Papers by Journal of Computer Science IJCSIS

A Proposed Model for Cybercrime Detection Algorithm Using A Big Data Analytics
Cybercrime today is evolving as part of our day-today lives, and The challenges of cybercrime red... more Cybercrime today is evolving as part of our day-today lives, and The challenges of cybercrime reduction and prevention are becoming increasingly complex, that needs a new technique to handle the vast amount of this data, The capabilities of the traditional activities of police mostly drop brief in portraying the original division of criminal activities, hence contribute less to the appropriate allotment of police services. In this paper, methods are described for cybercrime Prediction, by using the Hadoop technique for big data analytics, through examining the geological zones which incorporate more noteworthy chance and exterior the conventional policing capabilities. The used method makes the utilize of a topographical cybercrime mapping algorithm to distinguish regions that have generally high cases of cybercrime. This method will identify exceedingly cases of cybercrime clusters which assist can show the patterns of cybercrime. the estimation approach is enhanced by the processing capability of the Hadoop platform.

It is our great pleasure to present the CIC 2016 Special Issue (Volume 14 Track 1, 2, 3, 4, 5, 6)... more It is our great pleasure to present the CIC 2016 Special Issue (Volume 14 Track 1, 2, 3, 4, 5, 6) of the International Journal of Computer Science and Information Security (IJCSIS). High quality research, survey & review articles are proposed from experts in the field, promoting insight and understanding of the state of the art, and trends in computer science and technology. It especially provides a platform for high-caliber academics, practitioners and PhD/Doctoral graduates to publish completed work and latest research outcomes. According to Google Scholar, up to now papers published in IJCSIS have been cited over 6818 times and the number is quickly increasing. This statistics shows that IJCSIS has established the first step to be an international and prestigious journal in the field of Computer Science and Information Security. There have been many improvements to the processing & indexing of papers; we have also witnessed a significant growth in interest through a higher number of submissions as well as through the breadth and quality of those submissions. IJCSIS is indexed in major academic/scientific databases and important repositories, such as: Google Scholar, Thomson Reuters, ArXiv, CiteSeerX, Cornell’s University Library, Ei Compendex, ISI Scopus, DBLP, DOAJ, ProQuest, ResearchGate, Academia.edu and EBSCO among others.
On behalf of IJCSIS community and the sponsors, we congratulate the authors, the reviewers and thank the committees of International Conference On Advances In Computational Intelligence In Communication (CIC 2016) for their outstanding efforts to review and recommend high quality papers for publication. In particular, we would like to thank the international academia and researchers for continued support by citing papers published in IJCSIS. Without their sustained and unselfish commitments, IJCSIS would not have achieved its current premier status.
“We support researchers to succeed by providing high visibility & impact value, prestige and excellence in research publication.” For further questions or other suggestions please do not hesitate to contact us at ijcsiseditor@gmail.com.
A complete list of journals can be found at:
http://sites.google.com/site/ijcsis/
IJCSIS Vol. 14, Special Issue CIC 2016 Edition
ISSN 1947-5500 © IJCSIS, USA.

