This paper is an attempt at the detailed study of Cryptography algorithm. In resource constrained system, Elliptic Curve Cryptography is a promising alternative for public algorithms, because it provides similar level of security with proposed shorter keys than conventional integer based public key algorithm. ECC over binary field is taken up with special interest because the operation in binary filed operation, are thought to be more in space and efficient in time. However, ECC's software implementation, on binary field are slow, Specially on low end processors, which are used in small computing devices such as sensors node, mobile phone, etc. This proposed paper, studied the Cryptography algorithms and software implementation of ECC. Firstly, while implementing ECC with software, for example byte size may affect the choice of algorithm some architectural parameters has been examined. Also, identification of software for low-end processors has been done. In addition, the proposed paper has implemented ECC algorithm in Multiparty Electronic transaction.
{"title":"Secure Multiparty Electronic Payments Using ECC Algorithm: A Comparative Study","authors":"Dr. K. Ravikumar, A. Udhayakumar","doi":"10.1109/WCCCT.2014.31","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.31","url":null,"abstract":"This paper is an attempt at the detailed study of Cryptography algorithm. In resource constrained system, Elliptic Curve Cryptography is a promising alternative for public algorithms, because it provides similar level of security with proposed shorter keys than conventional integer based public key algorithm. ECC over binary field is taken up with special interest because the operation in binary filed operation, are thought to be more in space and efficient in time. However, ECC's software implementation, on binary field are slow, Specially on low end processors, which are used in small computing devices such as sensors node, mobile phone, etc. This proposed paper, studied the Cryptography algorithms and software implementation of ECC. Firstly, while implementing ECC with software, for example byte size may affect the choice of algorithm some architectural parameters has been examined. Also, identification of software for low-end processors has been done. In addition, the proposed paper has implemented ECC algorithm in Multiparty Electronic transaction.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128654746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dr. P. Dinadayalan, S. Jegadeeswari, D. Gnanambigai
Cloud computing is an internet based model that enable convenient, on demand and pay per use access to a pool of shared resources. It is a new technology that satisfies a user's requirement for computing resources like networks, storage, servers, services and applications, Data security is one of the leading concerns and primary challenges for cloud computing. This issue is getting more serious with the development of cloud computing. From the consumers' perspective, cloud computing security concerns, especially data security and privacy protection issues, remain the primary inhibitor for adoption of cloud computing services. This paper analyses the basic problem of cloud computing and describes the data security and privacy protection issues in cloud.
{"title":"Data Security Issues in Cloud Environment and Solutions","authors":"Dr. P. Dinadayalan, S. Jegadeeswari, D. Gnanambigai","doi":"10.1109/WCCCT.2014.63","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.63","url":null,"abstract":"Cloud computing is an internet based model that enable convenient, on demand and pay per use access to a pool of shared resources. It is a new technology that satisfies a user's requirement for computing resources like networks, storage, servers, services and applications, Data security is one of the leading concerns and primary challenges for cloud computing. This issue is getting more serious with the development of cloud computing. From the consumers' perspective, cloud computing security concerns, especially data security and privacy protection issues, remain the primary inhibitor for adoption of cloud computing services. This paper analyses the basic problem of cloud computing and describes the data security and privacy protection issues in cloud.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129266974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Perumal, George Gabriel Richard Roy, Britto Kumar
BI is at a crossroads, its place as an integral part of Data Management is secure, with everyone from the public to the private sector incorporating data into their operational processes. Yet, as the reliance on data increases, the nature of the role that BI will play in future data integration is split into two diametrically opposed possibilities that can substantially alter the form of Data Management. The traditional use of this technology requires formal BI education, a process involving professional certificates and college degrees that aids the growing number of professionals looking to pursue careers as BI analysts. There is also a movement towards the simplification of BI, one of the most distinctly emerging trends related to the data industry, as evinced by the increasing number of business professionals using data to influence their decisions. There is a plethora of evidence to indicate that both of these trends are growing, although conventional wisdom posits that the more popular one will eventually cancel out the other.
