A Characteristic study on Multimodal Recognition applications in Biometrics
Review Paper | Journal Paper
Vol.3 , Issue.2 , pp.51-55, Feb-2015
Abstract
Nowadays advances in technology made our life easier by giving higher levels of knowledge thru the inventions devices. There are many technical innovation harbors the hidden threats to the users. Users try to secure their data with encrypted passwords and ID cards. The abuse and stealing of these security measures are enlarged. In ID cards technologies the cards being duplicated and misused. This increasing misuse behaviour made the cyber security lead the birth to invention of biometric securities. Biometrics is used to uniquely recognize humans on one or more essential physical or behavioural characteristics. Biometrics technology is used for its uniqueness and measurable physical, biological characteristics of individual which is then processed and then identify a person with biometric traits such as face, iris, hand geometry, etc. but the physiological traits include face, finger print, hand, iris, DNA and the behavioural traits include key stroke, signature, voice.
Key-Words / Index Term
Biometric, Biometric Security, Recognition Methods, Facial Recognition, Fingerprint Reader, Voice Recognition, Iris/Retinal Recognition, Vein Recognition, DNA Recognition, Privacy, Safety, Advantages And Disadvantages
References
[1] Jain, A. K.; Ross, A. & Pankanti, S., “Biometrics: A Tool for Information Security”, IEEE Transactions On Information Forensics And Security, June 2006.
[2] “Progress and Directions”, IEEE Transactions on Pattern Analysis and Machine Intelligence Special Issue, July 2007.
[3] Wikipedia– Advanced biometrics article.
[4] www.biometrics.tibs.org.
[5] National Conference on Computer Applications In Service Sector (NCCASS 2012), 7th September, 2012
Citation
J. Mohana Sundaram, K. Vembandasamy and R. Karthik Raj, "A Characteristic study on Multimodal Recognition applications in Biometrics," International Journal of Computer Sciences and Engineering, Vol.3, Issue.2, pp.51-55, 2015.
Detailed Survey on Phishing and Anti-Phishing Techniques
Survey Paper | Journal Paper
Vol.3 , Issue.2 , pp.56-62, Feb-2015
Abstract
Internet has been a pathway for cybercrimes. The facility internet has delivered is vast but at the same time data privacy of individuals has been risked. Phishing is an example of social engineering techniques used to deceive users. In this paper, the authors made an attempt to enlighten readers with the different aspects of phishing. Public awareness is essential to combat such crimes. Different types of phishing techniques, their avoidance and detection has been presented in this paper. Further, a section highlights numerous research works on anti-phishing techniques. The later part of the paper illustrates the phishing scams and statistics for greater understandability of the problem. The readers are also informed about the various anti-phishing groups and where to report any sort of suspicious phishing activity.
Key-Words / Index Term
Phishing, Internet based security, Anti-Phishing
References
[1] Vignesh.M, Gokul Ram.T, Akhil.R, Rajesh Kumar N.S.R, Karthikeyan.R, “Analysis of Phishing in Networks”, International Journal of Scientific & Engineering Research, Volume 4, Issue 9, September-2013 196 ISSN 2229-5518
[2] Aanchal Malhotra, Navdeep Kaur, “Browser Prevention Against Phishing Website Security Risk”, IJCSC, Vol. 3, No. 1, January-June 2012, pp. 215-219
[3] Kanchan Meena, Tushar Kanti, “A Review of Exposure and Avoidance Techniques for Phishing Attack”, International Journal of Computer Applications (0975 – 8887) Volume 107 – No 5, December 2014.
[4] Ahmad Alamgir Khan, “Preventing Phishing Attacks using One Time Password and User Machine Identification”, International Journal of Computer Applications (0975 – 8887) Volume 68– No.3, April 2013.
[5] P. K. Sengar, Vijay Kumar, “Client-Side Defense against Phishing with PageSafe”, International Journal of Computer Applications (0975 – 8887) Volume 4 – No.4, July 2010.
[6] Mahmoud Khonji, Youssef Iraqi, Andrew Jones, “Mitigation of Spear Phishing Attacks: A Content-Based Authorship Identification Framework”, 6th International Conference on Internet Technology and Secured Transactions, 11-14 December 2011, Abu Dhabi, United Arab Emirates.
[7] Gaurav Kumar Tak, Gaurav Ojha, “Multi-Level Parsing Based Approach Against Phishing Attacks with the Help of Knowledge Bases”, IJNSA Vol.5, No.6, November 2013.
[8] Sadia Afroz, Rachel Greenstadt, “PhishZoo: Detecting Phishing Websites By Looking at Them”
[9] T.Balamuralikrishna, N.raghavendrasai, M.Satya Sukumar “Mitigating Online Fraud by Ant phishing Model with URL & Image based Webpage Matching”, International Journal of Scientific & Engineering Research Volume 3, Issue 3, March -2012.
[10] A.V.R.Mayuri “Phishing Detection based on Visual-Similarity” International Journal of Scientific & Engineering Research Volume 3, Issue 3, March -2012.
[11] Mallikka Rajalingam, Saleh Ali Alomari, Putra Sumari, “Prevention of Phishing Attacks Based on Discriminative Key Point Features of WebPages”, International Journal of Computer Science and Security (IJCSS), Volume (6): 2012.
