IJCT - Volume 3, Issue 4 / July - August 2016
S.No
|
Title/Author Name
|
Page No
|
1
|
Review of Map Reduce Scheduling Algorithms - Anusha Itnal , Sujata Umarani
Abstract
Big data is a technology that refers to massive, intensive data that is changing rapidly. Such diverse and huge volume data is very difficult to handle by present technologies and infrastructures. Hadoop overcomes this drawback with powerful programming model called MapReduce. The implementation of Map Reduce needs storage and parallel processing. HDFS is commonly used for storing and processing of the data. In this paper we suggest various scheduling algorithms for MapReduce that help increase the resource utility and speedup the response time of the system. Each of the algorithms are compared, nature and drawbacks of algorithms are mentioned. Keyword: MapReduce, Hadoop, BigData. × Anusha Itnal, Sujata Umarani "Review of Map Reduce Scheduling Algorithms" Vol. 3 - Issue 4 ( July - Aug 2016), International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
1-5 |
2
|
A New Digital Investigation Frameworks Comparison Method - Omrani Takwa,Chibani Rhaimi Belgacem,Dallali Adel
Abstract
To understand an incident crime case and achieve the consistent electronic evidence, the investigator needs to deal with an investigation tutorial. In this paper, we study and compare some of mainly accepted digital investigation models. Then we check the investigation model accuracy by testing the main rules availability. A new model is developed which merges the former models and seeks to meet some constraints. This can help investigators to achieve electronic evidence in illegal manner and in understandable format to be presented to the court. Keyword: digital investigation model, digital evidence, forensic computer, electronic evidence, electronic crime. × Omrani Takwa,Chibani Rhaimi Belgacem,Dallali Adel "A New Digital Investigation Frameworks Comparison Method" Vol. 3 - Issue 4 ( July - Aug 2016), International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
6-10 |
3
|
Concepts for the Model-Driven Generation of Graphical Editors in Eclipse by Using the Graphiti Framework - Markus Gerhart, Marko Boger
Abstract
Domain-Specific modelling is increasingly adopted in the software development industry. While textual domain specific languages (DSLs) already have a wide impact, graphical DSLs still need to live up to their full potential. In this paper we describe an approach that reduces the time to create a graphical DSL to hours instead of months. The paper describes a generative approach to the creation of graphical editors for the Eclipse platform. A set of carefully designed textual DSLs together with an EMF meta-model are the input for the generator. The output is an Eclipse plugin for a graphical editor for the intended graphical language. The entire project is made available as open source under the name Spray and is being developed by an active community. This paper focuses on the description of the workflow and provides an introduction into the possibilities through this approach of a graphical modelling environment. Keyword: Domain-Specific-Language (DSL), Model-Driven-Development (MDD), Code Generation, EMF, Xtext, Xtend, Graphiti, Spray, Eclipse IDE, Graphical Editors, Eclipse Plugin. × Markus Gerhart, Marko Boger "Concepts for the Model-Driven Generation of Graphical Editors in Eclipse by Using the Graphiti Framework " Vol. 3 - Issue 4 ( July - Aug 2016), International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
11-20 |
4
|
An Industrial Employee Development Application Protocol Using Wireless Sensor Networks - N.Roja Ramani, A.Stenila
Abstract
An research of reliable and timely data transmission is essential for wireless sensor networks (WSNs) employed in scenarios like to information must be available for control development applications. To reach a maximum efficiency, cross layer interaction is a major design paradigm to exploit the complex interaction among the layers of the protocol stack. This is challenging because latency, reliability, and energy are at transmission, and resource constrained nodes support only simple algorithms that ensure give the idea for application protocol services. Keyword: - . × N.Roja Ramani, A.Stenila "An Industrial Employee Development Application Protocol Using Wireless Sensor Networks " Vol. 3 - Issue 4 ( July - Aug 2016), International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
21-25 |
5
|
Mobile APP Recommendation and Discovery of Ranking in Multivariate Time Series - S.Baskaran, V.Anita Shyni
Abstract
The Mobile App is a very popular and well known concept due to the rapid advancement in the mobile technology. Due to the large number of mobile Apps, ranking fraud is the key challenge in front of the mobile App market. Ranking fraud refers to fraudulent or vulnerable activities which have a purpose of bumping up the Apps in the popularity list. While the significance of avoiding such invalid fraud ranking has been generally perceived, there is constrained comprehension and examination here. We validate service integrity by analyzing result consistency information with graph analysis. We design attestation graph analysis algorithm to pinpoint malicious service providers and recognize colluding attack patterns. Our scheme can achieve runtime integrity attestation for cloud dataflow processing services using a small number of attestation data. Thus, our approach does not require trusted hardware or secure kernel co-existed with third-party service providers in the cloud. Keyword: Mobile Apps, Ranking Fraud Detection, Cloud computing, Secured Data Processing . × S.Baskaran, V.Anita Shyni " Mobile APP Recommendation and Discovery of Ranking in Multivariate Time Series " Vol. 3 - Issue 4 ( July - Aug 2016), International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
