IJSPR: Volume 05 Number 02
Latest News    IJSPR Volume 16, October 2015 Edition Published Successfully.         Call for Papers: November 2015    IJSPR Inviting Original Research Papers for Volume 17, November 2015 Edition.

IJSPR - Volume 05, Number 02

Published On : November 2014
SNo. Paper Title & Authors Page
1
Abstract: With an increase in the size of documents, the task of searching the important and relevant information has become very tedious. Hence, a summarizer would prove vital towards reducing human efforts. Text summarization is an important activity in the analysis of high volume text documents and is currently a major research topic in Natural Language Processing. The summarizer proposed generates a summary based on tokenization, stop word removal, Term Frequency-Inverse Document Frequency (TF-IDF), calculation of similarity measures, separation of important sentences and generation of the final summary using custom input.
Keywords- Text Summarization, Term Frequency-Inverse Document Frequency(TF-IDF),Natural Language Processing
1-4
2
Abstract: In existing systems there was lot of overheads for computing security tasks like data storage and encryption and decryption of data files. Which was more time consuming for processing of data in cloud environment. This is the main disadvantage of these system. In addition there was no provision for controlling the data by data owner. Again for verification of attributes with their own data is also having more computational and storage overheads. We proposed a system which addresses these previous security threats, We design data encryption technique for individual data blocks with key rotation using 256 bit symmetric key. In addition data users can request and do operations on their data like insert, update, delete etc. very efficiently. We are using the two main algorithms Advanced Encryption Standard (AES) and hashing algorithm (SHA1) .These two algorithms are used for data security.AES algorithm is used for the data encryption/decryption and SHA1 is used for hashing. we are designing three separate modules that are Trusted Third Party Auditor ,Cloud Service Provider and Data Owner . By using these three modules, we are achieving the phenomenon result that is secure data retrieval in cloud systems using Key Rotation. In our system there is provision for securing the file access if two clients are connected in LAN network that means files are not sharable among the multiple clients and the authorized user having access for those files for particular time span only which is allocated to him or her.
Keywords- data storage; encryption and decryption of data; data owner; verification of attributes;third party auditor; cloud service provider,AES algorithm, SHA1 Algorithm .
5-10
3
Abstract: Routing is a process of selecting path in a network along which the packets are sent over the network traffic. There are many routing algorithms which are used to determine the path, load, and distance over the network traffic. Hierarchical routing algorithm is one of the adaptive algorithms used to reduce the size of routing table. Drawback of this algorithm is that the reduced table size comes at the expense of increased path length. In this paper hierarchical routing algorithm is analyzed and a new algorithm is proposed to reduce the drawbacks of this algorithm.
Keywords- Hierarchical routing, BHOR algorithm, clusters, regions, zones.
11-15
4
Abstract: Personalized search engine is a search engine that helps users to pick up the useful information for them quickly according to their interest, which are stored in the database. Personalized search engine can sort the results according to users' interest, the results that user likes will beat the top of the results.Unnecessary exposure will be avoided and relevant results will be obtained. When a query is fired, the results provided by the search engine are filtered using ODP (Open Directory Project) operations. When a similar query is fired again, more precise results will be displayed to user. Thus Personalized web search has been efficiently carried out. It is a good measure to use Vector Space Model to help us implement the personalization. We use Vector Space Model to model the user interest and the result, then we use cosine angel to calculate the similarity of these interest. This paper describes the design and implementation of this system by using result and user modelling.
Keywords- Privacy Protection, personalized web search, utility, ODP, profile.
16-18
5
Abstract: An ideal parallel sorting algorithm which uses P processors would reduce this time by at most a factor of P, simply because any deterministic parallel algorithm can be simulated by a single processor with a time cost of P. This leads us to the observation that an ideal comparison-based parallel sorting algorithm would take time NPlogN. Of course, this totally ignores the constant computational factors, communication costs and the memory requirements of the algorithm. All these factors are very important in the design of a parallel sorting algorithm.
