Volume-4 Issue-2 (March 2016)
Title: Recent Research Work on Ad-Hoc Networks: A Literature Survey
Authors: Jay Kumar Jain and Dipti Chauhan
Abstract: Wireless devices are getting more and more popular these days. Manufacturers are expecting high demand for wireless technologies in the coming days. This high demand is increasing pressure on researchers to come up with viable solutions that can meet the demands of the market. The challenges which are being faced in this research area have many faces. Wireless Ad hoc networks are networks in which communication links are based on wireless technologies and the network structure or topology is not pre-defined rather build through dynamic network connectivity. The three common sub types of these networks are Internet of things, Mobile Ad hoc Networks (MANETs), Flying Ad-Hoc Networks (FANETs), and Vehicular Ad Hoc Networks (VANETs). This paper presents an overview of issues related to provide a basis for discussing open research problems in IoT, MANETs, VANETs and FANETs.
Click Here to Download Pdf
Title: A Survey on Improved Authentication Systems for Android Smartphone User
Authors: Miss. Manisha K. Kharare
Abstract: Smartphone and tablets are convenient, but as the devices start to contain increasing amounts of important personal information, good security is required. Security systems are rapidly being developed, as well as solutions. However, even with these solutions, some major problems could still result after a mobile device is lost. In this thesis, we present our upgraded Lock Screen authentication system, which is able to support userís convenience and provide a good security system for Smartphone. In these paper we also suggest an upgraded authentication system for Android Smartphone [1].
Click Here to Download Pdf
Title: A Survey: defining Software-Defined Networking
Authors: Miss. Varsha S. Tilwani and Prof. R. R. Singh
Abstract: Emerging mega-trends (e.g., mobile and big data) in information and communication technologies (ICT) are commanding new challenges for which universal accessibility, high bandwidth, dynamic management etc, are crucial. However, traditional approaches based on manual configuration of proprietary devices are heavy weighted and error-prone and they cannot completely utilize the capability of physical network infrastructure. Recently software-defined networking (SDN) has been carried as one of the most effective solutions for future Internet. SDN is characterized by its two distinguished features like decoupling the control plane from the data plane and giving program-ability for network application development. As a result Software Defined Networking is positioned to provide more efficient configuration, better performance and higher flexibility to accommodate innovative network designs.
Click Here to Download Pdf
Title: An Overview on Security Issues in Mobile Commerce
Authors: Ankita Kiran Morey and Yogesh S. Patil
Abstract: Mobile devices and Internet has changed the way of buying and selling products. Mobile commerce and wireless devices are the reason behind the revolution in the world of commerce. People are using mobile devices more as use of Internet based wireless devices skyrockets. Many applications and app stores have been developed to meet demands for games, applications and other services. Besides this, the pace of m-commerce has slowed down due to issues such as privacy, security, and usability among sellers as well as buyers. Mobile commerce is also called as ecommerce i.e. electronic commerce or m-commerce that is performed using mobile devices. For keeping users details secret, high security must be ensured.
Click Here to Download Pdf
Title: Study of Comparison of Sift, Surf and Orb Algorithm
Authors: Gurmeet Kaur Saini and Manish Mahajan
Abstract: Digital image editing skills becomes very popular and digital image manipulation becomes convenient and easy. Information delivered in images might become no longer believable. Digital images can be tampered very easily due to availability of various images editing software and it can be done in very efficient manner without leaving any visual clue. Thus it is necessary to certify the integrity and originality of images. One of the most common tampering technique is copy-move forgery. In copy-move forgery, some content of the given image is copied and pasted in another part of the same image. This paper summarizes the performance of three forgery detection algorithms namely SIFT, SURF and ORB on several classification datasets. Experimental results help to analyses the effectiveness of these algorithms.
Click Here to Download Pdf
Title: A Data Security Using Mutual Trust Based Model in Cloud Computing
Authors: Vishakha Shivdas Bornare
Abstract: Cloud computing provides an effective way of sharing resources and data to multiple users. Open cloud computing environment does not support identity based security. Cloud data leakage is a top issue in cloud security and trust. A mutual trust relationship between cloud users & cloud nodes is the key to maintain security in cloud computing environment. Here, mutual trust based model considers user's behavior trust and ensure that user's access to cloud server is not malicious, and also takes cloud service node's credibility into account .Trust relationships between users and cloud service nodes are established by mutual trust mechanism. It focuses on system integrity & its security.
Click Here to Download Pdf
Title: Comparative Study of Image Restoration Techniques
Authors: Aarti Dogra and Isha Vats