26-29 |
6
|
Design and Development of Solar based Power Maximization using Solar Tracking System - Bhavana Gujarkar,S.M.Borkar
Abstract
As the renewable sources are whether dependant like it has daily and seasonal patterns which results in difficulties of regulating the output power to cope with the load demand.Combining the renewable energy generation with energy storage bank & ac power from substation will enable the power generated from a renewable energy sources to be more reliable,affordable and used more efficiently.Emergency and standby power systems are designed to provide an alternate source of power if the normal source of power, most often the serving utility, if fails. As reliability of these types of systems is critical and good design practices are essential. RES�s based solar systems are a potentially significant solution to rural ac electricity needs for continuity of electrical supply. In order to increase the efficiency of power we have design module of dual axis solar tracker. Keyword: Motors, Microcontroller , L293D, Relays, Solar Panel. × Bhavana Gujarkar,S.M.Borkar " Design and Development of Solar based Power Maximization using Solar Tracking System" Vol. 3 - Issue 4 ( July - Aug 2016), International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
30-35 |
7 |
Software Program Plagiarism Detection Using Longest Common Subsequence Method - Mahalakshmi S, Kavitha S
Abstract
Software plagiarism is an unlawfully stealing other person source code or program code this become serious issue for common open source program company and other software companies. It violates the logical possessions of software developers and has been a stern problem, diversity from open source code use again, software product theft to smart phone application repackaging. This research is presents new technique for software plagiarism that achieves to compare two programs similarity to find execution path of the program. The proposed system used the symbolic execution and weakest requirement reasoning to capture the semantics of execution paths and to find path distinction. Path Deviation Method is more resilient to current automatic obfuscation techniques, compared to the existing detection mechanisms. In addition, since LCS method is a formal program semantics-based method, it can provide a guarantee of resilience against many known obfuscation attacks. The results indicate that LCS method is both effective and efficient in detecting software plagiarism. Keyword: SCDG, VaPD, DKISB, MOSS,SIM,LCS,PDG,LHMM.× Mahalakshmi S, Kavitha S " Software Program Plagiarism Detection Using Longest Common Subsequence Method " Vol. 3 - Issue 4 ( July - Aug 2016), International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
36-41 |
8 |
Intelligent Automated Sliding Door Robot Control System - Mrs. Sangeetha Lakshmi .G, Ms. Arun kumari .G
Abstract
A location-aware news feed (LANF) system generates news feeds for a mobile user based on her spatial preference her current location and future locations) and non-spatial preference (i.e., her interest). Existing LANF systems simply send the most relevant geo-tagged messages to their users. Unfortunately, the major limitation of such an existing approach is that, a news feed may contain messages related to the same location (i.e., point-of-interest) or the same category of locations (e.g., food, entertainment or sport). We argue that diversity is a very important feature for location-aware news feeds because it helps users discover new places and activities. In this paper, we propose D-MobiFeed; a new LANF system enables a user to specify the minimum number of message categories (h) for the messages in a news feed. In D-MobiFeed, our objective is to efficiently schedule news feeds for a mobile user at her current and predicted locations, such that (i) each news feed contains messages belonging to at least h different categories, and (ii) their total relevance to the user is maximized. To achieve this objective, we formulate the problem into two parts, namely, a decision problem and an optimization problem. For the decision problem, we provide an exact solution by modeling it as a maximum flow problem and proving its correctness. The optimization problem is solved by our proposed three-stage heuristic algorithm. We conduct a user study and experiments to evaluate the performance of D-MobiFeed using a real data set crawled from Foursquare. Experimental results show that our proposed three-stage heuristic scheduling algorithm outperforms the brute-force optimal algorithm by at least an order of magnitude in terms of running time and the relative error incurred by the heuristic algorithm is below 1%. D-MobiFeed with the location prediction method effectively improves the relevance, diversity, and efficiency of news feeds.. Keyword: Location-Aware News Feed (LANF), D-MobiFeed. diversity control, sensor based control, heuristic algorithm.× Mrs. Sangeetha Lakshmi .G, Ms. Arun kumari .G " Intelligent Automated Sliding Door Robot Control System " Vol. 3 - Issue 4 ( July - Aug 2016), International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
42-50 |
9 |
Head Movements Based Control of an Intelligent Wheelchair in a Street Environment - Ms. Sivasankari. A, Mrs. Kavitha .S.K
