Vol. 10 No. 3 MAR 2012

Vol. 10 No. 3 March 2012 International Journal of Computer Science and Information Security

Publication March 2012, Volume 10 No. 3 (Download Full Journal) (Archive) (Download 2)

.

Copyright © IJCSIS. This is an open access journal distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

1. Paper 29021266: Integrating LBS, GIS and SMS Technologies for the Effective Monitoring of Road Network (pp. 1-6)

Full Text: PDF

.

S. El houssaini, A. Badri

Laboratoire d'Electronique, Electrotechnique, Automatique & Traitement de l’Information

Faculté des Sciences et Techniques de Mohammedia, Université Hassan II Mohammedia-Casablanca, B.P.146, Mohammedia, Morocco

.

Abstract — This paper presents an integrated framework of Geographic Information System (GIS), Android Platform and a Relational Database Management System (RDBMS) equipped with interactive communication capabilities. The model integrates the design of the database and the management of implementation of the monitoring system which includes the operations of query and analysis using the web and desktop applications. This study aims to apply techniques of analysis of the road network in a GIS to collect geographic data on the monitoring station and the roads. The information on road infrastructure is not only useful for locating monitoring stations, but it is also important to guide a station to follow the shortest path to achieve the objectives of management and routing. Optimal routes based on the minimum cost are identified using Dijkstra’s algorithm. This paper also presents a software development on Android Platform which applies Cell Identifier method for improving the accuracy of location, it is not necessary to have an Internet connection as the requesting emergency can use a Short Message Service (SMS) to request an urgent service. The proposed system should be an effective and intelligent tool for a rapid intervention and to improve the monitoring of the road network which can eventually be extended to a national infrastructure of GIS. Simulated test cases have been carried out for network of Mohammedia City in Morocco.

.

Keywords: GIS; Location; Routing; SMS; Android; Cell Identifier.

.

-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

2. Paper 27111119: Improving Information Security in E-Banking by Using Biometric Fingerprint (pp. 7-12)

Full Text: PDF

.

Mahmoud Mohammed Mahmoud Musleh, Karama M.A. Nofal, Ismail Idrissa Ba, Jamaludin Ibrahim

Department of Information Systems, International Islamic University Malaysia, IIUM, Kuala Lumpur, Malaysia

.

Abstract — In this paper biometric fingerprint technology will define and discuss as new best approach identification and authentication customers for online internet banking, and how biometric fingerprint will improve the internet banking protect its assets. Background will be produced to present how authentication and identification have developed and improved through the applications successful that have implemented biometric technology to protect its asset; then a case of major bank in Malaysia will be taken as a case study. By answering the question, why does biometric fingerprint need to come forefront as a great method of authentication in online banking environment? The findings have found that there are reasons and factors for higher security as a near perfect and biometric fingerprint authentication will be indicated to be the solution to answer this call.

.

Keywords- Biometric Fingerprint; E-banking; Information Security; Online Banking; Biometric Technology

.

-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

3. Paper 30041180: Mobile WiFi-Based Indoor Positioning System (pp. 13-22)

Full Text: PDF

.

Mike Ng Ah Ngan, Mohammed Abdul Karim, Behrang Parhizkar, Arash Habibi Lashkari

Faculty of Information & Communication Technology, LIMKOKWING University, Cyberjaya, Selangor, Malaysia

.

Abstract — Navigation system wherever built inside a GPS device or on a mobile phone has been proved to be very useful for outdoor environment. The device gives you your exact position and shows you the direction to your destination. But nowadays, it is clearly seen that a navigation system may be beneficial for indoor environment as well. This paper illustrates a mobile application which will be able to estimate the position of a user within a building by using WiFi technology.

.

Keywords-WiFi, WiFi positioning System, Indoor Positioning System

-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

4. Paper 27021212: Kekre’s Wavelet Transform for Image Fusion and Comparison with Other Pixel Based Image Fusion Techniques (pp. 23-31)

Full Text: PDF

.

Dr. H. B. Kekre, MPSTME, SVKM’S, NMIMS University

Dr. Tanuja Sarode, Computer Engineering Department, Thadomal Shahani Engineering College

Rachana Dhannawat, Computer Sci. & engg. Department, S.N.D.T. University, Mumbai

.

