Vol. 11 No. 4 APR 2013

Vol. 11 No. 4 April 2013 International Journal of Computer Science and Information Security

Publication April 2013, Volume 11 No. 4 (Download Full Journal) (Archive) (Download 2)

.

Copyright © IJCSIS. This is an open access journal distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

1. Paper 31031329: Security Policies for WFMS with Rich Business Logic — A Model Suitable for Analysis (pp. 1-9)

Full Text: PDF

.

Fábio José Muneratti Ortega, Wilson Vicente Ruggiero

Departamento de Computação e Sistemas Digitais, Escola Politécnica da Universidade de São Paulo, São Paulo, Brazil

.

Abstract—This paper introduces a formal metamodel for the specification of security policies for workflows in online service systems designed to be suitable for the modeling and analysis of complex business-related rules as well as traditional access control. A translation of the model into a colored Petri net is shown and an example of policy for an online banking system is described. By writing predicates for querying the resulting state- space of the Petri net, a connection between the formalized model and a higher-level description of the security policy can be made, indicating the feasibility of the intended method for validating such descriptions. Thanks to the independent nature among tasks related to different business services, represented by restrictions in the information flow within the metamodel, the state-space may be fractioned for analysis, avoiding the state-space explosion problem. Related existing models are discussed, pointing the gain in expressiveness of business rules and the analysis of insecure state paths rather than simply insecure states in the proposed model. The successful representation and analysis of the policy from the example combined with reasonings for the general case attest the adequacy of the proposed approach for its intended application.

.

Keywords-security policies; modeling and analysis; colored Petri nets; business workflows

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

2. Paper 31031337: A New Approach to Decoding of Rational Irreducible Goppa code (pp. 10-18)

Full Text: PDF

.

Ahmed DRISSI

LabSiv : Laboratoire des Systèmes informatiques et Vision

ESCAM : Equipe de la Sécurité, Cryptographie, Contrôle d’Accès et Modélisation

Departments of Mathematics and Computer Science, Faculty of Sciences, Ibn Zohr University, Agadir, Morocco

.

Ahmed ASIMI

LabSiv : Laboratoire des Systèmes informatiques et Vision

ESCAM : Equipe de la Sécurité, Cryptographie, Contrôle d’Accès et Modélisation

Departments of Mathematics and Computer Science, Faculty of Sciences, Ibn Zohr University, Agadir, Morocco

.

Abstract — The interesting properties of classical Goppa code and its effective decoding algorithm (algorithm of patterson) make the most appropriate candidate for use in the MC Eliece cryptosystem. Information leakage which results from the relationship between the error vector weight and the number of iterations in the decoding algorithm, presented a weakness of the cryptosystem. In this paper, we introduce a new approach to decoding, the use of binary Goppa code in system design MC Eliece which solve the problem of the leak of information, on the contrary in case of patterson algorithm. We treat this decoding method using the Newton identities and results of linear algebra.

.

Keywords: Binary Goppa code, the Newton identities, circulant matrix

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

3. Paper 21031305: RST-Based Analysis of Multi-Class Multi-Servers Non-Preemptive Priority Queues versus Worst Case IEEE Analysis (pp. 19-26)

Full Text: PDF

.

(1) Amin B. A. Mustafa, (1) Mohammed A. A. Elmaleeh,

(1) Faculty of Engineering, Alneelain University, Khartoum, Sudan, Jebra, Block16, No 433, Khartoum, Sudan.

.

Hassan Yousif (2), Mohammed Hussein (3),

(2) College of Engineering, EE Dept, Salman bin Abdulziz University, Wadi Aldwassir, KSA

(3) Faculty of Engineering, Sudan University of Science and Technology, Khartoum, Sudan

.

Abstract— In this paper, analysis of non-preemptive priority queues with multiple servers and multiple priority classes is presented. It is assumed that the service times – for all priority classes – are identically and exponentially distributed to simplify the complexity of the residual service time mathematical expression to an extent will enable calculating the average customer waiting time. The paper proposes an expression for the mean residual service time which then used in developing a mathematical model for the analysis of Pre-emptive and non-preemptive priority queues with multiple servers and multiple priority classes. This is followed by a comparative study between the proposed scheme and the Worst Case Analysis results. This could help a lot in justifying and supporting this proposed RSTBased Analysis.