It is our great pleasure to present the CIC 2016 Special Issue (Volume 14 Track 1, 2, 3, 4, 5, 6)... more It is our great pleasure to present the CIC 2016 Special Issue (Volume 14 Track 1, 2, 3, 4, 5, 6) of the International Journal of Computer Science and Information Security (IJCSIS). High quality research, survey & review articles are proposed from experts in the field, promoting insight and understanding of the state of the art, and trends in computer science and technology. It especially provides a platform for high-caliber academics, practitioners and PhD/Doctoral graduates to publish completed work and latest research outcomes. According to Google Scholar, up to now papers published in IJCSIS have been cited over 6818 times and the number is quickly increasing. This statistics shows that IJCSIS has established the first step to be an international and prestigious journal in the field of Computer Science and Information Security. There have been many improvements to the processing & indexing of papers; we have also witnessed a significant growth in interest through a higher number of submissions as well as through the breadth and quality of those submissions. IJCSIS is indexed in major academic/scientific databases and important repositories, such as: Google Scholar, Thomson Reuters, ArXiv, CiteSeerX, Cornell’s University Library, Ei Compendex, ISI Scopus, DBLP, DOAJ, ProQuest, ResearchGate, Academia.edu and EBSCO among others.
On behalf of IJCSIS community and the sponsors, we congratulate the authors, the reviewers and thank the committees of International Conference On Advances In Computational Intelligence In Communication (CIC 2016) for their outstanding efforts to review and recommend high quality papers for publication. In particular, we would like to thank the international academia and researchers for continued support by citing papers published in IJCSIS. Without their sustained and unselfish commitments, IJCSIS would not have achieved its current premier status.
“We support researchers to succeed by providing high visibility & impact value, prestige and excellence in research publication.” For further questions or other suggestions please do not hesitate to contact us at ijcsiseditor@gmail.com.
A complete list of journals can be found at:
http://sites.google.com/site/ijcsis/
IJCSIS Vol. 14, Special Issue CIC 2016 Edition
ISSN 1947-5500 © IJCSIS, USA.
Breast density is a known factor for breast cancer. This paper presents a new method of detection... more Breast density is a known factor for breast cancer. This paper presents a new method of detection of breast cancer using modified local gradient pattern. The modified method generates a texture pattern for the computation of texture matrix of the mammogram image and gives an accurate result of breast cancer detection with reduced pixel size and less run time consumption. Compared to the local gradient pattern, this modified pattern detects the tumor more accurately with the help of support vector machine (SVM) classifier.

—Estimation of spacecraft location is an evergreen interesting research area and an avionics syst... more —Estimation of spacecraft location is an evergreen interesting research area and an avionics systems involves for predicting the spacecraft attitude determination like Inertial Navigation System (INS), Global Positioning System (GPS) is also a difficult concept to understand. Recent technological advances in both GPS and INS to providing the position and attitude of moving platforms for numerous positioning and navigation applications, GPS/INS integrated system is a better way to solve their internal drawbacks in the case of more accuracy based navigational and positioning estimation i.e., aerospace problems. To make this integration process as possible, some methods are available which are Kalman Filter, Unscented Kalman Filter, Neural based integration approach and Particle Filter etc. Among these approaches, only few can be able to solve non-linear based practical problems such as spacecraft attitude prediction, tracking of moving vehicles, etc. In this paper a new spacecraft attitude prediction method using particle filter algorithm is derived, based on sequential Monte Carlo simulation; the particle filter roughly represents the probability distribution of the state vector with random samples. Through some standard theoretical approach as well as simulation analysis, this PF algorithm has shown that good prediction performance and also has better healthiness to the system model and noise than the other traditional prediction integration techniques.
A new image encryption algorithm based on pixel integration is proposed in this paper. This paper... more A new image encryption algorithm based on pixel integration is proposed in this paper. This paper presents implementing security for multiple image that enables to select one of the several images displayed simultaneously with a unique security key for each image. This process involves encrypting the images with Elliptic Curve Cryptography followed by applying block based interleaving and integrating the image matrix using the pixel based integration technique. Decrypting the image is done with the key specifically generated for the image from multiple images. The proposed method provides a high level security of interactive information requirements in the fields of military, confidential, aerospace, financial and economic, national security and so on. The algorithm is evaluated by calculating the entropy and correlation values.

