Successfully reported this slideshow.

October 2020: Top Read Articles in Distributed and Parallel systems

0

Share

1 of 29
1 of 29

October 2020: Top Read Articles in Distributed and Parallel systems

0

Share

Download to read offline

The growth of Internet and other web technologies requires the development of new algorithms and architectures for parallel and distributed computing. International journal of Distributed and parallel systems is a bi monthly open access peer-reviewed journal aims to publish high quality scientific papers arising from original research and development from the international community in the areas of parallel and distributed systems. IJDPS serves as a platform for engineers and researchers to present new ideas and system technology, with an interactive and friendly, but strongly professional atmosphere.

The growth of Internet and other web technologies requires the development of new algorithms and architectures for parallel and distributed computing. International journal of Distributed and parallel systems is a bi monthly open access peer-reviewed journal aims to publish high quality scientific papers arising from original research and development from the international community in the areas of parallel and distributed systems. IJDPS serves as a platform for engineers and researchers to present new ideas and system technology, with an interactive and friendly, but strongly professional atmosphere.

More Related Content

Similar to October 2020: Top Read Articles in Distributed and Parallel systems

Related Books

Free with a 14 day trial from Scribd

See all

October 2020: Top Read Articles in Distributed and Parallel systems

  1. 1. October 2020: Top Read Articles in Distributed and Parallel systems International Journal of Distributed and Parallel systems (IJDPS) ISSN : 0976 - 9757 [Online] ; 2229 - 3957 [Print] http://airccse.org/journal/ijdps/ijdps.html
  2. 2. BLUETOOTH SECURITY THREATS AND SOLUTIONS: A SURVEY Nateq Be-Nazir Ibn Minar1 and Mohammed Tarique2 1 Department of Electrical and Electronic Engineering, American International University, Bangladesh 2 Department of Electronic and Communication, Ajman University of Science and Technology, United Arab Emirates ABSTRACT Bluetooth technology has become an integral part of this modern society. The availability of mobile phones, game controllers, Personal Digital Assistant (PDA) and personal computers has made Bluetooth a popular technology for short range wireless communication. However, as the Bluetooth technology becomes widespread, vulnerabilities in its security protocols are increasing which can be potentially dangerous to the privacy of a user’s personal information. The security issues of Bluetooth have been an active area of research for the last few years. This paper presents the vulnerabilities in the security protocols of this technology along with some past security threats and possible countermeasures as reported in the literatures which have been surveyed and summarized in this paper. It also presents some tips that end-users can implement immediately to become more cautious about their private information. Finally, the paper concludes with some recommendations for future security enhancements that can be implemented in the Bluetooth standard. KEYWORDS Bluetooth, encryption, security protocols, security threats, countermeasures, Bluetooth enhancements For More Details : http://airccse.org/journal/ijdps/papers/0112ijdps10.pdf Volume Link : http://airccse.org/journal/ijdps/current2012.html
  3. 3. REFERENCES [1] “The Bluetooth Blues”, available at http://www.information- age.com/article/2001/may/the_bluetooth_blues [2] Bluetooth SIG, Specification of the Bluetooth System: Volume 2, Profile, Version 1.1, Feb. 22, 2001. available at: https://www.bluetooth.org/About/bluetooth_sig.htm [3] “The History of Bluetooth”, available at: http://www.bluetomorrow.com/about- bluetoothtechnology/history-of-bluetooth/bluetoothhistory.html [4] Monson, Heidi - "Bluetooth Technology and Implications" available at: http://www.sysopt.com/features/ network/article.php/3532506 (1999-12- 14). [5] “How Bluetooth Works", available at: http://en.kioskea.net/contents/bluetooth/bluetooth- fonctionnement.php3. [6] Mohammed Mana, Mohammed Feham, and Boucif Amar Bensaber, “A light weight protocol to provide location privacy in wireless body area networks”, International Journal of Network Security and its Applications (IJNSA), Vol.3, No.2, March 2011 [7] Yasir Arfat Malkani and Lachhman Das Dhomeja, “PSim: A tool for analysis of device pairing methods”, International Journal of Network Security & Its Applications (IJNSA), Vol.1, No.3, October 2009 [8] Kumar, A., et al. Caveat eptor, “A comparative study of secure device pairing methods”, IEEE International Conference on Pervasive Computing and Communications (PerCom-09). 2009. [9] Jochen Schiller, “Mobile Communications”, Second Edition, Addison Wesley Publications, 2003, pp. 290-292 [10] Bluetooth Profiles” Bluetooth Resource Center, Palowireless Pty Ltd. available at: http://www.palowireless.com/ infotooth/tutorial/profiles.asp [11] SaileshRathi, “Bluetooth Protocol Architecture”, Microware Systems Corporation available at: http://www.dedicated-systems.com/Magazine/00q4/2000q4_p028.pdf [12] “Bluetooth Versions”, summary of all the Bluetooth versions released to date, available at: http://www.bluetomorrow.com/about-bluetooth-technology/general- bluetoothinformation/bluetooth- versions.html [13] Bluetooth Version 4.0 Released. Bluetooth SIG, available at: http://www.bluetooth.com/Pages/High- Speed.aspx [14] Keijo Haataja, “Security Threats and Countermeasures in Bluetooth Enabled Systems”, Kuopio University Library, 2009, pp. 55-62 [15] “The BlueBug”, a Bluetooth virus, available at: http://trifinite.org/trifinite_stuff_bluebug.html [16] John Oates, “Virus attacks mobiles via Bluetooth”, available at: http://www.theregister.co.uk/2004/06/15/symbian_virus/ [17] F-Secure Article on Lasco.A Worm, available at: http://www.f-secure.com/v-descs/lasco_a.shtml
