Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409079
N. Dey, P. Das, A. B. Roy, A. Das, S. S. Chaudhuri
Intravascular ultrasound (IVUS) is a medical imaging system, which uses a specially designed catheter equipped with a small ultrasound probing device at its distal end. This system allows the ultrasound signal to visualize the blood vessels from the inside and is capable of imaging the diseased vessels, measuring the dimension and composition of the plaque. IVUS is an efficient method for detecting various ischemie heart diseases. Presently considerable amount of work has been done in telemonitoring which involves the transmission of biomedicai signals through wireless media. Exchange of biomedicai signals amongst hospitals needs efficient and reliable transmission. Watermark is added "ownership" information in multimedia contents to prove authenticity, verify signal integrity, and achieve control over copy process. This paper proposes a novel session based blind watermarking method with secret key by embedding binary watermark images into IVUS video. The IVUS video is a sensitive diagnostic tool that is used to detect various cardio-vascular diseases by measuring and recording the anatomy of the heart and adjoined blood vessels in exquisite detail. The various anatomical minutiae of the heart and blood vessels are important characteristics which correspond to many severe human cardiac diseases. In this present work the entire video of IVUS is split into frames and application of Discrete Wavelet Transformation (DWT), Discrete Cosine Transformation (DCT) followed by Singular Value Decomposition (SVD) composes the watermark embedding technique. Watermark extraction is achieved by applying inverse DWT, inverse DCT and SVD. In this approach the generated peak signal to noise ratio (PSNR) of the original IVUS video signal vs. watermarked signal and the correlation value of the original watermark image and the extracted watermark image have a high acceptable level of imperceptibility and distortion.
{"title":"DWT-DCT-SVD based intravascular ultrasound video watermarking","authors":"N. Dey, P. Das, A. B. Roy, A. Das, S. S. Chaudhuri","doi":"10.1109/WICT.2012.6409079","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409079","url":null,"abstract":"Intravascular ultrasound (IVUS) is a medical imaging system, which uses a specially designed catheter equipped with a small ultrasound probing device at its distal end. This system allows the ultrasound signal to visualize the blood vessels from the inside and is capable of imaging the diseased vessels, measuring the dimension and composition of the plaque. IVUS is an efficient method for detecting various ischemie heart diseases. Presently considerable amount of work has been done in telemonitoring which involves the transmission of biomedicai signals through wireless media. Exchange of biomedicai signals amongst hospitals needs efficient and reliable transmission. Watermark is added \"ownership\" information in multimedia contents to prove authenticity, verify signal integrity, and achieve control over copy process. This paper proposes a novel session based blind watermarking method with secret key by embedding binary watermark images into IVUS video. The IVUS video is a sensitive diagnostic tool that is used to detect various cardio-vascular diseases by measuring and recording the anatomy of the heart and adjoined blood vessels in exquisite detail. The various anatomical minutiae of the heart and blood vessels are important characteristics which correspond to many severe human cardiac diseases. In this present work the entire video of IVUS is split into frames and application of Discrete Wavelet Transformation (DWT), Discrete Cosine Transformation (DCT) followed by Singular Value Decomposition (SVD) composes the watermark embedding technique. Watermark extraction is achieved by applying inverse DWT, inverse DCT and SVD. In this approach the generated peak signal to noise ratio (PSNR) of the original IVUS video signal vs. watermarked signal and the correlation value of the original watermark image and the extracted watermark image have a high acceptable level of imperceptibility and distortion.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128689552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409170
P. R. Kumar, S. S. Dhenakaran, K. Sailaja, P. Saikishore
Encryption is an art of protecting data that win wars, protect properties and personal information if performed properly. It ensures that the appropriate data is exchanged between the intended persons only; even if the eavesdroppers get the content of the data they should not be able to understand it. Chakra Algorithm is a symmetric key encryption technique. It is a process of encrypting the data with the concepts of Cartesian Co-ordinate Geometry andcircle generation. The process considers the translation and rotation of axis when the data is grouped into circles each circle holds the portion of data. The Cartesian axis will be migrated to the respective centerscircles and rotated by certain angle. The collection of angle with which each individual circle is rotated; the co-ordinates to which it is swapped, the size of the square grid the radius of the circle hold the symmetric key. Unlike the other current algorithms, in Chakra Algorithm we will not directly change the data instead location of data.