It is our great pleasure to present the CIC 2016 Special Issue (Volume 14 Track 1, 2, 3, 4, 5, 6)... more It is our great pleasure to present the CIC 2016 Special Issue (Volume 14 Track 1, 2, 3, 4, 5, 6) of the International Journal of Computer Science and Information Security (IJCSIS). High quality research, survey & review articles are proposed from experts in the field, promoting insight and understanding of the state of the art, and trends in computer science and technology. It especially provides a platform for high-caliber academics, practitioners and PhD/Doctoral graduates to publish completed work and latest research outcomes. According to Google Scholar, up to now papers published in IJCSIS have been cited over 6818 times and the number is quickly increasing. This statistics shows that IJCSIS has established the first step to be an international and prestigious journal in the field of Computer Science and Information Security. There have been many improvements to the processing & indexing of papers; we have also witnessed a significant growth in interest through a higher number of submissions as well as through the breadth and quality of those submissions. IJCSIS is indexed in major academic/scientific databases and important repositories, such as: Google Scholar, Thomson Reuters, ArXiv, CiteSeerX, Cornell’s University Library, Ei Compendex, ISI Scopus, DBLP, DOAJ, ProQuest, ResearchGate, Academia.edu and EBSCO among others.
On behalf of IJCSIS community and the sponsors, we congratulate the authors, the reviewers and thank the committees of International Conference On Advances In Computational Intelligence In Communication (CIC 2016) for their outstanding efforts to review and recommend high quality papers for publication. In particular, we would like to thank the international academia and researchers for continued support by citing papers published in IJCSIS. Without their sustained and unselfish commitments, IJCSIS would not have achieved its current premier status.
“We support researchers to succeed by providing high visibility & impact value, prestige and excellence in research publication.” For further questions or other suggestions please do not hesitate to contact us at ijcsiseditor@gmail.com.
A complete list of journals can be found at:
http://sites.google.com/site/ijcsis/
IJCSIS Vol. 14, Special Issue CIC 2016 Edition
ISSN 1947-5500 © IJCSIS, USA.

The Wireless Sensor Network applications predominantly focus on low power consumption because of ... more The Wireless Sensor Network applications predominantly focus on low power consumption because of its battery-operated devices. The WSN architectures have many possible levels in which power reduction can be done. But, this paper is focused on the circuit level leakage power reduction. Out of all the leakage components, the subthreshold leakage power dominates 75% to 99% of the static power, which impacts more in the total power consumption of digital circuits. As the CMOS technology is down scaled, the subthreshold leakage power reduction becomes mandatory in design considerations. The sensor node in the event-triggered application operates in active state for shorter duration and in sleep state for longer time. Such a low duty cycle applications consumes more leakage power, which are to be reduced. But, most of the leakage power reduction techniques are applied to high duty cycle applications only. On consideration, a subthreshold leakage power reduction technique called Short Pulse Power Gated Approach (SPOGA) is proposed. The temperature-dependent parameters of subthreshold leakage model adversely affect the leakage power with increase in temperature. The conventional circuits and SPOGA based circuits of logic gates, 16-bit Ripple Carry Adder (RCA), 16-bit Carry Look Ahead adder (CLA) and 32-bit Comparator (COMP) are analyzed and compared the subthreshold leakage power in standby mode of operation. The existing popular technique of Multi Threshold CMOS (MTCMOS) is analysed in 16-bit RCA and 16-bit CLA circuits with temperature variations and the results of the conventional, MTCMOS and proposed SPOGA techniques are compared using the performance measures: leakage loss (Leak_loss) and leakage saving (Leak_save). The proposed SPOGA technique effectively performs than the MTCMOS technique. The design of the digital circuits using 90nm technology node is done with Cadence Virtuoso Schematic and its simulation is carried out using Cadence Spectre. The simulation environment is used with the parameters: simulation time is 10µs; supply voltage Vdd is 1V; nominal temperature T is 27˚C.

The innovation of smart technology not only has introduced smart devices but has also invented vu... more The innovation of smart technology not only has introduced smart devices but has also invented vulnerable threats as well. In smart mobiles, there are various threats introduced by the intruder which remains inside the smart mobiles and steals the valuable information of the user. One of the threats is the Keyloggers Trojan which takes the key strokes from the smart phone and sends it to the attackers system through the internet. In this project we have made an introspective study about the Keyloggers, their types and working and a method to overcome it. A Keyloggers is implemented and an analysis of their working is carried out to know about their effects in the smart systems. A solution mechanism using supervised learning to the Keyloggers is been done to avoid the stealing of the personal information by the intruders. It detects the malware based on the permissions of the installed apps in the smartphones.
The maximum power point in photovoltaic cell can be determined by identifying the electrical desi... more The maximum power point in photovoltaic cell can be determined by identifying the electrical design parameters. The design parameters are first determined by Ant Lion Optimizer implemented in IPython and these electrical parameters are used in the estimation of maximum power point. Ant Lion Optimizer is a recently proposed more efficient meta heuristic algorithm which is categorized under Swarm Intelligence. The results obtained by this approach is found to be in good accordance with the previous results in literature. Ant Lion Optimizer proves to be efficient in the estimation of Maximum Power Point with high degree of accuracy with reliable computational time.
Solar energy is the recent revolution of renewable energy in many fields It is the clean and secu... more Solar energy is the recent revolution of renewable energy in many fields It is the clean and secure green energy which is surplus in nature. The photovoltaic cell converts light energy into electrical energy by photovoltaic effect. The conversion efficiency of the photovoltaic cell is usually low due to non ideality and non-linear nature of solar cell which can be understood from the solar cell model. The model parameters of solar cell should be known with high accuracy to improve the design. In this paper the model parameters of photovoltaic cell are found by a recently formulated powerful metaheuristic Firefly algorithm implemented in Python for the one-diode model. The extracted parameters estimated by Firefly algorithm are in good agreement with the literature results.

