SlideShare una empresa de Scribd logo
1 de 29
Descargar para leer sin conexión
October 2020: Top Read
Articles in Distributed and
Parallel systems
International Journal of Distributed and
Parallel systems (IJDPS)
ISSN : 0976 - 9757 [Online] ; 2229 - 3957 [Print]
http://airccse.org/journal/ijdps/ijdps.html
BLUETOOTH SECURITY THREATS AND SOLUTIONS: A SURVEY
Nateq Be-Nazir Ibn Minar1
and Mohammed Tarique2
1
Department of Electrical and Electronic Engineering, American International
University, Bangladesh
2
Department of Electronic and Communication, Ajman University of Science and
Technology, United Arab Emirates
ABSTRACT
Bluetooth technology has become an integral part of this modern society. The availability of mobile phones,
game controllers, Personal Digital Assistant (PDA) and personal computers has made Bluetooth a popular
technology for short range wireless communication. However, as the Bluetooth technology becomes
widespread, vulnerabilities in its security protocols are increasing which can be potentially dangerous to the
privacy of a user’s personal information. The security issues of Bluetooth have been an active area of research
for the last few years. This paper presents the vulnerabilities in the security protocols of this technology along
with some past security threats and possible countermeasures as reported in the literatures which have been
surveyed and summarized in this paper. It also presents some tips that end-users can implement immediately
to become more cautious about their private information. Finally, the paper concludes with some
recommendations for future security enhancements that can be implemented in the Bluetooth standard.
KEYWORDS
Bluetooth, encryption, security protocols, security threats, countermeasures, Bluetooth enhancements
For More Details : http://airccse.org/journal/ijdps/papers/0112ijdps10.pdf
Volume Link : http://airccse.org/journal/ijdps/current2012.html
REFERENCES
[1] “The Bluetooth Blues”, available at http://www.information-
age.com/article/2001/may/the_bluetooth_blues
[2] Bluetooth SIG, Specification of the Bluetooth System: Volume 2, Profile, Version 1.1, Feb. 22, 2001.
available at: https://www.bluetooth.org/About/bluetooth_sig.htm
[3] “The History of Bluetooth”, available at: http://www.bluetomorrow.com/about-
bluetoothtechnology/history-of-bluetooth/bluetoothhistory.html
[4] Monson, Heidi - "Bluetooth Technology and Implications" available at: http://www.sysopt.com/features/
network/article.php/3532506 (1999-12- 14).
[5] “How Bluetooth Works", available at: http://en.kioskea.net/contents/bluetooth/bluetooth-
fonctionnement.php3.
[6] Mohammed Mana, Mohammed Feham, and Boucif Amar Bensaber, “A light weight protocol to provide
location privacy in wireless body area networks”, International Journal of Network Security and its
Applications (IJNSA), Vol.3, No.2, March 2011
[7] Yasir Arfat Malkani and Lachhman Das Dhomeja, “PSim: A tool for analysis of device pairing methods”,
International Journal of Network Security & Its Applications (IJNSA), Vol.1, No.3, October 2009
[8] Kumar, A., et al. Caveat eptor, “A comparative study of secure device pairing methods”, IEEE
International Conference on Pervasive Computing and Communications (PerCom-09). 2009.
[9] Jochen Schiller, “Mobile Communications”, Second Edition, Addison Wesley Publications,
2003, pp. 290-292
[10] Bluetooth Profiles” Bluetooth Resource Center, Palowireless Pty Ltd. available at:
http://www.palowireless.com/ infotooth/tutorial/profiles.asp
[11] SaileshRathi, “Bluetooth Protocol Architecture”, Microware Systems Corporation available at:
http://www.dedicated-systems.com/Magazine/00q4/2000q4_p028.pdf
[12] “Bluetooth Versions”, summary of all the Bluetooth versions released to date, available at:
http://www.bluetomorrow.com/about-bluetooth-technology/general- bluetoothinformation/bluetooth-
versions.html
[13] Bluetooth Version 4.0 Released. Bluetooth SIG, available at: http://www.bluetooth.com/Pages/High-
Speed.aspx
[14] Keijo Haataja, “Security Threats and Countermeasures in Bluetooth Enabled Systems”, Kuopio
University Library, 2009, pp. 55-62
[15] “The BlueBug”, a Bluetooth virus, available at: http://trifinite.org/trifinite_stuff_bluebug.html
[16] John Oates, “Virus attacks mobiles via Bluetooth”, available at:
http://www.theregister.co.uk/2004/06/15/symbian_virus/
[17] F-Secure Article on Lasco.A Worm, available at: http://www.f-secure.com/v-descs/lasco_a.shtml
[18] Ford-Long Wong, Frank Stajano, Jolyon Clulow, “Repairing the Bluetooth pairing protocol”. University
of Cambridge Computer Laboratory, available at:
http://www.cl.cam.ac.uk/research/dtg/~fw242/publications/2005-WongStaClu-bluetooth.pdf
[19] Phone pirates in seek and steal mission", Cambridge Evening News, available at: http://www.cambridge-
news.co.uk/news/region_wide/2005 /08/17/
[20] "Going Around with Bluetooth in Full Safety”, available at:
http://www.securenetwork.it/ricerca/whitepaper/download/ bluebag_brochure.pdf
[21] Yaniv Shaked, Avishai Wool, “Cracking the Bluetooth PIN” School of Electrical Engineering Systems,
Tel Aviv University, available at: http://www.eng.tau.ac.il/~yash/shaked-wool-mobisys05/
[22] Keijo Haataja, “Security Threats and Countermeasures in Bluetooth-Enabled Systems”, Kuopio
University Library, 2009, pp. 68-80
[23] Colleen Rhodes, “Bluetooth Security”, East Carolina University, pp.6-9
[24] Karen Scarfone and John Padgette, (Bluetooth Threats) “Guide to Bluetooth Security”, Computer
Security Division - National Institute of Standards and Technology, US Department of Commerce, 2008, pp.
25-26
[25] Raquel Hill and Billy Falotico, “Bluetooth Wireless Technology Security Threats and Vulnerabilities”,
Indiana University Bloomington, 2008, pp. 7-8
[26] Karen Scarfone and John Padgette, (Bluetooth Vulnerabilities) “Guide to Bluetooth Security”, Computer
Security Division - National Institute of Standards and Technology, US Department of Commerce, 2008,
pp.24-25
AUTHORS
Nateq Be-Nazir Ibn Minar is a Research Scientist currently rendering his expertise
independently to institutions and manufacturing industries. He obtained his
Bachelor of Science degree in Electrical and Electronics Engineering, with a
special interest in Robotics and Industrial Automation, from American International
University - Bangladesh in 2008 and later obtained his Master of Science degree, in
Telecommunication Engineering, focusing on Wireless Networks. His research
interests include satellite communications, network security, low-powered wireless
devices, industrial automation, robotics and green technology. He is the CEO of
EcoWave – a company dedicated to produce green electronic products for the benefit of the environment. He
is an active member of IEEE and does volunteer work for several societies.
Mohammed Tarique is an Assistant Professor in the Department of Electronic and
Communication, Ajman University of Science and Technology, in United Arab
Emirates. His research int erests include Adhoc Networks and wireless network
security, network testing and simulations. His research primarily focuses on the
design of Wireless Adhoc Networks.
BREAST CANCER DIAGNOSIS USING MACHINE LEARNING ALGORITHMS –A SURVEY
B.M.Gayathri1
,C.P.Sumathi2
and T.Santhanam3
1
Department of Computer Science, SDNB Vaishnav College for Women, Chennai, India 2
Department of
Computer Science, SDNB Vaishnav College for Women, Chennai, India 3
Department of Computer
Application, D.G.Vaishnav College for Men, Arumbakkam, Chennai, India
ABSTRACT
Breast cancer has become a common factor now-a-days. Despite the fact, not all general hospitals have the
facilities to diagnose breast cancer through mammograms. Waiting for diagnosing a breast cancer for a long
time may increase the possibility of the cancer spreading. Therefore a computerized breast cancer diagnosis
has been developed to reduce the time taken to diagnose the breast cancer and reduce the death rate. This
paper summarizes the survey on breast cancer diagnosis using various machine learning algorithms and
methods, which are used to improve the accuracy of predicting cancer. This survey can also help us to know
about number of papers that are implemented to diagnose the breast cancer.
KEYWORDS
Neural networks, SVM, RVM, ELM
For More Details : http://airccse.org/journal/ijdps/papers/4313ijdps09.pdf
Volume Link : http://airccse.org/journal/ijdps/current2013.html
REFERENCES
[1] M.A.H Akhand & M.Murase “Neural network ensemble construction fusing multiple popular Methods.”.
International journal of computer science 2004.
[2] Tuba kiyan, Tulay Yildirim “Breast cancer diagnosis using statistical neural networks”, Journal of
Electrical and Electronic Engineering.
[3] P.K.Chenniappan & N.Anusheela “Early detection of cancer cells to lung cancer survival data by Neural
network testing” International journal of neural network and application.
[4] Chih-Lin Chi, W. Nick Street, and William H. Wolberg ” Application of Artificial Neural networkbased
Survival Analysis on Two Breast Cancer Datasets”- AMIA Annu Symp Proc. 2007; 2007: 130–134.
[5] Val´erie Bourd`es, St´ephane Bonnevay, Paolo Lisboa, R´emy Defrance, David P´erol, Sylvie Chabaud,
Thomas Bachelot, Th´er`ese Gargi,6 and Sylvie N´egrier “Comparison of Artificial Neural Network with
Logistic regression as Classification Models for Variable Selection for Prediction of Breast Cancer Patient
outcomes”
[6] I Guyon, J Weston, S Barnhill “Gene selection for cancer classification using support vector Machines” …
- Machine learning, 2002 – Springer
[7] MF Akay “Support vector machines combined with feature selection for breast cancer diagnosis”- Expert
systems with applications, 2009 – Elsevier.
[8] CL Huang, HC Liao “Prediction model building and feature selection with support vector machines in
Breast cancer diagnosis “Expert Systems with Applications, 2008 – Elsevier.
[9] Ilias Maglogiannis, E Zafiropoulos “An intelligent system for automated breast cancer diagnosis and
Prognosis using SVM based classifiers” Applied Intelligence, 2009 – Springer.
[10] AM Bagirov, B Ferguson, S Ivkovic “New algorithms for multi-class cancer diagnosis using tumor Gene
expression signatures”, 2003 - Oxford Univ Press.
[11] RF Chang, WJ Wu, WK Moon, YH Chou “Support vector machines for diagnosis of breast tumors on
US images” - Academic radiology, 2003 – Elsevier
[12] Y Rejani- “Early detection of breast cancer using SVM”. 2009 –arxiv
[13] L Rong ,”Diagnosis of Breast Tumor Using SVM-KNN Classifier” - 2010 - Intelligent Systems (GCIS).
[14] T Mu “Detection of breast cancer using v-SVM and RBF network.” - 2005 – C Medical Applications Of
Signal.
[15] Dr.C.P.Sumathi, Dr.T.Santhanam, A.Punitha “Combination of genetic algorithm and ART neural
Network for breast cancer diagnosis”, 2007 -- Asian Journal of information technology, Medwell Journals.
[16] F.Paulin, A.Santhakumaran “Classification of Breast cancer by comparing Back propagation training
Algorithms”, 2011-International Journal on Computer Science and Engineering (IJCSE)
[17] Dr. K. Usha Rani” Parallel Approach for Diagnosis of Breast Cancer using Neural Network Technique”
International Journal of Computer Applications, Volume 10– No.3, November 2010.
[18] G. Sophia Reena P. Rajeswari -2011 “A Survey of Human Cancer Classification using Micro Array
Data”- International Journal of Computer Tech. Appl.,
[19] Balaji Krishnapuram, Alexander Hartemink, Lawrence Carin “Applying logistic regression and RVM To
achieve accurate probabilistic cancer diagnosis from gene expression profiles” -
Citeseerx.ist.psu.edu/viewdoc/summary?Doi=10.1.1.12.5909
[20] A. Bharathi and A.M. Natarajan “Cancer Classification using Support Vector Machines and
Relevance Vector Machine based on Analysis of Variance Features”- Journal of Computer Science 7 (9):
1393-1399, 2011.
[21] Fatima Eddaoudi , Fakhita Regragui , Abdelhak Mahmoudi , Najib Lamouri “Masses Detection Using
SVM Classifier Based on Textures Analysis”- Applied Mathematical Sciences, Vol. 5, 2011, no. 8, 367 –
379.
[22] Guoqiang Peter Zhang “Neural Networks for Classification: A Survey” IEEE TRANSACTIONS ON
SYSTEMS, MAN, AND CYBERNETICS—PART C: APPLICATIONS AND REVIEWS, VOL. 30, NO. 4,
NOVEMBER 2000.
[23] S. Aruna, Dr .S.P. Rajagopalan “ A Novel SVM based CSSFFS Feature Selection Algorithm for
Detecting Breast Cancer” International Journal of Computer Applications (0975 – 8887) Volume 31– No.8,
October 2011.
[24] Xin Yao, Yong Liu “Neural Networks for Breast Cancer Diagnosis” 01999 IEEE [25] Dimitrios Siganos
”Neural Networks in medicine”, Www.doc.ic.ac.uk/~nd/surprise_96/journal/vol2/ds12/article2.html.
[26] David B.Fogel, Eugene C, Wasson, Edward M.Boughton “Evolving neural networks for detecting Breast
cancer”. 1995 Elsevier Science Ireland Ltd.
[27] Dr.Santhosh baboo, S.Sasikala “A Survey on data mining techniques in gene selection and cancer
Classification”-April 2010 International journal of Computer science and information technology.
[28] Afzan Adam1 Khairuddin Omar2 “Computerized Breast Cancer Diagnosis with Genetic Algorithms And
Neural Network”- fitt.mmu.edu.my/caiic/papers/afzanicaiet.pdf.
[29] Zhang Qinli; Wang Shitong; Guo Qi; “A Novel SVM and Its Application to Breast Cancer Diagnosis”
http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?Arnumber=4272649.
COMPARATIVE ANALYSIS OF RECTANGULAR AND CIRCULAR WAVEGUIDE USING
MATLAB SIMULATION
AZHAR SHADAB1
, LOKESH KUMAR2
, MOHIT KUMAR3
, KAMAL KISHOR4
, AKASH SETHI5
, ILA
SHARMA6
1
Department of Electronics & Communication, Jaypee University, Solan, Himachal Pradesh, India
2
Department of Electronics & Communication, Jaypee University, Solan, Himachal Pradesh, India
3
Department of Computer Science, Jaypee university, Solan, Himachal Pradesh, India
4
Department of Electronics & Communication, Jaypee University, Solan, Himachal Pradesh, India
5
Department of Electronics & Communication, Jaypee University, Solan, Himachal Pradesh, India
6
Department of Electronics & Communication, Jaypee University, Solan, Himachal Pradesh, India
ABSTRACT
Electromagnetic waves is very strong waves which is used for transmission of signals from one place to other
, main concern is medium having some physical structure through which it can propagate their waves. There
are so many ways to guide this electromagnetic waves but main consideration in this paper is rectangular
waveguide and circular waveguide.This paper analyze the different parameters of both the waveguides like
(Cut off frequency, Cut off wavelength,Guide wavelength,Phase velocity, Group velocity, Impedance, power,
Attenuation, VSWR) with the help of simulation in Matlab7.14 .Compare the parameters of the two
waveguides and on the basis of these parameters result it is easy to get the best guided structure.
KEYWORDS:
Rectangular waveguide ,Circular waveguide,Waveguide modes, Matlab simulation.
For More Details : http://airccse.org/journal/ijdps/papers/0712ijdps05.pdf
Volume Link : http://airccse.org/journal/ijdps/current2012.html
REFERENCES
[1] D.M.Pozar ,2005, “Microwave Engineering” John Wiley and Sons.
[2] Karle S. Packard “The Origin of Waveguides: A Case of Multiple Rediscovery” IEEE transactions on
Microwave theory and techniques, vol. mtt-32, no.9, september 1984.
[3] Perregrini Y. Cassivi and P.Arcioni,2002 “Dispersion Characteristics of Substrate Integrated Rectangular
Waveguide” IEEE transaction of Microwave and Wireless components,Vol 12,No.- 9,page no.333-335.
[4] A.Munir and Mohammad F.Y.Musthofa,”Rectangular to Circular Waveguide Converter for Microwave
Devices Characterization”,International Journal on Electrical Engineering and Informatics,Vol.3,No.3,2011.
[5] Vivek Yadav , Udaybin Singh and A.K.Sinha, 2010 “Analysis and Design of Broadband Square to
Circular Waveguide Transitions”,International Journal of Microwave and Optical Technology,
Vol.5,No.3,May.
[6] R.Vacek, Dec 1998,”Electromagnetic Wave Propagation in General Multimode Waveguide Structures
Exhibiting Simultaneously Attenuation,Dispersion and Coupling Phenomena”, Journal of Microwave and
Optoelectronics,Vol.1,No.3.
[7] Amos Gilat, Edition-2004, “MATLAB- An Introduction with Applications”, John Wiley & Sons.
[8] Rudra Pratap, 2006 “Getting Started with MATLAB7”. Oxford University Press.
[9] Wikipedia.
[10 Boremann,Amari and Vahldieck Mar 1999 “Analysis and design of circular ridged waveguide
components” ” IEEE transactions on microwave devices,Volume 47,Issue:3,pages :330-335.
BIOGRAPHY
Azhar Shadab received his B.E degree in Electronics and communication Engineering
from NRI-IIST BHOPAL in 2010, and his M Tech degree in Electronics and
Communications Engineering from the Jaypee University of Information Technology,
Waknaghat, Himachal Pradesh 2012. His research int erests are in the areas of
Microwave , VLSI and Signal Processing. Presently he is working on designing of low
power fast fourier transform in VLSI. International Journal of Distributed and Parallel
Systems (IJDPS) Vol.3, No.4, July 2012 52
Lokesh kumar received the B.E. degree from RITEE,Raipur(C.G).He is currently
pursuing MTECH from Jaypee University of Information Technology, solan. Himachal
Pradesh.His research interests are in t he VLSI design and circuit.
Mohit kumar has done his B.E from D.Y.Patil College of Engineering (Pune university).
He is currently persuing M-Tech(2nd yr) from Jaypee University of Information
Technology,Solan. Himachal Pr adesh
Kamal kishor received his B.E degree in Ele ctronics and communication Engineering
from NRI-IIS T BHOPAL, 2010, and pursuing M Tech degree in Electronics an d
Communications Engineering from the Jaypee University of Information Technology,
Waknaghat, Himachal Pradesh. His research interests are in the areas of Microwave &
Antenna.
Akash Sethi received his Bachelor of Engineering degree in Electronics and
Communications Engineering from G.G.I.T.S. Jabalpur(M.P.) 2009, and M.Tech degree in
Electronics and Communications Engineering from the Jaypee University of Information
Technology, Waknaghat(H.P.) 2012. His research interests are in the areas of Wireless
Communication, Electrical Circuit Analysis and VLSI.
Ila Sharma received her B.E degree in Electronics and Telecommunications Engineering
fromG.E.C.Raipur, Chhattisgarh 2009, and her M Tech degree in Electronics and
Communications Engineering from the Jaypee University of Information Technology,
Waknaghat, Himachal Pradesh 2012. Her research interests are in the areas of Wireless
