IJCT - Volume 3, Issue 6 / November - December 2016
S.No
|
Title/Author Name
|
Page No
|
1
|
Congestion Control and Avoidance Using TCP-VEGAS in Adhoc Social Network - E.Praisy , C.Gopala krishnan
Abstract
Ad-hoc Social Network (ASN) is a mix of social network and ad-hoc network. Today most of mobile phones are provided with Bluetooth, Wi-Fi, and Cellular radio and able to support ad-hoc communication mode. Communications between nodes in Ad-hoc Social Networks (ASNETs) based on the nodes� social features like social graph, human mobility pattern, similarity, centrality, community, and their strength. However, with increasing growth of social networks, reliable and congestion-free communication becomes difficult due to its complexity and dynamic nature of user movement. The existing system control overhead and provide reliable transmission for popular packets in ad-Hoc social networks. However, this solution is not suitable for ASNETs where the allocation of bandwidth is based on social popularity of nodes. In order to make efficient use of bandwidth, a newest version of TCP named TCP Vegas is used to estimate the available bandwidth using bandwidth estimation scheme. This scheme improves transmission reliability by assigning bandwidth to users based on their popularity levels. Keyword: Mobile node, Ad-hoc network, availability, mobile nodes, round trip time, degree centrality, collision avoidance, TCP Vegas. × E.Praisy , C.Gopala krishnan"Congestion Control and Avoidance Using TCP-VEGAS in Adhoc Social Network" Vol. 3 - Issue 6 ( November - December 2016), International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
1-4 |
2
|
Detecting and Analyzing Password Database crack Using Honeyindex - Priyanka Anil Ghule, Prof. Sonali Bhutad
Abstract
In the honeywords approach default passwords are used to detect attacks against hashed password databases. For each user account, the list of password is stored with several honeywords. If honeywords are selected properly, an attacker who steals a file of hashed passwords cannot be sure if it is the real password or a honeyword for any account. Login with a honeyword will trigger an alarm notifying the administrator about a password file breach. At the expense of increasing the storage requirement, the honeyindex system is an effective solution to the detection of password file disclosure events. Also, as this approach uses existing user index as a honeyindex of other user it reduce storage cost as compare to honeyword scheme. Keyword: Honeyindex, honeywords, passwords, password cracking, chaffing, login, authentication. × Priyanka Anil Ghule, Prof. Sonali Bhutad"Detecting and Analyzing Password Database crack Using Honeyindex" Vol. 3 - Issue 6 ( November - December 2016), International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
5-11 |
3 |
Distributed database system on web server: A Review - Kirandeep kaur, Harwant Singh
Abstract
A Distributed System is the one in which hardware and software mechanism at networked computers communicates and coordinates their movement only by passing messages. A distributed database management system (DDBMS) consist of a single logical database that is divided into a number of splinter ,each splinter is stored on more than one computers under the control of separate DBMS, with the computers connected by a communication network. Each site is able of in parallel processing user requests that require access to local data and capable of processing data stored on other computers in the system. This paper presents an overview of Distributed Database System along with their characteristics. This paper also provides various aspects like degeneration, easily availability of data through web server and safety in distributed database systems. Keyword: Database, Distributed Database Management System, Fragmentation, Replication, web services and web security. × Kirandeep kaur, Harwant Singh"Distributed database system on web server: A Review" Vol. 3 - Issue 6 ( November - December 2016), International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
12-16 |
4 |
Exploiting Semantic Web Technology for Personalized Recommendation System - Preeti Deshmukh, Shivani Deosthale, Lukesh Kadu
Abstract
World Wide Web makes a revolution on information sharing. People could search any kinds of information from Internet and create their own web sites. However, with the increasing of information published on the Internet, the problems of redundant data, error data and incomplete data come up, which leads to the challenge of information retrieval accuracy. Users need help to search and to filter out irrelevant information based on their demand.In this Paper an approach for Semantic Recommendation system which uses Page rank based on links between Web pages, to compute relevance to user search query. It works on the assumption that a well-designed Webpage should have an informative title. The user search terms are mapped to the refined URL's extracted from the Google Server. These terms in a user query have a different degree of importance based on whether they occur inside title, description or anchor text of the document. Recommendation system has to find the relevant Web pages and prioritize them. Therefore an optimal weighting scheme for these components is required for search engines to prioritize relevant documents near the top for user searches. Personalized Recommendation System provides other user with a recommendation results for based on the common shared search queries. Keyword: Term Extraction, Concept Extraction, Semantic web, Web Usage and Domain Knowledge. × Preeti Deshmukh, Shivani Deosthale, Lukesh Kadu"Exploiting Semantic Web Technology for Personalized Recommendation System" Vol. 3 - Issue 6 ( November - December 2016), International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
17-22 |
5 |
Toward Instantaneous Facial Expression Recognition Using Privileged Information - Michele Mukeshimana, Xiaojuan Ban, Yitong Li
Abstract
The Facial Expression Recognition is one of determining factors in automatic recognition of humans� emotion. There are many works done in Facial Expression Recognition research, yet it has been difficult to build real-time and robust systems. This paper proposes the use of a classifier trained by Extreme Learning Machine to solve the speed issue, combined with the use of privileged information to improve the testing time and the reduction of the testing error. The study is done on features differently extracted from still facial datasets. The experimental results show that the proposed method improves the testing time making it feasible in real-time applications and more stable than the classical method, with time improvement reaching 25%. Keyword: Emotion recognition, Extreme Learning Machine, Learning Using Privileged Information, Facial Expression Recognition, Machine Learning, Real-Time Execution time. × Michele Mukeshimana, Xiaojuan Ban, Yitong Li"Toward Instantaneous Facial Expression Recognition Using Privileged Information" Vol. 3 - Issue 6 ( November - December 2016), International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
23-29 |
6 |
Secure Data Aggregation Using Multi objective Metaheuristic Approach for WSN - Jaybhaye Chaitali ,P.M.Pawar
Abstract
Wireless Sensor Network is consisting of group of sensor nodes which are able to sense data and to convey sensed information to the base station. Sensor nodes have finite energy and finite memory. For improving the life of sensor node it is essential to minimize the communication process. Data Aggregation is the useful method for extending the life and minimizing communication. Data aggregation combines the data from various nodes and summarizes the data. Sensor nodes convey aggregated data using wireless medium Sensor nodes are placed in the hostile and inaccessible areas the security is necessary factor. There is a possibility of attacks for this confidentiality integrity of data is necessary. So security is required for data aggregation for reliable data. This paper discusses the Multiobjective optimization and Metaheuristic approach to provide secure data aggregation. Keyword: Data Aggregation, Secure data aggregation, Multi object, Meta heuristic. × Jaybhaye Chaitali ,P.M.Pawar"Secure Data Aggregation Using Multi objective Metaheuristic Approach for WSN" Vol. 3 - Issue 6 ( November - December 2016), International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
30-34 |