IJSPR: Volume 09 Number 02
Latest News    IJSPR Volume 16, October 2015 Edition Published Successfully.         Call for Papers: November 2015    IJSPR Inviting Original Research Papers for Volume 17, November 2015 Edition.

IJSPR - Volume 09, Number 02

Published On : March 2015
SNo. Paper Title & Authors Page
11
Abstract: Now a day’s development of internet leads to larger size of data. This data is usually stored in a database. When these data is accessed from the web and web extraction techniques were used to maintain such types of records then these databases are known as web databases. Current trends show the vital use of such data bases are growing rapidly. The data units returned from such database are usually encoded into the result pages dynamically for human browsing. These are mainly used by various search engines. In this paper we are going to present some techniques for annotating search based result from web databases.
Keywords:Search, Annotation, Web, Human Browsing.
48-53
12
Abstract: The aim of this paper is to develop various network utilities which are essential to effectively monitor a LAN network. The aim of this paper is development of an integrated software solution that allows the network administrator to monitor his LAN by his android cell. In concern of LAN, computers are clustered together to create a network, to manage and control activities of network while you are in office is an easy task but when you are not present in office, then monitoring and controlling of network when you are not physically available in the office you have to depend on third party for the LAN status information, due to this reason you can always have your cell phone to serve the purpose of login to an application anytime and see who is busy with what task which are assigned to them in the office. This paper aims to provide the maximum details about the network to the administrator on their mobile phone, when administrator is not in the office but present within the WI-FI range.
Keywords:LAN, GSM, SMS, Wi-Fi, J2SE, Remote Monitoring.
58-60
13
Abstract: Wild fruits available in plenty with rich sources of various vitamins, minerals, fibers, polyphenols provide various health benefits that reduce the risk of several diseases like diabetes, cancer, coronary heart disease, neurodegenerative ailment, were not properly utilized by the people. The design of the study titled “Estimation of Antioxidant property of Tamarillo - (Solanum betaceum) and A Value Added Product Tamarillo Sauce” is made to assess the phytochemical and antioxidant properties of Tamarillo and effective utilization of the fruit through a value added product. This study showed that the antioxidant activity for both the tamarillo and the tamarillo sauce was reported as 208 and 211 mg AA eq /100g and the other proximate analysis showed that the fruit is also rich in nutritive property, which can provide all the nutrients need for the body. The development of value added product which is also rich in antioxidant and nutritive properties will be a good source to gain nutrient as well as antioxidant property, which could also generate an additional income to the farming community.
Keywords:Tamarillo, Phytochemicals and Antioxidant property, Tamarillo sauce, Nutritive analysis.
61-65
14
Abstract: Phishing emails usually contain a message from a credible looking source requesting a user to click a link to a website where user is asked to enter a password or other personal information. Most phishing emails aim at withdrawing money from financial institutions or getting access to personal information. Phishing has increased hugely over the last years and is a serious threat to global security. Phishing has become the most popular practice among the criminals of the Web. URL, Domain and textual content analysis of email will results in a highly accurate anti phishing email classifier. We proposed a new antiphishing technique where we considered the advantages of whitelist, black list and heuristic technique for increasing accuracy and reducing false positive rate as well as true negative rate. We are using textual analysis, Domain analysis and URL analysis of e-mail in heuristic technique. Most of the phishing mails have similar contents, our proposed method Bait Alarm-antiphishing using visual similarities will increase the performance by analysing textual contents of email and lexical contains of URL analysis. It will detect legitimate mail if DNS is present in whitelist and if DNS is present in black list then it is considered as phishing mail. If it is not present in white list as well as blacklist then it is analyzed by using pattern matching with existing phishing DNS test and contents found in email and analysis of actual URL analysis. With the help of white list and black list we are avoiding detection time for phishing and authorized email. Simultaneously we are decreasing false positive rate by combining features of DNS, pattern matching ,textual content analysis of email and URL analysis.
Keywords:Hyperlink, iFrame, Network Security, Phishing, URLObfus-cation, Anti-phishing.
