IJCSWS-Menu
IJCSWS - Volume :03 Issue:02
Page No |
Title
|
---|
100-105 |
Packet Loss Control In Multicasting Ad Hoc Networks Using CORA --K.Nidhiyal , V.Vidhya |
Abstract
Ad Hoc network changes the location and configures itself. Cooperative Communication leverages the broadcast nature of the wireless channels and achieves the improvement in system capacity and delay. To manage the medium access interactions, an efficient Cooperative Medium Access Control (CMAC) protocol is used to improve the network performance in terms of lifetime and energy efficiency. By utility based relay selection strategy, performance is increased based on location information and residual energy. This strategy helps to select the best cooperative node with better channel condition, best relay and balanced energy consumption. However, the packet loss is not controlled. To overcome this, the proposed system using Collaborative Opportunistic Recovery Algorithm (CORA) which is designed for multicast applications with low packet loss and latency constraints. To recover peer-to-peer packet loss, Cached Packet Distance Vector (CPDV) protocol is used. Keywords: Ad hoc Networks; Network Lifetime; Cooperative Communication (CC); Medium Access Control; Relay selection; Network Utility; Mulicasting ![]() |
106-111 |
Enhancing Stateless Key Updation for Secured Data --PriyankaEugin, P.Rajakumar |
Abstract
Side-channel analysis (SCA) exploits the data leaked through outputs to reveal the secret key of cytological modules. the important threat of SCA lies within the ability to mount attacks over tiny components of the key and to mixture data over completely different encryptions. The threat of SCA are often dynamic the secret key at each run. Indeed, several contributions within the domain of outflow resilient cryptography tried to attain this goal. However, the projected solutions were computationally intensive and were designed to resolve the matter of the present cytological schemes. The generic framework of light-weight key change which will shield the present cytological standards and valuate the minimum necessities for heuristic SCA-security. Propose a whole resolution to shield the implementation of any standard mode of advanced cryptography customary. The answer maintains identical level of SCA-security (and typically better) because the state of the art, at a negligible space overhead whereas doubling the turnout., Keywords: side channel analysis, Advanced cryptography customary, key updation. ![]() |
112-115 |
A Survey on CAD System for Liver Cancer Diagnosis --R.Prabakaran, C.A.Jagan, S.Kandasamy, K. Sai Anand |
Abstract
Hepatic cancer is the fifth most common cancer in the world and the majority of patients with liver cancer as a result will die within one year. Computer Aided Diagnosis (CAD) systems help a great deal in aiding the detection and diagnosis of cancer. They serve as an effective second opinion. Computed Tomography (CT) is one of the commonly used imaging modalities in the cancer domain since it gives the intrinsic details of the tissues. Recent developments in Computed tomography have been very helpful to avoid the effect of radiation during the scanning process. The four major steps in the computer aided diagnosis are the pre-processing of the images, segmentation of the regions of interest, feature extraction and classification. This paper gives a brief summary of the recent developments in the segmentation of the region of interest and the classification of liver diseases using the Computed Tomography images and the results of the existing methodologies. Keywords: CAD, Segmentation, Classification, Liver Tumor, CT ![]() |
123-124 |
Helium's Orbit Internet of Things (IoT) Space --R. Ganesh Babu |
Abstract
The rapid development of Internet of things (IoT) technology makes it possible for connecting various smart objects together through the Internet and providing more data interoperability methods for application purpose. Recent research shows more potential applications of IoT in information intensive industrial sectors such as location based services. At present, users always make use of location-based services via smart phones, and can obtain information anywhere and anytime. Therefore, we proposed an approach that focuses on location-based information and location-based service to address above issues. Using the proposed approach, location-based information and location-based service will be delivered according to the user context, and the information and service results will be shown on the smart phone. Location-based services are growing in popularity due to the ubiquity of smart phone users. The relevance of location-based query results is very important, especially for mobile phones with limited screen size. Location-based data frequently changes; this introduces challenges in indexing and ranking places. We implemented our system as a location-based search engine that uses helium earth orbit (HEO) about places. We evaluated the coverage and relevance of our system by comparing it against current state-of-the-art approaches including page-rank (Google Local Search). Keywords: The rapid development of Internet of things (IoT), location-based information, location-based service, helium earth orbit (HEO), page-rank (Google Local Search) ![]() |