{"title":"Chakra: A new approach for symmetric key encryption","authors":"P. R. Kumar, S. S. Dhenakaran, K. Sailaja, P. Saikishore","doi":"10.1109/WICT.2012.6409170","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409170","url":null,"abstract":"Encryption is an art of protecting data that win wars, protect properties and personal information if performed properly. It ensures that the appropriate data is exchanged between the intended persons only; even if the eavesdroppers get the content of the data they should not be able to understand it. Chakra Algorithm is a symmetric key encryption technique. It is a process of encrypting the data with the concepts of Cartesian Co-ordinate Geometry andcircle generation. The process considers the translation and rotation of axis when the data is grouped into circles each circle holds the portion of data. The Cartesian axis will be migrated to the respective centerscircles and rotated by certain angle. The collection of angle with which each individual circle is rotated; the co-ordinates to which it is swapped, the size of the square grid the radius of the circle hold the symmetric key. Unlike the other current algorithms, in Chakra Algorithm we will not directly change the data instead location of data.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129799831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409062
M. Bokhari, F. Masoodi
This paper presents BOKHARI; a new proposed software-oriented stream cipher constructed using a Non-linear feedback shift register and a Non linear filter function and is designed for a secret key that is up to 128 bits in length. The BOKHARI stream cipher uses both basic design principles from the stream cipher SOBER-Ü6 and transformations derived from the steam cipher DRAGON.
{"title":"BOKHARI: A new software oriented stream cipher: A proposal","authors":"M. Bokhari, F. Masoodi","doi":"10.1109/WICT.2012.6409062","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409062","url":null,"abstract":"This paper presents BOKHARI; a new proposed software-oriented stream cipher constructed using a Non-linear feedback shift register and a Non linear filter function and is designed for a secret key that is up to 128 bits in length. The BOKHARI stream cipher uses both basic design principles from the stream cipher SOBER-Ü6 and transformations derived from the steam cipher DRAGON.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130681809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409241
Tao Sun, Weiheng Chen, Yang Liu, Hongfeng Sun
Anomaly detection is always a challenge for wireless sensor network (WSN). In some applications, researchers compare the number of abnormal nodes with the pre-provided threshold to detect the anomaly. But, it involves the whole abnormal nodes in WSN and consumes lots of resources. In this paper, we proposed a probability-based algorithm for anomaly detection which reduces involved nodes and consumes fewer resources. The experimental results demonstrate that, the algorithm can satisfies demand of query and is effective to reduce the cost of communication band and power energy by choosing appropriate parameters.
{"title":"A probability-based approximate algorithm for anomaly detection in WSN","authors":"Tao Sun, Weiheng Chen, Yang Liu, Hongfeng Sun","doi":"10.1109/WICT.2012.6409241","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409241","url":null,"abstract":"Anomaly detection is always a challenge for wireless sensor network (WSN). In some applications, researchers compare the number of abnormal nodes with the pre-provided threshold to detect the anomaly. But, it involves the whole abnormal nodes in WSN and consumes lots of resources. In this paper, we proposed a probability-based algorithm for anomaly detection which reduces involved nodes and consumes fewer resources. The experimental results demonstrate that, the algorithm can satisfies demand of query and is effective to reduce the cost of communication band and power energy by choosing appropriate parameters.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131010207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409182
Mohamed Sami, Nashwa El-Bendary, A. Hassanien
This paper presents an automatic image annotation approach that integrates the Naive Bayes classifier with particle swarm optimization algorithm for classes' probabilities weighting. The proposed hybrid approach refines the output of multi-class classification that is based on the usage of Naive Bayes classifier for automatically labeling images with a number of words. Each input image is segmented using the normalized cuts segmentation algorithm in order to create a descriptor for each segment. One Naive Bayes classifier is trained for all the classes. Particle swarm optimization algorithm is employed as a search strategy in order to identify an optimal weighting for classes probabilities from Naive Bayes classifier. The proposed approach has been applied on Corel5K benchmark dataset. Experimental results and comparative performance evaluation, for results obtained from the proposed approach and other related researches, demonstrate that the proposed approach outperforms the performance of the other approaches, considering annotation accuracy, for the experimented dataset.