The logistics is an important subset of supply chain management and plays a vital role for any or... more The logistics is an important subset of supply chain management and plays a vital role for any organization. Recently, the logistic systems are incorporated with high-tech technologies like radio frequency identifications (RFID) tags, wireless sensor devices, temperature monitoring systems, global positioning systems (GPS) etc. This technologies attempts to override the risk factors associated with the overall supply chain of pharmaceutical network. These technologies are independent to each other and they are decentralized system. The data and information transferred are not integrated to each other and the information control is ineffective. To overcome this problem a new internet based technology called Internet of Things (IoT) is emerged in the recent past. In this paper IoT based smart logistic system for pharmaceutical industry is designed. In this design two layer network architecture of IoT platform is introduced. The first layer is radio frequency identifications (RFID) and second is wireless sensor network (WSN) layer. RFID layer act as an asymmetric tag-reader link and WSN layer is an ad-hoc network between readers/master nodes. By adapting this smart logistic system achieves live monitoring of goods from shipment to customer place at lower cost of investment. The sensor devices are connected through the internet and real time data transfer will provide an opportunity for the pharmaceutical organization to react immediately if any changes required in the logistic process.

Biometric identification offers a probable and more consistent solution to the problem of human r... more Biometric identification offers a probable and more consistent solution to the problem of human recognition. Accuracy improvement, which is the primary motivation for using multimodal biometrics. Unlike single biometric systems, these are susceptible to noise and make spoofing tricky. During an identification search, it is very difficult to index the biometric which is available in the database. This hindrance can be overcome by using our proposed B+ tree indexing method which has high accuracy, high variance and less time complexity when compared to the existing indexing techniques. Integrating multimodal biometric with B+ Tree indexing, an efficient approach is designed based on Retina and Fingerprint. Applying our system in identification mode, the whole database have to be processed on an average and a performance gain with respect to time consumption is increased by using MATLAB R2014a.

—Speed breakers are supposed to be designed to reduce speed related accidents but there have been... more —Speed breakers are supposed to be designed to reduce speed related accidents but there have been a lot of cases where they are causing accidents leading even to death. There is a need of a system to detect speed breakers and warn the driver well before approaching them. There is a lot of research on detecting speed breakers using various sensors and alerting the driver. Of late the sensors embedded in smart phones are also being used for this purpose. But the results are less accurate and not robust enough for different type of speed breakers. Effectiveness of pattern matching algorithm for better speed breaker detection and warning system using a smart phone is investigated in this work. Accelerometer and GPS receiver in the smart phone are exploited for detecting and localizing the speed breakers respectively. The accelerometer data over the speed breakers at various speeds is analyzed and a signature pattern of the speed breaker is identified. A smart phone based system is developed to detect the speed breakers using pattern matching and store the corresponding GPS coordinates in the database. Once detected the same system is designed to alert the driver when he comes across the same speed breaker. The proposed system is implemented on Android platform using Java. The developed system is tested in real time during three test drives along the same stretch containing eight speed breakers. Over 95% of speed breakers have been detected correctly. Early warning is given for all detected speed breakers via text alert in smart phone screen. The results are very promising and more accurate than the previous works carried. The performance of the proposed system deteriorates at very low speeds.

