Volume 2 Issue 11- November 2012
S.No | Title | Page |
---|---|---|
1. | Soft Classification Techniques for RS Data A. L. Choodarathnakara, Dr. T. Ashok Kumar, Dr. Shivaprakash Koliwad and Dr. C. G. Patil Abstract
Soft computing techniques are becoming popular in designing real world applications. Researchers are trying to integrate different soft computing paradigms such as fuzzy logic, artificial neural network, genetic algorithms, decision trees etc. to develop hybrid intelligent autonomous classification systems that provide more flexibility by exploiting tolerance and uncertainty of real life situations. The paper reviews soft classification techniques for Remotely Sensed Data. The emphasis is placed on the summarization of major soft classification approaches and the techniques used for RS Data Classification. Keywords— Remote Sensing, Soft Computing, Artificial Neural Networks, Genetic Algorithms, Decision Tree and Fuzzy Logic |
1468-1471 Full Text PDF |
2. | Local Positioning System for Mobile Phone Using
GSM Network Mohammed I. Aal-Nouman Abstract
The infra structure of the wireless base stations are needed to locate a position of a mobile node. This infra structure is definitely expensive and takes a lot of time and effort. So instead of building new base stations, the existing base stations will be used in proposed project, that the researcher can use the GSM wireless network, base stations, and databases (sector number and name) of the operator in the region or in the country that the mobile needed to find its location. Keywords— LPS, GSM, GPS, signal strength. |
1472-1475 Full Text PDF |
3. | Protocol Based Approach on Vulnerability
Detection Tools of SQLIA along with Monitoring
Tools D. Naga Swetha, B. Shyam Kumar Abstract
SQL injection attacks pose a serious threat to the security of Web applications and web services because they can give attackers unrestricted access to databases that contain sensitive information. In this paper, we proposed a new, protocol based approach to easily identify the vulnerability taking place in web applications and web services. Our approach has both conceptual and practical advantages. We have presented an experimental evaluation of security vulnerabilities occurring in web applications and services with the protocols used for them. The different approaches to test web applications for vulnerabilities given the experimental results and statistical analysis based on today's trend. Solutions are provided for parameter tampering in SOAP protocol with detection process. As attacks are taking place on protocols, finally to take control over SQLIAs, evaluation of attacks on protocols presented with the help of monitoring tools-a new innovation. Keywords—Web services, Web applications, Protocols, SQLIA, Vulnerabilities, Vulnerability Scanners, Monitoring tools. |
1476-1482 Ful Text PDF |
4. | Semantic Search through Pattern Recognition Shanti Gunna,N. Raghava Rao Abstract
Semantic search on databases often return a large number of results, only a small subset of which is relevant to the user. We present a semantic search technique considering the type of desired Web resources and the semantic relationships between the resources and the query keywords Ranking and categorization, which can also be combined, to alleviate this information overload problem. Results refinement for databases is the focus of this work. A novel search interface that enables the user to navigate large number of query results using the Pattern recognition. First, the query results are matched with the key word using full Pattern matching. In contrast, previous works expand the hierarchy in a predefined static manner, without navigation refinement modeling. We show that the problem of selecting the best concepts to reveal at each refinement and propose an efficient Pattern matching algorithm. We show experimentally that how results are refined using full Pattern matching at first level and half pattern matching at second level Keywords: Indexing, Location monitoring, Optimal String matching, Pattern matching, Search process, Semantic Search |
1483-1487 Ful Text PDF |
5. | The Process of Encoding and Decoding of Image
Steganography using LSB Algorithm Ravinder Reddy Ch, Roja Ramani A Abstract
Steganography is a technique that allows one to hide binary data within an image while adding few noticeable changes. Steganography is the dark cousin of cryptography, the use of codes. While cryptography provides privacy, steganography is intended to provide secrecy. Privacy is what you need when you use your credit card on the Internet -- you don't want your number revealed to the public. For this, you use cryptography, and send a coded pile of gibberish that only the web site can decipher. Though your code may be unbreakable, any hacker can look and see you've sent a message. For true secrecy, you don't want anyone to know you're sending a message at all.
Transforming values to frequencies
|
1488-1492 Ful Text PDF |
6. | A Personalized Ontology Model for Knowledge
Representation & Reasoning User Profiles Kanneganti Avanthi & Satya P Kumar Somayajula Abstract
As a model for knowledge description and formalization, ontologies are widely used to represent user profiles in personalized web information gathering. However, when representing user profiles, many models have utilized only knowledge from either a global knowledge base or user local information. In this paper, a personalized ontology model is proposed for knowledge representation and reasoning over user profiles. This model learns ontological user profiles from both a world knowledge base and user local instance repositories. The ontology model is evaluated by comparing it against benchmark models in web information gathering. The results show that this ontology model is successful.
|
1493-1496 Ful Text PDF |
- Home
- Author Instruction
- Editorial Board
- Call for Paper
- Current volume
- Archives
- Indexing
- FAQ
- Publication Fees
- Contact
- Citation Index 0.47
Email: ijcsetonline@gmail.com / editor@ijcset.net