Abstract
It presents a user-friendly human machine interface (HMI) for hands-free control of an electric powered wheelchair (EPW). Its two operation modes are based on head movements: Mode 1 uses only one head movement to give the commands, and Mode 2 employs four head movements. An EEG device, namely Emotive EPOC, has been deployed in this HMI to obtain the head movement information of users. The proposed HMI is compared with the joystick control of an EPW in a Street environment. The experimental results show that Control Mode 2 can be implemented at a fast speed reliably, achieving a mean time of 67.90 seconds for the two subjects. However, Control Mode 1 has inferior performance, achieving a mean time of 153.20 seconds for the two subjects although it needs only one head movement. It is clear that the proposed HMI can be effectively used to replace the traditional joystick control for disabled and elderly people aim at designing a simple cost-effective automatic wheelchair using MEMS technology for quadriplegics with head and neck mobility. The control system translates the position of the user�s head into speed and directional control of the wheelchair. The system is divided into two main units: MEMS Sensor and programmed PIC Controller. The MEMS sensor senses the change in direction of head and accordingly the signal is given to microcontroller. Depending on the direction of the Acceleration, microcontroller controls the wheel chair directions like LEFT, RIGHT, FRONT, and BACK with the aid of DC motors. Keyword: Human Machine Interface (HMI), electric powered wheelchair (EPW), MEMS, EEG.× Ms. Sivasankari. A, Mrs. Kavitha .S.K " Head Movements Based Control of an Intelligent Wheelchair in a Street Environment " Vol. 3 - Issue 4 ( July - Aug 2016), International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
51-59 |
10 |
Software Susceptibility Forecast Using Attribute Subset Collection and Support Vector Machine - Ms. Asma Banu R., Mrs. Shoba S. A
Abstract
To improve the performance of software engineering processes and imperative to identify and eliminate rework that could have been avoided. While security or its absence is a property of running software many aspects of software requirements, design, implementation and testing contribute to the presence or absence of security in the finished product. Software is continues to function correctly under malicious attack. Verification and validation (V&V) techniques like security testing, code review and formal verification are becoming effective means to reduce the number of post release vulnerabilities in software products. The aim of reduce the dimensionality, removing irrelevant data, increasing learning accuracy and improving result comprehensibility. The feature subset selection algorithm and support vector machine as involves identifying a subset of the most useful features that produces compatible results as the original entire set of features. A feature subset selection algorithm may be evaluated from both the efficiency and effectiveness points of view. A feature subset selection algorithm is used for software vulnerabilities such as verification and validation. The support vector machines are supervised learning models with associated learning algorithms that analyze data and anomaly detection, predict the vulnerabilities in software. The used for classification and regression analysis to result. Keyword: Quality of Software Product, Malicious Attack, Measurement Feature, Testability, anomaly Detection.× Ms. Asma Banu R., Mrs. Shoba S. A " Software Susceptibility Forecast Using Attribute Subset Collection and Support Vector Machine" Vol. 3 - Issue 4 ( July - Aug 2016), International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
60-66 |
11 |
Evaluation of IDE Debugging Tools: ECLIPSE VS NETBEANS - Mrs. Komathi A, Mrs. Shoba. S. A.,
Abstract
The Integrated Development Environment (IDE) provides many debugging tool to limit coding errors and facilitate error correction. It avoids software failure, reduce development and maintenance cost, improve customer agreement and software quality. There are many tools in IDE providing source code editor, build computerization tools and a debugger. Most modern IDEs have quick code completion. Some IDEs contain a compiler, interpreter, or both, such as NetBeans and Eclipse. Both include the concept of plug-ins in that Eclipse was more advantageous than NetBeans, because Eclipse is a complex structure of interconnecting components, delivering all of the functionality. There is literally no monolithic core or base, just a tiny runtime which loads and executes plug-ins. In Eclipse terms: �all is a plug-in�. The compatibility between Eclipse and NetBeans based on these attributes: Complexity, Functionality, Extensibility, Flexibility, and Usability to provide additional sources and to solve specific problems and to increase efficiency, because the programmer spending less time in re-writing code and debugging. It also constructs bug report and the bug tracker using the open source Eclipse Bugzilla project from Mozilla. Keyword: Integrated Development Environment (IDE), Everything is a plug-in, Complexity, Functionality, Extensibility, Flexibility, and Usability× Mrs. Komathi A, Mrs. Shoba. S. A. " Evaluation of IDE Debugging Tools: ECLIPSE VS NETBEANS " Vol. 3 - Issue 4 ( July - Aug 2016), International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
67-73 |
12 |
Dynamic Intrusion Analysis and Imprecise Information Breakthrough of Manet - Mrs. Sandhiya V., Ms. Abarna N.
