Title |
Ä’VOLVERE: A TOOL FOR USABILITY EVALUATION |
| Adv Comput Res Vol:7 Iss:1 (2015-01-23) : 157-158 |
Authors |
M. RATHI, P. PANDEY, J. KAUR, N. DONGARIYA, M. INGLE |
Published on |
23 Jan 2015 Pages : 157-158 Article Id : BIA0002366 Views : 922 Downloads : 998 |
|
Abstract |
Full Text |
PDF | XML |
PubMed XML |
CNKI |
Cited By |
Open Access | Research Article
Software usability is the degree to which the software is easy to use. Usability evaluation is the way to determine existence of usability within a system. There exist several usability evaluation methods based on user performance and user satisfaction. In this paper, we present an algorithmic tool known as Ä’volvere to determine the usability of any existing software systems/ websites in offline mode at a particular stage. We have experimented Ä’volvere tool taking into concern ten attributes of usability on four websites. We present the corresponding usability evaluation and analysis in terms of case studies. We conclude with results and discussion.
|
|
Title |
CYBER SECURITY CHALLENGES IN HIGHER EDUCATION SYSTEM OF J & K WITH SPECIAL REFERENCE TO ISLAMIC UNIVERSITY OF SCIENCE & TECHNOLOGY AWANTIPORA, PULWAMA, J&K, INDIA |
| Adv Comput Res Vol:7 Iss:1 (2015-01-23) : 159-163 |
Authors |
W.M. DAR |
Published on |
23 Jan 2015 Pages : 159-163 Article Id : BIA0002367 Views : 915 Downloads : 1005 |
|
Abstract |
Full Text |
PDF | XML |
PubMed XML |
CNKI |
Cited By |
Open Access | Research Article
Universities face a variety of cyber security threats. These include disruption to the functioning of a university network, through to more general and targeted attempts to obtain valuable information from networks and their users. Universities also face a growing challenge from advanced, persistent and targeted threats that reflect the sector’s important contribution to innovation and economic development. Some of the major causes of the following computing agents and their adverse effects have been taken as a research study here at Islamic University of Science & Technology Awantipora Pulwama, One of the Technical University of Jammu and Kashmir State. During the study various unwanted agents that regularly pose threat to the valuable assets including important information content with reference to the universities sustainable policies and programs are being analyzed and a comprehensive framework is being developed to overcome the immediate uncertainty in terms of security challenges faced by the organisations.
|
|
Title |
IRIS RECOGNITION FOR PERSON IDENTIFICATION USING NEURAL NETWORK APPROACH |
| Adv Comput Res Vol:7 Iss:1 (2015-01-23) : 164-166 |
Authors |
A.M.N. SIDDIQUI, R. TELGAD, P.D. DESHMUKH |
Published on |
23 Jan 2015 Pages : 164-166 Article Id : BIA0002368 Views : 935 Downloads : 862 |
|
Abstract |
Full Text |
PDF | XML |
PubMed XML |
CNKI |
Cited By |
Open Access | Research Article
A biometric system provides automatic identification of an individual based on a unique feature or characteristic possessed by the individual. Iris recognition is regarded as the most reliable and accurate biometric identification system available. The system activate through artificial neural network. In this paper which approach has been used neural network is implemented through mat lab. The result obtained shows that the proposed approach somewhat improves the performance compared to the previous approaches.
|
|
Title |
OPEN SOURCE DATABASES IN VIRTUALIZED ENVIRONMENT |
| Adv Comput Res Vol:7 Iss:1 (2015-01-23) : 167-169 |
Authors |
R. BELE, C.G. DESAI |
Published on |
23 Jan 2015 Pages : 167-169 Article Id : BIA0002369 Views : 925 Downloads : 994 |
|
Abstract |
Full Text |
PDF | XML |
PubMed XML |
CNKI |
Cited By |
Open Access | Research Article
Virtualization technology plays major role in cloud computing. Today variety of technologies are used in cloud computing and virtualization, if we see performances it shows different results in different virtualized environment. In this paper we have attempted an experiment where open source virtualization technology Xen is used with open source database application like PostgreSQL on linux platforms.
Performance of System is measured with standard linux tools like mpstat, iostat, sar, strace. Performance of system is measured with respect to the parameters like CPU, I/O and SYSTEM utilization. Performance based on these parameters is compared between non-virtualized and virtualized environments.
|
|
Title |
ACCENT IDENTIFICATION USING MFCC FOR HINDI LANGUAGE |
| Adv Comput Res Vol:7 Iss:1 (2015-01-23) : 170-172 |
Authors |
K. WAGHMARE, R. CHAUDHARI, B. GAWALI |
Published on |
23 Jan 2015 Pages : 170-172 Article Id : BIA0002370 Views : 922 Downloads : 956 |
|
Abstract |
Full Text |
PDF | XML |
PubMed XML |
CNKI |
Cited By |
Open Access | Research Article
Language is a basic medium of communication among human being. Language has various properties like productivity, recursivity and displacement and it rely on social convention and learning. The accent is an important part of any language. The accent is a manner of pronunciation of particular individual or group of speakers. It typically differs in the quality of voice, pronunciation and distinction of vowels, consonants, stress, and prosody. There are many techniques that can be used for accent identification. In this paper Mel FrequencyCepstral Coefficients is used for feature extraction from speech database. The database consists of 10 sentences in Hindi language which is uttered by speakers of native Hindi, Marwadi, Urdu, Marathi languages. Through experimental results it is found that Urdu and Marwaadi are more similar to Hindi accent whereas the variation is found in Marathi.