Abstract: In the recent years many image restoration algorithms are implemented. Under Image Processing Image Restoration is to recover an original and sharp image from a degraded image via mathematical degradation and with the help of restoration model. Images are often degraded during the data acquisition process. Degradation comes in the form of blurring, information loss due to sampling, quantization effects, and various sources of noise. This study focuses on restoration of degraded images which have been blurred by known or unknown degradation function, so image restoration techniques can be divided into two categories: blind and non-blind techniques. In this image formats .tif(Tag Index Format) is considered for analyzing the various image restoration techniques like Deconvolution using Weiner Filter (DWF), Regularized Filter (DRF) and Lucy Richardson Algorithm (DLR), Blind Image Deconvolution Algorithm (BID)and Expected Patch Log Likelyhood(EPLL). Various performance metrics like MSE (Mean Square Error) , RMSE( Root Mean Square Error), PSNR(Peak Signal to Noise Ratio), are taken into account for analysis.
Click Here to Download Pdf
Title: Improving Performance of MANETS Using MCB Driven AOMDV
Authors: Preeti Aggarwal and Pranab Garg
Abstract: MANET has received the significant attention in every field of Information and Communication Technology industry. The nodes in Mobile Ad hoc networks continuously move leading to randomly changing topology which further leads to many problems such as link breakages and loss of packets sent by the source node to the destination. In this thesis work, a MCB driven AOMDV protocol is proposed to avoid the problem of link breakages and to enhance the performance of MANETS .The proposed scheme MCB (Mobility Coordinate Based Method) has been designed using the coordinate based method and the mobility of the nodes. The motive is to reduce the amount of the broadcasting of the route request messages and to reduce the link breakages in the network by taking into consideration the coordinates and mobility of nodes. The thesis work has been implemented using NS-2 simulator. The proposed approach gave improved results in terms of Energy Consumption, Routing Overhead, Delay and Throughput when compared with results of existing one.
Click Here to Download Pdf
Title: Double Verification Method to Detect Black Hole Attack in MANET Using DSR Protocol
Authors: Manu Garg and Pranab Garg
Abstract: Mobile Ad-Hoc Networks are independent and decentralized wireless systems. MANETs comprise of mobile nodes that are free to move in and out in the network. Nodes are the devices that are mobile and that participate in the networks such as mobile phone, laptop, personal digital assistance and personal computer. The nodes in Mobile Ad hoc networks continuously move leading to randomly changing topology which further leads to many problems such as malicious node present in the network and loss of packets sent by the source node to the destination. In this thesis work, with the help of Double verification method enabled DSR protocol, these problems can be avoided to a great extent. This research work poses analysis of double verification method to detect black hole attack by using DSR protocol. The proposed scheme was designed using the ratio method and sequence method. The motive is to reduce the amount of the broadcasting of the route request messages and to detect black hole nodes by consideration the ratio and sequence method. The thesis work has been implemented using NS-2 simulator. The proposed approach gave improved results in terms of Energy Consumption, Routing Overhead, Delay and Throughput when compared with results of existing one.
Click Here to Download Pdf
Title: Adaptive Indoor Scene Recognition with Multi-objective Analysis
Authors: Japneet kaur and Rimanpal kaur
Abstract: In recent years, indoor scene recognition has emerged as the popular research area, and a number of researchers have started working upon the development and improvement of the various algorithms. The researchers have utilized various machine learning methods over the indoor scene data to recognize the indoor scenes effectively. Especially, indoor scene recognition is an important part of computer vision and feature recognition as the first step of automatic uninterrupted robotic movement or computer vision applications like automatic interior designing algorithms. However, because of variations of image appearance indoor scene detection is not straightforward, such as light effect, occlusion, image orientation, illuminating condition and object variety. Number of techniques has been proposed to resolve the above listed variations. For example, the template-matching ways area unit used for indoor scene localization Associate in Nursing detection by computing the correlation of an input image to a customary and coaching scene look or pattern. The feature invariant approaches area unit used for feature detection of bed, chair, cabinet, table, door, electrical or electronic things, etc. The appearance-based ways area unit used for indoor feature detection with support vector machine and information-theoretical approach. However, implementing the ways altogether remains an excellent challenge. Fortuitously, the photographs employed in this project have some extent of uniformity so, the detection formula is often simpler: 1st, the all the faces area unit vertical and have frontal view; second, they're beneath nearly identical illuminate condition. This project presents an indoor scene detection technique mainly based on the appearance based feature segmentation, SVM training and SVM classification methods to recognize the indoor scenes. The proposed model results have been obtained in the form of various performance parameters. The experimental results have shown the effectiveness of the proposed model in comparison with the existing models.
Click Here to Download Pdf
Title:Privacy-Preserving Detection of Packet Dropping using Dynamic Link State Routing Path Algorithm
Authors: Dr S.Mythili and T.Ramjan begam
Abstract: In distributed wireless network, Link based connectivity problems and cruel packets falling are source factors for packet losses. The packet falling time is equivalent to the channel distribution fault rate. It is based on noticing the message failure rate and does not reach the acceptable truthfulness. To improve the truthfulness, in this paper proposed a privacy preserving to develop the correlations between connectivity and packet losses. The proposed system can find the correlation, extend a dynamic linkage state routing protocol (DLSRP) based dynamic routing privacy preserving protocol structural design that permits to authenticate the reliability of the packet (message) loss information and it can distributed by mobile nodes. Through the simulations, the system verifies and achieves extensively improved discovery accuracy across the previous techniques such as homomorphism linear authenticator based detection.