  4. 4. [18] Ford-Long Wong, Frank Stajano, Jolyon Clulow, “Repairing the Bluetooth pairing protocol”. University of Cambridge Computer Laboratory, available at: http://www.cl.cam.ac.uk/research/dtg/~fw242/publications/2005-WongStaClu-bluetooth.pdf [19] Phone pirates in seek and steal mission", Cambridge Evening News, available at: http://www.cambridge- news.co.uk/news/region_wide/2005 /08/17/ [20] "Going Around with Bluetooth in Full Safety”, available at: http://www.securenetwork.it/ricerca/whitepaper/download/ bluebag_brochure.pdf [21] Yaniv Shaked, Avishai Wool, “Cracking the Bluetooth PIN” School of Electrical Engineering Systems, Tel Aviv University, available at: http://www.eng.tau.ac.il/~yash/shaked-wool-mobisys05/ [22] Keijo Haataja, “Security Threats and Countermeasures in Bluetooth-Enabled Systems”, Kuopio University Library, 2009, pp. 68-80 [23] Colleen Rhodes, “Bluetooth Security”, East Carolina University, pp.6-9 [24] Karen Scarfone and John Padgette, (Bluetooth Threats) “Guide to Bluetooth Security”, Computer Security Division - National Institute of Standards and Technology, US Department of Commerce, 2008, pp. 25-26 [25] Raquel Hill and Billy Falotico, “Bluetooth Wireless Technology Security Threats and Vulnerabilities”, Indiana University Bloomington, 2008, pp. 7-8 [26] Karen Scarfone and John Padgette, (Bluetooth Vulnerabilities) “Guide to Bluetooth Security”, Computer Security Division - National Institute of Standards and Technology, US Department of Commerce, 2008, pp.24-25 AUTHORS Nateq Be-Nazir Ibn Minar is a Research Scientist currently rendering his expertise independently to institutions and manufacturing industries. He obtained his Bachelor of Science degree in Electrical and Electronics Engineering, with a special interest in Robotics and Industrial Automation, from American International University - Bangladesh in 2008 and later obtained his Master of Science degree, in Telecommunication Engineering, focusing on Wireless Networks. His research interests include satellite communications, network security, low-powered wireless devices, industrial automation, robotics and green technology. He is the CEO of EcoWave – a company dedicated to produce green electronic products for the benefit of the environment. He is an active member of IEEE and does volunteer work for several societies. Mohammed Tarique is an Assistant Professor in the Department of Electronic and Communication, Ajman University of Science and Technology, in United Arab Emirates. His research int erests include Adhoc Networks and wireless network security, network testing and simulations. His research primarily focuses on the design of Wireless Adhoc Networks.
  5. 5. BREAST CANCER DIAGNOSIS USING MACHINE LEARNING ALGORITHMS –A SURVEY B.M.Gayathri1 ,C.P.Sumathi2 and T.Santhanam3 1 Department of Computer Science, SDNB Vaishnav College for Women, Chennai, India 2 Department of Computer Science, SDNB Vaishnav College for Women, Chennai, India 3 Department of Computer Application, D.G.Vaishnav College for Men, Arumbakkam, Chennai, India ABSTRACT Breast cancer has become a common factor now-a-days. Despite the fact, not all general hospitals have the facilities to diagnose breast cancer through mammograms. Waiting for diagnosing a breast cancer for a long time may increase the possibility of the cancer spreading. Therefore a computerized breast cancer diagnosis has been developed to reduce the time taken to diagnose the breast cancer and reduce the death rate. This paper summarizes the survey on breast cancer diagnosis using various machine learning algorithms and methods, which are used to improve the accuracy of predicting cancer. This survey can also help us to know about number of papers that are implemented to diagnose the breast cancer. KEYWORDS Neural networks, SVM, RVM, ELM For More Details : http://airccse.org/journal/ijdps/papers/4313ijdps09.pdf Volume Link : http://airccse.org/journal/ijdps/current2013.html
  6. 6. REFERENCES [1] M.A.H Akhand & M.Murase “Neural network ensemble construction fusing multiple popular Methods.”. International journal of computer science 2004. [2] Tuba kiyan, Tulay Yildirim “Breast cancer diagnosis using statistical neural networks”, Journal of Electrical and Electronic Engineering. [3] P.K.Chenniappan & N.Anusheela “Early detection of cancer cells to lung cancer survival data by Neural network testing” International journal of neural network and application. [4] Chih-Lin Chi, W. Nick Street, and William H. Wolberg ” Application of Artificial Neural networkbased Survival Analysis on Two Breast Cancer Datasets”- AMIA Annu Symp Proc. 2007; 2007: 130–134. [5] Val´erie Bourd`es, St´ephane Bonnevay, Paolo Lisboa, R´emy Defrance, David P´erol, Sylvie Chabaud, Thomas Bachelot, Th´er`ese Gargi,6 and Sylvie N´egrier “Comparison of Artificial Neural Network with Logistic regression as Classification Models for Variable Selection for Prediction of Breast Cancer Patient outcomes” [6] I Guyon, J Weston, S Barnhill “Gene selection for cancer classification using support vector Machines” … - Machine learning, 2002 – Springer [7] MF Akay “Support vector machines combined with feature selection for breast cancer diagnosis”- Expert systems with applications, 2009 – Elsevier. [8] CL Huang, HC Liao “Prediction model building and feature selection with support vector machines in Breast cancer diagnosis “Expert Systems with Applications, 2008 – Elsevier. [9] Ilias Maglogiannis, E Zafiropoulos “An intelligent system for automated breast cancer diagnosis and Prognosis using SVM based classifiers” Applied Intelligence, 2009 – Springer. [10] AM Bagirov, B Ferguson, S Ivkovic “New algorithms for multi-class cancer diagnosis using tumor Gene expression signatures”, 2003 - Oxford Univ Press. [11] RF Chang, WJ Wu, WK Moon, YH Chou “Support vector machines for diagnosis of breast tumors on US images” - Academic radiology, 2003 – Elsevier [12] Y Rejani- “Early detection of breast cancer using SVM”. 2009 –arxiv [13] L Rong ,”Diagnosis of Breast Tumor Using SVM-KNN Classifier” - 2010 - Intelligent Systems (GCIS). [14] T Mu “Detection of breast cancer using v-SVM and RBF network.” - 2005 – C Medical Applications Of Signal. [15] Dr.C.P.Sumathi, Dr.T.Santhanam, A.Punitha “Combination of genetic algorithm and ART neural Network for breast cancer diagnosis”, 2007 -- Asian Journal of information technology, Medwell Journals. [16] F.Paulin, A.Santhakumaran “Classification of Breast cancer by comparing Back propagation training Algorithms”, 2011-International Journal on Computer Science and Engineering (IJCSE) [17] Dr. K. Usha Rani” Parallel Approach for Diagnosis of Breast Cancer using Neural Network Technique” International Journal of Computer Applications, Volume 10– No.3, November 2010. [18] G. Sophia Reena P. Rajeswari -2011 “A Survey of Human Cancer Classification using Micro Array Data”- International Journal of Computer Tech. Appl.,
  7. 7. [19] Balaji Krishnapuram, Alexander Hartemink, Lawrence Carin “Applying logistic regression and RVM To achieve accurate probabilistic cancer diagnosis from gene expression profiles” - Citeseerx.ist.psu.edu/viewdoc/summary?Doi=10.1.1.12.5909 [20] A. Bharathi and A.M. Natarajan “Cancer Classification using Support Vector Machines and Relevance Vector Machine based on Analysis of Variance Features”- Journal of Computer Science 7 (9): 1393-1399, 2011. [21] Fatima Eddaoudi , Fakhita Regragui , Abdelhak Mahmoudi , Najib Lamouri “Masses Detection Using SVM Classifier Based on Textures Analysis”- Applied Mathematical Sciences, Vol. 5, 2011, no. 8, 367 – 379. [22] Guoqiang Peter Zhang “Neural Networks for Classification: A Survey” IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART C: APPLICATIONS AND REVIEWS, VOL. 30, NO. 4, NOVEMBER 2000. [23] S. Aruna, Dr .S.P. Rajagopalan “ A Novel SVM based CSSFFS Feature Selection Algorithm for Detecting Breast Cancer” International Journal of Computer Applications (0975 – 8887) Volume 31– No.8, October 2011. [24] Xin Yao, Yong Liu “Neural Networks for Breast Cancer Diagnosis” 01999 IEEE [25] Dimitrios Siganos ”Neural Networks in medicine”, Www.doc.ic.ac.uk/~nd/surprise_96/journal/vol2/ds12/article2.html. [26] David B.Fogel, Eugene C, Wasson, Edward M.Boughton “Evolving neural networks for detecting Breast cancer”. 1995 Elsevier Science Ireland Ltd. [27] Dr.Santhosh baboo, S.Sasikala “A Survey on data mining techniques in gene selection and cancer Classification”-April 2010 International journal of Computer science and information technology. [28] Afzan Adam1 Khairuddin Omar2 “Computerized Breast Cancer Diagnosis with Genetic Algorithms And Neural Network”- fitt.mmu.edu.my/caiic/papers/afzanicaiet.pdf. [29] Zhang Qinli; Wang Shitong; Guo Qi; “A Novel SVM and Its Application to Breast Cancer Diagnosis” http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?Arnumber=4272649.
