International Journal of Inventive Engineering and Sciences(TM)
Exploring Innovation| ISSN:2319-9598(Online)| Reg. No.:68563/BPL/CE/12| Published by BEIESP| Impact Factor:3.47
Home
Articles
Conferences
Editors
Scopes
Author Guidelines
Publication Fee
Privacy Policy
Associated Journals
Frequently Asked Questions
Contact Us
Volume-3 Issue-3: Published on February 20, 2015
15
Volume-3 Issue-3: Published on February 20, 2015
 Download Abstract Book

S. No

Volume-3 Issue-3, February 2015, ISSN: 2319-9598 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.

1.

Authors:

Surve Pranjali, Ubale V. S

Paper Title:

Hand Gesture Recognition Systems: A Survey

Abstract: The first mode of communication in the early ages was gesture. Later on the verbal communication was developed very well. But still non-verbal communication has its importance.  Non – verbal communication is used for the physically challenged people, for different applications. For e.g. aviation, surveying, music direction etc. It is the method to interact with other peripheral devices, such as keyboard, mouse. The important steps involved in HGR systems are data acquisition, gesture modelling, feature extraction and hand gesture recognition. Different algorithm are followed by different researchers or sometimes used their own algorithm. This paper studies different methods of HGR and finally the desired characteristics of a robust and efficient hand gesture recognition system have been described.

Keywords:
Hand gesture recognition, Principal component analysis (PCA), Rotation invariant.


References:

1.        RafiqulZaman Khan & Noor Adnan Ibraheem (2012), omparative study of hand gesture recognition system”  Department of Computer Science, A.M.U., Aligarh, India.
2.        SushmitaMitra, Senior Member, IEEE, and Tinku Acharya, Senior Member, IEEE (2007), “Gesture Recognition: A Survey”

3.        PrateemChakraborty, PrashantSarawgi, AnkitMehrotra, Gaurav Agarwal, Ratika Pradhan (2008), “Hand Gesture Recognition: A Comparative study”IMECS 2008, 19-21 March, 2008, Hong Kong.

4.        Sudheesh.P, Gireesh Kumar T. July 2012, “Vision based Robot Navigation for Disaster Scenarios”AmritaVishwa Vidyapeetham Coimbatore, India.

5.        Kwang-HoSeok, Chang-Mug Lee, Oh-Young Kwon, Yoon Sang Kim (2009),”A Robot Motion Authoring using Finger robot interaction” Korea University of Technology and Education Cheonan, Korea.


1-5

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

2.

Authors:

Ahmed Mudassar Ali, M. Ramakrishnan

Paper Title:

Web Personalized Index Based N-GRAM Extraction

Abstract: Web mining is the analysis step of the "Knowledge Discovery in Web Databases" process which is an intersection of computer science and statistics. In this process results are produced from pattern matching and clustering which may not be relevant to the actual search. For example result for tree may be apple tree, mango tree whereas the user is searching for binary tree. N-grams are applied in applications like searching in text documents, where one must work with phrases. Eg: plagiarism detection. Thus relevancy becomes major part in searching. We can achieve relevancy using n-gram algorithm. We show an index based method to discover patterns in large data sets. It utilizes methods at the conjunction of AI, machine learning and statistics. We also induce a method of personalization where the search engine is used for indexing purposes in addition to the current n-gram techniques. A collaborative web search method is used for user’s personalization in the web search engine to extract the required accurate data.

Keywords:
Web Mining, Knowledge Discovery, N-Gram, Stemming.


References:

1.        “Language Identification of Web Pages on Improved N-gram Algorithm”- Yew Choong Chew, Yoshiki Mikami, Robin Lee Nagano  , IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 3, No. 1, May 2011, ISSN (Online): 1694-0814.   
2.        “Automatically building a stop word list for an information retrieval system”- Masoud Makrehchi  Mohamed S. Kamel, ECIR 2008, LNCS 4956, pp. 222-233, 2008.

3.        “Advanced database indexing”- Y.Manolopoulos  , Y.Theodoeidis and V.J.Tsotras, Springer 2000.