[12] Shivender Singh, Anil K. Sarje, Manoj Misra, “Client-Side Counter Phishing Application using Adaptive Neuro-Fuzzy Inference System”, 978-0-7695-4850-012 2012 IEEE.
[13] Michael Atighetchi, Partha Pal, “Attribute-based Prevention of Phishing Attacks”, 978-1-4673-2104-412 2012 IEEE.
[14] M. Usha, P. Deepika, “Phishing - A Challenge in the Internet”, International Journal of Computer Science and Information Technologies, Vol. 5 (1), 2014, 260-26.
[15] An article on “Phishing Activity Trends Report 1st Quarter 2014” available at: docs.apwg.org/reports/apwg_trends_report_q1_2014.pdf.
Citation
Anirban Bhowmick, "Detailed Survey on Phishing and Anti-Phishing Techniques," International Journal of Computer Sciences and Engineering, Vol.3, Issue.2, pp.56-62, 2015.
A Survey on An Effective and Efficient Approach for Low Network Bandwidth Users
Survey Paper | Journal Paper
Vol.3 , Issue.2 , pp.63-66, Feb-2015
Abstract
The World Wide Web is a huge information repository. It is being used for various purpose such as communication, social networking, business, education and entertainment, the user increasingly demand web content to be delivered without delays. Its popularity is resulting in heavy traffic in the internet which causes long latency as user experience. Potential source of latency are Web servers heavy load, network congestion, low bandwidth and propagation delay. Web caching and Web perfecting are two important techniques used to reduce the noticeable response time. In this paper we have presented survey on recent different web caching and prefeching techniques solutions. We identified and compared their advantages and weaknesses.
Key-Words / Index Term
Web Caching, Prefeching ,Web Latency
References
[1] Wei-Guang Teng, Cheng- Yue Chnag and Ming –Syan Chen Member IEEE, “Integrating Web Caching and Web Prefeching in Client –Side Proxies”, IEEE Transaction on Parallel And Distributed System, Vol, 16, No. 5, May, 2005.
[2] Sergio Duarte Torres, Ingmar Weber and Djoerd Hiemstra, “Analysis of Search and Browsing Behavior of Young Users on the Web”, ACM Transactions on the Web, Vol. 8, No. 2, Article 7, Publication date: March 2014.
[3] Yogish H K and G. T. Raju, “A Novel ART1NN Clustering and Pre-fetching Technique for Reducing Web Latency”, 5th International Conference on Computational Intelligence and Communication Networks, 2013.
[4] Ou Wu, Weiming Hu and Lei Shi, “Measuring the Visual Complexities of Web Pages”,
ACM Transactions on the Web, Vol. 7, No. 1, Article 1, Publication date: March 2013.
[5] L.R.Ariyasinghe, C.Wickramasinghe, P.M.A.B Samarakoon, U.B.P Perera, R.A.Prabhath Buddhika and M.N.Wijesundara, “Distributed Local Area Content Delivery Approach with Heuristic based Web Pre-fetching”, The 8th International Conference on Computer Science & Education (ICCSE 2013), 2013.
[6] Naveed Ahmad Owais Malik, Mahmood ul Hassan, Muhammad Shuaib Qureshi, and Asim Munir, “Reducing User Latency in Web Pre-fetching Using Integrated Techniques”, IEEE, 2011.
[7] Jyoti Pandey, Amit Goel and Dr A K Sharma, “A frarnework for predictive web Pre-fetching at proxy level using Data Mining”, UCSNS International Journal of Computer Science and Network Security, VOL.8 No.6,PP 303-308, June 2008.
[8] Victor Safronov and Manish Parashar, “Optimizing Web servers using Page rank prefetch-ing for clustered accesses”, Information Sciences 150, pp 165-176, 2003.
Citation
Amol R Pujari and Siddheswar. V. Patil, "A Survey on An Effective and Efficient Approach for Low Network Bandwidth Users," International Journal of Computer Sciences and Engineering, Vol.3, Issue.2, pp.63-66, 2015.
Performance Enhancement of Wireless Sensor Network with Adaptive Modulation Scheme
Research Paper | Journal Paper
Vol.3 , Issue.2 , pp.67-71, Feb-2015
Abstract
The wireless sensor network refers to a group of spatially distributed and dedicated sensors for monitoring and recording the physical conditions of environment like temperature, humidity, pollution levels, sound, wind speed with direction and pressure. The sensors are self powered nodes which also possess limited processing capabilities and the nodes communicate wirelessly through a gateway. Simulation results based upon this protocol identify some important factors that induce unbalanced energy consumption among sensor nodes and hence affect the lifetime network. This highlights the need for an adaptive clustering protocol that can increase the network lifetime by further balancing the energy consumption among sensor nodes.
Key-Words / Index Term
Wireless Sensor Network (WSN), C-Means, Clustering, QAM, BPSK, QPSK, etc.
References
[1] F. Akyildiz et al., “A Survey on Sensor Networks,” IEEE Commun Mag., vol. 40, no. 8, Aug. 2002, pp. 102–14.
[2] J. M. Kahn, R. H. Katz, and K. S. J. Pister, “Next Century Challenges: Mobile Networking for Smart Dust,” Proc. ACM Int’l. Conf. Mobile Computing and Networking MobiCom’99), Aug. 1999, pp. 217–78.
