Best Online Journal of Computer Science and Technology - IRA-JOURNAL

International Research & Analysis Journal facebook twitter youtube

IRAJ VOLUMES

IRAJ Volume 5 Issue 1, 2015-04-16 To 2015-07-15

  • pages (44-51)

    Reads (206)

    Topic Name: Secured Cryptography Using Division Based Steganography

    Author (s) : Aradhana Kushwaha, Asst. Prof. Mahendra Rai


    Quick abstract

    Conventional Natural visual secret sharing (NVSS) schemes hide secret images in shares that are only digital images or are encoded and stored in a digital form. The shares can appear as noise-like pixels or as meaningful images. And NVSS scheme is only applicable for image not for any other data. Hence, NVSS schemes have shown less PSNR value i.e. 19.74 dB. Also NVSS scheme required lots of processing in order to generate and deliver the noise share and hence the performance of the NVSS Scheme is also not good as if the number of natural share increases hence recovered image quality will be worst in case of NVSS . To address this problem, we proposed a VSS scheme i.e. Steganography of the text and images over multiple images give much better security. This leads to the noisy recovery of the secret image but the proposed implementation has given excellent quality of the images and PSNR calculation Index Terms: Cryptography, Bubble sort, LSB method, Visual Secret Sharing,


  • pages (52-57)

    Reads (185)

    Topic Name: Improved Detection Rate using Anomaly based Intrusion Detection System with Ant Clustering

    Author (s) : Richa Gupta, Asst. Prof. Mahendra Rai


    Quick abstract

    In this era of networking, lot of information sharing is being done over local area networks and wide area networks. It has changed the human life to great extents. With its spread, challenges in networking are also increasing related with security, bandwidth usage. An important problem in intrusion detection is how effectively can separate the attack patterns and normal data patterns from a large number of network data and how effectively generate automatic intrusion rules after collected raw network data. To accomplish this, various data mining techniques are used such as classification, clustering, association rule mining etc. This thesis proposes to perform mining on the data collected from the IDS to enhance the speed of detection of intrusion with automatic detection using specific attributes of the intrusions. Keywords: Intrusion Detection System, Ant Clustering, Data Mining, KDD Dataset, Clustering.


  • pages (37-43)

    Reads (185)

    Topic Name: High Performance Web Meta Data Extraction Using N-gram

    Author (s) : Neha Kanojia, Asst. Prof. Nitin Shukla


    Quick abstract

    Use of Meta data for web site is used in many fields online such as advertising, promotion, providing relevant information, research etc. Search Engines such as Google, AOL, MSN, Yahoo etc. are using such information along with the contents of the webpage to assign them ranks. This work proposes to implement a tool to generate Meta data. For generating Meta data from the web pages we need to process the web pages and retrieve the relevant words using different mechanisms with high efficiency and accuracy. The work is being proposed with the use of n-Gram technique implemented using MATLAB which will allow working on contents of the various human languages in addition to the plain ASCII text. The proposed work shall take the advantage of important HTML tags to retrieve relevant information and frequency based retrieval to decide the Meta data. Various data mining metrics shall be used to enforce the accuracy of the system


  • pages (58-64)

    Reads (192)

    Topic Name: Static Nodes Based Power Management in WSN

    Author (s) : Anjli Koshta,Ashok Verma, Ajay Lala,Ashish Chaurasia

    Keywords : MANET, security, Power Management, Energy Saving, Adhoc Networks, Sensor Networks.


    Quick abstract

    In multi-hop wireless sensor networks, the intermediate nodes are responsible in relaying packets from the source to its destination. For relaying packets intermediate nodes use the routing tables which list all nearest neighbor node available. Wireless systems are being designed for extremely high data rates and are directly contributing to the global energy consumption. Therefore energy efficient wireless systems are becoming a new research paradigm. Routing protocol mechanism can contribute high power consumption if the routing algorithm does not have power management capabilities. Routing protocol requires an efficient way to manage the route path based on the routing table in sensor nodes. In recent years, most energy efficient routing are usually using lowest energy path consume at a node to use as a route selection based on the routing table information. In Wireless Sensor Networks, sensor nodes use wireless connections to communicate with other nodes in the area and for such communication they use the energy source available with them. A substantial part of the energy of the nodes is consumed in routing process and initialize process in routing mechanism can contribute a significant impact on energy performance level. This work proposed to introduce static nodes as the intermediate nodes to get the power from proper power source and forward the packets from one wireless node to another.


