Volume 2 Issue 8- August 2012

 

S.No Title Page
1. A Fraud Detection based Online Test and Behavior Identification Implementing Visualization Techniques
HarishBabu. Kalidasu, B.PrasannaKumar, Haripriya.P
Abstract

Now a day’s online exam has become one of the prominent and most important aspects of our lives, but there is no guaranty of genuinity of the result in the online examination processes. In many of online examinations the location of the proctor varies from the location of the examinee, there is no guaranty in the authorization of users to the examination and no guaranty in trusting the examination center head that monitors the students during the examination process.  Due to the increase in the distance, chances of doing malpractice and misbehaving during the examination increases. To avoid such situations, the examinee has to be constantly monitored and should able to stop the examination based on learner’s behavior during the examination.  Many techniques were proposed for providing security during conduct of exams. This paper studies various authorization and authentication techniques namely unimodal, multimodal, hardware interaction and data visualization techniques. The paper also proposes a Fraud Detection based Online Test [FDOT] and Behavior identification through Visualization Techniques [BIVT] that avoids and performs more effectively compared with the existing systems.

Keywords: - Fraud Detection, Behavior identification, malpractice, Data Visualization.

1338-1344
Full Text PDF
2. Hiding of Image using N-Queen Solution Matrix and DNA Sticker
Suman Chakraborty,Samir Kumar Bandyopadhyay
Abstract

This paper presents a technique of staganography where hiding of secret image done by LSB substitution and N-Queen matrix act as key. Key used to indicate pixel position of Cover image where substitution will take place.Memomy complex (Memory strand and DNA stickers) used to represent N-Queen matrix so that key isn’t understandable to unauthorized user. Size of N-Queen matrix relate with no. of bits in Secret Image. To make N-Queen matrix reasonable size, Secret image embed after compression.
Key words DNA, Secret Image, Cover Image, N-Queen, Sticker, and Memory strand

1345-1348
Full Text PDF
3. Ontology based Semantic Search Engine
N.Vanjulavalli, A.Kovalan
Abstract

We live in a connected age when every entity is linked to each other through numerous relationships thus forming complex networks, information networks etc.,  In this meshy scenario, storing analyzing, managing extracting information is going to be highly challenging task. Information retrieval happened to be an activity that only a few people engaged in. due to the advent of search engines and communication facilities, millions of people are engaged in information retrieval and extraction process. The information retrieval deals with finding a set of documents relevant to the user query. Commercial search engines like Google deals with key word search which is based on Boolean logical queries. The major disadvantage of this kind of keyword search is that it returns a lot of irrelevant information to the users which results in low precision. Nowadays the field of information retrieval is moving towards semantic level from syntactic level. These semantic search engines are based on the concept of ontology which gives a Meta data representation of concepts. In this paper we focus on the retrieval mechanisms related to it. This includes various phases in which the ontology is designed first and then the indexing and retrieval phases work.
Key words- Ontology, semantic web, Information retrieval, Query builder

1349-1353
Ful Text PDF
4. A Secured Routing Protocol for MANETs
A.Jayanand, T.Jebarajan
Abstract

 Security is one of the major concern in MANET routing. A large number of secured routing protocols exist however they are either insecure for some types of attacks or they consume much computational power which reduces their quality of service. In this paper we present a new secured routing protocol which is simple yet powerful. We name this new protocol as JJ model. The new protocol uses flooding technique just like AODV and SAODV, but much different from those protocols. Its ability to discover the route without identity of source and destination nodes makes it a unique design.

Keywords— MANET, MANET routing, MANET routing security, AODV, SAODV.

1354-1358
Full Text PDF
5. Security Concerns in Software in View of SDLC
A.Nanda Gopal Reddy, Suribabu Boyidi, Srivatsava, A.Kamala Priya
Abstract

Software has become an integral part of everyday life. Every day, millions of people perform transaction through internet, ATM, mobile phone, they send email & e-greetings, and use word processing and spreadsheet for various purpose. People use software bearing in mind that it is reliable and can be trust upon and the operation they perform is secured. Now, if this software has exploitable security hole then how can they be safe for use. Security brings value to software in terms of people’s trust. The value provided by secure software is of vital importance because many critical functions are entirely dependent on the software. That is why security is a serious topic which should be given proper attention during the entire SDLC, ‘right from the beginning’. For the proper implementation of security in the software, twenty one security rules are proposed in this paper along with validation results. It is found that by applying these rules as per given implementation mechanism, most of the vulnerabilities are eliminated in the software and a more secure software can be built.