A new meta-heuristic Biogeography Based Optimization (BBO) algorithm is proposed in the current w... more A new meta-heuristic Biogeography Based Optimization (BBO) algorithm is proposed in the current work to design the coordinated controller (PID controller & Power System Stabilizer (PSS)). The stability of the existing power system is enhanced by damping out the Low Frequency Oscillations (LFO) in the rotor of a synchronous machine. The Performance Index (PI) such as Integral square error (ISE) is minimized by using the proposed BBO algorithm in a wide range of operating conditions. The BBO PID-PSS is subsequently tested on a Single Machine Infinite Bus (SMIB) power system under different disturbances and operating conditions in order to examine its robustness. It is found that BBO based PID-PSS exhibits faster convergence rate and superior stability in power system as compared to other methods such as Particle Swarm Optimization (PSO) based PID-PSS, Adaptation law (AL) based PID-PSS and Conventional PSS.

Residue number system (RNS) in computer arithmetic is an efficient parallel computation number sy... more Residue number system (RNS) in computer arithmetic is an efficient parallel computation number system which increases the speed of computation in various digital signal processing applications. RNS employs forward converter, residue arithmetic unit and a reverse converter. The forward converter is binary to residue number converter .The residue arithmetic unit (RAU) is where the residue arithmetic based parallel calculations are done. The reverse converter is RNS to binary number system (BNS) converter. The design of reverse converter is very crucial in the design of RNS and it is necessary as many of the applications are based on the widely used BNS. The reverse converter should be speed efficient so as to make RNS applicable for various real time applications. The design of reverse converter via Ladner Fischer parallel prefix adder architecture makes it speed efficient. The choice of theorem for converting residue number to binary number also plays a major role in having the minimum delay. The constrain of RNS in practical applications is that it is inherently suitable for unsigned integers alone, hence to make it applicable to signed integers certain normalization has to adopted in both the forward and reverse converter. The critical part is the design of speed efficient reverse converter which is dealt in this paper. Index Terms—Residue number system, forward converter, reverse converter, parallel prefix adder.

An Information Detection System (IDS) is a system used to search, analyze and detect patterns. It... more An Information Detection System (IDS) is a system used to search, analyze and detect patterns. It returns multi-matched results concurrently. Content Addressable Memory (CAM) is a basic memory unit of IDS which compares input search data on stored entries and returns the address of matching data. The existing 10T and 9T CAM structure consumes more area and power consumption hence 4T CAM structure is proposed to reduce it. In order to increase the speed further, IDS using 4T CAM with Dual Port RAM (Random Access Memory) structure is proposed in this paper, which performs match operation in addition to read and write operation. The performance of proposed information detection system is verified using Modelsim and Xilinx ISE 12.1 and compared with existing IDS system. It shows that proposed system reduces power and area by 25% and 49%, which increase the performance of the system. Keywords—Content Addressable Memory (CAM), Random Access Memory (RAM), Information Detection System(IDS),Dual Port RAM.

Nurse scheduling problem is an NP-hard combinatorial problem for assigning various nurses to shif... more Nurse scheduling problem is an NP-hard combinatorial problem for assigning various nurses to shifts under given constraints according to the hospital regulations. The enviable environment for the nurses is the balanced workload created by the roster by considering all constraints. The major goal of the nurse scheduling problem is to design a roster which satisfies all the hard and soft constraints provided by the hospital regulations. This rostering methodology will ensure the availability of nurses based on their preference during scheduled period. Hospitals are repeatedly needed to produce the roster schedule for their working nurses. A well scheduled roster of nurses will impact on the development of resources, quality of the hospital and recruitment of the nurses. Since 75's researchers have occupied major contribution towards real-time problems like nurse scheduling problem. Many hospitals still depend on the manual method of scheduling the nurses which is carried out by the head nurses. This work describes the detailed survey of nurse scheduling problem and methodologies to solve NSP. In this survey many approaches is examined by including penalty calculation, preferences of nurses to tackle optimization algorithm.