4.        “Probabilistic Latent Semantic Indexing”- Thomas Hofmann, SIGIR '99 Proceedings of the 22nd annual international ACM SIGIR conference on Research and development in information retrieval, Pages 50-57,1999.   

5.        SRCluster: Web Clustering Engine based on Wikipedia : Yuvarani Meiyappan, N. Ch. S. Narayana Iyengar and A. Kannan ,  International Journal of Advanced Science and Technology Vol. 39, February, 2012.

6.        XML with Cluster Feature Extraction For Efficient Search : D. Divya, Dr. A. Muthukumaravel, Dr. P. Mayilvahanan , International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 8, August 2013).

7.        A Model for XML Schema Integration : Kalpdrum Passi, Louise Lane, Sanjay Madria, Bipin C. Sakamuri, Mukesh Mohania, and Sourav Bhowmick ,  EC-Web 2002, LNCS 2455, pp. 193–202, 2002.

8.        Learning to Cluster Web Search Results : Hua-Jun Zeng Qi-Cai He Zheng Chen Wei-Ying Ma Jinwen Ma, SIGIR’04, July 25–29, 2004, Sheffield, South Yorkshire, UK.

9.        WEB SEARCH RESULT CLUSTERING- A REVIEW : Kishwar Sadaf1 and Mansaf Alam2, International Journal of Computer Science & Engineering Survey (IJCSES) Vol.3, No.4, August 2012.

10.     Web Usage Mining Based on Complex Structure of XML for Web IDS : Marjan Eshaghi, S.Z. Gawali, International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-2, Issue-5, April 2013.

11.     Beyond Single-Page Web Search Results : Ramakrishna Varadarajan, Vagelis Hristidis, and Tao Li , IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 20, NO. 3, MARCH 2008

12.     Extracting Knowledge from Web Search Engine Results : Andreas Kanavos, Evangelos Theodoridis, Athanasios Tsakalidis , IEEE 24th International Conference on Tools with Artificial Intelligence, 2012.

13.     A New Search Results Clustering Algorithm based on Formal Concept Analysis : Yun Zhang, Boqin Feng, Yewei Xue, School of Electronics and Information Engineering, Xi'an Jiaotong University, Xi'an, China, Fifth International Conference on Fuzzy Systems and Knowledge Discovery., FSKD’08, IEEE, pp. 356-360, 2008.


6-9

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

3.

Authors:

R. Sathis Kumar, M. Krishna Raj, R. Vinston Raja

Paper Title:

Agent Based Trusted Routing and Attitude Based Intrusion Detection for Worm Hole Attack in MANET

Abstract: The Existence of misbehaving nodes may paralyze the routing operation in MANET. To overcome this behavior that trustworthiness of the network nodes should be consider in the route selection process combined with the next count. The trustworthiness is achieved by measuring the trust value for each node in the network. In this paper a new protocol based on agent based monitoring followed the dynamic source routing (DSR) algorithm is presented. This protocol is applied in agent based trusted Dynamic source routing protocol for MANET’s. The objective of this protocol is to mange trust information among self nodes with minimal overhead in terms of time delay and data loss. This objective is achieved through Collaborative Agent Monitoring System (CAMS) by installing in each participated node in the network .CAMS Consist of two types of agent: Self monitoring agent and routing agent. A proposed realistic objective model for measuring trust value is introduced. One of the significant attack in ad hoc network is wormhole attack is more hidden in character and tougher to detect. In this paper an Attitude Agent Intrusion Detection System (AAIDS).

Keywords:
Routing -Worm hole – Intrusion - Detection.


References:

1.        Zhang, Y., Lee, W., & Huang, Y. (2003). Intrusion detection techniques for mobile wireless networks. ACM Wireless Networks Journal, 5, 545–556.
2.        Lau, F., Rubin, S. H., & Smith, M. H. (2000). Distributed denial of service attacks. In Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics (pp. 2275–2280).

3.        Ou, C.-M. (2012). Host-based intrusion detection systems adapted from agent-based artificial immune systems. Journal of Neuro computing, 88, 78–86.

4.        Gonzalez, F. A., & Dasgupta, D. (2003). Anomaly detection using real-valued negative selection. Journal Genetic Programming and Evolvable Machines, 4, 383 403.

