IJCST 5.4-October – December 2014 – SPL I

S.No. Research Topic Paper ID Download

Application Virtualization in Resource-Constrained Environments

Dr Sawtantar Singh Khurmi

The mobile users are capable to offload computationally-expensive processing (such as face recognition, language translation, speech and image recognition) from a mobile device onto more powerful servers. This enables cloud-based computing, saves battery power of the device in resource constraint environments. A technique used for dynamically scaling the computing resources of resource-limited mobile devices by exploiting a fixed computing infrastructure at nearby locations is known as Cyber-Foraging.

This time we will explore the research conducted on cloudletbased cyber foraging. The concept of Cloudlets was created by Mahadev Satyanarayanan of Carnegie Mellon University’s School of Computer Science using Virtual Machine (VM) synthesis to provision cloudlets. In this technology, a file called an “application overlay” is transferred during runtime from the mobile device to the cloudlet. The VM synthesis involves large application overlay files, which can be costly to transfer in terms of battery and network bandwidth consumption in mobile and edge environments. The application virtualization uses a similar approach that is used in operating system. We will be discussing implementation of application virtualization here, its benefits, drawbacks and future challenges in advanced mobile systems.
Full Paper


Wormhole Attack Elimination Technique in Mobile Ad-hoc Networks

Aashima, Vishal Kumar Arora

With the advancement of wireless networks and their equipments in our today’s life, they have become an important part of our routine work. But the high availability of such devices and lack in the security measures of their routing protocols, they are alluring a number of attackers to intrude. One of the severe attack is Wormhole Attack that is the topic of discussion in this paper.

Numerous solutions have been proposed for their detection but every technique comes with its pros and cons. In this paper, we have detected and prevented the attack using DSR protocol but with doing little modification to the protocol functionality. The information from the routing table is used for the detection of wormhole links and along that link, another security mechanism is applied that confirms the presence of wormhole nodes at the end. This approach has been applied to DSR protocol and makes possible the detection and prevention of wormhole nodes and attacks. Simulation results further verify the presence of wormhole nodes in the network.
Full Paper


Benefits of Cloud for Banking Sector

Kiran Bala Nayar, Vikas Kumar

With the passage of time the working of banks has been changed. Now the controlling hand is customer rather than bank. This new business model changes the traditional business transformation. For this banking needs cloud computing offers a business model that delivers innovative customers experiences, effective collaboration, enhanced the speed to market. It is a platform for optimizing the banking operations while delivering the innovative services to the customer. Many banks are adopting this technology for the growth. In this paper, we have discussed the benefits of cloud in banking sector over the traditional tedious process of banking. We also discussed the challenges associated with the current banking system and provide cloud as solution with the various benefits of it.

We also explore the various applications that can increase the performance of banking industry and gain the agility.
Full Paper


Security Issues in SCADA Functionality Over Physical & Logical Framework

Satyam Pandey, Umesh Singh Tomar, Prem Kumar Ch.

Implementation of SCADA system is growing inIndia but it has many loop holes, one of them is security which needs to be rectified for a more reliable and flexible system. Security issues regarding the scada functionality can be subcategorized in physical and logical levels. Physical level problems consist of the cyber security and intrusion issues while logical level problems consist of network security as well as interoperability issues. This paper mainly focuses on the architecture which is designed toresolve logical problems as well as gives some suggestions to eliminate the problems at physical level in power as well as oil & gas industry.
Full Paper


Super Virtualization Structural Model for Centralized and Distributed Server Management

P Srikanth, Ch. Prem Kumar, Shivam Rawat

To construct the “super-virtualization architecture” from the preexisting layouts of the current virtualization server management. In this server management each VMM’s having its own administrator and these VMM’s are interconnected by fabric connection and information is delivered to the client via router, with this type of architecture so many security issues are occurred and also VMM’s are communicating with each other via fabric connection. These issues can be solved by using the proposed architecture i.e. “super virtualization”. In super virtualization each VM can communicate with each other via private virtual LAN’s and every VM can forward the data to automatic computing. Autonomic systems raise additional security challenges, including the establishment of a trustworthy system identity, automatically handling changes in system configuration and interconnections, and greatly increased configuration complexity. On the other hand, the techniques of autonomic computing offer the Promise of making systems more secure by effectively and automatically enforcing high level security policies for both centralized and distributed server management.
Full Paper


Image Denoising By Multi-Pass Median Filter Based on Decision Based Expanded Window

Reva Sethi, Vishal Kumar Arora

In this paper we proposed a new multi-pass median filterwhich is based on decision based expanded window to remove the salt and pepper noise. Proposed filter works on noisy pixel by using a window around that noisy pixel without affecting noise free pixels. At low noise density noisy pixel is replaced with trimmed median value of the window. Window is expanded if it contains three forth noisy pixels of total pixels of window to find more noise free pixels, in order to prefer median filter instead of mean filter at high noise density. We also preferred multiple scanning of same image, that increases the probability of noise free pixel at high noise density and median filters are in use which are effective and provide better results.
Full Paper


Development and Simulation of Image Processing Algorithms For Dim Target Detection, Identification and Tracking

Manpreet Kaur Jaswal

Dim target detection and identification forms essential part of various remote sensing applications, military and scientific operations, obstacle detection by rovers, vehicle navigation and control, and environmental prediction etc. Many new research and development is going on in these fields of image processing.