Abstract
objective is to design and develop an intrusion detection and response model for Mobile Ad hoc Networks (MANET). Mobile ad hoc networks are infrastructure-free, pervasive and ubiquitous in nature, without any centralized authority. These unique MANET characteristics present several changes to secure them. The proposed security model is called the Intrusion Detection and Response for Mobile Ad hoc Networks (IDRMAN). The goal of the proposed model is to provide a security framework that will detect various attacks and take appropriate measures to control the attack automatically. This model is based on identifying critical system parameters of a MANET that are affected by various types of attacks, and continuously monitoring the values of these parameters to detect and respond to attacks. Many number of intrusion detection systems have been discovered to handle the uncertain activity in mobile ad hoc networks. This dissertation emphasized on proposed fuzzy based intrusion detection systems in mobile ad hoc networks and presented their effectiveness to identify the intrusions. This dissertation also examines the drawbacks of fuzzy based intrusion detection systems and discussed the future directions in the field of intrusion detection for mobile ad hoc networks. Keyword: intrusion Detection, Mobile ad hoc Network, Fuzzy Framework, Wireless Sensor Network, clustering, Communication load× Mrs. Sandhiya V., Ms. Abarna N." Dynamic Intrusion Analysis and Imprecise Information Breakthrough of Manet " Vol. 3 - Issue 4 ( July - Aug 2016), International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
74-83 |
13 |
Least Frequent Sip Proxy Based VOIP Using DNS Caching for DOS - Ms. Swathi G.,Ms. Abarna N.
Abstract
We address the issue of a special denial of service (DoS) attack targeting a subcomponent of a Session Initiation Protocol (SIP) based VoIP network. Our focus is fctargeted at attacks that are addressed at the Domain Names Service (DNS). By flooding a SIP element with messages containing difficult-resolvable domain names, it is possible to block the target for a considerable amount of time. We evaluate possibilities to mitigate these effects and show that over-provisioning is not sufficient to handle such attacks. We present results gained from testing with actual SIP providers of a counter solution based on a non-blocking DNS caching solution. Within this cache we evaluate different caching strategies and show that the Least-Frequently-Used caching strategy gives best results to mitigate this kind of attack. (1) LFU policy could help cache to work better than other replacement policies. (2) If there are enough CPU and memory resource, the more parallel processes of SIP proxy, the better performance of SIP proxy. (3) If there are enough CPU and memory resource, the more cache entries, the better performance of SIP proxy. (4) The longer attacking interval, the better performance of SIP proxy. Keyword: intrusion Detection, SIP Proxy, Domain Name System, VOIP , LFU, CPU Performance.× Ms. Swathi G.,Ms. Abarna N." Least Frequent Sip Proxy Based VOIP Using DNS Caching for DOS " Vol. 3 - Issue 4 ( July - Aug 2016), International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
84-93 |
14 |
Automatic Test Packet Generation - Mrs. Vidhya A., Ms. Abarna N.
Abstract
Networks are getting larger and more complex, yet administrators rely on rudimentary tools such as ping and trace route to debug problems. We propose an automated and systematic approach for testing and debugging networks called �Automatic Test Packet Generation� (ATPG). ATPG reads router configurations and generates a device-independent model. The model is used to generate a minimum set of test packets to (minimally) exercise every link in the network or (maximally) exercise every rule in the network. Test packets are sent periodically, and detected failures trigger a separate mechanism to localize the fault. ATPG can detect both functional (e.g., incorrect firewall rule) and performance problems (e.g., congested queue). ATPG complements but goes beyond earlier work in static checking (which cannot detect liveness or performance faults) or fault localization (which only localize faults given liveness results). We describe our prototype ATPG implementation and results on two real-world data sets: Stanford University�s backbone network and Internet2. We find that a small number of test packets suffice to test all rules in these networks: For example, 4000 packets can cover all rules in Stanford backbone network, while 54 are enough to cover all links. Sending 4000 test packets 10 times per second consume less than 1% of link capacity. ATPG code and the data sets are publicly available. Keyword: Automatic Test Packet Generation (ATPG, small number of test packets).× Mrs. Vidhya A., Ms. Abarna N." Automatic Test Packet Generation " Vol. 3 - Issue 4 ( July - Aug 2016), International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
94-101 |
15 |
Tamil Language Support for the Open Source Operating System - K.Ravi Kumar, P.Karthik.
Abstract
We propose in this world widely available Tamil software today is written and documented in English, and uses English as the medium to interact with users and company. This has the advantage of a common language of communication between developers, maintainers and users from different countries. In a country like India, an of the population does not know English. Given this fact, availability of native language software will crucial help as in the process of taking the benefits of the "information revolution" to the marginalized sections of society and to achieve appropriate social use of information technology. Keyword: operating system, key code.× K.Ravi Kumar, P.Karthik." Tamil Language Support for the Open Source Operating System " Vol. 3 - Issue 4 ( July - Aug 2016), International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
102-105 |
16 |
Attacks Identification Detections Based on Disruption Tolerant Networks - A.Senthil Kumar, R.Sathya.