5.        Dasgupta, D., & Gonzalez, F. (2002). An immunity based technique to characterize intrusions in computer networks. IEEE Transactions on Evolutionary Computation, 3, 281–291.

6.        De Castro, L. N., & Timmis, J. (2002). An introduction to artificial immune systems: A new computational intelligence paradigm. In Proceedings of IEEE Congress on Evolutionary  Computation (pp. 699–674).

7.        Azandaryani, A. H. M., & Meybodi, M. R. (2009). A learning automata based artificial immune system for data classification. In Proceedings of IEEE Computer Conference (pp. 530–535).

8.        Sompayrac, L. M. (2003). How the immune system works (2nd ed.). Oxford: Blackwell.

9.        Sarafijanovic, S., & Le Boudec, J.-Y. (2005). An artificialimmune system approach with secondary response for misbehavior detection in mobile ad hoc networks. IEEE Transactions on Neural Networks, 5, 1076–1087.

10.     Forrest, S., Perelson, A. S., Allen, L., & Cherukuri, R. (1994). Self-nonself discrimination in a computer. In Proceedings of the IEEE Symposium on Research in Security and Privacy (pp.202–212). IEEE Computer Society Press.

11.     Li, X., Lyu, M. R., & Liu, J. (2004) A trust model based routing protocol for secure ad hoc networks. In Proceedings of IEEE Aerospace Conference, Big Sky, Montana, USA, pp 1286–1295.

12.     Pirzada, A. A. & McDonald, C. (2006) Reliable routing in MANETs using direct trust mechanisms. In Advances in Ad Hoc and Sensor Networks. Berlin: Springer, ch. 6, pp. 133–159.

13.     Zhan, G., Shi, W., & Deng, J. (2012). Design and implementation of TARF: a trust-aware routing framework for WSNs. IEEE Transactions on Dependable and Secure Computing, 9(2), 184–197.

14.     Rahman, A. A. & Hailes, S. (1997) A distributed trust model. In Proceedings of the ACM New Security Paradigms Workshop, Cumbria, UK, pp. 48–60.

15.     He, D., et al. (2012). ReTrust: Attack-resistant and lightweight trust management for medical sensor network. IEEE Transactions on Information Technology in Biomedicine, 16(4), 623–632.

16.     Maleknasab, M., & Bidaki, M. (2013). Trust-based clustering in mobile ad hoc networks: Challenges and issues. International Journal of Security and Its Applications, 7(5), 321–342.

17.     17.  Johnson, D., & Maltz, D. (1996). Dynamic source routing in ad hoc wireless networks. In I. A. Korth (Ed.), Mobile Computing (Vol. 353, pp. 153–181). Norwell: Kluwer.

18.     Yang, H., Luo, H., Ye, F., Lu, S., & Zhang, L. (2004). Security in  mobile ad hoc networks: Challenges and solutions. IEEE Wireless Communications, 11(1), 38–47.

19.     Liu, K., & Deng, J. (2007). An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Transactions on Mobile Computing, 6(5), 536–550.

20.     Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of Mobile Computing and Networking (MobiCom’00), pp. 255–265.

21.     Buchegger, S. & Boudec, L. (2002) Performance analysis of the  CONFIDANT protocol. In Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing, Lausanne, Switzerland, pp. 226–236.

22.     Michiardi, P., & Molva, R. (2002) CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Proceedings of the 6th IFIP conference on security communications, and multimedia, Portoroz, Slovenia, pp. 107–121.

23.     Pirzada, A. A., McDonald, C., & Datta, A. (2007). Dependable dynamic source routing without a trusted third party. Journal of Research and Practice in Information Technology, 39(1), 71–85.

24.     Dhurandher, S. K. & Mehra, V. (2009). Multi-path and message trust-based secure routing in ad hoc networks. In Proceedings international conference advances  in computing, control and telecomm. Technologies, Trivandrum, Kerala, pp. 189–194.

25.     Li, X., Jia, Z., Zhang, P., Zhang, R., & Wang, H. (2010). Trustbased  on-demand multipath routing in mobile ad hoc networks. Information Security, IET, 4(4), 212–232.


10-17

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html