Communication, Analog Electronics and Signal Processing.
REMOTE PATIENT MONITORING SYSTEM
Sherin Sebastian, Neethu Rachel Jacob, Yedu Manmadhan, Anand V. R. , M. J. Jayashree
Department of Electronics and Communication Engineering, Mar Baselios College of Engineering &
Technology, Nalanchira, Trivandrum, India- 695015
ABSTRACT
The Telemedicine system comprises of both hardware and software components at both the patient and
doctor ends. A leading field for application of telemedicine is in the field of cardiology where ECG is the
major tool for diagnosis. The proposed project in this paper provides an image based techniques to acquire
and analyse a constant streaming of ECG signal through digital camera for image capturing, information
extraction and analysis performed using MATLAB tools as well as data sending system based on internet
network. The method captures the vital signs and parameters from the ICU monitoring machine using a
webcam and transmits the image through the internet. This original image is then availed to the consulting
doctor via an ANDROID cell phone. In case of anomaly a notification is send to the doctor’s phone. The
paper proposes a method to capture, compare and generate alert regarding the patient’s condition using the
heart rate and make the captured image be available to the physician.
KEYWORDS
Telemedicine, ECG, MATLAB, C2DM, Android
For More Details : http://airccse.org/journal/ijdps/papers/3512ijdps09.pdf
Volume Link : http://airccse.org/journal/ijdps/current2012.html
REFERENCES
[1] 'International Cardiovascular Disease Statistics, Statistical Fact Sheet-2007 Update', American Heart
Association, Dallas, Texas, 2007.
[2]Lai Khin Wee, Yeo Kee Jiar, Eko Supriyanto “Electrocardiogram Data Capturing System and
Computerized Digitization using Image Processing Techniques” International Journal of Biology and
Biomedical Engineering Issue 3, Volume 3, 2009
[3] Khoór S, Nieberl J, Fügedi K, Kail E ‘Internet based, GPRS, longterm ECG monitoring and nonlinear
heart-rate analysis for cardiovascular telemedicine management’ Computers in Cardiology 2003;28:209-212.
[4] Ljupˇco Hadˇzievski, Boˇsko Bojovic´, Vladan Vukˇcevic´, Petar Beliˇcev, Siniˇsa Pavlovic´, Zorana
Vasiljevic´-Pokrajˇcic´, and Miodrag Ostojic´’A Novel Mobile Transtelephonic System With Synthesized
12-Lead ECG’ IEEE Transaction on Information Technology in Biomedicine,
Volume 8,2004
[5] Dr.R.Sukanesh, S.Palanivel rajan, S.Vijayprasath, S.Janardhana prabhu and P.Subathra ‘gsm based ecg
tele-alert system’, Department of Electronics and Communication Engineering, Dept. of Electron. &
Commun. Eng., Thiagarajar Coll. of Eng., Madurai, India Innovative Computing Technologies (ICICT),
International Conference 2010
[6]Sukanesh R., Gautham P. ; Arunmozhivarman P.T. ; Rajan S.P. ; Vijayprasath S. ‘Cellular phone based
biomedical system for health care’ Dept. of Electron. & Commun. Eng., Thiagarajar coll. of Eng.,Madurai,
India Communication Control and Computing Technologies (ICCCCT),
IEEE International Conference 2010
[7] 1V.Ramya, 2B.Palaniappan,3Anuradha Kumari ‘Embedded Patient Monitoring System’ International
Journal of Embedded Systems and Applications (IJESA) Vol.1, No.2, December 2011
[8] Prof. Dr. Burkhard Stiller ’Mobile Healthcare on Android Devices’ Communication Systems Group,
Diploma Thesis, Dept. of Informatics, November 2010
[9] Alma Secerbegovic∗ , Aljo Mujˇci´c∗ , Nermin Suljanovi´c∗ , Midhat Nurkic†, Jurij Tasic ‘The research
mHealth platform for ECG monitoring’, ConTel Conference, 2011
[10] Elham Dolatabadi∗ , Serguei Primak ’Ubiquitous WBAN-based Electrocardiogram Monitoring
System’ EHealth Networking Applications Conference, 2011
EMBEDDED SYSTEM FOR HAZARDOUS GAS DETECTION AND ALERTING
V.Ramya1
, B. Palaniappan2
1
Assistant Professor, Department of CSE, Annamalai University, Chidambaram,India.
2
Dean, FEAT, Head, Department of CSE, Annamalai University, Chidambaram, India.
ABSTRACT
Safety plays a major role in today’s world and it is necessary that good safety systems are to be implemented
in places of education and work. This work modifies the existing safety model installed in industries and this
system also be used in homes and offices. The main objective of the work is designing microcontroller based
toxic gas detecting and alerting system. The hazardous gases like LPG and propane were sensed and
displayed each and every second in the LCD display. If these gases exceed the normal level then an alarm is
generated immediately and also an alert message (SMS) is sent to the authorized person through the GSM.
The advantage of this automated detection and alerting system over the manual method is that it offers quick
response time and accurate detection of an emergency and in turn leading faster diffusion of the critical
situation.
KEYWORDS
Air pollution Monitoring, gas sensors, GSM module, wireless networks.
For More Details : http://airccse.org/journal/ijdps/papers/0512ijdps24.pdf
Volume Link : http://airccse.org/journal/ijdps/current2012.html
REFERENCES
[1]. R. Al-Ali, Member, IEEE, Imran Zualkernan, and FadiAloul, Senior Member, IEEE, “A Mobile GPRS-
sensors array for Air Pollution Monitoring” vol.6, pp.410-422, Oct.2010.
[2]. NihalKularatna, Senior Member, IEEE, and B. H. Sudantha, Member, IEEE “An Environment Air
Pollution Monitoring System Based on the IEEE1451 Standard for Low Cost Requirements” IEEE Sensors
J., Vol. 8, pp.415-422, Apr. 2008.
[3]. M. Abu Jayyab, S. Al Ahdab, M. Taji, Z. Al Hamdani, F. Aloul, “Pollumap: Air Pollution mapper for
cities”, in Proc. IEEE Innovations in Information Technology Conf., Dubai, UAE, Nov.2006,pp.1-5.
[4]. Y. J. Jung, Y. K. Lee, D. G. Lee, K. H. Ryu, and S. Nittel, “Air pollution monitoring system based on
geosensor network”, in Proc. IEEE Int. Geoscience Remote Sensing Symp., 2008, vol. 3, pp.1370-1373.
[5]. M. Gao, F. Zhang, and J. Tian, “Environmental monitoring system with wireless mesh network based on
Embedded System”, in proc. 5th IEEE Int. Symp. Embedded Computing, 2008, pp. 174-179.
[6]. J. W. Kwon, Y. M. Park, S. J. Koo, and H. Kim, “Design of Air Pollution Monitoring system Using
ZigBee Networks for ubiquitous-city ”, in proceedings of In. Conf. Convergence Information Technology,
2007, pp.1024-1031.
[7]. Geng Juntato, Zhou Xiaotao, Zhang Bingjie, “An Atmosphere Environment Monitor System Based on
Wireless Sensor Network”, Journal of Xihua University, Natural Science, Vol. 26, no.4, pp. 44-46 ,2007.
[8] F. Tsow, E. Forzani, A. Rai, R. Wang, R. Tsui, S. Mastroianni, C. Knobbe, A. J. Gandolf, and N. j.Tao,
“A wearable and wireless sensor system for real-time monitoring of toxic environmental volatile organic
compounds”, IEEE sensors, J., vol. 9, pp. 1734-1740, Dec.2009.
[9] W. Chung and C. H. Yang, “Remote Monitoring System with Wireless Sensor Module for Room
Environment”, Sens. Actuators B, vol. 113, no.1, pp. 35-42, 2009.
[10] Raj Kamal, “Embedded System Architecture Programming and Design” TATA Mc-Graw Hill.
[11] N. Kularantna and B. H. Sudantha, “An environmental air pollution monitoring system based on the
IEEE 1451 standard for low cost re-quirements,”IEEE, sensors J., Vol, 8, pp. 415- 422, Apr, 2008.
[12]Y. J. Jung, Y. K. Lee, D. G. Lee, k. H. Ryu, and S. Nittel, “Air Pollution monitoring system based on
geo sensor network ” in proc. IEEE Int. Geoscience Remote Sensing Symp., 2008, vol, 3, pp.1370-1373.
A CATEGORICAL REVIEW OF RECOMMENDER SYSTEMS RVVSV
Prasad1
and V Valli Kumari2
1
Department of Computer Science & Engineering, Bhimavaram Institute of Engineering & Technology,
Bhimavaram – 534243, India
2
Department. Of Computer Science & Systems Engineering, AU College of Engineering, Andhra University,
Vishakapatnam – 533003,
ABSTRACT
As more and more information became available electronically, the need for effective information retrieval
and implementation of filtering tools have became essential for easy access of relevant information.
Recommender Systems (RS) are software tools and techniques providing suggestions for items and/or
services to be of use to a user. These systems are achieving widespread success in ecommerce applications
now a days, with the advent of internet. This paper presents a categorical review of the field of recommender
systems and describes the state-of-the-art of the recommendation methods that are usually classified into four
categories: Content based Collaborative, Demographic and Hybrid systems. This paper discusses the pro’s
and con’s of the current categories as well as the trustworthiness of the recommender system in a new
dimension as evaluating the evaluator for more appropriate recommendations. In the domain of recommender
system, this work also put forward the use of agents as an enabling technology.
KEYWORDS
Collaboration, Demography, Information Filtering, Recommender System, Agent, Trust
For More Details : http://airccse.org/journal/ijdps/papers/3512ijdps07.pdf
Volume Link : http://airccse.org/journal/ijdps/current2012.html
REFERENCES
[1]. Manisha Hiralall, (2011) Recommender systems for e-shops, Business Mathematics and Informatics
paper, Vrije Universiteit, Amsterdam.
[2]. Jannach, D. (2006) Finding preferred query relaxations in content-based recommenders. In: 3rd
International IEEE Conference on Intelligent Systems, pp. 355–360.
[3]. Resnick, P., Varian, H.R., (1997) Recommender systems. Communications of the ACM 40(3), 56–58.
[4]. Francesco Ricci, Lior Rokach and Bracha Shapira, (2011) Introduction to Recommender Systems,
Handbook, DOI 10.1007/978-0-387-85820-3_1, © Springer Science+Business Media, LLC.
[5]. Qing Li and Byeong Man Kim, (2004) Constructing User Profiles for Collaborative Recommender
System, APWeb 2004, LNCS 3007, pp. 100-110, 2004, Springer-Verlag Berlin Heidelberg.
[6]. Zied Zaier, Robert Goding and Lue Faucher, Evaluating Recommender Systems, International
Conference on Automated solutions for Cross Media Content and Multichannel Distribution, IEEE, 2008.
[7]. Panagiotis Symeonidis, Alexandros Nanopoulos and Yannis Manolopoulos, (2007) Feature-Weighted
User Model for Recommender Systems, LNAI 4511, pp. 97-106, Springer Verlag Berlin Heidelberg.
[8]. M. J. Pazzani, (1999) A framework for collaborative, content-based and demographic filtering, Artificial
Intelligence Review, 13(5-6):393-408.
[9]. Kay, J, (2006) Scrutable adaptation: Because we can and must. In: Adaptive Hypermedia and
AdaptiveWeb-Based Systems, 4th International Conference, AH 2006, Dublin, Ireland, June 21-23, 2006,
Proceedings, pp. 11–19.
[10]. Alfarez Abdul Rahaman and Stephen Hailes, (1997) Using Recommendations for Managing Trust in
Distributed Systems, Proceedings of the IEEE International Conference on Communications.
[11]. Ido Guy, Naama Zwerdling, David Carmel, Inbal Ronen, Erel Uziel, Sivan Yogev, Shila Ofek-Kolfman,
(2009) Personalized Recommendation of Social Software Items Based on Social Relations, , ACM.
[12]. Konstantin Pussep, Sebastian Kaune, Jonas Flick, Ralf Steinmetz, (2009) A Peer-to-Peer Recommender
System with Privacy Constraints, IEEE.
[13]. Olli Niinivaara, (2004) Agent-Based Recommender Systems, Helsinki 17.5.2004, Sofware Agent
Technology Course Paper, Department of Computer Science,UNIVERSITY OF HELSINKI.
[14]. Yan Zheng Wei, Lue Moreau and Nicholas R.Jennings, (2004) Learning Users’ Interests in a Market-
Based Recommendation Systems, IDEAL 2004, LNCS 3177, pp. 833-840, Springer Verlag Berling
Heidelberg.
[15]. Osmar R. Zaiane, (2002) Building Recommender Agent for e-Learning System, Proceedings in ICCE,
IEEE.
[16]. Robert H.Guttman, Alexandros G. Moukas and Pattie Maes, (1998) Agent Mediated Electronic
Commerce : A Survey, Journal The Knowledge Engineering Review, Volume 13 Issue 2 Pages 147 – 159.
[17]. RVVSV Prasad, Vegi Srinivas, V. Valli kumari and KVSVN Raju, “Credibility based reputation
calculation in P2P networks”, Springer-Verlag Berlin Heidelberg 2008, ICDCIT 2008, LNCS 5375, pp. 188-
195,2008.
AUTHORS
RVVSV Prasad received his Masters degree in computer applications from Madurai
Kamaraj University and Master of Philosophy in Computer Science from Alagappa
University. He is currently doctoral candidate in the Department of Computer Science
& Engineering, Acharya Nagarjuna University, Nagarjuna Nagar, Guntur, India. He is
working as Associate Professor in the Department of Computer Science & Engineering,
Bhimavaram Institute of Engineering and Technology, Pennada, Bhimavaram, India.
His research interests include recommender systems, security, privacy and trust in
mobile agents and P2P networks.
V.Valli Kumari received her B.E. in Electronics and Communication Engineering and
M.Tech. and PhD in Computer Science and Engineering all from Andhra University,
India and is currently working as Professor in the same department. . She was awarded
a gold medal for best research in 2008 in Andhra University. Her areas of research
interest include Web, Data Engineering, Network Security, e-commerce and has 70
publications in conferences /journals of international and national repute. She is a
member of IEEE, ACM, CRSI and CSI.
CLOUD-BASED DEVELOPMENT OF SMART AND CONNECTED DATA IN HEALTHCARE APPLICATION
S. Naisha Sultana1
, Gandikota Ramu2
and Prof. B. Eswara Reddy3
1, 2&3
Dept of Computer Science & Engineering, JNTUA College of Engineering, Ananthapuramu, Andhra
Pradesh, India
ABSTRACT
There is a need of data integration in cloud – based system, we propose an Information Integration and
Informatics framework for cloud – based healthcare application. The data collected by the Electronic Health
Record System need to be smart and connected, so we use informatica for the connection of data from
different database. Traditional Electronic Health Record Systems are based on different technologies,
languages and Electronic Health Record Standards. Electronic Health Record System stores data based on
interaction between patient and provider. There are scalable cloud infrastructures, distributed and
heterogeneous healthcare systems and there is a need to develop advanced healthcare application. This
advance healthcare application will improve the integration of required data and helps in fast interaction
between the patient and the service providers. Thus there is the development of smart and connected data in
healthcare application of cloud. The proposed system is developed by using cloud platform Aneka.
KEYWORDS
Cloud Computing, Data Integration, Informatica, Aneka, Electronic Health Records
For More Details : http://airccse.org/journal/ijdps/papers/5614ijdps01.pdf
Volume Link : http://airccse.org/journal/ijdps/current2014.html
REFERENCES
[1] A. Bhaga, V. Madisetti, A Cloud-based Approach for Interoperable Electronic Health Records
(EHRs), IEEE Journal of Biomedical and Health Informatics, vol. 17, iss. 5, pp. 894 – 906, 2013.
[2] C. Hajat, An Introduction to Epidemiology, Methods Mol Biol. 2011; 713:27-39.
[3] VistA Monograph [Online]. Available: www.va.gov/vista. monograph, 2012.
[4] OpenEHR. (2012). [Online]. Available: https://www.openehr.org
[5] Mirth Connect. (2012). [Online]. Available: http://www.mirthcorp.com/products/mirth-connect
[6] Medsphere FM Projection. (2012). [Online].
Available:http://medsphere.org/community/project/fmprojection.
[7] A. Bahga and V.K. Madisetti, “Analyzing massive machine maintenance data in a computing cloud,”
IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 10, pp. 1831-1843, Oct. 2012.
[8] A. Bahga and V.K. Madisetti, “Synthetic workload generation for cloud computing applications,”
J.Softw.eng.Appl., vol. 4, no7, pp.396-410, 2011.
[9] A. Bahga and V.K. Madisetti, “Performance evaluation approach for multi-tier cloud applications,”
J.Sofw.Eng.Appl., vol. 6, no.2, pp.74-83, 2013.
[10] A. Bahga and V.K. Madisetti, Rapid Prototyping of Advanced Cloud Based Services and Systems, IEEE
Comput., under review, Aug. 2012.
[11] N. Radio, Y. Zhang, M. Tatipamula, and V.K. Madisetti, “Next-generation applications on cellular
networks: Trends, challenges, and solutions,” Proc. IEEE, vol. 100, no.4, pp. 841-85, Apr. 2012.
[12] Aneka[Online]. Available : http://www.manjrasoft.com/
[13] Informatica Powercenter[Online]. Available : http://www.informatica.com/in/ETL/
AUTHORS
Ms. S. Naisha Sultana received the B.E Degree in Information Technology from G.
Pullaiah College of Engineering and Technology affiliated to JNT University
Anantapur, Anantapuramu, India in the year 2012, and pursuing M.Tech Degree in
Software Engineering at Computer Science Department of JNT University Anantapur,
Anantapuramu. Her research area in M.Tech deals with Cloud Computing.
Mr. Gandikota Ramu received B.Tech degree in Information Technology and
M.Tech degree in Computer Science from JNT University Anathapur,
Anathapuramu, India. He is currently working towards Ph.D Degree at JNT
University Anantapur, Ananthapuramu, India. He is working as Assistant Mentor in
Master of Science in Information Technology (MSIT) program, JNTUA (in
collaboration with Consortium of Institutions Higher Learning and Carnegie Mellon
University, USA).
Dr. B. Eswara Reddy Graduated in B.Tech. (CSE) from Sri Krishna Devaraya
University. He received Masters Degree in M.Tech.(Software Engineering), from JNT
University, Hyderabad. He received Ph.D in Computer Science & Engineering from
JNT University, Hyderabad. He is working as Professor in CSE Dept. and
VicePrincipal at JNTUA College of Engineering, Ananthapuramu. He has more than
50 Publications in various International Journals and Conferences.. He has received UGC Major Research
Project (MRP) titled ‘Cloud Computing framework for rural healthcare in Indian Scenario’. His research
interests include Pattern Recognition & Image Analysis, Data Mining and Cloud Computing. He is a Fellow
of IE (India). He is a life member of ISTE, ISCA and member of CSI and IEEE.
A STUDY ON ENERGY EFFICIENT ROUTING PROTOCOLS IN WIRELESS SENSOR
NETWORKS
Monica R Mundada1
, Savan Kiran1
, Shivanand Khobanna1
, Raja Nahusha Varsha1
and Seira Ann George1
1
Department of Computer Science and Engineering, M S Ramaiah Institute of Technology, Bangalore
ABSTRACT
A wireless sensor network (WSN) consists of low cost, low power, small in size and multi functional sensor
nodes. Routing protocols in WSNs emphasize on data dissemination, limited battery power and bandwidth
constraints in order to facilitate efficient working of the network, thereby increasing the lifetime of the
