IJCST Logo










 

International Journal of Computer Science and Technology
IJCST 9.3 (July-Sept 2018)

S.No. Research Topic Paper ID Download
1

Detecting Malicious Webpages using Virustotal API

Benazeer

Abstract

Cell phone specific webpages differ significantly from their desktop equivalent in content, layout and functionality. Consequently, existing techniques to find malicious websites are not likely to work for such webpages. In this work we use a Virustotal API. Virustotal API is a mechanism that identifies malicious webpages. Virustotal makes this determination based on dynamic features. The Virustotal API lets the user scan the URL’s and search through the dataset to determine malicious web pages. We tentatively exhibit the requirement for mobile specific procedures and after that recognize a scope of new successful highlights that exceptionally correspond with mobile malicious sites. Moreover, we discover, define, report quantity of webpages missed by Google safe browsing, and detected by our application.
Full Paper

IJCST/93/1/A-0902
2

Facet Browsing in E-Commerce for Searching best Faceted Product form Product Search Engine

Fizza Taimoor Khan

Abstract

Faceted browsing is analytic search model where facets benefit in the interactive navigation of search results. Facets are attributes that have been assigned to describe product being look into. A faceted classification is a collection of facets provided by the interface and is often organized as sets, hierarchies, or graphs. Because of the large amount of product count, web shops usually make a static information to determine which facet should be displayed yet the process is still difficult to theoretically handle the model in a manner that supports the development of faceted search. We propose an approach for faceted browsing and demonstrate how the targeted faceted product can be computed in minimal amount of time period.
Full Paper

IJCST/93/1/A-0903
3

Security Issues in MANET: A Review of Black Hole Attacks in MNET

Anshita Dharmawat, Dr. Sanjay Agal

Abstract

Security in Mobile Ad-Hoc Network (MANET) is the most important concern for the basic functionality of network. Availability of network services, confidentiality and integrity of the data can be achieved by assuring that security issues have been met. MANET often suffer from security attacks because of its features like open medium, changing its topology dynamically, lack of central monitoring and management, cooperative algorithms and no clear defense mechanism. These factors have changed the battle field situation for the MANET against the security threats.
Full Paper

IJCST/93/1/A-0904
4

Developing Augmented Reality Application for Booths in Event using Natural Feature Tracking as a Marker

Indrawan, Desi Ramayanti

Abstract

This paper presents an approach of using Information Technology as a tools that could attract larger audience for booths in certain event. By using Augmented Reality, this paper try to ease the problem that businesses faced on event, that is to give information to visitor about their products or company profile. In this paper, we use NFT (Natural Feature Tracking) as main marker. It’s easier for layman to use AR if the marker is NFT. Even though on testing state, we found out that using NFT have a problem in distance from camera to marker. If the camera too far from the marker, the virtual data won’t show up on the screen. On testing phase, if the marker on the screen of laptop or computer, we have at maximum 2 meters until the virtual data won’t show up on our phone screen, while if the marker was printed on the A4 paper, we could scanned the marker at maximum 3, 5 meters. The result of this paper is application that easy to use for user and businesses could create their own content to their own application.
Full Paper

IJCST/93/1/A-0905
5

Facial Expression Classification using Distance Measures for Emotion Detection

Ritika Sharma, Ritika Mehra

Abstract

Facial Expression Recognition (FER) has essential real world applications. Its applications include, but are not limited to, Human Computer Interaction (HCI), psychology and telecommunications. It remains a challenging problem and active research topic in computer vision, and many novel methods have been proposed to tackle the automatic facial expression recognition problem. The main challenge here is to perform decoupling of the rigid facial changes due to the head-pose and non-rigid facial changes due to the expression, as they are non-linearly coupled in images. Another challenge is how to effectively exploit the information from multiple views (or different facial features) in order to facilitate the expression classification. Thus, accounting for the fact that each view of a facial expression is just a different manifestation of the same underlying facial expression related content is expected to result in more effective classifiers for the target task. The facial expression image sequence contains not only image appearance information in the spatial domain, but also evolution details in the temporal domain. The image appearance information together with the expression evolution information can further enhance recognition performance. Although the dynamic information provided is useful, there are challenges regarding how to capture this information reliably and robustly. For instance, a facial expression sequence normally constitutes of one or more onset, apex and offset phases. In order to capture temporal information and make temporal information of training and query sequences comparable, correspondences between different temporal phases need to be established. As facial actions over time are different across subjects, it remains an open issue how a common temporal feature for each expression among the population can be effectively encoded while suppressing subject-specific facial shape variations. In this work, a new dynamic facial expression process is created using Efficient Distance Measures for Emotion detection.
Full Paper

