The Role of Morphological Analyzer and Generator for Tamil Language in Machine Translation Systems
Survey Paper | Journal Paper
Vol.2 , Issue.5 , pp.107-111, May-2014
Abstract
Natural language processing aims to design and build software that will analyze, understand and generate languages that humans use naturally. Machine translation is a very important application in Natural language processing (NLP).Currently, Statistical machine translation plays a predominant role in machine translation of larger vocabulary tasks. Achieving this goal is not an easy task especially when it comes to languages like Tamil which are agglutinative in nature. Deep analysis is needed at the word level to confine the correct meaning of the word from its morphemes and categories.The computational implementation of analysing natural language is done by Morphological analyzer.This paper is a ground work for better understanding of various approaches that are used to develop morphological analyzer and generator of Tamil languages.
Key-Words / Index Term
Natural language processing(NLP), Morphology, Morpheme, Support vector machine(SVM), Automata theory. Agglutinative languages
References
[1] Raji Sukumar. A, Dr. Babu Anto , �Morphological Synthesizer a Linguistic Tool for Malayalam verbs�,International journal Computational Linguistics and Natural Language Processing.Volume-02,Issue-.53,ISSN2279-0756 Page no(346-349),May 2013
[2] Antony, P. J., and K. P. Soman. "Computational morphology and natural language parsing for Indian languages: a literature survey." International journal Computer Science Engineering Technology� Volume-03,Issue-04, ISSN : 2229- 3345 ,Page no(136-146 ),April 2012
[3] Parameshwari K, �An Implementation of APERTIUM Morphological Analyzer and Generator for Tamil�, Language in India. 11:5 Special Volume:Problems of Parsing in Indian Languages, May 2011.
[4] Menaka, S., Vijay Sundar Ram, and Sobha Lalitha Devi. "Morphological Generator for Tamil." Proceedings of the Knowledge Sharing event on Morphological Analysers and Generators, LDC-IL, Mysore, India ,Page no (82- 96),March 22-23, 2010
[5] Parameswari K, �An Improvized Morphological Analyzer cum Generator for Tamil: A case of implementing the open source platform APERTIUM�, Knowledge Sharing Event 1 � CIIL, Mysore, March 2010.
[6] M.Anand Kumar, V.Dhanalakshmi and Dr. K P Soman, �A Novel Algorithm for Tamil Morphological Generator�, 8th International Conference on Natural Language processing (ICON),IIT Kharagpur, December 8-11,2010.
[7] Anand Kumar M, Dhanalakshmi V, Soman K.P and Rajendran S, �A Sequence Labeling Approach to Morphological Analyzer forTamil Language�, (IJCSE) International Journal on Computer Science and Engineering Volume 02,Issue No. 06, Page no(2201-2208),2010.
[8] Dr. A.G. Menon, S. Saravanan, R. Loganathan Dr. K. Soman,, �Amrita Morph Analyzer and Generator for Tamil: A Rule Based Approach�,In proceeding of Tamil Internet Conference, Coimbatore, India.Page no(239-243),2009.
[9] Jayan, Jisha P., R. R. Rajeev, and S. Rajendran. "Morphological Analyser for Malayalam-A Comparison of Different Approaches." International journal of computer science and Information technologies(ICSIT),Volume02,Issue-02, Page no( 155-160),2009
[10] Saranya S.K, �Morphological Analyzer for Malayalam Verbs, A Project report. www.pdfcreat.com/computer-malayalam-0.html 2008.
[11] Choudhary and Narayan Kumar, �Developing a Computational Framework for the Verb Morphology of Great Andamanese�, Doctoral dissertation, Centrefor Linguistics, Jawaharlal Nehru University, New Delhi, India 2006.
[12] Hughes,John� Automatically Acquiring a Classification of Words�, Doctoral dissertation ,
School of Computing,University of Leeds ,2006.
[13] Pesetsky, D.�Russian Morphology and Lexical Theory�, Manuscript, MIT11.1979, Siegel, Dorothy Carla,Topics in English morphology, Doctoral dissertation,Massachusetts Institute of Technology.1974
Citation
S. Ananthi , D.V.R. Angela , "The Role of Morphological Analyzer and Generator for Tamil Language in Machine Translation Systems," International Journal of Computer Sciences and Engineering, Vol.2, Issue.5, pp.107-111, 2014.