[3] O.Younis, M. Krunz and S. Ramasubramanian. “Node clustering in wireless sensor networks: Recent developments and deployment challenges. IEEE Network 20(3) (2006), 20–25.
[4] Labisha R.V, 2Baburaj E, Energy Efficient Clustering Algorithms in Wireless Sensor Networks-An Analytical View, Volume9, Number3, May 2014.
[5] Abdul Sattar Malik, Jingming Kuang, Jiakang Liu, Wang Chong, Performance Analysis of Cluster-based Wireless Sensor Networks with Application Constraints, I.J.Computer Network and Information Security, 2009, 1, 16-23
[6] Amrinder Kaur, Simulation of Low Energy Adaptive Clustering Hierarchy Protocol for Wireless Sensor Network, Volume 3, Issue 7, July 2013.
[7] J.Goldsmith Performance Evaluation of Energy Efficient Modulation Scheme and Hop Distance Estimation for WSN.
[8] Performance evaluation of routing protocols for packet drop statistics for Meshed routing in IEEE 802.15.4 based WSNs
Citation
Chetan Rathod and Rahul Sharma, "Performance Enhancement of Wireless Sensor Network with Adaptive Modulation Scheme," International Journal of Computer Sciences and Engineering, Vol.3, Issue.2, pp.67-71, 2015.
Review Paper on Tracking and Its Types
Review Paper | Journal Paper
Vol.3 , Issue.2 , pp.72-75, Feb-2015
Abstract
Tracking system is used for the observing of persons or objects on the move and it supplying a timely ordered sequence of respective location data to a model. There is different type of tracking. One of the most important tracking is mobile tracking. Mobile phone tracking refers to the ascertaining of the position of a mobile phone. In this paper student information tracking system is the technique in this we are willing to fetch the information about an individual student and pass it to the authenticated user only that individual can see this send information from student device (android phone). This paper provides the communication between several of the users i.e. college, staff, student, company, Employees etc. The information such as the student call logs , browsing history, their current location etc. all with the time stamp are fetch from the devices and pass it to the user specifies such as Parents, teacher and /or any authenticated person.
Key-Words / Index Term
GPS,SIM,GPRS
References
[01] Kegen Yu and Eryk Dutkiewicz, “Geometry and Motion Based Positioning Algorithms for Mobile Tracking in NLOS Environments”, IEEE Globecom proceedings, pp.15, December 2010.
[02] Hasan, K.S. Rahman, M. Haque, L.A. Rahman, M.A. Rahman(2009), “Cost Effective GPS-GPRS Based Object Tracking System”, Proceeding of International Multiconference of Engineering and Computer Scientist, March 2009, Vol-I.
[03] Garima Pandey, Diksha Dani(2014), “Android Mobile Application Building Eclipse”, Proceeding of International Journal Of Scientific and Research Applications, Vol-IV.
[04] N.P.Chai, W.A.W.Z. Abidin, W.H.W. Ibrahim and K. Hong Ping(2012), “Technology Advancement in Vehicle Monitoring System for Accident Prevention”, in UNIMAS E-Journal of Civil Engineering, Vol-III (Special Issue) 2012.
[05] Priyanka Shah, Ruta Gadgil, Neha Tamhankar "Location Based Reminder Using GPS For Mobile (Android)" ARPN Journal of science and Technology©2011-2012. VOL. 2, NO. 4, May 2012.
[07] Hello Android, the Pragmatic Programmers.
[08] “Core JAVA Volume 2 “ by CAY S HORSTMANN and GARRY CORNELL published by Pearson Education.
[09] Chandra, A., Jain, S., Qadeer, M.A“GPS Locator: An Application for Location Tracking and Sharing Using GPS foJava Enabled Handhelds,” 2011 International Conference on Computational Intelligence and Communication Networks (CICN), pp.406-410, 7-9 Oct. 2011
[10] Ghaith Bader Al-Suwaidi, Mohamed Jamal Zemerl, “Locating friends and family using mobile phones with global positioning system (GPS),” IEEE/ACS International Conference on Computer Systems and Applications, 2009
Citation
Nayan Muley, Pratiksha Thawari, Vaishali Sarangpure, "Review Paper on Tracking and Its Types," International Journal of Computer Sciences and Engineering, Vol.3, Issue.2, pp.72-75, 2015.
Efficient and Secure SMS Encryption Technique using Elliptic Curve Cryptography
Research Paper | Journal Paper
Vol.3 , Issue.2 , pp.76-79, Feb-2015
Abstract
Data security over the cellular network is critical. Mobile phones have provided operators with immense facilities at the cost of data privacy. Without ensuring data concealment, communication should be avoided. This makes cryptography an evolving research area. In this paper, the authors propose an asymmetric encryption system which maintains data confidentiality and integrity of the text message throughout the mobile network. In the proposed system, the text message is encrypted before being transmitted over the network. Most of the traditional encryption techniques are computationally intensive. Accordingly, elliptic curve cryptography has been employed to encrypt the text message as it permits efficient use of mobile’s limited resources like memory and processor. One of the key flaws in Short Message Service (SMS) is that it does not provide end-to-end security. The original text is revealed to the utility provider for a short duration of time which can be a reason for misuse. The system proposed offers this much needed data privacy.