{"title":"Security Analysis of Future Enterprise Business Intelligence","authors":"P. Perumal, George Gabriel Richard Roy, Britto Kumar","doi":"10.1109/WCCCT.2014.59","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.59","url":null,"abstract":"BI is at a crossroads, its place as an integral part of Data Management is secure, with everyone from the public to the private sector incorporating data into their operational processes. Yet, as the reliance on data increases, the nature of the role that BI will play in future data integration is split into two diametrically opposed possibilities that can substantially alter the form of Data Management. The traditional use of this technology requires formal BI education, a process involving professional certificates and college degrees that aids the growing number of professionals looking to pursue careers as BI analysts. There is also a movement towards the simplification of BI, one of the most distinctly emerging trends related to the data industry, as evinced by the increasing number of business professionals using data to influence their decisions. There is a plethora of evidence to indicate that both of these trends are growing, although conventional wisdom posits that the more popular one will eventually cancel out the other.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115718087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Image Segmentation is essential and challenging to visualize the tissue of human for analyzing the MR images. In brain MR images, the boundary of tumor tissue is highly irregular. Deformable models and Region based methods are extensively used for medical image segmentation, to locate the boundary of the tumor. Problems associated with non-linear distribution of real data, User interaction and poor convergence to the boundary region limited their usefulness. Clustering of brain tumor images, using Fuzzy C means is robust and effective for tumor localization. Even though the proposed method has high computational complexity, it shows superior results in segmentation efficiency and convergence rate. The Fuzzy C means clustering with the extension of Feature extraction and classification is very promising in the field of brain tumor detection.
{"title":"Performance Analysis of Fuzzy C Means Algorithm in Automated Detection of Brain Tumor","authors":"R. Preetha, G. Suresh","doi":"10.1109/WCCCT.2014.26","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.26","url":null,"abstract":"Image Segmentation is essential and challenging to visualize the tissue of human for analyzing the MR images. In brain MR images, the boundary of tumor tissue is highly irregular. Deformable models and Region based methods are extensively used for medical image segmentation, to locate the boundary of the tumor. Problems associated with non-linear distribution of real data, User interaction and poor convergence to the boundary region limited their usefulness. Clustering of brain tumor images, using Fuzzy C means is robust and effective for tumor localization. Even though the proposed method has high computational complexity, it shows superior results in segmentation efficiency and convergence rate. The Fuzzy C means clustering with the extension of Feature extraction and classification is very promising in the field of brain tumor detection.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116190690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Jordon, Telesphor Lakra, K. J. Priya, T. Rajaretnam
An intuitionistic fuzzy finite automaton with a unique membership transition on an input symbol is considered. It is shown that, if h : Γ* → Σ* is a morphism and h-1(1) = 1, then the image of a recognizable subset of Γ* is a recognizable subset of Σ* and if h is fine, then the inverse image of recognizable subset of Σ* is recognizable. It is also proved that the shuffle product of any two recognizable sets is recognizable.
{"title":"Recognizability of Intuitionistic Fuzzy Finite Automata-Homomorphic Images","authors":"A. Jordon, Telesphor Lakra, K. J. Priya, T. Rajaretnam","doi":"10.1109/WCCCT.2014.56","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.56","url":null,"abstract":"An intuitionistic fuzzy finite automaton with a unique membership transition on an input symbol is considered. It is shown that, if h : Γ* → Σ* is a morphism and h<sup>-1</sup>(1) = 1, then the image of a recognizable subset of Γ* is a recognizable subset of Σ* and if h is fine, then the inverse image of recognizable subset of Σ* is recognizable. It is also proved that the shuffle product of any two recognizable sets is recognizable.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125677272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Plant pest detection is an essential for food security, quality of life and steady agricultural economy. Through rapid infestation by pests and insects various problems faced in enormous agricultural yield for every year. Many researches are being carried out worldwide to identify scientific methodologies for detection of pests. In the recent past, several approaches based on automation and image processing has come to light on the way to address this issue. In this paper we present a clustering technique, the popular algorithm for clustering is kernel-based fuzzy c-means clustering algorithm (KFCM) is used to identify density of pest in plant. A supervised learning neural network was applied to the classification of feature extraction of leaf. The methods studied are for increasing throughput & reducing subjective arising from human experts in detecting the pests in plant.
