M. Pallikonda Rajasekaran, M. Suresh, U. Dhanasekaran
{"title":"Multimodal biometric recognition using sclera and fingerprint based on ANFIS","authors":"M. Pallikonda Rajasekaran, M. Suresh, U. Dhanasekaran","doi":"10.1109/ICRTIT.2014.6996159","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996159","url":null,"abstract":"Biometrics is the ID of humans utilizing intrinsic physical, biological, otherwise activity features, traits, or habits. Biometrics has the potential to provide this desired ability to clearly and discretely determine a person's identity with additional accuracy and security. Biometric systems primarily based on individual antecedent of advice which is referred as unimodal frameworks. Even though some unimodal frameworks (e.g. Palm, Finger impression, Face, Iris), have got significant change in consistency plus precision yet has experienced selection issues attributable to non-all-inclusiveness of biometrics attributes, vulnerability to biometric mocking and insufficient exactness created by boisterous information as their inconveniences. In future, single biometric framework might not be in a position to accomplish the wanted execution prerequisite in genuine world provisions. To defeat these issues, we have to utilize multimodal biometric confirmation frameworks which blend data from various modalities to make a choice. Multimodal biometric confirmation framework utilize use more than one human modalities such as face, iris, retina, sclera and fingerprint etc. to improve their security of the method. In this approach, combined the biometric traits of sclera and fingerprint for addressing authentication issues, which has not discussed and implemented earlier. The fusion of multimodal biometric system helps to reduce the system error rates. The ANFIS model consolidated the neural system versatile capacities and the fluffy rationale qualitative strategy will have low false dismissal degree contrasted with neural network and fluffy rationale qualitative frame work. The combination of multimodal biometric security conspires in the ANFIS will show higher accuracy come close with Neural Network and Fuzzy Inference System.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127040851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Grouping in collaborative e-learning environment based on interaction among students","authors":"D. Jagadish","doi":"10.1109/ICRTIT.2014.6996170","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996170","url":null,"abstract":"Collaborative learning is an online classroom can take the form of conversation between the whole classes or within smaller groups. Moodle (Modular Object-Oriented Dynamic Learning Environment) is a free and open source e-learning software platform, also known as a Learning Management System, or Virtual Learning Environment (VLE). As a web-based tool, Moodle offers the possible way to deliver courses which include an enormous variety of information sources - links to multimedia, websites and image - which are hard to deliver in a traditional teaching atmosphere. The converse (chat) activity module in moodle allows participants to encompass a realtime synchronous discussion in a moodle course. A teacher can organize users into groups within the course or within particular activities. This paper aims in efficient group formation of learners in a collaborative learning environment so that every individual in the group is benefitted. As a testing platform tenth standard Tamil text book is incorporated in to moodle. In this paper K-NN clustering algorithm is used to improve the group performance. This algorithm achieves good performance in terms of balancing the knowledge level among all the students.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122796318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Natural Language Processing in Object Oriented Software Development","authors":"Abinash Tripathy, S. Rath","doi":"10.1109/ICRTIT.2014.6996121","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996121","url":null,"abstract":"Software Development Life Cycle (SDLC) starts with eliciting requirement of user as a document called Software Requirement Specification (SRS). SRS document is mostly written in the form of any natural language (NL) that is convenient for the client. In order to develop a right software based on user's requirements, the objects, methods and attributes needs to be identified from SRS document. In this paper, an attempt is made to develop a methodology, using the concept of Natural Language Processing (NLP) for Object Oriented (OO) Programming System analysis concept, by finding out the class name and its details directly form SRS.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122868152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting cloning attack in Social Networks using classification and clustering techniques","authors":"S. Kiruthiga, P. Kola Sujatha, A. Kannan","doi":"10.1109/ICRTIT.2014.6996166","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996166","url":null,"abstract":"Social Networks (SN) are popular among the people to interact with their friends through the internet. Users spending their time in popular social networking sites like facebook, Myspace and twitter to share the personal information. Cloning attack is one of the insidious attacks in facebook. Usually attackers stole the images and personal information about a person and create the fake profile pages. Once the profile gets cloned they started to send a friend request using the cloned profile. Incase if the real users account gets blocked, they used to send a new friend request to their friends. At the same time cloned one also sending the request to the person. At that time it was hard to identify the real one for users. In the proposed system the clone attack is detected based on user action time period and users click pattern to find the similarity between the cloned profile and real one in facebook. Using Cosine similarity and Jaccard index the performance of the similarity between the users is improved.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130959535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient dynamic indexing and metadata based storage in cloud environment","authors":"S. Anjanadevi, D. Vijayakumar, K. .. Srinivasagan","doi":"10.1109/ICRTIT.2014.6996151","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996151","url":null,"abstract":"Cloud computing is an emerging, computing model wherein the tasks are allocated to software, combination of connections, and services accessed over a network. This connections and network of servers is collectively known as the cloud. In place of operating their own data centers, users might rent computing power and storage capacity from a service provider and pays only for what they use. Cloud storage is delivering the data storage as service. If the data is stored in cloud, it must provide the data access and heterogeneity. With the advances in cloud computing it allows storing of large number of images and data throughout the world. This paper proposes the indexing and metadata management which helps to access the distributed data with reduced latency. The metadata management can be enhanced for large scale file system applications. When designing the metadata, the storage location of the metadata and attributes is important for the efficient retrieval of the data. Indexes are used to quickly locate data without having to search over every location in storage. Based on these two models, the data can be easily fetched and the search time was reduced to retrieve the appropriate data.