{"title":"Object oriented approach to SQL injection preventer","authors":"D. Giri, S. P. Kumar, L. Prasannakumar, R. Murthy","doi":"10.1109/ICCCNT.2012.6395979","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395979","url":null,"abstract":"Many web applications can be exposed to a variety of Web-based attacks. One of these attacks is SQL injection, which can give attackers unrestricted access to the databases and has become increasingly frequent and serious. This paper presents a new highly automated approach for protecting Web applications against SQL injection that has both theoretical and practical advantages over most existing techniques. From a theoretical view, the approach is based on the idea of positive tainting and on the concept of syntax-aware evaluation. From a practical view, our technique is efficient, has minimal deployment requirements, and has a negligible performance overhead in most cases. We have implemented our techniques in the Web Application SQL-injection Preventer (WASP) tool, where a wide range of Web applications were subjected to a large and varied set of attacks and legal accesses. We considered login validation of user in an online banking system. WASP was able to stop all of these attacks and did not generate any false positives.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127762012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel approach to predict diabetes by Cascading Clustering and Classification","authors":"P. Hemant, T. Pushpavathi","doi":"10.1109/ICCCNT.2012.6396069","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396069","url":null,"abstract":"Knowledge of incidence and prevalence of a disease is vital in Community Medicine to control a disease. It is important in Internal Medicine for clinical diagnosis and presumptive treatment on a probability model. Prevalence informs the total case load at a given time. Incidence yields a pointer to extent of attention required and choice of measures. Initially K-means clustering is used to group the disease related data into clusters and assigns classes to clusters. Subsequently multiple different classification algorithms are trained on the result set to build the final classifier model based on K-fold cross validation method. This methodology is evaluated using 768 raw diabetes data obtained from a city hospital. The best accuracy for the given dataset is achieved in bagging algorithm compared to other classifiers. The proposed approach helps doctors in their diagnosis decisions and also in their treatment planning procedures for different categories.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127764577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance analysis of OFDMA in LTE","authors":"S. Prasad, C. Shukla, R. F. Chisab","doi":"10.1109/ICCCNT.2012.6395933","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395933","url":null,"abstract":"The Long Term Evolution (LTE) takes the Orthogonal Frequency Division Multiple Access (OFDMA) as the multiple access technique for downlink to transmit data from base station to the Mobile Users (MUs) because of its ability to improve the spectrum efficiency, it has flexible user resource allocation, it can overcome the problems of Inter Symbol Interchange (ISI) and Inter Carrier Interchange (ICI). This paper introduces the properties of orthogonal frequency division multiplexing, discusses the strength, weakness of OFDMA, and highlights the factor that leverages the performance of OFDMA in LTE. The graphical result shows the relation between SNR, BER, Pe with the type of modulation used in LTE.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128621785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Huddar, S. Gowri, K. Keerthana, S. Vasanthi, S. R. Rupanagudi
{"title":"Novel algorithm for segmentation and automatic identification of pests on plants using image processing","authors":"S. Huddar, S. Gowri, K. Keerthana, S. Vasanthi, S. R. Rupanagudi","doi":"10.1109/ICCCNT.2012.6396012","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396012","url":null,"abstract":"Enormous agricultural yield is lost every year, due to rapid infestation by pests and insects. A lot of research is being carried out worldwide to identify scientific methodologies for early detection/identification of these bio-aggressors. In the recent past, several approaches based on automation and image processing have come to light to address this issue. Most of the algorithms concentrate on pest identification and detection, limited to a greenhouse environment. Also, they involve several complex calculations to achieve the same. In this paper, we propose a novel and unique algorithm to segregate and detect pests using image processing. The proposed methodology involves reduced computational complexity and aims at pest detection not only in a greenhouse environment but also in a farm environment as well. The whitefly, a bio-aggressor which poses a threat to a multitude of crops, was chosen as the pest of interest in this paper. The algorithm was tested for several whiteflies affecting different leaves and an accuracy of 96% of whitefly detection was achieved. The algorithm was developed and implemented using MATLAB programming language on MATLAB 7.1 build 2011a.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128737300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SAPM: ANFIS based prediction of student academic performance metric","authors":"N. M. Zuviria, S. L. Mary, V. Kuppammal","doi":"10.1109/ICCCNT.2012.6396065","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396065","url":null,"abstract":"A methodology for evaluating the academic performance metric of students is proposed in this paper based on their performance in periodic assessment tests, attendance and complexity of the question set. These are the major features determining the students learning efficiency evaluation. The impact of these metrics plays a major role in predicting the final grade of a student. The application of adaptive neuro fuzzy inference system helps to model the frame work for evaluating Student Academic Performance Metric(SAPM). The outcome of this methodology can be used to classify the students based on their academic skill and helpful in predicting the probability of their success in the final examinations.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114293290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Madhusudanan, V. Prasanna Venkatesan, P. Karthikeyan, S. Shilpa Devi