66-69
15
Abstract: Flying CV is a concept in which, the trend will be established where the company will ask for the FLYING CV instead of general CV. This will result in ease of work for both companies and employees who are registering on FLYING CV. Also in the present situation job aspirants do many frauds with the company by providing fake information to the company, so we are developing admin panel for having a control over application. We are also providing a security using steganography.
Keywords:Steganography algorithm, database security.
70-72
16
Abstract: With the spread of digital data around the world through the internet, the security of the personal data has also need to increase. In today’s world, every person is using the internet for sending the digital data like personal information, bank account information etc. But this information is sending in unsecure environment that’s why the data is not secured. For this, many methods are coming up to protect the data from going into hands of attacker. Cryptography is encryption and decryption technique for keep data secure. The main purpose in cryptography is to make message concept unintelligible, while steganography aims to hide personal secret message. For security purpose, digital images are best excellent carriers of hidden information. In this paper, we propose a high-performance text & image Cryptography along with a substitution encryption methodology. The new invented algorithm is use for acquiring the (R, G, B, A, X, Y) value of every pixel of image and the threshold value is added in it for security purpose. Experimental results show that the visual and the statistical values of the image with encrypted data before sending are similar to the values after receiving thus reduces the chance of the confidential message being detected and enables secret communication.
Keywords:Cryptography, plaintext, encryption, decryption, ciphertext, substitution cipher, Optical character recognition, AES algorithm, Image encryption algorithm.
73-77
17
Abstract: Software reuse and software maintenance are critical issue in the software reengineering. Software maintenance cost defines the time when to redevelop a software product also software define select those components among already available software for reuse. This paper evaluates the various techniques to evaluate the software maintenance cost or software reuse. Various static and dynamic metrics are used to find the whether or not to reuse the software component and also various metrics define the software maintenance cost.
Keywords:Software re-engineering, software reuse, software maintenance.
78-82
18
Abstract: In the wireless data communication the signals present in the transmission environment interfere with the communicating signals causing an undesired signal reception. This may further cause processing of wrong data. So the transmission error sensitive communication systems are always in need of an efficient encoder and decoder hardware interface that are capable of error detection and correction. Convolution encoder and decoder provide an easy to implement hardware in the same direction. The error handling efficiency of different convolution decoders vary with respect to their hardware designs and implemented algorithm for error detection and correction. Viterbi decoder provides one of the efficient techniques of error detection and correction to the communication systems. It is a Trellis code modulation decoder. There are various hardware implementations of viterbi decoder. A rate 1/3 decoder is a technique that encodes a single bit data in a 3-bit encoded data. This encoded data is decoded to effectively detect and correct single bit error with perfect efficiency. But the effects of burst error are not effectively judged using the technique because of the un-predictability of random effects of the burst error on the transmission data. In the proposed work a modified design of Viterbi decoder is simulated on a field programmable gate array device with the concept of burst error identification. In the proposed design, logical bit count comparator hardware is used to count the number of logic-‘1’ and logic-‘0’ and to transfer the information using a single-bit with the transmission data towards the receiver end. At the receiver, the same information is derived from the decoded data to authenticate the absence of the burst error with respect to the encoded data. A comparison of the conventional viterbi decoder simulation result and the proposed design is also presented in this work. The present work shows the simulation result with burst error identification using the proposed concept.
Keywords:Bit-comparator, Burst error, Convolutional Code, Error Correction, Error Detection, FPGA, Trellis Code Modulation, Viterbi Decoder, Viterbi Encoder, VHDL.
83-88
19
Abstract: This project aims to create a new encryption algorithm that changes the value of the bits containing information within a byte by regular linear reversal of bits. The idea is to provide a fast and efficient algorithm that can encrypt or decrypt any file of any format using the same amount of time as per its size, in other words the larger the file the greater the cost to encrypt but with better security. This encryption algorithm works in lower order of bits so there is no set way to determine or calculate the original plaintext from the cipher text without the key.
Keywords:Encryption, Decryption, key, Bit reversal, BiRE.
89-90