Professional Documents
Culture Documents
Final Copy IJITS
Final Copy IJITS
Refereed Journal
Editor-In-Chief
Associate Editor
Dr. Yudhveer Singh,
Associate Professor, UIET, MDU, Rohtak, Haryana, India
CONTENTS
Abstract: In last decade lots of research was done on log mining. In fact log mining became an interesting area
of research. One of other interesting field is query recommendation. This paper analyzes log mining on query
recommendation. Log mining is a part of web mining and web mining in turn is a part of data mining which a
part is itself of Knowledge Discovery in Databases (KDD). Query recommendation is a method to improve
search results in web. In this paper it has been search that how log mining will be efficient in field of query
recommendation.
www.gtia.co.in 1
International Journal of Information Technology & Systems, Vol. 4; No. 1: ISSN: 2277-9825 (Jan-June 2015
Although the process of generating log files is the overall performance of web site. After
quite simple and straightforward, log analysis identifying the different web server log data files
could be a tremendous task that requires there is a need to merge the log files shown in
enormous computational resources, long time Fig. 1.
and sophisticated procedures. K. R. Suneetha and Dr. R. Krishnamoorthi [9]
The paper has been organized as follows: have analyzed NASA server log file of size
Section 2 we describes the approaches that are 195MB, various analysis has been carried out to
already in use on the basis of proposed work and identify the user behavior. The errors which
literature work that had been done. Section 3 arise in Web surfing were determined. Grace, L.
explains a novel architecture of proposed K. Joshila; Maheswari, V.; Nagamalai,
optimization system in detail along with Dhinahar[3]determine that Log files contain
algorithms. Section 4 concludes the paper with information about User Name, IP Address, Time
some discussion on future research. Stamp, Access Request, number of Bytes
Transferred, Result Status, URL that Referred
2. Related Work and User Agent. The log files are maintained by
the web servers. By analysing these log files
Web log mining is the process of applying data gives a neat idea about the user. This paper gives
mining technologies to discover usage patterns a detailed discussion about these log files, their
from the Web data. One important source to formats, their creation, access procedures, their
discover such patters is the Web log data that uses, various algorithms used and the additional
contains users Web browsing history. Web parameters that can be used in the log files
Usage Mining addresses the problem of which in turn gives way to an effective mining.
extracting behavioral patterns from one or more It also provides the idea of creating an extended
web access log. The entire process can be log file and learning the user behavior. Query
divided into three major steps. The first step, recommendation research is mainly based on
pre-processing, is the task of accurately previous query log of the search engine, which
identifying pages accessed by web visitors. This contains the history of submitted query and the
is a very difficult task because of page caching user selected URLs. Beeferman and Berger [1]
and accesses by web crawlers. The second step, exploited “click through data” in clustering
pattern discovery, involves applications of data URLs and queries using graph-based iterative
mining algorithms to the pre-processed data to cluster-ing technique. Wen et al. [2] used a
discover patterns. The last step, pattern analysis, similar method to cluster queries according to
involves analysis of patterns discovered to judge user logs. Both of their algorithms are difficult
their interestingness. to deal with in practice due to query log
sparseness. That is to say, only a part of popular
queries have sufficient log information for
mining their common clicked URLs while
distance matrices between most queries from
real query logs are very sparse. As a result,
many queries with semantic similarity might
appear orthogonal in such matrices.
Fonseca et al [4] showed a method to discover
related queries based on association rules. The
query log is viewed as a set of transactions.
However, the fact that similar queries are
Fig. 1. log files submit-ted by different users in most of case,
will also lead to sparseness problem. This is
Web server records all users’ activities of the because the support of a rule increases only if its
web site as web servers Logs. Most log files queries appear in the same query session, and
have text format and each log entry is saved as a thus they must be submitted by the same user.