IJCST/93/1/A-0906
6

Web GIS Development using Open Source Leaflet and Geoserver Toolkit

Taranjot Singh Bhatia, Harpinder Singh, P.K Litoria, Brijendra Pateriya

Abstract

Popularity of location based web and mobile applications is increasing day by day. The visualization of locations is bit complicated than tabular data. Specialized software are required to build a web GIS (Geographic Information Systems) application providing easy access to geo-spatial data to a large number of people. This paper reviews a simple and easy to use methodology to create a web GIS application using open source tools. Leaflet, Geoserver and PostgreSQL have been used to create the application. Leaflet is used to create the GUI (Graphical user interface), Geoserver acts as a middleware and PostgreSQL is used as a backend data store. The web GIS has basic functionalities like pan, zoom, home, info window, measure, legend button, geo-location, search bar, layer selection, mini map, attribution, mouse position etc.
Full Paper

IJCST/93/1/A-0907
7

Survey and Analysis of Current Methods of Image Encryption Algorithm based on DNA Sequencing

Priyanka, Deepika Arora

Abstract

The normal software system reliability estimation ways typically believe assumptions like statistical distributions that are typically unrealistic. The power to predict the amount of faults throughout development part and a correct testing method helps in specifying timely unharnessed of software system and economical management of project resources. The normal approach of fault prediction using software system reliability growth models needs an outsized variety of failures which could not be on the market at the start of the testing. models when compared for results, revealed that the Goel-Okumoto model performed better than Yamada Delayed S-Shaped model for estimation of failures for given data.
Full Paper

IJCST/93/1/A-0908
8

Enhanced Integrity Preserving Homomorphic Scheme for Cloud Using Diffie Hellman

Tamanna Gupta, Ritika Mehra

Abstract

Distributed computing, the new term for the since quite a while ago imagined vision of processing as an utility empowers helpful, onrequest organize access to a unified pool of configurable figuring assets (e.g., systems, applications, and administrations) that can be quickly sent with incredible effectiveness and insignificant administration overhead. The stunning preferences of Cloud Computing include: on-request self-benefit, pervasive system get to, area autonomous asset pooling, quick asset versatility, utilization based valuing, transference of hazard, and so forth… Thus, Cloud Computing could without much of a stretch advantage its clients in maintaining a strategic distance from huge capital costs in the arrangement and administration of both programming and equipment. Without a doubt, Cloud Computing brings remarkable outlook changing and benefits ever of. As Cloud Computing winds up common, more touchy data are being incorporated into the cloud, for example, messages, individual well being records, private recordings and photographs, organization back information, government archives, and so forth. By putting away their information into the cloud, the information proprietors can be eased from the weight of information stockpiling and support in order to appreciate the on-request excellent information stockpiling administration. Be that as it may, the way that information proprietors and cloud server are not in the same trusted area may put the outsourced information in danger, as the cloud server may never again be completely confided in such a cloud domain because of various reasons: the cloud server may spill information data to unapproved elements or be hacked. Information security and protection are the basic issues for remote information stockpiling. A protected client upheld information get to control component must be given before cloud clients have the freedom to outsource touchy information to the cloud for capacity. With the development of sharing secret corporate information on cloud servers, it is basic to receive a proficient encryption framework with a fine-grained get to control to scramble outsourced information. Quality based encryption is an open key based encryption that empowers get to control over scrambled information utilizing access arrangements and credited properties. In this work, we are going to examination completely Homomorphic plans for encryption and honesty check utilizing MD5 Algorithm.
Full Paper

IJCST/93/1/A-0909
9

Designing and Implementation of a Flexible Institution System According to New Standards to Ensure the Quality of Educational Process in Higher Education Institutions