{"title":"Automatic image annotation via incorporating Naive Bayes with particle swarm optimization","authors":"Mohamed Sami, Nashwa El-Bendary, A. Hassanien","doi":"10.1109/WICT.2012.6409182","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409182","url":null,"abstract":"This paper presents an automatic image annotation approach that integrates the Naive Bayes classifier with particle swarm optimization algorithm for classes' probabilities weighting. The proposed hybrid approach refines the output of multi-class classification that is based on the usage of Naive Bayes classifier for automatically labeling images with a number of words. Each input image is segmented using the normalized cuts segmentation algorithm in order to create a descriptor for each segment. One Naive Bayes classifier is trained for all the classes. Particle swarm optimization algorithm is employed as a search strategy in order to identify an optimal weighting for classes probabilities from Naive Bayes classifier. The proposed approach has been applied on Corel5K benchmark dataset. Experimental results and comparative performance evaluation, for results obtained from the proposed approach and other related researches, demonstrate that the proposed approach outperforms the performance of the other approaches, considering annotation accuracy, for the experimented dataset.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130422432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409205
D. Vir, S. Agarwal, S. A. Imam
Mobile Ad hoc Network (MANET) is the collection of the mobile nodes without the aid of fixed infrastructure. The communication in MANET is therefore completely dependent on the nodes of the network. For the efficient working of the network various routing protocols have been developed. These protocols improve the efficiency of MANET by providing the path between distant nodes through multi-hop links. The performance of the protocols is affected by the various factors. One such factor is the mobility of the nodes. This paper provides the comparative analysis of various routing protocols used in day to day scenario under the effect of various mobility models: viz File, Group and Random Way Point Mobility Model. The results show significant impact of mobility models on performance of routing protocols.
{"title":"Quantitative analyses and evaluation of MANET routing protocols in effect of varying mobility model using Qual-Net simulator","authors":"D. Vir, S. Agarwal, S. A. Imam","doi":"10.1109/WICT.2012.6409205","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409205","url":null,"abstract":"Mobile Ad hoc Network (MANET) is the collection of the mobile nodes without the aid of fixed infrastructure. The communication in MANET is therefore completely dependent on the nodes of the network. For the efficient working of the network various routing protocols have been developed. These protocols improve the efficiency of MANET by providing the path between distant nodes through multi-hop links. The performance of the protocols is affected by the various factors. One such factor is the mobility of the nodes. This paper provides the comparative analysis of various routing protocols used in day to day scenario under the effect of various mobility models: viz File, Group and Random Way Point Mobility Model. The results show significant impact of mobility models on performance of routing protocols.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126830734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409248
Xiaoqing Weng, Shimin Qin
Multivariate time series (MTS) are used in very broad areas such as finance, medicine, multimedia and speech recognition. Most of existing approaches for MTS classification are not designed for preserving the within-class local structure of the MTS dataset. The within-class local structure is important when a classifier is used for classification. In this paper, a new feature extraction method for MTS classification based on supervised locally linear embedding (LLE) and generalized regression network is proposed. MTS samples in training dataset are projected into a low dimensional space by using the supervised LLE, its mapping function can be learned by generalized regression network. Experimental results performed on six real-world datasets demonstrate the effectiveness of our proposed approach for MTS classification.
{"title":"Classification of multivariate time series using supervised locally linear embedding","authors":"Xiaoqing Weng, Shimin Qin","doi":"10.1109/WICT.2012.6409248","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409248","url":null,"abstract":"Multivariate time series (MTS) are used in very broad areas such as finance, medicine, multimedia and speech recognition. Most of existing approaches for MTS classification are not designed for preserving the within-class local structure of the MTS dataset. The within-class local structure is important when a classifier is used for classification. In this paper, a new feature extraction method for MTS classification based on supervised locally linear embedding (LLE) and generalized regression network is proposed. MTS samples in training dataset are projected into a low dimensional space by using the supervised LLE, its mapping function can be learned by generalized regression network. Experimental results performed on six real-world datasets demonstrate the effectiveness of our proposed approach for MTS classification.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115941711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409228
Xingxing Huo, Jiangqiang Hu, Zeyu Li
A new kind of algorithm of controller for ship is proposed. BP neural network based PID control is one of artificial neural networks which can emulate ship's manual steering as autopilot for ship steering. This paper introduces the principle, characteristics and learning algorithm of the BP neural network. Getting BP neural network based PID control for ship steering by combining BP neural network and traditional PID. Making use of MATLAB, simulate this new kind of controller for ship in consideration of disturbances of wind, wave and current and without them respectively. The simulation shows that the BP neural network based PID control for ship steering can improve the robustness of the system and has better adapt ability to the ship model etc.