{"title":"Smart bank simulation using Context awareness","authors":"J. Madhusudanan, V. Prasanna Venkatesan, P. Karthikeyan, S. Shilpa Devi","doi":"10.1109/ICCCNT.2012.6395892","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395892","url":null,"abstract":"Ubiquitous computing provides access to information and computing resources for the users in the place where they are, anywhere and anytime. In Ubiquitous Computing, every applications uses Context awareness as the most important properties. In particular, for smart bank, context awareness attempts to bring the best services to the bank customers. Since bank is the place where most of the people have to access the service, Smart Bank aims to provide the best services it can to the bank customer. In this paper, we propose ISBS, an Interactive Smart Bank Simulator system which aims at scheduling and simulating the behavior of an intelligent banking activity. This system aims at understanding the needs of the customers and provides the best service to the customers using an interactive simulation system. In reality it is hard to implement those systems in real time bank systems. Hence a simulation bank environment is used with virtual sensors instead of physical devices. In this research, the smart bank is considered as an environment made up of independent and distributed devices interacting to support customer services. Therefore, by using ISBS, the developer can realize the relationship among virtual device, surrounded environment, its use and bank appliances.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127436726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Survey on performance, reliability and future proposal of Cognitive Radio under wireless computing","authors":"A. Umamaheswari, V. Subashini, P. Subhapriya","doi":"10.1109/ICCCNT.2012.6395960","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395960","url":null,"abstract":"In daily life internet plays a vital role in every aspects of web usage by the end users. Its essential purpose is information retrieval, packet transmission, communication between networks via wired and wireless mode. Subsequently wireless data networks and transmission are renowned by a fixed spectrum obligation policy and therefore that spectrum utilization becomes very significant one, in which new communication techniques are keep on increasing and the spectrum bandwidth remains limited because of unlicensed users. Cognitive radio is an innovatory technology to make use of the limited spectrum more successful. Cognitive Radio (CR) aspires to look up for the spectrum utilization by taking improvement of licensed user or primary user, which are so-called unused spectrum. Cognitive Radio has extensive applications together with dynamic spectrum access allocation and interference management, which will largely blow the NeXt Generation Network (xG) for wireless devices and networks. This new networking model is referred to as NeXt Generation (xG) Network as well as known as Dynamic Spectrum Access (DSA) and Cognitive Radio Networks. Eventually the performance and reliability of CR can be increased through the cross-layer design approach in the (xG) networks. In this paper, we carry out a survey on CR networks from various portions such as waveform, spectrum management and sensing, similarities between intelligent antenna and CR, performance and reliability evaluations etc.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125839102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A complete mobile security architecture using client and server driven protocols (WMN)","authors":"N. Suresh Kumar, S. Selvakani","doi":"10.1109/ICCCNT.2012.6395905","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395905","url":null,"abstract":"Wireless mesh networks are fast becoming the preferred way to deliver voice, video and data in outdoor environments. A wireless mesh can deliver the same network capacity, reliability and security that were once reserved for wired networks - but with the flexibility of wireless. With today's state-of-the-art solutions, municipalities, public safety agencies, port authorities, and industrial organizations can rely on mesh networks to provide essential connectivity to their workers and constituents. However, many technical issues still exist in this field. In order to provide a better understanding of the research challenges of WMNs, this article presents a detailed investigation of current state-of-the-art protocols and algorithms for WMNs. In this paper we propose MobiSEC, a complete security architecture that provides both access controls for mesh users and routers as well as a key distribution schemes that supports layer-2 encryption to ensure security and data confidentiality of all communications that occur in the WMN.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124910380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Thirumaran, P. Dhavachelvan, G. Naga Venkata Kiran
{"title":"A novel approach for evaluation of changes in web services business logic","authors":"M. Thirumaran, P. Dhavachelvan, G. Naga Venkata Kiran","doi":"10.1109/ICCCNT.2012.6395877","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395877","url":null,"abstract":"In today's ever-changing Business world, increasing market demand and meeting it through service technology has made change management an inevitable one. Although there are many change management issues and solutions, there is no proper support for efficient change evaluation and monitoring. In this paper, we propose a dependency analysis approach for evaluating the changes specified by the analyst in an effective manner. This measure of change evaluation ensures that the business analyst has a direct control over the changes he makes and provides a sophistic environment which notifies the analyst about the outcome of change progress in a meaningful way. We propose a set of change factors based on which the dependency relation existing between the business rules, functions and parameters are analyzed. These change factors evaluated as part of the change evaluation leads the change management process in efficient and controlled manner. We develop a prototype system of the proposed model to demonstrate its effectiveness. We also conduct an experimental study to assess the performance of the change management along with the change measure as an output.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131454737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhanced LSB technique for audio steganography","authors":"H. Kumar, Anuradha","doi":"10.1109/ICCCNT.2012.6395978","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395978","url":null,"abstract":"The idea of this paper is to invent a new strategy in Steganography to get the minimum effect in audio which is used to hide data into it. “Progress always involves risk” Fredrick Wilcox observed that technological progress of computer science and the Internet altered the way we lived, and will continue to cast our life[1] . In this paper we have presented a Steganography method of embedding text data in an audio file. The basic approach behind this paper is to provide a good, well-organized method for hiding the data and sent to the destination in safer manner. In the proposed technique first the audio file is sampled and then appropriate bit is modified. In selected sample one bit is modified at least significant bit .The remaining bits may be used but it may be cause noise. We have attempted to provide an overview, theoretical framework about audio Steganography techniques and a novel approach to hide data in an audio using least significant bit (LSB).","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125531104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}