|
|
Title |
EFFECTIVE USE OF ELLIPTICAL CURVE FOR RSA |
| Adv Comput Res Vol:7 Iss:1 (2015-01-23) : 173-174 |
Authors |
M.V. WANKHEDE |
Published on |
23 Jan 2015 Pages : 173-174 Article Id : BIA0002371 Views : 929 Downloads : 872 |
|
Abstract |
Full Text |
PDF | XML |
PubMed XML |
CNKI |
Cited By |
Open Access | Research Article
This paper is for RSA algorithm implementation on elliptical curve cryptosystem. The main focus is on basic concept of RSA algorithm and Elliptical Curve Cryptosystem ECC. Due to large numbers involved in RSA, there is need for more efficient methods in implementation for public key cryptosystems. Elliptic Curve Cryptography (ECC) is based on elliptic curves defined over a finite field. Paper contains 1.introduction to cryptography. 2. RSA algorithm with example and prior attacks on RSA algorithm. 3. ECC is described with its advantages and comparisons. 4. Applications of ECC over RSA. 5. Probable algorithm for Implementation of RSA Algorithm on Elliptical Curve.
|
|
Title |
SURVEY: IRIS FEATURE EXTRACTION TECHNIQUES FOR PERSONS RECOGNITION SYSTEM |
| Adv Comput Res Vol:7 Iss:1 (2015-01-23) : 176-178 |
Authors |
R. TELGAD, A.M.N. SIDDIQUI, P.D. DESHMUKH |
Published on |
23 Jan 2015 Pages : 176-178 Article Id : BIA0002372 Views : 929 Downloads : 927 |
|
Abstract |
Full Text |
PDF | XML |
PubMed XML |
CNKI |
Cited By |
Open Access | Research Article
The biometrics is the study of physical traits or behavioral characteristics of human include items such as finger prints, face, hand geometry, gait, keystrokes, voice and iris. Among the biometrics, iris has highly accurate and reliable characteristics. Iris recognition is one of the biometric identification and authentication. The performance of biometric system based on iris recognition depends on the selection of iris features. In this paper various feature extraction methods are analyzed for iris recognition.
|
|
Title |
CYBER CRIME INTENSIFICATION IN THE WORLD |
| Adv Comput Res Vol:7 Iss:1 (2015-01-23) : 179-181 |
Authors |
B.P. GAIKWAD, M.E. JADHAV |
Published on |
23 Jan 2015 Pages : 179-181 Article Id : BIA0002373 Views : 921 Downloads : 859 |
|
Abstract |
Full Text |
PDF | XML |
PubMed XML |
CNKI |
Cited By |
Open Access | Research Article
Internet crime is crime committed on the Internet. The cyber crime users are growing fast in the entire world and correspondingly the cyber criminals are also growing. The crime is performed by the user’s cyber only when the connectivity through internet is made.
This paper takes a great privilege of introducing the concept of cyber crime followed by the reasons and types of cyber crime. Criminals give birth to crime and thus the cyber criminals are shown which are followed by the precautions and the acts and laws against cyber crime. The concluding part covers the world wide cases of cyber crime.
|
|
Title |
ANALYSIS OF INSERTION SORT IN JAVA |
| Adv Comput Res Vol:7 Iss:1 (2015-01-23) : 182-184 |
Authors |
S. SAMEE, A.R. CHITTE, Y.S. TANGDE |
Published on |
23 Jan 2015 Pages : 182-184 Article Id : BIA0002374 Views : 922 Downloads : 1014 |
|
Abstract |
Full Text |
PDF | XML |
PubMed XML |
CNKI |
Cited By |
Open Access | Research Article
An algorithm is any well-defined procedure or set of instructions, that takes some input in the form of some values, processes them and gives some values as output. An Insertion sort algorithms has been developed to enhance the performance in terms of computational complexity, memory and other factors. This paper is an attempt to analysis the performance of insertion sort algorithm: The paper implements the insertion sort, complexity and analysis with different input elements. The paper contains code of insertion sort for inputting the values requires no. of elements, create random generator function it generate random numbers and measures the running time of program.
|
|
Title |
MINING OF BREAST CANCER DATABASE FOR CLASSIFICATION USING DECISION TREES |
| Adv Comput Res Vol:7 Iss:1 (2015-01-23) : 185-186 |
Authors |
P.A. PUNDE, M.E. JADHAV |
Published on |
23 Jan 2015 Pages : 185-186 Article Id : BIA0002375 Views : 1005 Downloads : 935 |
|
Abstract |
Full Text |
PDF | XML |
PubMed XML |
CNKI |
Cited By |
Open Access | Research Article
Breast cancer is one of the most common reasons for death of women in developed countries including India. The high incidence of breast cancer in women has increased significantly in last few years. The breast cancer diagnosis is classified from Benign to Malignant breast lumps. In this paper, classification of breast-cancer database is done to construct diagnostic rules for breast cancer. Firstly, we constructed classifiers on the database using data mining tool See5. These classifiers can be expressed as decision trees or set of rules. For each instance of the database, there are two possible classes namely, benign or malignant. This paper summarizes breast cancer diagnosis using decision trees in two predefined classes.
|
|
Title |
TRADITIONAL Vs. MODERN SOFTWARE ENGINEERING - AN OVERVIEW OF SIMILARITIES AND DIFFERENCES |
| Adv Comput Res Vol:7 Iss:1 (2015-01-23) : 187-190 |
Authors |
L.K. SHINDE, Y.S. TANGDE, R.P. KULKARNI |
Published on |
23 Jan 2015 Pages : 187-190 Article Id : BIA0002376 Views : 997 Downloads : 2160 |
|
Abstract |
Full Text |
PDF | XML |
PubMed XML |
CNKI |
Cited By |
Open Access | Research Article
Software Development Life Cycle (SDLC) is important part of every complete software project management. Most of the times success or failure of software project management is crucial and depends on chosen software life cycle. In Software Engineering there are many software development approaches. Most of them follows the systematic approach of development such as Traditional Software Development and others other categories don’t follow the structure but their emphasis is on rapid and adaptive approach such as Agile Software Development and many more. This paper reviews traditional software development and agile software development and explains advantages and disadvantages of both the methodologies and finally the conclusion is presented.