{"title":"Efficient Kernel-Based Fuzzy C-Means Clustering for Pest Detection and Classification","authors":"N. Vinushree, B. Hemalatha, V. K. Kaliappan","doi":"10.1109/WCCCT.2014.61","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.61","url":null,"abstract":"Plant pest detection is an essential for food security, quality of life and steady agricultural economy. Through rapid infestation by pests and insects various problems faced in enormous agricultural yield for every year. Many researches are being carried out worldwide to identify scientific methodologies for detection of pests. In the recent past, several approaches based on automation and image processing has come to light on the way to address this issue. In this paper we present a clustering technique, the popular algorithm for clustering is kernel-based fuzzy c-means clustering algorithm (KFCM) is used to identify density of pest in plant. A supervised learning neural network was applied to the classification of feature extraction of leaf. The methods studied are for increasing throughput & reducing subjective arising from human experts in detecting the pests in plant.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127302039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Routing is a challenging issue in MANET due to node mobility, unstable links and limited resources. Swarm Intelligence (SI), as demonstrated by social behavior of ant based on self organization, which allows exploiting to coordinate population of artificial ants the collaborative to solve computational problems. However already existing SI based routing protocols find a optimal path by considering one or two route selection metrics, such as time delay or node count. Conventional routing algorithm found to be unsuitable for routing multimedia traffic or real time applications which requires optimization of several qualities of service parameters. They are not considering correlations among multiple route selection parameters. In the proposal a approach called fuzzy ant colony based routing protocol using fuzzy logic and SI of different objectives while retaining the merits of swarm based intelligence algorithm. Simulation results show that great improvement for existing SI based routing protocols for routing in MANET.
{"title":"Fuzzy Cost Based Multipath Routing Protocol for MANETS","authors":"K. Thangadurai, C. V. Anchugam","doi":"10.1109/WCCCT.2014.10","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.10","url":null,"abstract":"Routing is a challenging issue in MANET due to node mobility, unstable links and limited resources. Swarm Intelligence (SI), as demonstrated by social behavior of ant based on self organization, which allows exploiting to coordinate population of artificial ants the collaborative to solve computational problems. However already existing SI based routing protocols find a optimal path by considering one or two route selection metrics, such as time delay or node count. Conventional routing algorithm found to be unsuitable for routing multimedia traffic or real time applications which requires optimization of several qualities of service parameters. They are not considering correlations among multiple route selection parameters. In the proposal a approach called fuzzy ant colony based routing protocol using fuzzy logic and SI of different objectives while retaining the merits of swarm based intelligence algorithm. Simulation results show that great improvement for existing SI based routing protocols for routing in MANET.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130360415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Traditionally, thumb print and iris pattern are used for person identification as biometric features. The recent use of biometric evolution for person identification is ear. In this paper PURS using UDPM (Person Unique Recognition System using Universality, Distinctiveness, Permanence, and Measurability), processes biometric characteristic, human ear, to uniquely recognize a person with the help of the ear features. Ear image is captured digitally and is processed to extract ear features (Helix rim, Lobule, Triangular fossa, Conch a, Tragus, Cannal Intertraguiano, Crus of Helix, Antihelix, and Antritragus) and stored in database for matching process. [12]. Matching process uses projection lines to quantify ear features and provides corresponding profile as a end result of system in graphical format as well as textual format with tolerance boundary. A system is presented here for person recognition using ear features.
