A Study on Website Quality Evaluation based on Sitemap
Survey Paper | Journal Paper
Vol.2 , Issue.2 , pp.55-59, Feb-2014
Abstract
Website quality evaluation can be made based on creating site map for the WebPages for a single website which works properly. A website is taken for the analysis where we check every link under that website are checker and split it according to status code. By analyzing every status code from all those webpage links, we are ignoring every other link except the page contains status code 200. Then we are developing the sitemap for those links which is working perfectly.
Key-Words / Index Term
Sitemap, Website, Search Engine Optimization, SMGA
References
[1]. Frank McCown, M.N., and Johan Bollen, The Availability and Persistence of Web References in D-Lib Magazine, in the 5th International Web Archiving Workshop and Digital Preservation (IWAW`05). 2005.
[2]. Larry Page, R.M., Sergey Brin,Terry Winograd. The Anatomy of a Large-Scale Hypertextual Web Search Engine. Stanford.
[3]. Krishnamurthy, B.a.C.W. Cat and Mouse: content Delivery Tradeoffs in Web Access. in WWW 2006. Edinburgh, Scotland.
[4]. Yuan, J., Chi, C.H., and Q. Sun. A More recise Model for Web Retrieval. in WWW 2005. 2005. Chiba, Japan.
[5]. Team, I.W.S., Design for Performance: Analysis of Download Times for Page Elements Suggests Ways to Optimize. 2001.
[6]. Information on �Helping Spiders Crawl through your Web Site �available at, http://sonicseo.com/helping-spiders/last accessed at 18 September, 2013.
[7]. Information on �sitemaps� http://en.wikipedia.org/wiki
/Sitemaps#Sitemap_index/,last modified on 15 September 2013,
[8]. Information on� Free Broken Link Checker /OnlineURLValidator�http:/brokenlinkcheck.com/, last accessed at 18 September, 2013
[9]. Handaru Jati and Dhanapal Durai Dominic �Quality Evaluation of E-Government Website using Web Diagnostic Tools:Asian Case�,2009 International Conference on information management and Engineering , 2009 IEEE.
Citation
M. Chandran, A.V. Ramani, "A Study on Website Quality Evaluation based on Sitemap," International Journal of Computer Sciences and Engineering, Vol.2, Issue.2, pp.55-59, 2014.
An Overview of Ontology Based Text Document Clustering Algorithms
Technical Paper | Journal Paper
Vol.2 , Issue.2 , pp.60-64, Feb-2014
Abstract
Text document clustering is an important activity in data mining. It is emerged from text retrieval, and had important application in establishing information retrieval, knowledge management system. Clustering can help to get solutions for many problems associated with real time applications such as, in commercial; in biotechnology; in geography; in the banking sector; in the insurance industry; in the Internet etc. Hence It is important to know different ways available to implement clustering. In Text based clustering approach using title of document it is found out to which cluster this document belongs But It doesn�t give better results because it may possible that same document is renamed with two different names, as content of both documents are similar it is expected that the document should go to the same cluster but depending on the name of the document it may go to two different clusters . A new approach called semantic based text clustering [1] comes into picture in which entire document is parsed and depending on its content it is clustered. Ontology based text clustering [2] is a way to implement semantic based clustering. In this paper we discussed about different Ontology based algorithms like K-means, DBScan, SOM etc.
Key-Words / Index Term
Term-Clustering, k-means, Single-Linkage, DBSCAN, Self-Organizing Maps, F1Measure
References
[1]. �Ontology-based Semantic clustering� by dr. Aida alls and dr. Karina gibert computer science and mathematics sanroma aPh.d. thesis supervised by department of Tarragona.
[2]. �Ontology-based Text Document Clustering� by Andreas Hotho and Alexander Maedche and teffen Staab Institute AIFB, University of Karlsruhe, 76128 Karlsruhe, Germany.
[3]. �Ontology-based Text Clustering� by A. Hotho and S. Staab A. Maedche.
