Tuesday, 29 January 2013

An Approach To Enhance Level Of Security To The ATM Customers By Hiding Face Biometric Data Using Steganography

Vol.1 No.3

Year: 2012
Issue: Jun-Aug
Title: An Approach To Enhance Level Of Security To The ATM Customers By Hiding Face Biometric Data Using Steganography   
Author Name: K. Lavanya, C. Naga Raju   
Synopsis:   
Automated teller machine allows the banks customers to carry out banking transactions like, deposits, transfers, balance enquiries, and withdrawal. Criminal activities at ATM’s have become a nationwide issue. In order to certify safe and secure transactions banks has to meet certain standards. This paper focuses on preventing such activities and enhancing the level of security at ATMs. Biometric authentication technique is proven to address the problems of traditional methods which are presently used in ATMs. Face recognition has received substantial attention from researchers in biometrics. In this approach, a face recognition system for personal identification and verification can be done using Principal Component Analysis (PCA). To enhance the level of security user’s biometric data itself hidden with steganography measures. Spatial based LSB Steganography methods is used for hiding biometric data into another covered image  and then  receiver can detect the secret message.
  


 


Users Satisfaction in Library Services in Nehru Institute of Engineering and Technology (NIET) at Coimbatore: A study

Vol.1 No.3

Year: 2012
Issue: Jun-Aug
Title: Users Satisfaction in Library Services in Nehru Institute of Engineering and Technology (NIET) at Coimbatore: A study 
Author Name: C.S Chandra Mohan Kumar, J. Dominic   
Synopsis:   
The knowledge of information communication technology (ICT) facilities utilized to the e- resources at the Nehru institute of Technology. A questionnaire was prepared to elicit opinion from the (ICT) users. Response was gathered from 80 UG students form the engineering college. The availability of the right information at the right time and the right from all most importance to the users for their knowledge and development infrastructures activities. It has been in this study to know about the status of ICT infrastructure in the engineering college library in the Coimbatore region. The survey provides information about the resource users benefits of e-resources.



 


Moving Object Detection, Tracking and Classification Using Neural Networks

Vol.1 No.3

Year: 2012
Issue: Jun-Aug
Title : Moving Object Detection, Tracking and Classification Using Neural Networks   
Author Name: Hamsa A Abdullah   
Synopsis:   
Moving object detection and tracking (D&T) are important initial steps in object recognition, context analysis and indexing processes for visual surveillance systems. It is a big challenge for researchers to make a decision on which D&T algorithm is more suitable for which situation and/or environment and to determine how accurately object D&T (real-time or non-real-time) is made. There is a variety of object D&T algorithms (i.e. methods) and publications on their performance comparison and evaluation via performance metric. This paper discusses a hybrid technique for detecting and tracking moving pedestrians in a video sequence. The technique comprises two sub-systems: the first one for detecting and tracking moving objects in the visual field, and the second one for classifying the moving objects being tracked as human or cars by using MLP neural network. Experiments measuring the neural network s accuracy at classifying unseen computer generated and real moving objects are presented, along with potential applications of the technology.

.

Performance Analysis of Different MANET Specific TCP variants

Vol.1 No.3

Year: 2012
Issue: Jun-Aug
Title : Performance Analysis of Different MANET Specific TCP variants   
Author Name: Debajyoti Pal
Synopsis: 
Transmission Control Protocol (TCP) is implemented in the transport layer of a MANET, which enjoys the advantage of reliable data transmission over the Internet. However, due to certain unique characteristics of a MANET, modification of classical TCP has been done so as to improve its performance in such an environment. Accordingly, several MANET specific TCP versions like TCP Reno, TCP New Reno, TCP Tahoe and TCP Vegas have come into prominence. This paper evaluates the performance of the different TCP versions for the same network topology over certain fixed parameters like number of packets generated/node, average packet loss, average delay incurred by the packets while in transit from source to destination and the processing time taken by the intermediate nodes. For routing purpose, we have assumed Ad-Hoc On Demand Distance Vector Routing (AODV) as the standard. To address the common issues of congestion control as with TCP, the experiment has been carried out under different network loading conditions that have been achieved by slowly increasing the node density
.