|
|
Title |
SAP HANA REAL TIME DATABASE |
| Adv Comput Res Vol:7 Iss:1 (2015-01-23) : 191-193 |
Authors |
K. GANDLE, S. MAGRE |
Published on |
23 Jan 2015 Pages : 191-193 Article Id : BIA0002377 Views : 939 Downloads : 1052 |
|
Abstract |
Full Text |
PDF | XML |
PubMed XML |
CNKI |
Cited By |
Open Access | Research Article
The SAP HANA database is placed as the core of the SAP HANA Appliance in the direction of support complex business analytical processes as transnationally stable operational workloads. The simple features of the SAP HANA database, highlighting the unique features that differentiate the SAP HANA database from other typical relational database management systems. SAP HANA database contains multiple data processing engines with a distributed query processing background to offer the full scale of data processing from classical relational data supporting both row and column oriented physical representations in a hybrid engine, to graph and text processing for semi and unstructured data management within the same system. SAP HANA database permits the exchange of application semantics with data management platform that misused to increase query expressiveness and to reduce the number of individual application-to-database round trips. This paper addresses basic concepts memory databases like SAP HANA with overview of how in-memory computing is different from traditional concepts.
|
|
Title |
FACE LOCKS PASSWORD FOR DATA SECURITY IN MOBILE DEVICES - INHERENCE BASED AUTHENTICATION |
| Adv Comput Res Vol:7 Iss:1 (2015-01-23) : 194-196 |
Authors |
U.B. WAGH |
Published on |
23 Jan 2015 Pages : 194-196 Article Id : BIA0002378 Views : 1000 Downloads : 866 |
|
Abstract |
Full Text |
PDF | XML |
PubMed XML |
CNKI |
Cited By |
Open Access | Research Article
Forgotten password is a serious problem for users. The root of the problem is a tradeoff between memorability and security. Simple password are easy to remember but easy to crack; complex password are hard to crack but hard to remember. A newly proposed alternative based on the psychology of face lock.
|
|
Title |
CLOUD COMPUTING: DATA PRIVACY ISSUES AND THEIR SOLUTIONS |
| Adv Comput Res Vol:7 Iss:1 (2015-01-23) : 197-199 |
Authors |
P.B. JUJGAR |
Published on |
23 Jan 2015 Pages : 197-199 Article Id : BIA0002379 Views : 964 Downloads : 869 |
|
Abstract |
Full Text |
PDF | XML |
PubMed XML |
CNKI |
Cited By |
Open Access | Research Article
There are number of security issues for cloud computing as it encompasses many technologies including networks, databases, operating systems, virtualization, resource scheduling, transaction management. Therefore, security issues for many of these systems and technologies are applicable to cloud computing. Data security involves encrypting the data as well as ensuring that appropriate policies are enforced for data sharing. According to key security issues data on a cloud environment is not secure as it plays a vital role in cloud. Cloud uses different techniques for securing as well as privacy of data which fails for the security of data. But still many cloud providers giving assures of securing data on cloud. Due to this cloud spreads a lot for the easy availability of all services frequently.
|
|
Title |
A PIVOTAL ROLE OF INFORMATION SECURITY IN CYBER SECURITY WITH RESPECT TO EFFECTIVE IMPLEMENTATION |
| Adv Comput Res Vol:7 Iss:1 (2015-01-23) : 200-202 |
Authors |
K.S. DHENDE |
Published on |
23 Jan 2015 Pages : 200-202 Article Id : BIA0002380 Views : 935 Downloads : 820 |
|
Abstract |
Full Text |
PDF | XML |
PubMed XML |
CNKI |
Cited By |
Open Access | Research Article
The purpose of this paper is to understand the concept of cybercrime and how-to secure the data from such attacks. Challenges and what are the threats of cyber security and understanding the legal aspects of cyber security and to help to overall legal boundary. As such, it aims to help better understand the national and international implications of growing cyber threats, to assess the requirements of existing national, Regional and international instruments, and to assist in establishing a sound legal foundation. It provides a comprehensive overview of the most relevant topics linked to the legal aspects of Cybercrime and focuses on the demands of developing countries. Due to the transnational dimension of Cybercrime, the legal instruments are the same for developing and developed countries. Criminal activities carried out by means of computers or the Internet. Cybercrime is a term for any illegal activity that uses a computer as its primary means of commission. Computer crime, cybercrime, e-crime, hi-tech crime or electronic crime generally refers to criminal activity where a computer or network is the source, tool, target, or place of a crime. Computer crime encompasses a broad range of potentially illegal activities.
|
|
Title |
SENTIMENT ANALYSIS OF AMBEDKAR.ORG, A DALIT WEB PORTAL IN INDIA |
| Adv Comput Res Vol:7 Iss:1 (2015-01-23) : 203-205 |
Authors |
A.P. TRIBHUVAN, M.E. JADHAV |
Published on |
23 Jan 2015 Pages : 203-205 Article Id : BIA0002381 Views : 929 Downloads : 942 |
|
Abstract |
Full Text |
PDF | XML |
PubMed XML |
CNKI |
Cited By |
Open Access | Research Article
A Dalit- Bahujan Media, Dr. Babasaheb Ambedkar and his People, ambedkar.org, Indian Dalit web portal is taken for the study. The main objective of this paper is to understand the presence of Dalits in this new media and analyze the feedback about of Dalit website. The method adopted is sentiment analysis, which aims to extract emotions and opinions from text. A basic goal is to classify text as expressing either positive or negative emotion. This paper deals to reveal that Dalits do not use multimedia sufficiently. It also explored that cyber Dalit presents alternatives for Social, politics, literature and culture.
|
|
Title |
WORKING OF MVC PATTERNS FOR DESIGNING AND IMPLEMENTING USER FRIENDLY AND RESPONSIVE WEB BASED APPLICATION - A REVIEW |
| Adv Comput Res Vol:7 Iss:1 (2015-01-23) : 206-208 |
Authors |
J.K. PUJARI, I.H. SAYED, B.B. RAJPUT |
Published on |
23 Jan 2015 Pages : 206-208 Article Id : BIA0002382 Views : 941 Downloads : 908 |
|
Abstract |
Full Text |
PDF | XML |
PubMed XML |
CNKI |
Cited By |
Open Access | Research Article
Nowadays Information Technology is developing rapidly and new technologies are inventing in market. Customer’s needs are changing according to the technology, there is lots of changes in standardized web applications. Many of web application are user friendly and responsive. The certain changes of web applications usually developed in different types of framework. This paper basically focus on MVC framework. The MVC framework deals with three modules and each module perform different tasks with integrity among each other. Using MVC framework we can easily develop a user friendly, responsive web application.