network. Routing protocols in WSNs are also application specific which has led to the development of a
variety of protocols. Based on the underlying network structure, routing techniques can be classified into
three categories: data-centric, hierarchical and location based routing. WSN has a design trade-off between
energy and communication overhead which forms the nerve center of the routing techniques. In this paper
we present a survey of state-of-the-art routing techniques in WSNs under all the three categories. We
epitomize these routing techniques and bring out the advantages and disadvantages followed by their
application domain. The paper concludes with issues open for research.
KEYWORDS
Wireless Sensor Networks, Routing Protocols, Energy Efficient Protocols, Data-Centric protocols,
Hierarchical Protocols and Location Based Protocols.
For More Details : http://airccse.org/journal/ijdps/papers/0512ijdps26.pdf
Volume Link : http://airccse.org/journal/ijdps/current2012.html
REFERENCES
[1] I. F. Akyildiz et al,( March 2002), “Wireless sensor networks: a survey”, Computer Networks, V
Vol. 38, pp. 393-422.
[2] K. Sohrabi, et al, (October 2000) "Protocols for self-organization of a wireless sensor network,” I
IEEE Personal Communications, Vol. 7, No. 5, pp. 16-27.
[3] R. Min, et al., (January 2001), “Low Power Wireless Sensor Networks,” Internation Conference o
on VLSI Design, Bangalore, India.
[4] J.M. Rabaey, et al., ( July 2000), "PicoRadio supports ad hoc ultra low power wireless e
networking," IEEE Computer, Vol. 33, pp. 42-48.
[5] R. H. Katz, J. M. Kahn and K. S. J. Pister, ( August 1999), “Mobile Networking for Smart Dust,”
5th Annual ACM/IEEE International Conference on Mobile Computing and Networking
(MobiCom’99), Seattle, WA.
[6] I.F.Akyildiz,W.Su, Y.Sankarasubramaniam,E.Cayirci, (Dec 2002), “Wireless Sensor Networks:A
survey”, Elsevier science B.V.
[7] Shio Kumar Singh, M P Singh and D K Singh, (August 2010), “A Survey of Energy-Efficient
Hierarchical Cluster-Based Routing in wireless Sensor Network,” Int J. of Advanced Networking and
Applications Volume:02, Issue:02, Pages:570-580.
[8] W. Heinzelman, A. Chandrakasan and H. Balakrishnan, (Jan 2000), “Energy-Efficient
Communication Protocol for Wireless Microsensor Networks,” Proc. 33rd Hawaii Int’l. Conf. Sys. Sci.
[9] Zuniga, M. Z.; Krishnamachari, B. (2002), "Integrating Future Large-Scale Wireless Sensor
Networks with the Internet," - Department of Electrical Engineering, UNiversity of Southern
California.
[10] Alonso, J., Dunkels, A., Voigt. T, ( March 2004), “Bounds on the energy consumption of routings
in wireless sensor nodes” WiOpt'04: Modeling and Optimization in Mobile, Ad Hoc and Wireless
Networks,” Cambridge, UK.
[11] S. Tilak et al,( June 2002), “A Taxonomy of Wireless Microsensor Network Models,” ACM
Mobile Computing and Communications Review (MC2R).
[12] W. Heinzelman, J. Kulik, and H. Balakrishnan, (Aug. 1999), “Adaptive Protocols for
Information Dissemination in Wireless Sensor Networks,” Proc. 5th ACM/IEEE Mobicom, Seattle,
WA, pp. 174–85.
[13] J. Kulik, W. R. Heinzelman, and H. Balakrishnan, (2002), “Negotiation-Based Protocols for
Disseminating Information in Wireless Sensor Networks,” Wireless Networks, vol. 8, pp. 169–85.
[14] C. Intanagonwiwat, R. Govindan and D. Estrin, (August 2000), "Directed diffusion: A scalable
and robust communication paradigm for sensor networks", Proceedings of the 6th Annual ACM/IEEE
International Conference on Mobile Computing and Networking (MobiCom'00), Boston, MA.
[15] D. Estrin, et al., (August 1999), “Next century challenges: Scalable Coordination in Sensor
Networks,” 5th annual ACM/IEEE international conference on Mobile Computing and Networking
(MobiCom’99), Seattle, WA.
[16] D. Braginsky and D. Estrin, (October 2002), "Rumor Routing Algorithm for Sensor Networks",
Proceedings of the First Workshop on Sensor Networks and Applications (WSNA), Atlanta, GA.
[17] GRAdient Broadcast: A Robust, Long-lived Large Sensor Network,
http://irl.cs.ucla.edu/papers/grab-techreport.ps
[18] N. Sadagopan et al., (May 2003), “The ACQUIRE mechanism for efficient querying in sensor
networks,” Proceedings of the First International Workshop on Sensor Network Protocol and
Applications, Anchorage, Alaska.
[19] Jabed Faruque & Ahmed Helmy, (2004), “RUGGED: Routing on Fringerprint Gradients in Sensor
Networks,” Pervasive Services, ICPS, IEEE/ACS International Conference on .
[20] D.R. Askeland, (1994), The Science and Engineering of Materials, PWS Publishing Co.
[21] J.F. Shackelford, (2000) Intro to Materials Science For Engineers, 5th Ed., Prentice Hall.
[22] S.Kim, Sang.H.Son, J.A.Stankovic, S.Li & Y.Choi,(2003), “SAFE: A Data Dissemination
Protocol for Periodic Updates in Sensor Networks”, Distributed Computing System Workshop 23rd
International Conference.
[23] Mesut Gunes, Udo Sorges & Imed Bouazizi, (2002), “ACA: The Ant-Colony Based Routing
Algoritm for MANETS”, Proceedings of the International Conference on Parallel Processing
Workshops (ICPPW 02), IEEE.
[24] Tiago Camilo, Carlos Carreto, Jorge Sa Silva and Fernando Boavida, (2006), “ An
EnergyEfficient Ant-Based Routing Algorithm for Wireless Sensor Networks”.
[25] Dorigo, M., Stützle, T.,( march 2004), “Ant Colony Optimization”, ISBN 0262042193, MIT Press.
[26] W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, (January 2000), “Energy-efficient
communication protocol for wireless sensor networks", Proceeding of the Hawaii International
Conference System Sciences, Hawaii.
[27] W. B. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan, ( Oct. 2002), “An
ApplicationSpecific Protocol Architecture for Wireless Microsensor Networks,” IEEE Trans. Wireless
Commun., vol. 1, no. 4, pp. 660–70.
[28] S. Lindsey and C. S. Raghavendra, (March 2002), "PEGASIS: Power Efficient GAthering in
Sensor Information Systems," Proceedings of the IEEE Aerospace Conference, Big Sky, Montana.
[29] S. Lindsey, C. S. Raghavendra and K. Sivalingam, (April 2001), "Data Gathering in Sensor
Networks using the Energy*Delay Metric", IPDPS Workshop on Issues in Wireless Networks and
Mobile Computing, San Francisco, C.
[30] A. Manjeshwar and D. P. Agrawal, ( April 2001), “TEEN : A Protocol for Enhanced Efficiency in
Wireless Sensor Networks," Proceedings of the 1st International Workshop on Parallel and Distributed
Computing Issues in Wireless Networks and Mobile Computing, San Francisco, CA.
[31] A. Manjeshwar and D. P. Agrawal, (April 2002),"APTEEN: A Hybrid Protocol for Efficient
Routing and Comprehensive Information Retrieval in Wireless Sensor Networks," in the Proceedings
of the 2nd International Workshop on Parallel and Distributed Computing Issues in Wireless Networks
and Mobile computing, Ft. Lauderdale, FL.
[32] M. Younis, M. Youssef and K. Arisha, (October 2002), “Energy-Aware Routing in ClusterBased
Sensor Networks”, in the Proceedings of the 10th IEEE/ACM International Symposium on Modeling,
Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS2002), Fort
Worth, TX.
[33] Siva D. Muruganathan, Damiel C.F.MA, Rolly I.Bhasin and Abraham O.FAPOJUWO, (March
2005), “ A Centralised Energy-Efficient Routing Protocol for Wireless Sensor Networks,” IEEE Radio
Communication.
[34] Guanfeng Li, Taieb Znati & Anandha Gopalan, (2004), “ REAP: ring band-based energy adaptive
protocol for information dissemination and forwarding in wireless sensor networks,” Int.J.Sensor
Network. Vol. X, No. Y, XXXX.
[35] Kemal Akkaya and Mohamed Younis, (2005),“A Survey on Routing Protocol for Wireless Sensor
Network”, Elsevier Ad Hoc Network Journal, Vol 3/3pp. 325-549.
[36] F. Ye et al.,( 2002), “A Two-Tier Data Dissemination Model for Large-Scale Wireless Sensor
Networks,” Proc. ACM/IEEE MOBICOM.
[37] L. Li, and J. Y. Halpern, (2001), “Minimum-Energy Mobile Wireless Networks Revisited,” IEEE
ICC, vol. 1, pp. 278–83.
[38] Y. Xu, J. Heidemann, and D. Estrin, (2001), “Geography informed Energy Conservation for
Adhoc Routing,” Proc. 7th Annual ACM/IEEE Int’l. Conf. Mobile Comp. and Net., pp. 70–84.
[39] B. Karp and H. T. Kung, (August 2000), “GPSR: Greedy perimeter stateless routing for wireless
sensor networks,” in the Proceedings of the 6th Annual ACM/IEEE International Conference on
Mobile Computing and Networking (MobiCom '00), Boston, MA.
[40] Y. Yu, D. Estrin, and R. Govindan,( May 2001), “Geographical and Energy-Aware Routing: A
Recursive Data Dissemination Protocol for Wireless Sensor Networks,” UCLA Computer Science
Department Technical Report, UCLA-CSD TR-01-0023.
A NOVEL ANTI PHISHING FRAMEWORK BASED ON VISUAL CRYPTOGRAPHY
Divya James1
and Mintu Philip2
1
MTech in Information System Security, Indira Gandhi National Open University, India, 2
Rajagiri
School of Engineering and Technology, Kochi, India
ABSTRACT
Phishing is an attempt by an individual or a group to thieve personal confidential information such as
passwords, credit card information etc from unsuspecting victims for identity theft, financial gain and other
fraudulent activities. In this paper we have proposed a new approach named as "A Novel Antiphishing
framework based on visual cryptography" to solve the problem of phishing. Here an image based
authentication using Visual Cryptography (vc) is used. The use of visual cryptography is explored to
preserve the privacy of image captcha by decomposing the original image captcha into two shares that are
stored in separate database servers such that the original image captcha can be revealed only when both are
simultaneously available; the individual sheet images do not reveal the identity of the original image
captcha. Once the original image captcha is revealed to the user it can be used as the password.
KEYWORDS
Phishing, Visual Cryptography, Image Captcha, Shares, Security.
For More Details : http://airccse.org/journal/ijdps/papers/0112ijdps17.pdf
Volume Link : http://airccse.org/journal/ijdps/current2012.html
REFERENCES
[1] Thiyagarajan, P.; Venkatesan, V.P.; Aghila, G.; "Anti-Phishing Technique using Automated Challenge
Response Method'", in Proceedings of IEEE- International Conference on Communications and
Computational Intelligience, 2010.
[2] Sun Bin.; Wen Qiaoyan.; Liang Xiaoying.; "A DNS based Anti-Phishing Approach," in Proceedings of
IEEE- Second International Conference on Networks Security, Wireless Communications and Trusted
Computing, 2010
[3] Nourian, A.; Ishtiaq, S.; Maheswaran, M.;" CASTLE: A social framework for collaborative
antiphishing databases", in Proceedings of IEEE- 5th International Conference on Collaborative
Computing:Networking, Applications and Worksharing, 2009.
[4] Sid Stamm, Zulfikar Ramzan, "Drive-By Pharming", v4861 LNCS,p495-506, 2007, Information and
Communications Security - 9th International Conference, ICICS 2007, Proceedings.
[5] Anthony Y. Fu, Liu Wenyin, "Detecting Phishing Web Pages with Visual Similarity Assessment
Based on Earth Mover’s Distance (EMD)",IEEE Transactions on Dependable and Secure Computing, v 3, n
4, p301-311, October/December 2006
[6] Wenyin Liu, Xiaotie Deng, Guanglin Huang, and Anthony Y. Fu, "An Antiphishing Strategy Based on
Visual Similarity Assessment", IEEE Internet Computing, v 10, n 2, p 58-65, March/April 2006.
[7] JungMin Kang, DoHoon Lee, "Advanced White List Approach for Preventing Access to Phishing
Sites", 2007 International Conference onConvergence Information Technology, ICCIT 2007, p 491-496,
2007
[8] Nirmal, K.; Ewards, S.E.V.; Geetha, K.; "Maximizing online security by providing a 3 factor
authentication system to counter-attack 'Phishing'", in Proceedings of IEEE- International Conference on
Emerging Trends in Robotics and Communication Technologies, 2010.
[9] Tianyang Li.; Fuye Han.; Shuai Ding and Zhen Chen.; "LARX: Large-scale Anti-phishing by
Retrospective Data-Exploring Based on a Cloud Computing Platform", in Proceedings of IEEE- 20th
International Conference on Computer Communications and Networks, 2011.
[10] Qingxiang Feng.; Kuo-Kun Tseng.; Jeng-Shyang Pan.; Peng Cheng and Charles Chen.; "New
Antiphishing Method with Two Types of Passwords in OpenID System", in Proceedings of IEEE Fifth
International Conference on Genetic and Evolutionary Computing,2011
[11] Maher Aburrous .; M. A. Hossain.; Keshav Dahal.; "Modelling Intelligent Phishing Detection System
for e-Banking using Fuzzy Data Mining", in Proceedings of IEEE Conference
on CyberWorlds,2009.
[12]Haijun Zhang , Gang Liu, and Tommy W. S. Chow, “Textual and Visual Content-Based Anti-
Phishing:A Bayesian Approach,” IEEE Trans. Neural Netw., vol. 22, no. 10, pp. 1532– 1546, Oct.2011.
[13] M. Naor and A. Shamir, “Visual cryptography,” in Proc. EUROCRYPT, 1994, pp. 1–12.
[14] B. Borchert, .Segment Based Visual Cryptography,. WSI Press, Germany, 2007.
[15] W-Q Yan, D. Jin and M. S. Kanakanahalli, .Visual Cryptography for Print and Scan
Applications,.IEEE Transactions, ISCAS-2004, pp. 572-575.
[16] T. Monoth and A. P. Babu, .Recursive Visual Cryptography Using Random Basis Column Pixel
Expansion,. in Proceedings of IEEEInternational Conference on Information Technology, 2007, pp. 41-43.
[17] G. B. Horng, T. G. Chen and D. S. Tsai, .Cheating in Visual Cryptography,. Designs,
Codes,Cryptography, vol. 38, no. 2, 2006, pp. 219-236.
[18] C. M. Hu and W. G. Tzeng, .Cheating Prevention in Visual Cryptography,. IEEE Transaction on
Image Processing, vol. 16, no. 1, Jan-2007,pp. 36-45.
[19] A Text-Graphics Character CAPTCHA for Password Authentication Matthew Dailey Chanathip
Namprempre.
MOBILE-ASSISTED LANGUAGE LEARNING
Tayebeh Mosavi Miangah1
and Amin Nezarat2
1
English Language Department, Payame Noor University, Yazd, Iran
2
Information Technology Department, Shiraz University, Shiraz, Iran
ABSTRACT
The main characteristics of mobile learning (m-learning) are recognized as the potential for
learning process to be personalized, spontaneous, informal and ubiquitous. Although learning
through mobile phones may take longer time compared to computers, the learners feel a greater
sense of freedom of time and place, so that they can take the advantage of spare time to learn a
second language when and where they are. Mobile-Assisted Language Learning (MALL) deals
with the use of mobile technology in language learning. In contrast to classroom learning, in
MALL there is no need for the learners to sit in a classroom or at a computer to get learning
materials. In fact, MALL can be considered an ideal solution to language learning barriers in
terms of time and place. In this paper by looking at some applications of m-learning as well as
some examples across various aspects of it, we observe the advantages and disadvantages derived
from using mobile technologies for students as well as professionals. Here, it has been tried to
demonstrate the benefits of using mobile phones in learning English as a second language. Areas
of mobile-based language learning discussed in this paper are vocabulary, listening, grammar,
phonetics, and reading comprehension.
KEYWORDS
e-learning, mobile-assisted language learning, mobile technology, second language learning,
wireless communication
For More Details : http://airccse.org/journal/ijdps/papers/0112ijdps26.pdf
Volume Link : http://airccse.org/journal/ijdps/current2012.html
REFERENCES
[1] Chen, N. S. S.-W., Hsieh, & Kinshuk. (2008). “Effects of short-term memory and content
representation type on mobile language learning”. Language Learning & Technology, 12(3), pp.
93–113. Retrieved from http://llt.msu.edu/vol12num3/chenetal.pdf
[2] Chen, C. M. & S.-H. Hsu. (2008). “Personalized Intelligent Mobile Learning System for
Supporting Effective English Learning”. Educational Technology & Society, 11 (3), pp. 153-180.
[3] Gay, G.; M. Stefanone, M. Grace-Martin, & H. Hembrooke. (2001) “The effects of wireless
computing in collaborative learning environments”. International Journal of Human-Computer
Interaction, 13(2), pp. 257-276.
[4] Huang, C. and P. Sun. (2010) “Using mobile technologies to support mobile multimedia
English listening exercises in daily life”. In: The International Conference on Computer and
Network Technologies in Education (CNTE 2010), At: http://cnte2010.cs.nhcue.edu.tw/
[5] Kennedy, C. & M. Levy. (2008). “L’italiano al telefonino: Using SMS to support beginners’
language learning”. ReCALL, 20(3), pp. 315–350.
[6] Klopfer, E.; K. Squire, and H. Jenkins. (2002). "Environmental Detectives: PDAs as a
window into a virtual simulated world." In: Proceedings of IEEE International Workshop on
Wireless and Mobile Technologies in Education. Vaxjo, Sweden: IEEE Computer Society, pp.
95-98
[7] Koole. M. (2009). “A model for framing mobile learning” . In M. Ally (Ed.), Mobile learning:
Transforming the delivery of education & training, pp. 25–47. Athabasca: AU Press.
[8] Kukulska-Hulme A. and L. Shield. (2008). “An Overview of Mobile Assisted Language
Learning: Can Mobile Devices Support Collaborative Practice in Speaking and listening?”
http://portal.acm.org/citation.cfm?id=1520087, accessed Jul. 2009.
[9] Kukulska-Hulme, A. & J.Traxler. (Eds.). “Mobile learning: A handbook for educators and
trainers”. London: Routledge, 2005.
[10] Kukulska-Hulme. A. (2009). “Will mobile learning change language learning?” ReCALL
21(2), pp. 157-165.
[11] Microsoft research program. (2010).
At:http://research.microsoft.com/enus/collaboration/papers/berkeley.pdf, accessed Jul. 2010
[12] Oxford R. and J. Oxford. (2009). “Second Language Teaching and Learning in the Next
Generation”, 2009. http://llt.msu.edu/vol14num1/review1.pdf, accessed Jul. 2010.
[13] Sharples. M. (2000). “The design of personal mobile technologies for lifelong learning”.
Computers & Education, 34(3-4), pp. 177-193.
[14] Stockwell. G. (2008). “Investigating learner preparedness for and usage patterns of mobile
learning”. ReCALL, 20(3), pp. 253–270.
[15] Thornton, P. & C.Houser. (2005). “Using mobile phones in English education in Japan.
Journal of Computer Assisted Learning”, 21(3), pp. 217–228.
[16] Yang Soon. G. (2005). “Technology for Foreign Language Learning”.
http://www.readingmatrix.com/conference/pp/proceedings/gohyingsoon.pdf, accessed Dec 2010.
[17] Yamaguchi. T. (2005). “Vocabulary Learning with a Mobile Phone”.
http://llt.msu.edu/vol10num1/emerging/default.html, accessed Jul. 2010.
[18] Yannick. J. (2007). “M-Learning: A pedagogical and technological model for language
learning on mobile phones”. In: Blended Learning, Joseph Fong, Fu Lee Wang (Eds), 2007, pp.
327-339.

