation context. It gives overall comparative study of various techniques used for gait analysis and rehabilitation along with the suggested improvements.

Keywords: Gait, Gait cycle, Clinical gait analysis, Rehabilitation

Pages: 171 - 175 | DOI: 10.15224/978-981-07-5461-7-35

33. EQOM: ENHANCED QUALITY OF EXPERIENCE (QOE) FRAMEWORK FOR MULTIMEDIA SERVICES

Authors: ASIF ALI LAGHARI , KHALIL UR REHMAN LAGHARI , MAHAM AMAN , MUHAMMAD IBRAHIM CHANNA , MUKHTIAR AHMED MEMON

Abstract: We proposed Enhanced Quality of Experience Framework for Multimedia Services (EQoM) for assessment of multimedia services on the network. The proposed model is useful for those users that have less information about computer technology. In this framework, we use agent technology based on automatic software components for collecting the objective QoE and QoS parameters in real time. For subjective QoE, a user web interface facility is furnished to collect user ratings. EQoM framework monitors, analyzes, generates reports and changes policy without intervention of administrators.

Keywords: Agent, QoE, Multimedia servcies, QoS

Pages: 176 - 180 | DOI: 10.15224/978-981-07-5461-7-36

34. HYBRID DESIGN APPROACH FOR EFFICIENT NETWORK INTRUSION DETECTION USING DATA MINING AND NETWORK PERFORMANCE EXPLORATION

Authors: NARESHKUMAR D. HARALE , B B MESHRAM

Abstract: The primary goal of an Intrusion Detection System (IDS) is to identify intruders and differentiate anomalous network activity from normal one. Intrusion detection has become a significant component of network security administration due to the enormous number of attacks persistently threaten our computer networks and systems. Traditional Network IDS are limited and do not provide a comprehensive solution for these serious problems which are causing the many types security breaches and IT service impacts. They search for potential malicious abnormal activities on the network traffics; they sometimes succeed to find true network attacks and anomalies (true positive). However, in many cases, systems fail to detect malicious network behaviors (false negative) or they fire alarms when nothing wrong in the network (false positive). In accumulation, they also require extensive and meticulous manual processing and interference. Hence applying Data Mining (DM) techniques on the network traffic

Keywords: Intrusion Detection, Misuse Intrusion Detection, Anomaly Intrusion Detection, Network Intrusion Detection System, Data Mining Techniques, Network Performance Analysis.

Pages: 181 - 189 | DOI: 10.15224/978-981-07-5461-7-37

35. MALWARE DETECTION THROUGH DECISION TREE CLASSIFIER

Authors: KAMRAN MOROVATI , SANJAY KADAM

Abstract: The first part of this paper is devoted to a brief introduction, terminology and a comparison between different methods of preventing and detecting malware. The second portion of this paper presents a new method for classifying malicious files versus normal ones. Our approach is based on differences between assembly op-code frequencies in malware and benign classes. We have also utilized decision tree algorithms to simplify the classification.

Keywords: Malware detection, Opcode frequencies, ANOVA test, Duncan multiple range test, Decision tree classifier,

Pages: 190 - 196 | DOI: 10.15224/978-981-07-5461-7-38

36. AN UNIFIEDMETHODOLOGY TO ATTAINMENT INDICATORS IN SAP/ERP EXECUTION PROCESSES

Authors: DURGA PRASAD SHARMA , ARVIND KUMAR SHARMA , LEMLEM KASSA

Abstract: The fundamental technology continuous upgraded in the way users need to evaluate / analyze business in terms of the SAP ERP system during pre- post implementation of SAP project implementation is by incorporation of business scenarios in SAP standard as well bespoke functional& technical solutions. This paper describes performance analysis and success indicators in manufacturing organizations using integrated and process-oriented approaches to overcome the technical consequences of complex problem, end user resistance and conflicts between stakeholders of SAP ERP. The study further examines the pre and post implementation period of SAP ERP implementation in Indian manufacturing organizations, with the aim of understanding and explaining the practical day-to-day system performance issues and resolutions. Organizations get benefits from the system after sufficient training, post implementation support, and acceptability of change management procedures. The description of the case is foll

Keywords: Enterprise Resource Planning (ERP), Execution process, Business Process Management (BPM), Systems Applications and Products in Data Processing (SAP), Integrated Approach