.

Keywords - Non-preemptive; Multiple Servers; Mathematical Model

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

4. Paper 22031311: Constructing Server-Clustering System with Web Services based on Linux (pp. 27-33)

Full Text: PDF

.

Dr. Dhuha Basheer Abdullah Albazaz, Abdulnaser Yonis

Dept. of Computer Sciences, College of Mathematics and Computer sciences, University of Mosul- Iraq

.

Abstract - This paper suggests a system that presents a high performance computing service across the internet. The system provides the ability of executing any parallel program by sending it from the client to be executed on the server. The ability of executing a wide range of programs is because of excluding the client-server system on only transferring files between client and server, while the responsibility of writing the source code, providing data, compiling and executing operations sequence are all assigned to the user and provided as input to the client side program. Web service technique is used in constructing the system for its high flexibility, and the ability of using it on different platforms. On the server side, translation and execution of parallel programs occurs by a Rocks cluster under the Linux-based CentOS operating system. Transferring files across the Internet was performed by using AXIOM objects that are included in Axis2 libraries.

.

Keywords: Cluster, web service, SOAP, Client, Server

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

5. Paper 31031316: An Optimized Perona-Malik Anisotropic Diffusion Function for Denoising Medical Image (pp. 34-38)

Full Text: PDF

.

A.S.M. Delowar Hossain

Assistant Professor, Dept. of CSE, Mawlana Bhashani Science and Technology University, MBSTU, Santosh, Tangail-1902 (Bangladesh)

.

Mehedi Hassan Talukder

Lecturer, Dept. of CSE, Mawlana Bhashani Science and Technology University, MBSTU, Santosh, Tangail-1902 (Bangladesh)

.

Md. Aminul Islam

Dept. of CSE, Mawlana Bhashani Science and Technology University, MBSTU, Santosh, Tangail-1902 (Bangladesh)

.

Md. Azmal Absar Dalim

Dept. of CSE, Mawlana Bhashani Science and Technology University, MBSTU, Santosh, Tangail-1902 (Bangladesh)

.

Abstract — Noise is the major problem in the field of image processing. In Medical image such as Ultrasound image, MRI data and Radar Images are affected by different types of noise. So it is the most important task to eliminate such noises. In image processing anisotropic diffusion is a technique for reducing image noise without removing significant parts of the image contents, such as edges, lines or other details that are important to represent the quality of the image. To acquire a better performance we state an another diffusion function that works efficiently to denoise an image without blurring the frontiers between different regions. To evaluate the performance we calculate the Signal to Noise Ratio, The Peak Signal to Noise Ratio, The Root Mean Square Error, The Edge Preservative Factor. This Function gives the better result with comparison to existing Perona-Malik anisotropic diffusion Function.

.

Keywords- Anisotropic Diffusion, MRI data, Ultrasound Image, Speckle Noise, Gradient, Performance Evaluation.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

6. Paper 31031318: New Paradigm for MANET Routing using Right Angled Biased Geographical Routing Technique (RABGR) (pp. 39-43)

Full Text: PDF

.

Mr. V J Chakravarthy and Capt. Dr. S Santhosh Baboo

P.G. Research Dept of Com. Science, D. G. Vaishnav College, Arumbakkam, Chennai 600 106.

.

Abstract — In this paper, we analyze the benefits of optimal multipath routing, to improve fairness and increase throughput in wireless networks with location information, in a bandwidth limited ad hoc network. In such environments the actions of each node can potentially impact the overall network connections. This is done by making multipath routing method, named as Right Angled Biased Geographical Routing (RABGR), and two congestion control algorithms, Biased Node Packet Scatter (BNPS) and Node-to-Node Packet Scatter (NNPS), which enhances the RABGR to avoid the congested areas of the network. The above RABGR method is used with AODV and AOMDV protocols and their results are compared. After Simulation, the experimental results shows that the solution achieve its objectives. Extensive ns-2 simulations show that the solution improves both fairness and throughput as compared to greedy routing using only single path.

.

