Volume-4 Issue-3 (May 2016)
Title: A Review on Multicasting Routing Protocols in MANET
Authors: Arshta Kaur and Ms. Gurmeen Kaur
Abstract: MANET is a mobile adhoc network that has the capability or changing its location and configuring itself as per the needs and requirements of the user on the go. A MANET is quite difficult to control in terms of its routing protocol as there is no fixed terminology that can be implemented onto it for the optimal transfer of the data from the source to the destination. In this paper we have discussed various routing protocols of MANET. Furthermore multicast routing protocols and its sub categories has been discussed.
Click Here to Download Pdf
Title:Survey of UDP, TCP for video streaming in WiMAX
Authors: Gurmandeep Kaur, Navneet Kaur and Pardeep Singh Tiwana
Abstract: WSN (Wireless Sensor Network) is produced using a huge number of nodes, in which every node is associated with one or more sensors. The uses of WSNs are area monitoring, health care monitoring, industrial monitoring, video surveillance and so forth. UDP is better than TCP for video streaming over WiMAX, because UDP has quicker speed for sound or video transmission. Also UDP doesnít perform retransmission and error recovery, both are useful for delay sensitive applications. In this paper we study diverse transport layer protocols like TCP, UDP for video streaming over WiMAX.
Click Here to Download Pdf
Title: A Survey on Multiplicative Watermark Decoder in Contourlet Domain
Authors: M.Mangaiyarkarasi and Dr.R.Gunavathi
Abstract: Digital watermarking has been projected as a process of copyright protection of text, images, audio and video. We suggest using the recently established transform used in two dimensional signals called contourlet transform designed for image watermarking application. Although high frequency components are appropriate for robustness, invisibility criterion forces that pixel selection is based on pure high frequency consideration to further parameters. Contourlets can decompose the image into directional subbands and its number of directions can be chosen according to the requirement. The result shows that contourlet is an effective representation for watermarking images most of them containing lot of texts, graphs and curves. Since human visual system is little sensitive to the edges of image, watermarking technique is used in contourlet domain, which describe the edges of the image sparsely. Contourlet transform afford a flexible multiresolution representation of the images. The exclusive properties of contourlet transform are that we can identify the number of directional decompositions necessary for each and every stage of multiresolution pyramid.
Click Here to Download Pdf
Title: Study the impact of different attacks on Zone routing protocol in MANET
Authors: Pardeep Singh Tiwana, Nafiza Mann and Gurmandeep Kaur
Abstract: MANETs are the rising innovation nowadays. ZRP (zone routing protocol) is one of the hybrid routing protocol. From the security angle each convention should be more secure for information transmission. In this paper, ZRP is inspected and contrasted and different security attacks for parameters, for example, PDR (Packet delivery ratio), throughput. These parameters are inspected for the ns2.
Click Here to Download Pdf
Title: Armitage: A Penetration testing tool to evaluate Destructive Vulnerabilities
Authors: Er. Gurjot Singh and Mandeep Kaur
Abstract: A penetration test is performed on an organization with the intention of finding security weaknesses, potentially gaining access to it, to determine its functionality and data. Penetration testing is a specialized security auditing methodology wherever a tester simulates an attack on a computer system. The goal of penetration testing is not to cause damage, but to determine attack surfaces, vulnerabilities and other security weaknesses from the attacker's point of view. Such testing can vary across all aspects of a system; the areas of computer, operational, personnel, and physical security may include potential weaknesses that a malicious attacker can exploit, and therefore a penetration tester might examine them. Depending on the organization's priorities, risk assessment, and policies, some of these areas may be out of scope or not deemed as important, therefore a reduced scope penetration test may be conducted. The aim of this paper is to provide an overview of the application of penetration testing and the network related critical vulnerabilities like DNS vulnerability that affects/destroys the critical information of particular organization and also presents the literature regarding these vulnerabilities.
Click Here to Download Pdf
Title: Overview of types of attacks in VANET
Authors: Samiksha, Anit Kaur and Harmanpreet Kaur
Abstract: VANET stands for Vehicular Ad hoc Networks. It comes under Mobile Ad hoc Networks popularly known as MANET. VANET serves various applications like data traffic, internet connectivity, real time movement, post crash notification and many more. It serves both safe and non-safe applications due to which concern for security is must. Many attacks have been introduced in wireless sensor network among which Sybil attack is common .Sybil attacks have been regarded as a serious security threat to Ad hoc Networks. In Sybil attack, the attacker generates multiple identities to simulate multiple hops.
Click Here to Download Pdf
Title: Discovery of Image Mining used Brain Tumor using Improve Accuracy and Time (ANGIOGRAPHY)
Authors: Prof P.Senthil
Abstract: This article discovers the leeway of applying modus operandis for segmenting the regions of medical image.Brain tumor is lone of the calculated diseases, reasons death among the people. Image minging using imaging techniques like CT scan (Computed Tomography) and MRI (Magnetic Resonance Images) are used for analysis the brain tumor. Here in this article a computer based system is intended for the discovery of brain tumor from the MRI images. This system consists following steps feature extraction and classification. The extraction of features from the MRI images has been achieved by Raster image formats (RIFs) using BigNeuron. Then these extracted features are employed in neural network and support vector machine CUDA algorithms respectively. This system gives efficient improve accuracy and time in the detection of brain tumor.
Click Here to Download Pdf
Title: A Review on Design Approach for Inter Vehicular Communication in ITS
Authors: Prof.P.P.Ashtankar, Ms.Pallavi M.Tayade and Dr.Sanjay S. Dorle