Más contenido relacionado

La actualidad más candente

MOBILE TOWER RADIATION IMPACT ON BIOLOGICAL IMPAIRMENT
MOBILE TOWER RADIATION IMPACT ON BIOLOGICAL IMPAIRMENTMOBILE TOWER RADIATION IMPACT ON BIOLOGICAL IMPAIRMENT
MOBILE TOWER RADIATION IMPACT ON BIOLOGICAL IMPAIRMENTIAEME Publication
 
Wi fi technology - an uncontrolled global experiment on the health of mankind...
Wi fi technology - an uncontrolled global experiment on the health of mankind...Wi fi technology - an uncontrolled global experiment on the health of mankind...
Wi fi technology - an uncontrolled global experiment on the health of mankind...Marc Manthey
 
Review adverse effects on environment due to cell tower radiation (microwa...
Review   adverse effects on environment due to cell tower  radiation (microwa...Review   adverse effects on environment due to cell tower  radiation (microwa...
Review adverse effects on environment due to cell tower radiation (microwa...Nripesh Gupta
 
Voltage Transients and Health - Is There a Connection?
Voltage Transients and Health - Is There a Connection?Voltage Transients and Health - Is There a Connection?
Voltage Transients and Health - Is There a Connection?Mikko Ahonen
 
Biotechnology - Natural vs. Man-Made Electromagnetic Fields (EMF) - Futur...
Biotechnology - Natural vs. Man-Made Electromagnetic Fields (EMF) - Futur...Biotechnology - Natural vs. Man-Made Electromagnetic Fields (EMF) - Futur...
Biotechnology - Natural vs. Man-Made Electromagnetic Fields (EMF) - Futur...Mikko Ahonen
 
An integrated approach for pollution monitoring: smart acquirement and smart ...
An integrated approach for pollution monitoring: smart acquirement and smart ...An integrated approach for pollution monitoring: smart acquirement and smart ...
An integrated approach for pollution monitoring: smart acquirement and smart ...Greenapps&web
 
G8gKADWDcjv934mbFProject_Compilation_20150415.doc
G8gKADWDcjv934mbFProject_Compilation_20150415.docG8gKADWDcjv934mbFProject_Compilation_20150415.doc
G8gKADWDcjv934mbFProject_Compilation_20150415.docOlukayode Aluko
 
Report: A Model For Remote Parental Control System Using Smartphones
Report: A Model For Remote Parental Control System Using SmartphonesReport: A Model For Remote Parental Control System Using Smartphones
Report: A Model For Remote Parental Control System Using SmartphonesIJCI JOURNAL
 
Current trend in internet access and utilization using mobile devices among p...
Current trend in internet access and utilization using mobile devices among p...Current trend in internet access and utilization using mobile devices among p...
Current trend in internet access and utilization using mobile devices among p...Alexander Decker
 
PitFee_Jao_2016_publication_patents
PitFee_Jao_2016_publication_patentsPitFee_Jao_2016_publication_patents
PitFee_Jao_2016_publication_patentsPit Fee Jao
 
IRJET- Neurotechnology for Superior Brain
IRJET-  	  Neurotechnology for Superior BrainIRJET-  	  Neurotechnology for Superior Brain
IRJET- Neurotechnology for Superior BrainIRJET Journal
 
International Journal of Network Security & Its Applications (IJNSA) - Curren...
International Journal of Network Security & Its Applications (IJNSA) - Curren...International Journal of Network Security & Its Applications (IJNSA) - Curren...
International Journal of Network Security & Its Applications (IJNSA) - Curren...IJNSA Journal
 
Tutorial PIMRC 2015 [T8]
Tutorial PIMRC 2015 [T8]Tutorial PIMRC 2015 [T8]
Tutorial PIMRC 2015 [T8]T. E. BOGALE
 

La actualidad más candente (20)

MOBILE TOWER RADIATION IMPACT ON BIOLOGICAL IMPAIRMENT
MOBILE TOWER RADIATION IMPACT ON BIOLOGICAL IMPAIRMENTMOBILE TOWER RADIATION IMPACT ON BIOLOGICAL IMPAIRMENT
MOBILE TOWER RADIATION IMPACT ON BIOLOGICAL IMPAIRMENT
 
Wi fi technology - an uncontrolled global experiment on the health of mankind...
Wi fi technology - an uncontrolled global experiment on the health of mankind...Wi fi technology - an uncontrolled global experiment on the health of mankind...
Wi fi technology - an uncontrolled global experiment on the health of mankind...
 
Review adverse effects on environment due to cell tower radiation (microwa...
Review   adverse effects on environment due to cell tower  radiation (microwa...Review   adverse effects on environment due to cell tower  radiation (microwa...
Review adverse effects on environment due to cell tower radiation (microwa...
 
self assembly
self assemblyself assembly
self assembly
 
Voltage Transients and Health - Is There a Connection?
Voltage Transients and Health - Is There a Connection?Voltage Transients and Health - Is There a Connection?
Voltage Transients and Health - Is There a Connection?
 
Biotechnology - Natural vs. Man-Made Electromagnetic Fields (EMF) - Futur...
Biotechnology - Natural vs. Man-Made Electromagnetic Fields (EMF) - Futur...Biotechnology - Natural vs. Man-Made Electromagnetic Fields (EMF) - Futur...
Biotechnology - Natural vs. Man-Made Electromagnetic Fields (EMF) - Futur...
 
cv-seyoung
cv-seyoungcv-seyoung
cv-seyoung
 
An integrated approach for pollution monitoring: smart acquirement and smart ...
An integrated approach for pollution monitoring: smart acquirement and smart ...An integrated approach for pollution monitoring: smart acquirement and smart ...
An integrated approach for pollution monitoring: smart acquirement and smart ...
 
Mobile phone
Mobile phoneMobile phone
Mobile phone
 
G8gKADWDcjv934mbFProject_Compilation_20150415.doc
G8gKADWDcjv934mbFProject_Compilation_20150415.docG8gKADWDcjv934mbFProject_Compilation_20150415.doc
G8gKADWDcjv934mbFProject_Compilation_20150415.doc
 
Report: A Model For Remote Parental Control System Using Smartphones
Report: A Model For Remote Parental Control System Using SmartphonesReport: A Model For Remote Parental Control System Using Smartphones
Report: A Model For Remote Parental Control System Using Smartphones
 
Current trend in internet access and utilization using mobile devices among p...
Current trend in internet access and utilization using mobile devices among p...Current trend in internet access and utilization using mobile devices among p...
Current trend in internet access and utilization using mobile devices among p...
 
NewsletterIMS2015_w
NewsletterIMS2015_wNewsletterIMS2015_w
NewsletterIMS2015_w
 
PitFee_Jao_2016_publication_patents
PitFee_Jao_2016_publication_patentsPitFee_Jao_2016_publication_patents
PitFee_Jao_2016_publication_patents
 
The Awareness of Health Danger with the Usage of Smartphone among the Young G...
The Awareness of Health Danger with the Usage of Smartphone among the Young G...The Awareness of Health Danger with the Usage of Smartphone among the Young G...
The Awareness of Health Danger with the Usage of Smartphone among the Young G...
 
William j. bruno research
William j. bruno researchWilliam j. bruno research
William j. bruno research
 
IRJET- Neurotechnology for Superior Brain
IRJET-  	  Neurotechnology for Superior BrainIRJET-  	  Neurotechnology for Superior Brain
IRJET- Neurotechnology for Superior Brain
 
International Journal of Network Security & Its Applications (IJNSA) - Curren...
International Journal of Network Security & Its Applications (IJNSA) - Curren...International Journal of Network Security & Its Applications (IJNSA) - Curren...
International Journal of Network Security & Its Applications (IJNSA) - Curren...
 