Abstract
Malicious and selfish behaviors represent a serious threat against routing in disruption tolerant networks. Due to the unique network characteristics, designing a misbehavior detection scheme in DTN is regarded as a great challenge. In this paper, we propose iTrust, a probabilistic misbehavior detection scheme, for secure DTN routing toward efficient trust establishment. Selfish node B receives the packets from node A but launches the black hole attack by refusing to forward the packets to the next hop receiver C. Since there may be no neighboring nodes at the moment that B meets C, the misbehavior cannot be detected due to lack of witness, which renders the monitoring-based misbehavior detection less. This research Proposal Further includes The concepts of contact schedules, contact capacity and Link metrics. In addition the proposed aigorithm C T P A B En facilitates encrcyption functionality based on the user needs.The number of users in the DTN is limited and can be scalable in the future. Keyword: layers ,security,attacks.× A.Senthil Kumar, R.Sathya." Attacks Identification Detections Based on Disruption Tolerant Networks " Vol. 3 - Issue 4 ( July - Aug 2016), International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
106-109 |
17 |
A Review and Survey on IOT Techniques for Automating Devices - Rachel Hannah ,Praveen Jayasankar ,Prashanth Jayaraman.
Abstract
Nowadays world of Internet is changing towards Internet-of-Things simply called as IoT, where all things which we use in our day to day life connects to internet and can be monitor & can be operate remotely. IoT has many applications in all domains such as industrial wireless sensor network, smart homes, agriculture, etc. IoT uses standard protocols and predefined architecture for deployment using Smart technologies such as Radio Frequency Identification, Wireless Sensors, Actuators, Zigbee, etc. for communication. Applications of IoT are increasing day by day in many domains. This paper proposed an overview on architecture of IoT and technologies used in IoT. Applications of IoT, Problems in IoT and suitable solutions are also presented in this survey paper. Keyword: Internet of Things (IoT), System Architecture, Radio Frequency Identification.× Rachel Hannah ,Praveen Jayasankar , Prashanth Jayaraman." A Review and Survey on IOT Techniques for Automating Devices " Vol. 3 - Issue 4 ( July - Aug 2016), International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
110-115 |
18 |
A Detection Model For SQL Attacks - Ms. Sangeetha .R, Mrs. Sangeetha Lakshmi G.
Abstract
With the rapid development of Internet, more and more organizations connect their databases to the Internet for resource sharing. However, due to developers' lack of knowledge of all possible attacks, web applications become vulnerable to multiple attacks. Thus the network databases could face multiple threats. Web applications generally consist of a three tier architecture where database is in the third pole, which is the most valuable asset in any organization. SQL injection is an attack technique in which specially crafted input string is entered in user input field. It is submitted to server and result is returned to the user. In SQL injection vulnerability, the database server is forced to execute malicious operations which may cause the data loss or corruption, denial of access, and unauthentic access to sensitive data by crafting specific inputs. An attacker can directly compromise the database, and that is why this is a most threatening web attack. SQL injection attack occupies first position in top ten vulnerabilities as specified by Open Web Application Security Project. It is probably the most common Website vulnerability today. Current scenarios which provide solutions to SQL injection attack either have limited scope i.e. Can�t be implemented across all platforms, or do not cover all types of SQL injection attacks. In this work we implement Message Authentication Code (MAC) based solution against SQL injection attacks. The model works both on client and server side. Client side implements a filter function and server side is based on information theory. MAC of static and dynamic queries is compared to detect SQL injection attack. Keyword: SQL injection, information theory, entropy, web attacks, database security.× Ms. Sangeetha .R, Mrs. Sangeetha Lakshmi G." A Detection Model For SQL Attacks" Vol. 3 - Issue 4 ( July - Aug 2016), International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
116-123 |
19 |
Smart Theft Alert For Android Based Devices - Mrs. Sharmila K., Ms. Sivasankari A.
Abstract
This paper presents a technique to improve anti-theft for android based mobile phones by using different services like MMS instead of SMS. As the use of smartphones, tablets, phablets based on android operating system is increasing, many scenarios related with anti-theft have already been proposed and many software based on anti-theft have also been developed, but most of these software are not freely available and it's difficult to identify the thief by using these software's e.g. GPS Tracking. We put forward a new scheme, which enhances the present scenario, based on new technologies like Multimedia Messages. The scenario proposed in this work is totally dependent on the hardware of your smartphone like camera (front & back) and support for multimedia messages. Once this software is installed, it will work in the background, stores the current SIM number in a variable and keeps checking continuously for SIM change, whenever SIM gets changed from mobile, it will take snapshots and record a video in the background i.e., without taking user permission and then it will send an MMS, and number of snap shots, to an alternate mobile number and an email id, which was provided during installation. The enviable advantage of this software is that it is very easy to configure and it keeps running in the background without interrupting the user. To some extent it helps the owner to identify the thief. Keyword: Android, MMS, Multimedia Messages, Snapshots, Email.× Mrs. Sharmila K., Ms. Sivasankari A." Smart Theft Alert For Android Based Devices " Vol. 3 - Issue 4 ( July - Aug 2016), International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
124-130 |
20 |
A Smart Mobile Apps For Blind User - Ms. Kalpanagayathri M., Ms. Sangeetha Lakshmi G.