Key-Words / Index Term
Encryption, Cryptography, Elliptic Curves, Elliptic Curve Cryptography, SMS
References
[1]. Ayushi, “A Symmetric Key Cryptographic Algorithm”, 2010 International Journal of Computer Applications (0975 - 8887) Volume 1 – No. 15
[2]. Vivek Katiyar, Kamlesh Dutta, Syona Gupta, “A Survey on Elliptic Curve Cryptography for Pervasive Computing Environment“, International Journal of Computer Applications (0975 –8887) Volume 11–No.10, December 2010
[3]. Atul Kahate, “Cryptography and Network Security”
[4]. N Harini, C K Shyamala, T R Padmanabhan, “Cryptography and Security”
[5]. Joseph H. Silverman,John T. Tate, “Rational Points on Elliptic Curves”
[6]. J.S. Milne, “Elliptic Curves”, www.jmilne.org/math/Books/ectext5.pdf
[7]. N. Jagdale, R.K.Bedi, Sharmishta Desai, “Securing MMS with High Performance Elliptic Curve Cryptography”, International Journal of Computer Applications (0975 – 8887) Volume 8– No.7, October 2010
[8]. Ramratan Ahirwal, Anjali Jain, Y. K. Jain, “Signcryption Scheme that Utilizes Elliptic Curve for both Encryption and Signature Generation”, International Journal of Computer Applications (0975 – 8887) Volume 62– No.9, January 2013
[9]. P.Vijayakumar, V.Vijayalakshmi, G.Zayaraz, “DNA Computing based Elliptic Curve Cryptography”, International Journal of Computer Applications (0975 – 8887) Volume 36– No.4, December 2011
[10]. O.Srinivasa Rao, S. Pallam Setty, “Huffman Compression Technique in the Context of ECC for Enhancing the Security and Effective Utilization of Channel Bandwidth for Large Text”, IJCA Special Issue on “Network Security and Cryptography” NSC, 2011
[11]. CH. Suneetha, D. Sravana Kumar, A. Chandrasekhar, “Secure Key Transport in Symmetric Cryptographic Protocols using some Elliptic Curves over finite fields”, International Journal of Computer Applications (0975 – 8887) Volume 36– No.1, December 2011
[12]. William Stallings, “Cryptography and Network Security”, 3rd Edition
[13]. N.Koblitz, “Elliptic Curve Cryptosystems, Mathematics of Computation”, volA8, 1987, pp.203 -209.
[14]. Aqeel Khalique Kuldip Singh Sandeep Sood, “Implementation of Elliptic Curve Digital Signature Algorithm”, International Journal of Computer Applications (0975 – 8887)Volume 2 – No.2, May 2010
[15]. Ajay R Mishra, “Fundamentals of Cellular Network Planning and Optimisation”
[16]. Neetesh Saxena, Narendra S. Chaudhari, “A Secure Digital Signature Approach for SMS Security”, IP Multimedia Communications A Special Issue from IJCA
[17]. Behrouz A. Forouzan, “Cryptography and Network Security” special Indian Edition 2007, Tata McGraw- Hill Publishing Company Limited, New Delhi
Citation
Anirban Bhowmick, "Efficient and Secure SMS Encryption Technique using Elliptic Curve Cryptography," International Journal of Computer Sciences and Engineering, Vol.3, Issue.2, pp.76-79, 2015.
Security Issues in Cloud Computing
Review Paper | Journal Paper
Vol.3 , Issue.2 , pp.80-82, Feb-2015
Abstract
Cloud computing trend is increasing rapidly so to make cloud computing more popular the very first step for the organization is to identify exact area where the cloud related threats lie. At an unusual pace, cloud computing has transformed business and government. And this created new security challenges. The development of the cloud service model provide business – supporting technology in a more efficient way than ever before .the shift from server to service based technology brought a drastic change in computing technology. However these developments have created new security vulnerabilities, including security issues whose full impressions are still rising. This paper presents an overview and study of cloud computing, with several security threats, security issues, currently used cloud technologies and security solutions.
Key-Words / Index Term
Data Security, Cloud, Computing, Privacy
References
[1]The Forrester Wave™: Public Cloud Platform Service Providers’ Security, Q4 2014 by Andras Cser and Ed Ferrara, November 17, 2014
[2] R. Latif, H. Abbas, S. Assar, and Q. Ali, “Cloud computing risk assessment: a systematic literature review,” in Future Information Technology, Springer, Berlin, Germany, , pp. 285–295,2014.
[3] A. Aviˇzienis, J. Laprie, B. Randell, and C. Landwehr, “Basic concepts and taxonomy of dependable and secure computing,”IEEE Transactions on Dependable and Secure Computing, vol. 1, no. 1, pp. 11–33, 2004.