|
|
Title |
CYBER SECURITY: A STUDY BASED ON STANDARDS, AREAS AND STRATEGIES IN INDIA WITH RECOMMENDATIONS FOR MAKING IT MORE OPERATIVE |
| Adv Comput Res Vol:7 Iss:1 (2015-01-23) : 209-211 |
Authors |
M.P. SHIRURKAR, A.A. BARVE |
Published on |
23 Jan 2015 Pages : 209-211 Article Id : BIA0002383 Views : 918 Downloads : 879 |
|
Abstract |
Full Text |
PDF | XML |
PubMed XML |
CNKI |
Cited By |
Open Access | Research Article
With growing advancement in technology, more and more sectors of our day to day life are making their presence on the cyber space. From social networking to business transactions, almost everything is possible through the net. Thus we need to be more aware of Cyber Security. Here we first speak on the fundamentals of Cyber Security and then explain how it is implemented in India. We also speak about the various standards of Cyber Security implemented in our country. While discussing the strategies we have also suggested more ways in which they can become more effective. We have also reviewed some popular areas which are active over cyber space and thus need to have effective implementations of Cyber Security. Following this we have explained breaches in Cyber Security through a couple of case studies. Last but not the least we also comment on the upcoming trend in Cyber Security which is Digital Forensics.
|
|
Title |
REVIEW PAPER ON INTRODUCTION OF VARIOUS BIOMETRIC AREAS |
| Adv Comput Res Vol:7 Iss:1 (2015-01-20) : 212-214 |
Authors |
S.D. DESHPANDE |
Published on |
20 Jan 2015 Pages : 212-214 Article Id : BIA0002384 Views : 919 Downloads : 1050 |
|
Abstract |
Full Text |
PDF | XML |
PubMed XML |
CNKI |
Cited By |
Open Access | Mini Review
Biometrics is a growing technology, which has been widely used in forensics, secured access and prison security. A biometric system is fundamentally a pattern recognition system that recognizes a person by determining the authentication by using his different biological features i.e. Fingerprint, retina-scan, iris scan, hand geometry, and face recognition. In biometric system used two types of characteristics that is physiological biometrics and behavioral biometrics.
The applications include secure access to buildings, computer systems, laptops, cellular phones and ATMs. This paper reviews various recognition techniques and their advantages. The objective of Biometric recognition systems should provide a reliable personal recognition schemes to either confirm Or determine the identity of an individual.
|
|
Title |
ROLE OF DATA MINING IN EDUCATION FIELD |
| Adv Comput Res Vol:7 Iss:1 (2015-01-23) : 215-217 |
Authors |
P.N. NAIK |
Published on |
23 Jan 2015 Pages : 215-217 Article Id : BIA0002385 Views : 960 Downloads : 990 |
|
Abstract |
Full Text |
PDF | XML |
PubMed XML |
CNKI |
Cited By |
Open Access | Research Article
Data Mining is used to extract meaningful information and to developed significant relationship among variables stored in large data warehouse. Education is an essential element for the progress of country. Mining in educational environment is called educational data mining [EDM]. It is concerned with developing new methods to discover knowledge from educational database. In a technologically oriented society education knowledge and research are crucial to the entire developmental process of a country and its welfare, progress and security. We will discuss that what the benefits of data mining are in educational system. Use of Data mining techniques to improve the efficiency of educational institutions. Data mining techniques such as clustering, decision tree and association can be applied to educational system, it can helpful for improvement of student’s performance.
|
|
Title |
NATURAL LANGUAGE PROCESSING AND IT’S APPLICATIONS |
| Adv Comput Res Vol:7 Iss:1 (2015-01-23) : 218-220 |
Authors |
D.C. YEOLE, S.V. BAVISKAR |
Published on |
23 Jan 2015 Pages : 218-220 Article Id : BIA0002386 Views : 926 Downloads : 853 |
|
Abstract |
Full Text |
PDF | XML |
PubMed XML |
CNKI |
Cited By |
Open Access | Research Article
Natural language processing has been in existence for more than fifty years. During this time, it has significantly contributed to the field of human-computer interaction in terms of theoretical results and practical applications. As computers continue to become more affordable and accessible, the importance of user interfaces that are effective, robust, unobtrusive, and user-friendly – regardless of user expertise or impediments – becomes more pronounced. Since natural language usually provides for effortless and effective communication in human-human interaction, its significance and potential in human-computer interaction should not be overlooked – either spoken or typewritten, it may effectively complement other available modalities, such as windows, icons, and menus, and pointing; in some cases, such as in users with disabilities, natural language may even be the only applicable modality
|
|
Title |
ANALYSIS OF AUDITORY fMRI DATA OF SINGLE NORMAL SUBJECT USING STATISTICAL PARAMETRIC MAPPING |
| Adv Comput Res Vol:7 Iss:1 (2015-01-23) : 221-224 |
Authors |
P.G. SHAH, B.W. GAWALI |
Published on |
23 Jan 2015 Pages : 221-224 Article Id : BIA0002387 Views : 933 Downloads : 874 |
|
Abstract |
Full Text |
PDF | XML |
PubMed XML |
CNKI |
Cited By |
Open Access | Research Article
Imaging modality functional magnetic resonance imaging (fMRI) allows us to obtain brain images with excellent resolution. In order to study the human brain of normal and diseased subjects; mechanism is needed to analyze the fMRI data. One of the methods that do this job is known as Statistical Parametric Mapping (SPM). In this paper, we provide a framework that describes how to analyze the fMRI data using SPM. It is observed that, the major steps involved in fMRI preprocessing are slice timing correction, realignment, co registration of structural and functional images, normalization and smoothing.