Ai03401960203
Ai03401960203Ai03401960203
Ai03401960203
 
Tutorial PIMRC 2015 [T8]
Tutorial PIMRC 2015 [T8]Tutorial PIMRC 2015 [T8]
Tutorial PIMRC 2015 [T8]
 

Similar a October 2020: Top Read Articles in Distributed and Parallel systems

Most Viewed Article for an year in Academia - International Journal of Distri...
Most Viewed Article for an year in Academia - International Journal of Distri...Most Viewed Article for an year in Academia - International Journal of Distri...
Most Viewed Article for an year in Academia - International Journal of Distri...ijdpsjournal
 
2021 Top Ten Cited Article - International Journal of Wireless & Mobile Netwo...
2021 Top Ten Cited Article - International Journal of Wireless & Mobile Netwo...2021 Top Ten Cited Article - International Journal of Wireless & Mobile Netwo...
2021 Top Ten Cited Article - International Journal of Wireless & Mobile Netwo...ijwmn
 
February 2024 - Top 10 Read Article for Wireless & Mobile Networks -Internati...
February 2024 - Top 10 Read Article for Wireless & Mobile Networks -Internati...February 2024 - Top 10 Read Article for Wireless & Mobile Networks -Internati...
February 2024 - Top 10 Read Article for Wireless & Mobile Networks -Internati...ijwmn
 
January 2024 Top 10 Read Article -International Journal of Wireless & Mobile ...
January 2024 Top 10 Read Article -International Journal of Wireless & Mobile ...January 2024 Top 10 Read Article -International Journal of Wireless & Mobile ...
January 2024 Top 10 Read Article -International Journal of Wireless & Mobile ...ijwmn
 
June 2020: Top Read Articles in Advanced Computing
June 2020: Top Read Articles in Advanced ComputingJune 2020: Top Read Articles in Advanced Computing
June 2020: Top Read Articles in Advanced Computingacijjournal
 
Trends in Information Management
Trends in Information ManagementTrends in Information Management
Trends in Information ManagementAlexander Deucalion
 
New research articles 2019 may issue international journal of computer networ...
New research articles 2019 may issue international journal of computer networ...New research articles 2019 may issue international journal of computer networ...
New research articles 2019 may issue international journal of computer networ...IJCNCJournal
 
wireless convert communications.pdf
wireless convert communications.pdfwireless convert communications.pdf
wireless convert communications.pdfN171013MEDICHARLAABH
 
Top 5 most_viewed_articles ijci
Top 5 most_viewed_articles ijciTop 5 most_viewed_articles ijci
Top 5 most_viewed_articles ijciIJCI JOURNAL
 
Top cited 2nd articles in 2017 - International Journal of Network Security & ...
Top cited 2nd articles in 2017 - International Journal of Network Security & ...Top cited 2nd articles in 2017 - International Journal of Network Security & ...
Top cited 2nd articles in 2017 - International Journal of Network Security & ...IJNSA Journal
 
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...ijwmn
 
Most Downloaded Article for an year in Academia - International Journal of Di...
Most Downloaded Article for an year in Academia - International Journal of Di...Most Downloaded Article for an year in Academia - International Journal of Di...
Most Downloaded Article for an year in Academia - International Journal of Di...ijdpsjournal
 
March 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
April 2023: Top 10 Read Articles in Network Security and Its Applications
 April 2023: Top 10 Read Articles in Network Security and Its Applications April 2023: Top 10 Read Articles in Network Security and Its Applications
April 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
June 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsJune 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
Most Viewed Article in the last 30days in Academia - International Journal of...
Most Viewed Article in the last 30days in Academia - International Journal of...Most Viewed Article in the last 30days in Academia - International Journal of...
Most Viewed Article in the last 30days in Academia - International Journal of...ijdpsjournal
 
May 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsMay 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
Most Cited Articles in Academia - International Journal of Computer Science a...
Most Cited Articles in Academia - International Journal of Computer Science a...Most Cited Articles in Academia - International Journal of Computer Science a...
Most Cited Articles in Academia - International Journal of Computer Science a...IJCSES Journal
 
June 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsJune 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 

Similar a October 2020: Top Read Articles in Distributed and Parallel systems (20)

Most Viewed Article for an year in Academia - International Journal of Distri...
Most Viewed Article for an year in Academia - International Journal of Distri...Most Viewed Article for an year in Academia - International Journal of Distri...
Most Viewed Article for an year in Academia - International Journal of Distri...
 
2021 Top Ten Cited Article - International Journal of Wireless & Mobile Netwo...
2021 Top Ten Cited Article - International Journal of Wireless & Mobile Netwo...2021 Top Ten Cited Article - International Journal of Wireless & Mobile Netwo...
2021 Top Ten Cited Article - International Journal of Wireless & Mobile Netwo...
 
February 2024 - Top 10 Read Article for Wireless & Mobile Networks -Internati...
February 2024 - Top 10 Read Article for Wireless & Mobile Networks -Internati...February 2024 - Top 10 Read Article for Wireless & Mobile Networks -Internati...
February 2024 - Top 10 Read Article for Wireless & Mobile Networks -Internati...
 
January 2024 Top 10 Read Article -International Journal of Wireless & Mobile ...
January 2024 Top 10 Read Article -International Journal of Wireless & Mobile ...January 2024 Top 10 Read Article -International Journal of Wireless & Mobile ...
January 2024 Top 10 Read Article -International Journal of Wireless & Mobile ...
 
June 2020: Top Read Articles in Advanced Computing
June 2020: Top Read Articles in Advanced ComputingJune 2020: Top Read Articles in Advanced Computing
June 2020: Top Read Articles in Advanced Computing
 
Trends in Information Management
Trends in Information ManagementTrends in Information Management
Trends in Information Management
 
New research articles 2019 may issue international journal of computer networ...
New research articles 2019 may issue international journal of computer networ...New research articles 2019 may issue international journal of computer networ...
New research articles 2019 may issue international journal of computer networ...
 
wireless convert communications.pdf
wireless convert communications.pdfwireless convert communications.pdf
wireless convert communications.pdf
 
Top 5 most_viewed_articles ijci
Top 5 most_viewed_articles ijciTop 5 most_viewed_articles ijci
Top 5 most_viewed_articles ijci
 
Top cited 2nd articles in 2017 - International Journal of Network Security & ...
Top cited 2nd articles in 2017 - International Journal of Network Security & ...Top cited 2nd articles in 2017 - International Journal of Network Security & ...
Top cited 2nd articles in 2017 - International Journal of Network Security & ...
 
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
 
Most Downloaded Article for an year in Academia - International Journal of Di...
Most Downloaded Article for an year in Academia - International Journal of Di...Most Downloaded Article for an year in Academia - International Journal of Di...
Most Downloaded Article for an year in Academia - International Journal of Di...
 
March 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its Applications
 
April 2023: Top 10 Read Articles in Network Security and Its Applications
 April 2023: Top 10 Read Articles in Network Security and Its Applications April 2023: Top 10 Read Articles in Network Security and Its Applications
April 2023: Top 10 Read Articles in Network Security and Its Applications
 
June 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsJune 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its Applications
 
Wireless Body Area Network (WBAN)
Wireless Body Area Network (WBAN)Wireless Body Area Network (WBAN)
Wireless Body Area Network (WBAN)
 
Most Viewed Article in the last 30days in Academia - International Journal of...
Most Viewed Article in the last 30days in Academia - International Journal of...Most Viewed Article in the last 30days in Academia - International Journal of...
Most Viewed Article in the last 30days in Academia - International Journal of...
 
May 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsMay 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its Applications
 
Most Cited Articles in Academia - International Journal of Computer Science a...
Most Cited Articles in Academia - International Journal of Computer Science a...Most Cited Articles in Academia - International Journal of Computer Science a...
Most Cited Articles in Academia - International Journal of Computer Science a...
 
June 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsJune 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its Applications
 

Último

The Satellite applications in telecommunication
The Satellite applications in telecommunicationThe Satellite applications in telecommunication
The Satellite applications in telecommunicationnovrain7111
 
Theory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdfTheory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdfShreyas Pandit
 
A brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProA brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProRay Yuan Liu
 
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptJohnWilliam111370
 
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfBalamuruganV28
 
priority interrupt computer organization
priority interrupt computer organizationpriority interrupt computer organization
priority interrupt computer organizationchnrketan
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSsandhya757531
 
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHTEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHSneha Padhiar
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdfCaalaaAbdulkerim
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Sumanth A
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfModule-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfManish Kumar
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating SystemRashmi Bhat
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Communityprachaibot
 
STATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subjectSTATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subjectGayathriM270621
 
Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfImmutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfDrew Moseley
 
Turn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxTurn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxStephen Sitton
 
70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical training70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical trainingGladiatorsKasper
 
Secure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech LabsSecure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech Labsamber724300
 

Último (20)

The Satellite applications in telecommunication
The Satellite applications in telecommunicationThe Satellite applications in telecommunication
The Satellite applications in telecommunication
 
Theory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdfTheory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdf
 
A brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProA brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision Pro
 
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
 
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdf
 
ASME-B31.4-2019-estandar para diseño de ductos
ASME-B31.4-2019-estandar para diseño de ductosASME-B31.4-2019-estandar para diseño de ductos
ASME-B31.4-2019-estandar para diseño de ductos
 
priority interrupt computer organization
priority interrupt computer organizationpriority interrupt computer organization
priority interrupt computer organization
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
 
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHTEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdf
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfModule-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating System
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Community
 
STATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subjectSTATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subject
 
Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfImmutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdf
 
Turn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxTurn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptx
 
70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical training70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical training
 
Secure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech LabsSecure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech Labs
 