DoS Flooding Attacks against SIP based VoIP Systems- a Survey
Survey Paper | Journal Paper
Vol.2 , Issue.5 , pp.112-117, May-2014
Abstract
The success of the Internet has brought significant changes to the telecommunication industry. One of the remarkable outcomes of this evolution is Voice over IP (VoIP), which enables real time voice communications over packet switched networks for a lower cost than traditional public switched telephone networks (PSTN).VoIP networks are more vulnerable to security threats as compared to traditional PSTN due to their open environment such as the Internet and use of open standard like Session Initiation Protocol (SIP), launching an attack on a telephony server is much simpler. Availability is one of the major issues of computer security, along with confidentiality and integrity. Denial of service (DoS) is a threat that potentially violates the availability of a resource in a system. In this survey, we are discussing the DoS flooding attack on SIP server. Firstly, we present a brief overview about the SIP protocol. Then, we discuss security attacks related to SIP protocol. After that, we talk about the detection techniques of SIP flooding attack and various exploited resources due to attack.
Key-Words / Index Term
VoIP, SIP flooding, DoS, PSTN
References
[1] D. Sisalem, J. Kuthan, T. Elhert,� Denial of Service Attacks Targeting SIP VoIP Infrastructure: Attack Scenarios and prevention Mechanisms�, IEEE Network, Page No (26-31), Oct 2006.
[2] Jan Stanek, Lukas Kencl, and Jiri Kuthan� Characteristics of Real Open SIP-Server Traffic�,Springer , Page No (187-197) ,2013.
[3] ITU, Draft Revised Recommendation H.323 V5, Geneva, 20-30, May 2003.
[4] H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M. Handley, E. Schooler, and J. Rosenberg, �SIP: Session Initiation Protocol�, RFC 3261, June 2002.
[5] Jin Tang and Yu Cheng, �Quick Detection of Stealthy SIP Flooding Attacks in VoIP Networks�, IEEE ICC, Page No(1-5), 2011.
[6] D. Geneiatakis, A. Dagiuklas, G. Kambourakis, C. Lambrinoudakis, S. Gritzalis, S. Ehlert, D. Sisalem,� Survey of security vulnerabilities in Session Initiation Protocol�, IEEE Communications Surveys and Tutorials, Volume-8,Issue-3,Page No(68-81), 2006.
[7] S. Ehlert, G. Zhang, D. Geneiatakis, G. Kambourakis, T. Dagiuklas, J. Markl, and D. Sisalem, �Two layer Denial of Service prevention on SIP VoIP infrastructures�, Elsevier, Computer Communications, Page No(2443-2456),2008.
[8] E. Y. Chen, �Detecting DoS attacks on SIP systems�, 1st IEEE Workshop on VoIP Management and Security, Page No( 53�58), April 2006.
[9] Jin Tang, Yu Cheng and Yong Hao,� Detection and Prevention of SIP Flooding Attacks in Voice over IP Networks�,IEEE INFCOM,Page No(1161-1169),2012.
[10] Rafique, M.Z., Ali Akbar, M. Farooq., �Evaluating DoS Attacks against SIP-based VoIP Systems�,IEEE GLOBECOM, Page No(1-6),2009.
[11] Abhishek Bansal, Prashant Kulkarni, Alwyn R. Pais� Effectiveness of SIP Messages on SIP Server�, Proceedings of 2013 IEEE International Conference on Information and Communication Technologies,Page No(251-256),2013.
[12] Ming Luo Tao Peng & Christopher Leckie,�CPU-based DoS Attacks Against SIP Servers�, IEEE,Page No(41-48),2008 .
[13] Harish C. Sharma Sanjay Sharma Sandeep Chopra Pradeep Semwal �The Protection Mechanism against DOS and SQL Injection Attack in SIP Based Infrastructure�, IJARCSSE,Volume-3,Issue-1,Page No(252-256),Jan 2013.
[14] H. Sengar, H. Wang, D. Wijesekera and S. Jajodia, �Detecting VoIP Floods Using the Hellinger Distance�, IEEE Transactions on Parallel and Distributed Systems, Volume-19, Issue- 6, Page No(794-805), June 2008.
[15] Dongwon Seo ,Heejo Lee , Ejovi Nuwere �SIPAD: SIP�VoIP Anomaly Detection using a Stateful Rule Tree�,Elsevier,Computer communication,Page No(562-574),2013.
[16] Jin Tang, Yu Cheng, and Chi Zhou� Sketch-Based SIP Flooding Detection Using Hellinger Distance�,IEEE GLOBECOM, Page No(1-6), 2009 .
[17] Abhishek Kumar, Dr. P. Santhi Tilagam,� A Novel Approach for Evaluating and Detecting Low Rate SIP Flooding Attack� International Journal of Computer Applications,Volume 26� No.1,Page No (0975 � 8887),July 2011
[18] Xianglin Deng, Malcolm Shore,�Advanced Flooding Attack on a SIP Server�, IEEE Computer Society,Page No(647-652),2009.
[19] Dahham Allawi, Alaa Aldin Rohiem, Ali El-moghazy and Ateff Ghalwash,�New Algorithm for SIP Flooding Attack Detection�,IJCST , Volume- 4, Issue- 3, Page No(10-19), March 2013.