|
|
Title |
ANALYSIS OF QUESTION ANSWERING AND PARSING TECHNIQUES IN NATURAL LANGUAGE PROCESSING : A REVIEW |
| Adv Comput Res Vol:7 Iss:1 (2015-01-23) : 225-228 |
Authors |
S.A. KHILLARE, A.V. DHOKRAT, C.N. MAHENDER |
Published on |
23 Jan 2015 Pages : 225-228 Article Id : BIA0002388 Views : 917 Downloads : 1035 |
|
Abstract |
Full Text |
PDF | XML |
PubMed XML |
CNKI |
Cited By |
Open Access | Mini Review
From last two decades use of computer as well as internet has increased dramatically. And the demand for faster, accurate and meaningful response i.e. answers has increased in recent years. Hence a question answer has raised a lot of interest in research society due to wide applications. Basically Open and Closed domain is there depending on the application found in QA. A lot of work is seen in English, Japanese, Chinese and in many more European languages compare to Indian languages like Hindi, Tamil Marathi etc. In this paper a review is presented on the techniques applied at different NLP stages while the development such QA systems.
|
|
Title |
DATA COMPRESSION TECHNIQUES - A REVIEW |
| Adv Comput Res Vol:7 Iss:1 (2015-01-23) : 229-232 |
Authors |
G.S. SAWALKAR |
Published on |
23 Jan 2015 Pages : 229-232 Article Id : BIA0002389 Views : 931 Downloads : 842 |
|
Abstract |
Full Text |
PDF | XML |
PubMed XML |
CNKI |
Cited By |
Open Access | Mini Review
This paper surveys the method of data compressions. The aim of data compression is to reduce redundancy in stored and communicated data, thus increasing effective data density. Data compression has important application in the areas of file storage and distributed system.
|
|
Title |
CROSS-SITE-SCRIPTING - ATTACK AND PROTECTION MECHANISMS |
| Adv Comput Res Vol:7 Iss:1 (2015-01-23) : 233-235 |
Authors |
A.S. GHODKE, L. SEN |
Published on |
23 Jan 2015 Pages : 233-235 Article Id : BIA0002390 Views : 979 Downloads : 2240 |
|
Abstract |
Full Text |
PDF | XML |
PubMed XML |
CNKI |
Cited By |
Open Access | Research Article
In today’s world more than 80% of the web applications are vulnerable to XSS threats. User friendly web applications are developed to increase the customer base and hackers utilize the features provided by the web applications. This paper surveys such vulnerabilities with the current solutions. The strengths and weaknesses of all approaches are discussed. Cross Site Scripting (XSS) is a type of computer security exploit where information from one context, where it is not trusted, can be inserted into another context, where it is. The trusted website is used to store, transport, or deliver malicious content to the victim. The target is to trick the client browser to execute malicious scripting commands.
|
|
Title |
INTRODUCTION TO COMPUTER VIRUSES AND DETECTION TECHNIQUES |
| Adv Comput Res Vol:7 Iss:1 (2015-01-23) : 236-238 |
Authors |
D.D. RUIKAR |
Published on |
23 Jan 2015 Pages : 236-238 Article Id : BIA0002391 Views : 983 Downloads : 847 |
|
Abstract |
Full Text |
PDF | XML |
PubMed XML |
CNKI |
Cited By |
Open Access | Research Article
In this paper you can see the general overview on current computer viruses and detection techniques. Computer virus writers use metamorphic techniques so produce viruses change their internal structure. in compare to this the anti-virus technologies continually follow the new methodologies to overcome their threats. This paper shows the anti-virus experts design and develop new methodologies to make them stronger, as the every day passes. The motive of this paper is to tell these methodologies and show their power and weaknesses to motivate those who are interested in these fields.
|
|
Title |
APPLYING NAIVE BAYESIAN CLASSIFIER FOR PREDICTING PERFORMANCE OF A STUDENT USING WEKA |
| Adv Comput Res Vol:7 Iss:1 (2015-01-23) : 239-242 |
Authors |
A.P. TRIBHUVAN, P.P. TRIBHUVAN, J.G. GADE |
Published on |
23 Jan 2015 Pages : 239-242 Article Id : BIA0002392 Views : 1008 Downloads : 1456 |
|
Abstract |
Full Text |
PDF | XML |
PubMed XML |
CNKI |
Cited By |
Open Access | Research Article
The advances in computing and information storage have provided vast amounts of data. The challenge has been to extract knowledge from this raw data that has guide to new methods and techniques such as data mining that can link the knowledge gap. This paper aimed to review these new data mining techniques and predicting the performance of a student is a great concern to the higher education managements, where quite a few factors affect the performance. The scope of this paper is to explore the accuracy of data mining techniques. We collected records of 100 under graduate students from a private Educational Institution conducting various Under Graduate courses of Information Technology. Decision tree and Naive bayes algorithms were evaluated by using WEKA tool to discover the performance. Decision tree algorithm is more accurate than the Naive bayes algorithm. This work will help the Educational Institution to precisely predict the performance of the students.
|
|
Title |
A REVIEW OF CLOUD COMPUTING AND SECURITY ALGORITHMS |
| Adv Comput Res Vol:7 Iss:1 (2015-01-23) : 243-245 |
Authors |
U.R. JADHAV |
Published on |
23 Jan 2015 Pages : 243-245 Article Id : BIA0002393 Views : 998 Downloads : 1180 |
|
Abstract |
Full Text |
PDF | XML |
PubMed XML |
CNKI |
Cited By |
Open Access | Mini Review
Cloud computing is emerging technology which uses hardware and software to provides IT services to the customer over the network. This paper discussed issues related to security of cloud storage and which algorithm are used for security of cloud. Cloud stores large amount of data from different distributed resources and it gives facility to customer easy access of data anywhere at any place, so there is need to protect data from unauthorized access and from modification data. This paper specially focused on cryptographic algorithms for the security of cloud.
