Author Topic: Research Papers - IJSER Volume 1, Issue 1 October 2010  (Read 3861 times)

0 Members and 1 Guest are viewing this topic.

ijser.editor

  • International Journal of Scientific and Engineering Research
  • Administrator
  • Jr. Member
  • *****
  • Posts: 89
  • Karma: +0/-1
  • Research Paper Publishing
    • View Profile
    • International Journal of Scientific and Engineering Research
Research Papers - IJSER Volume 1, Issue 1 October 2010
« on: December 24, 2010, 09:08:33 am »
Research Titles Submitted for Review (October 2010)

Online Banking: Information Security vs. Hackers Research Paper[ Full-Text ]
Paul Jeffery Marshall, University of Houston

In this paper I will discuss four scenarios regarding cyber crimes specifically directed at financial institutions and give specific examples. Also, I will discuss the malicious Zeus and URLzone bank malware Trojans that is currently causing security issues and threats to some financial institutions. Expected results from study and research is to bring awareness of increased activity of cyber-attacks directed at financial institutions, call for a global alliance against cyber-pirates, and point out that financial institution's have a responsibility to protect and secure information as custodians of their customer's sensitive/legacy data online.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Server Consolidation: An Approach to Make Data Centers Energy Efficient and Green[ Full-Text ]
Mueen Uddin, Azizah Abdul Rehman

Data centers are the building blocks of IT business organizations providing the capabilities of centralized repository for storage, management, networking and dissemination of data. With the rapid increase in the capacity and size of data centers, there is a continuous increase in the demand for energy consumption. These data centers not only consume a tremendous amount of energy but are riddled with IT inefficiencies. All data center are plagued with thousands of servers as major components. These servers consume huge energy without performing useful work. In an average server environment, 30% of the servers are “dead” only consuming energy, without being properly utilized. Their utilization ratio is only 5 to 10 percent. This paper focuses on the use of an emerging technology called virtualization to achieve energy efficient data centers by providing a solution called server consolidation. It increases the utilization ratio up to 50% saving huge amount of energy. Server consolidation helps in implementing green data centers to ensure that IT infrastructure contributes as little as possible to the emission of green house gases, and helps to regain power and cooling capacity, recapture resilience and dramatically reducing energy costs and total cost of ownership.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

FPGA Implementation of Optimized DES Encryption Algorithm on Spartan 3E[ Full-Text ]
Amandeep Singh, Ms. Manu Bansal

Data Security is an important parameter for the industries. It can be achieved by Encryption algorithms which are used to prevent unauthorized access of data. Cryptography is the science of keeping data transfer secure, so that eavesdroppers (or attackers) cannot decipher the transmitted message. In this paper the DES algorithm is optimized using Xilinx software and implemented on Spartan 3E FPGA kit. The paper deal with the various parameters such as variable key length, key generation mechanism, etc used in order to provide optimized results.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Adaptive Fault Tolerant Routing in Interconnection Networks: A Review[ Full-Text ]
Dr.M.Venkata Rao,A.S.K.Ratnam

A multi-processor / computer systems are connected by varieties of interconnection networks. To enable any non-faulty component (Node / Link ) to communicate with any other non-faulty component in an injured interconnection network, the information on component failure is to be made available to non-faulty components, so as to route messages around the faulty components. In this paper we have reviewed to adaptive routing schemes proposed by Dally and Aloki , Glass and Ni ,and also the implementation details of reliable router. Moreover , it is proved that these schemes of routing messages via shortest paths with high probability and the expected length of routing path is very close to that of shortest path.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

MUCOS RTOS for Embedded Systems[ Full-Text ]
A Purushotham Reddy, A R Reddy and R Elumalai

Real-time operating system (RTOS) is a very useful tool for developing the application on embedded boards with least software development effort. Though number of RTOS products are available in the market, µC/OS-II is a freeware with minimum facility and more popular among the hobbyist, researchers and small embedded system developers. The µC/OS-II supports preemptive scheduling which is not efficient with respect to processor utilization. As a result, this may lead to missing deadline of the task assigned and hence may cause system failure. In this paper, a Rate Monotonic scheduling (RM), which is a better scheduling method when compared to preemptive technique, is implemented on µC/OS-II and its operation in terms of task execution and processor utilization are discussed. This paper presents the RM Analysis (RMA) on µC/OS-II with two different types of hardwares: 1) Low end microcontroller i.e 8051 based system and 2). High end system based on ARM9 is used. Two tasks 1). Advanced encryption standard (AES) and 2) Message display on text and graphic display are taken to demonstrate the RMA. The software tools Keil IDE, SDCC compiler and Phillips Flash Magic are used for implementation of tasks on 8051 embedded development board. The ARM developers Suite v1.2 and DNW are used for implementation of tasks on ARM9 development board. In addition to the above said tasks additional tasks like Real time clock interface, graphical LCD interface and UART interface for communication with computer is also implemented. The scaled-version of µc/os-ii with multiple tasks uses 4 kB of flash and 512 bytes of RAM in 8051 board. The entire MUCOS RTOS in ARM9 with multiple tasks uses 29.23 kB of flash and 596.36 kB of RAM. The results obtained indicate optimum utilization of processor with RMA scheduler for realizing low cost software for developing the application on embedded boards with least software development effort.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