[20] Gaston Ormazabal, Sarvesh Nagpal, Eilon Yardeni, and Henning Schulzrinne �Secure SIP: A Scalable Prevention Mechanism for DoS Attacks on SIP Based VoIP Systems�, Springer,Page No(107-132), 2008.
[21] Housam Al-Allouni1,Alaa Eldin Rohiem , Mohammed Hashem Abd El-Aziz Ahmed, Ali El-moghazy ,� VoIP Denial of Service Attacks Classification and Implementation�, 26th NATIONAL RADIO SCIENCE CONFERENCE ,Page No(1-12),17-19 March 2009.
[22] Mahak Chowdhary, Shrutika Suri and Mansi Bhutani, �Comparative Study of Intrusion Detection System,� Proc. International Journal on Computer Science & Engineering, 2011, vol. 2, Issue 4, pp. 197-200.
Citation
M.Kaur, S. Kumar, S. Sharma, "DoS Flooding Attacks against SIP based VoIP Systems- a Survey," International Journal of Computer Sciences and Engineering, Vol.2, Issue.5, pp.112-117, 2014.
A Review of Approaches for Steganography
Review Paper | Journal Paper
Vol.2 , Issue.5 , pp.118-122, May-2014
Abstract
Steganography is the art and science of hiding communication; a steganographic system thus embeds hidden content in unremarkable cover media so as not to arouse an eavesdropper�s suspicion. Many different carrier file formats are used, but digital images are the most popular because of their frequency on the internet. For hiding secret information in images, there exist a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points. Different applications have different requirements of steganography technique used. For example, some applications may require absolute invisibility of the secret information, while others require a larger secret message to be hidden. This paper intends to give an overview of image steganography, its uses and techniques. It also attempts to identify the requirements of a good steganographic algorithm and briefly reflects on which steganographic techniques are more suitable for which applications.
Key-Words / Index Term
Steganography, image-audio-video-text Steganography
References
[1] N.F. Johnson, S. Jajodia, Exploring steganography: seeing the unseen, IEEE Computer 31 (2) (1998) 26�34.
[2] J.C.Judge, Steganography: past, present, future. SANS Institute publication,
[3] F.A.P.Petitcolas, R.J.Anderson, M.G.Kuhn:�Information Hiding- A Survey�, Process of IEEE, vol.87,no.7, pp.1062-1078, July, 1999.
[4] Artz D (2001). �Digital steganography: hiding data within data� Internet Computing. IEEE, 5(3): 75-80 [5] Derek Upham, Jsteg, http://zooid.org/ Paul/crypto/jsteg.
[6] Nassir Memon R. Chandramouli. Analysis of lbs. based image steganography techniques. In Proceedings of IEEE ICIP, 2001.
[7] R. Chandramouli, Nassir Memon, �Analysis of LSB Based Image Steganography Techniques�, IEEE 2001. [8] K. Sullivan, Z. Bi, U. Madhow, S. Chandrasekaran, and B. S. Manjunath, Steganalysis of quantization index modulation data hiding, Proc. of 2004 IEEE International Conference on Image Processing, vol. 2, pp. 1165-1168, 2004.
[9]Jar no Mielikainen, "LSB Matching Revisited", Signal Processing Letters, IEEE, Publication Date: May 2006 Volume : 13, Issue : 5, pp. 285- 287
[10] K. Gopalan. Audio steganography using bit modification. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, (ICASSP �03), volume 2, pages 421�424, 6-10 April 2003.
[11] N. Johnson, Survey of Steganography Software, Technical Report, January 2002.
[12] W. Peter. Disappearing Cryptography: Information Hiding: Steganography and watermarking (second edition). San Francisco: Margan Kaufmann.
[13] Johnson, N.F. & Jajodia, S., �Exploring Steganography: Seeing the Unseen�, Computer Journal, February 1998.
[14] Krenn, R., �Steganography and Steganalysis�, http://www.krenn.nl/univ/cry/steg/article.pdf
Citation
K. Arora, G. Gandhi, "A Review of Approaches for Steganography," International Journal of Computer Sciences and Engineering, Vol.2, Issue.5, pp.118-122, 2014.
Usage of Multiple Clouds to increase Security in Cloud Computing
Research Paper | Journal Paper
Vol.2 , Issue.5 , pp.123-125, May-2014
Abstract
In today�s world Cloud computing has emerged like as a new model of computing. It is a paradigm shift in the computing history. Cloud services are ready to available without capital investment as they are commoditized. Cloud users may get services in pay per use fashion and enjoy so many benefits of cloud computing including less cost and accessibility from anywhere in the world. However, users have security issues as they outsource their secret business data to cloud and treat the cloud as �untrusted�. By using a single cloud service provider there might be the risk of service availability, possibility of failure and insider theft of data. By Moving towards multi clouds can address security problems. This paper aims of investigating how multiple-cloud can increase security and have impact on the usage of the cloud computing usage technology. We built a prototype application to simulate the advantages of using multiple-clouds to increase security. The empirical result shows that multiple-clouds can increase security.
