Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
National Conference on Innovative Trends in Information Technology 8th February 2014 Organized by The Department of Computer Science, Applications & Technology, KG College of Arts and Science Technically Co-Sponsored by National Conference on Innovative Trends in Information Technology (NCITIT - 2014) Copyright © 2014 by Bonfring All rights reserved. Authorized reprint of the edition published by Bonfring. No part of this book may be reproduced in any form without the written permission of the publisher. Limits of Liability/Disclaimer of Warranty: The authors are solely responsible for the contents of the paper in this volume. The publishers or editors do not take any responsibility for the same in any manner. Errors, if any, are purely unintentional and readers are required to communicate such errors to the editors or publishers to avoid discrepancies in future. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services. If professional assistance is required, the services of a competent professional person should be sought. Further, reader should be aware that internet website listed in this work may have changed or disappeared between when this was written and when it is read. Bonfring also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books. ISBN 978-93-83459-01-8 Bonfring 292/2, 5th Street Extension, Gandhipuram, Coimbatore-641 012. Tamilnadu, India. E-mail: [email protected] Website: www.bonfring.org Preface The NCITIT 2014 (National Conference on Innovative Trends in Information Technology) has aimed to provide a platform to discuss Computer Science Foundation on Computer Security, Data Mining, E-Commerce, RFID Applications, Fingerprint/Hand/Biometrics Recognitions and Technologies, Foundations of High-performance Computing, OTP, and Key Management Issues, IDS/Firewall, Anti-Spam mail, Anti-virus issues, Mobile Computing for E-Commerce, Network Security Applications, Neural Networks and Biomedical Simulations, Quality of Services and Communication Protocols, Quantum Computing, Coding, and Error Controls, Satellite and Optical Communication Systems, Theory of Parallel Processing and Distributed Computing, Virtual Visions, Artificial Intelligence, Cloud computing, Green computing & Virtual Simulations, Wireless Access Security, etc. The success of NCITIT is reflected in the received papers from authors from several colleges which allows for an effective idea and experience exchange. It is our immense pride and pleasure that such a conference is being organized by KGCAS. We believe that this Conference would open many new doors of invention and would have a positive effect upon the whole society. It is the humble wish of the conference organizers that the proficient discussion among the researchers, students and educators continues further after the event and that the companionships and collaborations forged will linger and prosper for many years to come. The accepted papers of NCITIT are published in this Book. Finally, it is appropriate that we record our thanks to our fellow faculty members for their work in securing a substantial input of papers from both students and faculty members and in encouraging participation from those areas. We are also indebted our Management without their support and encouragement, the conference could not have been the success that it was. We also acknowledge the authors themselves, without whose expert input there would have been no conference. We wish each of you successful deliberations, stimulating discussions, new friendships and all enjoyment that this conference offered. While this is a truly remarkable Conference, there is more yet to come. We look forward to seeing all of you in KGCAS. The Secretary Contents Title/Author Paper ID NCITIT01 A New Clustering Approach Based on Selecting Feature