Abstract
Although mobile devices include accessibility features available for visually impaired users, the user interface of the majority of the mobile apps is designed for sighted people. It is clear that "Design for Usability" differs depending if the final user is a sighted user or a visually impaired user. This paper introduces the concept of "Low vision Mobile App Portal", which provides a way to access mobile apps specifically designed for visually impaired users. Some design aspects will be described. Preliminary results show some of the low vision controls specifically design for visually impaired users.. Keyword: Design; Mobile App; visually impaired; blind; Usability; low vision mobile portal; accessibility; iOS; iphone.× Ms. Kalpanagayathri M., Ms. Sangeetha Lakshmi G.," A Smart Mobile Apps For Blind User " Vol. 3 - Issue 4 ( July - Aug 2016), International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
130-136 |
21 |
Signature Verification Through Smartphones - Ms. Akila .S, Ms. Siva sankari A.
Abstract
This paper studies online signature verification on touch interface-based mobile devices. A simple and effective method for signature verification is developed. An online signature is represented with a discriminative feature vector derived from attributes of several histograms that can be compact and requires constant space. The algorithm was first tested on the well-known MCYT-100 and SUSIG data sets. The results show that the performance of the proposed technique is comparable and often superior to state-of-the-art algorithm despite its simplicity and efficiency. In order to test the proposed method on finger drawn signature on touch devices, a data set was collected from an uncontrolled environment and over multiple sessions. Experimental results on this data set confirm the effectiveness of the proposed algorithm in mobile settings. The results demonstrate the problem of within-user variation of signature across training strategies to alleviate these problems. Keyword: SQL injection, information theory, entropy, web attacks, database security.× Ms. Akila .S, Ms. Siva sankari A.," Signature Verification Through Smartphones " Vol. 3 - Issue 4 ( July - Aug 2016), International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
137-150 |
22 |
Comparative Study on Wireless Sensor Network Integrated With Cloud Computing Using Middleware Services - Mrs. Elavarasi J, Ms. Lavanya S.
Abstract
Wireless Sensor Networks (WSN) has been a focal point for research for quite a few years. WSN enables novel and attractive solutions for information gathering across the spectrum of Endeavour including transportation, business, health-care, industrial automation, and environmental monitoring. Clouds are mainly used for storage processing that provides infrastructure, applications and infrastructure. While combining these two technology helps in easy management of remotely connected sensor nodes and the data generated by these sensor nodes. In this field WSN integrated with cloud computing that enables several applications. A sensor network is a group of specialized transducers with a communications infrastructure intended to monitor and record conditions at diverse locations. Generally observed parameters are temperature, humidity, pressure, wind direction and speed, illumination intensity, vibration intensity, sound intensity, power-line voltage, chemical concentrations, pollutant levels and vital body functions. Here this research mainly focused to observe the techniques which are proposed N care system with using WSN integrated Cloud in recent years and evaluated with basic outline metrics and compare each system performance based on the different situation.. Keyword: Wireless Sensor Networks (WSN), spectrum, monitoring.× Mrs. Elavarasi J, Ms. Lavanya S.," Comparative Study on Wireless Sensor Network Integrated With Cloud Computing Using Middleware Services " Vol. 3 - Issue 4 ( July - Aug 2016), International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
151-158 |
23 |
Mechanical Engineering in Ancient Egypt: Part XVII: Ladies Headdress in the Old, Middle Kingdoms, Third Intermediate and Late Periods - Galal Ali Hassaan.
Abstract
This research paper explores the role of Mechanical Engineering in the design and production of ladies Headdresses during the Old Kingdom, Middle Kingdom, Third Intermediate and Late Periods of ancient Egypt. The paper shows how ancient Egypt royal and normal ladies loves headdresses as a fashion and the different designs practiced by them through painting scenes, statues and sarcophaguses. The high technology in design and production is highlighted in the models of ladies headdresses presented in the paper from the studied periods from the Old Kingdom to the Late Period except the 18th dynasty which will be covered in a separate research paper Keyword: Mechanical engineering history, ancient Egypt, ladies headdress, Old Kingdom, Middle Kingdom, Third Intermediate Period, Late Period.× Galal Ali Hassaan." Mechanical Engineering in Ancient Egypt: Part XVII: Ladies Headdress in the Old, Middle Kingdoms, Third Intermediate and Late Periods " Vol. 3 - Issue 4 ( July - Aug 2016), International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
159-165 |
24 |
Performance Analysis of Hybrid Mechanism to Improve Reliability in Wireless Sensor Network - Ms. Ramya R, Ms. Lavanya S.