Keywords-Security rules, Security rules in SDLC, Software Security

1359-1364
Full Text PDF
6. Critical Survey on Multideployment and Multisnapshotting on Clouds
S. Komal Kaur, K J Sarma, P Raja Prakasha Rao
Abstract

With Infrastructure-as-a-Service (IaaS) cloud economics getting increasingly complex and dynamic, resource costs can vary greatly over short periods of time. Therefore, a critical issue is the ability to deploy and snapshot, for that it require to boot and terminate VMs very quickly, which enables cloud users to exploit elasticity to find the optimal trade-off between the computational needs (number of resources, usage time)and budget constraints. This paper proposes a concept which reduces the time required to simultaneously boot a large number of VM instances on clouds from the same initial VM image (multi-deployment). Our proposal was not only to deploy large number of client system but also to snapshot the large number of Virtual images which is done concurrently.  Large scale experiments under concurrency on hundreds of nodes show that introducing such a technique which improves infrastructure service by using or by sharing the resources.

Keywords— virtual machine, virtual image, Multideployment, Multisnapshotting.

1365-1368
Full Text PDF
7. Development and Performance Evaluation of Ad-hoc Wireless Test bed
N.Pradeepa Kumari, D. Vineela, N.Kasiviswanath, S.Zahoor-ul-Haq
Abstract

Performance evaluation of multi-hop Ad-hoc network routing protocols have been primarily conducted through analytic and simulation-based studies, which frequently fail to accurately predict real-world performance and behavior. The main reason for this challenge is developing test bed with ALIX boards, which are cheaper and roust embedded devices. We have developed Ad-hoc connection in indoor environment using a number of ALIX boards and two laptops using OLSR protocol. We successfully transferred the video file for different hops in different scenarios and evaluated the performance from that. However though the link quality is better the file is received with more error rate, and though the network topology is stable the link breaks.

Keywords: Ad-hoc, ALIX Boards, Voyage OS, Loss, Delay

1369-1372
Full Text PDF
8. Future of RFID Technology in Health Care Systems: A Review Paper
Simarpreet Kaur, Kamaljeet Kaur
Abstract

Radio-frequency identification (RFID) technology is making inroads in healthcare. Such kind of up gradation must be provided to health care industry. It reflects better results in; improvement of patient assistance, medication flaws will be omitted, patient identification becomes easier, and to locate and track capital instruments in the hospital. Meanwhile RFID technology seems effective; in coming years, in case of matching and tracking blood for transfusion, combating the counterfeiting of medical products, tracking pharmaceuticals.This paper highlights an overview of RFID systems and its applications which helps us in elaborating the health care system in modernized way.

Keywords:  RFID technology, RFID tags, RFID readers, Antennas

1373-1376
Full Text PDF
9. Histogram based comparison on Symmetric Encryption Algorithms of Information Security
D. Naga Swetha
Abstract

Information sharing and transfer of secured data is a challenging issue in Internet and Network applications, so there is a need to protect such applications. Encryption algorithms play a main role in information security systems. On the other side, those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. There are so many Symmetric Encryption Algorithms this paper provides evaluation of six of the most common encryption algorithms namely: AES (Rijndael), DES, 3DES, RC2, BlowFish, and RC6. A comparison has been conducted for those encryption algorithms at different settings for each algorithm such as different sizes of data blocks, different data types, battery power consumption, different key size and finally encryption/decryption speed. Experimental results are given to demonstrate the effectiveness of each algorithm.
.
Keywords- Information security, AES, DES, 3 DES, RC2, RC6.

1377-1382
Full Text PDF

 

 

 

 

IJCSET Menu

Downloads