Keywords- MANET, AODV, AOMDV, Biased geographical routing, congestion, greeding routing.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

7. Paper 21031301: Development of an Intelligent GIS Application for Spatial Data Analysis (pp. 44-49)

Full Text: PDF

.

Pro. Dr. Hesham Ahmed Hassan, Dr. Mohamed Yehia Dahab, Eng. Hussein Elsayed Elsayed Abla

Cairo University

.

Abstract - No one can deny Ambulance, Fire engine and police stations role in society service and feel all people safety and assurance, so we aim to get high performance and offer a good service through improve answer rate and Ambulance, Fire engine Centers and police stations distribution. Thus we integrated Geographic Information Systems (GIS) applications with domain expertise are saving time, effort and cost. The system aids the personnel to get critical spatial and non-spatial information. The system can identify the nearest Ambulance or Fire engine or police stations to the emergency location, and also determine the shortest route from the selected Ambulance station to the emergency location This framework is integrated GIS sciences can help users visualize map information and display spatial representations and suggestions for assessing existing Ambulance and Fire engine Centers performance hence planning and simulating for the future to approach for a good prediction and decision making with both static and dynamic spatial data.

.

Keywords— Development of an Intelligent GIS application for spatial Data analysis; Emergency planning; Shortest route analysis; Decision making;

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

8. Paper 31031319: A New Technique to Accelerate Point Multiplication Specifically for a National Institute of Standards and Technology (NIST) recommended prime field p521 (pp. 50-54)

Full Text: PDF

.

Anil kumar M. N, V. Sridhar

PET Research Foundation, PESCE, Mandya

.

Abstract - In this paper we propose a new technique to accelerate point multiplication of NIST recommended prime field p521 when the point multiplication is computed by the instruction sets of general purpose microprocessors. We modified the Binary Inversion Algorithm used to compute the inversion which is the costliest operation among other arithmetic operations in point multiplication. Our modified Binary Inversion Algorithm reduces approximately 2,03,286.49 addition operations during a point multiplication when computed by binary scalar point multiplication algorithm. The effectiveness of the above method is analyzed by using statistical analysis. The analysis shows that our technique speeds up the inversion operation and consequently the scalar point multiplication of the NIST recommended prime field p521.

.

Key words: Elliptic curve cryptography, Binary Inversion Algorithm, GF (p) arithmetic operators.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

9. Paper 31031324: A Novel Agent based Communication in Wired-WIMAX Hybrid Network in MANET (pp. 55-61)

Full Text: PDF

.

Kalyani Chaturvedi, M. TECH (EC. deptt.), Truba institute of engineering and information Technology, Bhopal, India

Neelesh Gupta, H.O.D. Dept. Of EC, Truba institute of engineering and information technology, Bhopal, India

.

Abstract — Wireless technologies are able to provide mobility and portability that makes it more attractive as compared to wired technologies. Further, increasing requirement to support exiting connectivity with higher data rate for mobile computers and communication devices are performing a significant role to growing interest in wireless networks. WIMAX (Worldwide Interoperability for Microwave Access) is a telecommunications protocol that gives fixed and fully mobile internet access. This paper presents the role WIMAX technology in MANET at MAC layer. Wired network refers to interoperable implementations of the IEEE 802.3 and WIMAX which refers to interoperable implementations of the IEEE 802.16 wireless-networks standard. The radio range and data rate of WIMAX are much better then Wired network but, on the basis of cost WIMAX is expensive. In this paper is just proposal of a new hybrid network that is the communication between two different technologies on the basis of novel Agent, Wired Node (WN) and Mobile Node (MN). Now the Agent is worked as a interface in between wired and WIMAX network and Agent is connected with wired network to synchronize the communication with WIMAX, first the request is goes to Agent then to network. The combinations of these two technologies are not very expensive and also better than wired. In previous there is no such work done on Wired-WIMAX hybrid network. Their performance will be measure on the basis of TCP congestion window.

.

Keywords- Wired Network, Agent, WN, MN, WIMAX, MAC, MANET, TCP.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

10. Paper 31031325: Augmented Reality in ICT for Minimum Knowledge Loss (pp. 62-65)

Full Text: PDF

.