Key-Words / Index Term
Cloud computing; Security; Single cloud; Multiple-clouds; Data integrity; Data intrusion; Service availability
References
[1] S. Subashini and V. Kavitha, "A survey on security issues in service delivery models of cloud computing", Journal of Network and Computer Applications, 34(1), 2011, pp.1-11.
[2] M.A. AlZain and E. Pardede, "Using Multi Shares for Ensu [2] M.A. AlZain and E. Pardede, "Using Multi Shares for ensuring Privacy in Database-as-a-Service", 44th Hawaii Intl. Conf. on System Sciences (HICSS), 2011, pp.1-9.
[3] Bessani, M. Correia, B. Quaresma, F.Andr� and P. Sousa, "DepSky: dependable and EuroSys`11 : Proc. 6th Conf. On Computer Systems, 2011, pp.31-46.
[4] F. Rocha and M. Correia, "Lucy in the Sky without Diamonds: Stealing Confidential Data in the Cloud", Proc. 1st Intl. Workshop of Dependability of Clouds, Data Centers and Virtual Computing Environments, 2011, pp.1-6.
[5] H.Abu-Libdeh, L. Prince house and H. Weatherspoon, "RACS: a case for cloud storage diversity", SoCC`10 : Proc 1st ACM symposium on Cloud computing, 2010 , pp.229-240.
[6] C. Cachin, R. Haas and M. Vukolic, "Dependable storage in the Inter cloud", Research Report RZ,3783, 2010.
[7] A.J. Feldman, W.P. Zeller, M.J. Freedman and E.W. Felten, "SPORC: Group collaboration using untrusted cloud resources", OSDI, October 2010, pp.1-14.
[8] E. Grosse, J. Howie, J. Ransome, J. Reavis and S.Schmidt, "Cloud computing roundtable", IEEE Security & Privacy, 8(6), 2010, pp.17-23.
[9] S. Kamara and K. Lauter, "Cryptographic cloud storage", FC`10: Proc. 14th Intl.Conf. On Financial cryptograpy and data security, 2010, pp.136-149.
[10] P. Mahajan, S. Setty, S. Lee, A. Clement, L. Alvisi,M. Dahlin and M. Walfish, "Depot: Cloud storage with minimal trust", OSDI`10: Proc. of the 9th USENIX Conf. on Operating systems design and implementation, 2010, pp.1-16.
[11] A. Shraer, C. Cachin, A. Cidon, I. Keidar, Y.Michalevsky and D. Shaket, "Venus: Verification for untrusted cloud storage", CCSW`10: Proc.ACM workshop on Cloud computing security workshop, 2010, pp.19-30.
[12] H. Takabi, J.B.D. Joshi and G.-J. Ahn, "Security and Privacy Challenges in Cloud Computing Environments", IEEE Security & Privacy, 8(6), 2010, pp. 24-31.
[13] M. Van Dijk and A. Juels, "On the impossibility of cryptography alone for privacy-preserving cloud computing", HotSec`10: Proc. 5th USENIX Conf. on Hot topics in security, 2010, pp.1-8.
[14] K.D. Bowers, A. Juels and A. Oprea, "HAIL: A high-availability and integrity layer for cloud storage", CCS`09: Proc. 16th ACM Conf. on Computer and communications security, 2009, pp.187-198.
[15] C. Cachin, I. Keidar and A. Shraer, "Trusting the cloud", ACM SIGACT News, 40, 2009, pp.81-86.
[16] Clavister, "Security in the cloud", Clavister White Paper, 2008.
[17] T.Ristenpart, E.Tromer, H.Shacham and S.Savage, �Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds:, CCS�- 09: Proc. 16th ACM Conf. on Computer and communications security, 2009, pp.199-212.
[18] N. Santos, K.P. Gummadi and R.Rodrigues, "Towards trusted cloud computing", USENIX Association, 2009, pp.3-3.
[19] C. Wang, Q. Wang, K. Ren and W. Lou, "Ensuring data storage security in cloud computing", ARTCOM`10: Proc. Intl. Conf. on Advances in Recent Technologies in Communication and Computing, 2010, pp.1-9.
[20] S.L. Garfinkel, "An evaluation of Amazon�s grid computing services: EC2, S3, and QS", Technical Report TR-08- 07, Computer Science Group, Harvard University, Cite seer, 2007, pp.1-15.
[21] J. Hendricks, G.R. Ganger and M.K. Reiter, "Low over head by zantine fault-tolerant storage", SOSP`07: Proc. 21st ACM SIGOPS symposium on Operating systems principles, 2007, pp.73-86.