Click Here to Download Pdf
Title: Multi feature amalgamation using the robustpose invariant face recognition
Authors: Rimanpal kaur and Priya Thakur
Abstract: The face recognition methods utilize the pre-stored face samples for the person recognition. The face recognition method works on the basis of feature extraction and feature classification. The robustness, accuracy of useful information and memory size affects the performance of the face recognition methods in the variety of factors. The proposed model will utilize the combination of difference of hessian based speeded up robust features and fast retina key points for the robust local features of face region. The angular information or rotation of the face is calculated by using the Zernike moments to obtain the degree or radian of face rotation from the frontal view. The robust combination of angle invariant and scale invariant features with the combination of ZM, SURF and FREAK has been proposed with the support vector machine classification. The experiments will be performed on the variety of datasets. The multi-object datasets will be tested in the proposed model to evaluate its performance in the real-terms. The proposed model will be tested with the FERET, CMU PIE, Multi PIE face database and our customized dataset of faces with 100 or more subjects. The proposed model performance will be evaluated in the terms of accuracy, precision recognition ratio. The experimental results will be evaluated to recognize the results of the proposed model and it has been found effective in protecting the multiple entity based user recognition using the multi feature amalgamation based approach.
Click Here to Download Pdf
Title: An optimized algorithm to select the appropriate schema in data warehouses
Authors: Swati Ambasta
Abstract: The successful organization is the result of the successful decisions made by the top management. These are the collaborated decisions and require a lump sum data or the consolidated view of organization, which is provided by data warehousing system. These systems are used as an organization repository to support strategic decision-making. Data schema represents the arrangement of fact table and dimension tables and the relations between them. In data warehouse development, selecting a right and appropriate data schema (Snowflake, Star, Star Cluster etc.) has an important Impact on performance and usability of the designed data warehouse. One of the problems that exist in data warehouse development is lack of a comprehensive and sound selection framework to choose an appropriate schema for the data warehouse at hand by considering application domain-specific conditions. This research work, presents a stepwise algorithm for schema selection, which solves the problem of choosing right schema for a data warehouse. The main selection criteria are query type, attribute type, dimension table type and existence of index. Authors also tried to describe efficient way of answering queries that are coming from multiple classes of users.
Click Here to Download Pdf
Title: A Survey of Controlling Remote Systems with Hand Gesture
Authors: Miss. Vinita Shivdas Bornare and Prof. R. A. Agrawal
Abstract: Managing the home appliances and electronics tools by an Infrared remote control is now in general. But the same controlling tasks can be done more easily without using any remote or appliances. The general inspiration of proposing the new system of hand gesture control is to get rid from the use of any type of remote and to search for a specific key for specific function. Any movement within the range of the PIR sensors are first searched by the sensors and then checked if it is, a hand gesture or not, by using camera. If the movement is cause of hand, one-dimensional continuous-time signals extracted from the PIR sensors which are used to recognize the hand movements. This is a probable solution to control the tools for actually disable and sightless persons.
Click Here to Download Pdf
Title: Performance Investigation of Spectrum Sensing Methods in Cognitive Radio Networks for Effective Spectrum Utilization
Authors: Prof. Priyanka V. Ahire, Prof. Swapnil R. Kurkute and Prof. Bharat D. Deore
Abstract: Cognitive radio (CR) can lucratively deal with the existing demand and scarcity of the wireless spectrum for different wireless applications. To exploit limited spectrum efficiently, CR technology allows unlicensed users to access licensed spectrum bands opportunistically. Since licensed users have priorities to use the bands, the unlicensed users need to continuously monitor the licensed userís activities to avoid interference and collisions. Based on the sensing results, the unlicensed users should adapt. The spotlight of this paper is to present the performance of the different spectrum sensing methods namely Energy detection (ED), Matched filter detection (MFD), Cyclostationary feature detection (CFD), Maximum eigenvalue to Minimum eigenvalue ratio detector (ERD) and one proposed modification is mean eigenvalue ratio detector (MERD). Comparative analysis has been carried out and presented with measurement metrics like Probability of Detection (Pd), Probability of False Detection (Pfa) and Probability of miss Detection (Pmd). The analysis of the result indicates ERD method performs better for probability of detection ( Pd ) than remaining techniques, but performance is poor for probability of false detection ( Pfa ) .This is limitation in CR system because it can be create interference with PU. The proposed MERD method performs better for probability of false (Pfa ) than ERD and also has the advantages of ERD & ED methods.
Click Here to Download Pdf
issn
Announcements
IJMCSA  IJMCSA

