Volume 2 Issue 11- November 2012

 

S.No Title Page
1. Soft Classification Techniques for RS Data
A. L. Choodarathnakara, Dr. T. Ashok Kumar, Dr. Shivaprakash Koliwad and Dr. C. G. Patil
Abstract

Soft computing techniques are becoming popular in designing real world applications. Researchers are trying to integrate different soft computing paradigms such as fuzzy logic, artificial neural network, genetic algorithms, decision trees etc. to develop hybrid intelligent autonomous classification systems that provide more flexibility by exploiting tolerance and uncertainty of real life situations.  The paper reviews soft classification techniques for Remotely Sensed Data. The emphasis is placed on the summarization of major soft classification approaches and the techniques used for RS Data Classification.

Keywords— Remote Sensing, Soft Computing, Artificial Neural Networks, Genetic Algorithms, Decision Tree and Fuzzy Logic
1468-1471
Full Text PDF
2. Local Positioning System for Mobile Phone Using GSM Network
Mohammed I. Aal-Nouman
Abstract

The infra structure of the wireless base stations are needed to locate a position of a mobile node. This infra structure is definitely expensive and takes a lot of time and effort. So instead of building new base stations, the existing base stations will be used in proposed project, that the researcher can use the GSM wireless network, base stations, and databases (sector number and name) of the operator in the region or in the country that the mobile needed to find its location.

Keywords— LPS, GSM, GPS, signal strength.

1472-1475
Full Text PDF
3. Protocol Based Approach on Vulnerability Detection Tools of SQLIA along with Monitoring Tools
D. Naga Swetha, B. Shyam Kumar
Abstract

SQL injection attacks pose a serious threat to the security of Web applications and web services because they can give attackers unrestricted access to databases that contain sensitive information. In this paper, we proposed a new, protocol based approach to easily identify the vulnerability taking place in web applications and web services. Our approach has both conceptual and practical advantages. We have presented an experimental evaluation of security vulnerabilities occurring in web applications and services with the protocols used for them. The different approaches to test web applications for vulnerabilities given the experimental results and statistical analysis based on today's trend. Solutions are provided for parameter tampering in SOAP protocol with detection process. As attacks are taking place on protocols, finally to take control over SQLIAs, evaluation of attacks on protocols presented with the help of monitoring tools-a new innovation.

Keywords—Web services, Web applications, Protocols, SQLIA, Vulnerabilities, Vulnerability Scanners, Monitoring tools.

1476-1482
Ful Text PDF
4. Semantic Search through Pattern Recognition
Shanti Gunna,N. Raghava Rao
Abstract

 Semantic search on databases often return a large number of results, only a small subset of which is relevant to the user. We present a semantic search technique considering the type of desired Web resources and the semantic relationships between the resources and the query keywords Ranking and categorization, which can also be combined, to alleviate this information overload problem. Results refinement for databases is the focus of this work. A novel search interface that enables the user to navigate large number of query results using the Pattern recognition. First, the query results are matched with the key word using full Pattern matching. In contrast, previous works expand the hierarchy in a predefined static manner, without navigation refinement modeling. We show that the problem of selecting the best concepts to reveal at each refinement and propose an efficient Pattern matching algorithm. We show experimentally that how results are refined using full Pattern matching at first level and half pattern matching at second level

Keywords: Indexing, Location monitoring, Optimal String matching, Pattern matching, Search process, Semantic Search                    

1483-1487
Ful Text PDF
5. The Process of Encoding and Decoding of Image Steganography using LSB Algorithm
Ravinder Reddy Ch, Roja Ramani A
Abstract

Steganography is a technique that allows one to hide binary data within an image while adding few noticeable changes. Steganography is the dark cousin of cryptography, the use of codes. While cryptography provides privacy, steganography is intended to provide secrecy. Privacy is what you need when you use your credit card on the Internet -- you don't want your number revealed to the public. For this, you use cryptography, and send a coded pile of gibberish that only the web site can decipher. Though your code may be unbreakable, any hacker can look and see you've sent a message. For true secrecy, you don't want anyone to know you're sending a message at all.
In the present world, the data transfers using internet is rapidly growing because it is so easier as well as faster to transfer the data to destination. So, many individuals and business people use to transfer business documents, important information using internet. Security is an important issue while transferring the data using internet because any unauthorized individual can hack the data and make it useless or obtain information un- intended to him. The main intention of the paper is to analyze the various steganography algorithms and stenographic application such that it provides good security. The proposed approach provides higher security and can protect the message from stego attacks. The
image resolution doesn’t change much and is negligible when we embed the message into the image and the image is protected with the personal password. So, it is not possible to damage the data by unauthorized personnel.
Keywords:
Encryption: is used to hide information into the image-Algorithm
Decryption: is used to get the hidden information in an image file-Algorithm
Least Significant Bit Substitution Techniques:

  • Image definition
  • Image Compression
  • Image Processing

Transforming values to frequencies

            

1488-1492
Ful Text PDF
6. A Personalized Ontology Model for Knowledge Representation & Reasoning User Profiles
Kanneganti Avanthi & Satya P Kumar Somayajula
Abstract

As a model for knowledge description and formalization, ontologies are widely used to represent user profiles in personalized web information gathering. However, when representing user profiles, many models have utilized only knowledge from either a global knowledge base or user local information. In this paper, a personalized ontology model is proposed for knowledge representation and reasoning over user profiles. This model learns ontological user profiles from both a world knowledge base and user local instance repositories. The ontology model is evaluated by comparing it against benchmark models in web information gathering. The results show that this ontology model is successful.
 
Key Terms—Ontology, personalization, semantic relations, world knowledge, local instance repository, user profiles, web information gathering


             

1493-1496
Ful Text PDF

 

 

 

 

IJCSET Menu

Downloads