{"title":"BP neural network based PID control for ship steering","authors":"Xingxing Huo, Jiangqiang Hu, Zeyu Li","doi":"10.1109/WICT.2012.6409228","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409228","url":null,"abstract":"A new kind of algorithm of controller for ship is proposed. BP neural network based PID control is one of artificial neural networks which can emulate ship's manual steering as autopilot for ship steering. This paper introduces the principle, characteristics and learning algorithm of the BP neural network. Getting BP neural network based PID control for ship steering by combining BP neural network and traditional PID. Making use of MATLAB, simulate this new kind of controller for ship in consideration of disturbances of wind, wave and current and without them respectively. The simulation shows that the BP neural network based PID control for ship steering can improve the robustness of the system and has better adapt ability to the ship model etc.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122681942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409165
Md. Iqbal Quraishi, J. P. Choudhury, M. De, G. Das, A. Bhattacharjee
Our paper is based on the glimpse of comparative analysis of Image Enhancement techniques via different soft computing techniques, i.e Differential Evolution, Harmony Search, Bacterial Foraging Optimization and a hybrid Particle Swarm Adapted Bacterial Forgaing Optimization algorithm. Particle Swarm Adapted Bacterial Foraging (PS-BFO) is a new algorithm that has shown superior results in proportional integral derivative controller tuning application. In order to examine the global search capability of PS-BFO, we evaluate the performance of BFOA and PS-BFO on 23 numerical benchmark functions. In PS-BFO, the search directions of tumble behavior for each bacterium are oriented by the individual's best location and the global best location. The experimental results show that PS-BFO performs much better than BFOA for almost all test functions. That's approved that the PSO oriented BFO by strategy improve its global optimization capability. Results are compared with other recognition techniques like Differential Evolution, Harmony Search algorithm based image enhancement.
{"title":"A comparative study for Image Enhancement using soft computing models","authors":"Md. Iqbal Quraishi, J. P. Choudhury, M. De, G. Das, A. Bhattacharjee","doi":"10.1109/WICT.2012.6409165","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409165","url":null,"abstract":"Our paper is based on the glimpse of comparative analysis of Image Enhancement techniques via different soft computing techniques, i.e Differential Evolution, Harmony Search, Bacterial Foraging Optimization and a hybrid Particle Swarm Adapted Bacterial Forgaing Optimization algorithm. Particle Swarm Adapted Bacterial Foraging (PS-BFO) is a new algorithm that has shown superior results in proportional integral derivative controller tuning application. In order to examine the global search capability of PS-BFO, we evaluate the performance of BFOA and PS-BFO on 23 numerical benchmark functions. In PS-BFO, the search directions of tumble behavior for each bacterium are oriented by the individual's best location and the global best location. The experimental results show that PS-BFO performs much better than BFOA for almost all test functions. That's approved that the PSO oriented BFO by strategy improve its global optimization capability. Results are compared with other recognition techniques like Differential Evolution, Harmony Search algorithm based image enhancement.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122731032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409078
Rishabh Dev Chandna, P. Chaubey, S. C. Gupta
Robots.txt non cooperating web crawlers are unwanted by any website as they can create serious negative impact in terms of denial of service, privacy and cost. Defense mechanisms such as automated content access protocol, captcha, web crawler trap, real time bot detection etc. have been proposed to protect websites from unwanted crawler access. Although, the extent of these mechanisms being practically applied against such crawlers is not known clearly. In this paper we present an investigation carried out to get insights about defense mechanisms used by websites against robots.txt non cooperating web crawlers. This investigation is limited only to search engine class of websites. MBot, a self-developed non cooperating web crawler is the primary tool used for investigation. On investigation we find that search engine websites do have defense mechanisms to prevent non cooperating crawler access on them. Although, absence of any kind of defense phenomena to prevent MBot's access is also observed on some of the investigated websites. Robustness in observed defense mechanisms to basic network and application parameters like proxy, port number, user agent, IP address etc. is also observed.
{"title":"Defense response of search engine websites to non cooperating crawlers","authors":"Rishabh Dev Chandna, P. Chaubey, S. C. Gupta","doi":"10.1109/WICT.2012.6409078","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409078","url":null,"abstract":"Robots.txt non cooperating web crawlers are unwanted by any website as they can create serious negative impact in terms of denial of service, privacy and cost. Defense mechanisms such as automated content access protocol, captcha, web crawler trap, real time bot detection etc. have been proposed to protect websites from unwanted crawler access. Although, the extent of these mechanisms being practically applied against such crawlers is not known clearly. In this paper we present an investigation carried out to get insights about defense mechanisms used by websites against robots.txt non cooperating web crawlers. This investigation is limited only to search engine class of websites. MBot, a self-developed non cooperating web crawler is the primary tool used for investigation. On investigation we find that search engine websites do have defense mechanisms to prevent non cooperating crawler access on them. Although, absence of any kind of defense phenomena to prevent MBot's access is also observed on some of the investigated websites. Robustness in observed defense mechanisms to basic network and application parameters like proxy, port number, user agent, IP address etc. is also observed.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134473469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}