[4]. � Survey of Clustering Algorithms � by Rui Xu, Student Member, IEEE and Donald Wunsch II, Fellow, IEEE.
[5]. �Support Vector Clustering� by Asa Ben-Hur asa ,Raymond and Beverly, Nello Critianini, John Shawe-Taylor and Bob Williamson.
[6]. �Modern Information Retrieval � a book written by yates & neto.
Citation
A. Awachar, R. Bairagi, V.L. Hegade, M. Khandagale, "An Overview of Ontology Based Text Document Clustering Algorithms," International Journal of Computer Sciences and Engineering, Vol.2, Issue.2, pp.60-64, 2014.
A Review of Malicious Node Detection in Mobile Ad-hoc Networks
Review Paper | Journal Paper
Vol.2 , Issue.2 , pp.65-69, Feb-2014
Abstract
Ad-hoc networks are a new paradigm of wireless communication for mobile hosts where node mobility causes frequent changes in topology. Ad hoc networks are self-configurable and autonomous systems consisting of routers and hosts, which are able to support movability and organize themselves arbitrarily. Moreover, other characteristics such as frequent changes of the topology, nodes limitations like energy resource, storage device, CPU and communication channel limitations like bandwidth, reliability add extra challenges. Mobile ad hoc networks aimed to propose solutions to some fundamental problems, such as routing, coping with the new challenges caused by networks and nodes features without taking the security issues into account. Hence, all these solutions are vulnerable to threats. Any node under attack in ad hoc network exhibits an anomalous behavior called the malicious behavior. This paper is a survey on different malicious node detection mechanisms, and the security problems caused due to malicious nodes in mobile ad hoc networks.
Key-Words / Index Term
Mobile Ad Hoc Networks, Malicious Behavior, Malicious Node Detection Mechanisms, Security
References
[1]. R. Gopal, V. Parthasarathy, A.Mani,� Techniques to Identify and Eliminate Malicious Nodes in Cooperative Wireless Networks�, IEEE International Conference on Computer Communication and Informatics (ICCCI -2013), Jan 2013.
[2]. Dipali Koshti and Supriya Kamoji, � Comparative study of Techniques used for Detection of Selfish Nodes in Mobile Ad hoc Networks� International Journal of Soft Computing and Engineering (IJSCE) , Volume-1, Issue-4, September 2011.
[3]. Radhika Saini and Manju Khari, � Defining Malicious Behavior of a Node and its Defensive Methods in Ad Hoc Network� International Journal of Computer Applications, Volume 20� No.4, April 2011.
[4]. G.S. Mamatha and Dr. S.C. Sharma, � Network Layer Attacks and Defense Mechanisms in MANETS- A Survey� International Journal of Computer Applications (0975 � 8887),Volume 9� No.9, November 2010.
[5]. Jaswinder Singh and Ramandeep Kaur , �Towards Security against Malicious Node Attack in Mobile Ad Hoc Network�, IJARCSSE Volume 3, Issue 7, July 2013.
[6]. S.B.Aneith Kumar S.Allwin Devaraj J. Arun kumar, � Efficient Detection of Denial of Service Attacks in MANET� IJARCSSE, Volume 2, Issue 5, May 2012.
[7]. Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, And Nei Kato, �A Survey Of Routing Tacks In Mobile Ad Hoc Networks� IEEE Wireless Communications, October 2007.
[8]. Hao Yang, Haiyun Luo, Fan Ye, Songwu Lu, And Lixia Zhang, �Security In Mobile Ad Hoc Networks: Challenges And Solutions� IEEE Wireless Communications, February 2004.
[9]. C.Siva Ram Murthy and B S Manoj, ―Mobile Ad Hoc Networks-Architecture and Protocols, Pearson Education,ISBN 81-317-0688-5 ,2004.
[10]. Theodore S. Rappaport, �Wireless Communication� Prentice Publisher, ISBN 0133755363, January 1994.
[11]. �Intrusion Detection System� http://www.intrusiondetection system-group.co.uk/, Link visited on December 2010.