Abstract
A wireless sensor network (WSN) is becoming very popular technology. Wireless networking which is comprised on number of numerous sensors and they are interlinked or connected with each other for performing the same function collectively or cooperatively for the sake of checking and balancing the environmental factors. This type of networking is called as Wireless sensor networking. A wireless sensor network (WSN) consists of a group of self-organizing, lightweight sensor nodes that are used to cooperatively monitor physical or environmental conditions. Each sensor node in a WSN is equipped with a radio transmitter, several sensors, a battery unit and a microcontroller.Because of the size and cost constraints on sensor nodes, they are limited by energy, bandwidth, memory and other resources. Any protocol design for WSNs needs to consider the limitations of sensor nodes carefully. In UWSNs, turbulent conditions of the environments where the sensor nodes are deployed can cause the nodes to die. A contributing effort to explore the reliability issues in multimodal fusion sensor networks. We presented the system reliability for the case of two types of sensors and three types of sensors. WSNs hold the promise of many applications in the area of monitoring and control systems. Many properties of the environment can be observed by the monitoring system with the advent of cheap and tiny sensors. All these applications are meant for the specific purposes, and therefore maintaining data transport reliability is one of the major concern and the most important challenge. To address the reliability, we survey the various existing techniques; each of them has its own unique working to ensure the reliability. Some of the techniques use retransmission mechanism while others use redundant information for insuring the reliability.In the proposed process focus on the routing problem that affects the reliability of WSN. Hereby this problem can be overcome by implementing the Beacon vector routing protocol (BVR) in Hybrid Mechanism. By finding the alternative node in case of any node failure accrues. By this redundancy of information can be reduced and the loss of data can be avoided in Wireless Sensor Network. Keyword: wireless sensor network (WSN), UWSNs, lightweight sensor, Beacon vector routing protocol (BVR), Hybrid Mechanism.× Ms. Ramya R, Ms. Lavanya S." Performance Analysis of Hybrid Mechanism to Improve Reliability in Wireless Sensor Network " Vol. 3 - Issue 4 ( July - Aug 2016), International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
166-173 |
25 |
Method of Image Block Denoising Based on Adaptive Total Variation - PAN Jinquan, CHEN Shun'er, FENG Yuanhua, LIU Weiping.
Abstract
To overcome the shortcomings of traditional total variation (TV) denoising algorithm that is sensitive to noise and easy to blur, we propose an algorithm of image block denoising based on adaptive total variation for the cell image denoising. This algorithm uses image block method to segment cell image into flat region and edged region, then adaptively select the isotropic 2-norm total variation image denoising model for flat region or the anisotropic 1-norm one for edged region according to the local gray mean grads. To solve the border processing problem of blocked image, we just copy the neighboring pixels to fill the image border. Experimental results showed that, when adding Gaussian noise of 0 mean and variance of 0.01 to the blurred image, the method of image block denoising based on adaptive total variation can increase the Peak Signal-to-noise Ratio (PSNR) of the noise image by 10.72dB. Compared with the traditional denoising algorithms, our algorithm can not only preserve more texture details of the edge region, but also efficiently suppress the noise of the flat region, making it more suitable for biomedical cell image denoising. Keyword: Total variation, image denoising, image block, border processing, gray mean grads.× PAN Jinquan, CHEN Shun'er, FENG Yuanhua, LIU Weiping " Method of Image Block Denoising Based on Adaptive Total Variation " Vol. 3 - Issue 4 ( July - Aug 2016), International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
174-179 |
26 |
Shortest Path Based Dynamic Route Adjustment Scheme for Data Collection in a Wireless Sensor Network with a Multiple Mobile Sink - Sanjana B.M , Vikas C. Yatnalli.
Abstract
The load balancing is one of the major constraints in the wireless sensor network. Single mobile sink give rise to the collision, the packet loss and communication delay. Thus usage of two mobile sink based approach is proposed. Identifying the sink location and routing path is the most challenging task in a wireless sensor network. In this scheme based upon the number of nodes, the nodes are divided into clusters, by the common node id and coordinate values the cluster heads will communicate to their respective mobile sink with the shortest routing algorithm. Update information of the sink to every cluster head leads to abundant energy usage and decrease the lifetime of the network, which is overcome in this approach. Proposed method performance is compared with the current approach named EECLA .Simulation results show that there is a vast improvement in the lifetime of the wireless sensor network when compared with the existing scheme.. Keyword: Wireless sensor network, mobile sink, cluster head, energy hole.× Sanjana B.M , Vikas C. Yatnalli." Shortest Path Based Dynamic Route Adjustment Scheme for Data Collection in a Wireless Sensor Network with a Multiple Mobile Sink " Vol. 3 - Issue 4 ( July - Aug 2016), International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
180-185 |
27 |
Neural Networks for Location Prediction in Mobile Networks in AES Techniques - Pavithra R , Shahin A.