  • pages (65-72)

    Reads (189)

    Topic Name: Congestion Control Using Dynamic Multi-Queue Management over MANET

    Author (s) : Sachi Sahu, Shivendu Dubey

    Keywords : TCP, Multipath Routing, Queue Management, TCP Congestion Control, Mobile Adhoc Networks, Wireless Networks


    Quick abstract

    The network comprising mobile nodes with no infrastructure is termed as mobile ad hoc networks (MANET). The self-organization of the mobile nodes results in a network over radio links. For establishing routes among nodes, some specific routing protocols are used. High mobility nature of the ad hoc networks resulted in new challenge that initiates a concept of dissimilarity between wireless characteristics and nature of the network topology. It is essential to adjust the data rate used by each sender in order not to overload the network, where multiple senders compete for link bandwidth. Packets are dropped when they arrive at the router and cannot be forwarded. The protocol of rate control is proposed for distinctive flows of characteristics user which takes in two components such as end-host congestion control layer among IP and TCP/UDP and every router upholds a single fair share for each link. The issues such as exploding nature of the network and self-locking scenario while ACK packets arrive can be avoided by rate based transmission technique. TCP has many problems related with the multipath management and routing. Problems are specifically more in adhoc networks where TCP communication either slows down or causes congestions.


  • pages (73-80)

    Reads (201)

    Topic Name: SaaS Layer Based Secured Cloud Transactions

    Author (s) : Neha Jain, Ashok verma

    Keywords : Cloud computing, security, authentication, static password, dynamic password, time synchronization


    Quick abstract

    in a complex corporate IT environment passwords are very often the only possible means of protection against unauthenticated intruders. To ensure security of corporate networks is a never ending task of system administrators. That is why passwords are widely used to prevent frauds and system cracks. But very often static passwords are not enough and extra security is needed. As these static passwords are easy to guess and employees, customers, business partners write them down, send them in e-mails, they become ineffective. One of the main concerns regarding cloud services is the security part, and is one large factor to why companies and customer hesitate migration their services into the cloud. At the same time, the security must be easy for the customers to understand and appeal to all kinds of people with different technical knowledge. However, in order to enjoy the widely utilization of cloud computing through wired/wireless networking, providing sufficient assurance of information security such as confidentiality, authentication, non-repudiation, and integrity is the critical factor of success promotion.


  • pages (81-88)

    Reads (187)

    Topic Name: Efficient Keyword Extraction for Data Mining with Semantic Analysis

    Author (s) : Priyanka Patel, Mahendra Rai


    Quick abstract

    Researchers have proposed a simple and efficient keyword extraction method for a single document, applying self-features of words. Document word frequency, local word frequency, POS of word and especially the location information of words are considered as features of keywords. After multi-level filtering, the orders of high frequent words are changed. Finally the first several words are selected as keywords. In the study, we find the best logic combination relation of word location information in keyword extraction based on real corpus. Clustering technique in data processing could be a proven approach that uses datasets to seek out the relevant data and place them in numerous clusters. Since many datasets are available and have different attributes so the process speed of the system is required to be high and just in case of enormous information sets its price exploitation Ant clustering to use.


  • pages (89-95)

    Reads (176)

    Topic Name: High Performance Web Usage Mining using Association Rules

    Author (s) : Mohit Dubey, Reetesh Rai


    Quick abstract

    increasing growth of the Internet has made the thousands of the websites and web user around the world. Increase of web users and websites is also causing increase of huge data per second on the web. This increase is causing users difficult to find the relevant information from the web. Therefore we need to create algorithms for the easy and fast web mining tools for the users. Since it is majorly a responsibility of the website owners to track and provide relevant information to the users as per their usage history therefore web usage mining is particularly focus of this work. Web usage mining aims at discovering useful information or knowledge from usage data registered in log files, based on primary kinds of data used in the mining process. This paper uses a web usage mining technique to fetch knowledge from web server log files where all user navigation history is registered.


top