Subset for High Dimensional Data through the Propositional Foil Rules Page No. 01-04 S. Kulandai Teresa and G. Arul Geetha NCITIT02 MANET 05-06 P. Priya and A. Mercy Gnana Rani NCITIT03 Detecting Credit Card Fraud by Decision Tree and Genetic Algorithm 07-09 M. Manjula and R. Deepa NCITIT04 Measurement-Based Design of Roadside Content Delivery Systems 10-13 K. Gowthami NCITIT05 Time and Cost Optimization Algorithm for Scheduling Multiple Workflows in Hybrid Clouds 14-20 K. Ranjithprabhu NCITIT06 Self-Organising Trust Model Using Peer-To-Peer Systems 21-22 G. Brindha NCITIT07 Dynamic Forensics Model based on Ontology and Context Information 24-26 B. Tharika and S. Vidhya NCITIT08 A Study on Phishing and Anti-Phishing Techniques 27-29 M. Usha and P. Deepika NCITIT09 Mobile Adhoc Networks 30-32 N. GopikaaRani and K. Kamalam NCITIT10 Mobile Ad hoc Networks: Key Management 33-36 D. Sasirega and S. Banupriya NCITIT11 Comparative Study of MANET Protocol Types 37-38 D. Thuthi Sarabai and R. Krissna Priya NCITIT12 Enhanced Security in Secure Socket Layer for Banking 39-40 A. Sheela Rini and M. Usha NCITIT13 Analysis of DOS Attack in SMS/MMS 41-46 S. Vidhya, K. Kanimozhi and V. Jayalakshmi NCITIT14 Image Encryption Techniques: A Critical Comparison 47-51 K. Kamalam and S. Saranya NCITIT15 Energy Saving and Routing Protocols in Sensor Networks 52-54 M. Sindhya and A. Nithya NCITIT16 Analytical Study for Self-Organizing Map-Based Color Image Segmentation with K-Means, Fuzzy C-Means, Modified Fuzzy C-Means Clustering K. Saranya 55-60 NCITIT17 Decision Tree Classification Using ID3 Algorithm in Data Mining 61-63 K. Umavathy and M. Usha NCITIT18 Grid Computing: The Study of Unicore 64-66 R. Anandhi Lakshmi NCITIT19 Packet Sniffing 67-69 K. Rubini NCITIT20 Rough-Neighborhood DBSCAN Clustering:Performance Analysis 70-74 G. Menaka and J. Devika NCITIT21 Protecting Data URL Using Business Logic Component 75-77 K. Amuthan NCITIT22 A Survey on Mobile Ad hoc Network Using Weighted Clustering Algorithm (WCA) 78-80 M. Mayilvaganan and S. Dhivya NCITIT23 Rainfall Forecasting Analysis using EM Algorithm and SIMPLE k-means Algorithm in Data Mining 81-83 M. Mayilvaganan and N. Mohanapriya NCITIT24 Analysis Diabetes Mellitus on Prognosis, Complications and Side Effects using Data Mining 84-86 M. Mayilvaganan and T. Sivaranjani NCITIT25 Picture Password: A Visual Login Technique for Mobile Devices 87-90 K. Pavithra NCITIT26 An Analysis for what Social Networking 91-93 M. Nachammai and S. Malathi NCITIT27 A Study on Clustering Algorithms with Neural Networks 94-96 R. Pradheepa and S. Srimathi NCITIT28 A Novel Based Frame Work for Content Based Image Retrieval with Colour Models 97-100 M. Rajalakshmi and C. Tharani NCITIT29 Classification of Malware Based on Data Mining Approach 101-105 L. Hermi Godlin and M. Kalaivani NCITIT30 Efficient Sentiment Analysis and Opinion Mining for Unsupervised Reviews (Comparison Work) 106-109 R. Pradheepa and L. Shanmugam NCITIT31 Comparative Analysis of Clustering In Spatial Data Mining 110-112 A.P. Caroline Hirudhaya and G. Kiruba NCITIT32 Wireless Sensor Network Design for Structural Health Monitoring and Applications to Wreck Detection 113-115 S. Kaniyappan and A. Balasubramanian NCITIT33 Cloud Computing K. Nagasathya and M. Rajsree 116-117 NCITIT34 Cloud Computing 118-120 P.P. Reshma and T.U. Sanjana NCITIT35 Grid Computing 121-124 V. Priya and M. Pavithra NCITIT36 Green Computing 125-128 S. Deepa and M. Agathurpriyadharsini NCITIT37 Nanotechnology 129-133 K. Saranyadevi and S. Priyadharshini NCITIT38 Introduction to Green Computing 134-136 K.V. Manju Priyadharshini and E. Priyadarshini NCITIT39 SWAM Robotic 137-139 S. Shivaranjani and T. Sindhuja NCITIT40 Computer Network 140-143 S.V. Aishwarya and S. Ramya NCITIT41 Cyber Crime 144-146 D. Suganya and S. Bhuvaneswari NCITIT42 Mobile Voting