125-128 |
Achieving Data Integrity And Access Confidentiality in Multicloud Storage --B.Thogairani, G.Thiyagarajan |
Abstract
Storing and sharing of data in cloud can be modified by users. It leads to the security problems in terms of confidentiality, integrity and availability of data and service. Remote data integrity checking is a very big solution to address this problem. When storing the data on multicloud servers, the distributed storage and integrity checking are difficult to be processed. In existing system, integrity checking is done by public key certificate distribution and management. But it suffers from complicated certificates management such as certificate generation, delivery, revocation, renewal, etc. In this project, Verifier mechanism is used to check the data Integrity. Client has massive data to be stored on the multicloud for maintenance and computation, can be either individual consumer or corporation. CS, managed by CSP, has significant storage space and computation resource to maintain the clients’ data. Combiner receives the storage request and distributes the Block-tag pairs to the corresponding cloud servers. In addition to this, Access Confidentiality is achieved by using Dynamic Reallocation technique. Theoretical analysis and experimental outcome, demonstrate the validity and efficiency of the proposed scheme. Keywords:Multicloud servers, Distributed storage, Block-tag pairs, Dynamic Reallocation ![]() |
129-133 |
Identifying Diabetes Using Tongue Images From Smartphone --B.Saratha, A.Vinodhini |
Abstract
Identifying Diabetes from the tongue obtained before and after food are acquired using high resolution cameras from smart phone. Images are then individually processed (filtered, segmented) and then texture & color analysis are done. The differences between two images (before and after food) are then comparatively analyzed to predict the presence of diabetes. Keywords: Color Analysis, Image Filtration, Image Segmentation, Texture Analysis ![]() |
134-137 |
Content Search Control For Named Data Networking --V.Kavitha, J.Shyamala, A. Annie Jesus Suganthi Rani |
Abstract
Named Data Networking (NDN) is a new paradigm for future internet, data packet carry name rather than current IP paradigm of source and destination addresses, to provide light integrity verification architecture for security in NDN system. Content based search is common where the issue of security lie low than expectation. Different Systems are connected in different networks where the information of the system will be stored in the router and the content of the system in its temp memory so that the data response will be redirected from the router cache itself. The main mechanism of LIVE lies in generating different content integrity status for a single content object, which allows a Content Provider to control content access performed by NDN nodes. Pending Interest Table (PIT), stores all the Interests that a router has forwarded but not satisfied yet. Each PIT entry records the data name carried in the Internet, together with its incoming and outgoing interface(s). Forwarding Information Base (FIB), a routing table which maps name components to interfaces. The FIB itself is populated by a name-prefix based routing protocol, and can have multiple output interfaces for each prefix. Content Store (CS), a temporary cache of Data packets the router has received. Because an NDN Data packet is meaningful independent of where it comes from or where it is forwarded, it can be cached to satisfy future interests. Replacement strategy is traditionally least recently used, but the replacement strategy is determined by the router. Keywords: Content Confidentiality, access control, data security ![]() |
141-145 |
Evalution of Phytochemical and Antimicrobial Activity of Flowers of Clitoria Ternatea --Dr.Valivittan , Christina Isaac |
Abstract
Cell damage caused by free radicals appears to be a major contributor to aging and to degenerative diseases such as cancer, cardiovascular disease, cataracts, and immune system decline and brain dysfunction. Plants have long been used in the treatment of cancer. The anti-cancer cells either kill cancer cells or modify their growth. The present investigation was undertaken to find out the unexplored cytotoxic effect of the flower Clitoria ternatea. All parts of Clitoria ternatea are useful for medical treatments and have been used in folk medicines and for curing different diseases. The primary objectives were to determine the Characterization of the Clitoria ternatea flower based on the phytochemical, antioxidant, antibacterial and antifungal activities. Twenty-five gram of air dried powdered samples was extracted with 300 ml of Solvent like Methanol using Soxhlet apparatus for ten hours of time. The extract was condensed using rotary evaporator. After condensation the samples were reconstituted in their respective solvents to obtain a stock of 100mg/ml and were stored in a refrigerator. Antioxidant activity assay is based on the reduction of 1,1-diphenyl-2-picrylhydrazyl (DPPH).Due to the presence of an odd electron it gives a strong absorption maximum at 517nm. Antibacterial activity was then followed using 5 microorganisms (E.coli, Staphylococcus aureus, Bacillus spp., Salmonella typhi and Pseudomonas aeruginosa).The Assay was performed by agar disc diffusion method. Then Antifungal activity assay was carried using (Candida albicans, Aspergillus niger, Rhizopus spp. and Trichoderma viride).Phytochemical analysis showed the presence for Tannins,saponins,flavonoids,proteins,steroids and anthroquinones. All values obtained are acquired from UV spectrophotometer/colorimeter for assays. Keywords: Clitoria ternatea, Phytochemical screening, DPPH Scavenging activity,Antimicrobial Activity,Flower extract. ![]() |