Pages: 203 - 209 | DOI: 10.15224/978-981-07-5461-7-40

37. SPECKLE NOISE REDUCTION FROM ULTRASOUND IMAGE USING ENHANCED SPECLE REDUCING ANISOTROPIC DIFFUSION

Authors: MANEESH SHARMA , SUNIL KUMAR YADAV , ARCHIT KUSHWAHA

Abstract: Speckle reducing anisotropic diffusion (SRAD), a diffusion method tailored to ultrasonic medical imaging and radar imaging applications. In SRAD the instantaneous coefficient of variation is derived by taking account only 4 pixel of image. We proposed the new algorithm using SRAD that consider 8 neighbor pixel of image i.e. horizontal and diagonal pixel both. We also demonstrate the algorithm performance on some ultrasound image. The performance measures obtained by is considerable compare to existing noise reducing algorithm and better edge preservation, variance reduction, and edge localization.

Keywords: Speckle Noise, Ultrasound Medical imaging, Anisotropic Diffusion

Pages: 210 - 214 | DOI: 10.15224/978-981-07-5461-7-41

38. SPEECH ENHANCEMENT USING NORMALIZED KERNEL AFFINE PROJECTION ALGORITHM

Authors: RAVI BOLIMERA1 , M. PAUL SANDEEP , T. KRANTHI KUMAR

Abstract: Aim of this paper is to investigate the speech signal enhancement using Normalized Kernel Affine Projection Algorithm (NKAPA). The removal of background noise is very important in many applications like speech recognition, telephone conversations, hearing aids, forensic, etc. Kernel adaptive filters shown good performance for removal of noise. If the evaluation of background noise is more slowly than the speech, i.e., noise signal is more stationary than the speech, we can easily estimate the noise during the pauses in speech. Otherwise it is more difficult to estimate the noise which results in degradation of speech. In order to improve the quality and intelligibility of speech, unlike time and frequency domains, we can process the signal in new domain like Reproducing Kernel Hilbert Space (RKHS) for high dimensional to yield more powerful nonlinear extensions. For experiments, we have used the database of noisy speech corpus (NOIZEUS). From the results, we observed the removal noise

Keywords: RKHS, Speech Enhancement

Pages: 215 - 219 | DOI: 10.15224/978-981-07-5461-7-42

39. DESIGN OF OPTIMAL ROBUST CONTROLLER FOR THIRD ORDER SYSTEM USING PARTICLE SWARM OPTIMIZATION

Authors: ANSHU SHARMA , BALWINDER SINGH , SHIV NARAYAN

Abstract: In this paper particle swarm optimization(PSO)has been applied for the design of the optimal robust controllers for third order systems . The controller design problem is posed as constrained nonlinear optimization problem. The parameters of the chosen controller are obtained solving the nonlinear constrained optimization problem.The performance index which has been used in the design is integral square error(ISE).The constraints are frequency domain performances related with robust stability .

Keywords: PSO, ISE, nonlinear optimization, optimal robust controller

Pages: 225 - 229 | DOI: 10.15224/978-981-07-5461-7-44

40. A LARGE-SCALE ZERO-DAY WORM SIMULATOR FOR CYBER-EPIDEMIOLOGICAL ANALYSIS

Authors: JODIE WETHERALL , LUC TIDY , STEVE WOODHEAD

Abstract: The cost of a single zero-day network worm outbreak has been estimated at US$2.6 billion. Additionally zero-day worm outbreaks have been observed to spread at a significant pace across the global Internet, with an observed infection proportion of more than 90 percent of vulnerable hosts within 10 minutes. The threat posed by such fast-spreading malware is therefore significant, particularly given the fact that network operator / administrator intervention is not likely to take effect within the typical epidemiological timescale of such infections. An accepted tool that is used in researching the threat presented by zero-day worms is the use of simulation systems. However when considering zero-day worm outbreaks on the Internet there are persistent issues of scale and fidelity. The Internet Worm Simulator (IWS) reported in this paper is designed to address these issues by presenting a novel simulation method that, on a single workstation, can simulate an entire IPv4 address space on a n

Keywords: cyber defence, malware, network worm, simulation, zero-day worm

Pages: 230 - 234 | DOI: 10.15224/978-981-07-5461-7-45

41. CLOUD COMPUTING ARCHITECTURE: A SURVEY

Authors: KAVITA SULTANPURE , MILIND MAHAJAN

Abstract: Now a day’s Cloud computing is a complex and very rapidly evolving and emerging area that affects IT infrastructure, network services, data management and storage resources and applications. And because of this nature it is drawing much attention from academia and industry. Many vendors provide Infrastructure as a Service, Software as a Service, and Platform as a Service. Different vendors have implemented different architectures for their SaaS, IaaS and PaaS clouds. In order to give a vision of cloud computing architecture in this paper I present the different architectures that I studied including layered architecture, modelled architecture, reference architecture, virtualization architecture and network architecture.