Mr. RamKumar Lakshminarayanan, Dr. R D. Balaji, Dr. Binod kumar, Ms. Malathi Balaji

Lecturer, Department of IT, Higher College of Technology, Muscat, Sultanate of Oman.

.

Abstract — Informatics world digitizes the human beings, with the contribution made by all the industrial people. In the recent survey it is proved that people are not accustomed or they are not able to access the electronic devices to its extreme usage. Also people are more dependent to the technologies and their day-to-day activities are ruled by the same. In this paper we discuss on one of the advanced technology which will soon rule the world and make the people are more creative and at the same time hassle-free. This concept is introduced as 6th sense technology by an IIT, Mumbai student who is presently Ph.D., scholar in MIT, USA. Similar to this research there is one more research going on under the title Augmented Reality. This research makes a new association with the real world to digital world and allows us to share and manipulate the information directly with our mental thoughts. A college which implements state of the art technology for teaching and learning, Higher College of Technology, Muscat, (HCT) tries to identify the opportunities and limitations of implementing this augmented reality for teaching and learning. The research team of HCT, here, tries to give two scenarios in which augmented reality can fit in. Since this research is in the conceptual level we are trying to illustrate the history of this technology and how it can be adopted in the teaching environment.

.

Keywords: Augmented Reality, 6th sense technology, Teaching and Learning, ICT

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

11. Paper 31031327: Optimizing Cost, Delay, Packet Loss and Network Load in AODV Routing Protocols (pp. 66-71)

Full Text: PDF

.

Ashutosh Lanjewar, M.Tech (DC) Student, TIEIT (TRUBA), Bhopal (M.P),India

Neelesh Gupta, Department of Electronics & Communication, TIEIT(TRUBA), Bhopal (M.P),India

.

Abstract - AODV is Ad-hoc On-Demand Distance Vector. A mobile ad-hoc network is a self-configuring network of mobile devices connected by wireless. MANET does not have any fixed infrastructure. The device in a MANET is free to move in any direction and will form the connection as per the requirement of the network. Due to changing topology maintenance of factors like Packet loss, End to End Delay, Number of hops, delivery ratio and controlling the network load is of great challenge. This paper mainly concentrates on reducing the factors such as cost, End-to-End Delay, Network Load and Packet loss in AODV routing protocol. The NS-2 is used for the simulation purpose.

.

Keywords: AODV, Power consumption, End-to-End Delay, Network Load

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

12. Paper 31031346: Data Structures and Internet Application Identification (pp. 72-76)

Full Text: PDF

.

Mrs. Mrudul Dixit, Assistant Professor, Department of Electronics and Telecommunications, Cummins College of Engineering for Women, Karvenager, Pune – 411052, M.S. India.

Dr. Balaji V. Barbadekar, Principal, Dyanganga College of Engineering, Pune, Maharashtra, India

.

Abstract — Internet traffic describes the number of packets of various applications moving on the network. The internet traffic is increasing enormously day by day and so there is a need to monitor the network and the traffic for network management and planning, traffic modeling and detection, bandwidth analysis, etc. The identification of internet applications can be done on the basis of well known port numbers. The identification of application leads to analysis of bandwidth utilization by various internet applications. The port numbers are stored using different data structures. When a packet is received the port number from the packet is matched with the port numbers in the data structures. The time required to map is analyzed and should be minimum. The space required to store the database also should be minimum. There is always a tradeoff between the space and time. This paper deals with the analysis of space and time requirements for identification of internet applications based on well known port numbers using the data structures Binary Search Tree, AVL tree and Skip list. The packet capturing is done using tcpdmp and Libpcap library on Linux platform using ‘C’ Language.

.

Keywords- Internet traffic, port number, skip list, AVL tree, BST.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

13. Paper 31031347: Single MO-CFTA Based Current-Mode SITO Biquad Filter with Electronic Tuning (pp. 77-81)

Full Text: PDF

S. V. Singh, Department of Electronics and Communication Engineering, Jaypee Institute of Information Technology, Sec-128, Noida, India

R. S. Tomar, Department of Electronics Engineering, Anand Engineering College, Agra, India

D. S. Chauhan, Department of Electrical Engineering, Institute of Technology, Banaras Hindu University, Varanasi-221005 (India)

.

