Boundary Analysis for Equivalent Class Partitioning by using Binary Search
Survey Paper | Journal Paper
Vol.7 , Issue.2 , pp.601-605, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.601605
Abstract
Testing of Software is an indispensible phase of software development. It helps us to improve functional and non-functional characteristics. To implement functional test scenario black box testing process is used, and the test bases are the functional requirement. Nonfunctional requirement does not describe the function, but the attribute of the function i.e function quality, usability, efficiency and reliability. To implement testing, the most difficult part is to design test cases. There are numerous processes available which can help us to design test cases. This paper will present the novel algorithm of Equivalence class partitioning. Here the input is partitioned by using a strategy that is inspired by binary search. Based on the input data, the complete range is divided into two sub ranges, and this partition continues until a threshold is reached. The proposed novel algorithm of testing will increase the reliability of the software product.
Key-Words / Index Term
Software testing, functional testing, black box testing, binary search, class partitioning
References
[1]. B. Meyer. “The grand challenge of trusted components,” In Proc. ICSE
[2]. 2003, pages 660–667. IEEE Computer Society Press, 2003,
[3]. Bertrand Meyer et al. “Providing Trusted Component to the Industry ,”
[4]. vol 31,no 5,pp104-105. IEEE, May 1998
[5]. C. Szyperski, Component Oriented Programming: Beyond Object
[6]. Oriented. Reading, MA: Pearson Education, 1999.
[7]. G. J. Myers, The art of software testing, 2nd ed. United States: John
[8]. Wiley & Sons, 2004.
[9]. Sandeep Chopra, M.K.Sharma, LataNautiyali, “Analogous Study of
[10]. Component-Based Software Engineering Models”,IJARCSSE, Vol.7
[11]. ,Issue 6, pp. 597-603, 2017
[12]. M. Sitariman and B. Weide, „Component-based software using
[13]. RESOLVE‟, ACM SIGSOFT Software Engineering Notes, vol. 19, no.
[14]. 4, pp. 21–22, Oct. 1994
[15]. Sandeep Chopra etal“Elena – A Novel Component Based Life Cycle
[16]. Model”, European Journal of Advances in Engineering and
[17]. Technology 2017, 4(12): 932-940
[18]. IEEE “Standard Glossary of Software Engineering Terminology‟, IEEE
[19]. Standards Board, Sep. 1990.
[20]. IanSommerville . Software Engineering . 9thedition.Addison Wesley
[21]. March 2010
[22]. LataNautiyal,Preeti, “A Novel Approach of Equivalent Class
[23]. Partitioning for Numerical Input”,ACM SIGSOFT ,Vol41, Number 1,
[24]. Jan 2016
[25]. LataNautiyal,etal, “A Novel Approach to Component Based Software
[26]. Testing”,ACM SIGSOFT ,Vol 39, Number 6, Nov 2014
[27]. J.MVoas ,” A dynamic testing complexity metric” Software Quality
[28]. Journal, vol 1 issue 2, pp 101-114 , june 1992
[29]. C.Ramamoorthyetal,” On the automated generation of program test
[30]. data”, IEEE Transaction on Software Engineering ,2(4): 293-300, april
[31]. 1976
[32]. J. Voas and J. Payne, „Dependability certification of software
[33]. components‟, Journal of Systems and Software, vol. 52, no. 2–3, pp.
[34]. 165–172, Jun. 2000.
[35]. J. Voas, J. Payne, R. Mills, and J. McManus, “Software testability‟,
[36]. Proceedings of the 1995 Symposium on Software reusability - SSR ’95,
[37]. April. 1995.
[38]. E.J. Weyukar. More experience with data flow testing ,IEEE
[39]. Transaction on Software Engineering ,19(9), : 912- 919 , 1993
[40]. Beatriz Pérez Lamancha, Pedro Reales Mateo, Ignacio Rodríguez de
[41]. Guzmán, Macario Polo Usaola, and Mario Piattini Velthius, “Automated
[42]. model-based testing using the UML testing profile and QVT,”
[43]. Proceedings of the 6th International Workshop on Model-Driven
[44]. Engineering, Verification and Validation (MoDeVVa 2009),Denver,
[45]. Colorado, USA, 05 Oct 2009. ACM International Conference
[46]. Proceedings Series, vol. 413, ACM Press, 2009.
[47]. Brown, Alan W., Wallnau, Kurt C. (1998): The Current State of CBSE.
[48]. IEEE Software Journal, September/October 1998, pp. 37-46.
[49]. Han, Jun (1998): Characterization of Components. In proceedings of
[50]. International Workshop on Component- Based Software Engineering,
[51]. 1998.
[52]. Hong Zhu, Patrick A. V. Hall and John H. R. May, “Software Unit Test
[53]. Coverage and Adequacy,” ACM Computing Survey, vol. 29, no. 4, pp.
[54]. 366–427, Dec 1997.
[55]. Paul Baker, Zhen Ru Dai, Jens Grabowski, Øystein Haugen, Ina
[56]. Schieferdecker, and Clay Williams, Model-Driven Testing Using the
[57]. UML Testing Profile. Springer, 08 Nov 2007.