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133641606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Harnessing the semantic analysis of tag using Semantic Based Lesk Algorithm","authors":"M. Shankar, R. Senthilkumar","doi":"10.1109/ICRTIT.2014.6996200","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996200","url":null,"abstract":"In the field of Data retrieval, accessing web resources is frequent task. This domain is shifting radically from the amplified data growth to the way in which it is structured and retrieved across web. This explosive growth of data is the result of billions of people using the Internet and mobile devices for commerce, entertainment, social interactions and as well as the Internet of things that constantly share machine-generated data. Even with lot of research, the task of analyzing this data to extract its business values with precision still remains as a trivial issue. To address this issue, the paper presents a novel Semantic Based Lesk Algorithm (SBLA), which traces the meaning of user defined tags and categorizes the web data by means of Support Vector Machine (SVM) classifier. On comparing with existing methods, the proposed method performs well in extraction of admissible data with the better accuracy and precision as discussed in result analysis.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"30 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132869878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Bharathi, K. K. Raj, Hiran Kumar Singh, Dhananjay Kumar
{"title":"Throughput analysis of different traffic distribution in Cognitive Radio Network","authors":"P. Bharathi, K. K. Raj, Hiran Kumar Singh, Dhananjay Kumar","doi":"10.1109/ICRTIT.2014.6996210","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996210","url":null,"abstract":"A traffic distribution in a wireless network plays a major role in resource allocation. In this paper, we analyze throughput in Cognitive Radio Network (CRN) under two traffic distributions Pareto on-off and Poisson distribution. We consider a CRN where the cell is divided into different concrete circles and sectors. In each segment is analyzed and the channel is allocated accordingly while taking a count of Blocking -dropping probability and false alarm -missed detection probability. The system is simulated in java platform and results shows higher throughput for Poisson distribution.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116619079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Sumalatha, C. Selvakumar, T. Priya, R. T. Azariah, P. Manohar
{"title":"CLBC - Cost effective load balanced resource allocation for partitioned cloud system","authors":"M. Sumalatha, C. Selvakumar, T. Priya, R. T. Azariah, P. Manohar","doi":"10.1109/ICRTIT.2014.6996174","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996174","url":null,"abstract":"In cloud computing, remote based massive data storage and dynamic computation services are provided to the users. The cloud enables the user to complete their tasks using pay-as-you-go cost model which typically works on the incurred virtual machine hours, so reducing the execution time will minimize the computational cost. Therefore the scheduler should bring maximum throughput in order to achieve effective resource allocation in cloud. Hence, in this work, DBPS (Deadline Based Pre-emptive Scheduling) and a TLBC (Throttled Load Balancing for Cloud) load balancing model based on cloud partitioning using virtual machine has been proposed. Workload prediction is done using statistics and training set, so that error tolerance can be achieved in TLBC. The preliminary results obtained when measuring performance based on the computational cost of the task set and the number of tasks executed in a particular time shows the proposed TLBC outperforms compared with existing systems. OpenNebula has been used as the cloud management tool for doing real time analysis and improving performance.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130663596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A short message classification algorithm for tweet classification","authors":"P. Selvaperumal, A. Suruliandi","doi":"10.1109/ICRTIT.2014.6996189","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996189","url":null,"abstract":"Twitter users tweet their views in the form of short text messages. Twitter topic classification is classifying the tweets in to a set of predefined classes. In this work, a new tweet classification Method that makes use of tweet features like URL's in the tweet, retweeted tweets and influential users tweet is proposed. Experiments were carried out with extensive tweet data set. The performance of the proposed algorithm in classifying the tweets was compared with the text classification algorithms like SVM, Naïve Bayes, KNN etc. It is observed that the proposed method outclasses the conventional text classification algorithms in classifying the tweets.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114713257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel proposal to effectively combine multipath data forwarding for data center networks with congestion control and load balancing using Software-Defined Networking Approach","authors":"Arijit Mallik, S. Hegde","doi":"10.1109/ICRTIT.2014.6996178","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996178","url":null,"abstract":"Modern data center networks (DCNs) often use multi-rooted topologies, which offer multipath capability, for increased bandwidth and fault tolerance. However, traditional routing algorithms for the Internet have no or limited support for multipath routing, and cannot fully utilize available bandwidth in such DCNs. As a result, they route all the traffic through a single path, and thus form congestion. Multipath (MP) routing might be a good alternative, but is not sufficient alone to handle congestion that comes from the contention of end stations. Dynamic load balancing, on the other hand, protects the network from sudden congestions which could be caused by load spikes or link failures. However, little work has been done to incorporate all these features in a single and comprehensive solution for Data Center Ethernet (DCE). In this paper, we propose a novel method that attempts to integrate dynamic load balancing, multi-path scheme with congestion control (CC), with the use of pure Software-Defined-Networking (SDN) approach. SDN decouples control plane from the data forwarding plane, which reduces the overheads of the network switches. The major objectives that our solution attempts to achieve are, efficient utilization of network resources, high throughput and minimal frame loss.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115912833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}