October 2020: Top Read Articles in Distributed and Parallel systems

  • 1. October 2020: Top Read Articles in Distributed and Parallel systems International Journal of Distributed and Parallel systems (IJDPS) ISSN : 0976 - 9757 [Online] ; 2229 - 3957 [Print] http://airccse.org/journal/ijdps/ijdps.html
  • 2. BLUETOOTH SECURITY THREATS AND SOLUTIONS: A SURVEY Nateq Be-Nazir Ibn Minar1 and Mohammed Tarique2 1 Department of Electrical and Electronic Engineering, American International University, Bangladesh 2 Department of Electronic and Communication, Ajman University of Science and Technology, United Arab Emirates ABSTRACT Bluetooth technology has become an integral part of this modern society. The availability of mobile phones, game controllers, Personal Digital Assistant (PDA) and personal computers has made Bluetooth a popular technology for short range wireless communication. However, as the Bluetooth technology becomes widespread, vulnerabilities in its security protocols are increasing which can be potentially dangerous to the privacy of a user’s personal information. The security issues of Bluetooth have been an active area of research for the last few years. This paper presents the vulnerabilities in the security protocols of this technology along with some past security threats and possible countermeasures as reported in the literatures which have been surveyed and summarized in this paper. It also presents some tips that end-users can implement immediately to become more cautious about their private information. Finally, the paper concludes with some recommendations for future security enhancements that can be implemented in the Bluetooth standard. KEYWORDS Bluetooth, encryption, security protocols, security threats, countermeasures, Bluetooth enhancements For More Details : http://airccse.org/journal/ijdps/papers/0112ijdps10.pdf Volume Link : http://airccse.org/journal/ijdps/current2012.html
  • 3. REFERENCES [1] “The Bluetooth Blues”, available at http://www.information- age.com/article/2001/may/the_bluetooth_blues [2] Bluetooth SIG, Specification of the Bluetooth System: Volume 2, Profile, Version 1.1, Feb. 22, 2001. available at: https://www.bluetooth.org/About/bluetooth_sig.htm [3] “The History of Bluetooth”, available at: http://www.bluetomorrow.com/about- bluetoothtechnology/history-of-bluetooth/bluetoothhistory.html [4] Monson, Heidi - "Bluetooth Technology and Implications" available at: http://www.sysopt.com/features/ network/article.php/3532506 (1999-12- 14). [5] “How Bluetooth Works", available at: http://en.kioskea.net/contents/bluetooth/bluetooth- fonctionnement.php3. [6] Mohammed Mana, Mohammed Feham, and Boucif Amar Bensaber, “A light weight protocol to provide location privacy in wireless body area networks”, International Journal of Network Security and its Applications (IJNSA), Vol.3, No.2, March 2011 [7] Yasir Arfat Malkani and Lachhman Das Dhomeja, “PSim: A tool for analysis of device pairing methods”, International Journal of Network Security & Its Applications (IJNSA), Vol.1, No.3, October 2009 [8] Kumar, A., et al. Caveat eptor, “A comparative study of secure device pairing methods”, IEEE International Conference on Pervasive Computing and Communications (PerCom-09). 2009. [9] Jochen Schiller, “Mobile Communications”, Second Edition, Addison Wesley Publications, 2003, pp. 290-292 [10] Bluetooth Profiles” Bluetooth Resource Center, Palowireless Pty Ltd. available at: http://www.palowireless.com/ infotooth/tutorial/profiles.asp [11] SaileshRathi, “Bluetooth Protocol Architecture”, Microware Systems Corporation available at: http://www.dedicated-systems.com/Magazine/00q4/2000q4_p028.pdf [12] “Bluetooth Versions”, summary of all the Bluetooth versions released to date, available at: http://www.bluetomorrow.com/about-bluetooth-technology/general- bluetoothinformation/bluetooth- versions.html [13] Bluetooth Version 4.0 Released. Bluetooth SIG, available at: http://www.bluetooth.com/Pages/High- Speed.aspx [14] Keijo Haataja, “Security Threats and Countermeasures in Bluetooth Enabled Systems”, Kuopio University Library, 2009, pp. 55-62 [15] “The BlueBug”, a Bluetooth virus, available at: http://trifinite.org/trifinite_stuff_bluebug.html [16] John Oates, “Virus attacks mobiles via Bluetooth”, available at: http://www.theregister.co.uk/2004/06/15/symbian_virus/ [17] F-Secure Article on Lasco.A Worm, available at: http://www.f-secure.com/v-descs/lasco_a.shtml
  • 4. [18] Ford-Long Wong, Frank Stajano, Jolyon Clulow, “Repairing the Bluetooth pairing protocol”. University of Cambridge Computer Laboratory, available at: http://www.cl.cam.ac.uk/research/dtg/~fw242/publications/2005-WongStaClu-bluetooth.pdf [19] Phone pirates in seek and steal mission", Cambridge Evening News, available at: http://www.cambridge- news.co.uk/news/region_wide/2005 /08/17/ [20] "Going Around with Bluetooth in Full Safety”, available at: http://www.securenetwork.it/ricerca/whitepaper/download/ bluebag_brochure.pdf [21] Yaniv Shaked, Avishai Wool, “Cracking the Bluetooth PIN” School of Electrical Engineering Systems, Tel Aviv University, available at: http://www.eng.tau.ac.il/~yash/shaked-wool-mobisys05/ [22] Keijo Haataja, “Security Threats and Countermeasures in Bluetooth-Enabled Systems”, Kuopio University Library, 2009, pp. 68-80 [23] Colleen Rhodes, “Bluetooth Security”, East Carolina University, pp.6-9 [24] Karen Scarfone and John Padgette, (Bluetooth Threats) “Guide to Bluetooth Security”, Computer Security Division - National Institute of Standards and Technology, US Department of Commerce, 2008, pp. 25-26 [25] Raquel Hill and Billy Falotico, “Bluetooth Wireless Technology Security Threats and Vulnerabilities”, Indiana University Bloomington, 2008, pp. 7-8 [26] Karen Scarfone and John Padgette, (Bluetooth Vulnerabilities) “Guide to Bluetooth Security”, Computer Security Division - National Institute of Standards and Technology, US Department of Commerce, 2008, pp.24-25 AUTHORS Nateq Be-Nazir Ibn Minar is a Research Scientist currently rendering his expertise independently to institutions and manufacturing industries. He obtained his Bachelor of Science degree in Electrical and Electronics Engineering, with a special interest in Robotics and Industrial Automation, from American International University - Bangladesh in 2008 and later obtained his Master of Science degree, in Telecommunication Engineering, focusing on Wireless Networks. His research interests include satellite communications, network security, low-powered wireless devices, industrial automation, robotics and green technology. He is the CEO of EcoWave – a company dedicated to produce green electronic products for the benefit of the environment. He is an active member of IEEE and does volunteer work for several societies. Mohammed Tarique is an Assistant Professor in the Department of Electronic and Communication, Ajman University of Science and Technology, in United Arab Emirates. His research int erests include Adhoc Networks and wireless network security, network testing and simulations. His research primarily focuses on the design of Wireless Adhoc Networks.
  • 5. BREAST CANCER DIAGNOSIS USING MACHINE LEARNING ALGORITHMS –A SURVEY B.M.Gayathri1 ,C.P.Sumathi2 and T.Santhanam3 1 Department of Computer Science, SDNB Vaishnav College for Women, Chennai, India 2 Department of Computer Science, SDNB Vaishnav College for Women, Chennai, India 3 Department of Computer Application, D.G.Vaishnav College for Men, Arumbakkam, Chennai, India ABSTRACT Breast cancer has become a common factor now-a-days. Despite the fact, not all general hospitals have the facilities to diagnose breast cancer through mammograms. Waiting for diagnosing a breast cancer for a long time may increase the possibility of the cancer spreading. Therefore a computerized breast cancer diagnosis has been developed to reduce the time taken to diagnose the breast cancer and reduce the death rate. This paper summarizes the survey on breast cancer diagnosis using various machine learning algorithms and methods, which are used to improve the accuracy of predicting cancer. This survey can also help us to know about number of papers that are implemented to diagnose the breast cancer. KEYWORDS Neural networks, SVM, RVM, ELM For More Details : http://airccse.org/journal/ijdps/papers/4313ijdps09.pdf Volume Link : http://airccse.org/journal/ijdps/current2013.html
  • 6. REFERENCES [1] M.A.H Akhand & M.Murase “Neural network ensemble construction fusing multiple popular Methods.”. International journal of computer science 2004. [2] Tuba kiyan, Tulay Yildirim “Breast cancer diagnosis using statistical neural networks”, Journal of Electrical and Electronic Engineering. [3] P.K.Chenniappan & N.Anusheela “Early detection of cancer cells to lung cancer survival data by Neural network testing” International journal of neural network and application. [4] Chih-Lin Chi, W. Nick Street, and William H. Wolberg ” Application of Artificial Neural networkbased Survival Analysis on Two Breast Cancer Datasets”- AMIA Annu Symp Proc. 2007; 2007: 130–134. [5] Val´erie Bourd`es, St´ephane Bonnevay, Paolo Lisboa, R´emy Defrance, David P´erol, Sylvie Chabaud, Thomas Bachelot, Th´er`ese Gargi,6 and Sylvie N´egrier “Comparison of Artificial Neural Network with Logistic regression as Classification Models for Variable Selection for Prediction of Breast Cancer Patient outcomes” [6] I Guyon, J Weston, S Barnhill “Gene selection for cancer classification using support vector Machines” … - Machine learning, 2002 – Springer [7] MF Akay “Support vector machines combined with feature selection for breast cancer diagnosis”- Expert systems with applications, 2009 – Elsevier. [8] CL Huang, HC Liao “Prediction model building and feature selection with support vector machines in Breast cancer diagnosis “Expert Systems with Applications, 2008 – Elsevier. [9] Ilias Maglogiannis, E Zafiropoulos “An intelligent system for automated breast cancer diagnosis and Prognosis using SVM based classifiers” Applied Intelligence, 2009 – Springer. [10] AM Bagirov, B Ferguson, S Ivkovic “New algorithms for multi-class cancer diagnosis using tumor Gene expression signatures”, 2003 - Oxford Univ Press. [11] RF Chang, WJ Wu, WK Moon, YH Chou “Support vector machines for diagnosis of breast tumors on US images” - Academic radiology, 2003 – Elsevier [12] Y Rejani- “Early detection of breast cancer using SVM”. 2009 –arxiv [13] L Rong ,”Diagnosis of Breast Tumor Using SVM-KNN Classifier” - 2010 - Intelligent Systems (GCIS). [14] T Mu “Detection of breast cancer using v-SVM and RBF network.” - 2005 – C Medical Applications Of Signal. [15] Dr.C.P.Sumathi, Dr.T.Santhanam, A.Punitha “Combination of genetic algorithm and ART neural Network for breast cancer diagnosis”, 2007 -- Asian Journal of information technology, Medwell Journals. [16] F.Paulin, A.Santhakumaran “Classification of Breast cancer by comparing Back propagation training Algorithms”, 2011-International Journal on Computer Science and Engineering (IJCSE) [17] Dr. K. Usha Rani” Parallel Approach for Diagnosis of Breast Cancer using Neural Network Technique” International Journal of Computer Applications, Volume 10– No.3, November 2010. [18] G. Sophia Reena P. Rajeswari -2011 “A Survey of Human Cancer Classification using Micro Array Data”- International Journal of Computer Tech. Appl.,
  • 7. [19] Balaji Krishnapuram, Alexander Hartemink, Lawrence Carin “Applying logistic regression and RVM To achieve accurate probabilistic cancer diagnosis from gene expression profiles” - Citeseerx.ist.psu.edu/viewdoc/summary?Doi=10.1.1.12.5909 [20] A. Bharathi and A.M. Natarajan “Cancer Classification using Support Vector Machines and Relevance Vector Machine based on Analysis of Variance Features”- Journal of Computer Science 7 (9): 1393-1399, 2011. [21] Fatima Eddaoudi , Fakhita Regragui , Abdelhak Mahmoudi , Najib Lamouri “Masses Detection Using SVM Classifier Based on Textures Analysis”- Applied Mathematical Sciences, Vol. 5, 2011, no. 8, 367 – 379. [22] Guoqiang Peter Zhang “Neural Networks for Classification: A Survey” IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART C: APPLICATIONS AND REVIEWS, VOL. 30, NO. 4, NOVEMBER 2000. [23] S. Aruna, Dr .S.P. Rajagopalan “ A Novel SVM based CSSFFS Feature Selection Algorithm for Detecting Breast Cancer” International Journal of Computer Applications (0975 – 8887) Volume 31– No.8, October 2011. [24] Xin Yao, Yong Liu “Neural Networks for Breast Cancer Diagnosis” 01999 IEEE [25] Dimitrios Siganos ”Neural Networks in medicine”, Www.doc.ic.ac.uk/~nd/surprise_96/journal/vol2/ds12/article2.html. [26] David B.Fogel, Eugene C, Wasson, Edward M.Boughton “Evolving neural networks for detecting Breast cancer”. 1995 Elsevier Science Ireland Ltd. [27] Dr.Santhosh baboo, S.Sasikala “A Survey on data mining techniques in gene selection and cancer Classification”-April 2010 International journal of Computer science and information technology. [28] Afzan Adam1 Khairuddin Omar2 “Computerized Breast Cancer Diagnosis with Genetic Algorithms And Neural Network”- fitt.mmu.edu.my/caiic/papers/afzanicaiet.pdf. [29] Zhang Qinli; Wang Shitong; Guo Qi; “A Novel SVM and Its Application to Breast Cancer Diagnosis” http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?Arnumber=4272649.
  • 8. COMPARATIVE ANALYSIS OF RECTANGULAR AND CIRCULAR WAVEGUIDE USING MATLAB SIMULATION AZHAR SHADAB1 , LOKESH KUMAR2 , MOHIT KUMAR3 , KAMAL KISHOR4 , AKASH SETHI5 , ILA SHARMA6 1 Department of Electronics & Communication, Jaypee University, Solan, Himachal Pradesh, India 2 Department of Electronics & Communication, Jaypee University, Solan, Himachal Pradesh, India 3 Department of Computer Science, Jaypee university, Solan, Himachal Pradesh, India 4 Department of Electronics & Communication, Jaypee University, Solan, Himachal Pradesh, India 5 Department of Electronics & Communication, Jaypee University, Solan, Himachal Pradesh, India 6 Department of Electronics & Communication, Jaypee University, Solan, Himachal Pradesh, India ABSTRACT Electromagnetic waves is very strong waves which is used for transmission of signals from one place to other , main concern is medium having some physical structure through which it can propagate their waves. There are so many ways to guide this electromagnetic waves but main consideration in this paper is rectangular waveguide and circular waveguide.This paper analyze the different parameters of both the waveguides like (Cut off frequency, Cut off wavelength,Guide wavelength,Phase velocity, Group velocity, Impedance, power, Attenuation, VSWR) with the help of simulation in Matlab7.14 .Compare the parameters of the two waveguides and on the basis of these parameters result it is easy to get the best guided structure. KEYWORDS: Rectangular waveguide ,Circular waveguide,Waveguide modes, Matlab simulation. For More Details : http://airccse.org/journal/ijdps/papers/0712ijdps05.pdf Volume Link : http://airccse.org/journal/ijdps/current2012.html
  • 9. REFERENCES [1] D.M.Pozar ,2005, “Microwave Engineering” John Wiley and Sons. [2] Karle S. Packard “The Origin of Waveguides: A Case of Multiple Rediscovery” IEEE transactions on Microwave theory and techniques, vol. mtt-32, no.9, september 1984. [3] Perregrini Y. Cassivi and P.Arcioni,2002 “Dispersion Characteristics of Substrate Integrated Rectangular Waveguide” IEEE transaction of Microwave and Wireless components,Vol 12,No.- 9,page no.333-335. [4] A.Munir and Mohammad F.Y.Musthofa,”Rectangular to Circular Waveguide Converter for Microwave Devices Characterization”,International Journal on Electrical Engineering and Informatics,Vol.3,No.3,2011. [5] Vivek Yadav , Udaybin Singh and A.K.Sinha, 2010 “Analysis and Design of Broadband Square to Circular Waveguide Transitions”,International Journal of Microwave and Optical Technology, Vol.5,No.3,May. [6] R.Vacek, Dec 1998,”Electromagnetic Wave Propagation in General Multimode Waveguide Structures Exhibiting Simultaneously Attenuation,Dispersion and Coupling Phenomena”, Journal of Microwave and Optoelectronics,Vol.1,No.3. [7] Amos Gilat, Edition-2004, “MATLAB- An Introduction with Applications”, John Wiley & Sons. [8] Rudra Pratap, 2006 “Getting Started with MATLAB7”. Oxford University Press. [9] Wikipedia. [10 Boremann,Amari and Vahldieck Mar 1999 “Analysis and design of circular ridged waveguide components” ” IEEE transactions on microwave devices,Volume 47,Issue:3,pages :330-335.
  • 10. BIOGRAPHY Azhar Shadab received his B.E degree in Electronics and communication Engineering from NRI-IIST BHOPAL in 2010, and his M Tech degree in Electronics and Communications Engineering from the Jaypee University of Information Technology, Waknaghat, Himachal Pradesh 2012. His research int erests are in the areas of Microwave , VLSI and Signal Processing. Presently he is working on designing of low power fast fourier transform in VLSI. International Journal of Distributed and Parallel Systems (IJDPS) Vol.3, No.4, July 2012 52 Lokesh kumar received the B.E. degree from RITEE,Raipur(C.G).He is currently pursuing MTECH from Jaypee University of Information Technology, solan. Himachal Pradesh.His research interests are in t he VLSI design and circuit. Mohit kumar has done his B.E from D.Y.Patil College of Engineering (Pune university). He is currently persuing M-Tech(2nd yr) from Jaypee University of Information Technology,Solan. Himachal Pr adesh Kamal kishor received his B.E degree in Ele ctronics and communication Engineering from NRI-IIS T BHOPAL, 2010, and pursuing M Tech degree in Electronics an d Communications Engineering from the Jaypee University of Information Technology, Waknaghat, Himachal Pradesh. His research interests are in the areas of Microwave & Antenna. Akash Sethi received his Bachelor of Engineering degree in Electronics and Communications Engineering from G.G.I.T.S. Jabalpur(M.P.) 2009, and M.Tech degree in Electronics and Communications Engineering from the Jaypee University of Information Technology, Waknaghat(H.P.) 2012. His research interests are in the areas of Wireless Communication, Electrical Circuit Analysis and VLSI. Ila Sharma received her B.E degree in Electronics and Telecommunications Engineering fromG.E.C.Raipur, Chhattisgarh 2009, and her M Tech degree in Electronics and Communications Engineering from the Jaypee University of Information Technology, Waknaghat, Himachal Pradesh 2012. Her research interests are in the areas of Wireless Communication, Analog Electronics and Signal Processing.