[4] Subashini S, Kavitha V (2011) A survey on Security issues in service deliverymodels of Cloud Computing. J Netw Comput Appl 34(1):1–11, 2011
[5] Keiko Hashizume1*, David G Rosado2, Eduardo Fernández-Medina2 and Eduardo B Fernandez1 “An analysis of security issues for cloud computing” Hashizume et al. Journal of Internet Services and Applications, 4:5 , 2013
[6] Mohammed A.AlZain, Eric Pardede, Ben Soh, James A.Thom2012.“Cloud ComputingSecurity:From Single to Multi-Clouds” 2012 5thHawaii International Conference on System Sciences. 2012
[7] Yunchuan Sun, Junsheng Zhang, Yongping Xiong, and Guangyu Zhu Data Security and Privacy in Cloud Computing Data Security and Privacy in Cloud Computing.
[8] D. H. Rakesh, R. R. Bhavsar, and A. S. Thorve, “Data security over cloud,” International Journal of Computer Applications, no.5, pp. 11–14, 2012.
Citation
Indu Sharma and Mandeep kaur, "Security Issues in Cloud Computing," International Journal of Computer Sciences and Engineering, Vol.3, Issue.2, pp.80-82, 2015.
An Performance Analysis of Encryption Algorithm in Cloud Computing
Research Paper | Journal Paper
Vol.3 , Issue.2 , pp.83-89, Feb-2015
Abstract
Security is the most important factor in cloud computing for ensuring client data is placed on secure mode in the cloud. Cloud computing is a flexible, cost-effective and proven delivery platform for providing business. Main goal of cloud computing is to provide easily scalable access to computing resources to improve organization performance. In this research paper we have discussed the problem of data security in cloud and show performance analysis to enhance security in terms of encryption algorithm and also explain an overview of cloud and security issues.
Key-Words / Index Term
Cloud Computing, Security Algorithm, AES, DES, Blowfish and RSA
References
[1]. Er. Rimmy Chuchra ,”data security in cloud computing “,International Journal of Societal Application of computer science, Volume -01, Issue -1,Page N0 (1-5),1 Nov 2012.
[2]. Rajkumar Buya and Chee Yeo and Shrikumar,” Cloud computing and emerging IT Platform:vision,hype and reality for delivery computing as the 5thutility”, Future generation computer system 2009,Page No.(1-15),21 November 2008.
[3]. Bhushan Lalsahu and RajeshTiwari ,”A Comprehensive study on cloud computing” , International Journal of Advanced Research in Computer Science and Software Engineering “,Vol ume-2,Issue -9, Page No.(33-36),September 2012,ISSN 2277.
[4]. M.Vijayapriya ,”Security algorithm incloudcomputing:overview”, International Journal of Computer Science and Software Engineering Technology ,Volume-4, Issue-4 ,Page No.(1209-1211),09 September 2013.
[5]. Keiko Hashizume and David G Rosago and Eduardo Fernandez ,”an analysis of security issue for cloud computing “ , A Springer Open Journal of Internet Services and Applications, Volume No-4, Issue -5, Page No(22-26),27 February 2013.
[6]. Rashmi and Dr.GSahoo and Dr. S.Mehfuz, ” Securing software as a service model of cloud computing issue and solution, “International Journal of Cloud Computing Services and Architecture “,Volume -3,Page No(1-11), Issue -2 ,Augest 2013.
[7]. Shivlal Mewada and Umesh kumar Singh and Pradeep Sharma, ”Security Based for Cloud Computing”,“International Journal of Computer Network and Wireless Communication“ ,Volume -1,Issue -1,Page No (13-17),1december 2011.
[8]. Mandieep Kaur and Manish Mahajan ,” International Journal of Communication and Computer Technologies “, Volume -1,Issue-3, Page No.(56-59), January 2013.
[9]. Divya Rastogi and Nikunj Kumar,” Study of Security Issue in layer in Cloud Computing “, International Journal Of Research Review In Engineering Science & Technology,Volume -2,Issue -2,Page No(30-33),June 2013.
[10]. Parsi kalpna and Sudha Singaraju,”Data Security in Cloud Computing Using RSA Algorithm”, International Journal of Research in Computing communication Technologies , Volume- 1 ,Issue -4,Page No(143-146),4 sep2012.
[11]. Debajyoti and Mukhopadhyay and GiteshSonawane and Parth Sarthi Gupta,”Enhanced Security for cloud storage using file encryption”, International Journal Of Research Review In Information Tchnology ,Department of IT ,Volume -2,Issue -1Page No(11-15), 2013.
[12]. NehaTirthaniGenesenr.”Data security in cloud arxhitecture based on Diffie Hellman and Elliptical curve cryptography”, Volume- 1,Issue-1,Page No [1-4].
[13]. B.N. singh ,”Cloud Development Model”, example [online available ]20 may 2014.
[14]. Kai hwag and Deyili,” Trusted Cloud Computing with Secure Resources and Data coloring”,IEEE ,Volume- 14,Issue-5,Page No(14-22),2010.
[15]. V.D cunsolo and S.distenfo,” Achieving information security in network computing system”,IEEE,Page No (77,-80),Dec 2009
[16]. Dr.Sunil Batra and Anju chibel ,”Preliminary Analysis of Cloud Computing Vulnerabilities”, Journal of Engineering computer and Applied science ,Volume- 2 ,Issue -5,Page No(49-51),May 2013.
[17]. Venkata Krishna kumar and S padma priya ,” A survy of cloud computing security threat and vulnerabilities “,International journal of innovative research in electrical, electronics, instrumentation and control engineering ,Volume- 2 ,Issue -1,Paga No(622-625),January 2014.