Based on Biometrics 147-148 M. Nikesh and B. Sriram NCITIT43 Nanotechnology-An End for Cancer 149-152 L. Priyanga and P. Nivedha NCITIT44 For the Diagnosis and Treatment of Cancer 153-155 M. Jayapriya and S. Narmatha NCITIT45 Neural Networks in Data Mining 156-158 S. Lakshmanakumar and S. Asha NCITIT46 Green Computing 159-161 A. Maria Anto Marshell and Saravana Kumar NCITIT47 Data Mining 162-164 V. Vishnupriya and K. Priya Dharshini NCITIT48 Cloud Computing Security Issues in Infrastructure as a Service 165-169 S. Poornima NCITIT49 Detection of False Alarm over MANET using Collaborative Watchdog Approach 170-173 S. Sherlin and J. Suganya NCITIT50 Mining High-Speed Data Streams 174-183 N. Kalaiselvi and V. Kalarani NCITIT51 Implementation of Mask Skeletonization and Finger Points Extraction Using Neural Network A. Prakash and Dr.N. Sasirekha 184-188 NCITIT52 Denial of Service Attacks and Intrusion Detection in Wireless Networks 189-192 V. Subha and P. Selvi NCITIT53 Major Reasons for Bugs in Software Applications 193-195 K. Soundarraj, T. Parthasarathi and A.Ganeshan NCITIT54 Non-Convex System Using Stochastic Squalor Algorithm in Wireless Network Virtualization 196-199 G. Suganya and D. Thuthi Sarabai NCITIT55 Face Recognition and Verification Using Photometric Stereo with AntiSpoofing Method 200-203 M. Ramya NCITIT56 An Emergent Line of Attack for the Video Object Segmentation of Birds in a Video Frame Using Color Space and K-Means Clustering Algorithm 204-206 D. Napoleon and K. Ragul NCITIT57 Query Grouping Approach for Information Retrieval and Identifying User Web Browsing Patterns 207-209 M. Sivasankari and M. Sasikala NCITIT58 Reducing Traffic in Mobile Nodes over WIFI Networks 210-213 M. Vinod Kumar and Caroline Hirudhaya NCITIT59 Survey of Decision-Tree Method for Structured Continuous-Label Classification 214-216 J. Jenifer and G. Mohana Lakshmi NCITIT60 Google Balloon 217-120 G. Nandhini NCITIT61 A Study on RSA Algorithm Using Public-Key Encryption 221-225 K. Soundarraj, T. Parthasarathi and S.V. Manikandan NCITIT62 Text Mining in Biomedicine Using Ontology 226-228 T. Sowkarthika and M. Subha NCITIT63 Ethical Hacking and Cyber Security 229-235 P. Dinesh NCITIT64 Ethical Hacking 236-238 D. Kingsly NCITIT65 Data Mining Techniques and its Applications using in Bioinformatics 239-241 S. Kavi Priya and Dr.V. Narayani NCITIT66 Color Image Processing 242-244 T. Ganesh Babu and G. Srinivas Kishan NCITIT67 Cloud Computing and its Applications 245-250 V. Vishnu NCITIT68 Image Processing B. Angupriya and R. Meena 251-255 NCITIT69 Cloud Computing 256-259 D. Soundarya and G. Deepika NCITIT70 Advance Cipher with Rail Fence Implementation for Dynamic Routing 260-261 P. Lokana NCITIT71 Network Congestion Arbitration and Prediction Using Neural Networks 262-266 Caroline and A.Mugunthan NCITIT72 A Customizable Multi-Agent System for Distributed Data Mining 267-270 S. Aswanandini NCITIT73 A Novel Intrusion-Detection Approach Based on Fuzzy- Probabilistic Model 271-275 A.P. Christopher Arokiaraj NCITIT74 Subspace Clustering for High Dimensional Data Using Genetic Algorithms 276-281 G. Sangeetha and M. Usha NCITIT75 Advanced Networks in Wireless Using 4G Technologies 282-286 G. Priyadarshini and D. Vijayashree NCITIT76 Efficient Clustering and Reduction of Name Ambiguity for Digital Journals Search and Retrieval 287-289 R. Mathavi and T.S. Prabhu NCITIT77 A Study and Analysis of Density Based Clustering Algorithms for Mining Large Spatial Databases 290-295 S. Mekala NCITIT78 The Puzzle Based Defence Startergy against Flooding Attacks 296-297 G. Gayathri Devi NCITIT79 Study on Neural Networks through Mining 298-302 N. Jaya Prakash and N. Sriram NCITIT80 Routing Protocols in Wireless Sensor Networks 303-306 Kamalam and A.R. Jothimani NCITIT81 Web Mining for Web Image Retrieval N. Kamaraj and M.K. Prakash 307-309