{"title":"Digital image authentication and encryption using digital signature","authors":"S. Alam, A. Jamil, Ankur Saldhi, Musheer Ahmad","doi":"10.1109/ICACEA.2015.7164725","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164725","url":null,"abstract":"In this paper, a methodology for digital image authentication using digital signature is proposed. The hash of the original image is taken and is encrypted by RSA. The digital signature obtained is concealed in the image. Digital signature is sent along with the encrypted image which decreases the probability of meticulous attack by the intruder. The encrypted image is shuffled using Chaotic Logistic Map to get the final shuffled encrypted image. The use of Logistic Map improves the randomness in the image. For the authentication, a comparator is employed which evaluates correctness of the hash extracted. The simulations have been carried out to examine the proposed authentication and encryption technique.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"92 1-3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114016775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Prevention of shoulder surfing attack using randomized square matrix virtual keyboard","authors":"Pradyumn Nand, P. Singh, Joy Aneja, Yash Dhingra","doi":"10.1109/ICACEA.2015.7164836","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164836","url":null,"abstract":"Password authentication in public space or using public computer infrastructure often poses the problem of disclosure either through spywares like keyloggers installed on target machine or a malicious onlooker who observes while the victim enters the password. Virtual keyboards offer protection against keyloggers but fail to prevent shoulder surfing. Recent attempts have attempted to improvise these keyboards by dynamically loading and changing the layout to confuse the snooping miscreant. Some attempt to introduce graphical passwords which have to be drawn in a particular geometry to authenticate the user. But even then they are vulnerable to attacks like screenshot capture, are not easy to integrate with existing systems & services and have major usability issues like longer authentication time, complexity in understanding among others. PassBoard is a new approach to tackle this problem.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122959812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Combined horizontal and vertical projection feature extraction technique for Gurmukhi handwritten character recognition","authors":"M. K. Mahto, K. Bhatia, R. Sharma","doi":"10.1109/ICACEA.2015.7164646","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164646","url":null,"abstract":"Despite the advancements in Optical Character Recognition (OCR) technologies, problem of Indic script character recognition remains challenging. Especially in case of handwritten characters the challenges are even more. In this work, we focus on off-line recognition of handwritten characters of Gurmukhi, an Indic script commonly used in state of Punjab in India. As a part of this work, we collected a Gurmukhi character dataset of 3500 images. This dataset is collected from 10 writers. We propose a combined horizontal and vertical projection feature extraction scheme for recognition of Gurmukhi characters. We have tested our method on the collected dataset and achieved a high character recognition accuracy of 98.06%.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121772948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Formal specification of asynchronous checkpointing using Event-B","authors":"Natthan Singh, M. Chandra, Divakar Yadav","doi":"10.1109/ICACEA.2015.7164773","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164773","url":null,"abstract":"The major issue in distributed systems is the recovery from some short term failures. It is desired to have transparent scheme for recovery, from such failures, which is efficient as well. Checkpoint is the one of the scheme. Checkpoint-based protocols simply depend on checkpointing in order to get system state restoration. Generally, checkpointing may be categorised as synchronous, asynchronous or communication-induced. While, there is another mechanism, log-based, in which checkpointing also include logging of nondeterministic events. These events are encoded in tuples known as determinants. A formal reasoning is required to precisely understand the behaviour of such techniques and to understand how they achieve the objectives. Event-B is a formal technique which gives a framework for the distributed systems by mathematical models. We are presenting a formal development of asynchronous checkpointing using Event-B in this paper.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115054741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of e-learning web application's alignment with six facets of understanding","authors":"R. Kamatchi, Kimaya Ambekar","doi":"10.1109/ICACEA.2015.7164737","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164737","url":null,"abstract":"E-learning web applications are a boon for the learners which provide the abundant knowledge at their doorsteps. This has wrecked the barriers between the mentor and the learner to make the educational system more interactive and effective. These portals not only focus on content delivery, but also concentrate towards the demonstration and continuous evaluation. Even though the effective delivery is an important quotient of any teaching learning process, the level of understanding among the learners are to be analyzed and evaluated concurrently. The alignment of e-learning portals with the understanding facets is the essential and challenging task. This paper focuses towards the analysis of web portal alignment with the understanding facets and the ways and means to analyze the alignment. The first part of this paper focuses on the advent of elearning and the facets of understanding. The second part describes various parameters to analyze the alignment of elearning web applications with the measurement procedure. The final part of this paper depicts the actual analysis and the results found.