line of text. There are many types of web logs The primary problem is the difficulty in
such as NCSA format, W3C format and IIS determining which sessions of these queries
format, but they share the same basic belongs to the similar search process. The next
information. These log data can be used in web problem the most interesting related queries
site designing, modifying and also to improve which are submitted by different users can't be
www.gtia.co.in 2
International Journal of Information Technology & Systems, Vol. 4; No. 1: ISSN: 2277-9825 (Jan-June 2015
presently discovered. For the reason that the the query similarity between the two queries,
support of a rule increases merely if its queries based on user query keywords and clicked
are in the similar session and they must be URLs. After that, clusters are generated with the
submitted by the similar user. M.Hosseini and help of query clustering tool. This tool is used to
H. Abolhassni have described a method used for cluster user queries using query logs built by
recommending associated queries according to search engines which in result produce query
clustering process over web queries from search clusters. Once query clusters are formed, next
engines query log. Zaiane and Strilets [10] step is to find a set of favored queries from each
presented a method for recommending queries cluster. Favored query are those that occupy a
according to seven aspects of query similarity, major portion of the whole search request in a
three of them are moderated variations of the cluster. Once favored queries from their query
first and second ideas. In addition our method clusters are identified, next step is to optimize
recommends the related queries in the direction the user search by recommending him with most
of the input query although my search for favored query related to his search and returning
different issues similar to the previous the desired relevant pages in the [10] top of the
information from query log file. There is one search result list. In this paper I have added a
more approach to recommend related queries by new step that is that if we remove smallest
means of query expansion. In other research by cluster than the search done by query log
Nikita Taneja they have done a good work on it. become smaller and ultimately time complexity
I just want to add some more concepts in the decreases.
Nikita Taneja’s research. The proposed architecture of optimization
system is shown in Fig. 2 which consists of
3. Proposed Work following functional components.
1. Query Log
The proposed optimization system (Fig. 2) lying 2. Query Similarity
on learning from historical query logs is 3. Query Clustering Tool
proposed to calculate user's information 4. Remove unwanted cluster
requirements in a better way. The proposed sys- 5. Sequential Pattern Generator
tem works as follow. The prime feature of the 6. Rank Updater
system is to per-form query clustering by finding
www.gtia.co.in 3
International Journal of Information Technology & Systems, Vol. 4; No. 1: ISSN: 2277-9825 (Jan-June 2015
3.1 Query log some drawbacks, due to the fact that keywords
Query log has been a popular data source for and meanings do not strictly correspond. The
query recommendation. The view of Web Log same keyword does not always represent the
Mining has been an area of interest as many same information need and different keywords
years. In the context of search engine the typical may refer to the same concept. As a result, the
logs [3] of search engines include the following calculated similarity between two similar queries
entries: (A) User IDs, (B) Query q issued by the may be small, while two unrelated queries may
user, (C) URL u selected by the user (D) remove be considered similar as shown in Fig. 3.
unwanted cluster (E) Rank r of the URL u
clicked for the query q and (F) Time t at which
the query has been submitted for search. A
sample query log is shown in Table 1 to better
understand this format.
In various studies, researchers and search engine
operators have used information from query logs
to study about the search process and to get
better search engines from early studies of the
logs created by users. Our method considers
only queries that appear in the query-log. A
single query may be submitted to the search
engine several times, and every submission of
the query induces a similar query session. A
simple notion of query session which consists of
a query, along with the URLs clicked
www.gtia.co.in 4
International Journal of Information Technology & Systems, Vol. 4; No. 1: ISSN: 2277-9825 (Jan-June 2015
www.gtia.co.in 5
International Journal of Information Technology & Systems, Vol. 4; No. 1: ISSN: 2277-9825 (Jan-June 2015
Simୡ୭୫ୠ୧୬ୣୱ(୶,୷) found during the pass over the data. At the end
= Simୣ୷୵୭୰ୢ(୶,୷) of the pass, the algorithm determines which of
+ Simୡ୪୧ୡ୩ୖ(୶,୷) the candidate sequences are really frequent.
If () These frequent candidates become the seed for
Set Cluster Id (y) = Ck; the next pass. The algorithm terminates when
Ck = Ck U {y}; there are no frequent sequences at the end of a
Else pass or when there are no candidate sequences
Continue; generated.
www.gtia.co.in 6
International Journal of Information Technology & Systems, Vol. 4; No. 1: ISSN: 2277-9825 (Jan-June 2015
Algorithm: Modified_GSP (QC, min_sup) The methods to find the weight and improved
Given: A Query Cluster with a set of URLs rank of a page are as follows:
Threshold Value min sups //for pruning the
candidates A. Weight Calculation
Output: Set of frequent Sequential Patterns The weight of the URL determined its popularity
//Start of Algorithm Result = ф // Result Set and order of access related to the user query.