Abstract: For effectively assess the intelligent transportation system some safety metric estimate is one of the major challenge in vehicular networking research. Our focus is in using Inter-vehicular Communication (IVC) beaconing for increasing driver safety. In several study by vehicular networking community reported that to evaluate safety enhancing protocol and application simple network metric such as delays and packet loss are not sufficient. we present classification that addresses need by calculating how many potential crashes happen or can be avoided by using IVC approach. We investigated impact of safety messages between car approaching at intersection using road traffic simulator that allow selected vehicle to disregards traffic rules. We show that in suburban area simple beaconing is not as effective as predicted. However simple one hop relaying i.e. by vehicles parked close to an intersection can improve driver safety. As safety is key purpose of IVC, paper having loop in evaluation of the effectiveness of vehicular networks.
Click Here to Download Pdf
Title: Image Quality Assessment Metrics and Techniques
Authors: Sukhpreet Kaur and Jaspreet Singh
Abstract: Image Quality assessment plays a vital role in many image processing applications. It is still a challenging aspect of the research. As we see in our daily life, mostly the digital images are subjected to a wide range of distortions during processing and transmission that might result in degraded quality of vision. Subjective image quality metrics are appropriate only in human visual quality. Objective image quality metrics are more appropriate than subjective quality metrics as they are less time consuming and more convenient. A lot of exertion has been made during recent years to improve image quality of objective metrics that cop up with the perceptual human quality vision. The main objective of the paper is to propose distinct image quality assessment metrics and techniques to improve qualitative measures that automatically detect perceptual image quality.
Click Here to Download Pdf
Title: A Review of Different Feature Descriptors Techniques in Image Processing
Authors: Alisha Makkar and Dr. Bikrampal Kaur
Abstract: This paper gives us the overview of the different feature description techniques. Feature description evolves feature detection as its first default step. First of all a brief introduction about what features are needed to be extracted according to the problem and then by using an appropriate feature detection algorithm features will located them in image. Once detected feature description will be done so that matching between those points in two different images could be done. A brief survey on popular feature detection and description techniques has been done and a brief introduction about each of the technique has been given in this paper for helping the future researchers in the field of feature detection and description for further research work.
Click Here to Download Pdf
Title: Analysis of Energy Efficiency Using LEACH Protocol in Wireless Sensor Network Using Qualnet
Authors: Poornima S and Dr. G.F. Ali Ahammed
Abstract: The wide utilization of Wireless Sensor Networks (WSNs) is obstructed by the severely limited energy constraints of the individual sensor nodes. This is the reason why a large part of the research in WSNs focuses on the development of energy efficient routing protocols. Wireless sensor networks comprise of minor battery driven devices with restricted energy resources. Once installed, the minor sensor nodes are usually unapproachable to the operator, and thus auxiliary of the energy source is not practicable. Hence, energy proficiency is a vital design issue that needs to be boosted in order to increase the lifetime of the network. LEACH is a popular hierarchical routing protocol which efficiently maintains the energy storage of nodes in Wireless Sensor Network (WSN).The nodes using LEACH are divided into clusters. The advantage of LEACH is that each node has the equal probability to be a cluster head, which makes the energy dissipation of each node be relatively balanced. This paper studies Implementation of LEACH protocol on Wireless Sensor Network and comparing LEACH protocol with existing AODV protocol and the simulation is done using qualnet simulator.
Click Here to Download Pdf
Title: A Model of Resource-Aware Load Balancing Scheme using Multi-objective Optimization in Cloud environment
Authors: Kavita and Vikas Zandu
Abstract: Cloud computing is a new class of network based computing that provides the customers with computing resources as a service over a network on their demand. The unique concept of cloud computing creates new opportunities for Business and IT enterprises to achieve their goals. In cloud computing, usually there are number of jobs that need to be executed with the available resources to achieve optimal performance, least possible total time for completion, shortest response time, and efficient utilization of resources etc. To accomplish these goals and achieve high performance, it is important to design and develop a multi objective scheduling algorithm. Hence it is most challenging to schedule the tasks along with satisfying the userís Quality of Service requirements. This paper proposes a multi- objective scheduling algorithm that considers wide variety of attributes in cloud environment. The paper aims to improve the performance of CPU, memory and network operations by reducing the load of a virtual machine (VM) by using Load Balancing Method. Finally it optimizes the resource utilization by using Resource
Click Here to Download Pdf
Title: Multi-Factor Phishing Attack Detection and Prevention with Support Vector Machine
Authors: Pardeep Singh, Amandeep Sharma and Amrit Kaur
Abstract: The phishing attacks are launched for the stealing the information from the website users by channelizing the users to their fake links created as the duplicates of the original websites. The user login information hacking is done by sending the emails pointing towards the fake links. The trusted web sources are the secure sources which does not impose any security threat while the users login over the portals. In this paper, the security model has been proposed to protect against the phishing attacks. The phishing attacks are protected by analyzing the source of origin of the target sources. The phishing attacks are generalized in the multi-hop link forward dataset, which is collected after the analysis of the origination of the web sources. The proposed reads the integrity factors of the sources from the global sources such as Alexa Web Rank, Google Page Rank and Google Trust Factor for the evaluation of the trust levels of the target web pages. If the page trust factor is computed lower than the significant value, the any of the security information is denied and the web page is prohibited. The proposed model is intended to improve the results in the terms of hardened security and time complexity.