Abstract — This paper presents an electronically tunable current mode single input three output (SITO) biquad filter employing single multi-output current follower trans-conductance amplifiers (MO-CFTA). The proposed filter employs single resistor and two grounded capacitors. The proposed filter can simultaneously realize low pass (LP), band pass (BP) and high pass (HP) responses in current-mode. It is also capable of providing band reject (BR) and all pass (AP) responses without matching of components. In addition, the circuit possesses low sensitivity performance and low power consumption. The validity of proposed filter is verified through PSPICE simulations.

.

Keywords-component; CFTA, Biquad, Current-mode, Filter

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

14. Paper 31031348: Dynamic AODV for Mobile Ad-hoc Network (pp. 82-86)

Full Text: PDF

.

Aditya Shrivastava, Information Technology, TIT, Bhopal, India

Deepshikha Patel, Information Technology, TIT, Bhopal, India

Amit Sinhal, Information Technology, TIT, Bhopal, India

.

Abstract - Since long time work has been done to enhance working capability of AODV (Ad-hoc on demand distance vector routing protocol for Mobile Ad-hoc Network. Performance of AODV has been improved by some modification in its working procedure by many others researchers. Few parameters have been improved, and rest has been trade-offs. In this research work, AODV has been modified in such a way to improve its Dynamistic. Obviously, performance has been improved in terms of Throughput and Packet Delivery Ratio with the compromising Avg, End to End Delay and Routing/Network Overhead.

.

Keywords:- AODV, PDR, Networks Overhead, Throughputs, Avg. End-To-End Delay, Dynamic.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

15. Paper 31031350: Steganography in Colored Images (pp. 87-92)

Full Text: PDF

.

Iman Thannoon Sedeeq, Department of Public Health, College of Veterinary Medicine, University of Mosul / Mosul, Iraq

.

Abstract — Since people use internet daily they have to take care about information security requirement more and more. In this wok a new algorithm for RGB based images steganography is presented. The algorithm uses LSB principle for hiding a variable number of secret message bits in RGB 24-bits color image carrier either in other one or two channels depending on the third one (index channel). The algorithm offered good capacity ratio with no visual distortion on the original image after hiding the secret message. Histograms of three channels (red, green, blue) are also compared before and after hiding process.

.

Keywords- Stganography; RGB; LSB; True color image.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

16. Paper 31031355: Agent Behavior in Multiagent Systems: Issues and Challenges in Design, Development and Implementation (pp. 93-96)

Full Text: PDF

.

Mohamed Ziyad TA, Lecturer in Dept. of CSE, SSM Polytechnic College, Tirur, Kerala, INDIA

Dr KR Shankar Kumar, Professor in Dept. of ECE, Sri Ramakrishna Engineering College, Coimbatore, Tamil Nadu, INDIA

.

Abstract — Multiagent System (MAS) technology, composed of multiple interacting intelligent agents, has become a new paradigm for modeling, designing, and implementing software solutions for complex and distributed problem solving. Multiagent system and its application have played an important part in academic research. The usages of agent based applications are increasing day by day with internet spreading widely. This study indent to address a brief area relating to the issues and challenges in the design, development and implementation of agent-based intelligent systems.

.

Index Terms—Distributed problem solving, intelligent agent, agent behavior,

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

17. Paper 31031357: A Comparative Study of VoIP Protocols (pp. 97-101)

Full Text: PDF

.

Hadeel Saleh Haj Aliwi, Putra Sumari, Saleh Ali Alomari

Multimedia Computing Research Group, School of Computer Sciences, Universiti Sains Malaysia, Penang, Malaysia

.

Abstract — Nowadays, Multimedia Communication has been developed and improved rapidly in order to enable users to communicate between each other over the Internet. In general, the multimedia communication consists of audio, video and instant messages communication. This paper surveys the functions and the privileges of different voice over Internet protocols (VoIP), such as InterAsterisk eXchange Protocol (IAX), Session Initiation Protocol (SIP), and H.323 protocol. As well as, this paper will make some comparisons among them in terms of signaling messages, codec’s, transport protocols, and media transport, etc.

.