Contains all Sequential Patterns Suppose a sequential pattern
P1 = Set of Frequent 1-Length Page Sequence: < {AB} {C} {E}> belongs to a query cluster
//Pages whose support>=min_ sup matched with the user query. This pattern can be
K=2; obtainable as shown in Fig. 5.
While (P (k-1)! =Null)
{
Generate candidate sets Ck (set of candidate k-
sequences);
For (all page sequences S in the cluster QC)
{
Increment count of all c € Ck if S supports c;
Pk = {c € Ck if S supports c;
K=k+1;
Result = Result U Pk
}//end While
Fig. 5. Graphical Represtation of Sequential Pattern
Return Result;
The page A as well as B lies at level 1, page C is
3.5 Rank Updater
at level 2, while D being at level 3. The weight
Rank Updater module takes its input from the
of a page X is inversely proportional to its
query processor i.e. the matched documents of a
position in the sequential pattern and is
user query and an update is applied to modify
calculated as:
the rank score of the returned pages. The module
operates online at the query time and applies the weight(X) = ln൫len୮ୟ୲୦(ଡ଼) ൯ /level(X)
needed updates on the concerned documents. Where Len pat(X) is the effective depth of the
The updated documents are those which are sequential pattern in which X occurs and
most often accessed by the users and are level(X) is the depth of X in the pattern.
detected by the Sequential Pattern Generator.
The updater works in the following steps: B. Rank Improvement
Step 1: Given an input user query q and The rank of a page can be enhanced with the
matched documents D collected from the query help of its assigned weight. The original rank
processor, the cluster C is found to which the now becomes:
query q belongs. New Rank(X) =Previous Rank(X) +Weight(X)
Step 2: The sequential patterns of the concerned Where rank(X) is the existing rank value (Page
cluster are retrieved from the local repository Rank) of page X and weight(X) is the popularity
maintained by the Sequential Pattern Generator. given to X.
Step 3: The level weights are calculated for
every page X present in the sequential patterns. Weight Calculation and Rank Updation
Step 4: Final rank of a page d is computed if it From the above result (as shown in Fig. 4), a
happens to be present in the patterns of cluster Sequential Pattern is generated as AB C D
C. The improved rank is calculated as the weight of each URL can be determined as:
summing of previous rank and assigned weight Weight (A) =1.09
value. Weight (B) =1.09
By improving the ranks on the basis of user Weight (C) =0.54
feedbacks, the results of a search engine can be Weight (D) =0.36
optimized so as to better serve the user Table 2 shows the optimized the rank values and
requirements. At this time user can find the the new rank is used for the result presentation.
popular and relevant pages upwards in the result
list. Table 2. Rank Optimization with weight of pages
www.gtia.co.in 7
International Journal of Information Technology & Systems, Vol. 4; No. 1: ISSN: 2277-9825 (Jan-June 2015
References:
www.gtia.co.in 8
International Journal of Information Technology & Systems, Vol. 4; No. 1: ISSN: 2277-9825 (Jan-June 2015)
*A.P., Dept. of Electrical and Computer Engg., School of Engineering and Tech., Dilla University, Ethiopia.
**Associate Prof, Dept. of Mgt. Studies, College of Business and Economics, Dilla University, Ethiopia.
Email: sangheethaa@gmail.com, arunkorath@gmail.com
Abstract: Autonomous mobile mesh networks are a combination of mobile ad hoc networks and mesh
networks. Mobile ad hoc networks are temporarily formed for a specific purpose, without any fixed
infrastructure. Mesh networks are fully connected networks with the support of fixed infrastructure.
Autonomous mobile mesh networks (AMMNET in short), is the framework designed for supporting mesh
networks, which are mobile still expects connectivity as opposed to ad hoc networks. This paper proposes a
multipath routing technology for AMMNETs which provides better packet delivery ratio in AMMNETs. The
simulations are done in ns2. The results prove that, multipath routing technology works well with AMMNET
framework.