A Module for Enhancing Recognition System for QR Code Scanned Image

Vol.1 No.3

Year: 2012
Issue: Jun-Aug
Title : A Module for Enhancing Recognition System for QR Code Scanned Image   
Author Name : Furat Nidhal, Mrs. Yasamine Mazin Tabra   
Synopsis :   
A QR code is a type of barcode that can hold more information than the familiar kind scanned at checkouts around the world. The “QR” stands for “quick response”, a reference to the speed at which the large amounts of information they contain can be decoded by scanners. They are being widely used for advertising campaigns, linking to company websites, contest sign-up pages and online menus. In this paper, we propose an efficient module to extract QR code from background and solve problem of rotation in case of inaccurate image taken from mobile camera.

Monday, 28 January 2013

Using Data Mining Concept Of Outlier Detection For Finding Disparity In Chhattisgarh Resource Envelop For Rural Development

Vol.1 No.2

Year: 2012
Issue: Mar-May
Title: Using Data Mining Concept Of Outlier Detection For Finding Disparity In Chhattisgarh Resource Envelop For Rural Development 
Author Name : Neeraj Dewangan, Siddharth Choubey   
Synopsis :   
ICT plays an indispensable role in the overall development of rural areas, especially in developing economies. There is an urgent need to bring the rural areas into the mainstream by providing them the research and findings which until now only the top level planners to some extent are using. The analysis of the Resource envelops of various department shows the gaps where a planner can pay attention and thus minimize the disparity of allocation. Outlier detection is a primary step in many data-mining applications. Outlier detection for data mining is often based on distance measures, clustering and spatial methods. In many data analysis tasks a large number of variables are being recorded or sampled. One of the first steps towards obtaining a coherent analysis is the detection of outlaying observations. Although outliers are often considered as an error or noise, they may carry important information. Detected outliers are candidates for aberrant data that may otherwise adversely lead to model misspecification, biased parameter estimation and incorrect results. It is therefore important to identify them prior to modeling and analysis.



 



 


Energy Efficient Scheme for Object –Tracking in Wireless Sensor Networks

Vol.1 No.2

Year: 2012
Issue: Mar-May
Title: Energy Efficient Scheme for Object –Tracking in Wireless Sensor Networks   
Author Name: S. Anandamurugan 
Synopsis: 
In recent years, we have witnessed an increasing interest in deploying wireless sensor networks (WSNs) for real-life applications. However, before WSNs become a commodity, several challenging issues remain to be resolved. Object-tracking sensor network (OTSN)-based applications are widely viewed as being among the most interesting applications of WSNs. OTSN is mainly used to track certain objects in a monitored area and to report their location to the application’s users. However, OTSNs are well known for their energy consumption when compared with other WSN applications. In this paper, we propose a prediction-based tracking technique using sequential patterns (PTSPs) de-signed to achieve signi?cant reductions in the energy dissipated by the OTSNs while maintaining acceptable missing rate levels. PTSP is tested against basic tracking techniques to determine the appropriateness of PTSP under various circumstances. Our experimental results have shown that PTSP outperforms all the other basic tracking techniques and exhibits signi?cant amounts of savings in terms of the entire network’s energy consumption.



 


An efficient technique for Iris recocognition based on ENI features

Vol.1 No.2

Year: 2012
Issue: Mar-May
Title  : An efficient technique for Iris recocognition based on ENI features   
Author Name  : K. Lavanya, K. Subba Rao , C. NagaRaju 
Synopsis  :   
Iris location estimation has been studied in numerous works in the literature. Previous research shows satisfactory result. However, in presence of non frontal faces, eye locators are not adequate to accurately locate the center of the eyes. The Iris location estimation techniques are able to deal with these conditions, hence they may be suited to enhance the accuracy.In this paper, a new method is proposed to obtain enhanced Iris location estimation. This  method  has three steps (1) enhance the accuracy of Iris location estimations (2) extend the operative range of the Iris locators with LBP and (3)  improve the accuracy of the Iris location. These enhanced estimations are used to obtain a novel visual Iris estimation system.
.