[58]. 22 . A. Bertolino and E. Marchetti. 2005. Introducing a Reasonably
[59]. Complete and Coherent Approach for Model-based Testing. Electronic
[60]. Notes in Theoretical Computer Science, Elsevier, 116, 85–97
[61]. Leonardo Mariani and Mauro Pezz`e. 2005. A Technique for Verifying
[62]. Component-Based Software, Electronic Notes in Theoretical Computer
[63]. Science, Elsevier, 116, 17–30.
[64]. Bin Lei, Zhiming Liu, Charles Morisset and Xuandong Li, 2010. State
[65]. Based Robustness Testing for Components. Electronic Notes in
[66]. Theoretical Computer Science, Elsevier. 260, 173– 188.
[67]. Arnaud Gotlieb and Matthieu Petit. 2006. Path Oriented random testing.
[68]. Proceedings of the First International Workshop on Random Testing,
[69]. July 20, 2006, Portland, ME, USA Copyright ACM.
[70]. A. Jain, S. Sharma, S. Sharma and D. Juneja. 2010. Boundary value
[71]. analysis for non-numerical variables: Strings, Oriental Journal of
[72]. Computer Science & Technology, Vol. 3(2), 323-330.
Citation
Sandeep Chopra, Lata Nautiyal, M.K. Sharma, "Boundary Analysis for Equivalent Class Partitioning by using Binary Search," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.601-605, 2019.
Region Based Cryptography: A Study of Difference Between the .jpg Image and .png Image After Recombined RGB Images
Review Paper | Journal Paper
Vol.7 , Issue.2 , pp.606-609, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.606609
Abstract
Today is the age of information and technology. We cannot proceed even a single step without it. We are fully dependent on information and technology. In this paper we will show that which image is best after recombined of RGB image. First we take .jpg image, differentiate it and then recombined to obtained the final image and again we take the .png image, differentiate it RGB , recombined it to get final image .At last we will compare the final image of .jpg and .png and see different.
Key-Words / Index Term
Region Based Cryptography, .jpg image, .png image, secrets, sharing
References
[1] Blakley, G. "Safeguarding cryptographic keys". Proceedings of AFIPS 1979. 48: 313–317.
[2] Shamir, A. "How to share a secret". Communications of the ACM. 1979,22 (11): 612–613. doi:10.1145/359168.359176.
[3] Naor M, Shamir A. Visual cryptography. In: Workshop on the Theory and Application of Cryptographic Techniques;9{12 May 1994; Perugia, Italy. pp. 1-12.
[4] Sandeep Gurung, Bijoy Chhetri, Mrinal Kanti Ghose “A Novel approach for Circular Random Grid with Share Authentication”. 2015 IEEE
[5] Arash Karimi, Hadi Shahriar Shahhoseini “Cryptanalysis of a Substitution-Permutation Network Using Gene Assembly in Ciliates” Int`l J. of Communications, Network and System Sciences Vol. 5 No. 3 ,2012.
[6] B. Saha, “A Comparative Analysis of Histogram Equalization Based Image Enhancement Technique for Brightness Preservation”, International Journal of Scientific Research in Computer Science and Engineering, Vol. 3, Issue. 3, pp. 1-5, 2015.
[7] P. Sharma1,ishra2, V.K. Sarthi3, P. Bhatpahri4, R. Shrivastava5 “ Visual Encryption Using Bit Shift Technique” International Journal of Scientific Research in Computer Science and Engineering Vol.5, Issue.3, pp.57-61, June (2017)
[8] M. Arora1*, S. Sharma2 “Synthesis of Cryptography and Security Attacks” IJSRNSC Volume-5, Issue-5, Oct 2017
[9] A. Canteaut, “Correlation attack for stream ciphers”, Encyclopedia of Cryptography and Security, pp. 261–262. Springer US, 2011.
[10] T. Siegenthaler, “Decrypting a class of stream ciphers using ciphertext only. Computers”, IEEE Transactions , Vol.C-34 Issue.1pp.81–85, 1985.
[11] Fakhari P, Vahedi E, Lucas C. Protecting patient privacy from unauthorized release of medical images using a bio-inspired wavelet-based watermarking approach. Digit Signal Process 2011; 21: 433-446
[12] .Hou YC. Visual cryptography for color images. Pattern Recogn 2003; 36: 1619-1629.
[13] Hou YC, Quan ZY. Progressive visual cryptography with unexpanded shares. IEEE T Circ Syst Vid 2011; 21:1760-1764.
[14] Hou YC, Quan ZY, Tsai CF, Tseng AY. Block-based progressive visual secret sharing. Inform Sciences 2013; 233:290-304.
[15] Ito R, Kuwakado H, Tanaka H. Image size invariant visual cryptography. IEICE T Fund Electr 1999; E82-A:2172-2177.
[16] Shyu SJ. Image encryption by random grids. Pattern Recogn 2007; 40: 1014-1031.
[17] D. Boneh and M. Franklin, “Identity-based encryption from theWeil pairing, in: Advances in Cryptology – CRYPTO Lect.Notes in Comput. Sci. 2139, Springer-Verlag, pp. 213-229(2001)
Citation
Irfan Jalal Bhat, Raghav Mehra, Amit Kumar Chaturvedi, "Region Based Cryptography: A Study of Difference Between the .jpg Image and .png Image After Recombined RGB Images," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.606-609, 2019.