Keywords: Cloud computing, cloud computing architecture, SaaS, Paas, IaaS.

Pages: 235 - 239 | DOI: 10.15224/978-981-07-5461-7-46

42. AN NOVAL APPROACH TO ENHANCE THE AODV ROUTING PROTOCOL WHEN NODES OR LINKS FAILS

Authors: ARJUN RAJPUT , BIPLAB KUMAR SARKAR , BRIJESH SONI

Abstract: In 21st century networks act as backbone of world to perform various task given to it. Adhoc network (MANET) is major part of netwok.But MANET is a dynamic network without the fixed infrastructure due to their wireless nature and topology changes due to their dynamic nature .Among various protocol used as routing protocol in the MANET the AODV is most popular and widely used due to their various beneficial characteristics .But its beneficial characteristics will degrades when Nodes or links fails as it sends the error message back to the source and whole process is repeat again. In this paper we had successfully developed an protocol that enhanced the major drawback of AODV during its nodes and links fails as compared to previous proposed algorithms .And thus it will also enhances the feature like throughput ,reliability , security , packet size ,overheads ,traffic congestion. )

Keywords: Reactive, Proactive, Hybrid protocol, Ad hoc on demand distance vector (AODV) routing , Mobile Adhoc network (MANET),Take another best route(TABR) , Acknowledgement to intermediate nodes(ACKI), Acknowledgement to Source nodes(ACKS),Source(S), Destination (d),Next Best Route (NBR)

Pages: 246 - 249 | DOI: 10.15224/978-981-07-5461-7-48

43. AUTOMATIC LOAD BALANCING AND FAULT TOLERANCE IN A CLIENT SERVER MODEL BASED INTEGRATED SUBSTATIONS

Authors: FARHEEN , M.A.ANSARI

Abstract: In this paper, we present a novel design for software-based fully automated control station in the integrated substations environment. The idea is, to enable all the substations to communicate with control station as well as with other substations through computer network. The communication is based on client-server architecture. Control station is behaving as the server and substations are behaving as the clients. The scenarios we are taking into the consideration include automatic load balancing and automatic fault tolerance. This model for integrated substations drastically reduces the time latency if compared with traditional model. It reduces the time as well as human intervention in the critical tasks such as responding on some fault, load balancing actions, etc. The proposed model is fast, scalable, flawless, robust and transparent as it is using the capabilities of computers and networking in between them.

Keywords: Integrated substation, Automatic load balancing, Fault tolerance.

Pages: 250 - 254 | DOI: 10.15224/978-981-07-5461-7-49

44. DEVELOPMENT OF A WIRELESS SOIL MOISTURE

Authors: EKTA.MAINI , J S RAJASHEKHAR

Abstract: Soil moisture is a vital parameter which decides the crop quality. A prototype model is designed and developed to measure soil moisture and transmit it over long distance for further processing. The model is a combination of sensor, controller and communication module. A 16877A is used as controller. The sensor data is transmitted using Bluetooth transmitter to receiver at base station for logging and display.

Keywords: wireless sensor, soil moisture humidity sensor

Pages: 240 - 245 | DOI: 10.15224/978-981-07-5461-7-47

45. HEAD POSITIONING PARAMETER OPTIMIZING USING STATISTICS AND EVOLUTIONARY ALGORITHMS

Authors: AMINREZA RIAHI , JALILSHIRAZI

Abstract: Mechatronic equipments such as a head positioning system of hard disks have been required to provide fast and accurate positioning. To achieve these requirements, a mode switching control (MSC), which encompasses such diverse structures and functions of the controller is switching to that was used extensively. To achieve to a desired position in this matter, the model a controller parameters are assessed by some evolutionary algorithms like genetic, patter search and simulated annealing. The obtained parameters show that the values of these algorithms have good effect on their output. In this paper, the best algorithm, could be proper is introduced.

Keywords: Disk drives, mode switching control, genetic algorithm, pattern search algorithm, simulated annealing algorithm.