[22] RedHat,https://rhn.redhat.com/errata/RHSA-2008-0855.html.
[23] Sun,http://blogs.sun.com/gbrunett/entry/amazon_s3_silent_data_corruption.
[24] S.L. Garfinkel, "Email-based identification and authentication: An alternative to PKI?", IEEE Security and Privacy, 1(6), 2003, pp.20-26.
[25] Amazon, Amazon Web Services. Web services licensing agreement, October3, 2006.
[26] H. Krawczyk, M. Bellare and R. Canetti, "HMAC: Keyed-hashing for message authentication", Cite seer, 1997, pp.1-11.
Citation
Ch.A. Kumar, K.S. Rao, "Usage of Multiple Clouds to increase Security in Cloud Computing," International Journal of Computer Sciences and Engineering, Vol.2, Issue.5, pp.123-125, 2014.
Analysis on Social Networking
Research Paper | Journal Paper
Vol.2 , Issue.5 , pp.126-128, May-2014
Abstract
Social Networking deals with connecting people through a common media. It builds links and a lot of algorithms are present to find the literatures in the links created. The most basic issue that is produced from this innovation is the abundance in the links. The concern is to figure out the interestingness in the links and the uniqueness it provides in each subject. We have used real world data for testing and creating output with interesting results.
Key-Words / Index Term
Social Netwroking, Social Networkers,links,predictors
References
[3]. A quantitative and qualitative research report into attitudes, behaviours and use http://news.bbc.co.uk/2/shared/bsp/hi/pdfs/02_04_08_ofcom.pdf
[4]. SOCIAL MEDIA AND MANAGING PERFORMANCE HTTP://WWW.ACAS.ORG.UK/INDEX.ASPX?ARTICLEID=3376
[5]. [The Effect Of Social Media on College Students http://scholarsarchive.jwu.edu/mba_student/5/
[6]. Workplaces and Social Networking http://www.acas.org.uk/media/pdf/f/q/1111_Workplaces_and_Social_Networking-accessible-version-Apr-2012.pdf
[7]. Social Networks and their impact on records and information management http://www.armaedfoundation.org/pdfs/Social_Networks_Impact_on_RIM_Streck.pdf
[8]. Current Trends and Research Challenges http://cordis.europa.eu/fp7/ict/netmedia/docs/publications/social-networks.pdf
[9]. Social Networking Sites and the Continuously Learning Health System: A Survey http://www.iom.edu/~/media/Files/Perspectives-Files/2014/Discussion-Papers/VSRT-PatientDataSharing.pdf
[10]. [Predicting Tie Strength With Social Media
[11]. https://www.cs.purdue.edu/homes/aliaga/cs197-10/papers/predicting-tie-strength.pdf
[12]. Predicting the Future With Social Media
http://www.hpl.hp.com/research/scl/papers/socialmedia/socialmedia.pdf
Citation
K. Nasa, U. Sharma, "Analysis on Social Networking," International Journal of Computer Sciences and Engineering, Vol.2, Issue.5, pp.126-128, 2014.
Defending Against Source Routing Attacks and Packet Forwarding in Ad-Hoc Networks
Research Paper | Journal Paper
Vol.2 , Issue.5 , pp.129-133, May-2014
Abstract
A wireless Ad-hoc network is the collection of wireless nodes that can co-operate by forwarding packets for each other to allow nodes to communicate directly. The prominence of the place of wireless ad-hoc networking is become more crucial to everyday functioning of people. This is due to obvious advantages of the wireless networks with ubiquity access and minimal hardware requirements in networks. The ad-hoc nature of sensor network means no structure can be statically defined. The network topology is always subject to change due to node failure, addition or mobility. Since nodes may fail or be replaced the network must support self-configuration. Routing and data forwarding is a crucial service for enabling communication in ad-hoc networks. Unfortunately, current routing protocols suffer from many security vulnerabilities. In this paper prior security work in this area focused primarily on source routing attacks. Low power wireless networks are an existing research direction in routing and packet forwarding.
Key-Words / Index Term
Security, Ad-Hoc Networks, Vulnerabilities, Wireless Networks, Sensor Networks, Resource Exhaustion Attacks, Route Disruption Attacks
References
[1]. Yih-Chun Hu, Adrian Perrig, and David B. Johnson, Ariadne: A secure on-demand routing protocol for ad hoc networks, MobiCom, 2002.
[2]. Yih-Chun Hu, David B. Johnson, and Adrian Perrig, SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks, IEEE workshop on mobile computing systems and applications, 2002.
[3]. Manel Guerrero Zapata and N. Asokan, Securing ad hoc routing protocols, WiSE, 2002.
[4]. Kihong Park and Heejo Lee, On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack, INFOCOM, 2001.