Finding Relationship Between Mycobacterium tuberculosis and Mycobacterium leprae Using Association Rule Mining

Vol.1 No.2

Year: 2012
Issue: Mar-May
Title : Finding Relationship Between Mycobacterium tuberculosis and Mycobacterium leprae Using Association Rule Mining 
Author Name : M. Venkatesh Saravanakumar, K. Sivanthi , M. Sathya Prabha 
Synopsis : 
Data mining has been recognized as a new area for database research. In the area of knowledge discovery, association rule mining focuses on finding a set of all subsets of items, that frequently occur in database records and then extracting the interesting patterns found among them. Recent advancement in biotechnology has produced a massive amount of raw biological data which are accumulating at an exponential rate. Tuberculosis remains one of the leading causes of morbidity and mortality of mankind throughout the world. Mammalian cell entry (mce) gene is crucial in conferring virulence to Mycobacterium tuberculosis. This paper focuses on finding association between Mycobacterium tuberculosis and Mycobacterium leprae based on presence of mammalian cell entry gene. This gives useful insight for microbiologists in identifying and clustering the organisms.

A Study on Configuration Management in Software Environment

Vol.1 No.2

Year: 2012
Issue: Mar-May
Title  : A Study on Configuration Management in Software Environment   
Author Name  : V. Karamchand Gandhi   
Synopsis  :   
Configuration management (CM) is a field of management that focuses on establishing and maintaining consistency of a system or product's performance and its functional and physical attributes with its requirements, design, and operational information throughout its life. CM can be defined as the management of security features and assurances through control of changes made to hardware, software, firmware, documentation, test, test fixtures, and test documentation throughout the life cycle of an information system. CM for information assurance, sometimes referred to as Secure Configuration Management, relies upon performance, functional, and physical attributes of IT platforms and products and their environments to determine the appropriate security features and assurances that are used to measure a system configuration state. For example, configuration requirements may be different for a network firewall that functions as part of an organization's Internet boundary versus one that functions as an internal local network firewall. In this paper we studies and discuss about the basic needs of Software Configuration management, the role of preventive Maintenance and predictive maintenance.

The Role of Client Isolation in Protecting Wi-Fi Users from ARP Spoofing Attacks

Vol.1 No.2

Year: 2012
Issue: Mar-May
Title  : The Role of Client Isolation in Protecting Wi-Fi Users from ARP Spoofing Attacks   
Author Name  : Timur Mirzoev, Joel Stacey White   
Synopsis  :   
This study investigates the role of the client isolation technology Public Secure Packet Forwarding (PSPF) in defending 802.11 wireless (Wi-Fi) clients, connected to a public wireless access point, from Address Resolution Protocol (ARP) cache poisoning attacks, or ARP spoofing. Exploitation of wireless attack vectors such as these have been on the rise and some have made national and international news. Although client isolation technologies are common place in most wireless access points, they are rarely enabled by default. Since an average user generally has a limited understanding of IP networking concepts, it is rarely enabled during access point configurations. Isolating wireless clients from one another on unencrypted wireless networks is a simple and potentially effective way of protection. The purpose of this research is to determine if a commonly available and easily implementable wireless client isolation security technology, such as PSPF, is an effective method for defending wireless clients against attacks

Thursday, 24 January 2013

A Literature Survey on Cloud Computing

Vol.1 No.1

Year: 2012

Issue: Dec-Feb

Title: A Literature Survey on Cloud Computing 

Author Name: Venkatesan Thillainayagam 

Synopsis: 

Cloud computing has recently emerged as a new paradigm for hosting and delivering services over the Internet. Cloud computing is attractive to business owners as it eliminates the requirement for users to plan ahead for provisioning, and allows enterprises to start from the small and increase resources only when there is a rise in service demand. However, despite the fact that cloud computing offers huge opportunities to the IT industry, the development of cloud computing technology is currently at its infancy, with many issues still to be addressed. In this review paper, we present a survey of cloud computing, highlighting its key concepts and architectural principles. The aim of this review paper is to provide a better understanding of the cloud computing environment and identify important research directions in this increasingly important area.