[12]. William Stallings �Cryptography and Network Security�, Fourth Edition, Pearson Education. ISBN 978-81- 7758-774-6, 2006
[13]. Jangra1,A. Goel,N. Priyanka and Bhati,K. - Security Aspects in Mobile Ad Hoc Networks(MANETs):ABigPicture,International Journal of Electronics Engineering, pp. 189-196, 2010.
[14]. S. Buchegger and J. Boudec, �Performance Analysis of the Confidant Protocol,� Proc. Int�l Symp, Mobile Ad Hoc Networking and Computing, 2002.
[15]. Y.Huang and W.Lee, �A cooperative IDS for adhoc network Security of adhoc and sensor networks�, ACM, 2003,pp.135-145.
[16]. D. Djenouri and N. Badache, �Struggling against
selfishness and black hole attacks in MANETs,� Wireless Commun. and Mobile Computing, no. 8, pp. 689�704, 2008.
[17]. V. Srinivasan, P. Nuggehalli, C.F. Chiasserini and R.R Rao,�Cooperation in wireless Ad Hoc Network�, in IEEE INFOCOM, California, USA, 2003.
[18]. Li Zhao and Jos� G. Delgado-Frias `MARS: Misbehavior Detection in Ad Hoc Networks� IEEE GLOBECOM 2007 proceedings.
[19]. Idris M. Atakli, Hongbing Hu, Yu Chen*,Wei-Shinn Ku ,Zhou Su �Malicious Node Detection in Wireless Sensor Networks using Weighted Trust Evaluation� 2008 SpringSim
[20]. Dahai DU, Hong FAN, Guan WANG� A Secure Routing Protocol for Mobile Ad hoc Networks �Journal of Computational Information Systems 9: 22 (2013) 9023�9030
[21]. Tarag Fahad & Robert Askwith�A Node Misbehaviour Detection Mechanism for Mobile Ad-hoc Networks � ISBN: I-9025-6013-9c 2006 PGNet.
Citation
D.D. Punwatkar, K.N. Hande, "A Review of Malicious Node Detection in Mobile Ad-hoc Networks," International Journal of Computer Sciences and Engineering, Vol.2, Issue.2, pp.65-69, 2014.
Cloud`s SaaS Security by Biometric Concept
Review Paper | Journal Paper
Vol.2 , Issue.2 , pp.70-73, Feb-2014
Abstract
Personal privacy is of utmost importance in the global networked world. Some vital information that are disseminated within an office, across offices ,between branches, of an organization and other external bodies and establishments at times get into the hands of the unauthorized persons who may tamper with that contents of the information. And if no security measures are taken, there is no doubt that such data and other sensitive information will be exposed to threats such as impersonation, in-secrecy, corruption, repudiation, break-in or denial of services that may cause serious danger on the individual or organization. A secure system should maintain the integrity, availability, and privacy of data. Data integrity usually means protection from unauthorized modification, resistance to penetration and protection from undetected modification.
Key-Words / Index Term
Cloud Computing, Security, SLA, VPN, Biometric Security
References
[1]. Zirra Peter Buba, Gregory Maksha Wajiga,�Cryptographic Algoriths for Secure Data Communication�;International Journal of Computer Science and Security(IJCSS), Volume(5) :Issue(2) :2011.
[2]. www.wikipedia.com
[3]. Hassan Takabi, James B. D. Joshi, Gail-Joon �Security and Privacy Challenges in Cloud Computing Environments�1540-7993/10/IEEE.
[4]. Richard Chow, Philippe Golle, Markus Jakobsson, Elaine Shi, Jessica Stanndon, Ryusuke Masuoka, Jesus Molina�Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Cloud �.
[5]. Alexa Huth and James Cebula�The Basics of Cloud Computing�USCERT 2011.
Citation
D. Singh, S. Shukla, "Cloud`s SaaS Security by Biometric Concept," International Journal of Computer Sciences and Engineering, Vol.2, Issue.2, pp.70-73, 2014.