Abstract
This paper addresses efficient hardware/software implementation approaches for the AES (Advanced Encryption Standard) algorithm and describes the design and performance testing algorithm for embedded system. Also, with the spread of reconfigurable hardware such as FPGAs (Field Programmable Gate Array) embedded cryptographic hardware became cost-effective. Nevertheless, it is worthy to note that nowadays, even hardwired cryptographic algorithms are not so safe. From another side, the self-reconfiguring platform is reported that enables an FPGA to dynamically reconfigure itself under the control of an embedded microprocessor. Hardware acceleration significantly increases the performance of embedded systems built on programmable logic. Allowing a FPGA-based MicroBlaze processor to self-select the coprocessors uses can help reduce area requirements and increase a system's versatility. The architecture proposed in this paper is an optimal hardware implementation algorithm and takes dynamic partially reconfigurable of FPGA. This implementation is good solution to preserve confidentiality and accessibility to the information in the numeric communication.any node failure accrues. By this redundancy of information can be reduced and the loss of data can be avoided in Wireless Sensor Network. Keyword: Cryptography, Embedded systems, Reconfigurable computing, Self-reconfiguration.× Pavithra R , Shahin A." Neural Networks for Location Prediction in Mobile Networks in AES Techniques " Vol. 3 - Issue 4 ( July - Aug 2016), International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
186-194 |
28 |
Robot Based Wireless Monitoring and Safety System for Human Detection in Rescue Operation of Disaster - Ms. Sivasankari A.,Ms. Deepika R.
Abstract
The robot built on the USAR team is capable of navigating the difficult terrain of a disaster site but lacks sensors for victim detection. The contribution of this work is to provide a sensor suite for human detection and Accident Detection in the urban disaster environment. Underground communication is necessary to monitor underground environmental parameter such as temperature, Humidity, toxic gas etc. and take necessary actions accordingly to avoid any types of hazard. Its purpose is to find and locate human victims who have been trapped by rubble inside damaged buildings. Conditions in a disaster area are extreme with many unknown parameters. Victims may be covered in debris, trapped in voids, or entombed, making it difficult to find them and determine their state of health. This is why it will be important to choose a set of different sensors which are complementary and able to operate in these conditions.This research consists of three main parts. The first step will be to determine the state of the art in USAR robotics, with special emphasis on sensors for victim detection. Next, a set of appropriate and complementary sensors will be selected in accordance with chosen criteria, mainly that the sensors be low-cost and lightweight.The selected sensors will be integrated with the USAR robot. This involved developing hardware and low level data acquisition software solutions. Tests will be used to determine the robustness, limitations, and accuracy of each sensor and this data will be used to develop a comprehensive system that fuses the information from all the sensors to determine the location and probability of human presence. Finally, a graphical user interface will be developed to provide useful information back to the human operator while allowing the user the power to interact with individual sensors. Keyword: USAR team, disaster, Accident Detection, USAR robotics.× Ms. Sivasankari A.,Ms. Deepika R." Robot Based Wireless Monitoring and Safety System for Human Detection in Rescue Operation of Disaster " Vol. 3 - Issue 4 ( July - Aug 2016), International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
195-201 |
29 |
WAR Field Spying Robot Dissertation - Mrs. Sangeetha Lakshmi G, Ms. Nisha .S
Abstract
With the aim of the satisfying and meeting the changing needs of human from manufacturing unit to the household unit robotics and automation has been a distinct key player throughout. This research focuses on building a RF based spying robot attached with PIR Sensor that can reduce the human victim. This robot sends the signal to the base station using PIR Sensor. One of the major applications of this research can be analyzed using android based smart phone. The robot sends the signal to the RF receiver mounted on the robot via RF transmitter at the base station. With this feature the robot can transmit real time videos with night vision capabilities and cannot be identified by the enemies in war zone. The spying robot as its name suggests in the one used for the purpose of spying on enemy territories. Its applications can be at the time of war where it can be used to collect information from the enemy terrain and monitor that information at a far secure area, and safely devise a plan for the counter attack. Tracking locations of terrorist organizations and then plan attack at suitable time. Making a surveillance of any disaster affected area where human beings can�t go. Keyword: RF receive, RF transmitter, tracking locations, PIR Sensor.× Mrs. Sangeetha Lakshmi G, Ms. Nisha .S" WAR Field Spying Robot Dissertation " Vol. 3 - Issue 4 ( July - Aug 2016), International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
202-210 |
30 |
Wild Animal Monitoring Using Sensor Networks - Mrs. Sharmila K., Ms. Sivasankari A.
Abstract
Monitoring wild animals, especially those that are becoming endangered (for example, lynxes and wolves) is important for biology researchers. Solutions for the monitoring already exist; however, they all have drawbacks, such as limited range or lifetime, sensing modality, reporting delays, unreliability of operation. In this work we describe our experiences in designing an improved animal monitoring sensor system and low-level software for sensor node control and communication. The target animals for this particular research are wild lynxes or canines; however it can be extended to other animal species.The LynxNet system is based on tracking collars, built around TMote Mini sensor nodes, sensors, GPS and 433MHz radio, and stationary base stations, placed at the locations that are frequented by the animals. We present preliminary field results of our radio communication range tests. Keyword: Monitoring wild animals, low-level software, LynxNet system, sensors, GPS and 433MHz radio.× Mrs. Sharmila K., Ms. Sivasankari A." Wild Animal Monitoring Using Sensor Networks " Vol. 3 - Issue 4 ( July - Aug 2016), International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
211-217 |