• Home
  • Call for paper
  • Submission
  • Editorial Board
  • Contact

IJCSWS-Menu

  • Author Instructions

  • Editorial Board

  • Archives

  • Peer review process

 

Downloads

  • Copyrights form

  • Model Paper

 

IJCSWS - Volume :02      Issue:01

Page No
Title
 


249-254
Adaptive Hybrid Transmission Mechanism For On-Demand Mobile IPTV over LTE
--C.Augustine, K.Periyarselvam, K.Balaji, M.Kamesh.
Abstract

In this paper, we propose an Adaptive Hybrid transmission (AHT) schemes for on-demand mobile IPTV service over Long Term Evolution technology. A heterogeneous MAC protocol is considered for the service in LTE. Proposed algorithm utilizes hybrid mechanism which combines Multi-channel multicasting and unicast scheme to enhance not only service over service blocking probability but also reduce overall bandwidth consumption of the wireless system which has very limited resources compared to wired network. An adaptive resource allocation algorithm is also proposed and is shown to achieve minimum blocking probability. In order to evaluate the performance we compare proposed algorithm against traditional Uncast and multicast schemes.


Keywords: Adaptive, IPTV, mobile, multicast, on-demand, heterogeneous MAC protocol, LTE..

  | p(Full pdf)


255-259
The Dynamics of E-learning and Cell Phone Technologies as Disruptive Innovations
-- Nabie Y. Conteh, Ph.D., Erin Williams
Abstract

The objective of this paper is to look at two disruptive technologies/innovations that are affecting our world today. Never has there been a time where there has been so much disruption than now with so many new technologies that are able to change our world as they communicate and interact with one another. The paper also attempts to shed light on how we as people are literally able to connect with anyone in the world through the Internet. It has changed the way we live in countless and amazing sorts of ways. The paper will also address the advantages and disadvantages of these technologies and how they impact our living standards and productivity. E-learning and cell phone technologies are great examples of truly disruptive technologies that have opened windows of opportunities. The paper will close with recommendations and conclusions based on research data obtained from innovations in the areas of E-learning and cell phone technologies.


Keywords: Disruptive technologies, innovation, technology, cell phones, online training, e-learning...

  | p(Full pdf)


260-262
Resisting Proxy Based Spoofing Attacks
-- S. Adithya jones
Abstract

Botnets are the main drivers of cyber attacks, such as distributed denial of service (DDoS), information phishing and email spamming. These attacks are pervasive in the Internet, and often cause great financial loss. Motivated by huge financial or political reward, attackers find it worthwhile to organize sophisticated botnets for use as attack tools. There are numerous types of botnets in cyberspace, such as DSNXbot, evilbot, G-Sysbot, sdbot, and Spybot. A denial-of-service (DoS) or distributed denial-of-service (DDoS) attack is an attempt to make a machine or network resource unavailable to its intended users. A Flash Crowd (FC) is a large surge in traffic to a particular Web site causing a dramatic increase in server load and putting severe strain on the network links leading to the server, which results in considerable increase in packet loss and congestion. In order to simulate the legitimate behaviour of a web browser, we need three key pieces of information: web page popularity of the target website, web page requesting time interval for a user, and number of pages a user usually browses for one browsing session. In this project we show Mimicking attack and phishing attack. We propose a second order statistical metric for the detection purpose. To detect flash crowd attacks when the sufficient number condition is not met by botnet owners..


Keywords: Mimicking, flash crowd attack, detection, second order metrics...

  | p(Full pdf)


263-267
Evalution of Phytochemical and Antimicrobial Activity of Flowers of Clitoria Ternatea
--Dr.Valivittan , Christina Isaac
Abstract