[18]. A.T. valte and T.J.velte and R.C.,” Cloud Computing a Practical Approach “ Tata McGraw -Hill,First(I st) Edition,USA 2009.
[19]. Farzadsabhi,”Cloud Computing Threat and Responses” ,IEEE, Page No(245-249) ,27-29 may-2011
[20]. Ros and jacobo,” Security in Cloud the Threat of co exits with an unkown tenant on a public environment” , Page No(), Royal Holloway ,University of London
[21]. Gurpreet Kaur and Manish Mahajan, ”Evolution and Comparison of Symmetric Key algorithms”, International Journal of Science ,Engineering and Technology Research, Volume-2,Issue -10, Page No(1960-1962),October 2013,ISSN 2278-7798.
[22]. Vijeyta Devi and Vadlamani Nagalakshmi, ”A Prospective Approach on Security with RSA algorithm and cloud sql in cloud computing”, International Journal of Computer Science and Engineering ,Volume n-2,Issue -2 ,Page No(35-44),May 2013.
[23]. Uma Somani ,”Implementation Digital Signature with RSA Encryption algorithm to enhance the data security of cloud in cloud computing”,2010.
[24]. Ms. Disha H. Parekh and Dr. R. Sridaran,” An Analysis of Security Challenges in Cloud Computing”, Volume – 4,Issue-1, page No.(30-44),2013.
[25]. Navneet Sharma and Vijay Singh Rathore, ” Different Data Encryption Methods Used in Secure Auto Teller Machine Transactions”, Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-1, Issue-4, Page No.(176-177) April 2012.
[26]. Madhu Chauhan and Riidhei Malhotra and Mukul Pathak and Uday Pratap,“DIFFERENT ASPECTS OF CLOUD SECURITY “ , International Journal of Engineering Research and Applications, Volume -2 ,Issues-2,Page No.(864- 870) , Mar-Apr 2012.
Citation
Shivlal Mewada, Arti Sharivastava, Pradeep Sharma, N Purohit and S.S. Gautam, "An Performance Analysis of Encryption Algorithm in Cloud Computing," International Journal of Computer Sciences and Engineering, Vol.3, Issue.2, pp.83-89, 2015.
A Comparative Study of E-Learning Methods with Traditional Learning
Review Paper | Journal Paper
Vol.3 , Issue.2 , pp.90-93, Feb-2015
Abstract
E-learning based methods offer important teaching methods. E-learning offers pupils to have interactive e- content that comprises of multimedia. E-learning has great impact on learning process. The present work presents a comparative study of e-learning based methods with traditional teaching methods. The comparative study is performed on various user groups confirms the preference of e-learning based methods over traditional teaching methods. The feedback of the two methods is collected from different user groups consisting of researchers, students, instructors, and staff. E-learning based methods offered better feedback as compared to traditional teaching methods.
Key-Words / Index Term
E-learning; Traditional learning; LMS; Palmtops; WebGuru
References
[1] A. Edmundson, “Globalized e-learning cultural challenges”, (USA: Idea Group Inc), 2007.
[2] D. Picar, “E-Learning and Motivation”, White Paper, ITEC at SFSU, 2004.
[3] Helwan University, http://www.helwan.edu.eg/english/
[4] H Li, J. Masters, "ELearning and knowledge management in the early years: Where are we and where should we go", Knowledge Management and eLearning: An International Journal, Vol. 1, Issue 4, pp. 245-250, 2009.
[5] K. Cheng, “A Research Study on Students Level of Acceptance in Applying E-Learning for Business Courses – A Case Study on a Technical College in Taiwan”, Journal of American Academy of Business, Vol. 8, Issue 2, pp: 265-270, 2006.
[6] K.H. Fee, “Delivering E-Learning: A Complete Strategy for Design Application and Assessment, London and Philadelphea”, Kogan Page, 2005.
[7] M. Nehme, “E-Learning and Students’ Motivation”, 20 Legal Education Review, pp. 223-239, SSRN- id2347142, 2010.
[8] S.Z. Keith, "Self-assessment materials for use in portfolios", Primus, Vol. 6, Issue 2, pp. 178-192, June 1996.
[9] T. FitzPatrick, "Key Success Factors of eLearning in Education: A Professional Development Model to Evaluate and Support eLearning", US-China Education Review, Vol. A, Issue 9, pp. 789-795, 2012.
Citation
Ramesh Thakur, "A Comparative Study of E-Learning Methods with Traditional Learning," International Journal of Computer Sciences and Engineering, Vol.3, Issue.2, pp.90-93, 2015.
An Overview of Speech Recognition Techniques and the Progress in Speech Technology for Indian Scripts
Review Paper | Journal Paper
Vol.3 , Issue.2 , pp.94-102, Feb-2015
Abstract
Speech is widely regarded as the most natural form of communication between human beings. The field of speech recognition has facilitated the development of man-machine conversations, leading to the creation of automatic speech recognition systems. These systems enable interactions between humans and machines, and their applications are diverse and extensive. This paper aims to provide an overview of speech recognition techniques, explore the various application areas of speech recognition systems, and review the progress made in speech technology, particularly for Indian scripts. Additionally, the paper focuses on feature extraction techniques and classification methods used in speech recognition systems. The primary objective of this paper is to facilitate newcomers in understanding the flow of speech recognition and guide them in their pursuit of further research in this field.