  8. 8. COMPARATIVE ANALYSIS OF RECTANGULAR AND CIRCULAR WAVEGUIDE USING MATLAB SIMULATION AZHAR SHADAB1 , LOKESH KUMAR2 , MOHIT KUMAR3 , KAMAL KISHOR4 , AKASH SETHI5 , ILA SHARMA6 1 Department of Electronics & Communication, Jaypee University, Solan, Himachal Pradesh, India 2 Department of Electronics & Communication, Jaypee University, Solan, Himachal Pradesh, India 3 Department of Computer Science, Jaypee university, Solan, Himachal Pradesh, India 4 Department of Electronics & Communication, Jaypee University, Solan, Himachal Pradesh, India 5 Department of Electronics & Communication, Jaypee University, Solan, Himachal Pradesh, India 6 Department of Electronics & Communication, Jaypee University, Solan, Himachal Pradesh, India ABSTRACT Electromagnetic waves is very strong waves which is used for transmission of signals from one place to other , main concern is medium having some physical structure through which it can propagate their waves. There are so many ways to guide this electromagnetic waves but main consideration in this paper is rectangular waveguide and circular waveguide.This paper analyze the different parameters of both the waveguides like (Cut off frequency, Cut off wavelength,Guide wavelength,Phase velocity, Group velocity, Impedance, power, Attenuation, VSWR) with the help of simulation in Matlab7.14 .Compare the parameters of the two waveguides and on the basis of these parameters result it is easy to get the best guided structure. KEYWORDS: Rectangular waveguide ,Circular waveguide,Waveguide modes, Matlab simulation. For More Details : http://airccse.org/journal/ijdps/papers/0712ijdps05.pdf Volume Link : http://airccse.org/journal/ijdps/current2012.html
  9. 9. REFERENCES [1] D.M.Pozar ,2005, “Microwave Engineering” John Wiley and Sons. [2] Karle S. Packard “The Origin of Waveguides: A Case of Multiple Rediscovery” IEEE transactions on Microwave theory and techniques, vol. mtt-32, no.9, september 1984. [3] Perregrini Y. Cassivi and P.Arcioni,2002 “Dispersion Characteristics of Substrate Integrated Rectangular Waveguide” IEEE transaction of Microwave and Wireless components,Vol 12,No.- 9,page no.333-335. [4] A.Munir and Mohammad F.Y.Musthofa,”Rectangular to Circular Waveguide Converter for Microwave Devices Characterization”,International Journal on Electrical Engineering and Informatics,Vol.3,No.3,2011. [5] Vivek Yadav , Udaybin Singh and A.K.Sinha, 2010 “Analysis and Design of Broadband Square to Circular Waveguide Transitions”,International Journal of Microwave and Optical Technology, Vol.5,No.3,May. [6] R.Vacek, Dec 1998,”Electromagnetic Wave Propagation in General Multimode Waveguide Structures Exhibiting Simultaneously Attenuation,Dispersion and Coupling Phenomena”, Journal of Microwave and Optoelectronics,Vol.1,No.3. [7] Amos Gilat, Edition-2004, “MATLAB- An Introduction with Applications”, John Wiley & Sons. [8] Rudra Pratap, 2006 “Getting Started with MATLAB7”. Oxford University Press. [9] Wikipedia. [10 Boremann,Amari and Vahldieck Mar 1999 “Analysis and design of circular ridged waveguide components” ” IEEE transactions on microwave devices,Volume 47,Issue:3,pages :330-335.
  10. 10. BIOGRAPHY Azhar Shadab received his B.E degree in Electronics and communication Engineering from NRI-IIST BHOPAL in 2010, and his M Tech degree in Electronics and Communications Engineering from the Jaypee University of Information Technology, Waknaghat, Himachal Pradesh 2012. His research int erests are in the areas of Microwave , VLSI and Signal Processing. Presently he is working on designing of low power fast fourier transform in VLSI. International Journal of Distributed and Parallel Systems (IJDPS) Vol.3, No.4, July 2012 52 Lokesh kumar received the B.E. degree from RITEE,Raipur(C.G).He is currently pursuing MTECH from Jaypee University of Information Technology, solan. Himachal Pradesh.His research interests are in t he VLSI design and circuit. Mohit kumar has done his B.E from D.Y.Patil College of Engineering (Pune university). He is currently persuing M-Tech(2nd yr) from Jaypee University of Information Technology,Solan. Himachal Pr adesh Kamal kishor received his B.E degree in Ele ctronics and communication Engineering from NRI-IIS T BHOPAL, 2010, and pursuing M Tech degree in Electronics an d Communications Engineering from the Jaypee University of Information Technology, Waknaghat, Himachal Pradesh. His research interests are in the areas of Microwave & Antenna. Akash Sethi received his Bachelor of Engineering degree in Electronics and Communications Engineering from G.G.I.T.S. Jabalpur(M.P.) 2009, and M.Tech degree in Electronics and Communications Engineering from the Jaypee University of Information Technology, Waknaghat(H.P.) 2012. His research interests are in the areas of Wireless Communication, Electrical Circuit Analysis and VLSI. Ila Sharma received her B.E degree in Electronics and Telecommunications Engineering fromG.E.C.Raipur, Chhattisgarh 2009, and her M Tech degree in Electronics and Communications Engineering from the Jaypee University of Information Technology, Waknaghat, Himachal Pradesh 2012. Her research interests are in the areas of Wireless Communication, Analog Electronics and Signal Processing.
  11. 11. REMOTE PATIENT MONITORING SYSTEM Sherin Sebastian, Neethu Rachel Jacob, Yedu Manmadhan, Anand V. R. , M. J. Jayashree Department of Electronics and Communication Engineering, Mar Baselios College of Engineering & Technology, Nalanchira, Trivandrum, India- 695015 ABSTRACT The Telemedicine system comprises of both hardware and software components at both the patient and doctor ends. A leading field for application of telemedicine is in the field of cardiology where ECG is the major tool for diagnosis. The proposed project in this paper provides an image based techniques to acquire and analyse a constant streaming of ECG signal through digital camera for image capturing, information extraction and analysis performed using MATLAB tools as well as data sending system based on internet network. The method captures the vital signs and parameters from the ICU monitoring machine using a webcam and transmits the image through the internet. This original image is then availed to the consulting doctor via an ANDROID cell phone. In case of anomaly a notification is send to the doctor’s phone. The paper proposes a method to capture, compare and generate alert regarding the patient’s condition using the heart rate and make the captured image be available to the physician. KEYWORDS Telemedicine, ECG, MATLAB, C2DM, Android For More Details : http://airccse.org/journal/ijdps/papers/3512ijdps09.pdf Volume Link : http://airccse.org/journal/ijdps/current2012.html
