Document summarization using differential evolution algorithm
The use of document summarization allows a user to get a sense of the content of full document, or to know its information content without reading all sentences within the document. Data reduction helps user to find the required information quickly without having to waste time in reading the whole document. This paper presents a method to generate a summary from the original document. And the method includes several characteristics such as sentence-id, position of each term in a sentence, term frequency, sentence similarity measure and weight of each and every sentence. To solve the optimization problem differential evolution (DE) algorithm is used, which can choose the optimal summary. DE algorithm is based on a fitness function and selection of fitness function is crucial for the good performance of DE algorithm.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Energy Consumption Control for Mobile Ad-hoc Networks: A Survey
Energy consumption control in wireless ad-hoc networks is a more difficult problem due to non availability of access point in network. A node can be both a data source and a router that forwards data for other nodes. There is no centralized entity such as an access point to control and maintain the power control mode of each node in the network. There are number of challenges offered by mobile ad- hoc network environment like limited power, route failure, synchronization, security etc. Nodes in the mobile ad-hoc network environment have limited battery power. Extra amount of energy is needed by router to forward and to relay packets. In this paper, literature survey is carried out on energy consumption issues for wireless ad-hoc network.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Alarming global warming trends due to heat emission by computer monitors
The world’s entrance into the computer age along with web has certainly had a profound impact on our society. With increase in purchasing power, mass production, lesser costs, exponential growth in computer technology and population growth were one of the main drivers of increases in global warming and climate change. The onset of Information age is associated with the digital revolution, just as the Industrial Revolution marked the information age. Computerization of modern society has brought convenience to all aspects of human life. It seems evident that there will be both positive and negative effects on society and global environment. Computers have added a new source of heat generation and emission into environment. In spite of recent studies indicating possible threats to global warming and global climate, there is no long term data available on the amount of heat generated, emitted and dissipated into environment by computer monitors. The scope of this research work is to experimentally measure the heat generated by computer monitors during on (sleep/Idle) mode and working mode. For this research work four decimal digit temperature measurement test instrument was designed and exclusively fabricated. A special air locked container was also fabricated for conducting heat emission experiments on computer monitors. Population and computers projections for India, China, USA and the whole world were also included in this research work for 2050. An attempt is made to indicate amount of heat generated, emitted and dissipated into environment by India, China, USA and entire world by computer monitors at present and projections for 2050.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Compressed Domain Based Review on Digital Video Watermarking Techniques
The present review covers the literature of digital video watermarking schemes based on considering the video during encoding or encoded video in an increasing order of their publication year from 1998 to 2016. Through extensive literature, some grouping is required. Therefore, only papers published by a method of peer review in high class journal are reviewed. Most of the papers are deals with MPEG structure. Few papers are following the structure of H.264/AVC. These articles include experimental, analytical and numerical work for specific applications. This review also takes papers from good conferences and meeting on video watermarking in addition to above reviewing journal articles. The limitations and the still existing challenges are described in the later part of the review facilitate for those authors who further require doing some innovative work in this field. Eventually, the aim of the authors is to covers the in-depth discussion on already published literature based on compressed domain video watermarking.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Preventing SQL injection attacks using Blowfish and RSA
SQL injection attacks on the web databases are mainly due to the application development process where the coding process is vulnerable as it was not secured. This however can be prevented by various methods. One of the techniques is to limit the access of database to authorized users only. Database contents are encrypted so as to allow a secure way of efficient query processing directly on the encrypted database. SQL attacks can be prevented through highly secure authentication schemes in the login phase itself. In this paper, we have presented one such technique. Our scheme proposes that access be provided to verified users only. That is, at the time of creation of the user account, a user key is generated for every user where the user name and password at the time of login is encrypted by Blowfish encryption and RSA technique at different levels of the total encryption process. The access is provided by the server after confirming the user’s authenticity. On server side the encrypted data will be decrypted using the user key. The decrypted data will be checked and if the user is genuine, further access will be granted to the database. The RSA encryption will work as a protective cover for the SQL query generated by the user at the client’s end.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Realisation of electronic circuit based on modified rossler system and its application in secure communication
The present article described the design technique of hardware electronic circuit based on modified Rossler equations. The dynamical behaviour of the proposed system has been studied by computer simulation and in electronic experiment. The results of periodic and chaotic behaviour of the hardware circuit are reported. Next the synchronization between two such electronic circuits is experimentally verified and a secure scheme of communication is described using chaos masking technique. The hardware experimental results are incorporated in this article to support the design algorithm.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Sharon: bio-sensor system in health care using Christina theory WHDM tool
In this work we have proposed a new mobile based health application on pervasive computing to cater the well being of human life and we designing a new bio-related mobile which is incorporated with an application called AIDS Awareness Application (A.A.A), we call it as “Sharon Mobile” with automatic application for suggesting the AIDS related frequently asked questions. This mobile has two different storage say server side and dB related storage in the mobile database itself. Gender wise searching option is implemented in this AIDS Awareness mobile. We are using heterogeneous data mining and mobile dB features for query searching with WHDM Tool.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Heterogeneous Framework for Indian Cybercrime Cases
The internet has served as the global language of the virtual world since the beginning of the digital world and the Internet in India is increasing rapidly .Internet served seriously in many more areas in current scenario like Trade, education, sports, and research. Internet is treated as coin because it having two sides merits and demerits. A major problem of internet in current scenario is “Cyber Crime”. Here we study and analysis about the current cyber crimes in India through the literature survey, government annual reports, verbal communication with ethical hackers and many more techniques like Questionnaires and from the head of cyber cell from different states in India. We also study and analysis the different cyber crimes case studies which is occurred in different states in India and Indian cyber laws framework is compared with other country framework. So, finally we conclude that, our cyber laws frameworks having some of the vulnerabilities and problems for executing cyber cases compare to other countries. So we propose a heterogeneous approach or model for executing our legal framework smoothly against the cybercrimes in current scenario.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Review Summarization with Machine Learning Language
Now a days e-commerce becoming more popular, Seller selling product on the web often ask their customers for reviews about products which they have purchased and these reviews are used by other people to know features of the product. In this paper, we design and develop, review summarization system with Machine Learning Language. The goal of review summarization system is to take out the product features on which people write their opinions and then identifying whether the opinions are positive, negative or neutral. This system is based on the sentiment classification and portal algorithm. It differentiates the reviews into positive, negative and neutral. Latent Semantic Analysis (LSA) is used to identify features of the product. Portal algorithm is used to classify the reviews. In proposing system we display total percentages of reviews in graphical representation.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Design and implementation plan of e-tourism and development: sample approach in KSA
In recent decades the tourism sector has grown rapidly to become a pillar of the global economy, political cooperation, social change and far - reaching advances in technology; both in communications and infrastructure. Tourism has closely been connected to progress of ICTs for over 30 years. With increasing complexity of tourism business models and tasks, there is a clear need of the next generation in tourism sector. Therefore, we proposing here new structure e-tourism which can support flexible automation, integration, computation, storage, and collaboration. In every year, millions of pilgrims visiting our Holy City, But on the part of tourism and development, Saudi Arabia is less than Europe, America and Asia in the sector of tours and travel development. There is no much significance research proposal or article on e-tourism & development in our Saudi Kingdom. This paper deals with e-tourism, innovation and designing proposal suitable for Kingdom of Saudi Arabia. Also we discussed about problems and solutions related to the e-tourism sector adoptable by the industry and government organization in Saudi Arabia.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]