Abstract - Image fusion combines several images of same object or scene so that the final output image contains more information. The main requirement of the fusion process is to identify the most significant features in the input images and to transfer them without loss into the fused image. In this paper many pixel level fusion techniques like DCT averaging, PCA, Haar wavelet and Kekre’s wavelet transform techniques for image fusion are proposed and compared. The main advantage of Kekre’s transform matrix is that it can be of any size NxN, which need not to be an integer power of 2. From NxN Kekre’s transform matrix, we can generate Kekre’s Wavelet transform matrices of size (2N) x (2N), (3N)x(3N),……, (N2)x(N2).

.

-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

5. Paper 27021213: A Survey on Building Intrusion Detection System Using Data Mining Framework (pp. 32-36)

Full Text: PDF

.

V. Jaiganesh (2) and M. Thenmozhi (3) , Dr. P. Sumathi (1),

(2) Assistant Professor, Department of Computer Science, Dr.N.G.P. Arts and Science College, Coimbatore

(3) Assistant Professor, Department of Information Technology, Faculty of Engineering, Avinashilingam University for Women, Coimbatore

(1) Assistant Professor, Department of Computer Science, Chikkanna Government Arts College, Tirupur

.

Abstract — Recently, network attacks have increased to a greater extent. Hackers and intruders can produce several successful efforts to cause the crash of the networks and web services by illegal intrusion. New threats and interrelated solutions to avoid these threats are budding jointly with the secured system evolution. So, Intrusion Detection System (IDS) has become an active area of research in the field of network security. The optimization of IDS becomes an attractive domain due to the security audit data as well as complex and active properties of intrusion behaviors. The main purpose of IDS is to protect the resources from threats. Intrusion Detection System examines and calculates the user behavior, and then these behaviors will be considered an attack or a normal behavior. Intrusion detection systems have been integrated with data mining approaches to identify intrusions. There are various data mining approaches such as classification tree, Support Vector Machines, etc., used for intrusion detection. In this paper, thorough investigations have been done on the existing data mining approaches to detect intrusions.

.

Keywords- Intrusion Detection System (IDS), intruders, Machine Learning techniques, Data mining

.

-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

6. Paper 27021218: Trusted On-demand Distance Vector Routing for Ad hoc Networks (pp. 37-44)

Full Text: PDF

.

Md. Humayun Kabir, Bimal Kumar Pramanik, Somlal Das, Subrata Pramanik and Md. Ekramul Hamid

Department of Computer Science and Engineering, University of Rajshahi, Rajshahi-6205, Bangladesh

.

Abstract — This paper presents a new Trusted On-demand Distance Vector (TODV) routing protocol that is dynamic and robust to mitigate the detrimental effects of nodes’ malicious behavior, as to provide correct connectivity information. This protocol filters erroneous query and routing information, and determines a route that only involves trustworthy hosts. The operation of TODV is loop free, and can distinguish between local connectivity management (neighborhood detection) and general topology maintenance. When links break, TODV causes the affected set of nodes to be notified so that they are able to invalidate the routes using the lost link. The widely accepted technique in a Mobile Ad hoc NETwork (MANET) context of route discovery based on broadcasting query packets is the basis of the protocol. The protocol is an enhancement of the Ad hoc On-demand Distance Vector (AODV) routing protocol to ensure that only trustworthy nodes participate in the network. On the other hand it still maintains most of the features of the AODV. The proposed protocol scales to large populations of mobile nodes wishing to form ad hoc networks and can be applied in a wide variety of practical cases.

.

Keywords- Ad hoc network, routing protocol, trust, dynamic, broadcasting

.

-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

7. Paper 29021231: An Intrusion Detection System Framework for Ad Hoc Networks (pp. 45-48)

Full Text: PDF

.

Arjun Singh, Dept. of Computer Science & Engineering, Sir Padampat Singhania University, Udaipur, India

Surbhi Chauhan, Dept. of Computer Science & Engineering, Amity University, Noida, India

Kamal Kant, Dept. of Computer Science & Engineering, Amity University, Noida, Inida

Reshma Doknaia, Sr. Software Engineer, BMC Pvt. Ltd., Pune, India

.

Abstract — Secure and efficient communication among a set of mobile nodes is one of the most important aspects in ad-hoc wireless networks. Wireless networks are particularly vulnerable to intrusion, as they operate in open medium, and use cooperative strategies for network communications. By efficiently merging audit data from multiple network sensors, we analyze the entire ad hoc wireless network for intrusions and try to inhibit intrusion attempts. This paper presents an intrusion detection system for ad hoc network, which uses reputation system to minimize the usage of battery power and bandwidth.