[5]. Vern Paxson, An analysis of using reflectors for distributed denial-of service attacks, SIGCOMM Comput. Commun. Rev. 31 (2001), no. 3.
[6]. Packet leashes: A defense against wormhole attacks in wireless ad hoc networks, INFOCOM, 2003.
[7]. Bryan Parno, Mark Luk, Evan Gaustad, and Adrian Perrig, Secure sensor network routing: A clean-slate approach, CoNEXT, 2006.
[8]. David B. Johnson, David A. Maltz, and Josh Broch, DSR: the dynamic source routing protocol for multihop wireless ad hoc networks, Ad hoc networking, 2001.
[9]. Lakshminarayanan Subramanian, Randy H. Katz, Volker Roth, Scott Shenker, and Ion Stoica, Reliable broadcast in unknown fixed-identity networks, Annual ACM SIGACT-SIGOPS symposium on principles of distributed computing, 2005.
[10]. Marcin Poturalski, Panagiotis Papadimitratos, and Jean-Pierre Hubaux, Secure neighbor discovery in wireless networks: Formal investigation of possibility, ACM ASIACCS, 2008.
[11]. Amitabh Saxena and Ben Soh, One-way signature chaining: a new paradigm for group cryptosystems, International Journal of Information and Computer Security 2 (2008), no. 3.
[12]. A Survey of Source Routing Protocols, Vulnerabilities and Security in Wireless Ad-hoc Networks, International journal of Computer Sciences and Engineering, 2014.
Citation
S. Kolla, "Defending Against Source Routing Attacks and Packet Forwarding in Ad-Hoc Networks," International Journal of Computer Sciences and Engineering, Vol.2, Issue.5, pp.129-133, 2014.
Detecting Face in video file and images
Research Paper | Journal Paper
Vol.2 , Issue.5 , pp.134-137, May-2014
Abstract
Face detection is very first term face recognition. Find Face and feature of face has very important in many application such as face tracking, surveillance and security system etc. This paper presents a face detection technique which detects the faces in images and video file. It receives the images or video file from camera and detects the locations of face(s). This system uses Opencv library and VC 10.
Key-Words / Index Term
Fact detection, Haar classifier, cascade, opencv.
References
[1] I. Sajid, M. M. Ahmed, I. Taj, M. Humayun, and F.Hameed, �Design of high performance fpga based face recognition system�, in PIERS Proceedings, Cambridge, July 2 2008.
[2] H. T. Ngo, R. Gottumukkal, and V. K. Asari,� A flexible and efficient hardware architecture for real-time face recognition based on eigenface�, in IEEE Computer Society Annual Symposium on VLSI, 2005.
[3] Sathaporn Visakhasart, Orachat Chitsobhuk, �Multi-Pipelinearchitecture for face recognition on FPGA�, International Conference on digital Image Processing, 2009, p. 152-156.
[4] J. Cho, S. Mirzaei, J. Oberg, and R. Kastner, �Fpga-based face detection system using haar classifiers�, in International Symposium on Field Programmable Gate Arrays, February2009.
[5] J. Cho, B. Benson, and R. Kastner, �Hardware acceleration of multi-view face detection�, in IEEE Symposium on Application Specific Processors, July 2009.
[6] P. Viola and M. Jones, �Robust real-time object detection�, International Journal of Computer Vision, 57(2), 137-154, 2004.
[7] Vikas V. Mankar, Chandrakant N.Bhoyar,� Efficient Real Time Face Detection Technique Using Harr Classifier� , International Journal of Engineering and Innovative Technology (IJEIT), Volume 1, Issue 5, May 2012.
[8] M.Gopi Krishna, A. Srinivasulu, �Face Detection System on AdaBoost Algorithm Using Haar Classifiers�, International Journal of Modern Engineering Research (IJMER) Vol. 2, Issue. 5, Sep.-Oct. 2012 , pp-3556-3560
[9] Quan Li, Usman Niaz, and Bernard Merialdo, �An Improved Algorithm on Viola-Jones Object detector �CBMI , 2012 IEEE.
[10] Jianfang Dou, Jianxun Li, Zhi Zhang, Shan Han, �Face Tracking with an Adaptive Adaboost-Based Particle Filter�, 2012 IEEE.
[11] P.Karthigayani and Dr.S.Sridhar, �Occlusion verification in facedetection and age estimation using local binary pattern and dtod classifier using morph dataset�, Indian Journal of Computer Science and Engineering (IJCSE), Vol. 4 No.1 Feb-Mar 2013, pp. 1-10
Citation
N. Mahale, M.S. Nagmode, "Detecting Face in video file and images," International Journal of Computer Sciences and Engineering, Vol.2, Issue.5, pp.134-137, 2014.