Achieving Green Computing Through Algorithmic Efficiency

Vol.1 No.1

Year: 2012

Issue: Dec-Feb

Title: Achieving Green Computing Through Algorithmic Efficiency 

Author Name: Soujanya Nemalikanti, Polavarapu Sindhura, Pavan kumar Tumalla, Srikanth Vemuru 

Synopsis: 

Power consumption has always been a crucial factor in deciding the performance of a computing system. The existing factors that serve as a yardstick to measure the performance include Space complexity and Time complexity. However, towards a Greener era of computing, it is the need of the hour to consider High Performance Systems that are energy efficient and thereby lesser heat and carbon emitters. The conventional approach ,on the software grounds, include redefining algorithms that focus on the reduction on the time complexity and Space Complexity of the program .We, hereby, propose a novel approach that takes into consideration the Power Optimization ,with respect to making an algorithm more efficient ,as an equally important issue for a greener solution towards energy efficient programs.

Modified Multi - Scale Morphological Watershed Segmentation Algorithm of 2d Images Using Hill Climbing Techniques

Vol.1 No.1

Year: 2012

Issue: Dec-Feb

Title: Modified Multi - Scale Morphological Watershed Segmentation Algorithm of 2d Images Using Hill Climbing Techniques 

Author Name: R. Chithra Devi, R. Ananda Devi , T. Saravana Kumar 

Synopsis: 

The Watershed transformation has recently become a popular tool for image segmentation.  The purpose of image segmentation is to divide an original image into homogeneous regions. There exist several approaches to implement image segmentation. In this paper, Modified Multi-Scale Morphological Watershed Segmentation Algorithm of 2D Images Using Hill Climbing Techniques is introduced as a method of image segmentation.  It is a fast and flexible algorithm for computing watersheds in digital grayscale images. A review of watersheds and related notion is first presented and the major methods to determine watersheds are discussed. The present algorithm is based on Hill Climbing process analogy, in which the flooding of the water in the picture is efficiently simulated using a queue of pixels. It is proved that the accuracy of this algorithm is superior to that of the existing implementations. In addition, its strongest point is that it is faster than any other watershed algorithm. Mainly it reduces the over — segmentation. 

Lines Loading Optimization in Transmission Expansion Planning Based on Binary PSO Algorithm

Vol.1 No.1

Year: 2012

Issue: Dec-Feb

Title: Lines Loading Optimization in Transmission Expansion Planning Based on Binary PSO Algorithm 

Author Name: M. Mahdavi, H. Monsef, A. Bagheri 

Synopsis: 

Transmission network expansion planning (TNEP) is an important component of power system planning. It determines the characteristic and performance of the future electric power network and influences the power system operation directly. In this paper, expansion planning has been implemented by merging lines loading parameter in the STNEP and including investment cost into the fitness function constraints using binary particle swarm optimization (BPSO) algorithm. The particle swarm optimization is a recently developed evolutionary algorithm (EA) based on the swarm behavior in the nature and has a strong ability to find the most optimistic results. The motivation for using the BPSO technique is to reduce design effort and find an optimum planning network. Expanded network will possess a maximum adequacy to provide load demand and also the transmission lines overloaded later. The proposed idea has been tested on the Garvers network. The results evaluation shows that the network will possess maximum efficiency economically.