Click Here to Download Pdf
Title: Analysis of Active Queue Management Techniques In WCDMA Networks Using Qualnet
Authors: Rashya Shrunga R and Dr. G. F. Ali Ahammed
Abstract: In wireless Networks, WCDMA is an important air interface technology. It provides point to point links for IP based Radio Access Network (RAN).Introduction of 3rd generation cellular networks and their high data rates require proper queuing mechanism to provide better QOS to multimedia application. We propose a comparative analysis of queuing mechanism RED,BLUE and REM for packet loss, end to end delay and throughput. The simulation result shows that techniques have a good quality than RED using simulation software QualNet.
Click Here to Download Pdf
Title: Healthcare System with Big Data Analytics: A Survey
Authors: Gagana H S and Dr. K Thippeswamy
Abstract: In the current Healthcare society the health care system has a large volume of unstructured data, so it is impossible to secure and maintaining without an appropriate tool or techniques. Now a days, digitization of healthcare information is opening new possibilities for providers and payers to enhance the excellence of care, improve healthcare outcomes, and reduce the costs. Adoption of Big Data concepts the solutions will play an important role in transforming the outcomes of the healthcare industry by using new techniques and technologies. The data in the healthcare sector is growing rapidly and is coming from various departments like Medication, Medical test results, Surgery and Implants, Allergies and side effects, Research departments etc, these information are stored in EMR (Electronic Medical Record) Using HL7 document formats. In this paper mainly concerns on using big data techniques and maintaining the health record and securely sharing the health data between one hospital to another hospital. All medical BIG DATA stored in digital formats only i.e. eRecord(EMR).
Click Here to Download Pdf
Title: Audio & Video Steganography Using Encryption Scheme with Multiple Bits Embedding
Authors: Er.Ginni and Er.Pushpinder Singh
Abstract: Todayís internet applications require data to be transmitted in a secure manner. Data transmission in public communication system is not secure because of interception and improper manipulation by eavesdropper. So the solution for this problem is Steganography. That has to do with secure data transmission between a sender and a receiver; implementing Steganography is the best way. Steganography is hiding private or secret data within a carrier in an invisible manner, in such a way that no one, apart from the sender and intend recipient. Various modern techniques of steganography are: a) Video Steganography b) Audio Steganography. Audio Video Steganography is a modern Steganography of hiding in a way that the unwanted people may not access the information. In today applications security is the main concern to transmit information from source to destination. In this paper secure steganography using authentication information has been used so that audio hidden information canít extract without authentication acceptance. In video steganography multiple least significant bits have been used for data embedding behind video frames, phase coding approach for data hiding behind audio file. By analyzing results one can define that purposed approach provides much security as well as less distorted steganography.
Click Here to Download Pdf
Title: Energy Efficient Adaptive Offloading For Mobile Cloud Computing Using Optimal Partitioning Algorithm
Authors: Nikita Bhagat, Shashi Bhushan and Sachin Majithia
Abstract: Mobile Cloud Computing is an emerging technology that integrates the cloud computing concept into the mobile environment. The limitations of mobile devices such as its storage capacity, battery lifetime can be overcome with the offloading of applications that is migration of large or complex computation to servers or cloud. This paper presents the adaptive offloading of the tasks using the optimal partitioning algorithm, which optimally distributes the tasks between mobile devices and cloud servers. Offloading helps in improving the performance of devices and consumes less memory. The evaluation shows that adaptive offloading done using the optimal partitioning algorithm shows better results in terms of less consumption of memory space and reduced execution time as compared to the others
Click Here to Download Pdf
Title: Image Dehazing Using Enhanced Dark Channel Prior Method
Authors: Harjeet Kaur and Silky Narang
Abstract: Dehazing refers to deposing of image due to the presence of fog, dust and mist in the atmosphere which makes difficult to analyze the image. Various techniques has been developed to remove haze from the image such as dark channel prior method, clahe method etc. Haze removal methods can be categorized in to two categories: It can be either based on additional data or using a prior assumption. Haze is period used in image separation which is a set of atmospheric effect which reduce the contrast of an image. Additional data contain it used multiple images of same place of an action and which take various weather conditions and techniques that need user provided depth information In the proposed methodology dark channel method, transmission map, Laplacian method has been used to remove the haze from image for better analysis of the image. This paper discuss about the methodology of proposed technique.
Click Here to Download Pdf
Title: Image Mining Using Attribute Supported Brain Tumor Synthesis by DWT (MRI Relevance)
Authors: Prof P.Senthil
Abstract: Image mining synthesis is the process in which two or more images are joint into single composite image mining so that it could be more informative and it is also more suitable for person visual perception as well as PC processing. Image Mining Fusion is one of the major research fields in image Mining. This technique can be applied in variety of domains: Navigation, Remote Sensing, Object detection, Object recognition and it has been used as an effective tool in medicine since it plays a major role in medical applications in order to improve diagnosis and for proper treatment planning. The main objective of this image fusion is to reduce redundancy and to extract relevant information. The purpose of this paper is to introduce Gabor Wavelet transform along with ICA technique which enables us to fuse images based on their mutual information. The fused results are registered and their entropy values are calculated based on transform domain and spatial domain approaches.
Click Here to Download Pdf
issn
Announcements
IJMCSA  IJMCSA