Cell damage caused by free radicals appears to be a major contributor to aging and to degenerative diseases such as cancer, cardiovascular disease, cataracts, and immune system decline and brain dysfunction. Plants have long been used in the treatment of cancer. The anti-cancer cells either kill cancer cells or modify their growth. The present investigation was undertaken to find out the unexplored cytotoxic effect of the flower Clitoria ternatea. All parts of Clitoria ternatea are useful for medical treatments and have been used in folk medicines and for curing different diseases. The primary objectives were to determine the Characterization of the Clitoria ternatea flower based on the phytochemical, antioxidant, antibacterial and antifungal activities. Twenty-five gram of air dried powdered samples was extracted with 300 ml of Solvent like Methanol using Soxhlet apparatus for ten hours of time. The extract was condensed using rotary evaporator. After condensation the samples were reconstituted in their respective solvents to obtain a stock of 100mg/ml and were stored in a refrigerator. Antioxidant activity assay is based on the reduction of 1,1-diphenyl-2-picrylhydrazyl (DPPH).Due to the presence of an odd electron it gives a strong absorption maximum at 517nm. Antibacterial activity was then followed using 5 microorganisms (E.coli, Staphylococcus aureus, Bacillus spp., Salmonella typhi and Pseudomonas aeruginosa).The Assay was performed by agar disc diffusion method. Then Antifungal activity assay was carried using (Candida albicans, Aspergillus niger, Rhizopus spp. and Trichoderma viride).Phytochemical analysis showed the presence for Tannins,saponins,flavonoids,proteins,steroids and anthroquinones. All values obtained are acquired from UV spectrophotometer/colorimeter for assays...


Keywords:Clitoria ternatea, Phytochemical screening, DPPH Scavenging activity,Antimicrobial Activity,Flower extract....

  | p(Full pdf)


268-270
Performance Evaluation
--K.Gokhul, Dr. S. Panneerselvam
Abstract

Performance is an action or process of performing a task or function. And evaluation is judgment about the quality / quantity of the assessment conducted. Thereby, ―Performance evaluation is a systematic process of observing, assessing, and interpreting one‘s actual performance.


Keywords:

  | p(Full pdf)


271-275
An Unswerving Approach For Recognizing Faces In Erratic Illuminations
--Mrs. M. Abila
Abstract

Application for identifying or authenticating a person from a digital image or a video frame from a source can be done by comparing the selected facial features from the image and database. The existing systems include poor face credits with illumination ailment and the methods for finding the varying face expressions is still an issue. YALE-B database provides new insights into the role of robust pre-processing methods played in dealing with difficult illumination conditions and thus being useful in the description of new methods for robust face recognition. The system derives important information regarding the image quality achieved during the acquisition of the image. This paper implements pre-processing tasks such as Gamma correction, Differences of Gaussian (DOG) filter Masking and Normalization by considering the overall composition of the images. A special form of dimensionality reduction called Feature Extraction is carried out. The features set will extract the relevant information from the input data in order to perform the desired task. A k-Nearest Neighbor (k-NN) classification procedure is adopted to recognize the unique and permanent facial characteristics of a single person and store these features in the database as face templates. Later on, whenever the individual revisits the ground, their faces are known by the system application automatically. The aim is to develop a system which helps in easy retrieval and classification of accurate face characteristics..


Keywords:illuminations, digital image, recognitions, robust, acquisition, extraction, templates, reliability

  | p(Full pdf)


276-278
An Efficient Technique for Scheduling Algorithm In Real Time Environment For Optimizing the Operating System
--M. Arvindhan, Reetu Singh,Kajol Kathuria
Abstract

The main intention of writing this paper is to introduce a new CPU algorithm called SJRTRR CPU Scheduling Algorithm. The proposed algorithm is based on Round Robin and helps to improve the average waiting time of Round Robin algorithm. Classic real-time scheduling algorithms RMS, EDF and LLF are discussed in uniprocessor systems. The scheduling thought and strategies are investigated in multiprocessor systems.


Keywords:Scheduling Algorithms, SJRTRR, SJRT, RR, Turnaround time, waiting time ,centralized multiprocessscheduling.

  | p(Full pdf)


279-283
Internet Of Things Based Wearable Sensors For Women Safety
--R.Indrakumari ,Dr. Justin Varghese
Abstract

The internet has grown which let human being to access and utilize the services on a universal scale using traditional hosts, mobile devices such as smart phones across the globe. By linking the objects and devices, the Internet of Things (IoT) will fully utilize the network potential and facilitate the application of innovative services to a large set of scenarios, such as home and building automation, smart cities, healthcare, etc,. This will integrate new paradigms of Human-to-Machine (H2M) and Machine-to Machine (M2M) interaction. Nowadays, wearable devices are considered as the Hallmark of Internet of Things that can be worn on the human body. Wearable devices can be classified into two categories, namely passive and active wearable devices. This paper begins with the introduction of Wearable Internet of things, its attributes, and footprint of wearable technology in the women safety.


Keywords:Internet Of Things, Wearable Sensors , Healthcare Industry, Human-to-Machine (H2M).

  | p(Full pdf)

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 



All Rights Reserved © IJCSWS