  12. 12. REFERENCES [1] 'International Cardiovascular Disease Statistics, Statistical Fact Sheet-2007 Update', American Heart Association, Dallas, Texas, 2007. [2]Lai Khin Wee, Yeo Kee Jiar, Eko Supriyanto “Electrocardiogram Data Capturing System and Computerized Digitization using Image Processing Techniques” International Journal of Biology and Biomedical Engineering Issue 3, Volume 3, 2009 [3] Khoór S, Nieberl J, Fügedi K, Kail E ‘Internet based, GPRS, longterm ECG monitoring and nonlinear heart-rate analysis for cardiovascular telemedicine management’ Computers in Cardiology 2003;28:209-212. [4] Ljupˇco Hadˇzievski, Boˇsko Bojovic´, Vladan Vukˇcevic´, Petar Beliˇcev, Siniˇsa Pavlovic´, Zorana Vasiljevic´-Pokrajˇcic´, and Miodrag Ostojic´’A Novel Mobile Transtelephonic System With Synthesized 12-Lead ECG’ IEEE Transaction on Information Technology in Biomedicine, Volume 8,2004 [5] Dr.R.Sukanesh, S.Palanivel rajan, S.Vijayprasath, S.Janardhana prabhu and P.Subathra ‘gsm based ecg tele-alert system’, Department of Electronics and Communication Engineering, Dept. of Electron. & Commun. Eng., Thiagarajar Coll. of Eng., Madurai, India Innovative Computing Technologies (ICICT), International Conference 2010 [6]Sukanesh R., Gautham P. ; Arunmozhivarman P.T. ; Rajan S.P. ; Vijayprasath S. ‘Cellular phone based biomedical system for health care’ Dept. of Electron. & Commun. Eng., Thiagarajar coll. of Eng.,Madurai, India Communication Control and Computing Technologies (ICCCCT), IEEE International Conference 2010 [7] 1V.Ramya, 2B.Palaniappan,3Anuradha Kumari ‘Embedded Patient Monitoring System’ International Journal of Embedded Systems and Applications (IJESA) Vol.1, No.2, December 2011 [8] Prof. Dr. Burkhard Stiller ’Mobile Healthcare on Android Devices’ Communication Systems Group, Diploma Thesis, Dept. of Informatics, November 2010 [9] Alma Secerbegovic∗ , Aljo Mujˇci´c∗ , Nermin Suljanovi´c∗ , Midhat Nurkic†, Jurij Tasic ‘The research mHealth platform for ECG monitoring’, ConTel Conference, 2011 [10] Elham Dolatabadi∗ , Serguei Primak ’Ubiquitous WBAN-based Electrocardiogram Monitoring System’ EHealth Networking Applications Conference, 2011
  13. 13. EMBEDDED SYSTEM FOR HAZARDOUS GAS DETECTION AND ALERTING V.Ramya1 , B. Palaniappan2 1 Assistant Professor, Department of CSE, Annamalai University, Chidambaram,India. 2 Dean, FEAT, Head, Department of CSE, Annamalai University, Chidambaram, India. ABSTRACT Safety plays a major role in today’s world and it is necessary that good safety systems are to be implemented in places of education and work. This work modifies the existing safety model installed in industries and this system also be used in homes and offices. The main objective of the work is designing microcontroller based toxic gas detecting and alerting system. The hazardous gases like LPG and propane were sensed and displayed each and every second in the LCD display. If these gases exceed the normal level then an alarm is generated immediately and also an alert message (SMS) is sent to the authorized person through the GSM. The advantage of this automated detection and alerting system over the manual method is that it offers quick response time and accurate detection of an emergency and in turn leading faster diffusion of the critical situation. KEYWORDS Air pollution Monitoring, gas sensors, GSM module, wireless networks. For More Details : http://airccse.org/journal/ijdps/papers/0512ijdps24.pdf Volume Link : http://airccse.org/journal/ijdps/current2012.html
  14. 14. REFERENCES [1]. R. Al-Ali, Member, IEEE, Imran Zualkernan, and FadiAloul, Senior Member, IEEE, “A Mobile GPRS- sensors array for Air Pollution Monitoring” vol.6, pp.410-422, Oct.2010. [2]. NihalKularatna, Senior Member, IEEE, and B. H. Sudantha, Member, IEEE “An Environment Air Pollution Monitoring System Based on the IEEE1451 Standard for Low Cost Requirements” IEEE Sensors J., Vol. 8, pp.415-422, Apr. 2008. [3]. M. Abu Jayyab, S. Al Ahdab, M. Taji, Z. Al Hamdani, F. Aloul, “Pollumap: Air Pollution mapper for cities”, in Proc. IEEE Innovations in Information Technology Conf., Dubai, UAE, Nov.2006,pp.1-5. [4]. Y. J. Jung, Y. K. Lee, D. G. Lee, K. H. Ryu, and S. Nittel, “Air pollution monitoring system based on geosensor network”, in Proc. IEEE Int. Geoscience Remote Sensing Symp., 2008, vol. 3, pp.1370-1373. [5]. M. Gao, F. Zhang, and J. Tian, “Environmental monitoring system with wireless mesh network based on Embedded System”, in proc. 5th IEEE Int. Symp. Embedded Computing, 2008, pp. 174-179. [6]. J. W. Kwon, Y. M. Park, S. J. Koo, and H. Kim, “Design of Air Pollution Monitoring system Using ZigBee Networks for ubiquitous-city ”, in proceedings of In. Conf. Convergence Information Technology, 2007, pp.1024-1031. [7]. Geng Juntato, Zhou Xiaotao, Zhang Bingjie, “An Atmosphere Environment Monitor System Based on Wireless Sensor Network”, Journal of Xihua University, Natural Science, Vol. 26, no.4, pp. 44-46 ,2007. [8] F. Tsow, E. Forzani, A. Rai, R. Wang, R. Tsui, S. Mastroianni, C. Knobbe, A. J. Gandolf, and N. j.Tao, “A wearable and wireless sensor system for real-time monitoring of toxic environmental volatile organic compounds”, IEEE sensors, J., vol. 9, pp. 1734-1740, Dec.2009. [9] W. Chung and C. H. Yang, “Remote Monitoring System with Wireless Sensor Module for Room Environment”, Sens. Actuators B, vol. 113, no.1, pp. 35-42, 2009. [10] Raj Kamal, “Embedded System Architecture Programming and Design” TATA Mc-Graw Hill. [11] N. Kularantna and B. H. Sudantha, “An environmental air pollution monitoring system based on the IEEE 1451 standard for low cost re-quirements,”IEEE, sensors J., Vol, 8, pp. 415- 422, Apr, 2008. [12]Y. J. Jung, Y. K. Lee, D. G. Lee, k. H. Ryu, and S. Nittel, “Air Pollution monitoring system based on geo sensor network ” in proc. IEEE Int. Geoscience Remote Sensing Symp., 2008, vol, 3, pp.1370-1373.
  15. 15. A CATEGORICAL REVIEW OF RECOMMENDER SYSTEMS RVVSV Prasad1 and V Valli Kumari2 1 Department of Computer Science & Engineering, Bhimavaram Institute of Engineering & Technology, Bhimavaram – 534243, India 2 Department. Of Computer Science & Systems Engineering, AU College of Engineering, Andhra University, Vishakapatnam – 533003, ABSTRACT As more and more information became available electronically, the need for effective information retrieval and implementation of filtering tools have became essential for easy access of relevant information. Recommender Systems (RS) are software tools and techniques providing suggestions for items and/or services to be of use to a user. These systems are achieving widespread success in ecommerce applications now a days, with the advent of internet. This paper presents a categorical review of the field of recommender systems and describes the state-of-the-art of the recommendation methods that are usually classified into four categories: Content based Collaborative, Demographic and Hybrid systems. This paper discusses the pro’s and con’s of the current categories as well as the trustworthiness of the recommender system in a new dimension as evaluating the evaluator for more appropriate recommendations. In the domain of recommender system, this work also put forward the use of agents as an enabling technology. KEYWORDS Collaboration, Demography, Information Filtering, Recommender System, Agent, Trust For More Details : http://airccse.org/journal/ijdps/papers/3512ijdps07.pdf Volume Link : http://airccse.org/journal/ijdps/current2012.html