Challenges of target detection vary with different scenarios. Hence for target detection in varying environments a combination of target detection and identification techniques have been developed. Various algorithms are studied and selected algorithms are implemented in software, applied on the image to suppress the background using databases on preliminary characteristics of target to unambiguously identify the target. In this paper, a detectbefore- track approach is followed, and a brief overview of target detection techniques used, implemented algorithms and output image results are presented. An additional algorithm is designed for corner detection in software that aids in target detection.
Full Paper


Role Based Access Control with Integrated Authentication and Ontology to Detect and Prevent DDOS Attacks

Ravneet Kaur, Manish Mahajan

Cloud computing is a model that is used for enabling convenient, on-demand network to a shared pool of configurable computing resources that can be instantly provisioned and released with minimum management effort or service provider interaction. Access control has vital significance in cloud computing, where data files are stored in the cloud server. In current schemes, the cloud server typically needs to consult the backend authorization server, when processing access control request from data users.

This will put a heavy burden on the authorization server, and therefore introduce Denial-of-Service attack on it. The results show that our scheme is quite improved, because it separates the authorization process from the access control process. By doing so, the burden on the authorization server is reduced, and the Denial-of-Service attacks on it during access control process are avoided. Also we have added the ontology concept with the RBAC to enhance the access control power.
Full Paper


Cloud Computing SLA and Its Problems

Satinder Kaur, Dr. Sawtantar Singh Khurmi

Cloud Computing could be a terribly complicated system. Major issue that involves in Cloud Computing is User’s trust. To realize this user-trust several solutions are place forth by scientists one amongst that is Service Level Agreement (SLA).

SLA plays significant role in cloud computing. Every service associates with a particular SLA. During this system cloud service supplier and user makes some agreement relating to services of cloud with its usage. As developing and maintaining a cloud involves a decent quantity of finances, finding the SLA truth, and whether or not a service suppliercan meet user necessities, depends on the main points of however they outline their SLA measures and penalties. This paper explores the inquiries to raise once scrutiny public cloud SLAs to work out whether or not cloud suppliers SLAcan meet user business desires.
Full Paper


An Enhancement in Rivest Shamir Adleman Algorithm (RSA) for Intrusion-Detection System in MANETs

Manpreet Singh, Malti Sarangal, Gurpreet Singh

Mobile ad hoc networks are advancing as a standout among the most ad hoc networks. Additionally, having self-configuring ability, the adaptable nature of Mobile ad hoc networks is confronting new security dangers. Intrusion detection could be described as a procedure of observing exercises in a framework, which might be a workstation or system framework. Adaptability and versatility brought by the remote framework made it possible in various applications. The configuration of own limit of centers in MANET, made it common among fundamental mission applications like military use or emergency recovery. With the improvement of the designing and cut in fitting costs, we can see a recent example of Manets into industrial applications. In this paper, we will provide security by utilizing Secure Acknowledgment and Misbehaviour Report Authentication. We are about to upgrade the credibility and security of the information by utilizing Rivest Shamir Adleman Algorithm alongside place transposition.
Full Paper


Evaluation of a Batsman’s Performance in Cricket Using Fuzzy Logic

Vikas Kumar, Prof. Vijay Laxmi, Rishu Grover

Cricket is the most popular game of the today’s world and the performance evaluation of cricket player is very important part of this game. Performance evaluation plays very significant role in international ranking of players. The performance of the players is being evaluated with the help of very simple statistical tools. These tools have various limitations in assessing the true performances of players. This paper proposed a new tool based on Fuzzy Inference System (FIS) to evaluate the performance of a batsman. FIS is a process to formulate the mapping from given input to an output using fuzzy logic. Various new parameters are used in this tool which can make affect on the performances of players and can improve the quality of performance evaluation in cricket. This tool will be useful to make the ranking of batsman and for the selection of batsman of players based on performances.
Full Paper


Variance Localization With Local and Global Mean for Adjusting Image Contrast

Manjeet Singh Walia, Manish Mahajan

In Medical imaging when we take the example for specific body parts such as lungs, spine, abdomen, lower or upper extremities, each image come with different dose due to presence of hard and soft tissues. Since dose parameter of radiations is different thus it makes the different impact on soft and hard tissues that may lead to have a poor image contrast due to this the images may lead to overexposure & underexposure. The image so obtained would not have similar contrast in over all images. Thus image has different shades in different parts. Radiologist faces the problem to diagnose the proper disease. So image contrast need to be balanced over the entire image in such a manner so that image looks with balanced contrast. Basically image contrast is to modify attributes of an image to make it more suitable for a given task and for a specific observer. Most of the technique is very suitable when image come with balanced brightness. But in case of Digital X ray radiations, soft and hard tissues make different impact. Thus a method is required that could calculate the global attributes and local attribute and based on the selection of local with respect to global it balances the contrast.