The influence of dynamic environment on the success of strategic information systems planning: A comparative study

Vol.1 No.1

Year: 2012

Issue: Dec-Feb

Title: The influence of dynamic environment on the success of strategic information systems planning: A comparative study 

Author Name: Luka M. MUSANGU, Raymond M Kekwaletswe 

Synopsis: 

This study investigated the influence of environmental dynamism in the relationship between planning process and SISP success in manufacturing and non-manufacturing SBs. Based on responses from 118 South Africa CIOs or head of IS/IT, our empirical investigation provided the following results: of all eleven hypotheses tested, nine were supported and two were not. The findings of study demonstrate that environmental dynamism is more influential in non-manufacturing enterprises than in manufacturing enterprises, the implementation of planning process is strongly leading to the success of SISP in manufacturing enterprises than in non-manufacturing and environmental dynamism influence more the relationship between planning process and SISPS in manufacturing enterprises than in non-manufacturing enterprises. The implications and limitations of this study are also discussed.

A Framework for Telemedicine using Cloud Computing

Vol. 1 No.1

Year: 2012
Issue: Dec-Feb

Title: A Framework for Telemedicine using Cloud Computing 

Author Name: Bhaskar Reddy Muvva Vijay, Tewdros Sisay Asefa 

Synopsis: 

According to a survey by world health organization (WHO), an abysmally more number of people living in rural area have access to specialist care and advice in the developing countries. This opens up the possibility of using information and communication technology effectively in the 21st century. Telemedicine is currently being used to bridge the physical distances between patients in remote areas and medical specialists around the world. The recent advances in broadband technology by facilitating anytime, anywhere access. It is not required doctor to be present physically at the hospital center. In this paper, we present an overview of traditional telemedicine system, cloud computing based framework for telemedicine. We clearly indicate the architecture of telemedicine cloud and discuss the applicability of recent wireless technologies in large-scale telemedicine systems.

Abstracting/Indexing

Abstracting/Indexing

Cabell's Computer Science DirectoriesUlrich's Periodicals Directory
Index Copernicus
Indian Citation Index
Search Digital Library

Tuesday, 22 January 2013

Editorial Board Members – Information Technology (JIT)

Editorial Board Members – Information Technology (JIT)

Sl. No.
Editorial Board Members
Designation
1.
Dr. Mohammed A. Abdala
Associate Professor and Deputy Dean,
Information Engineering College,
Nahrain University,
Baghdad,
Iraq.
2.
Bensujin B
Registrar / Lecturer,
Dept. of Engineering,
Nizwa College of Technology,
Nizwa, Sultnate of Oman.
3.
Farhad Mehran
University of Birmingham, UK.
4.
Dr. Brijender Kahanwal
Assistant Professor,
Department of Computer Science & Engineering,
Faculty of Engineering, Galaxy Global Group of Institutions,
Shahabad (Ambala), Haryana.
5.
Dr. Sukumar Senthilkumar
Researcher,
Advanced Education Center of Jeonbuk for Electronics and Information Technology,
Chon Buk National University,
South Korea.


Thursday, 17 January 2013

i-manager's Journal on Information Technology

i-manager’s Journal on Information Technology (JIT)


i-manager’s Journal on Information Technology provides a forum to the academics, professionals and advanced level students in IT for exchanging significant information, productive ideas associated with information technology and future prospects in the areas of contemporary information and communications technology. Technology changes so rapidly and the Journal aims to publish high quality papers from academia and practitioners in all areas pertaining to Information Technology and disseminate Knowledge on the same.


Abstracting/IndexingCabell's Computer Science DirectoriesUlrich's Periodicals Directory
Index Copernicus
Indian Citation Index
Search Digital Library


Review Procedure
The Journal follows a double blind peer-review process. The submitted articles / research papers are reviewed by Professors/ Educators of Information Technology.Target AudienceAcademicians, practitioners and post-graduate students of Information Technology, University Educational Bodies, Researchers, leading Corporate etc.

Features
Articles, Research Papers, Conference around the Globe.

Periodicity
December - February, March - May, June - August, September - November

Kindly contact the editor at editor_jit@imanagerpublications.com for the Call for Paper.

Join us in Facebook at
http://www.facebook.com/pages/i-manager-Publications/133768289995766#!/pages/Journal-on-Information-Technology/147263655368107