  16. 16. REFERENCES [1]. Manisha Hiralall, (2011) Recommender systems for e-shops, Business Mathematics and Informatics paper, Vrije Universiteit, Amsterdam. [2]. Jannach, D. (2006) Finding preferred query relaxations in content-based recommenders. In: 3rd International IEEE Conference on Intelligent Systems, pp. 355–360. [3]. Resnick, P., Varian, H.R., (1997) Recommender systems. Communications of the ACM 40(3), 56–58. [4]. Francesco Ricci, Lior Rokach and Bracha Shapira, (2011) Introduction to Recommender Systems, Handbook, DOI 10.1007/978-0-387-85820-3_1, © Springer Science+Business Media, LLC. [5]. Qing Li and Byeong Man Kim, (2004) Constructing User Profiles for Collaborative Recommender System, APWeb 2004, LNCS 3007, pp. 100-110, 2004, Springer-Verlag Berlin Heidelberg. [6]. Zied Zaier, Robert Goding and Lue Faucher, Evaluating Recommender Systems, International Conference on Automated solutions for Cross Media Content and Multichannel Distribution, IEEE, 2008. [7]. Panagiotis Symeonidis, Alexandros Nanopoulos and Yannis Manolopoulos, (2007) Feature-Weighted User Model for Recommender Systems, LNAI 4511, pp. 97-106, Springer Verlag Berlin Heidelberg. [8]. M. J. Pazzani, (1999) A framework for collaborative, content-based and demographic filtering, Artificial Intelligence Review, 13(5-6):393-408. [9]. Kay, J, (2006) Scrutable adaptation: Because we can and must. In: Adaptive Hypermedia and AdaptiveWeb-Based Systems, 4th International Conference, AH 2006, Dublin, Ireland, June 21-23, 2006, Proceedings, pp. 11–19. [10]. Alfarez Abdul Rahaman and Stephen Hailes, (1997) Using Recommendations for Managing Trust in Distributed Systems, Proceedings of the IEEE International Conference on Communications. [11]. Ido Guy, Naama Zwerdling, David Carmel, Inbal Ronen, Erel Uziel, Sivan Yogev, Shila Ofek-Kolfman, (2009) Personalized Recommendation of Social Software Items Based on Social Relations, , ACM. [12]. Konstantin Pussep, Sebastian Kaune, Jonas Flick, Ralf Steinmetz, (2009) A Peer-to-Peer Recommender System with Privacy Constraints, IEEE. [13]. Olli Niinivaara, (2004) Agent-Based Recommender Systems, Helsinki 17.5.2004, Sofware Agent Technology Course Paper, Department of Computer Science,UNIVERSITY OF HELSINKI. [14]. Yan Zheng Wei, Lue Moreau and Nicholas R.Jennings, (2004) Learning Users’ Interests in a Market- Based Recommendation Systems, IDEAL 2004, LNCS 3177, pp. 833-840, Springer Verlag Berling Heidelberg. [15]. Osmar R. Zaiane, (2002) Building Recommender Agent for e-Learning System, Proceedings in ICCE, IEEE. [16]. Robert H.Guttman, Alexandros G. Moukas and Pattie Maes, (1998) Agent Mediated Electronic Commerce : A Survey, Journal The Knowledge Engineering Review, Volume 13 Issue 2 Pages 147 – 159. [17]. RVVSV Prasad, Vegi Srinivas, V. Valli kumari and KVSVN Raju, “Credibility based reputation calculation in P2P networks”, Springer-Verlag Berlin Heidelberg 2008, ICDCIT 2008, LNCS 5375, pp. 188- 195,2008.
  17. 17. AUTHORS RVVSV Prasad received his Masters degree in computer applications from Madurai Kamaraj University and Master of Philosophy in Computer Science from Alagappa University. He is currently doctoral candidate in the Department of Computer Science & Engineering, Acharya Nagarjuna University, Nagarjuna Nagar, Guntur, India. He is working as Associate Professor in the Department of Computer Science & Engineering, Bhimavaram Institute of Engineering and Technology, Pennada, Bhimavaram, India. His research interests include recommender systems, security, privacy and trust in mobile agents and P2P networks. V.Valli Kumari received her B.E. in Electronics and Communication Engineering and M.Tech. and PhD in Computer Science and Engineering all from Andhra University, India and is currently working as Professor in the same department. . She was awarded a gold medal for best research in 2008 in Andhra University. Her areas of research interest include Web, Data Engineering, Network Security, e-commerce and has 70 publications in conferences /journals of international and national repute. She is a member of IEEE, ACM, CRSI and CSI.
  18. 18. CLOUD-BASED DEVELOPMENT OF SMART AND CONNECTED DATA IN HEALTHCARE APPLICATION S. Naisha Sultana1 , Gandikota Ramu2 and Prof. B. Eswara Reddy3 1, 2&3 Dept of Computer Science & Engineering, JNTUA College of Engineering, Ananthapuramu, Andhra Pradesh, India ABSTRACT There is a need of data integration in cloud – based system, we propose an Information Integration and Informatics framework for cloud – based healthcare application. The data collected by the Electronic Health Record System need to be smart and connected, so we use informatica for the connection of data from different database. Traditional Electronic Health Record Systems are based on different technologies, languages and Electronic Health Record Standards. Electronic Health Record System stores data based on interaction between patient and provider. There are scalable cloud infrastructures, distributed and heterogeneous healthcare systems and there is a need to develop advanced healthcare application. This advance healthcare application will improve the integration of required data and helps in fast interaction between the patient and the service providers. Thus there is the development of smart and connected data in healthcare application of cloud. The proposed system is developed by using cloud platform Aneka. KEYWORDS Cloud Computing, Data Integration, Informatica, Aneka, Electronic Health Records For More Details : http://airccse.org/journal/ijdps/papers/5614ijdps01.pdf Volume Link : http://airccse.org/journal/ijdps/current2014.html