INTELLIGENT KNOWLEDGE BASED HETEROGENEOUS DATABASE USING OGSA-DAI ARCHITECTURE[ Full-Text ]
Appasami.G, Karthikeyan.S

In this paper we present a framework to manage the distributed and heterogeneous databases in grid environment Using Open Grid Services Architecture – Data Access and Integration (ODSA-DAI). Even though there is a lot of improvement in database technology, connecting heterogeneous databases within a single application challenging task. Maintaining the information for future purpose is very important in database technology. Whenever the information is needed, then it refers the database, process query and finally produces the result. Database maintains the billion of information. User maintains their information in different database. So whenever they need, they collect it from different database. User cannot easily collect their information from different database without having database knowledge. The current database interfaces are just collecting the information from many databases. The Intelligent Knowledge Based Heterogeneous Database using OGSA-DAI Architecture (IKBHDOA) provides solution to the problem of writing query and knowing technical details of Database. It has intelligence to retrieve the information from Different Sets of Database based on user’s inputs.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

SWARM INTELLIGENCE FOR CONFLICT DETECTION AND RESOLUTION IN FREE FLIGHT ENVIRONMENTS[ Full-Text ]
MANIKANDAN VIJAYAKUMAR

In this paper we propose the Swarm intelligence (SI) and Free flight environment. Swarm Intelligence, which is a type of artificial intelligence based on the collective behavior of decentralized, self-organized systems. SI systems are typically made up of a population of simple agents or boids interacting locally with one another and with their environment. The agents follow very simple rules, and although there is no centralized control structure dictating how individual agents should behave, local, and to a certain degree random. On the other way Free flight is a developing air traffic control method that uses no centralized control (e.g. air traffic controllers). Instead, parts of airspace are reserved dynamically and automatically in a distributed way using computer communication to ensure the required separation between aircraft. There are some cases where the conflicts occur in free flight environment leading to chaos. This is been detected and resolved using the Swarm Intelligence which also helps in optimizing the path, finding the shortest path and also in air traffic control.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

HYBRID SPECKLING TECHNIQUES IN ULTRASOUND IMAGES [ Full-Text ]
Alamelumangai.N, Dr. DeviShree.J

Speckle noise is an inherent property of medical ultrasound imaging, and it generally tends to reduce the image resolution and contrast, thereby reducing the diagnostic value of this imaging modality. The adaptive neuro-fuzzy inference system (ANFIS) is an effective tool that can be applied to induce rules from observations. In this paper, the ultrasound image restoration contaminated with speckle noise is investigated in nonlinear passage dynamics of order 2. This paper uses the pi-shaped MF and other parameters include the training epochs, the number of MFs for each input, the optimization method, the type of output MFs, and the over-fitting problem, are investigated. For comparison with the proposed technique, this paper simulates the adaptive mean, weighted mean and median filters, etc. It is observed that the quality in terms of mean square error (MSE) of the proposed method is multiple times better for speckle noise than that derived using any other conventional filtering techniques.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

A RSS BASED ADAPTIVE HANDOFF MANAGEMENT SCHEME IN HETEROGENEOUS NETWORKS    [ Full-Text ]
Debabrata Sarddar, Shovan Maity, Arnab Raha, Ramesh Jana, Utpal Biswas, M.K. Naskar

Mobility management, integration and interworking of existing wireless systems are important factors to obtain seamless roaming and services continuity in Next Generation Wireless Systems (NGWS).So it is important to have a handoff scheme that takes into account the heterogeneity of the network. In this work we propose a handoff scheme which takes handoff decision adaptively based on the type of network it presently resides and the one it is attempting handoff with through some predefined rules. It also relies on the speed of the mobile terminal to make a decision of the handoff initiation received signal strength (RSS) threshold value. Finally simulations have been done to show the importance of taking these factors into account for handoff decisions rather than having a fixed threshold value of handoff for different scenarios.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Agent-Based CBR for Decision Support System[ Full-Text ]
Mythili Devi Nagaiah

The aim of this paper is to describe about Case Based Reasoning (CBR) which is based on agents and the implementation in Decision Support System (DSS). The Introduction Section gives a introduction about Data Mining, integration of Data Mining concepts with CBR, and defines the characteristics and process cycle of CBR. The Second Section describes about the Agents, DSS, and Agent-Based DSS. The Third Section describes about the CBR in Decision Support System. The Fourth Section describes the CBR (Agent-Based) for Decision Support System and Interaction between CBR Agents and components of Decision Support System. The Final section gives a conclusion about the paper.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

A Comparative Study for Performance Meas-urement of Selected Security Tools[ Full-Text ]
Mr. B.V.Patil, Dr. Prof. M. J. Joshi, Mr. H. N. Renushe

Today’s enterprise networks are distributed to different geographical locations and applications are more centrally located, this technological enhancement offers new flexible opportunities also measure security threats poses in the networks. These threats can external or Internal, external threats divided as hacking, virus attack, Trojans, worms etc. These threats can be minimized using number of network security tools and antivirus software, but all are not equally compatible for each type of attack hence the study is undertaken.This research paper highlights the performance of antivirus software using the number of parameters such as installation time, size, memory utilised, boot time, user interface launch time and full system scan time etc.