Dr. Mozamel M. Saeed

Abstract

This paper aims to benefit from advanced Information and Communication Technology (ICT) to improve teaching and learning process. This will be done through the design of a flexible system to measure the performance and quality of educational institutions according to new standards to ensure quality in the educational process, based on the components of the educational process, represented in members of the academic staff, the level of students, academic programs, university administration and buildings & utilities, in order to cope with the difficulties encountering the educational process in its current situation, which acts as an obstacle for ensuring the quality of its output.
The paper concluded (through the designed model) to provide a flexible standard that commensurate with the various educational environments, through which measurement of standard implementation range, quality standards and practices in the institution, in addition to points of weakness that necessitate improvement process to guarantee quality of its output by what achieves the entire targets of the institution.
Full Paper

IJCST/93/1/A-0910
10

Artificial Intelligence and its Application as an Integrated Approach

Sandeep Kulkarni, Vipan Kumari

Abstract

As technology, and, importantly, our understanding of how our minds work, has progressed, our concept of what constitutes AI has changed. Rather than increasingly complex calculations, work in the field of AI concentrated on mimicking human decision making processes and carrying out tasks in ever more human ways.
AI devices, which are designed to act very intelligently are often categorized into one of two fundamental groups, applied or general. Applied AI systems can intelligently trade stocks and shares, or even stretch as far as maneuvering an autonomous vehicle. These type of AI systems are generally widespread.
Neural networks have been instrumental in teaching machines to understand world the same way we do. They accomplish this objective, while retaining innate advantages, such as speed, accuracy.
Full Paper

IJCST/93/1/A-0911
11

Localizing Node Failures in Network Topology and Locations of Monitors

Malla Navya, Dakineni Durga Prasad

Abstract

Identifying node failures in wireless networks is extremely testing on the grounds that the network topology can be exceptionally unique, the network may not be constantly associated, and the assets are constrained. In this paper, I adopt a probabilistic strategy and propose two node disappointment discovery conspires that methodically consolidate confined checking, area estimation and node joint effort. Broad recreation results in both associated and detached networks show that our plans accomplish high disappointment recognition rates (near an upper bound) and low false positive rates, and cause low correspondence overhead. Contrasted with approaches that utilization brought together checking, our approach has up to 80% lower correspondence overhead, and just marginally bring down recognition rates and somewhat higher false positive rates. Also, our approach has the referred standpoint that it is appropriate to both associated and separated networks while incorporated checking is just pertinent to associated networks. Contrasted with different methodologies that utilization restricted checking techniques. The people who can’t get information adequately brisk get none by any stretch of the reative energy, paying little mind to the likelihood that they hold up near the supporter. Various mystery enhancing techniques have been proposed in perspective of package encryption to guarantee the correspondence lack of clarity of versatile frameworks. Regardless, in this paper, we exhibit that Mobile wireless Networks are up ‘til now vulnerable under segregated statistical traffic examination attacks.
Full Paper

IJCST/93/1/A-0912
12

Defended Cloud Data Storage and Sharing in Using Revocable-Storage Identity-Based Encryption

Suresh Patnaik, Dakineni Durga Prasad

Abstract

Cloud computing would be one of technologies which is going to play a vital role in the next generation of computer engineering field. The increased scalability and flexibility provided by the cloud computing has reduced the costs to a greater extent and therefore the technology has gained wide acceptance. The facility of Data outsourcing in the clouds enables the owner of the data to upload the data and other users can access the same. But, the data stored should be secure in the cloud servers. The data owner has lot of concern about security aspects present with the cloud computing. The data owners hesitate to adopt cloud computing services because of privacy protection issues of data and security of data. It is necessary to place cryptographically enhanced access control on the shared data. Identity-based encryption is a promising crypto graphical primitive to build a practical data sharing system. Revocable-storage identity-based encryption (RSIBE), which can provide the forward/backward security of cipher-text by introducing the functionalities of user revocation and cipher-text update simultaneously. Furthermore, we present a concrete construction of RS-IBE, and prove its security in the defined security model. The performance comparisons indicate that the proposed RS-IBE scheme has advantages in terms of functionality and efficiency, and thus is feasible for a practical and cost-effective data-sharing system.
Full Paper