{"title":"Ear as a Raised area for Hottest Biometric Solution Using Universality, Distinctiveness, Permanence and Measurability Properties -- PURS Using UDPM","authors":"G. S. Kamatchi, G Gnanajeyaraman Rajaram","doi":"10.1109/WCCCT.2014.57","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.57","url":null,"abstract":"Traditionally, thumb print and iris pattern are used for person identification as biometric features. The recent use of biometric evolution for person identification is ear. In this paper PURS using UDPM (Person Unique Recognition System using Universality, Distinctiveness, Permanence, and Measurability), processes biometric characteristic, human ear, to uniquely recognize a person with the help of the ear features. Ear image is captured digitally and is processed to extract ear features (Helix rim, Lobule, Triangular fossa, Conch a, Tragus, Cannal Intertraguiano, Crus of Helix, Antihelix, and Antritragus) and stored in database for matching process. [12]. Matching process uses projection lines to quantify ear features and provides corresponding profile as a end result of system in graphical format as well as textual format with tolerance boundary. A system is presented here for person recognition using ear features.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134178881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A framework for detecting and recording the flaws that happen during the usage of web applications is designed and a library functionality to perform this is discussed in this paper. The recorded information can be stored at different levels of detail, commonly called the logging levels. For some modules more than others, it may be required to store more detailed information about any error that arises during its usage according to its importance. A Web Application also needs to print the stack trace containing the error information on the web page when an error occurs for the user to understand the nature of the error. When dealing with legacy web applications, it is difficult to insert code. The proposed and designed framework is tested with a web application called Kic Kart.
{"title":"Developing an Error Logging Framework for Ruby on Rails Application Using AOP","authors":"M. Gomathy, V. Devi, D. Meenakshi","doi":"10.1109/WCCCT.2014.19","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.19","url":null,"abstract":"A framework for detecting and recording the flaws that happen during the usage of web applications is designed and a library functionality to perform this is discussed in this paper. The recorded information can be stored at different levels of detail, commonly called the logging levels. For some modules more than others, it may be required to store more detailed information about any error that arises during its usage according to its importance. A Web Application also needs to print the stack trace containing the error information on the web page when an error occurs for the user to understand the nature of the error. When dealing with legacy web applications, it is difficult to insert code. The proposed and designed framework is tested with a web application called Kic Kart.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116311826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ad-Hoc network is the ultimate solution for mobile (movable) user's network. Now a day the huge growth of mobile users in network, so such infrastructure less (MANET) network are needed. Mobile Ad-Hoc Network (MANET) is a collection of mobile device, multi hop and self configured network. In this infrastructure less (MANET) network the routing is a challenging work, because there is no fixed device, all are movable and each device act as a node as well as a router. The mobile Ad-Hoc network has more routing protocols to address the packet. According to the previous survey, we found the Ad-Hoc On demand Distance Vector Protocol (AODV) is the best choice for different types of infrastructure less network. This work proposed to find merits and demerits of the AODV protocol using OMNET++ simulator.
{"title":"Analysis of Reactive AODV Routing Protocol for MANET","authors":"Mr B Karthikeyan, Mrs N Kanimozhi, Ganesh","doi":"10.1109/WCCCT.2014.70","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.70","url":null,"abstract":"Ad-Hoc network is the ultimate solution for mobile (movable) user's network. Now a day the huge growth of mobile users in network, so such infrastructure less (MANET) network are needed. Mobile Ad-Hoc Network (MANET) is a collection of mobile device, multi hop and self configured network. In this infrastructure less (MANET) network the routing is a challenging work, because there is no fixed device, all are movable and each device act as a node as well as a router. The mobile Ad-Hoc network has more routing protocols to address the packet. According to the previous survey, we found the Ad-Hoc On demand Distance Vector Protocol (AODV) is the best choice for different types of infrastructure less network. This work proposed to find merits and demerits of the AODV protocol using OMNET++ simulator.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133886002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}