|
|
Title |
CHALLENGES IN THE SOFTWARE DEVELOPMENT PRODUCTIVITY - A LITERATURE VIEW |
| Adv Comput Res Vol:7 Iss:1 (2015-01-23) : 246-249 |
Authors |
V.V. KARDILE, C.G. DESAI |
Published on |
23 Jan 2015 Pages : 246-249 Article Id : BIA0002394 Views : 925 Downloads : 898 |
|
Abstract |
Full Text |
PDF | XML |
PubMed XML |
CNKI |
Cited By |
Open Access | Mini Review
Globalization and technical revaluation is raising several challenges to the software development sector. Over the past 50 years, software has evolved from a specialized problem solving and information analysis tool to an industry, but in itself having traversed a progressive path to sustainable business. The objective of this review is to plot the landscape of current reported knowledge in the terms of the aspect of productivity and find Impact factor the software development productivity. The paper is organized as section II gives an overview of productivity and the early studies based data releases; section III introduces the latent factors significant to the software productivity; section IV is the conclusion of this study.
|
|
Title |
STUDY OF INTEGER FACTORIZATION ALGORITHMS |
| Adv Comput Res Vol:7 Iss:1 (2015-01-23) : 250-252 |
Authors |
N. JAYBHAY, P. JADHAV |
Published on |
23 Jan 2015 Pages : 250-252 Article Id : BIA0002395 Views : 917 Downloads : 1091 |
|
Abstract |
Full Text |
PDF | XML |
PubMed XML |
CNKI |
Cited By |
Open Access | Research Article
Integer factorization means to obtain factors of large numbers by using some methods. In cryptography the algorithms like Pollard-Rho, Pollard’s P-1, quadratic sieve etc are used to find the factors of large integers. The ability of these different algorithm varies according to the input given to it. This paper gives introduction to Integer Factorization, methodologies used for factorization, implementation of Quadratic sieve algorithm in c++ and comparisons between efficiency of algorithms according to their computing time.
|
|
Title |
ENCRYPTION: PROVIDE SECURITY FOR BIG DATA APPLICATION IN CLOUD COMPUTING ENVIRONMENT |
| Adv Comput Res Vol:7 Iss:1 (2015-01-23) : 253-255 |
Authors |
M.B.S. ISMAIL |
Published on |
23 Jan 2015 Pages : 253-255 Article Id : BIA0002396 Views : 922 Downloads : 1003 |
|
Abstract |
Full Text |
PDF | XML |
PubMed XML |
CNKI |
Cited By |
Open Access | Research Article
National Institute of Standards and Technology (NIST) has developed a working definition as: a model for enabling convenient, on-demand network access to shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Sometimes,large volume of data generated by Twitter, Amazon.com and Face book. This data would be useful if it can be correlated to form business partnerships and research collaborations. Two obstacles to occur while process of data sharing. Arranging a large common storage area and providing secure access to the shared data.
|
|
Title |
INFORMATION TECHNOLOGY ACT 2000 & CYBER CRIMES: IMPLICATIONS, CONSEQUENCES & CONTROL IN MAHARASHTRA |
| Adv Comput Res Vol:7 Iss:1 (2015-01-23) : 256-258 |
Authors |
R.A. SHAH, R.R. PANSARE |
Published on |
23 Jan 2015 Pages : 256-258 Article Id : BIA0002397 Views : 924 Downloads : 1069 |
|
Abstract |
Full Text |
PDF | XML |
PubMed XML |
CNKI |
Cited By |
Open Access | Research Article
This paper discussed the Cybercrime and law with reference to IT Act 2000.Cyber crime and law shows the basic concept, defines the terms use in the technology related crimes, and outlines the control of crime. It gives the review of cyber crimes and provides good understanding crimes. As an emerging new era of cyber law, however, cyber law also raises significant questions about resources, economics the environment and the law. Many of these questions relate to cyber crime which done by using computers, networks, internet and data base. People those intelligent persons using these technical tools to do the cyber crime.
|
|
Title |
REVIEW ARTICLE ON OPINION MINING USING NAÃVE BAYES CLASSIFIER |
| Adv Comput Res Vol:7 Iss:1 (2015-01-23) : 259-261 |
Authors |
A. PISOTE, V. BHUYAR |
Published on |
23 Jan 2015 Pages : 259-261 Article Id : BIA0002398 Views : 917 Downloads : 964 |
|
Abstract |
Full Text |
PDF | XML |
PubMed XML |
CNKI |
Cited By |
Open Access | Mini Review
Now a day’s people are using Twitter, forum discussions, blogs, and Facebook to share their views, emotions and opinions. It may be positive, negative or neutral opinion. So the large amount of data is now available on web in text format and there is a need to analyze and interpret this data. Decision makers and researchers can make use of this interpreted data to make appropriate decision. This can be done with the help of sentiment analysis. When we summarize the document on the basis of their features we come to know whether it is positive, negative or neutral opinion. This document summarization is useful in feedback analysis Product review, business decision making. Different classifier are used to mine the sentiments, one of it is Naïve Bayes Classifier. This paper is aim to study the sentiment analysis and naïve bayes classifier to classify the document on the basis of their sentiments.
|
|
Title |
QUANTITATIVE ANALYSIS OF SOFTWARE SIZE USING FUNCTION POINT ANALYSIS METHOD |
| Adv Comput Res Vol:7 Iss:1 (2015-01-23) : 262-264 |
Authors |
S.U. ATOLE |
Published on |
23 Jan 2015 Pages : 262-264 Article Id : BIA0002399 Views : 919 Downloads : 913 |
|
Abstract |
Full Text |
PDF | XML |
PubMed XML |
CNKI |
Cited By |
Open Access | Research Article
Most IT organizations develop the software projects without using the software estimation techniques especially middle level and small scale IT companies in India. Software size can be measured either by applying formula or by using any standard estimation tool like COSTAR. An accurate Function point size can be determined from the detailed information included in a thorough user requirements document or a functional specification. Observations and an understanding of historical project information can help predict the size of future efforts. The concept of computing function points is part of a larger process called Function Point Analysis (FPA).This paper intends to explain Function point Analysis and calculating function point for any System using step by step procedure.