  • 11. REMOTE PATIENT MONITORING SYSTEM Sherin Sebastian, Neethu Rachel Jacob, Yedu Manmadhan, Anand V. R. , M. J. Jayashree Department of Electronics and Communication Engineering, Mar Baselios College of Engineering & Technology, Nalanchira, Trivandrum, India- 695015 ABSTRACT The Telemedicine system comprises of both hardware and software components at both the patient and doctor ends. A leading field for application of telemedicine is in the field of cardiology where ECG is the major tool for diagnosis. The proposed project in this paper provides an image based techniques to acquire and analyse a constant streaming of ECG signal through digital camera for image capturing, information extraction and analysis performed using MATLAB tools as well as data sending system based on internet network. The method captures the vital signs and parameters from the ICU monitoring machine using a webcam and transmits the image through the internet. This original image is then availed to the consulting doctor via an ANDROID cell phone. In case of anomaly a notification is send to the doctor’s phone. The paper proposes a method to capture, compare and generate alert regarding the patient’s condition using the heart rate and make the captured image be available to the physician. KEYWORDS Telemedicine, ECG, MATLAB, C2DM, Android For More Details : http://airccse.org/journal/ijdps/papers/3512ijdps09.pdf Volume Link : http://airccse.org/journal/ijdps/current2012.html
  • 12. REFERENCES [1] 'International Cardiovascular Disease Statistics, Statistical Fact Sheet-2007 Update', American Heart Association, Dallas, Texas, 2007. [2]Lai Khin Wee, Yeo Kee Jiar, Eko Supriyanto “Electrocardiogram Data Capturing System and Computerized Digitization using Image Processing Techniques” International Journal of Biology and Biomedical Engineering Issue 3, Volume 3, 2009 [3] Khoór S, Nieberl J, Fügedi K, Kail E ‘Internet based, GPRS, longterm ECG monitoring and nonlinear heart-rate analysis for cardiovascular telemedicine management’ Computers in Cardiology 2003;28:209-212. [4] Ljupˇco Hadˇzievski, Boˇsko Bojovic´, Vladan Vukˇcevic´, Petar Beliˇcev, Siniˇsa Pavlovic´, Zorana Vasiljevic´-Pokrajˇcic´, and Miodrag Ostojic´’A Novel Mobile Transtelephonic System With Synthesized 12-Lead ECG’ IEEE Transaction on Information Technology in Biomedicine, Volume 8,2004 [5] Dr.R.Sukanesh, S.Palanivel rajan, S.Vijayprasath, S.Janardhana prabhu and P.Subathra ‘gsm based ecg tele-alert system’, Department of Electronics and Communication Engineering, Dept. of Electron. & Commun. Eng., Thiagarajar Coll. of Eng., Madurai, India Innovative Computing Technologies (ICICT), International Conference 2010 [6]Sukanesh R., Gautham P. ; Arunmozhivarman P.T. ; Rajan S.P. ; Vijayprasath S. ‘Cellular phone based biomedical system for health care’ Dept. of Electron. & Commun. Eng., Thiagarajar coll. of Eng.,Madurai, India Communication Control and Computing Technologies (ICCCCT), IEEE International Conference 2010 [7] 1V.Ramya, 2B.Palaniappan,3Anuradha Kumari ‘Embedded Patient Monitoring System’ International Journal of Embedded Systems and Applications (IJESA) Vol.1, No.2, December 2011 [8] Prof. Dr. Burkhard Stiller ’Mobile Healthcare on Android Devices’ Communication Systems Group, Diploma Thesis, Dept. of Informatics, November 2010 [9] Alma Secerbegovic∗ , Aljo Mujˇci´c∗ , Nermin Suljanovi´c∗ , Midhat Nurkic†, Jurij Tasic ‘The research mHealth platform for ECG monitoring’, ConTel Conference, 2011 [10] Elham Dolatabadi∗ , Serguei Primak ’Ubiquitous WBAN-based Electrocardiogram Monitoring System’ EHealth Networking Applications Conference, 2011
  • 13. EMBEDDED SYSTEM FOR HAZARDOUS GAS DETECTION AND ALERTING V.Ramya1 , B. Palaniappan2 1 Assistant Professor, Department of CSE, Annamalai University, Chidambaram,India. 2 Dean, FEAT, Head, Department of CSE, Annamalai University, Chidambaram, India. ABSTRACT Safety plays a major role in today’s world and it is necessary that good safety systems are to be implemented in places of education and work. This work modifies the existing safety model installed in industries and this system also be used in homes and offices. The main objective of the work is designing microcontroller based toxic gas detecting and alerting system. The hazardous gases like LPG and propane were sensed and displayed each and every second in the LCD display. If these gases exceed the normal level then an alarm is generated immediately and also an alert message (SMS) is sent to the authorized person through the GSM. The advantage of this automated detection and alerting system over the manual method is that it offers quick response time and accurate detection of an emergency and in turn leading faster diffusion of the critical situation. KEYWORDS Air pollution Monitoring, gas sensors, GSM module, wireless networks. For More Details : http://airccse.org/journal/ijdps/papers/0512ijdps24.pdf Volume Link : http://airccse.org/journal/ijdps/current2012.html
  • 14. REFERENCES [1]. R. Al-Ali, Member, IEEE, Imran Zualkernan, and FadiAloul, Senior Member, IEEE, “A Mobile GPRS- sensors array for Air Pollution Monitoring” vol.6, pp.410-422, Oct.2010. [2]. NihalKularatna, Senior Member, IEEE, and B. H. Sudantha, Member, IEEE “An Environment Air Pollution Monitoring System Based on the IEEE1451 Standard for Low Cost Requirements” IEEE Sensors J., Vol. 8, pp.415-422, Apr. 2008. [3]. M. Abu Jayyab, S. Al Ahdab, M. Taji, Z. Al Hamdani, F. Aloul, “Pollumap: Air Pollution mapper for cities”, in Proc. IEEE Innovations in Information Technology Conf., Dubai, UAE, Nov.2006,pp.1-5. [4]. Y. J. Jung, Y. K. Lee, D. G. Lee, K. H. Ryu, and S. Nittel, “Air pollution monitoring system based on geosensor network”, in Proc. IEEE Int. Geoscience Remote Sensing Symp., 2008, vol. 3, pp.1370-1373. [5]. M. Gao, F. Zhang, and J. Tian, “Environmental monitoring system with wireless mesh network based on Embedded System”, in proc. 5th IEEE Int. Symp. Embedded Computing, 2008, pp. 174-179. [6]. J. W. Kwon, Y. M. Park, S. J. Koo, and H. Kim, “Design of Air Pollution Monitoring system Using ZigBee Networks for ubiquitous-city ”, in proceedings of In. Conf. Convergence Information Technology, 2007, pp.1024-1031. [7]. Geng Juntato, Zhou Xiaotao, Zhang Bingjie, “An Atmosphere Environment Monitor System Based on Wireless Sensor Network”, Journal of Xihua University, Natural Science, Vol. 26, no.4, pp. 44-46 ,2007. [8] F. Tsow, E. Forzani, A. Rai, R. Wang, R. Tsui, S. Mastroianni, C. Knobbe, A. J. Gandolf, and N. j.Tao, “A wearable and wireless sensor system for real-time monitoring of toxic environmental volatile organic compounds”, IEEE sensors, J., vol. 9, pp. 1734-1740, Dec.2009. [9] W. Chung and C. H. Yang, “Remote Monitoring System with Wireless Sensor Module for Room Environment”, Sens. Actuators B, vol. 113, no.1, pp. 35-42, 2009. [10] Raj Kamal, “Embedded System Architecture Programming and Design” TATA Mc-Graw Hill. [11] N. Kularantna and B. H. Sudantha, “An environmental air pollution monitoring system based on the IEEE 1451 standard for low cost re-quirements,”IEEE, sensors J., Vol, 8, pp. 415- 422, Apr, 2008. [12]Y. J. Jung, Y. K. Lee, D. G. Lee, k. H. Ryu, and S. Nittel, “Air Pollution monitoring system based on geo sensor network ” in proc. IEEE Int. Geoscience Remote Sensing Symp., 2008, vol, 3, pp.1370-1373.
  • 15. A CATEGORICAL REVIEW OF RECOMMENDER SYSTEMS RVVSV Prasad1 and V Valli Kumari2 1 Department of Computer Science & Engineering, Bhimavaram Institute of Engineering & Technology, Bhimavaram – 534243, India 2 Department. Of Computer Science & Systems Engineering, AU College of Engineering, Andhra University, Vishakapatnam – 533003, ABSTRACT As more and more information became available electronically, the need for effective information retrieval and implementation of filtering tools have became essential for easy access of relevant information. Recommender Systems (RS) are software tools and techniques providing suggestions for items and/or services to be of use to a user. These systems are achieving widespread success in ecommerce applications now a days, with the advent of internet. This paper presents a categorical review of the field of recommender systems and describes the state-of-the-art of the recommendation methods that are usually classified into four categories: Content based Collaborative, Demographic and Hybrid systems. This paper discusses the pro’s and con’s of the current categories as well as the trustworthiness of the recommender system in a new dimension as evaluating the evaluator for more appropriate recommendations. In the domain of recommender system, this work also put forward the use of agents as an enabling technology. KEYWORDS Collaboration, Demography, Information Filtering, Recommender System, Agent, Trust For More Details : http://airccse.org/journal/ijdps/papers/3512ijdps07.pdf Volume Link : http://airccse.org/journal/ijdps/current2012.html
  • 16. REFERENCES [1]. Manisha Hiralall, (2011) Recommender systems for e-shops, Business Mathematics and Informatics paper, Vrije Universiteit, Amsterdam. [2]. Jannach, D. (2006) Finding preferred query relaxations in content-based recommenders. In: 3rd International IEEE Conference on Intelligent Systems, pp. 355–360. [3]. Resnick, P., Varian, H.R., (1997) Recommender systems. Communications of the ACM 40(3), 56–58. [4]. Francesco Ricci, Lior Rokach and Bracha Shapira, (2011) Introduction to Recommender Systems, Handbook, DOI 10.1007/978-0-387-85820-3_1, © Springer Science+Business Media, LLC. [5]. Qing Li and Byeong Man Kim, (2004) Constructing User Profiles for Collaborative Recommender System, APWeb 2004, LNCS 3007, pp. 100-110, 2004, Springer-Verlag Berlin Heidelberg. [6]. Zied Zaier, Robert Goding and Lue Faucher, Evaluating Recommender Systems, International Conference on Automated solutions for Cross Media Content and Multichannel Distribution, IEEE, 2008. [7]. Panagiotis Symeonidis, Alexandros Nanopoulos and Yannis Manolopoulos, (2007) Feature-Weighted User Model for Recommender Systems, LNAI 4511, pp. 97-106, Springer Verlag Berlin Heidelberg. [8]. M. J. Pazzani, (1999) A framework for collaborative, content-based and demographic filtering, Artificial Intelligence Review, 13(5-6):393-408. [9]. Kay, J, (2006) Scrutable adaptation: Because we can and must. In: Adaptive Hypermedia and AdaptiveWeb-Based Systems, 4th International Conference, AH 2006, Dublin, Ireland, June 21-23, 2006, Proceedings, pp. 11–19. [10]. Alfarez Abdul Rahaman and Stephen Hailes, (1997) Using Recommendations for Managing Trust in Distributed Systems, Proceedings of the IEEE International Conference on Communications. [11]. Ido Guy, Naama Zwerdling, David Carmel, Inbal Ronen, Erel Uziel, Sivan Yogev, Shila Ofek-Kolfman, (2009) Personalized Recommendation of Social Software Items Based on Social Relations, , ACM. [12]. Konstantin Pussep, Sebastian Kaune, Jonas Flick, Ralf Steinmetz, (2009) A Peer-to-Peer Recommender System with Privacy Constraints, IEEE. [13]. Olli Niinivaara, (2004) Agent-Based Recommender Systems, Helsinki 17.5.2004, Sofware Agent Technology Course Paper, Department of Computer Science,UNIVERSITY OF HELSINKI. [14]. Yan Zheng Wei, Lue Moreau and Nicholas R.Jennings, (2004) Learning Users’ Interests in a Market- Based Recommendation Systems, IDEAL 2004, LNCS 3177, pp. 833-840, Springer Verlag Berling Heidelberg. [15]. Osmar R. Zaiane, (2002) Building Recommender Agent for e-Learning System, Proceedings in ICCE, IEEE. [16]. Robert H.Guttman, Alexandros G. Moukas and Pattie Maes, (1998) Agent Mediated Electronic Commerce : A Survey, Journal The Knowledge Engineering Review, Volume 13 Issue 2 Pages 147 – 159. [17]. RVVSV Prasad, Vegi Srinivas, V. Valli kumari and KVSVN Raju, “Credibility based reputation calculation in P2P networks”, Springer-Verlag Berlin Heidelberg 2008, ICDCIT 2008, LNCS 5375, pp. 188- 195,2008.
  • 17. AUTHORS RVVSV Prasad received his Masters degree in computer applications from Madurai Kamaraj University and Master of Philosophy in Computer Science from Alagappa University. He is currently doctoral candidate in the Department of Computer Science & Engineering, Acharya Nagarjuna University, Nagarjuna Nagar, Guntur, India. He is working as Associate Professor in the Department of Computer Science & Engineering, Bhimavaram Institute of Engineering and Technology, Pennada, Bhimavaram, India. His research interests include recommender systems, security, privacy and trust in mobile agents and P2P networks. V.Valli Kumari received her B.E. in Electronics and Communication Engineering and M.Tech. and PhD in Computer Science and Engineering all from Andhra University, India and is currently working as Professor in the same department. . She was awarded a gold medal for best research in 2008 in Andhra University. Her areas of research interest include Web, Data Engineering, Network Security, e-commerce and has 70 publications in conferences /journals of international and national repute. She is a member of IEEE, ACM, CRSI and CSI.
  • 18. CLOUD-BASED DEVELOPMENT OF SMART AND CONNECTED DATA IN HEALTHCARE APPLICATION S. Naisha Sultana1 , Gandikota Ramu2 and Prof. B. Eswara Reddy3 1, 2&3 Dept of Computer Science & Engineering, JNTUA College of Engineering, Ananthapuramu, Andhra Pradesh, India ABSTRACT There is a need of data integration in cloud – based system, we propose an Information Integration and Informatics framework for cloud – based healthcare application. The data collected by the Electronic Health Record System need to be smart and connected, so we use informatica for the connection of data from different database. Traditional Electronic Health Record Systems are based on different technologies, languages and Electronic Health Record Standards. Electronic Health Record System stores data based on interaction between patient and provider. There are scalable cloud infrastructures, distributed and heterogeneous healthcare systems and there is a need to develop advanced healthcare application. This advance healthcare application will improve the integration of required data and helps in fast interaction between the patient and the service providers. Thus there is the development of smart and connected data in healthcare application of cloud. The proposed system is developed by using cloud platform Aneka. KEYWORDS Cloud Computing, Data Integration, Informatica, Aneka, Electronic Health Records For More Details : http://airccse.org/journal/ijdps/papers/5614ijdps01.pdf Volume Link : http://airccse.org/journal/ijdps/current2014.html
  • 19. REFERENCES [1] A. Bhaga, V. Madisetti, A Cloud-based Approach for Interoperable Electronic Health Records (EHRs), IEEE Journal of Biomedical and Health Informatics, vol. 17, iss. 5, pp. 894 – 906, 2013. [2] C. Hajat, An Introduction to Epidemiology, Methods Mol Biol. 2011; 713:27-39. [3] VistA Monograph [Online]. Available: www.va.gov/vista. monograph, 2012. [4] OpenEHR. (2012). [Online]. Available: https://www.openehr.org [5] Mirth Connect. (2012). [Online]. Available: http://www.mirthcorp.com/products/mirth-connect [6] Medsphere FM Projection. (2012). [Online]. Available:http://medsphere.org/community/project/fmprojection. [7] A. Bahga and V.K. Madisetti, “Analyzing massive machine maintenance data in a computing cloud,” IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 10, pp. 1831-1843, Oct. 2012. [8] A. Bahga and V.K. Madisetti, “Synthetic workload generation for cloud computing applications,” J.Softw.eng.Appl., vol. 4, no7, pp.396-410, 2011. [9] A. Bahga and V.K. Madisetti, “Performance evaluation approach for multi-tier cloud applications,” J.Sofw.Eng.Appl., vol. 6, no.2, pp.74-83, 2013. [10] A. Bahga and V.K. Madisetti, Rapid Prototyping of Advanced Cloud Based Services and Systems, IEEE Comput., under review, Aug. 2012. [11] N. Radio, Y. Zhang, M. Tatipamula, and V.K. Madisetti, “Next-generation applications on cellular networks: Trends, challenges, and solutions,” Proc. IEEE, vol. 100, no.4, pp. 841-85, Apr. 2012. [12] Aneka[Online]. Available : http://www.manjrasoft.com/ [13] Informatica Powercenter[Online]. Available : http://www.informatica.com/in/ETL/ AUTHORS Ms. S. Naisha Sultana received the B.E Degree in Information Technology from G. Pullaiah College of Engineering and Technology affiliated to JNT University Anantapur, Anantapuramu, India in the year 2012, and pursuing M.Tech Degree in Software Engineering at Computer Science Department of JNT University Anantapur, Anantapuramu. Her research area in M.Tech deals with Cloud Computing. Mr. Gandikota Ramu received B.Tech degree in Information Technology and M.Tech degree in Computer Science from JNT University Anathapur, Anathapuramu, India. He is currently working towards Ph.D Degree at JNT University Anantapur, Ananthapuramu, India. He is working as Assistant Mentor in Master of Science in Information Technology (MSIT) program, JNTUA (in collaboration with Consortium of Institutions Higher Learning and Carnegie Mellon University, USA). Dr. B. Eswara Reddy Graduated in B.Tech. (CSE) from Sri Krishna Devaraya University. He received Masters Degree in M.Tech.(Software Engineering), from JNT University, Hyderabad. He received Ph.D in Computer Science & Engineering from JNT University, Hyderabad. He is working as Professor in CSE Dept. and VicePrincipal at JNTUA College of Engineering, Ananthapuramu. He has more than 50 Publications in various International Journals and Conferences.. He has received UGC Major Research Project (MRP) titled ‘Cloud Computing framework for rural healthcare in Indian Scenario’. His research interests include Pattern Recognition & Image Analysis, Data Mining and Cloud Computing. He is a Fellow of IE (India). He is a life member of ISTE, ISCA and member of CSI and IEEE.
