i-manager's Journal on Information Technology (JIT)


Volume 3 Issue 2 March - May 2014

Research Paper

Gender Classification Using Neck Features Extracted From Profile Images

Munehiro Nakamura* **
* Lecturer, Department of Information and Computer Science, Kanazawa Institute of Technology, Ishikawa, Japan.
**-*** Graduate Student, Graduate School of Natural Science and Technology, Kanazawa University, Ishikawa, Japan.
**** Professor, Graduate School of Natural Science and Technology, Kanazawa University, Ishikawa, Japan.
Nakamura, M., Iwata, K., Kimura, M., and Kimura, H. (2014). Gender Classification Using Neck Features Extracted From Profile Images. i-manager’s Journal on Information Technology, 3(2), 1-6. https://doi.org/10.26634/jit.3.2.2776

Abstract

Gender classification has been one of the emerging issues in the field of security due to increase of women-only floors. For security purpose, this paper presents two biological features extracted from the neck region in a profile image. One is extracted the bump of the neck formed by the laryngeal prominence. Another is the width of the neck that tends to be wider in males than in females. Evaluation experiments for the proposed two features were performed on 50 male and 39 female profile images. The experimental result shows that the proposed method achieved over 95.0% accuracy for both of the male and female images, which overcomes a state-of-the-art method based on Local Binary Patterns for gender classification.

Research Paper

Multimedia Information Systems: A Comparison Perspective of Social Web Sites

Addala Radha Krishna*
* Associate Professor, CSE Department, V.S. Lakshmi Engineering College for Women, Kakinada, AP, India.
** Professor, CSE Department, School of Information Technology, JNT University, Hyderabad, AP, India.
Krishna, R. A., and Sekharaiah, C. K. (2014). Multimedia Information Systems: A Comparison Perspective of Social Web Sites. i-manager’s Journal on Information Technology, 3(2), 7-12. https://doi.org/10.26634/jit.3.2.2777

Abstract

In ISs, resource objects like databases are distributed and replicated in order to increase the performance, reliability and availability. In an earlier work, we extended the earlier existing taxonomy of ISs [10]. In this paper, we have revised the taxonomy further by including WIS, SWIS and MMIS. We shall discuss various characteristics of MMIS and the effect of the network on required quality of presentation for MMIS. MMIS input strings provide an efficient means for iconic temporal/spatial relations of media streams and semantic objects. Today more information sources become available as MMISs. Hence, the development of abstract semantic models for video, audio, text, graphics and image data became very important. In this paper, we have tabulated a comparison feature study of a variety of MMISs web sites. It is found that most of the modern web sites use maximum degree of multimedia support.

Research Paper

Cross-Site Request Forgery: Vulnerabilities and Defenses

Bharti Nagpal* , Naresh Chauhan**, Nanhay Singh***
* Assistant Professor, Department of CSE, AIACT&R, Govt of NCT of Delhi.
** Professor and Chairman in the Dept of CSE at YMCA University of Science & Technology.
*** Associate Professor, Department of CSE, AIACT&R, Govt of NCT of Delhi.
Nagpal, B., Chauhan, N., and Singh, N. (2014). Cross-Site Request Forgery: Vulnerabilities and Defenses. i-manager’s Journal on Information Technology. 3(2), 13-21. https://doi.org/10.26634/jit.3.2.2778

Abstract

Cross-Site Request Forgery (CSRF) attack occurs when a malicious web site causes a user’s web browser to perform an unwanted action on a trusted site. These attacks have been called the “sleeping giant” of web-based vulnerabilities, because many sites on the internet fail to protect against them because they have been largely ignored by the web development and security communities. The impact of a successful cross-site request forgery attack is limited to the capabilities exposed by the vulnerable application. This attack could result in a transfer of funds, changing a password, or purchasing an item in the user's context.

Research Paper

Improving Performance of Web Applications with Effective Data Transmission Using Ids with Internet

R. Kalaimagal* **
*Assistant Professor, Department of Computer Science, Government Arts College for Men(Autonomous), Nandanam, Chennai, India.
** Assistant Professor, Department of Computer Science, Government Arts College for Men(Autonomous), Nandanam, Chennai, India.
R. Kalai Magal and M. Rames Kumar (2014). Improving Performance of Web Applications with Effective Data Transmission Using Ids with Internet. i-manager’s Journal on Information Technology, 3(2), 22-27. https://doi.org/10.26634/jit.3.2.2779

Abstract

Depending upon who you ask, the IDS may be a simple audit trail process, or a filter process using a traffic control system, like screening routers, packet filters, firewalls, etc. Some people use IDS to mean a logging utility. This paper studies improving Internet security with Network Security combined authentication and intrusion detection (NS-IDS) secure data transmission in such MANETs. Security is deployed to work with intrusion detection systems (IDSs) to alleviate the shortcomings of uni-modal biometric systems. Since each device in the network has measurement and estimation limitations, more than one device needs to be chosen, and observations can be fused to increase observation accuracy using for the system decides whether user authentication (or IDS input) is required and which (or IDSs) should be chosen, depending on the security posture. The decisions are made Network in fully secured manner by each authentication device and IDS. Simulation results are presented to show the effectiveness of the proposed scheme.

Research Paper

Comprehensive Study of KDD99 Dataset and Data Mining Tools for Intrusion Detection

Kamini Nalavade* **
* Research Scholar, Computer Engineering Department, VJTI, Matunga, Mumbai, India.
** Professor & Head, Computer Engineering Department, VJTI, Matunga, Mumbai, India.
Nalavade, K., and Meshram, B. B. (2014). Comprehensive Study of KDD99 Dataset and Data Mining Tools for Intrusion Detection. i-manager’s Journal on Information Technology, 3(2), 28-35. https://doi.org/10.26634/jit.3.2.2780

Abstract

Due to extensive growth of the Internet and increasing availability of tools and methods for intruding and attacking networks, intrusion detection has become a critical component of network security parameters. Intrusion detection in large data is one of the major challenge for the researchers in this area. Anomaly detection using data mining techniques has attracted the attention of many researchers to overcome the weakness of signature-based IDSs in detecting novel attacks and KDDCUP’99 is the mostly widely used data set for the evaluation of these systems. In this paper we have conducted an comprehensive study and statistical analysis on KDD dataset. We also provide description of features and instances of the dataset. The another important challenge for the researchers in this area is to select an appropriate data mining tool for the analysis. The paper disusses two important and popular tools in this area, weka, Oracle data mining and tanagara. We hope that study carried out in his paper is useful for the reasearcheres in the area of intrusion detection.

Research Paper

Study of Web Page Rank algorithms

Poonam Rawat* **
* Student, G.B.P.U.A & T Pantnagar, India.
** Student, Uttarakhand Technical University, India.
Rawat, P., and Pathak, D. (2014). Study of Web Page Rank algorithms. i-manager’s Journal on Information Technology, 3(2), 36-40. https://doi.org/10.26634/jit.3.2.2781

Abstract

World Wide Web is growing every day, people searching for a information can be easily lost in the web. People use search engine to find relevant information from the web. So it is very challenging for search engine to find relevant and quality information from the huge collection of hyperlinked data on World Wide Web. This paper gives an introduction of web search engine with its architecture. It also describes web mining techniques and page ranking algorithm in detail. Some very important page ranking algorithms like PageRank algorithm, Weighted Pagerank algorithm and Hyperlink induced topic search (HITS) algorithm are discussed and Compared on the bases of various parameters like mining techniques, input parameter, working process, complexity, limitation and search engine using algorithm.