Doctor Recommendation and Appointment System
Research Paper | Journal Paper
Vol.7 , Issue.2 , pp.610-613, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.610613
Abstract
Data is the lifeblood of all business. Data-driven decisions increasingly make the difference between keeping up with competition or falling further behind. Machine learning can be the key to unlocking the value of corporate and customer data and enacting decisions that keep a company ahead of the competition. A subset of artificial intelligence (AI), machine learning (ML) is the area of computational science that focuses on analyzing and interpreting patterns and structures in data to enable learning, reasoning, and decision making outside of human interaction. Simply put, machine learning allows the user to feed a computer algorithm an immense amount of data and have the computer analyze and make data-driven recommendations and decisions based on only the input data. If any corrections are identified, the algorithm can incorporate that information to improve its future decision making. Machine learning helps in data-driven decision making, identification of key trends and driving research efficiency. When it comes to healthcare, there are different ways in which machine learning techniques can be applied for effective diseases prediction, diagnosis, and treatments, improving the overall operations of healthcare. Effective machine learning implementation enables healthcare professionals in better decision-making, identifying trends and innovations, and improving the efficiency of research and clinical trials
Key-Words / Index Term
Doctor, Symptoms, User, Patient, Machine Learning, Healthcare, Prediction, Location, Diseases
References
[1] Fetter, R. B., & Thompson J. D., “PATIENTS` WAITING TIME AND DOCTORS` IDLE TIME IN THE OUTPATIENT SETTING”, Health Serv ice Research, Patent Number US PMC1067302, Patent Date Jan. 26, 2012.FL (US) 66-90.
[2] Meherwar Fatima, Maruf Pasha, “SURVEY OF MACHINE LEARNING ALGORITHMS FOR DISEASE DIAGNOSTIC”, ICIW 2012: Department of Information Technology, Bahauddin Zakariya University, Multan, Pakistan
[3] D. W. Bates, S. Saria, L. Ohno-Machado, A. Shah, G. Escobar, “BIG DATA IN HEALTH CARE: USING ANALYTICS TO IDENTIFY AND MANAGE HIGH-RISK AND HIGH-COST PATIENTS”, Health Affairs, vol. 33, no. 7., Patent No. US 1123-1131A1, Patent Date Jul.19, 2014.
[4] Hylton, A. & Suresh, S., “APPLICATION OF INTELLIGENT AGENTS IN HOSPITAL APPOINTMENT SCHEDULING SYSTEM”, International Journal of Computer Theory and Engineering, Vol. 4, No. 4, April 2012, ISSN: 625-630.
[5] B. Qian, X. Wang, N. Cao, H. Li, Y.-G. Jiang, “A RELATIVE SIMILARITY BASED METHOD FOR INTERACTIVE PATIENT RISK PREDICTION”, Data Mining Knowl. Discovery, vol. 29, no. 4, PP:1070-1093, 2015.
[6] S. Marcoon, A. M. Chang, B. Lee, R. Salhi, J. E. Hollander,, “HEART SCORE TO FURTHER RISK STRATIFY PATIENTS WITH LOW TIMI SCORES”, Critical Pathways Cardiol., vol. 12, no. 1, pp. 1-5, 2013.
[7] M. Chen, S. Mao, Y. Liu, “BIG DATA: A SURVEY”, Mobile Netw. Appl., vol. 19, pp. 171-209, Apr. 2014.
[8] P. Groves, B. Kayyali, D. Knott, S. van Kuiken, “THE‘BIG DATA’REVOLUTION IN HEALTHCARE”, Accelerating Value and Innovation, 2016.
Citation
Md. Lutful Islam, Khalid Alam, Ashfi Ansari, Kashyap Godambe, "Doctor Recommendation and Appointment System," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.610-613, 2019.
Survey on Aqua Robotics Urban Farm System
Survey Paper | Journal Paper
Vol.7 , Issue.2 , pp.614-622, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.614622
Abstract
Aqua Robotics Urban Farm System is an energy efficiency and cost effective way to grow plants, vegetables or flowers using natural process without soil and external nutrients. Aquaponics system is developed by fish and plants in a cyclic system. There are six goals to achieve, our first goal is to automate fish feeder this is possible with the help of a sensor called servo motor. Second goal is to supply excretion of fish to the plants through regular water supply. And this water contains all necessary nutrients that plant can need. Third goal is to use led grow lights instead of sunlight because this an indoor plant farming. Forth goal is to replace the dirty water in aquariums every three months automatically based on PH value. Fifth goal is to upload the sensed data to the Blynk cloud, an IOT analytics platform service that enables us to connect devices whether they are powered by Blynk modules or by other modules. By cloud information we are able to analyze data which in-tern helps in maintenance of an aqua system and also growth of fish and plants. And retrieve those data using telegram bot as a front UI. Sixth goal is to maintain the temperature of water in the aquarium. Our responsibility in this project is achieving all these six goals.
Key-Words / Index Term
aquaponics, hydroponics, IOT, blynk cloud, zoho analytics, robotics urban farm system [RUFS]
References
[1] Priyanka R.R., “Crop Protection by an alert Based System using Deep Learning Concept” Isroset-Journal (IJSRCSE), Vol.6 , Issue.6 , pp.47-49, Dec-2018.