Morphological Analysis is the process of inspecting the structure of a word with respect to its l... more Morphological Analysis is the process of inspecting the structure of a word with respect to its linguistic rules and semantics. They are also used to identify the Part-of-Speech tags of a given word. The task of analysis becomes extra tedious when the language is tightly structured and richly packed such as Tamil making analysis procedure a compelling endeavor. The current analyzer tools in practice mostly involve set of rules applied on them. These rules are however exhaustive and hence do not cover all tagging conditions. This work focuses on addressing one such condition that was lacking in the Analyzer tool for identifying Named Entities in Tamil Biomedicine, our previous work. The main objective here is to tag words that were omitted by the Analyzer due to lack of rules that might apply 100% to it. Tagging of words involves identifying related words based on region matching, running the Analyzer for the retrieved set of words and scoring it by similarity diameter. The 2-run Analyzer gave an accuracy of 85.9% on POS tagging of the untagged words.

Genetic Algorithm is a bio-inspired, population based search and optimization technique, adopts t... more Genetic Algorithm is a bio-inspired, population based search and optimization technique, adopts the principle of survival of the fittest. Different genetic primary operators such as crossover and mutation exit to solve the optimization problems that involve large population size. In this paper, a novel breeding mutation technique called Odd – Even (OE) position-wise mutation operator has been developed and used as a well-structured breed operator to produce offspring for the next generation population. To prove the performance of a novel mutation operator, a popular combinatorial multiple Travelling Salesperson Problem approach has been applied to solve the school bus routing problem. The School Bus Routing Problem (SBRP) deals with optimization of scheduling school buses to use it efficiently within the available constraint. Experimentation is performed and the outcome proves that the proposed work exhibits better results in buses utilization and reduces travel time of each student to some extent.
Uploads
Papers by Journal of Computer Science IJCSIS
On behalf of IJCSIS community and the sponsors, we congratulate the authors, the reviewers and thank the committees of International Conference On Advances In Computational Intelligence In Communication (CIC 2016) for their outstanding efforts to review and recommend high quality papers for publication. In particular, we would like to thank the international academia and researchers for continued support by citing papers published in IJCSIS. Without their sustained and unselfish commitments, IJCSIS would not have achieved its current premier status.
“We support researchers to succeed by providing high visibility & impact value, prestige and excellence in research publication.” For further questions or other suggestions please do not hesitate to contact us at ijcsiseditor@gmail.com.
A complete list of journals can be found at:
http://sites.google.com/site/ijcsis/
IJCSIS Vol. 14, Special Issue CIC 2016 Edition
ISSN 1947-5500 © IJCSIS, USA.
On behalf of IJCSIS community and the sponsors, we congratulate the authors, the reviewers and thank the committees of International Conference On Advances In Computational Intelligence In Communication (CIC 2016) for their outstanding efforts to review and recommend high quality papers for publication. In particular, we would like to thank the international academia and researchers for continued support by citing papers published in IJCSIS. Without their sustained and unselfish commitments, IJCSIS would not have achieved its current premier status.
“We support researchers to succeed by providing high visibility & impact value, prestige and excellence in research publication.” For further questions or other suggestions please do not hesitate to contact us at ijcsiseditor@gmail.com.
A complete list of journals can be found at:
http://sites.google.com/site/ijcsis/
IJCSIS Vol. 14, Special Issue CIC 2016 Edition
ISSN 1947-5500 © IJCSIS, USA.
On behalf of IJCSIS community and the sponsors, we congratulate the authors, the reviewers and thank the committees of International Conference On Advances In Computational Intelligence In Communication (CIC 2016) for their outstanding efforts to review and recommend high quality papers for publication. In particular, we would like to thank the international academia and researchers for continued support by citing papers published in IJCSIS. Without their sustained and unselfish commitments, IJCSIS would not have achieved its current premier status.
“We support researchers to succeed by providing high visibility & impact value, prestige and excellence in research publication.” For further questions or other suggestions please do not hesitate to contact us at ijcsiseditor@gmail.com.
A complete list of journals can be found at:
http://sites.google.com/site/ijcsis/
IJCSIS Vol. 14, Special Issue CIC 2016 Edition
ISSN 1947-5500 © IJCSIS, USA.