Keywords- Parallel Processor, Parallel Shorting algorithm, Communication Cost, Memory requirement
19-23
7
Abstract: In railway transportation, specific track circuits are used to guarantee that a specific track section is free for circulation of railway vehicles. Common track circuits consist of two signaling subsystems physically placed at two certain points of the rail track delimiting then a track section The main proposals for track circuits can be found in how to identify the presence of a vehicle in a certain section, the type of transmitted signals, and the way the measuring circuit is coupled to the railway tracks. In some of them train presence is basically detected by comparing the received signal amplitude with a certain threshold. The transmitted signals are captured and then analyzed to determine the train positions since the closer the train, the lower the received amplitude at the measuring system. Sometimes, the correlation with the transmitted signal is searched to increase confidence in the detection. furthermore, this system must be periodically calibrated since empty-track features can change according to the state of tracks, weather conditions, etc. Other systems encode the emitted signal, so the receiver can correlate the reception with this code and compare its value with a determined threshold. This encoding should be immune to any system noise. This work proposes a novel track circuit based on the encoding of the electrical transmissions with Kasami codes. Track circuit emitters send signals coded with a known sequence that can be identified by the corresponding receivers using correlation techniques; these processes increase immunity to noise and changes in environmental conditions. To increase the fault tolerant transmission reliability we use fuzzy logic control. An appropriate selection of orthogonal sequences for encoding, as well as different carrier frequencies for transmissions, allow simultaneous emissions and receptions without cross interference.
Keywords- Field-programmable gate array (FPGA) implementation, Kasami code-division multi-access, rail track circuit, railway traffic control.
28-35
8
Abstract: Orthogonal frequency division multiplexing (OFDM) has been received as a standard for different high information rate wireless correspondence frameworks because of the ghastly transmission capacity effectiveness, heartiness to recurrence specific blurring channels, and so forth. Not with standing, usage of the OFDM framework involves a few challenges. One of the real disservices is the high peak-to-average power ratio (PAPR),which brings about entomb transporter impedance, high out-of-band radiation, and bit lapse rate execution corruption, basically because of the nonlinearity of the high power amplifier. This paper proposed a technique which significantly enhanced the performance of the MIMO OFDM system in addition with selective mapping(SLM), here we have used median filtering which is linear in nature and does not increases the complexity of the system. From simulations results it is clear that the proposed approach is making future technology more robust for OFDM system.
Keywords- Orthogonal frequency division multiplexing (OFDM), partial transmits sequences (PTS), peak-to-average power ratio (PAPR), selected mapping (SLM), and tone reservation (TR).
36-41
9
Abstract: This day’s wireless sensor networks draw the attention of researchers more due to their admired applications in environment monitoring systems, radiation uses and nuclear-threat detection applications; weapon sensors for ships; battlefield reconnaissance and surveillance; military power, control mechanism, intelligence centre, communications and targeting systems and biomedical applications. Wireless sensor network provides cheap cost solution to various world problems. Sensors are low cost devices with limited storage, computational power systems. Several security mechanisms for sensor network must be energy efficient as security is the major concerned when they will be used in large scale as sensors have limited power and computational capability and should not be computational intensive. In this review paper we study the various energy-efficient secure routing methods for WSN.
Keywords- WSN, LEACH, Energy, Efficient, Routing.
42-47
10
Abstract: Visual information transmitted in the form of digital images is becoming a major method of communication in the today’s scenario, but the image obtained after transmission is often corrupted with noise. The received image requires processing before it can be used in applications. Image denoising involves the operation of the image data to produce a visually high quality image. This reviews the existing denoising methodology, such as filtering technique, wavelet based technique, and multifractal method and performs their comparative study. Various noise models including additive and multiplicative types are used. Gaussian noise, salt and pepper noise, speckle noise and Brownian noise are considered. The filtering approach has been proved to be the best when the image is corrupted with salt and pepper noise. The wavelet based technique finds applications in denoising images corrupted with Gaussian noise. In the noise characteristics are complex, the multifractal approach could be used.
Keywords- Wavelet transform, Median filter, PSNR and RMSE.
48-52