Submit your Paper Last date 20th November 2018http://www.ijmcsa.com/submit_your_paper

IJMCSA  IJMCSA

Volume-6 & Issue-1 Published http://www.ijmcsa.org/current_issue

IJMCSA  IJMCSA

Submit your Paper Last date 20th March 2018http://www.ijmcsa.com/submit_your_paper

IJMCSA  IJMCSA

Volume-5 & Issue-4 Published http://www.ijmcsa.org/current_issue

IJMCSA  IJMCSA

Volume-5 & Issue-3 Published (Acceptance Ratio=33%) http://www.ijmcsa.org/current_issue

IJMCSA  IJMCSA

Volume-5 & Issue-2 Published (Acceptance Ratio=27.27%) http://www.ijmcsa.org/current_issue

IJMCSA  IJMCSA

Volume-5 & Issue-1 Published (Acceptance Ratio=75%) http://www.ijmcsa.org/current_issue

IJMCSA  IJMCSA

Volume-4 & Issue-6 Published (Acceptance Ratio=32%) http://www.ijmcsa.org/current_issue

IJMCSA  IJMCSA

Volume-4 & Issue-4 Published (Acceptance Ratio=54.02%) http://www.ijmcsa.org/july_issue

IJMCSA  IJMCSA

Volume-4 & Issue-3 Published (Acceptance Ratio=47.22%) http://www.ijmcsa.org/may_issue

IJMCSA  IJMCSA

Volume-4 & Issue-2 Published (Acceptance Ratio=52.17%) http://www.ijmcsa.org/march_issue

IJMCSA  IJMCSA

Volume-4 & Issue-1 Published (Acceptance Ratio=40.90%) http://www.ijmcsa.org/january_issue

IJMCSA  IJMCSA

Volume-3 & Issue-3 Published (Acceptance Ratio=18%) http://www.ijmcsa.org/current_issue

impact factoor
open access
-------------------------------------------------popup-------------------------------------------->