[2] Harmeet Khanuja, “IOT Based Smart Parking System”, Isroset-Journal (IJSRCSE) Vol.6, Issue.6, pp.50-52, Dec-2018.
[3] Chandraprakash Patidar, “E-IRRIGATION: An Automation of Irrigation using Wireless Networks”, Journal (IJSRNSC), Vol.1, Issue.5, pp.18-20, Nov-2013.
[4] V. Parashar, “Use of ICT in Agriculture”, Journal (IJSRNSC) Vol.4, Issue.5, pp.8-11, Oct-2016.
[5] A. S. A.M. Soh, “Development of Aquaponic System using Solar Powered Control Pump”,IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE)
[6] James E. Rakocy, “Economic Analysis Of A Commercial-Scale Aquaponic System For The Production Of Tilapia And Lettuce”, Shultz University of the Virgin Islands, Agriculture Experiment Station St. Croix, U.S. Virgin Islands.
[7] N. S. M. Fadhil, ”Automated Indoor Aquaponic Cultivation Technique”, 2013 3rd International Conference on System Engineering and Technology, 19-20 Aug. 2013, Shah Alam, Malaysia
[8] Megumi U. Leatherbury Department of Engineering Technology, “VEGILAB and Aquaponics Indoor Growing System“, Weber State University. 2014 IEEE Conference on technologies for Sustainability. 2016 4th International Conference on Future Internet of Things and Cloud Workshops.
[9] Sandhya Baskaran Senior Software Engineer, “An Autonomous Aquaponics System using 6LoWPAN based WSN.”, Sanjana Hariraj B. Tech, Information Tech. Anna University, Vaishali Krishnan B. Tech, I.T. Anna University, India
[10] Rodrigo S. Jamisola Jr., “An Automated Solar-Powered Aquaponics System towards Agricultural Sustainability in the Sultanate of Oman.”, Mechanical and energy engineering department, Cesar Mendoza, Analene Montesines Nagayo, raad K.S Al Izki and Eugene Vega Department of Engineering. 2017 IEEE International Conference on Smart Grid and Smart Cities.
[11] https://www.google.com/url?hl=en&q=http://lpulaguna.edu.ph/wp content/uploads/2016/10/Fuzzy-Logic-Controller-Implementation-to-an-Arduino-Based-Solar-Powered-Aquaponics-System-
[12] Rolf Meinecke, “Closed greenhouse concept integrating thermal energy storage (TES)”, 2014 49th International Universities Power Engineering Conference (UPEC) publisher is IEEE and conference location: Cluj-Napoca, Romania, 2014.
[13] P.C.AdeSilva, “Ipanera:An Industry 4.0 based architecture for distributed soil-less food production systems”, 2016 (Manufacturing & Industrial Engineering Symposium (MIES) in the year 2016 publisher is IEEE.
[14] Jasson Gryzagoridis and Fareed Ismail,
“Sustainable development using renewable energy to boost aquaponics food production in needy communities”, 2016 (International Conference on the Industrial and Commercial Use of Energy (ICUE) in the year 2016 publisher is IEEE
[15] K S Aishwarya, M Harish, S Prathibhashree and K Panimozhi, “Survey on IOT Based Automated Aquaponics Gardening Approaches”, Second International Conference on Inventive Communication and Computational Technologies (ICICCT) in the year 2018 publisher is IEEE, India.
[16] www.blink.com
[17] www.instructables.com
[18] ieeexplore.ieee.org
[19] pethelpful.com
[20] www.theaquaponicsource.com
[21] originhydroponics.com
[22] spectrum.ieee.org
Citation
Vinutha Raju, S. Yashaswini, K. Panimozhi, "Survey on Aqua Robotics Urban Farm System," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.614-622, 2019.
An Innovative Approach for Risk Identification and Management in Software Projects
Survey Paper | Journal Paper
Vol.7 , Issue.2 , pp.623-630, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.623630
Abstract
Risk is a potential issue that may trade off the achievement of a product advancement venture. The success of a project is altogether impacted by the risk management. The exactness of risk assessment specifically impacts the adequacy of risk management. In this paper, we examine the chance components. The Risk-matrix has been inspected and a checklist is made to perceive the significance of the risk .This paper deals with the risk factors identified with risk estimation ,risk analysis, venture board, risk scope, prerequisites and hazard factors identified with client fulfilment .Here we are adopting a method which consists of 2 phases. The first one is the risk identification and second is the risk management planning. Identification of the risk involves analytical methods like a risk checklist which evaluates the risk and risk assessment matrix. In risk checklist the probability of occurrences is taken and the possible negative effects for each risk is identified. Management of the risk involves various measures to be adopted to reduce the probability of risk events and to reduce the negative impacts of the risk events.