.

Keywords- IDS, LID, MDM, ADM, SSD

.

-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

8. Paper 29021234: Data Mining Techniques: A Key for detection of Financial Statement Fraud (pp. 49-57)

Full Text: PDF

.

Rajan Gupta (1) and Nasib Singh Gill (2)

(1) Research Scholar, Dept. of Computer Sc. & Applications, Maharshi Dayanand University, Rohtak (Haryana) - India.

(2) Head, Dept. of Computer Sc. & Applications, Maharshi Dayanand University, Rohtak (Haryana), India.

.

Abstract - In recent times, most of the news from business world is dominated by financial statement fraud. A financial statement becomes fraudulent if it has some false information incorporated by the management intentionally. This paper implements data mining techniques such as CART, Naïve Bayesian classifier, Genetic Programming to identify companies those issue fraudulent financial statements. Each of these techniques is applied on a dataset from 114 companies. CART outperforms all other techniques in detection of fraud.

.

-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

9. Paper 29021240: Performance Comparison of Assorted Color Spaces for Multilevel Block Truncation Coding based Face Recognition (pp. 58-63)

Full Text: PDF

.

Dr. H.B. Kekre, Senior Professor, Computer Engineering Department, MPSTME, SVKM’s NMIMS, (Deemed-to-be University), Mumbai, India

Dr. Sudeep Thepade, Associate Professor, Computer Engineering Department, MPSTME, SVKM’s NMIMS, (Deemed-to-be University), Mumbai, India

Karan Dhamejani, Sanchit Khandelwal, Adnan Azmi

B.Tech Students, Computer Engineering Department, MPSTME, SVKM’s NMIMS, (Deemed-to-be University), Mumbai, India

.

Abstract — The paper presents a performance analysis of Multilevel Block Truncation Coding based Face Recognition among widely used color spaces. In [1], Multilevel Block Truncation Coding was applied on the RGB color space up to four levels for face recognition. Better results were obtained when the proposed technique was implemented using Kekre’s LUV (K’LUV) color space [25]. This was the motivation to test the proposed technique using assorted color spaces. For experimental analysis, two face databases are used. First one is “Face Database”, developed by Dr.Libor Spacek which has 1000 face images and the second one is “Our Own Database” which has 1600 face images. The experimental results showed that Block Truncation Level 4 (BTC-Level 4) gave the best result in every color space. It is observed that the proposed technique functions better in the YIQ color space.

.

Keywords - Face recognition, Block Truncation Coding, RGB, K’LUV, YIQ, YUV, YCbCr, YCrgCrb, Multilevel BTC.

.

-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

10. Paper 29021243: Step Tapered Waveguide with Cylindrical Waveguide (pp. 64-66)

Full Text: PDF

.

Harshukumar Khare, M.E (EXTC) Final year student, TEC, Nerul, Navi-Mumbai

Prof. R. D. Patane, Asst. Proffessor (EXTC), TEC, Nerul, Navi-Mumbai

.

Abstract - Tapered Waveguide is a waveguide in which a physical or electrical characteristic changes continuously with distance along the axis of the waveguide. Tapered waveguide offer an excellent means of converting microwave mode sizes to connect Microwave devices of different cross-sectional dimensions. This paper discusses the waveguide component for interconnecting rectangular and circular waveguide using step tapering. Model is designed for the frequency range from 2 to 4 GHz. Dominant Mode conversions ie from TE10 to TM11 is considered for tapering techniques. Step tapering is studied at different step sizes 4mm to 10 mm and analysis is done. All simulations done with CST Microwave studio and S parameters and E field parameters are analyzed. Simulation result shows that wave is properly propagated with no power reflection and low power loss.

.

Keywords: Single & Double Step Tapering, Cylindrical waveguide, CST, S parameter, E Field

.

-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

11. Paper 29021248: A Panoramic Approach on Software Quality Assurance Proposed By CMM and XP (pp. 67-71)

Full Text: PDF

.

CH. V. Phani Krishna *(1), Dr. G. Rama Krishna *(2) and Dr. K. Rajasekhara Rao *(3)

(1) Associate professor, CSE Department, KL University, Guntur dt., India.

(2) Professor, CSE Department, KL University, Guntur Dt., India

(3) Dean of student and faculty welfare, KL University, Guntur Dt., India.

.

