Accepted Papers


  • A PRAM Based Parallel Solution to the Sorting by Reversals Problem
    Amritanjali, Birla Institute of Technology, Ranchi,India
    ABSTRACT

    Reversals are by far the best studied gene order rearrangement operations. When the permutation is unsigned the sorting by reversal problem is NP-hard. Hannenhalli and Pevzner for the first time gave a proof of solving it in polynomial time for the signed versions of the problem. Since then, many solutions were given with speed and memory utilization improvements. In this paper we present a linear time parallel algorithm to solve the sorting by reversals problem for a signed permutation. The proposed work is based on PRAM model of parallel computation.

  • A MULTIBIOMETRIC CRYPTOSYSTEM BASED ON HYBRID FUSION
    Sreemol R and Kavitha N,Rajiv Gandhi Institute of Technology, Kerala, India
    ABSTRACT

    Biometric cryptosystem is regarding the use of different biometric features for identifying a person. The different features extracted from this biometric feature can be used to protect the private data of the user. The biometric features are usually stored inside a biometric template. But if the data inside the biometric template is lost, it would be a great lose to the user. Because, the biometric features cannot be reset like traditional passwords. There are different methods for protecting the biometric template. Hybrid fusion can be used to protect the biometric template in an efficient manner. The use of additional biometric feature will helps to improve the security of the system. Fingerprint features are extracted using Delaunay triangulation method and iris features are extracted using gabor filter.

  • OS FINGERPRINTING : TCP SYN PACKET BASED UNAUTHORIZED OS DETECTION VIA EFFICIENT DISTANCE ESTIMATION ALGORITHM
    Athira C A and Kavitha N,Rajiv Gandhi Institute of Technology,Kerala, India
    ABSTRACT

    Operating System (OS) Fingerprinting is the practice of determining the OS of a remote host on a network. This work describes an approach to passively fingerprint OSs using the information available from TCP packets and also a system to use this approach for detecting unauthorized OSs in an enterprise network is explained. An OS fingerprinting analyzer extracts and analyzes the headers of the captured outgoing TCP SYN packets and applies a Manhattan distance estimation algorithm using specific header fields and determines the OS of the machine generating the packet. The OS obtained from the fingerprinting analyzer is compared with the listed OS in the enterprise database that includes information about all the authorized OSs installed in an enterprise’s machines. If a match is not found, it indicates the presence of an unauthorized or unregistered OS in the enterprise network.

  • Recognization of Static and Dynamic Hand Gestures for Human Computer Interaction
    Ajith Jacob and Nisha K.K , Rajiv Gandhi Institute Of Technology,Kerala ,India
    ABSTRACT

    Human-Computer Interaction (HCI) can be found everywhere in our daily lives. Hand gestures are the part of the Human Computer Interaction. Vision-based hand gesture recognition techniques have proven many advantages compared with devices, giving users a simpler and more intuitive way of communication between a human and a computer. This work proposes a system for recognizing hand gestures based in computer vision, able to be used with any interface for human computer interaction. In this paper, proposing a system for recognizing static and dynamic hand gestures. There is also a new input graphical user interface is implemented in this work. There are variety of Gesture Recognition systems available on the market, but they are expensive and complex. In this paper, presents the design and implementation of a hand gesture recognition system using low-cost camera. By applying vision technology and controlling the devices by hand gestures, we can reduce the work space required.

  • FORMAL VERIFICATION OF SYSTEMS AND MODELING
    Jaime Joy and Shibukumar K.B,Rajiv Gandhi Institute of Technology,Kerala, India
    ABSTRACT

    Formal verification is the method of proving beyond doubt that a designed model is faultless using formal methods of mathematics. Wireless Sensor Networks is a major research area in the domain of information and communication technology. A model formulated in Wireless Sensor Network can easily adapt to any other network. Verification of swarm coordinated Unmanned Aerial Vehicle is crucial in a way that any malfunctioning of the system can cause severe disasters. In this paper we formulated and verified these models using LTL theorem. We also created a general framework for the message passing systems which can be widely used by the social networking sites. Symbolic Analysis Laboratory tool is used to specify the behavior of each model formulated. SAL tool validates theorems and provide counter examples for those theorems which are invalid.

  • ADVANCEMENT IN THE MOBILE APP REVIEW SYSTEM TO ENHANCE QUALITY OF MOBILE APPLICATIONS
    Sandeep S Machiraju, Anil K Bandi, Ajay K Yaramati, Tulasi R Yadavalli, & Venkata N Inukollu,University of Houston-Clear Lake, USA
    ABSTRACT

    The market for mobile applications has enormously increased in the past five years. According to the App Annie reports, the gross annual revenue is projected to exceed $189 billion by 2020[1]. Developing and enhancing mobile applications will vastly facilitate in increasing the market for mobile applications. User reviews of mobile apps play a vital role in enhancing the quality of currently existing mobile applications, and, in the development of new high quality mobile applications. Typically, user reviews are either in the form of several lines of text or numerical rating or both. Both forms of rating are meant to aid the prospective users in app installation/purchasing. User reviews also assist the developers in identifying technical glitches (if any) and in providing further advanced updates to the mobile app. The objective of this paper is twofold. Firstly, this paper identifies the currently existing app review systems and analyzes each of these app review systems in detail. Secondly, based on the analysis, we have introduced a four-step app review system that will be instrumental in enhancing the quality of mobile applications. In addition, we have presented the results of a survey (sample size = 100) that was administered to comprehend the effectiveness of the proposed app review system.