In the current paper we are going to implement the new method of image contrast enhancement that uses the concept of Global mean and global variance by using localization functions. The proposed has been applied on complex (medical) images and is checked for different metrics such as NAE, quality Index and structural content.
Full Paper


Various Software Metrics Aid for Measuring Cloud SAAS (Software-as-a-Service)

Pallavi Narang, Dr. I.S.Hudiara, Dr. Sawtantar Singh Khurmi

Cloud computing emerges as a new computing paradigm which aims to provide reliable, customized and QoS (Quality of Service). Classification of services of clouds can be made available to different industries but by the use of metrics are widely used to judge the quality of source code, enabling a software organization to more effectively focus its attention on the lower-quality portions of their portfolio. In this paper basic concept of the use of metrics in cloud computing is discussed that are widely used to judge the quality of source code, enabling a software organization to more effectively focus its attention on the lower-quality portions of their portfolio. The advantages of classical Metrics tools include wide acceptance of basic value of metrics, unbiased assessment of source code quality, repeatability of measurements, ease of measurement, and ability to judge progress in enhancing quality by comparing before and after assessments, it is also discussed the need of metrics in improvement of services of clouds. This paper reviews various metrics used to measure cloud services like efficiency, sensitivity etc.
Full Paper


Performance Analysis AQM Using REM and FQ Algorithmsunder Flooding Based DDoS Attacks

Harjinder Singh, Vinod Kumar Sharma

In this paper Performance analysis of Active Queue Management method using REM and FQ algorithms under Flooding based DDoS attacks. These attacks are performed in TCP and UDP protocol under the different-2 strength of attack and check the performance of protocols. In Flooding is a Denial of Service (DoS) attack that is considered to bring a network or service down by flooding it with large amounts of traffic. These attacks are performed in NS2 simulator.
Full Paper


A Metric – based Approach to Evaluate the Service-Oriented Architecture

Parminder Kaur, Hardeep Singh

Service-oriented Architecture (SOA) is becoming an extensive field in research as well as popular architecture pattern because of its support towards quality attributes like performance, scalability, interoperability, reliability etc. For qualitative analysis of SOA, focus is towards its measurement. Existing metrics for Object- Oriented systems are in use to measure it. But, the major focus is contributed towards quality-of-service offered by SOA. This paper highlights the existing work that deals with structural metrics as well as quality metrics. A Metric-based approach is discussed to evaluate the different quality factors of SOA.
Full Paper


Comparative Study and Performance Evaluation of Search Engines

Rishu Grover, Ramanpreet Singh, Vikas Kumar

Web has become an essential part of our lives, whenever any type of information is to be needed then this is the first source which helps the user to search any content using textual queries. Due to the rapid growth of internet, there is variety of Images available on internet. User can search any image by using some keywords related to that. There are so many search engines available which provides information to the user according to their textual query. This paper explores features of various search engines an evaluation of performance according to the usage of end user’s experience. To measure the performance we have conducted a survey which provides detailed analysis.
Full Paper


A Novel Survey on an Intelligent and Efficient Load Balancing Techniques for Cloud Computing

Kamlesh Kumar, Somil Kumar Gupta, Govind Singh

Cloud computing is a currentbuzzword in the market. It is an emerging technology now a days which focus onthe distributed database system which generally concern with the unavailability of the global clock as well as a shared memory and is totally correlated with internet as a service.

Central issue behind cloud is an effective load balancing technique. Load balancing is one of the main challenges in cloud computing which is required to distribute the dynamic workload across multiple nodes to improve both resource utilization as well as job response time while avoiding the situation where some nodes are heavily loaded and some nodes are in idle position. So we distribute the workloads across multiple computer clusters, network links, Central Processing Unit or other resources. The availability of a Virtual Machine in cloud is one major concern of cloud computing. So if we focus on the virtual servers then to manage the resource allocation process in virtual machines plays a vital role.

The aim of this paper is to discuss the concept of cloud computing as well as the energy consumption while using this service and to increase the performance matrix of the system. Energy consumption is used for the energy-efficient load balancing. We will further discuss the techniques used in load balancing.
Full Paper