Key-Words / Index Term
software risks, risk management, risk classification, risk impact, risk identification, risk assessment, risk mitigation
References
[1] Uzair Iqbal Janjua, Jafreezal Jaafar, Izzatdin B A Aziz, "Integration of supportive processes with elementary processes for making current practices of software project risk management more effective", Mathematical Sciences and Computing Research (iSMSC) International Symposium on, pp. 292-297, 2015
[2] Ignacio Marin-Garcia, Patricia Chavez-Burbano, Victor Guerra, Jose Rabadan, Rafael Perez-Jimenez, Hua Wang, "Considerations on Visible Light Communication security by applying the Risk Matrix methodology for risk assessment", PLOS ONE, vol. 12, pp. e0188759, 2017
[3] A. Nguyen-Duc, D. S. Cruzes, R. Conradi, "The impact of global dispersion on coordination team performance and software quality-a systematic literature review", Information and Software Technology, vol. 57, pp. 277-294, 2015
[4] Saad Yasser Chadli, Ali Idri, Trends and Advances in Information Systems and Technologies, vol. 746, pp. 408, 2018.
[5] M. Usman, F. Azam, N. Hashmi, "Analysing and reducing risk factor in 3-c`s model communication phase used in global software development", Information Science and Applications (ICISA) 2014 International Conference on, pp. 1-4, 2014.
[6] Hussein Hashimi, Alaaedin Hafez, Mutaz Beraka, "A Novel View of Risk Management in Software Development Life Cycle", Pervasive Systems Algorithms and Networks (ISPAN) 2012 12th International Symposium on, pp. 128-134, 2012.
[7] S. Y. Chadli, A. Idri, J. L. Fernndez-Alemn, J. N. Ros, "Frameworks for risk management in gsd projects: A survey", Intelligent Systems: Theories and Applications (SITA) 2015 10th International Conference on, pp. 1-6, Oct 2015.
[8] S. V. Shrivastava, U. Rathod, "Categorization of risk factors for distributed agile projects", Information and Software Technology, vol. 58, pp. 373-387, 2015.
[9] Zakari Tsiga, Michael Emes, Alan Smith, "Implementation of a risk management simulation tool", Procedia Computer Science, vol. 121, pp. 218, 2017
[10] S. Betz, S. Hickl, A. Oberweis, "Risk Management in Global Software Development Process Planning", 2011 3th EUROMICRO Conference on Software Engineering and Advance Application, pp. 357-361, August-September 2011
Citation
Angel P. Joshy , Natarajan K , Alok Kumar Pani, "An Innovative Approach for Risk Identification and Management in Software Projects," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.623-630, 2019.
Blockchain for Trusted Future
Survey Paper | Journal Paper
Vol.7 , Issue.2 , pp.631-634, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.631634
Abstract
The third industrial revolution brought in personal computers and the Internet. Like many sectors, the financial sector was also influenced by such digitalization and the internet, which resulted in the emergence of “FinTech”. The blockchain is one of the many transformative and disruptive innovations of FinTech. The blockchain, though is relatively a new technology, has the potentiality, that it can be used in various other applications. Like the internet, which influenced the world, the blockchain is also expected to transform various operating models of finance. This in turn may result in evolution of new disruptive technological innovations. In recent years, many financial/ trade institutions across the globe, have been observing very closely, the developments in blockchain technology. The way the blockchain provides the complete confidence – with consensus, disintermediation, time-stamped and immutable recording of the linked transactions’ history, in a distributed network – is attracted by several businesses. The blockchain can be adapted in IPR, finance, internet of things, and in any transaction for that matter. The blockchain can address the multi-party systems’ inefficiencies, resulting in benefits to all. Further, the smart contract feature is useful in complex business workflows. This paper discusses structure of blockchain, its types, features, and explores some of its applications in different fields.
Key-Words / Index Term
Financial Technologies, FinTech, Blockchain, Disintermediation, Immutable, Openness, Industry 4.0
References
[1] Zheng, Z, Xie, S., Dai, HN., Chen, X., Wang, H.: “An overview of Blockchain Technology: Architecture, Consensus, and Future Trends.” In: 978-1-5386-1996-4/17 6th International Congress on Big Data PP557-564 IEEE (2017).
[2] M. Swan, “Blockchain: Blueprint for a New Economy”, 1st ed. O’Reilly, February 2015.
[3] Singh, S, Singh, N.: “Blockchain: Future of Financial and Cyber Security”. In: 978-1-5090-5256-1/16/PP463-467 IEEE (2016)
[4] Ahram, T., Sargolzaei, A., Sargolzaei, S., Daniels, J., Amaba, B.: “Blockchain Technology Innovations”. In: 978-1-5090-1114-8/17/ Technology & Engineering Management Conference (TEMSCON) IEEE (2017)
[5] Hamida, E.B., Brousmiche, K.L., Levard, H., Thea, E.: “Blockchain for Enterprise: Overview, Opportunities and Challenges.” In: The Thirteenth International Conference on Wireless and Mobile Communications-IEEE ICWMC (2017)
[6] IDRBT. (2017). “Applications of blockchain technology to banking and financial sector in India.” White paper. Retrieved from http://www.idrbt.ac.in/assets/publications/Best%20Practices/BCT.pdf (last accessed on 4 January, 2019)
[7] Guo, R., Shi, H., Zhao, Q., and Zheng, D., “Secure Attribute-Based Signature Scheme with Multiple Authorities for Blockchain in Electronic Health Records Systems.” IEEE Access. 6:11676–11686, 2018.
[8] Doori A, Kanhere S, Jurdak R (2016) “Blockchain in Internet of Things: Challenges and Solutions.” CoRR. 1608
Citation
Murali Mohan Kotha, "Blockchain for Trusted Future," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.631-634, 2019.