Efficacy of Different Strategies in Graph Coloring with Parallel Genetic Algorithms
Research Paper | Journal Paper
Vol.2 , Issue.5 , pp.138-141, May-2014
Abstract
In this paper a new parallel genetic algorithm is proposed to observe efficacy of different strategies for k-graph coloring problem. In the algorithm we have applied a coarse-grained model of parallelism, along with two new algorithms for crossover and mutation are represented: FCX and Fmm. these algorithms compared with CEX�s First Fit and Transposi-tion mutation operators. In our experiments, we observed that different strategies what role have in finding solutions. In computer simulations of PGA we used DIMACS benchmark.
Key-Words / Index Term
Graph Coloring Problem, Migration Model, Migration Strategy, Parallel Genetic Algorithm
References
[1] Erick Cantu-Paz David E. Goldberg, �Efficient parallel genetic algorithms: theory and practice�, J. Computer Methods in Applied Mechanic and Engineering. 186, 2000, pp.221-238
[2] Zbigniew Kokosinski, Marcin Kolodziej, Krzysztof Kwarciany, �Parallel Genetic Algorithm for Graph Coloring Problem�, ICCS 2004, LNCS 3036, pp. 215�222
[3] Saeed Amizadeh, Farzad Rastegar, Caro Lucas, �Incorporating Heuristics In Evolutionary Optimization�, J. Intelligent Information Technology Computing, Vol.1, No.2, 2006, pp. 259-270
[4] Zbigniew Kokosinski, Krzysztof Kwarciany, Marcin Kolodziej, �Efficient Graph Coloring With Parallel Genetic Algorithms�, J. Computing and Informatics, Vol. 24, 2005, pp. 1001-1025
[5] Z.G. Wang, Y.S. Wong, M. Rahman, "Development of a parallel optimization method based on genetic simulated annealing algo-rithm", J. Parallel Computing, Vol. 31 ,2005, pp. 839�857
[6] Erick Cantu-Paz, "Migration Policies, takeover Times in parallel genetic algorithms", Department of computer science and Illinois Genetic Algorithm Laboratory, 1999
[7] http://mat.gsia.cmu.edu/COLOR/instances.html
[8] ftp://dimacs.rutgers.edu/pub/challenge/graph/benchmarks/
[9] http://mat.gsia.cmu.edu/COLORING03/
Citation
F.E. Sangari, M. Nabahat, "Efficacy of Different Strategies in Graph Coloring with Parallel Genetic Algorithms," International Journal of Computer Sciences and Engineering, Vol.2, Issue.5, pp.138-141, 2014.
Comparative Study of Hierarchical Routing Protocols in Wireless Sensor Networks
Review Paper | Journal Paper
Vol.2 , Issue.5 , pp.142-147, May-2014
Abstract
Wireless sensor networks (WSN) comprise a wide variety of applications in every field. Wireless sensor networks consist of small nodes with numerous capabilities such as sensing, computation, and wireless communications. Main area of concern in wireless sensor network is energy. As sensor in wireless sensor networks works on battery and have limited energy, therefore they have a limited lifetime. There comes the idea of hierarchical clustering. Hierarchical clustering of nodes and routing as per clusters contributes in reducing energy consumption and increasing lifetime of a network. This paper presents the study of hierarchical-based routing protocols (HBRP) such as leach and pegasis protocol proposed for wireless sensor networks. Additionally, the paper includes the comparison analysis of both protocols based on some parameter.
Key-Words / Index Term
WSN;HBRP;LEACH;PEGASIS
References
[1] Abad, M. F. K., & Jamali, M. A. J. (2011). Modify LEACH Algorithm for Wireless Sensor Network. International Journal of Computer Science Issues (IJCSI), 8(5).
[2] Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: a survey. Computer networks, 38(4), 393-422.
[3] Garc�a Villalba, L. J., Sandoval Orozco, A. L., Trivi�o Cabrera, A., & Barenco Abbas, C. J. (2009). Routing protocols in wireless sensor networks. Sensors, 9(11), 8399-8421.
[4] Jung, S. M., Han, Y. J., & Chung, T. M. (2007, February). The concentric clustering scheme for efficient energy consumption in the PEGASIS. In Advanced Communication Technology, The 9th International Conference on (Vol. 1, pp. 260-265). IEEE.
[5] Li, B., & Zhang, X. (2012). Research and Improvement of LEACH Protocol for Wireless Sensor Network. In International Conference on Information Engineering Lecture Notes in Information Technology (Vol. 25).
[6] Majadi, N. (2012). U-LEACH: A Routing Protocol for Prolonging Lifetime of Wireless Sensor Networks. International Journal of Engineering Research and Applications (IJERA) Vol, 2, 1649-1652.
[7] Rajiullah, M., & Shimamoto, S. (2007, March). An energy-aware periodical data gathering protocol using deterministic clustering in Wireless Sensor Networks (WSN). In Wireless Communications and Networking Conference, 2007. WCNC 2007. IEEE (pp. 3014-3018). IEEE
[8] Shankar, M., Sridar, D. M., & Rajani, D. M. (2012). Performance evaluation of leach protocol in wireless network. International Journal of Scientific & Engineering Research, 3(1), 1.