  19. 19. REFERENCES [1] A. Bhaga, V. Madisetti, A Cloud-based Approach for Interoperable Electronic Health Records (EHRs), IEEE Journal of Biomedical and Health Informatics, vol. 17, iss. 5, pp. 894 – 906, 2013. [2] C. Hajat, An Introduction to Epidemiology, Methods Mol Biol. 2011; 713:27-39. [3] VistA Monograph [Online]. Available: www.va.gov/vista. monograph, 2012. [4] OpenEHR. (2012). [Online]. Available: https://www.openehr.org [5] Mirth Connect. (2012). [Online]. Available: http://www.mirthcorp.com/products/mirth-connect [6] Medsphere FM Projection. (2012). [Online]. Available:http://medsphere.org/community/project/fmprojection. [7] A. Bahga and V.K. Madisetti, “Analyzing massive machine maintenance data in a computing cloud,” IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 10, pp. 1831-1843, Oct. 2012. [8] A. Bahga and V.K. Madisetti, “Synthetic workload generation for cloud computing applications,” J.Softw.eng.Appl., vol. 4, no7, pp.396-410, 2011. [9] A. Bahga and V.K. Madisetti, “Performance evaluation approach for multi-tier cloud applications,” J.Sofw.Eng.Appl., vol. 6, no.2, pp.74-83, 2013. [10] A. Bahga and V.K. Madisetti, Rapid Prototyping of Advanced Cloud Based Services and Systems, IEEE Comput., under review, Aug. 2012. [11] N. Radio, Y. Zhang, M. Tatipamula, and V.K. Madisetti, “Next-generation applications on cellular networks: Trends, challenges, and solutions,” Proc. IEEE, vol. 100, no.4, pp. 841-85, Apr. 2012. [12] Aneka[Online]. Available : http://www.manjrasoft.com/ [13] Informatica Powercenter[Online]. Available : http://www.informatica.com/in/ETL/ AUTHORS Ms. S. Naisha Sultana received the B.E Degree in Information Technology from G. Pullaiah College of Engineering and Technology affiliated to JNT University Anantapur, Anantapuramu, India in the year 2012, and pursuing M.Tech Degree in Software Engineering at Computer Science Department of JNT University Anantapur, Anantapuramu. Her research area in M.Tech deals with Cloud Computing. Mr. Gandikota Ramu received B.Tech degree in Information Technology and M.Tech degree in Computer Science from JNT University Anathapur, Anathapuramu, India. He is currently working towards Ph.D Degree at JNT University Anantapur, Ananthapuramu, India. He is working as Assistant Mentor in Master of Science in Information Technology (MSIT) program, JNTUA (in collaboration with Consortium of Institutions Higher Learning and Carnegie Mellon University, USA). Dr. B. Eswara Reddy Graduated in B.Tech. (CSE) from Sri Krishna Devaraya University. He received Masters Degree in M.Tech.(Software Engineering), from JNT University, Hyderabad. He received Ph.D in Computer Science & Engineering from JNT University, Hyderabad. He is working as Professor in CSE Dept. and VicePrincipal at JNTUA College of Engineering, Ananthapuramu. He has more than 50 Publications in various International Journals and Conferences.. He has received UGC Major Research Project (MRP) titled ‘Cloud Computing framework for rural healthcare in Indian Scenario’. His research interests include Pattern Recognition & Image Analysis, Data Mining and Cloud Computing. He is a Fellow of IE (India). He is a life member of ISTE, ISCA and member of CSI and IEEE.
  20. 20. A STUDY ON ENERGY EFFICIENT ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORKS Monica R Mundada1 , Savan Kiran1 , Shivanand Khobanna1 , Raja Nahusha Varsha1 and Seira Ann George1 1 Department of Computer Science and Engineering, M S Ramaiah Institute of Technology, Bangalore ABSTRACT A wireless sensor network (WSN) consists of low cost, low power, small in size and multi functional sensor nodes. Routing protocols in WSNs emphasize on data dissemination, limited battery power and bandwidth constraints in order to facilitate efficient working of the network, thereby increasing the lifetime of the network. Routing protocols in WSNs are also application specific which has led to the development of a variety of protocols. Based on the underlying network structure, routing techniques can be classified into three categories: data-centric, hierarchical and location based routing. WSN has a design trade-off between energy and communication overhead which forms the nerve center of the routing techniques. In this paper we present a survey of state-of-the-art routing techniques in WSNs under all the three categories. We epitomize these routing techniques and bring out the advantages and disadvantages followed by their application domain. The paper concludes with issues open for research. KEYWORDS Wireless Sensor Networks, Routing Protocols, Energy Efficient Protocols, Data-Centric protocols, Hierarchical Protocols and Location Based Protocols. For More Details : http://airccse.org/journal/ijdps/papers/0512ijdps26.pdf Volume Link : http://airccse.org/journal/ijdps/current2012.html
  21. 21. REFERENCES [1] I. F. Akyildiz et al,( March 2002), “Wireless sensor networks: a survey”, Computer Networks, V Vol. 38, pp. 393-422. [2] K. Sohrabi, et al, (October 2000) "Protocols for self-organization of a wireless sensor network,” I IEEE Personal Communications, Vol. 7, No. 5, pp. 16-27. [3] R. Min, et al., (January 2001), “Low Power Wireless Sensor Networks,” Internation Conference o on VLSI Design, Bangalore, India. [4] J.M. Rabaey, et al., ( July 2000), "PicoRadio supports ad hoc ultra low power wireless e networking," IEEE Computer, Vol. 33, pp. 42-48. [5] R. H. Katz, J. M. Kahn and K. S. J. Pister, ( August 1999), “Mobile Networking for Smart Dust,” 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom’99), Seattle, WA. [6] I.F.Akyildiz,W.Su, Y.Sankarasubramaniam,E.Cayirci, (Dec 2002), “Wireless Sensor Networks:A survey”, Elsevier science B.V. [7] Shio Kumar Singh, M P Singh and D K Singh, (August 2010), “A Survey of Energy-Efficient Hierarchical Cluster-Based Routing in wireless Sensor Network,” Int J. of Advanced Networking and Applications Volume:02, Issue:02, Pages:570-580. [8] W. Heinzelman, A. Chandrakasan and H. Balakrishnan, (Jan 2000), “Energy-Efficient Communication Protocol for Wireless Microsensor Networks,” Proc. 33rd Hawaii Int’l. Conf. Sys. Sci. [9] Zuniga, M. Z.; Krishnamachari, B. (2002), "Integrating Future Large-Scale Wireless Sensor Networks with the Internet," - Department of Electrical Engineering, UNiversity of Southern California. [10] Alonso, J., Dunkels, A., Voigt. T, ( March 2004), “Bounds on the energy consumption of routings in wireless sensor nodes” WiOpt'04: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks,” Cambridge, UK. [11] S. Tilak et al,( June 2002), “A Taxonomy of Wireless Microsensor Network Models,” ACM Mobile Computing and Communications Review (MC2R). [12] W. Heinzelman, J. Kulik, and H. Balakrishnan, (Aug. 1999), “Adaptive Protocols for Information Dissemination in Wireless Sensor Networks,” Proc. 5th ACM/IEEE Mobicom, Seattle, WA, pp. 174–85. [13] J. Kulik, W. R. Heinzelman, and H. Balakrishnan, (2002), “Negotiation-Based Protocols for Disseminating Information in Wireless Sensor Networks,” Wireless Networks, vol. 8, pp. 169–85. [14] C. Intanagonwiwat, R. Govindan and D. Estrin, (August 2000), "Directed diffusion: A scalable and robust communication paradigm for sensor networks", Proceedings of the 6th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom'00), Boston, MA. [15] D. Estrin, et al., (August 1999), “Next century challenges: Scalable Coordination in Sensor Networks,” 5th annual ACM/IEEE international conference on Mobile Computing and Networking (MobiCom’99), Seattle, WA. [16] D. Braginsky and D. Estrin, (October 2002), "Rumor Routing Algorithm for Sensor Networks",