Key-Words / Index Term
Human-Machine Interaction, Speech Recognition System, Feature Extraction Methods, Classification Techniques
References
[1]. Davis K. H., Biddulph R. and Balashek S., “Automatic recognition of spoken digits,” J. Acoust. Soc. Am., Volume 24, Issue 6, pp. 637-642, 1952.
[2] Huang X., and Acero A., “Spoken Language Processing: A Guide to Theory, Algorithm and System Development, Prentice Hall PTR, 2001.
[3] Wang Ye-Yi, Dong Yu, Yun-Cheng Ju and Acero A., “An introduction to voice search”, IEEE Signal Processing Magazine, 25(3), pp. 28–38,2008.
[4] Patel Bharat C and Desai Apurva A., “Recognition of spoken Gujarati Numerals Using Dynamic Time Warping” A.VNSGU Journal of Science and Technology, Volume 3, Issue 2, pp. 81-88, March 2012.
[5] Patel Himanshu N. and Virparia P.V., “A Small Vocabulary Speech Recognition for Gujarati”, International Journal of Advanced Research in Computer Science, Volume 2, Issue 1, pp. 208-210, Jan-Feb 2011.
[6] Patel Bharat C. and Desai Apurva, “Recognition of Spoken Gujarati Numeral and Its Conversion into Electronic Form”, International Journal of Engineering Research & Technology (IJERT), Volume 3, Issue 9, pp. 474-480, September- 2014.
[7] Pipalia D. S. and Dave Bhoomika, “An Approach to Increase Word Recognition Accuracy in Gujarati Language”, international journal of innovative research in computer and communication engineering (ijircce), vol. 3297, no. 9, pp. 6442–6450, 2007.
[8] Pandit Purnima and Bhatt Shardav, “Automatic Speech Recognition of Gujarati digits using Dynamic Time Warping”, International Journal of Engineering and Innovative Technology (IJETT), Volume 3, Issue 12, pp. 69-73, June 2014.
[9] Panwar Madhvi, Sharma R.P., Khan I. and Farooq O., “Design of Wavelet Based Features for Recognition of Hindi Digits”, 2011 International Conference on Multimedia, Signal Processing and Communication Technologies, pp. 232-235, 2011.
[10] Kumar Kuldeep, Aggarwal R.K. and Jain Ankita, “A Hindi speech recognition system for connected words using HTK”, Int. J. Computational Systems Engineering, Volume 1, Issue 1, pp. 25-32, 2012.
[11] Kumar Kuldeep and Aggarwal R. K., “Hindi speech recognition system using HTK”, International Journal of Computing and Business Research, Volume 2 Issue 2, May 2011.
[12] Verma Sharmila and Mishra A.N., “Analysis of Speech Recognition Techniques on the Hindi Speech Digits Database”, International Journal of Electronic Engineering Research, Volume 3, Issue 3, pp. 321-327, 2011.
[13] Saini Preeti, Kaur Parneet and Dua Mohit, “Hindi Automatic Speech Recognition Using HTK”, International Journal of Engineering Trends and Technology (IJETT), Volume 4, Issue 6, pp. 2223-2229,June 2013.
[14] Kayte Charansing Nathoosing, “Isolated Word Recognition for Marathi Language using VQ and HMM”, Science Research Reporter, Volume 2, Issue 2, pp. 161-165, April 2012.
[15] Patil P. P., and Pardeshi S. A., “Marathi connected word speech recognition system”, 2014 First International Conference on Networks & Soft Computing, pp. 314-318, 2014.
[16] Khetri Gajanan Pandurang, Padme Satish L., Jain Dinesh Chnadra, Fadewar H. S., Sontakke B. R. and Pawar Vrushsen P., “Automatic Speech Recognition for Marathi Isolated Words”, International Journal of Application or Innovation in Engineering & Management, Volume 1, Issue 3, pp. 69-74, November 2012.
[17] Nimbhore S. S., Ramteke G. D., and Ramteke R. J., “Pitch estimation of Marathi spoken numbers in various speech signals”, 2013 International Conference on Communication and Signal Processing, pp. 405-409, 2013.
[18] Gaikwad Santosh, Gawali Bharti and Mehrotra S.C., “Polly Clinic Inquiry System using IVR in Marathi Language”, International Journal of Machine Intelligence, Volume 3, Issue 3, 2011, pp-142-145.
[19] Katyal Anchal, Kaur Amanpreet and Gill Jasmeen, “Punjabi Speech Recognition of Isolated Words Using Compound EEMD and Neural Network”, International Journal of Soft Computing and Engineering (IJSCE), Volume-4, Issue-1, pp. 150-154, March 2014.
[20] Ghai Wiqas and Singh Navdeep, “Continuous Speech Recognition for Punjabi Language”, International Journal of Computer Applications, Volume 72, Issue 14, May 2013, pp. 23-28.
[21] Ravinder Kumar,” Comparison of HMM and DTW for Isolated Word Recognition System of Punjabi Language”, International Journal of Soft Computing, Volume 5, Issue 3, pp. 244-252, February 2010.