Submit your Paper Last date 20th November 2018http://www.ijmcsa.com/submit_your_paper

IJMCSA  IJMCSA

Volume-6 & Issue-1 Published http://www.ijmcsa.org/current_issue

IJMCSA  IJMCSA

Submit your Paper Last date 20th March 2018http://www.ijmcsa.com/submit_your_paper

IJMCSA  IJMCSA

Volume-5 & Issue-4 Published http://www.ijmcsa.org/current_issue

IJMCSA  IJMCSA

Volume-5 & Issue-3 Published (Acceptance Ratio=33%) http://www.ijmcsa.org/current_issue

IJMCSA  IJMCSA

Volume-5 & Issue-2 Published (Acceptance Ratio=27.27%) http://www.ijmcsa.org/current_issue

IJMCSA  IJMCSA

Volume-5 & Issue-1 Published (Acceptance Ratio=75%) http://www.ijmcsa.org/current_issue

IJMCSA  IJMCSA

Volume-4 & Issue-6 Published (Acceptance Ratio=32%) http://www.ijmcsa.org/current_issue

IJMCSA  IJMCSA

Volume-4 & Issue-4 Published (Acceptance Ratio=54.02%) http://www.ijmcsa.org/july_issue

IJMCSA  IJMCSA

Volume-4 & Issue-3 Published (Acceptance Ratio=47.22%) http://www.ijmcsa.org/may_issue

IJMCSA  IJMCSA

Volume-4 & Issue-2 Published (Acceptance Ratio=52.17%) http://www.ijmcsa.org/march_issue

IJMCSA  IJMCSA

Volume-4 & Issue-1 Published (Acceptance Ratio=40.90%) http://www.ijmcsa.org/january_issue

IJMCSA  IJMCSA

Volume-3 & Issue-3 Published (Acceptance Ratio=18%) http://www.ijmcsa.org/current_issue

impact factoor
open access
-------------------------------------------------popup-------------------------------------------->