  22. 22. Proceedings of the First Workshop on Sensor Networks and Applications (WSNA), Atlanta, GA. [17] GRAdient Broadcast: A Robust, Long-lived Large Sensor Network, http://irl.cs.ucla.edu/papers/grab-techreport.ps [18] N. Sadagopan et al., (May 2003), “The ACQUIRE mechanism for efficient querying in sensor networks,” Proceedings of the First International Workshop on Sensor Network Protocol and Applications, Anchorage, Alaska. [19] Jabed Faruque & Ahmed Helmy, (2004), “RUGGED: Routing on Fringerprint Gradients in Sensor Networks,” Pervasive Services, ICPS, IEEE/ACS International Conference on . [20] D.R. Askeland, (1994), The Science and Engineering of Materials, PWS Publishing Co. [21] J.F. Shackelford, (2000) Intro to Materials Science For Engineers, 5th Ed., Prentice Hall. [22] S.Kim, Sang.H.Son, J.A.Stankovic, S.Li & Y.Choi,(2003), “SAFE: A Data Dissemination Protocol for Periodic Updates in Sensor Networks”, Distributed Computing System Workshop 23rd International Conference. [23] Mesut Gunes, Udo Sorges & Imed Bouazizi, (2002), “ACA: The Ant-Colony Based Routing Algoritm for MANETS”, Proceedings of the International Conference on Parallel Processing Workshops (ICPPW 02), IEEE. [24] Tiago Camilo, Carlos Carreto, Jorge Sa Silva and Fernando Boavida, (2006), “ An EnergyEfficient Ant-Based Routing Algorithm for Wireless Sensor Networks”. [25] Dorigo, M., Stützle, T.,( march 2004), “Ant Colony Optimization”, ISBN 0262042193, MIT Press. [26] W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, (January 2000), “Energy-efficient communication protocol for wireless sensor networks", Proceeding of the Hawaii International Conference System Sciences, Hawaii. [27] W. B. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan, ( Oct. 2002), “An ApplicationSpecific Protocol Architecture for Wireless Microsensor Networks,” IEEE Trans. Wireless Commun., vol. 1, no. 4, pp. 660–70. [28] S. Lindsey and C. S. Raghavendra, (March 2002), "PEGASIS: Power Efficient GAthering in Sensor Information Systems," Proceedings of the IEEE Aerospace Conference, Big Sky, Montana. [29] S. Lindsey, C. S. Raghavendra and K. Sivalingam, (April 2001), "Data Gathering in Sensor Networks using the Energy*Delay Metric", IPDPS Workshop on Issues in Wireless Networks and Mobile Computing, San Francisco, C. [30] A. Manjeshwar and D. P. Agrawal, ( April 2001), “TEEN : A Protocol for Enhanced Efficiency in Wireless Sensor Networks," Proceedings of the 1st International Workshop on Parallel and Distributed Computing Issues in Wireless Networks and Mobile Computing, San Francisco, CA. [31] A. Manjeshwar and D. P. Agrawal, (April 2002),"APTEEN: A Hybrid Protocol for Efficient Routing and Comprehensive Information Retrieval in Wireless Sensor Networks," in the Proceedings of the 2nd International Workshop on Parallel and Distributed Computing Issues in Wireless Networks and Mobile computing, Ft. Lauderdale, FL. [32] M. Younis, M. Youssef and K. Arisha, (October 2002), “Energy-Aware Routing in ClusterBased Sensor Networks”, in the Proceedings of the 10th IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS2002), Fort
  23. 23. Worth, TX. [33] Siva D. Muruganathan, Damiel C.F.MA, Rolly I.Bhasin and Abraham O.FAPOJUWO, (March 2005), “ A Centralised Energy-Efficient Routing Protocol for Wireless Sensor Networks,” IEEE Radio Communication. [34] Guanfeng Li, Taieb Znati & Anandha Gopalan, (2004), “ REAP: ring band-based energy adaptive protocol for information dissemination and forwarding in wireless sensor networks,” Int.J.Sensor Network. Vol. X, No. Y, XXXX. [35] Kemal Akkaya and Mohamed Younis, (2005),“A Survey on Routing Protocol for Wireless Sensor Network”, Elsevier Ad Hoc Network Journal, Vol 3/3pp. 325-549. [36] F. Ye et al.,( 2002), “A Two-Tier Data Dissemination Model for Large-Scale Wireless Sensor Networks,” Proc. ACM/IEEE MOBICOM. [37] L. Li, and J. Y. Halpern, (2001), “Minimum-Energy Mobile Wireless Networks Revisited,” IEEE ICC, vol. 1, pp. 278–83. [38] Y. Xu, J. Heidemann, and D. Estrin, (2001), “Geography informed Energy Conservation for Adhoc Routing,” Proc. 7th Annual ACM/IEEE Int’l. Conf. Mobile Comp. and Net., pp. 70–84. [39] B. Karp and H. T. Kung, (August 2000), “GPSR: Greedy perimeter stateless routing for wireless sensor networks,” in the Proceedings of the 6th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom '00), Boston, MA. [40] Y. Yu, D. Estrin, and R. Govindan,( May 2001), “Geographical and Energy-Aware Routing: A Recursive Data Dissemination Protocol for Wireless Sensor Networks,” UCLA Computer Science Department Technical Report, UCLA-CSD TR-01-0023.
  24. 24. A NOVEL ANTI PHISHING FRAMEWORK BASED ON VISUAL CRYPTOGRAPHY Divya James1 and Mintu Philip2 1 MTech in Information System Security, Indira Gandhi National Open University, India, 2 Rajagiri School of Engineering and Technology, Kochi, India ABSTRACT Phishing is an attempt by an individual or a group to thieve personal confidential information such as passwords, credit card information etc from unsuspecting victims for identity theft, financial gain and other fraudulent activities. In this paper we have proposed a new approach named as "A Novel Antiphishing framework based on visual cryptography" to solve the problem of phishing. Here an image based authentication using Visual Cryptography (vc) is used. The use of visual cryptography is explored to preserve the privacy of image captcha by decomposing the original image captcha into two shares that are stored in separate database servers such that the original image captcha can be revealed only when both are simultaneously available; the individual sheet images do not reveal the identity of the original image captcha. Once the original image captcha is revealed to the user it can be used as the password. KEYWORDS Phishing, Visual Cryptography, Image Captcha, Shares, Security. For More Details : http://airccse.org/journal/ijdps/papers/0112ijdps17.pdf Volume Link : http://airccse.org/journal/ijdps/current2012.html
  25. 25. REFERENCES [1] Thiyagarajan, P.; Venkatesan, V.P.; Aghila, G.; "Anti-Phishing Technique using Automated Challenge Response Method'", in Proceedings of IEEE- International Conference on Communications and Computational Intelligience, 2010. [2] Sun Bin.; Wen Qiaoyan.; Liang Xiaoying.; "A DNS based Anti-Phishing Approach," in Proceedings of IEEE- Second International Conference on Networks Security, Wireless Communications and Trusted Computing, 2010 [3] Nourian, A.; Ishtiaq, S.; Maheswaran, M.;" CASTLE: A social framework for collaborative antiphishing databases", in Proceedings of IEEE- 5th International Conference on Collaborative Computing:Networking, Applications and Worksharing, 2009. [4] Sid Stamm, Zulfikar Ramzan, "Drive-By Pharming", v4861 LNCS,p495-506, 2007, Information and Communications Security - 9th International Conference, ICICS 2007, Proceedings. [5] Anthony Y. Fu, Liu Wenyin, "Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover’s Distance (EMD)",IEEE Transactions on Dependable and Secure Computing, v 3, n 4, p301-311, October/December 2006 [6] Wenyin Liu, Xiaotie Deng, Guanglin Huang, and Anthony Y. Fu, "An Antiphishing Strategy Based on Visual Similarity Assessment", IEEE Internet Computing, v 10, n 2, p 58-65, March/April 2006. [7] JungMin Kang, DoHoon Lee, "Advanced White List Approach for Preventing Access to Phishing Sites", 2007 International Conference onConvergence Information Technology, ICCIT 2007, p 491-496, 2007 [8] Nirmal, K.; Ewards, S.E.V.; Geetha, K.; "Maximizing online security by providing a 3 factor authentication system to counter-attack 'Phishing'", in Proceedings of IEEE- International Conference on Emerging Trends in Robotics and Communication Technologies, 2010. [9] Tianyang Li.; Fuye Han.; Shuai Ding and Zhen Chen.; "LARX: Large-scale Anti-phishing by Retrospective Data-Exploring Based on a Cloud Computing Platform", in Proceedings of IEEE- 20th International Conference on Computer Communications and Networks, 2011. [10] Qingxiang Feng.; Kuo-Kun Tseng.; Jeng-Shyang Pan.; Peng Cheng and Charles Chen.; "New Antiphishing Method with Two Types of Passwords in OpenID System", in Proceedings of IEEE Fifth International Conference on Genetic and Evolutionary Computing,2011 [11] Maher Aburrous .; M. A. Hossain.; Keshav Dahal.; "Modelling Intelligent Phishing Detection System for e-Banking using Fuzzy Data Mining", in Proceedings of IEEE Conference