Foiling Keylogger Attacks using Virtual Onscreen Keyboard
Research Paper | Journal Paper
Vol.7 , Issue.2 , pp.635-639, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.635639
Abstract
Keyloggers are hardware or software tools designed to record user’s keyboard strokes. They are a threat during authentication as they can capture important information from the target computers through secret installation. They are largely undetected by most anti-virus software. To prevent key logger attacks, virtual on-screen keyboard with random keyboard arrangement is used. Unfortunately, the key loggers have improved tremendously. They take control of the personal computer and can capture every event and read the video buffer. By using cryptographically strong keys and passwords information can be delivered securely to the user’s computer. But humans may not have sufficient memory to remember cryptographically strong keys. This can be solved by introducing an intermediate device that bridges humans and user terminal. The proposed authentication scheme is a password-based authentication method using a randomized onscreen keyboard. The scheme utilizes a smartphone as the intermediate device which contains the keys required for decryption. The encrypted contents are encoded into QR (Quick Response) codes. QR codes can be scanned using the smartphone. The user owns a user id and a password. The user terminal will display a blank keyboard and the QR code which carries the encrypted random permutation of keyboard arrangement. The QR code will be decoded using the intermediate device. Looking at the keyboard arrangement in the intermediate device the user needs to click the buttons on the blank keyboard to input the password. The use of IMEI (International Mobile Equipment Identity) of the smartphone prevents the attackers from using any other phones for authentication even if he knows the user-id, password and the key for decryption.
Key-Words / Index Term
QR code, password based authentication, smartphone, IMEI
References
[1] Seref Sagiroglu and Gurol Canbek, “Key loggers –Increasing threats to Computer Society and Privacy” IEEE TECHNOLOGY AND SOCIETY MAGAZINE | FALL 2009.
[2] Reza Jalili, “Secure Data Entry and Visual Authentication System and Method”, U.S Patent Appl No: 08/980,748, March 27 2001.
[3] Timothy William Cooper, “System and login resistance to compromise”, U.S Patent Appl No:12/070 627, June 2011
[4] Ramarao Pemmaraju, “Methods and apparatus for securing keystrokes from being intercepted between the keyboard and a browser” U.S Patent, Appl. No: 11/656,236, August 2007
[5] Stuart P. Goring, Joseph R. Rabaiotti and Antonia J. Jones,” Anti-key logging measures for secure Internet login: an example of the law of unintended consequences”, Computers and Security, February 2007
[6] McCune, J.M., Perrig, A. and Reiter, M.K. (2009)‘Seeing-Is-Believing: using camera phones for human- verifiable authentication’, Int. J. Security and Networks, Vol. 4, Nos. 1/2, pp.43–56
[7] DaeHun Nyang, Aziz Mohaisen, Jeonil Kang,” Key Logging-Resistant Visual Authentication Protocols” IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL.13, NO. 11, NOVEMBER 2014
Citation
Jayalekshmi K.S, "Foiling Keylogger Attacks using Virtual Onscreen Keyboard," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.635-639, 2019.
Primordial Abstraction of Voice over Internet Protocols (VoIP)
Survey Paper | Journal Paper
Vol.7 , Issue.2 , pp.640-643, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.640643
Abstract
This paper include the study of voice over internet protocol, its architecture that how VoIP works , issues that occur in voice over internet protocol , VoIP codecs and many more .In the era of wireless communication technologies, the actual time services which includes data as voice (i.e Voice Over Internet Protocol ) is growing stupendously. Different applications of VoIP which includes SKYPE, GOOGLE TALK, etc. are used to provide economical voice calls to the end users. VoIP is technology used for communication so as to transmit voice and data over internet protocols. VoIP is used for IP telephony services which includes voice messaging ,calling, video messaging as well as video conferencing etc.
Key-Words / Index Term
VoIP, VoIP Architecture, Quality of service and Measurement methods , Codecs
References
[1] Urjashee shaw, Bobby sharma, “A Survey Paper on Voice over Internet Protocol (VoIP),” International Journal of Computer Application, Vol.139-No.2, April 2016.
[2] MahdiH.Miraz,MuzafarA.Ganie,Suhail A.Molvi,Maaruf Ali, “ Simulation and Analysis of Quality of Service (QoS) Parameters of Voice over IP (VoIP) Traffic through Heterogenous Networks,” International Journal of Advanced Computer Science and Application (IJACSA), Vol.8,No.7, 2017.
[3] Ms.V.Yagna Prabha,Ms.R.Amsaveni, “Survey of Voice over Internet Protocol,”International Journal of Engineering Research and Development,Vol 5,Issue 1,November 2012.
[4] S.Gurrapu , Dr.S.Mehta and Prof. S.Panbude, “ Comparitive Study For Performance Analysis of VoIP Codecs over WLAN in Non Mobility Scenarios ,” Inetrnationa Journal of Information Technology, Modelling and Computing (IJITMC),Vol.4, No.4,November 2016.
[5] Jyoti Singhal , Vandana, “ Performance Analysis of VoIP over Mobile WiMAX,” International Journal of Advanced Research in Computer Engineering and Technology (IJARCET),Vol.4 Issue 5, May 2015
[6] N.S Randhawa, Shally Sharma,Shafali, Rakesh kumar Dubey “The Quality of Service of VoIP Traffic over WiMAX,”2015 Internaltional Conference on Circuit, Power and Computing technologies[ICCPCT].