Tongue Drive System to Operate Computer Functions
Research Paper | Journal Paper
Vol.2 , Issue.2 , pp.74-76, Feb-2014
Abstract
Tongue Drive System(TDS) is the assistive technology plays very important role in the life of people who are suffered from spinal cord injuries those are unable to do their own tasks or for those who have central nervous system disorders. Assistive technologies help them to leave their life without help of others. These papers provide the more brief report about the various assistive technologies which has been developed for disabled people. The tongue is considered as an excellent limb for handle the devices. The magnetic read relay mounted on outside of teeth to sense the message, which small magnet generated. These sensors signals are transmitted across wireless medium and processed to operate the wheelchair. The main Moto behind this technology is the possibility of capturing large number of moments. This paper gives advanced technology to operate the computer functions with the help of tongue and using small magnet sensors to make the people employable and independent.
Key-Words / Index Term
Assistive Technologies, Spinal Cord Injuries, Computer Commands to Access Computer Function, Permanent Magnet, Tongue Control Magnet Read Relay, TDS.
References
[1]. X. Huo, J. Wang, and M. Ghovanloo, �A magneto inductive sensor based wireless tongue-computer interface,� IEEE Trans. Neural Syst. Rehabil. Eng., vol.16, pp. 497-504, Oct. 2008.
[2]. J. Kim, X. Huo, and M. Ghovanloo, �Wireless control of Smart phones with tongue motion using tongue drive assistive technology,� Proc. IEEE 32nd Eng. in Med. and Biol. Conf., pp. 5250-5253, Sep. 2010.
[3]. A X. Huo , and M. Ghovanloo , �Evaluation of a wireless wearable tongue�computer interface by individuals with high-level spinal cord injuries,� J. Neural Engineering, vol. 7, pp. 026008, Apr. 2010.
[4]. Natural Point, TracklR, Availale http://www.eyecontrol.com/trackir/
[5]. O. Takami, N. irie, C. Kang, T. Ishim atsu, and T. Ochiai, "Computer interface to use head movement for handicapped people," in Proc. IEEE TENCON`96, DSP Applications, vol. 1, pp. 468-472,C1996.
[6]. Y. Chen et al., "The new design of an infrared-controlled human-computer interface for disabled,� IEEE Trans,Rehab.Eng.,Vol.7,pp.474-481,Dec.1999.
[7]. Y. Chen, "Application of tilt sensors in human-computer mouse interface for people with disabilities," IEEE Trans. Neural Sys. Rehab. Eng., vol. 9, pp. 289-294, Sept. 2001.
[8]. M. Betke, J. Gips, and P. Fleming, "The Camera Mouse: visual tracking of body features to provide computer access for people with severe disabilities", IEEE Trans. Neural Sys. and Rehab, vol. 10, no. 1, pp. 1-10, March 2002.
[9]. T. Hutchinson, K.P. White Jr., W.N. Martin, K.C. Reichert, and L.A. Frey, "Human-computer interaction using eye-gaze input," IEEE Trans. Syst., Man, Cybern., vol. 19, no. 6, pp. 1527-1533, 1989.
[10]. J. Gips, P. Olivieri, and J.J. Tecce, "Direct control of the computer through electrodes placed around the eyes,"Human-Computer Interaction: App.and case Studtes,Elsevier, pp. 630-635,1993.
[11]. E.R. Kandel, J.H. Schwartz, T.M. Jessell, "Principles of neural science," 4th ed. McGraw-Hill, 2000.
[12]. C. Salem, S. Zhai, "An isometric tongue pointing device," Proc. CHI 97, pp. 22-27, 1997.
[13]. C. Lau, S. O`Leary, "Comparison of computer interface devices for persons with severe physical disabilities," Am J Occup. Ther., 47, pp. 02. 1022-1030, Nov. 1993.
Citation
K.R. Chothe, S.G. Bankar, A.B. Bangar, A.K. Adhav, M.A. Chaudhari, "Tongue Drive System to Operate Computer Functions," International Journal of Computer Sciences and Engineering, Vol.2, Issue.2, pp.74-76, 2014.