|
|
Title |
SOYBEAN RUST SEVERITY MEASUREMENT USING IMAGE PROCESSING TECHNIQUE |
| Adv Comput Res Vol:7 Iss:1 (2015-01-23) : 265-267 |
Authors |
D.R. SOMWANSHI, V.T. HUMBE |
Published on |
23 Jan 2015 Pages : 265-267 Article Id : BIA0002400 Views : 982 Downloads : 1160 |
|
Abstract |
Full Text |
PDF | XML |
PubMed XML |
CNKI |
Cited By |
Open Access | Research Article
Soybean rust is the most harmful type of soybean crop foliar disease. For diagnosis & detection of rust, expert and naked eye observation is required and in the process of controlling the rust infection it is necessary to calculate the severity of the disease infection, this research paper provides the accurate method of quantification of rust severity through color segmetation method. Red (R) Green (G) Blue (B), Hue Saturation Intensity (HSI), Hue Saturation Value (HSV) Color Spaces are studied as part of the research and demonstrated HSI Color space based approach provides the best result. Manual threshold setting method is used, and it is found suitable for quantification of rust infection. Ratio of Infected Area (RIA) is calculated for accurately quantification of soybean rust area or the percentage of area affected by the soybean rust.
|
|
Title |
CRYPTOGRAPHY ON REGIONAL LANGUAGES |
| Adv Comput Res Vol:7 Iss:1 (2015-01-23) : 268-270 |
Authors |
J.D. WAGH |
Published on |
23 Jan 2015 Pages : 268-270 Article Id : BIA0002401 Views : 962 Downloads : 983 |
|
Abstract |
Full Text |
PDF | XML |
PubMed XML |
CNKI |
Cited By |
Open Access | Research Article
Today’s world is electronic world where information is stored and communicated in electronic form. This increases the efficiency of the work but at the same time there is risk of data access by the unauthenticated user, so to provide security to the information has become the crucial need of today’s world. Security can be provided to the data with the help of cryptography. Information can be in standard languages or can be in regional language. Cryptographic algorithms can be easily implemented on standard language at the same time some what difficult to implement on local languages. This paper discusses how security can be provided to the information in any local languages apart from standard languages using already existing cryptographic algorithm.
|
|
Title |
A STUDY ON STORED VERSION OF ANDRIOD OS AND ITS THREATENING ISSUES TO USERS |
| Adv Comput Res Vol:7 Iss:1 (2015-01-23) : 271-273 |
Authors |
M. SAWANT, R. SONAWANE |
Published on |
23 Jan 2015 Pages : 271-273 Article Id : BIA0002402 Views : 919 Downloads : 837 |
|
Abstract |
Full Text |
PDF | XML |
PubMed XML |
CNKI |
Cited By |
Open Access | Research Article
Andriod phones have changed the era of mobile phones. Everyone now, is opting himself / herself for a smart phone basically an Android phone. This paper focuses on android OS and its new version called as stored OS which is provided by some new introduced phone manufacturing companies. This paper also focuses on how the users are getting attracted towards free apps of android without knowing the actual OS of the phone. Smart phone users are those who uses most of internet for their several purposes, such as banking, email, e- transactions.
|
|
Title |
HEALTHCARE KNOWLEDGE MANAGEMENT USING DATA MINING TECHNIQUES |
| Adv Comput Res Vol:7 Iss:1 (2015-01-23) : 274-278 |
Authors |
M. MAHAMUNE, S. INGLE, P. DEO, S. CHOWHAN |
Published on |
23 Jan 2015 Pages : 274-278 Article Id : BIA0002403 Views : 921 Downloads : 859 |
|
Abstract |
Full Text |
PDF | XML |
PubMed XML |
CNKI |
Cited By |
Open Access | Research Article
Knowledge Management (KM) in any organization in integration with information technology supports system strategies with business strategies to attain the vision and mission very precisely. In today’s era knowledge management is crucial in all aspects of organization; Hence knowledge discovery from massive database is today’s need. Knowledge Discovery in Databases (KDD) helps organizations turn their data collection into valuable information. Organizations that take advantage of KDD will find that they can lower the healthcare costs while improving healthcare quality by using fast and better clinical decision making. The data collected by healthcare organization might be structured or unstructured. Hence it is essential to use some technology to gain knowledge from massive databases which will increase the access to knowledge for the people working in organization as well as competitiveness among organizations. Though the healthcare sector relies heavily on knowledge and evidence based medicine is expected to be implemented in daily healthcare activities; the quality of care relies on the exchanging the knowledge between the organization. The Data Mining comes up against major scientific and technological type of tool for knowledge discovery and is also considered as significant field in Knowledge Management. This paper explores the Data Mining techniques which found suitable for discovering the hidden knowledge from the healthcare massive database and their applications which supports the KM process in healthcare sector, its advantages, disadvantages and challenges.
|
|
Title |
ANALYSIS OF AUTOMATION TESTING TECHNIQUES |
| Adv Comput Res Vol:7 Iss:1 (2015-01-23) : 279-281 |
Authors |
R. SHRESHTH |
Published on |
23 Jan 2015 Pages : 279-281 Article Id : BIA0002404 Views : 920 Downloads : 1027 |
|
Abstract |
Full Text |
PDF | XML |
PubMed XML |
CNKI |
Cited By |
Open Access | Research Article
Testing is very important activities in software development process. It is to examine and modified source code of software. Testing technique is useful to produce high quality software. This paper deals with manual testing with automation tools. These technique have their own advantages and disadvantages. The objective of paper is to perform automation testing using software testing tools like "Quick Test Professional"(QTP), Selenium, skilltest, testcomplete, testingAnywhere, winrunner, loadrunner, Visual studio test professional etc. With this automated tool, test cases are automatically recorded in background while tester is entering a data in web application or windows application. The main objective of this paper is to conduct a comparative study of automation testing tools such as selenium and QTP.