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114561802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exhaustive study of SDLC phases and their best praxctices to create CDP model for process improvement","authors":"Rachna Lekh, Pooja","doi":"10.1109/ICACEA.2015.7164852","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164852","url":null,"abstract":"This paper reveals the study of sub methods of the phases of SDLC i.e. Software Development Life Cycle. Some methods or sub-practices are always required to execute each and every phase. There is always a need of some procedures, steps, methods and processes to build anything whether it is software or anything. Even a recipe needs a proper steps otherwise it will give a bad taste. An appropriate approach or accurate steps are to be followed always to construct a quality product. Various models, standards and processes have been introduced by ISO, CMMi etc to follow a proper approach to reach the destination. There was a need to find a method which would be suitable for company/organization. As companies have to manage each and everything with the existing resources by keeping in mind the quality and goal of customer. This paper represents the exhaustive study of the sub-methods or sub-practices of SDLC phases as per the process areas of CMMi and a model which shows the best suited combinations of various methods to achieve the desired product as per the requirements and existing resources. This is was the part of process improvement of a software organization “Saber Corp(Made-Up)”. This whole paper represents the CDP model which was the output of process improvement process of company Saber Corp.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"385 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123355156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Soft computing technique based on ANFIS for the early detection of sleep disorders","authors":"V. Garg, R. Bansal","doi":"10.1109/ICACEA.2015.7164649","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164649","url":null,"abstract":"Sleep is a great natural occurring state in which everything is forgotten for a while, become fresh and ready for next coming daily routine exercises. Any person can lag in these exercises, if their sleep is not well taken. But, sometime it is observed that the sleep gets disturbed due to some awkward behaviors known as sleep disorders. The various intelligent techniques/methods are proposed for the diagnosis, detection and classification of sleep disorders, sleep spindles and other sleep related events. In this paper, a system is proposed based on physio-psycho symptoms by using an adaptive neuro-fuzzy inference system (ANFIS). The major concern is taken towards the early detection of only four sleep disorders that are Sleep Apnea, Insomnia, Parasomnia and Snoring. The prior detection of all these disorders are having a prime importance, as it can help a person to safe itself from the further effects that can arise from these sleep disorders. To implement the system, the data set is collected from various physicians comprising the record of 96 patients.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124930139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integration of heterogeneous databases","authors":"B. Garg, Karamjit Kaur","doi":"10.1109/ICACEA.2015.7164859","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164859","url":null,"abstract":"Database integration implies the integration and aggregation of data from different databases within or outside the organization and use that integrated data in many real time applications. Today, due to cloud computing come into the picture there is a need of sharing the resources and need to achieve consistency also. But there are some problems like we have different platforms, different query languages, different data models, different dependencies exist among databases and applications. So, integration solves all above problems and provides a transparent environment to the user.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121874179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and development of peer to peer web caching technique for mobile Ad-Hoc networks: A review","authors":"Bhagyashree V. Vaidya, Ramchandra S. Mangrulkar","doi":"10.1109/ICACEA.2015.7164687","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164687","url":null,"abstract":"In this paper we analyze one technique for web caching in MANET. MANET stands for Mobile Ad Hoc Network which is an evolving concept. There are many emerging researches focused on MANET aspects such as routing and caching. Among them, the lack of efforts done on MANET web caching is acknowledged. As the node in MANET is moving, the web caching is difficult task. The paper reviews the traditional web caching techniques to improve the performance of MANET. In previous techniques, Better Approach to Mobile Ad-Hoc (B.A.T.M.A.N.) is a web caching protocol which is implemented for MANET. The overall performance of B.A.T.M.A.N. is more time consuming. The proposed technique improves the performance of web application in MANET by reducing internet bandwidth. Also preserves the energy consumption. This peer to peer web caching concept purely focused on web applications in MANET.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121883497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative study of Mamdani-type and Sugeno-type fuzzy inference systems for diagnosis of diabetes","authors":"Jimmy Singla","doi":"10.1109/ICACEA.2015.7164799","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164799","url":null,"abstract":"Fuzzy inference systems for diagnosis of diabetes are developed using Mamdani-type and Sugeno-type fuzzy models. The outcome obtained by two fuzzy inference systems is evaluated. This paper summarizes the essential variation among the Mamdani-type and Sugeno-type fuzzy inference systems. MATLAB fuzzy logic toolbox is used for the simulation of both the models. This also confirms which one is a superior choice of the two fuzzy inference systems for diagnosis of diabetes.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"08 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123850743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}