Abstract - The main objective of this paper is to compare Capability Maturity Model (CMM) and Extreme Programming (XP) regarding their software quality support in terms of software quality development. The main goal is to analyze or measure how the code is framed for particular software, and apply software to show the result.

.

Keywords — Sqa, Xp, Cmm.

.

-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

12. Paper 29021254: Developing Multi-Platform Package for Remote System Administration (pp. 72-76)

Full Text: PDF

.

Rawaa Putros Polos Qasha, Department of Computers Sciences, College of Computer Sciences and Mathematics, University of Mosul, Mosul, Iraq

.

Abstract – This paper presents Multi-Platform System Administration (MPSA) software for administrating and controlling different operating systems such as Linux and Windows system, based on XML-RPC technique and Python libraries. MPSA software consists of two distinct components: Administration server and administration agent. The server components, work on Linux system, are responsible for communicating with the agents, sending the queries, and retrieve the performance and status data from them. Administration agent, that can be working either in Linux or Windows system, is going to proxy the server requests to build functions and pass the results back to server. MPSA introduces many services, such as processes management, resource management, gathering system information, system booting, and file browser, by using the advantages of XML-RPC. MPSA services were implemented to work on the background at the administration Agents, so that the software works in a hidden manner without needing to agents permission or attention.

.

Keywords- Remote System Administration; XML-RPC; Process management; Port scan, WMI;

.

-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

13. Paper 29021256: An Efficient Automatic Attendance System Using Fingerprint Reconstruction Technique (pp. 77-82)

Full Text: PDF

.

Josphineleela. R (1), Ramakrishnan. M (2)

(1) Research Scholar, Sathyabama University, Chennai,

(2) Department Of Information Technology, Velammal Engineering College, Chennai

.

Abstract — Biometric time and attendance system is one of the most successful applications of biometric technology. One of the main advantage of a biometric time and attendance system is it avoids "buddy-punching". Buddy punching was a major loophole which will be exploiting in the traditional time attendance systems. Fingerprint recognition is an established field today, but still identifying individual from a set of enrolled fingerprints is a time taking process. Most fingerprint-based biometric systems store the minutiae template of a user in the database. It has been traditionally assumed that the minutiae template of a user does not reveal any information about the original fingerprint. This belief has now been shown to be false; several algorithms have been proposed that can reconstruct fingerprint images from minutiae templates. In this paper, a novel fingerprint reconstruction algorithm is proposed to reconstruct the phase image, which is then converted into the grayscale image. The proposed reconstruction algorithm reconstructs the phase image from minutiae. The proposed reconstruction algorithm is used to automate the whole process of taking attendance, manually which is a laborious and troublesome work and waste a lot of time, with its managing and maintaining the records for a period of time is also a burdensome task. The proposed reconstruction algorithm has been evaluated with respect to the success rates of type-I attack (match the reconstructed fingerprint against the original fingerprint) and type-II attack (match the reconstructed fingerprint against different impressions of the original fingerprint) using a commercial fingerprint recognition system. Given the reconstructed image from our algorithm, we show that both types of attacks can be effectively launched against a fingerprint recognition system.

.

Keywords—Fingerprint Reconstruction, attendance management system, Minutiae Extraction

.

-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

14. Paper 29021260: Towards More Realistic Mobility Model in Vehicular Ad Hoc Network (pp. 83-90)

Full Text: PDF

.

Dhananjay S. Gaikwad, Mahesh Lagad, Prashant Suryawanshi, Vaibhav Maske

Computer Engineering Department, HSBPVT’S GOI, Parikrama College of Engineering, Kashti. India- 414701

.

Abstract— Mobility models or the movement patterns of nodes communicating wirelessely, play a vital role in the simulation-based evaluation of vehicular Ad Hoc Networks (VANETs). Even though recent research has developed models that better corresponds to real world mobility, we still have a limited understanding of the level of the required level of mobility details for modeling and simulating VANETs. In this paper, we propose a new mobility model for VANETs that works on the city area and map the topology of streets and behavior of vehicles at the intersection of roads. Our model change the speed of nodes after some specific distance in accordance to neighboring nodes that is according to a density of nodes, so that this will lead to a realistic situation on the roads. Our model accounts the various characteristics of VANETs such as traffic lights, acceleration/deceleration due to nearby vehicles, attraction points where maximum numbers of vehicle tends to go. Using the real and controlled map of street, we compare our mobility model with the random direction mobility model. Our result demonstrates that probability of link availability in VANETs is more sensitive to the vehicles waiting at intersections and acceleration/deceleration of vehicles. We also found that probability of link availability suffers at the intersection of the roads; because of some nodes cross the signal continue movement in horizontal direction while some nodes change the direction of traveling to vertical.