[22] Ghai Wiqas and Singh Navdeep, “Phone based acoustic modeling for automatic speech recognition for Punjabi language”, Journal of Speech Sciences, Volume 1, Issue 3, pp. 69-83, 2013.
[23] Dua Mohit, Aggarwal R. K. , Kadyan Virender and Dua Shelza, “Punjabi Automatic Speech Recognition Using HTK”, IJCSI International Journal of Computer Science Issues, Volume 9, Issue 4, No 1, pp. 359-364, July 2012.
[24] Ghanty Sumit Kumar, Shaikh Soharab Hossain and Chaki Nabendu, “On Recognition of Spoken Bengali Numerals”, 2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM), pp. 54-59, 2010.
[25] Mandal Sandipan, Das Biswajit and Mitra Pabitra, “Shruti-II: A vernacular speech recognition system in Bengali and an application for visually impaired community”, 2010 IEEE Students Technology Symposium (TechSym), pp. 229-233, 2010.
[26] Das B., Mandal S. and Mitra P., “Bengali speech corpus for continuous automatic speech recognition system”, 2011 International Conference on Speech Database and Assessments (Oriental COCOSDA), pp. 51-55, 2011.
[27] Hossain M. A., Rahman M. M., Prodhan U. K. and Khan M. F., “Implementation of back-propagation neural network for isolated Bengali speech recognition”, International Journal of Information Sciences and Techniques (IJIST) Volume 3, Issue 4, July 2013.
[28] Kurian Cini and Balakrishnan Kannan, “Speech Recognition of Malayalam Numbers”, 2009 World Congress on Nature and Biologically Inspired Computing (NaBIC 2009), pp. 1475-1479, 2009.
[29] Mohamed Anuj and Nair K.N. Ramachandran, “Continuous Malayalam Speech Recognition Using Hidden Markov Models”, A2CWiC `10: Proceedings of the 1st Amrita ACM-W Celebration on Women in Computing in India, September 2010, Article No.: 59, pp. 1–4.
[30] Anand A. V., Shobana Devi P., Stephen J. and Bhadran V. K., “Malayalam Speech Recognition system and its application for visually impaired people”, 2012 Annual IEEE India Conference (INDICON), pp. 619-624, 2012.
[31] Kurian C. and Balakrishnan K., “Connected digit speech recognition system for Malayalam language”, Sadhana, Volume 38, Issue 6, pp. 1339–1346, 2013.
[32] Sreejith C and Reghuraj P C, “Isolated Spoken Word Identification in Malayalam using Mel-frequency Cepstral Coefficients and K-means clustering”, International Journal of Science and Research (IJSR), Volume 1, Issue 3, pp. 163-167, December 2012.
[33] Hemakumar G. and Punitha P., “Speaker Independent Isolated Kannada Word Recognizer”, Multimedia Processing, Communication and Computing Applications, pp. 333–345, 2013.
[34] Kannadaguli Prashanth and Bhat Vidya, “Phoneme Modeling for Speech Recognition in Kannada using Multivariate Bayesian Classifier”, SSRG International Journal of Electronics and Communication Engineering (SSRG-IJECE), volume 1, issue 9, pp. 1-4, Nov 2014.
[35] Hegde S., Achary K.K. and Shetty S., “Isolated Word Recognition for Kannada Language Using Support Vector Machine”, In: Venugopal, K.R., Patnaik, L.M. (eds) Wireless Networks and Computational Intelligence. ICIP 2012. Communications in Computer and Information Science, vol 292. Springer, Berlin, Heidelberg, pp 262–269, 2012.
[36] Muralikrishna H., Ananthakrishna T., and Shama K., “HMM based isolated Kannada digit recognition system using MFCC”, 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 730-733, 2013.
[37] Vimala.C and Radha.V, “Suitable Feature Extraction and Speech Recognition Technique for Isolated Tamil Spoken Words”, International Journal of Computer Science and Information Technologies, Volume 5, Issue 1, pp. 378-383, 2014.
[38] Karpagavalli S., K. Usha Rani, R. Deepika and P. Kokila, “ Isolated Tamil Digits Speech Recognition using Vector Quantization”, International Journal of Engineering Research & Technology (IJERT) Volume 1, Issue 4, pp. 1-12, June – 2012.
[39] Vimla C. M. and Radha V., “Speaker Independent Isolated Speech Recognition System for Tamil Language using HMM”, Procedia Engineering, 30, pp. 1097–1102, 2012.
[40] Kumar C. S., and Foo Say Wei, “A bilingual speech recognition system for English and Tamil”, Fourth International Conference on Information, Communications and Signal Processing, 2003 and the Fourth Pacific Rim Conference on Multimedia. Proceedings of the 2003 Joint, pp. 1641-1644, 2003.
[41] Thangarajan R., Natarajan A. M. and Selvam M., “Syllable modeling in continuous speech recognition for Tamil language”, International Journal of Speech Technology, Volume 12, Issue 1, pp. 47–57, 2009.
Citation
Bharat C. Patel, Jagin M. Patel, Manish M. Kayasth, "An Overview of Speech Recognition Techniques and the Progress in Speech Technology for Indian Scripts," International Journal of Computer Sciences and Engineering, Vol.3, Issue.2, pp.94-102, 2015.