|
|
Title |
FINGERPRINT CRYPTOGRAPHIC SECURITY FOR SMARTPHONE DEVICES |
| Adv Comput Res Vol:7 Iss:1 (2015-01-23) : 282-284 |
Authors |
A.L. CHINTAL |
Published on |
23 Jan 2015 Pages : 282-284 Article Id : BIA0002405 Views : 968 Downloads : 946 |
|
Abstract |
Full Text |
PDF | XML |
PubMed XML |
CNKI |
Cited By |
Open Access | Research Article
With fast evolution of mobile devices and mobile network, the need of protecting user sensitive information locally. Bio-cryptography is emerging as a powerful solution which can combine the advantages of conventional cryptography and biometric security. This paper present an efficient bio-cryptographic security protocol designed for current mobile devices. In this protocol, fingerprint biometric is used in user verification, protected by a computationally efficient Public Key Infrastructure (PKI) scheme, Elliptic Curve Cryptography (ECC). The genuine fingerprint information is hidden in the feature vault which is the mixture of genuine and chaff features. Fingerprint features are not only used for biometric verification but also for cryptographic key generation.
|
|
Title |
REVIEW OF MULTIMODAL BIOMETRIC (FACE & IRIS RECOGNITION) |
| Adv Comput Res Vol:7 Iss:1 (2015-01-23) : 285-287 |
Authors |
S.B. MISAL, A.T. GAIKWAD |
Published on |
23 Jan 2015 Pages : 285-287 Article Id : BIA0002406 Views : 916 Downloads : 946 |
|
Abstract |
Full Text |
PDF | XML |
PubMed XML |
CNKI |
Cited By |
Open Access | Mini Review
with increasing concern and demands on security, automatic identity verification systems based on biometrics have become more widespread and more efficient. Several airports are now equipped with biometric products. Face and iris recognition systems are among the top choices: face recognition is the most friendly and non-invasive way of recognizing a person whereas iris recognition is one of the most accurate biometrics. However, there are a number of practical issues that still need to be solved with both systems. This paper reviews two biometric identification technology Face recognition and Iris recognition. It also discusses the comparative study with respect to their operational methods & states their advantages and disadvantages.
|
|
Title |
A REVIEW: ANALYSIS OF QUESTIONS FOR DEVELOPMENT OF AUTOMATED INFERENCE ENGINE OF QA SYSTEM |
| Adv Comput Res Vol:7 Iss:1 (2015-01-23) : 288-290 |
Authors |
S.L. TRIBHUWAN, C.N. MAHENDER |
Published on |
23 Jan 2015 Pages : 288-290 Article Id : BIA0002407 Views : 920 Downloads : 983 |
|
Abstract |
Full Text |
PDF | XML |
PubMed XML |
CNKI |
Cited By |
Open Access | Mini Review
Question Answering (QA) Systems is an automated approach to retrieve correct responses to the questions asked by human in natural language. Question Answering (QA) is a classic application of Natural Language Processing. It has practical applications in various domains like education, health care and personal assistance. The fundamental thought behind QA system is to assist man machine interaction. Modern information retrieval systems allow us to locate documents that might have the associated information, but the majority of them leave it to the user to extract the useful information from an ordered list. QA system enables users to access the knowledge resources in a natural way (i.e., by asking questions) and to get back a relevant and proper response in concise words.
|
|
Title |
IMAGE ENHANCEMENT ON HISTOGRAM : AN OVERVIEW |
| Adv Comput Res Vol:7 Iss:1 (2015-01-23) : 291-294 |
Authors |
R.A. DESHMUKH, A.K. TAYDE, S.N. HELAMBE |
Published on |
23 Jan 2015 Pages : 291-294 Article Id : BIA0002408 Views : 917 Downloads : 967 |
|
Abstract |
Full Text |
PDF | XML |
PubMed XML |
CNKI |
Cited By |
Open Access | Research Article
Image Enhancement is the process to improve image quality to provide better input for specific application. usually visuality of image gets affected by weather, lighting even real digital photograph suffers from noise and poor contrast, it is necessary to enhance the contrast in low contrast Image. The enhancement does not increase the inherent information content of the data, but it increase the dynamic range of the chosen features such that they can be detected easily. There are many techniques of image enhancement. Histogram Equalization is one of the common and well known methods used for improving contrast in digital image. In this paper we are going to focus on histogram and Histogram Equalization methods
|
|
Title |
CONTROLLING AND MONITORING LOCAL AREA NETWORK USING REMOTE INVOCATION METHOD AND REMOTE PROCEDURE CALL IMPLEMENTED IN “JAVA†|
| Adv Comput Res Vol:7 Iss:1 (2015-01-23) : 295-298 |
Authors |
M.W. ASHFAQUE, N.H.N. QUADRI |
Published on |
23 Jan 2015 Pages : 295-298 Article Id : BIA0002409 Views : 927 Downloads : 1044 |
|
Abstract |
Full Text |
PDF | XML |
PubMed XML |
CNKI |
Cited By |
Open Access | Research Article
The main Object behind this paper is to assure and increase the productivity and the security factor of the Network say (LAN). it can be enabled by developing such a piece of smart application which should be responsible to carry out all the required operations which are compatible to control and monitor to the network. Even one can viewed out to remote desktop, by passing messages through remotely to the system by seating up on a chair. And such smart software needs a strong background, environment of a smart and capable, strong profiled programming language like Java to developed. It can be purely used Remote Invocation method, Remote Procedural call of JAVA. This project also helpful to those who are Admin to monitor and control by viewing the static image of client’s desktop and then he/she could sends warning message to the user to stop that operation. This project can is capable to provide maximum information in detailed about the networks on their screen without familiar with their user even. Java is a language which provides a variety of Java Remote Invocation Method, and unusually smooth Remote Procedure Call. Like RPC, RMI supports also polymorphism, which enabled to the system to be downloaded remote classes while a running application. It’s being observed and brought into the consideration that all of the run time overhead of RMI can be pushed to compile time With this reference, the latency of a null RMI is reduced to 34 μsec Running Java implementations, Remote Method Invocation is quit slower. On a Pentium Pro/Myrinet cluster.
|