.

Keywords- Vehicular Ad Hoc Network (VANETs), Mobile Ad Hoc Network (MANETs).

.

-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

15. Paper 29021263: Image Classification in Transform Domain (pp. 91-97)

Full Text: PDF

.

Dr. H. B. Kekre, Professor, Computer Engineering, Mukesh Patel School of Technology Management and Engineering, NMIMS University, Vileparle(w) Mumbai 400–056, India

Dr. Tanuja K. Sarode, Associate Professor, Computer Engineering, Thadomal Shahani Engineering College, Bandra(W), Mumbai 400-050, India

Jagruti K. Save, Ph.D. Scholar, MPSTME, NMIMS University, Associate Professor, Fr. C. Rodrigues College of Engineering, Bandra(W), Mumbai 400-050, India

.

Abstract — Organizing images into meaningful categories using low level or high level features is an important task in image databases. Although image classification has been studied for many years, it is still a challenging problem within multimedia and computer vision. In this paper the generic image classification approach using different transforms is proposed. The two main steps in image classification are feature extraction and classification algorithm. This paper proposes to generate feature vector from image transform. The paper also investigates the effectiveness of different transforms (Discrete Fourier Transform, Discrete Cosine Transform, Discrete Sine Transform, Hartley and Walsh Transform) in classification task. The size of feature vector also varied to see its impact on the result. Classification is done using nearest neighbor classifier. Euclidean and Manhattan distance is used to calculate the similarity measure. Images from the Wang database are used to carry out the experiments. The experimental results and detailed analysis are presented.

.

Keywords- Image classification; Image Transform; Discrete Fourier Transform (DFT); Discrete Sine Transform(DST); Discrete Cosine Transform(DST); Hartley Transform; Walsh Transform; Nearest neighbor Classifier.

.

-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

16. Paper 29021264: Analysis of Stock Marketing with SOAP service using Python (pp. 98-102)

Full Text: PDF

.

P. Asha, Research Scholar, Computer Science and Engineering Department, Sathyabama University, Chennai, Tamilnadu, India.

Dr. T. Jebarajan, Principal, Kings College of Engineering, Chennai, Tamilnadu, India.

Kathiresan, Technical Lead Consultant, Motorola Solutions, Bangalore, Karnataka, India.

.

Abstract - SOAP is a simple XML-based protocol specification to let applications exchange information over HTTP. SOAP describes envelope and message formats, and has a basic request/response handshake protocol. A SOAP message could be sent to a web-service enabled web site such as a real-estate price database, with the parameters needed for a search. The site would then return an XML formatted document with the resulting data, e.g., prices, location, features. With the data being returned in a standardized machine-parseable format, it can then be integrated directly into a third party web site or application. SOAPpy provides tools for building SOAP clients and servers. SOAPpy is very simple to use and that fully supports dynamic interaction between clients and servers.

.

Keywords— Service Oriented Architecture, SOAP, Web Service, SOAPpy, XML.

.

-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

17. Paper 20021208: Accurate Face Recognition Using PCA and LDA (pp. 103-112)

Full Text: PDF

.

Sukhvinder Singh *, Mtech CSE (4th sem), Sri Sai College Of Engg. & Tech., Pathankot

Meenakshi Sharma, HOD CSE, Sri Sai College Of Engg. & Tech., ,Pathankot

Dr. N Suresh Rao, HOD CSE, Sri Sai College Of Engg. & Tech., Jammu University

.

Abstract - Face recognition from images is a sub-area of the general object recognition problem. It is of particular interest in a wide variety of applications. Here, the face recognition is based on the new proposed modified PCA algorithm by using some components of the LDA algorithm of the face recognition. The proposed algorithm is based on the measure of the principal components of the faces and also to find the shortest distance between them. The experimental results demonstrate that this arithmetic can improve the face recognition rate. . Experimental results on ORL face database show that the method has higher correct recognition rate and higher recognition speeds than traditional PCA algorithm.

.

Keywords: Face recognition, PCA, LDA.

.

-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

18. Paper 20021209: Robust & Accurate Face Recognition using Histograms (pp.113-122)

Full Text: PDF

.