[7] M.A. Mohamed,F.W. Zaki and A.M. Elfeki “Performance Analysis of VoIP Codecs over WiMAX Networks,” International Journal OF Computer Science Issues (IJCSI),Vol.9,Isssue 6, No.3, November 2012.
[8] Shamik Sengupta, Student Member,IEEE, Mainak Chatterjee and Sarat Ganguly, “Improving Quality of VoIP Streams over WiMAX,” IEEE Transactions on Computers, Vol.57, No.2,February 2008.
[9] H.R Othman ,Darmawaty M.Ali, N.A Mohd Yusof,Ku Siti Syahidah Ku Mohd Noh, Azlina Idris, “Performance Analysis of VoIP over Mobile WiMAX (IEEE 802.16e) Best –Effort Class,”2014 IEEE 5th Control and system Graduate Research Colloquium,Aug 11-12,UiTM, Shah Alam ,Malaysia..
[10] Rahul Singh, Ritu Singh, “ A Review Paper : Voice over Internet Protocol” International Journal of Enhanced Research in Management & Computer Application,”ISSN:2319-7471,Vol.3 Issue 1, Januray-2014 .
[11] Haytham Assem, David Malone, Jonathan Dunne, Pat O’Sullivan, “A New Adaptive Redundancy Control Algorithm for VoIP Application,”Globecom 2013-Communication.
[12] H.Kazemitabar, A.Md.Said, “ Adaptive QoS Control Approaches for VoIP over Multi-Rate WLANs,” 2012 International Conference on Computer & Information Science (ICCIS).
[13] Ms.V.Yagna Prabha,Ms.R.Amsaveni, “Survey of Voice over Internet Protocol,”International Journal of Engineering Research and Development,Vol 5,Issue 1,November 2012.
[14] Therdpong Daengsi, Nalakkhana Khitmoh ,Pongpisit Wuttidittachotti, “VoIP quality measurement: subjective VoIP quality estimation model for G.711 and G.729 based on native Thai users,”
Published 2015 in Multimedia Systems, DOI:10.1007/s00530-015-0468-3
Citation
Misha, Dalveer Kaur, "Primordial Abstraction of Voice over Internet Protocols (VoIP)," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.640-643, 2019.
Efficient and Effective Implicit-Feedback-Based Content-Aware Collaborative Filtering For Location Recommendation
Survey Paper | Journal Paper
Vol.7 , Issue.2 , pp.644-648, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.644648
Abstract
Location recommendation assumes a basic job in helping individuals find appealing spots. In spite of the fact that ongoing examination has considered how to prescribe areas with social and topographical data, few of them tended to the chilly begin issue of new clients. Since portability records are regularly shared on interpersonal organizations, semantic data can be utilized to handle this test. A run of the mill technique is to nourish them into express input based substance mindful community oriented sifting, however they require drawing negative examples for better learning execution, as clients` negative inclination isn`t noticeable in human versatility. Be that as it may, earlier investigations have observationally appeared based strategies don`t perform well. To this end, we propose a versatile Implicit-criticism based Content-mindful Collaborative Filtering (ICCF) structure to join semantic substance and to avoid negative examining. We at that point build up a productive improvement calculation, scaling straightly with information size and highlight measure, and quadratically with the element of inert space. We further set up its association with chart Laplacian regularized framework factorization. At long last, we assess ICCF with a vast scale LBSN dataset in which clients have profiles and literary substance. The outcomes demonstrate that ICCF outflanks a few contending baselines, and that client data isn`t successful for enhancing proposals yet in addition adapting to cold-begin situations.
Key-Words / Index Term
Implicit feedback; Content-aware; Location recommendation; Weighted matrix factorization
References
[1] D. Lian, Y. Ge, F. Zhang, N. J. Yuan, X. Xie, T. Zhou, and Y. Rui, “Content-aware collaborative filtering for location recommendation based on human mobility data,” IEEE, 2015.
[2] C. R. Cloninger, T. R. Przybeck, and D. M. Svrakic, The Temperament and Character Inventory (TCI): A guide to its development and use.center for psychobiology of personality, Washington UniversitySt. Louis, MO, 1994.
[3] V. Zheng, B. Cao, Y. Zheng, X. Xie, and Q. Yang, “Collaborative filtering meets mobile recommendation: A user-centered approach,” in Proceedings of AAAI’10. AAAl Press, 2010.
[4] M. Ye, P. Yin, W.-C. Lee, and D.-L. Lee, “Exploiting geographical influence for collaborativepoint-of-interest recommendation,” in2011
[5] W.-Y. Zhu, W.-C. Peng, L.-J. Chen, K. Zheng, and X. Zhou, “Modeling user mobility for location promotion in location-based social networks,” in Proceedings of KDD’15. ACM, 2015.
[6] Maddali M.V.M. Kumar, G. Rajesh, “Cloud based Structure Approach of Content-As-A-Service for Supplier Impartial of Mobile Gadgets”, International Journal of Advanced Trends in Computer Science and Engineering, Vol. – 03, Issue – 05, pp: 282-287, 2014.