  • 20. A STUDY ON ENERGY EFFICIENT ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORKS Monica R Mundada1 , Savan Kiran1 , Shivanand Khobanna1 , Raja Nahusha Varsha1 and Seira Ann George1 1 Department of Computer Science and Engineering, M S Ramaiah Institute of Technology, Bangalore ABSTRACT A wireless sensor network (WSN) consists of low cost, low power, small in size and multi functional sensor nodes. Routing protocols in WSNs emphasize on data dissemination, limited battery power and bandwidth constraints in order to facilitate efficient working of the network, thereby increasing the lifetime of the network. Routing protocols in WSNs are also application specific which has led to the development of a variety of protocols. Based on the underlying network structure, routing techniques can be classified into three categories: data-centric, hierarchical and location based routing. WSN has a design trade-off between energy and communication overhead which forms the nerve center of the routing techniques. In this paper we present a survey of state-of-the-art routing techniques in WSNs under all the three categories. We epitomize these routing techniques and bring out the advantages and disadvantages followed by their application domain. The paper concludes with issues open for research. KEYWORDS Wireless Sensor Networks, Routing Protocols, Energy Efficient Protocols, Data-Centric protocols, Hierarchical Protocols and Location Based Protocols. For More Details : http://airccse.org/journal/ijdps/papers/0512ijdps26.pdf Volume Link : http://airccse.org/journal/ijdps/current2012.html
  • 21. REFERENCES [1] I. F. Akyildiz et al,( March 2002), “Wireless sensor networks: a survey”, Computer Networks, V Vol. 38, pp. 393-422. [2] K. Sohrabi, et al, (October 2000) "Protocols for self-organization of a wireless sensor network,” I IEEE Personal Communications, Vol. 7, No. 5, pp. 16-27. [3] R. Min, et al., (January 2001), “Low Power Wireless Sensor Networks,” Internation Conference o on VLSI Design, Bangalore, India. [4] J.M. Rabaey, et al., ( July 2000), "PicoRadio supports ad hoc ultra low power wireless e networking," IEEE Computer, Vol. 33, pp. 42-48. [5] R. H. Katz, J. M. Kahn and K. S. J. Pister, ( August 1999), “Mobile Networking for Smart Dust,” 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom’99), Seattle, WA. [6] I.F.Akyildiz,W.Su, Y.Sankarasubramaniam,E.Cayirci, (Dec 2002), “Wireless Sensor Networks:A survey”, Elsevier science B.V. [7] Shio Kumar Singh, M P Singh and D K Singh, (August 2010), “A Survey of Energy-Efficient Hierarchical Cluster-Based Routing in wireless Sensor Network,” Int J. of Advanced Networking and Applications Volume:02, Issue:02, Pages:570-580. [8] W. Heinzelman, A. Chandrakasan and H. Balakrishnan, (Jan 2000), “Energy-Efficient Communication Protocol for Wireless Microsensor Networks,” Proc. 33rd Hawaii Int’l. Conf. Sys. Sci. [9] Zuniga, M. Z.; Krishnamachari, B. (2002), "Integrating Future Large-Scale Wireless Sensor Networks with the Internet," - Department of Electrical Engineering, UNiversity of Southern California. [10] Alonso, J., Dunkels, A., Voigt. T, ( March 2004), “Bounds on the energy consumption of routings in wireless sensor nodes” WiOpt'04: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks,” Cambridge, UK. [11] S. Tilak et al,( June 2002), “A Taxonomy of Wireless Microsensor Network Models,” ACM Mobile Computing and Communications Review (MC2R). [12] W. Heinzelman, J. Kulik, and H. Balakrishnan, (Aug. 1999), “Adaptive Protocols for Information Dissemination in Wireless Sensor Networks,” Proc. 5th ACM/IEEE Mobicom, Seattle, WA, pp. 174–85. [13] J. Kulik, W. R. Heinzelman, and H. Balakrishnan, (2002), “Negotiation-Based Protocols for Disseminating Information in Wireless Sensor Networks,” Wireless Networks, vol. 8, pp. 169–85. [14] C. Intanagonwiwat, R. Govindan and D. Estrin, (August 2000), "Directed diffusion: A scalable and robust communication paradigm for sensor networks", Proceedings of the 6th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom'00), Boston, MA. [15] D. Estrin, et al., (August 1999), “Next century challenges: Scalable Coordination in Sensor Networks,” 5th annual ACM/IEEE international conference on Mobile Computing and Networking (MobiCom’99), Seattle, WA. [16] D. Braginsky and D. Estrin, (October 2002), "Rumor Routing Algorithm for Sensor Networks",
  • 22. Proceedings of the First Workshop on Sensor Networks and Applications (WSNA), Atlanta, GA. [17] GRAdient Broadcast: A Robust, Long-lived Large Sensor Network, http://irl.cs.ucla.edu/papers/grab-techreport.ps [18] N. Sadagopan et al., (May 2003), “The ACQUIRE mechanism for efficient querying in sensor networks,” Proceedings of the First International Workshop on Sensor Network Protocol and Applications, Anchorage, Alaska. [19] Jabed Faruque & Ahmed Helmy, (2004), “RUGGED: Routing on Fringerprint Gradients in Sensor Networks,” Pervasive Services, ICPS, IEEE/ACS International Conference on . [20] D.R. Askeland, (1994), The Science and Engineering of Materials, PWS Publishing Co. [21] J.F. Shackelford, (2000) Intro to Materials Science For Engineers, 5th Ed., Prentice Hall. [22] S.Kim, Sang.H.Son, J.A.Stankovic, S.Li & Y.Choi,(2003), “SAFE: A Data Dissemination Protocol for Periodic Updates in Sensor Networks”, Distributed Computing System Workshop 23rd International Conference. [23] Mesut Gunes, Udo Sorges & Imed Bouazizi, (2002), “ACA: The Ant-Colony Based Routing Algoritm for MANETS”, Proceedings of the International Conference on Parallel Processing Workshops (ICPPW 02), IEEE. [24] Tiago Camilo, Carlos Carreto, Jorge Sa Silva and Fernando Boavida, (2006), “ An EnergyEfficient Ant-Based Routing Algorithm for Wireless Sensor Networks”. [25] Dorigo, M., Stützle, T.,( march 2004), “Ant Colony Optimization”, ISBN 0262042193, MIT Press. [26] W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, (January 2000), “Energy-efficient communication protocol for wireless sensor networks", Proceeding of the Hawaii International Conference System Sciences, Hawaii. [27] W. B. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan, ( Oct. 2002), “An ApplicationSpecific Protocol Architecture for Wireless Microsensor Networks,” IEEE Trans. Wireless Commun., vol. 1, no. 4, pp. 660–70. [28] S. Lindsey and C. S. Raghavendra, (March 2002), "PEGASIS: Power Efficient GAthering in Sensor Information Systems," Proceedings of the IEEE Aerospace Conference, Big Sky, Montana. [29] S. Lindsey, C. S. Raghavendra and K. Sivalingam, (April 2001), "Data Gathering in Sensor Networks using the Energy*Delay Metric", IPDPS Workshop on Issues in Wireless Networks and Mobile Computing, San Francisco, C. [30] A. Manjeshwar and D. P. Agrawal, ( April 2001), “TEEN : A Protocol for Enhanced Efficiency in Wireless Sensor Networks," Proceedings of the 1st International Workshop on Parallel and Distributed Computing Issues in Wireless Networks and Mobile Computing, San Francisco, CA. [31] A. Manjeshwar and D. P. Agrawal, (April 2002),"APTEEN: A Hybrid Protocol for Efficient Routing and Comprehensive Information Retrieval in Wireless Sensor Networks," in the Proceedings of the 2nd International Workshop on Parallel and Distributed Computing Issues in Wireless Networks and Mobile computing, Ft. Lauderdale, FL. [32] M. Younis, M. Youssef and K. Arisha, (October 2002), “Energy-Aware Routing in ClusterBased Sensor Networks”, in the Proceedings of the 10th IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS2002), Fort
  • 23. Worth, TX. [33] Siva D. Muruganathan, Damiel C.F.MA, Rolly I.Bhasin and Abraham O.FAPOJUWO, (March 2005), “ A Centralised Energy-Efficient Routing Protocol for Wireless Sensor Networks,” IEEE Radio Communication. [34] Guanfeng Li, Taieb Znati & Anandha Gopalan, (2004), “ REAP: ring band-based energy adaptive protocol for information dissemination and forwarding in wireless sensor networks,” Int.J.Sensor Network. Vol. X, No. Y, XXXX. [35] Kemal Akkaya and Mohamed Younis, (2005),“A Survey on Routing Protocol for Wireless Sensor Network”, Elsevier Ad Hoc Network Journal, Vol 3/3pp. 325-549. [36] F. Ye et al.,( 2002), “A Two-Tier Data Dissemination Model for Large-Scale Wireless Sensor Networks,” Proc. ACM/IEEE MOBICOM. [37] L. Li, and J. Y. Halpern, (2001), “Minimum-Energy Mobile Wireless Networks Revisited,” IEEE ICC, vol. 1, pp. 278–83. [38] Y. Xu, J. Heidemann, and D. Estrin, (2001), “Geography informed Energy Conservation for Adhoc Routing,” Proc. 7th Annual ACM/IEEE Int’l. Conf. Mobile Comp. and Net., pp. 70–84. [39] B. Karp and H. T. Kung, (August 2000), “GPSR: Greedy perimeter stateless routing for wireless sensor networks,” in the Proceedings of the 6th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom '00), Boston, MA. [40] Y. Yu, D. Estrin, and R. Govindan,( May 2001), “Geographical and Energy-Aware Routing: A Recursive Data Dissemination Protocol for Wireless Sensor Networks,” UCLA Computer Science Department Technical Report, UCLA-CSD TR-01-0023.
  • 24. A NOVEL ANTI PHISHING FRAMEWORK BASED ON VISUAL CRYPTOGRAPHY Divya James1 and Mintu Philip2 1 MTech in Information System Security, Indira Gandhi National Open University, India, 2 Rajagiri School of Engineering and Technology, Kochi, India ABSTRACT Phishing is an attempt by an individual or a group to thieve personal confidential information such as passwords, credit card information etc from unsuspecting victims for identity theft, financial gain and other fraudulent activities. In this paper we have proposed a new approach named as "A Novel Antiphishing framework based on visual cryptography" to solve the problem of phishing. Here an image based authentication using Visual Cryptography (vc) is used. The use of visual cryptography is explored to preserve the privacy of image captcha by decomposing the original image captcha into two shares that are stored in separate database servers such that the original image captcha can be revealed only when both are simultaneously available; the individual sheet images do not reveal the identity of the original image captcha. Once the original image captcha is revealed to the user it can be used as the password. KEYWORDS Phishing, Visual Cryptography, Image Captcha, Shares, Security. For More Details : http://airccse.org/journal/ijdps/papers/0112ijdps17.pdf Volume Link : http://airccse.org/journal/ijdps/current2012.html
  • 25. REFERENCES [1] Thiyagarajan, P.; Venkatesan, V.P.; Aghila, G.; "Anti-Phishing Technique using Automated Challenge Response Method'", in Proceedings of IEEE- International Conference on Communications and Computational Intelligience, 2010. [2] Sun Bin.; Wen Qiaoyan.; Liang Xiaoying.; "A DNS based Anti-Phishing Approach," in Proceedings of IEEE- Second International Conference on Networks Security, Wireless Communications and Trusted Computing, 2010 [3] Nourian, A.; Ishtiaq, S.; Maheswaran, M.;" CASTLE: A social framework for collaborative antiphishing databases", in Proceedings of IEEE- 5th International Conference on Collaborative Computing:Networking, Applications and Worksharing, 2009. [4] Sid Stamm, Zulfikar Ramzan, "Drive-By Pharming", v4861 LNCS,p495-506, 2007, Information and Communications Security - 9th International Conference, ICICS 2007, Proceedings. [5] Anthony Y. Fu, Liu Wenyin, "Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover’s Distance (EMD)",IEEE Transactions on Dependable and Secure Computing, v 3, n 4, p301-311, October/December 2006 [6] Wenyin Liu, Xiaotie Deng, Guanglin Huang, and Anthony Y. Fu, "An Antiphishing Strategy Based on Visual Similarity Assessment", IEEE Internet Computing, v 10, n 2, p 58-65, March/April 2006. [7] JungMin Kang, DoHoon Lee, "Advanced White List Approach for Preventing Access to Phishing Sites", 2007 International Conference onConvergence Information Technology, ICCIT 2007, p 491-496, 2007 [8] Nirmal, K.; Ewards, S.E.V.; Geetha, K.; "Maximizing online security by providing a 3 factor authentication system to counter-attack 'Phishing'", in Proceedings of IEEE- International Conference on Emerging Trends in Robotics and Communication Technologies, 2010. [9] Tianyang Li.; Fuye Han.; Shuai Ding and Zhen Chen.; "LARX: Large-scale Anti-phishing by Retrospective Data-Exploring Based on a Cloud Computing Platform", in Proceedings of IEEE- 20th International Conference on Computer Communications and Networks, 2011. [10] Qingxiang Feng.; Kuo-Kun Tseng.; Jeng-Shyang Pan.; Peng Cheng and Charles Chen.; "New Antiphishing Method with Two Types of Passwords in OpenID System", in Proceedings of IEEE Fifth International Conference on Genetic and Evolutionary Computing,2011 [11] Maher Aburrous .; M. A. Hossain.; Keshav Dahal.; "Modelling Intelligent Phishing Detection System for e-Banking using Fuzzy Data Mining", in Proceedings of IEEE Conference
  • 26. on CyberWorlds,2009. [12]Haijun Zhang , Gang Liu, and Tommy W. S. Chow, “Textual and Visual Content-Based Anti- Phishing:A Bayesian Approach,” IEEE Trans. Neural Netw., vol. 22, no. 10, pp. 1532– 1546, Oct.2011. [13] M. Naor and A. Shamir, “Visual cryptography,” in Proc. EUROCRYPT, 1994, pp. 1–12. [14] B. Borchert, .Segment Based Visual Cryptography,. WSI Press, Germany, 2007. [15] W-Q Yan, D. Jin and M. S. Kanakanahalli, .Visual Cryptography for Print and Scan Applications,.IEEE Transactions, ISCAS-2004, pp. 572-575. [16] T. Monoth and A. P. Babu, .Recursive Visual Cryptography Using Random Basis Column Pixel Expansion,. in Proceedings of IEEEInternational Conference on Information Technology, 2007, pp. 41-43. [17] G. B. Horng, T. G. Chen and D. S. Tsai, .Cheating in Visual Cryptography,. Designs, Codes,Cryptography, vol. 38, no. 2, 2006, pp. 219-236. [18] C. M. Hu and W. G. Tzeng, .Cheating Prevention in Visual Cryptography,. IEEE Transaction on Image Processing, vol. 16, no. 1, Jan-2007,pp. 36-45. [19] A Text-Graphics Character CAPTCHA for Password Authentication Matthew Dailey Chanathip Namprempre.
  • 27. MOBILE-ASSISTED LANGUAGE LEARNING Tayebeh Mosavi Miangah1 and Amin Nezarat2 1 English Language Department, Payame Noor University, Yazd, Iran 2 Information Technology Department, Shiraz University, Shiraz, Iran ABSTRACT The main characteristics of mobile learning (m-learning) are recognized as the potential for learning process to be personalized, spontaneous, informal and ubiquitous. Although learning through mobile phones may take longer time compared to computers, the learners feel a greater sense of freedom of time and place, so that they can take the advantage of spare time to learn a second language when and where they are. Mobile-Assisted Language Learning (MALL) deals with the use of mobile technology in language learning. In contrast to classroom learning, in MALL there is no need for the learners to sit in a classroom or at a computer to get learning materials. In fact, MALL can be considered an ideal solution to language learning barriers in terms of time and place. In this paper by looking at some applications of m-learning as well as some examples across various aspects of it, we observe the advantages and disadvantages derived from using mobile technologies for students as well as professionals. Here, it has been tried to demonstrate the benefits of using mobile phones in learning English as a second language. Areas of mobile-based language learning discussed in this paper are vocabulary, listening, grammar, phonetics, and reading comprehension. KEYWORDS e-learning, mobile-assisted language learning, mobile technology, second language learning, wireless communication For More Details : http://airccse.org/journal/ijdps/papers/0112ijdps26.pdf Volume Link : http://airccse.org/journal/ijdps/current2012.html
  • 28. REFERENCES [1] Chen, N. S. S.-W., Hsieh, & Kinshuk. (2008). “Effects of short-term memory and content representation type on mobile language learning”. Language Learning & Technology, 12(3), pp. 93–113. Retrieved from http://llt.msu.edu/vol12num3/chenetal.pdf [2] Chen, C. M. & S.-H. Hsu. (2008). “Personalized Intelligent Mobile Learning System for Supporting Effective English Learning”. Educational Technology & Society, 11 (3), pp. 153-180. [3] Gay, G.; M. Stefanone, M. Grace-Martin, & H. Hembrooke. (2001) “The effects of wireless computing in collaborative learning environments”. International Journal of Human-Computer Interaction, 13(2), pp. 257-276. [4] Huang, C. and P. Sun. (2010) “Using mobile technologies to support mobile multimedia English listening exercises in daily life”. In: The International Conference on Computer and Network Technologies in Education (CNTE 2010), At: http://cnte2010.cs.nhcue.edu.tw/ [5] Kennedy, C. & M. Levy. (2008). “L’italiano al telefonino: Using SMS to support beginners’ language learning”. ReCALL, 20(3), pp. 315–350. [6] Klopfer, E.; K. Squire, and H. Jenkins. (2002). "Environmental Detectives: PDAs as a window into a virtual simulated world." In: Proceedings of IEEE International Workshop on Wireless and Mobile Technologies in Education. Vaxjo, Sweden: IEEE Computer Society, pp. 95-98 [7] Koole. M. (2009). “A model for framing mobile learning” . In M. Ally (Ed.), Mobile learning: Transforming the delivery of education & training, pp. 25–47. Athabasca: AU Press. [8] Kukulska-Hulme A. and L. Shield. (2008). “An Overview of Mobile Assisted Language Learning: Can Mobile Devices Support Collaborative Practice in Speaking and listening?” http://portal.acm.org/citation.cfm?id=1520087, accessed Jul. 2009. [9] Kukulska-Hulme, A. & J.Traxler. (Eds.). “Mobile learning: A handbook for educators and trainers”. London: Routledge, 2005. [10] Kukulska-Hulme. A. (2009). “Will mobile learning change language learning?” ReCALL 21(2), pp. 157-165. [11] Microsoft research program. (2010). At:http://research.microsoft.com/enus/collaboration/papers/berkeley.pdf, accessed Jul. 2010 [12] Oxford R. and J. Oxford. (2009). “Second Language Teaching and Learning in the Next Generation”, 2009. http://llt.msu.edu/vol14num1/review1.pdf, accessed Jul. 2010. [13] Sharples. M. (2000). “The design of personal mobile technologies for lifelong learning”. Computers & Education, 34(3-4), pp. 177-193. [14] Stockwell. G. (2008). “Investigating learner preparedness for and usage patterns of mobile learning”. ReCALL, 20(3), pp. 253–270.
  • 29. [15] Thornton, P. & C.Houser. (2005). “Using mobile phones in English education in Japan. Journal of Computer Assisted Learning”, 21(3), pp. 217–228. [16] Yang Soon. G. (2005). “Technology for Foreign Language Learning”. http://www.readingmatrix.com/conference/pp/proceedings/gohyingsoon.pdf, accessed Dec 2010. [17] Yamaguchi. T. (2005). “Vocabulary Learning with a Mobile Phone”. http://llt.msu.edu/vol10num1/emerging/default.html, accessed Jul. 2010. [18] Yannick. J. (2007). “M-Learning: A pedagogical and technological model for language learning on mobile phones”. In: Blended Learning, Joseph Fong, Fu Lee Wang (Eds), 2007, pp. 327-339.