Sarbjeet Singh (1), Meenakshi Sharma (2), Dr. N.Suresh Rao (3)

SSCET Pathankot (1,2), Jammu University (3)

.

Abstract - A large number of face recognition algorithms have been developed from decades. Face recognition systems have been grabbing high attention from commercial market point of view as well as pattern recognition field. It also stands high in researchers community. Face recognition have been fast growing, challenging and interesting area in real-time applications. This face recognition system detects the faces in a picture taken by webcam or a digital camera, and these face images are then checked with training image dataset based on descriptive features. In this paper, we use a histogram approach for human face detection. Since different faces contains different facial features, having the features which are unique. In this paper the vector machine is used for skin detection and face detection.

.

Keywords - Face recognition ,PCA, LDA Histogram.

.

-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

19. Paper 31011219: X.509 Authentication Services to Enhance the Data Security in Cloud Computing (pp. 123-125)

Full Text: PDF

.

Surbhi Chauhan, Amity University, Noida, India

Kamal Kant, Amity University, Noida, India

Arjun Singh, Sir Padampat Singhania University, Udaipur, India

.

Abstract — This paper represents a method to build a Cloud Security by giving concept of X.509 authentication services. We are discussing theory of cloud computing, feature of cloud computing and cloud security .We proposed a X.509 format to enhances data security in cloud (Public). Cloud computing is a new computational paradigm that offers an innovative business model for organization.

.

-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

20. Paper 27021215: An Intelligent Spam-Scammer Filter Mechanism Using Bayesian Techniques (pp. 126-139)

Full Text: PDF

.

Olushola D. Adeniji, Olubukola Adigun and Omowumi O. Adeyemo

Department of Computer Science, University of Ibadan, Ibadan, Nigeria

.

Abstract - Electronic mail (E-mail) is an electronic message system that transmits messages across computer network. Electronic mail is the easiest and most efficient communication tool for disseminating both wanted and unwanted information. There are many efforts under way to stop the increase of spam that plague almost every user on the internet. Managing and deleting scam or unwanted messages pose negative effects to user’s productivity. However the attack of scam on business site also affects the customer. There is an increasing trend of integration of anti-spam techniques into mail transfer agent whereby the mail systems themselves also perform various measures that are generally referred to as filtering, ultimately resulting in spam messages being rejected before delivery (or blocked).This paper present a E-mail intelligent system using Bayesian algorithm to reduce overload on mail traffic, shutdown of mailbox and waste of disk storage on mail server.

.

Keywords: E-mail, Pattern detection, Spam, Filtering, Authentication and Reputation

.

-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

21. Paper 27021216: New Weather Forecasting Technique using ANFIS with Modified Levenberg-Marquardt Algorithm for Learning (pp. 140-147)

Full Text: PDF

.

I.Kadar Shereef, Sree Saraswathi Thyagaraja College,Pollachi. Coimbatore,Tamil Nadu, India.

Dr. S. Santhosh Baboo, Dwaraka Doss Goverdhan Doss Vaishnav College, Chennai, Tamil Nadu. India

.

Abstract --- Temperature warnings are essential forecasts since they are utilized to guard life and property. Temperature forecasting is the kind of science and technology to approximate the temperature for a future time and for a given place. Temperature forecasts are performed by means of gathering quantitative data regarding the in progress state of the atmosphere. The author in this paper utilized a neural network-based technique for determining the temperature in future. The Neural Networks package consists of various kinds of training or learning techniques. One such technique is Adaptive Neuro Fuzzy Inference System (ANFIS) technique. The main advantage of the ANFIS technique is that it can reasonably estimated a large class of functions. This technique is more efficient than numerical differentiation. The simple meaning of this term is that the proposed technique has ability to confine the complex relationships among several factors that contribute to assured temperature. The proposed idea is tested using the real time dataset. In order to further improve the prediction accuracy, this paper uses Modified Levenberg-Marquardt (LM) Algorithm for Neural Network learning. In modified LM, the learning parameters are modified. The proposed algorithm has good convergence and also it reduces the amount of oscillation in learning procedure. The proposed technique is compare with the usage of ANFIS and the practical working of meteorological department. The experimental result shows that the proposed technique results in better accuracy of prediction when compared to the conventional technique of weather prediction.

.

Keywords--- Multi Layer Perception, Temperature Forecasting, Back propagation, Artificial Neural Network, Modified Levenberg-Marquardt Algorithm

-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------