Keywords- Multimedia; VoIP; InterAsterisk eXchange Protocol (IAX); Session Initiation Protocol (SIP); H.323 protocol; Signaling Messages

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

18. Paper 31011212: A Novel Approach for Object Detection and Tracking using IFL Algorithm (pp. 102-109)

Full Text: PDF

.

R. Revathi, Research Scholar, Dept. of Computer Science, Karpagam University, Coimbatore, India

M. Hemalatha, Dept. of Computer Science, Karpagam University, Coimbatore, India

.

Abstract — This paper is an innovative attempt has been made using Attanassov’s Intuitionistic fuzzy set theory for tracking moving objects in video. The main focus of this proposed work is taking an account for handling uncertainty in assignment of membership degree known as hesitation degree using Intuitionistic fuzzy. Many algorithms have been developed to reduce the computational complexity of movement vector evaluation. In this paper we propose to implement Intuitionistic logic based block Matching Algorithm termed as BMIFL to overcome the computational complexity. In this proposed methodology feature extraction is performed using 2Dfilter, segmentation using approximate median and object detection is done using our proposed algorithm Intuitionistic fuzzy. The results obtained clearly shows that our algorithm performs better than fuzzy logic based three Step Search algorithm

.

Keywords- component; Noise filtering, Segmentation, Object Tracking and detection, Fuzzy Logic.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

19. Paper 31031326: A Comparative Study of some Biometric Security Technologies (pp. 110-120)

Full Text: PDF

.

Ogini, Nicholas Oluwole

Department of Mathematics and Computer Science, Delta State University, Abraka, Delta State

.

Abstract - Authentication plays a very critical role in security related applications. This is obvious from the breaches of information systems recorded around the world. This has become a major challenge to ecommerce and many other applications. One of the techniques that is implemented today to improve information security is biometrics, and this is gaining attention as the days go by. Having realized its value, biometrics is used in most systems today for the verification and identification of users as it overcomes the problems of being stolen, borrowed, forged or forgetting. In this paper therefore, we show the origin and types of biometrics, their areas of application, and what to look out for in selecting a biometric technology.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

20. Paper 31031359: Digital Images Encryption in Spatial Domain Based on Singular Value Decomposition and Cellular Automata (pp. 121-125)

Full Text: PDF

.

Ahmad Pahlavan Tafti, PhD Student, Department of Computer Science, University of Wisconsin Milwaukee

Reyhaneh Maarefdoust, Sama technical and vocational training college, Islamic Azad University, Mashhad Branch, Mashhad, Iran

.

Abstract — Protection of digital images from unauthorized access is the main purpose of this paper. A reliable approach to encrypt a digital image in spatial domain is presented here. Our algorithm is based on the singular value decomposition and one dimensional cellular automata. First, we calculate the singular value decomposition (SVD) of the original image in which the features of the image are extracted and then pushed them into the one dimensional cellular automata to generate the robust secret key for the image authentication. SVD is used as a strong mathematical tool to decompose a digital image into three orthogonal matrices and create features that are rotation invariant. We applied our proposed model on one hundred number of JPEG RGB images of size 800 × 800. The experimental results have illustrated the robustness, visual quality and reliability of our proposed algorithm.

.

Keywords - Digital Images Encryption; Spatial Domain Encryption; Cellular Automata, SVD.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

21. Paper 31031356: Two-Level Approach for Web Information Retrieval (pp. 126-130)

Full Text: PDF

.

S. Subatra Devi, PSVP Engineering College, Chennai, Tamil Nadu, India.

Dr. P. Sheik Abdul Khader, BSA Crescent Engineering College, Chennai, Tamil Nadu, India.

.

Abstract - One of the most challenging issues for web search engines is finding high quality web pages or pages with high popularity for users. The growth of the Web is increasing day to day and retrieving the information, which is satisfied for the user has become a difficult task. The main goal of this paper is to retrieve more number of, most relevant pages. For which, an approach with two-levels are undergone. In the first level, the topic keywords are verified with the title of the document, the snippet, and the URL path. In the second level, the page content is verified. This algorithm produces efficient result which is being proved experimentally on different levels.

.

Keywords - Information Retrieval; Crawler; Snippet.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------