IJCST/93/1/A-0913
13

Autonomous Method for Object Based GUI Testing using Image Processing

Sushma Suresh K

Abstract

One of the most important and crucial steps of the software development lifecycle is testing the graphical aspects of the application’s user interface. The major challenge here is to accurately detect and test the various visual elements of the application, in order to ensure its complete functionality. The proposed method uses image processing techniques to autonomously detect objects within the GUI application, based on the shape of the object. In the process of arriving at an optimized solution, a popular blob detection algorithm (MSER) has been studied and analyzed. One of the drawbacks of this method is its high levels of sensitivity thus resulting in its poor accuracy and making it unsuitable for such an application. Keeping this in mind, an alternate object identification and localization technique has been put forward. Comparisons done after thorough experimentation indicates this method to be more accurate in terms of detecting various objects present within the GUI application, thus aiding the testing process by making it completely autonomous and fail-proof.
Full Paper

IJCST/93/1/A-0914
14

Cyber Security: The Need for Today’s Environment

Jayesh Patil, Keshav Sule, Jagjot Singh Saini

Abstract

Cybersecurity first came into consideration in the year 1988, as a result, one of the first ever registered online virus “The Morris Worm” the worm caused as many as of the 60,000 computer connected to the internet get affected by the worm and slow down. More recently cybersecurity has come to signify a form of protection from attacks designed to paralyze website, financial networks and other computer systems by flooding them with data from outside computer. At present, the biggest challenge is to secure information from cyber-attacks. Cybercrime is the main aspect of which we are moving toward the cybersecurity as they are increasing immensely day by day. In order to prevent these cybercrimes governments and companies are taking several measures i.e., governments are making strict laws against cybercrimes and companies are hiring data science specialist.
Full Paper

IJCST/93/1/A-0915
15

Identifying Mischievous Accounts in Online Social Networks

P.Sandhya Rani, Dakineni Durga Prasad

Abstract

As of Recent Years, Online Social Networks have transformed into a basic bit of step by step life for a few. With 20 million introduces multi day outsider apps are a noteworthy explanation behind the notoriety and addictiveness of Facebook. Lamentably, programmers have understood the capability of utilizing apps for spreading malware and spam. The issue is as of now noteworthy, as we find that no less than 13% of apps in our informational collection are malicious. Paper, we make the inquiry: given a Facebook application, would we be able to decide whether it is malicious? enter commitment is in creating Proguard Facebook’s Rigorous Application Evaluator ostensibly the principal device concentrated on detecting malicious apps on Facebook. To create ProGuard, we utilize data accumulated by watching the posting conduct of 111K Facebook apps seen crosswise over 2.2 million clients on Facebook. Initially, we recognize an arrangement of highlights that assistance us recognize malicious apps from considerate ones.Second, utilizing these distinctive highlights, we demonstrate that ProGuard can distinguish malicious apps with precision, with no false positives and a low false negative rate
(4.1%). At long last, we investigate the biological community of malicious Facebook apps and distinguish instruments that these apps use to proliferate.
Full Paper

IJCST/93/1/A-0916
16

A Survey on Various Encryption Algorithms

Supreetha Pai, Arathi P

Abstract

This paper is a comprehensive survey on some common encryption algorithms. Robust encryption algorithms must minimize or even eradicate all the vulnerabilities associated with secure information transfer and management. Generally, encryption algorithms convert intelligible data into an unintelligible secure format.
Full Paper

IJCST/93/1/A-0917
17

Integration of Deductive Reasoning with the Subsets of Artificial Intelligence

Mradul Mourya, Divyansh Goud

Abstract

The betterment of life is what the central theme of all the researches that are happening around us. Many psychologists came up with the theories like cognitive development, social learning, psychoanalysis, self-actualization etc. The thesis of all these researches is based somehow on human brains, behaviors, actions, etc. Similarly, in this Psychological scientific paper, we present an idea for withdrawing logical decisions with the assistance of Artificial Intelligence. Logical reasoning or deduction is one’s capability of giving conclusion (as per the circumstances). Think of amelioration of this capacity to a level where one can never get stuck in the real-world situations. In this Paper, our purpose is to reach a logical or definite conclusion. We outline the structure of logical agent who tends to do work with rationality under various environments.
Full Paper

IJCST/93/1/A-0918