[7] H. Gao, J. Tang, X. Hu, and H. Liu, “Exploring temporal effects for location recommendation on location-based social networks,” in Proceedings of RecSys’13. ACM, 2013.
[8] Q. Yuan, G. Cong, Z. Ma, A. Sun, and N. M. Thalmann, “Timeaware point-of-interest recommendation,” in Proceedings of SIGIR’13. ACM, 2013, pp. [9] Q. Yuan, G. Cong, and A. Sun, “Graph-based point-of-interest recommendation with geographical and temporal influences,” in Proceedings of CIKM’14. 2014.
[10] A. Noulas, S. Scellato, N. Lathia, and C. Mascolo, “A random walk around the city: New venue recommendation in location-based social networks,” in Proceedings of SocialCom’12. IEEE, 2012,
[11] D. Yang, D. Zhang, Z. Yu, and Z. Wang, “A sentiment-enhanced personalized location recommendation system,” in Proceedings ofHT’13. ACM, 2013.
[12] B. Liu and H. Xiong, “Point-of-interest recommendation in location based social networks with topic and location awareness,” in Proceedings of SDM’13. SIAM, 2013.
[13] D. Lian, C. Zhao, X. Xie, G. Sun, E. Chen, and Y. Rui, “Geomf: joint geographical modeling and matrix factorization for point-of-interest recommendation,” in 2014.
[14] C. Cheng, H. Yang, I. King, and M. Lyu, “Fused matrix factorization with geographical and social influence in location-based social networks,” in 2012.
[15] Y. Liu, W. Wei, A. Sun, and C. Miao, “Exploiting geographical neighborhood characteristics for location recommendation,” in 2014.
[16] P. Lops, M. De Gemmis, and G. Semeraro, “Content-based recommender
systems: State of the art and trends,” in 2011
[17] S. Rendle, “Factorization machines Assistant Professor in the Department of
(TIST), 2012.
[18] T. Chen, W. Zhang, Q. Lu, K. Chen, Z. Zheng, and Y. Yu, “Svdfeature: a toolkit for feature-based collaborative filtering,” Journal ofMachine Learning Research 2012.
[19] D. Agarwal and B.-C. Chen, “Regression-based latent factor models,” ACM, 2009.
[21] Defu Lian, Yong Ge, Fuzheng Zhang, Nicholas Jing Yuan, Xing Xie, Tao Zhou, and Yong RuiScalable Content-Aware Collaborative Filtering for Location Recommendation,2018.
Citation
B. SaiSrilekha, K.S. Yuvaraj, "Efficient and Effective Implicit-Feedback-Based Content-Aware Collaborative Filtering For Location Recommendation," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.644-648, 2019.
IOT Based Smart Garbage Monitoring System
Research Paper | Journal Paper
Vol.7 , Issue.2 , pp.649-651, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.649651
Abstract
In the present day scenario, many times we see that the garbage bins or Dust bin are placed at public places in the cities are overflowing due to increase in the waste every day. It creates unhygienic condition for the people and creates bad smell around the surroundings this leads in spreading some deadly diseases & human illness, to avoid such a situation we are planning to design “IoT Based Waste Management for Smart Cities”. In this proposed System there are multiple dustbins located throughout the city or the Campus,these dustbins are provided with low cost embedded device which helps in tracking the level of the garbage bins and an unique ID will be provided for every dustbin in the city so that it is easy to identify which garbage bin is full. When the level reaches the threshold limit, the device will transmit the level along with the unique ID provided. These details can be accessed by the concern authorities from their place with the help of Internet and an immediate action can be made to clean the dustbins.
Key-Words / Index Term
8051 micro-controller, RF module, IR Sensors, RF Transmitters, Intel Galileo Gen2, RF Receiver
References
[1] Kanchan Mahajan, “Waste Bin Monitoring System Using Integrated Technologies”, International Journal of Innovative Research in Science,Engineering and Technology, Issue 3 ,Issue 7 , July 2014.
[2] M. Al-Maaded, N. K. Madi, Ramazan Kahraman, A. Hodzic, N. G. Ozerkan , An Overview of Solid Waste Management and Plastic Recycling in Qatar, Springer Journal of Polymers and the Environment, March 2012, Volume 20, Issue 1, pp 186-194.
[3] Islam, M.S. Arebey, M. ; Hannan, M.A. ; Basri, H,”Overview for solid waste bin monitoring and collection system” Innovation Management and Technology Research (ICIMTR), 2012 International Conference , Malacca, 258 – 262
[4] Raghumani Singh, C. Dey, M. Solid waste management of global Municipality, Manipur- a case study Green Technology and Environmental Conservation (GTEC 2011), 2011 International Conference Chennai 21 – 24
[5] Vikrant Bhor, “Smart Garbage management System International Journal of Engineering Research & Technology (IJERT),Vol. Issue 03, March-20152000.
[6] Narayan Sharma,, “Smart Bin Implemented for Smart City”,International Journal of Scientific & Engineering Research, Volume 6, Issue 9, September-2015
Citation
Md. Lutful Islam, Chaudhary Faizan, Shaikh Mohammad Abdul Quavi, "IOT Based Smart Garbage Monitoring System," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.649-651, 2019.