Pages: 220 - 224 | DOI: 10.15224/978-981-07-5461-7-43

46. AUTOMATIC LOAD BALANCING AND FAULT TOLERANCE IN A CLIENT SERVER MODEL BASED INTEGRATED SUBSTATIONS

Authors: FARHEEN , NEHA KARDAM , M.A.ANSARI

Abstract: In this paper, we present a novel design for software-based fully automated control station in the integrated substations environment. The idea is, to enable all the substations to communicate with control station as well as with other substations through computer network. The communication is based on client-server architecture. Control station is behaving as the server and substations are behaving as the clients. The scenarios we are taking into the consideration include automatic load balancing and automatic fault tolerance. This model for integrated substations drastically reduces the time latency if compared with traditional model. It reduces the time as well as human intervention in the critical tasks such as responding on some fault, load balancing actions, etc. The proposed model is fast, scalable, flawless, robust and transparent as it is using the capabilities of computers and networking in between them.

Keywords: Integrated substation, Automatic load balancing, Fault tolerance

Pages: 250 - 254 | DOI: 10.15224/978-981-07-5461-7-49

47. AN NOVAL APPROACH TO ENHANCE THE AODV ROUTING PROTOCOL WHEN NODES OR LINKS FAILS

Authors: ARJUN RAJPUT , BIPLAB KUMAR SARKAR , BRIJESH SONI

Abstract: In 21st century networks act as backbone of world to perform various task given to it. Adhoc network (MANET) is major part of netwok.But MANET is a dynamic network without the fixed infrastructure due to their wireless nature and topology changes due to their dynamic nature .Among various protocol used as routing protocol in the MANET the AODV is most popular and widely used due to their various beneficial characteristics .But its beneficial characteristics will degrades when Nodes or links fails as it sends the error message back to the source and whole process is repeat again. In this paper we had successfully developed an protocol that enhanced the major drawback of AODV during its nodes and links fails as compared to previous proposed algorithms .And thus it will also enhances the feature like throughput ,reliability , security , packet size ,overheads ,traffic congestion. )

Keywords: Reactive, Proactive, Hybrid protocol, Ad hoc on demand distance vector (AODV) routing , Mobile Adhoc network (MANET),Take another best route(TABR) , Acknowledgement to intermediate nodes(ACKI), Acknowledgement to Source nodes(ACKS),Source(S), Destination (d),Next Best Route (NBR).

Pages: 246 - 249 | DOI: 10.15224/978-981-07-5461-7-48

48. DEVELOPMENT OF A WIRELESS SOIL MOISTURE

Authors: EKTA.MAINI , J S RAJASHEKHAR , JYOTI.SHETTAR

Abstract: Soil moisture is a vital parameter which decides the crop quality. A prototype model is designed and developed to measure soil moisture and transmit it over long distance for further processing. The model is a combination of sensor, controller and communication module. A 16877A is used as controller. The sensor data is transmitted using Bluetooth transmitter to receiver at base station for logging and display.

Keywords: wireless sensor, soil moisture humidity sensor

Pages: 240 - 245 | DOI: 10.15224/978-981-07-5461-7-47

49. CLOUD COMPUTING ARCHITECTURE: A SURVEY

Authors: KAVITA SULTANPURE , MILIND MAHAJAN

Abstract: Now a day’s Cloud computing is a complex and very rapidly evolving and emerging area that affects IT infrastructure, network services, data management and storage resources and applications. And because of this nature it is drawing much attention from academia and industry. Many vendors provide Infrastructure as a Service, Software as a Service, and Platform as a Service. Different vendors have implemented different architectures for their SaaS, IaaS and PaaS clouds. In order to give a vision of cloud computing architecture in this paper I present the different architectures that I studied including layered architecture, modelled architecture, reference architecture, virtualization architecture and network architecture.

Keywords: Cloud computing, cloud computing architecture, SaaS, Paas, IaaS

Pages: 235 - 239 | DOI: 10.15224/978-981-07-5461-7-46

Popular Proceedings

ESSHBS 2017 - 2017

7th International Conference On Advances In Economics, Social Science and Human Behaviour Study

ICETM 2023 - 2023

9th International E-Conference on Engineering, Technology and Management

ASET 2017 - 2017

7th International Conference on Advances in Applied Science and Environmental Technology

ACSM 2017 - 2017

7th International Conference on Advances in Civil, Structural and Mechanical Engineering

CSM 2017 - 2017

5th International Conference on Advances in Civil, Structural and Mechanical Engineering

SEM 2017 - 2017

5th International Conference on Advances in Social, Economics and Management

ICETM 2022 - 2022

8th International E- conference on Engineering, Technology and Management

SEM 2019 - 2019

9th International Conference on Advances in Social Science, Economics and Management Study