[9] Wang, Y., Zhao, Q., & Zheng, D. (2004, August). Energy-driven adaptive clustering data collection protocol in wireless sensor networks. In Proceeding of the 2004 International Conference on Intelligent Mechatronics and Automation, Chengdu China.
[10] .Yueyang, L., Hong, J., & Guangxin, Y. (2006). An Energy-Efficient PEGASIS-Based Enhanced Algorithm in Wireless Sensor Networks. China Communications, 91-97.
Citation
V. Singhal, S. Suri, "Comparative Study of Hierarchical Routing Protocols in Wireless Sensor Networks," International Journal of Computer Sciences and Engineering, Vol.2, Issue.5, pp.142-147, 2014.
Comparative Study and Analysis of DSR, DSDVAND ZRP in Mobile Ad-Hoc Networks
Research Paper | Journal Paper
Vol.2 , Issue.5 , pp.148-152, May-2014
Abstract
Wireless networks where mobile nodes relay on each other to keep network connected without help of pre-existing infrastructure or centralized control are the mobile ad-hoc networks. These are the self organizing temporary wireless networks. An efficient and effective routing protocol for real MANETs is a major design issue, therefore to achieve optimum values of performance parameter under network scenarios where nodes are subjected to different type of mobility that dynamically change the network topology. Due to the link instability and mobility of node, the topology of ad-hoc network changes and routing become difficult. Many ad-hoc routing protocols have been proposed in the recent years. These protocols can be classified in three main categories: proactive, reactive and hybrid routing protocols. In this paper study of these existing routing protocols is done and comparison analysis of DSDV, DSR and ZRP is performed.
Key-Words / Index Term
Mobile ad-hoc netwrok, DSDV, DSR and ZRP
References
[1] Abolhasan, Mehran, Tadeusz Wysocki, and Eryk Dutkiewicz. "A review of routing protocols for mobile ad hoc networks." Ad hoc networks 2, no. 1 (2004): 1-22.
[2] Haas, Zygmunt J., and Marc R. Pearlman. "The performance of query control schemes for the zone routing protocol." IEEE/ACM Transactions on Networking (TON) 9, no. 4 (2001): 427-438.
[3] Khetrapal, Ankur. "Routing Techniques for Mobile Ad Hoc Networks Classification and Qualitative/Quantitative Analysis." In ICWN, pp. 251-257. 2006.
[4] Kumar, Jogendra. "Comparative Performance Analysis of AODV, DSR, DYMO, OLSR and ZRP Routing Protocols in MANET Using Varying Pause Time."International Journal of Computer Communications and Networks (IJCCN) 3, no. 1 (2012): 43-51...
[5] Nasipuri, Asis, Ryan Burleson, Benjamin Hughes, and Johnny Roberts. "Performance of a hybrid routing protocol for mobile ad hoc networks." InComputer Communications and Networks, 2001. Proceedings. Tenth International Conference on, pp. 296-302. IEEE, 2001.
[6] Nayak, T. Ravi, Sake Pothalaiah, and Dr K. Ashok Babu. "Implementation of adaptive Zone routing protocol for Wireless networks." International Journal of Engineering Science and Technology 2, no. 12 (2010): 7273-7288.
[7] Pandey, Kavita, and Abhishek Swaroop. "A Comprehensive Performance Analysis of Proactive, Reactive and Hybrid MANETs Routing Protocols."International Journal of Computer Science Issues (IJCSI) 8, no. 6 (2011).
[8] Rahman, Md Arafatur, Farhat Anwar, Jannatul Naeem, and Md Sharif Minhazul Abedin. "A simulation based performance comparison of routing protocol on Mobile Ad-hoc Network (proactive, reactive and hybrid)." In Computer and Communication Engineering (ICCCE), 2010 International Conference on, pp. 1-5. IEEE, 2010.
[9] Sathish, S., K. Thangavel, and S. Boopathi. "Comparative Analysis of DSR, FSR and ZRP Routing Protocols in MANET." In International Conference on Information and Network Technology IPCSIT vol, vol. 4. 2011.
[10] Zhang, Xiaofeng, and Lillykutty Jacob. "Adapting zone routing protocol for heterogeneous scenarios in ad hoc networks." In Parallel Processing, 2003. Proceedings. 2003 International Conference on, pp. 341-348. IEEE, 2003.
Citation
R. Kachal, S. Suri, "Comparative Study and Analysis of DSR, DSDVAND ZRP in Mobile Ad-Hoc Networks," International Journal of Computer Sciences and Engineering, Vol.2, Issue.5, pp.148-152, 2014.