146-151 |
The Simulation Analysis on Neck Injure in Rear-end Crash by Predicting Occupant Injury Severity Using Support Vector Machine --E. Divya , Dr. R. Latha |
Abstract
This analysis study aims at investigating the connection between occupant injury severity level and occupant, vehicle, roadway, and factors on the environmental basis of support vector machine (SVM) model. The multi-layer perception (MLP) neural network model was the benchmark for evaluating the performance of SVM model. Historical crash data from 1994 to 2012 were used as the data source. The best SVM model provided an overall classification accuracy of 63.4% and 58.6% for the testing group datasets and training group datasets respectively. The performance of SVM model was compared with those of MLP models, SVM model gave satisfactory result with less datasets over-fitting. Therefore, SVM model is capable of predicting occupant injury severity levels in a rear-end crash. The finite element model of the rear-end crash simulation was determined with commercial code ANSYS/LS-DYNA. The seats and dummies were imported from software LS-PREPOST which was implemented in the model. The effects of passenger posture and distance between dummy head and headrest on neck injury were thoroughly analyzed. Results show that the two factors have certain influence on neck injury. Shorten the gap between the dummy head and headrest helps to reduce the neck injury and neck moment. Keywords: Occupant injury severity, support vector machine, neural network, Rear-end Crash, neck injury, Numerical Investigation. ![]() |
152-154 |
Resisting Proxy Based Spoofing Attacks --S. Adithya jones |
Abstract
Botnets are the main drivers of cyber attacks, such as distributed denial of service (DDoS), information phishing and email spamming. These attacks are pervasive in the Internet, and often cause great financial loss. Motivated by huge financial or political reward, attackers find it worthwhile to organize sophisticated botnets for use as attack tools. There are numerous types of botnets in cyberspace, such as DSNXbot, evilbot, G-Sysbot, sdbot, and Spybot. A denial-of-service (DoS) or distributed denial-of-service (DDoS) attack is an attempt to make a machine or network resource unavailable to its intended users. A Flash Crowd (FC) is a large surge in traffic to a particular Web site causing a dramatic increase in server load and putting severe strain on the network links leading to the server, which results in considerable increase in packet loss and congestion. In order to simulate the legitimate behaviour of a web browser, we need three key pieces of information: web page popularity of the target website, web page requesting time interval for a user, and number of pages a user usually browses for one browsing session. In this project we show Mimicking attack and phishing attack. We propose a second order statistical metric for the detection purpose. To detect flash crowd attacks when the sufficient number condition is not met by botnet owners. Keywords: Mimicking, flash crowd attack, detection, second order metrics ![]() |
155-158 |
Enabling Efficient Multi – Keyword Ranked Search Over Encrypted Cloud Data Through Blind Storage --R.Oliver Prasanna |
Abstract
In mobile cloud computing, a fundamental application is to outsource the mobile data to external cloud servers for scalable data storage. The outsourced data, however, need to be encrypted due to the privacy and confidentiality concerns of their owner. This results in the distinguished difficulties on the accurate search over the encrypted mobile cloud data. To tackle this issue, in this paper, the searchable encryption for multi-keyword ranked search over the storage data was developed. Specifically, by considering the large number of outsourced documents (data) in the cloud, the relevance score and k-nearest neighbor techniques to develop an efficient multi-keyword search scheme was utilized which can return the ranked search results based on the accuracy. Within this framework, an efficient index to further improve the search efficiency, and adopt the blind storage system to conceal access pattern of the search user was leveraged. Security analysis demonstrates that our scheme can achieve confidentiality of documents and index, trapdoor privacy, trapdoor unlink ability, and concealing access pattern of the search user. Finally, using extensive simulations, proposal can achieve much improved efficiency in terms of search functionality and search time compared with the existing proposals. Keywords: Cloud computing, searchable encryption, multi-keyword ranked search, blind storage, access pattern. ![]() |
----- |