  26. 26. on CyberWorlds,2009. [12]Haijun Zhang , Gang Liu, and Tommy W. S. Chow, “Textual and Visual Content-Based Anti- Phishing:A Bayesian Approach,” IEEE Trans. Neural Netw., vol. 22, no. 10, pp. 1532– 1546, Oct.2011. [13] M. Naor and A. Shamir, “Visual cryptography,” in Proc. EUROCRYPT, 1994, pp. 1–12. [14] B. Borchert, .Segment Based Visual Cryptography,. WSI Press, Germany, 2007. [15] W-Q Yan, D. Jin and M. S. Kanakanahalli, .Visual Cryptography for Print and Scan Applications,.IEEE Transactions, ISCAS-2004, pp. 572-575. [16] T. Monoth and A. P. Babu, .Recursive Visual Cryptography Using Random Basis Column Pixel Expansion,. in Proceedings of IEEEInternational Conference on Information Technology, 2007, pp. 41-43. [17] G. B. Horng, T. G. Chen and D. S. Tsai, .Cheating in Visual Cryptography,. Designs, Codes,Cryptography, vol. 38, no. 2, 2006, pp. 219-236. [18] C. M. Hu and W. G. Tzeng, .Cheating Prevention in Visual Cryptography,. IEEE Transaction on Image Processing, vol. 16, no. 1, Jan-2007,pp. 36-45. [19] A Text-Graphics Character CAPTCHA for Password Authentication Matthew Dailey Chanathip Namprempre.
  27. 27. MOBILE-ASSISTED LANGUAGE LEARNING Tayebeh Mosavi Miangah1 and Amin Nezarat2 1 English Language Department, Payame Noor University, Yazd, Iran 2 Information Technology Department, Shiraz University, Shiraz, Iran ABSTRACT The main characteristics of mobile learning (m-learning) are recognized as the potential for learning process to be personalized, spontaneous, informal and ubiquitous. Although learning through mobile phones may take longer time compared to computers, the learners feel a greater sense of freedom of time and place, so that they can take the advantage of spare time to learn a second language when and where they are. Mobile-Assisted Language Learning (MALL) deals with the use of mobile technology in language learning. In contrast to classroom learning, in MALL there is no need for the learners to sit in a classroom or at a computer to get learning materials. In fact, MALL can be considered an ideal solution to language learning barriers in terms of time and place. In this paper by looking at some applications of m-learning as well as some examples across various aspects of it, we observe the advantages and disadvantages derived from using mobile technologies for students as well as professionals. Here, it has been tried to demonstrate the benefits of using mobile phones in learning English as a second language. Areas of mobile-based language learning discussed in this paper are vocabulary, listening, grammar, phonetics, and reading comprehension. KEYWORDS e-learning, mobile-assisted language learning, mobile technology, second language learning, wireless communication For More Details : http://airccse.org/journal/ijdps/papers/0112ijdps26.pdf Volume Link : http://airccse.org/journal/ijdps/current2012.html
  28. 28. REFERENCES [1] Chen, N. S. S.-W., Hsieh, & Kinshuk. (2008). “Effects of short-term memory and content representation type on mobile language learning”. Language Learning & Technology, 12(3), pp. 93–113. Retrieved from http://llt.msu.edu/vol12num3/chenetal.pdf [2] Chen, C. M. & S.-H. Hsu. (2008). “Personalized Intelligent Mobile Learning System for Supporting Effective English Learning”. Educational Technology & Society, 11 (3), pp. 153-180. [3] Gay, G.; M. Stefanone, M. Grace-Martin, & H. Hembrooke. (2001) “The effects of wireless computing in collaborative learning environments”. International Journal of Human-Computer Interaction, 13(2), pp. 257-276. [4] Huang, C. and P. Sun. (2010) “Using mobile technologies to support mobile multimedia English listening exercises in daily life”. In: The International Conference on Computer and Network Technologies in Education (CNTE 2010), At: http://cnte2010.cs.nhcue.edu.tw/ [5] Kennedy, C. & M. Levy. (2008). “L’italiano al telefonino: Using SMS to support beginners’ language learning”. ReCALL, 20(3), pp. 315–350. [6] Klopfer, E.; K. Squire, and H. Jenkins. (2002). "Environmental Detectives: PDAs as a window into a virtual simulated world." In: Proceedings of IEEE International Workshop on Wireless and Mobile Technologies in Education. Vaxjo, Sweden: IEEE Computer Society, pp. 95-98 [7] Koole. M. (2009). “A model for framing mobile learning” . In M. Ally (Ed.), Mobile learning: Transforming the delivery of education & training, pp. 25–47. Athabasca: AU Press. [8] Kukulska-Hulme A. and L. Shield. (2008). “An Overview of Mobile Assisted Language Learning: Can Mobile Devices Support Collaborative Practice in Speaking and listening?” http://portal.acm.org/citation.cfm?id=1520087, accessed Jul. 2009. [9] Kukulska-Hulme, A. & J.Traxler. (Eds.). “Mobile learning: A handbook for educators and trainers”. London: Routledge, 2005. [10] Kukulska-Hulme. A. (2009). “Will mobile learning change language learning?” ReCALL 21(2), pp. 157-165. [11] Microsoft research program. (2010). At:http://research.microsoft.com/enus/collaboration/papers/berkeley.pdf, accessed Jul. 2010 [12] Oxford R. and J. Oxford. (2009). “Second Language Teaching and Learning in the Next Generation”, 2009. http://llt.msu.edu/vol14num1/review1.pdf, accessed Jul. 2010. [13] Sharples. M. (2000). “The design of personal mobile technologies for lifelong learning”. Computers & Education, 34(3-4), pp. 177-193. [14] Stockwell. G. (2008). “Investigating learner preparedness for and usage patterns of mobile learning”. ReCALL, 20(3), pp. 253–270.
  29. 29. [15] Thornton, P. & C.Houser. (2005). “Using mobile phones in English education in Japan. Journal of Computer Assisted Learning”, 21(3), pp. 217–228. [16] Yang Soon. G. (2005). “Technology for Foreign Language Learning”. http://www.readingmatrix.com/conference/pp/proceedings/gohyingsoon.pdf, accessed Dec 2010. [17] Yamaguchi. T. (2005). “Vocabulary Learning with a Mobile Phone”. http://llt.msu.edu/vol10num1/emerging/default.html, accessed Jul. 2010. [18] Yannick. J. (2007). “M-Learning: A pedagogical and technological model for language learning on mobile phones”. In: Blended Learning, Joseph Fong, Fu Lee Wang (Eds), 2007, pp. 327-339.

×