www.gtia.co.in 9
International Journal of Information Technology & Systems, Vol. 4; No. 1: ISSN: 2277-9825 (Jan-June 2015)
www.gtia.co.in 10
International Journal of Information Technology & Systems, Vol. 4; No. 1: ISSN: 2277-9825 (Jan-June 2015)
give route reply. On receiving the first route Fig. 5 shows the packet delivery ratio achieved
reply, or best route reply, the source starts for AMMNET and AMMNET with multi-path
transmission of data. The source is actually routing. From the graph it is clear that, using
receiving multiple route replies from the multipath routing in AMMNET increases the
intermediate nodes as well as from the packet delivery ratio by 20 %. When the traffic
destination. So it would be better, if more than increases, AMMNET is not able to achieve
one route is used for transmission of data to the better packet delivery ratio, where as in
destination. AMMNET with multi path routing, PDR
AOMDV [10] is a multipath routing version of increases. This is due to the fact that data is
the Adhoc on-demand routing protocol transmitted over multiple available paths. Not
(AODV). It is proved in [10] that AOMDV is that AMMNET uses AODV for updating its
superior to AODV and other existing routing routing table. But multipath routing uses
protocols. It utilizes all alternative paths, thus AOMDV.
not monopolizing any routes. It ensures delivery
of packets to the correct destination. Fig. 4 gives
an example for two alternative paths to reach
destination in group 2 from a source in group 3
through different intra group routers.
Group1 Group2
Intrarouter Intrarouter
5. Simulation Results
Simulations are done in ns2 [11] version 2.35.
The parameters set for simulation are given in Fig. 6. Throughput Vs. Simulation Time
Table 1. The parameters used for performance
comparison are, Packet delivery ratio, Fig. 6 shows that the throughput is increased by
Throughput, Average energy consumption of 40% in AMMNET with multipath routing,
nodes and End to end delay. compared to AMMNET. It is also due to data
transmission over multiple available paths. Fig.
Table 1. Simulation Parameters 7 shows the average energy consumption of all
nodes in the network. Surprisingly, it is also less
compared to AMMNET.
www.gtia.co.in 11
International Journal of Information Technology & Systems, Vol. 4; No. 1: ISSN: 2277-9825 (Jan-June 2015)
References:
www.gtia.co.in 12
International Journal of Information Technology & Systems, Vol. 4; No. 1: ISSN: 2277-9825 (Jan-June 2015)
Abstract: Routing protocol is taking a vital role in the modern communication networks. The performance of
each routing protocol is different from each other. In the context of routing protocol performance, each of them
has different architecture, adaptability, route processing delays and convergence capabilities. Among different
routing protocols, Enhanced Interior Gateway Routing Protocol (EIGRP) and Open Shortest Path First (OSPF)
have been considered as the pre-eminent routing protocols for the real-time application. EIGRP and OSPF are
dynamic routing protocols used in practical networks to disseminate network topology towards the adjacent
routers. This paper is based on a comparative performance analysis between EIGRP and OSPF for real time
applications during data transfer. In order to evaluate the performance of EIGRP and OSPF, two network
models that are configured with EIGRP and OSPF, respectively were assessed. The comparative evaluation
shows that EIGRP routing protocol provides a better performance than OSPF routing protocol for real time
applications.
Keywords: Comparative Study, Enhanced Interior Gateway Routing Protocol (EIGRP), Open Shortest Path
First (OSPF), Data Transmission, Network System, Real Time Applications.
www.gtia.co.in 13
International Journal of Information Technology & Systems, Vol. 4; No. 1: ISSN: 2277-9825 (Jan-June 2015)
maintains a vector (table) of minimum distance network in the form of a graph showing which
to every node. The cost of reaching a destination nodes (i.e., routers, switches, computers and
is calculated using various route metrics. other network devices) are connected to which
Routing Information Protocol (RIP) uses the hop other nodes. Each router then independently
count of the destination whereas Interior calculates the best next hop for every possible
Gateway Routing Protocol (IGRP) takes into destination in the network using only its local
account other information such as node delay copy of the map and without communicating
and available bandwidth. Updates are performed with any other node. The collection of best next
periodically in a distance-vector protocol where hops forms the routing table for the router. Link
all or part of a router's routing table is sent to all state routers use Dijkstra's algorithm to calculate
its neighbors that are configured to use the same the lowest cost paths, and normally update other
distance-vector routing protocol. RIP supports routers with which they are connected only
cross-platform distance vector routing whereas when their own routing tables change. Invented
IGRP is a Cisco System proprietary distance by the Dutch computer scientist Edger Dijkstra,
vector routing protocol. Once a router has this this algorithm is a technique for finding the
information, it is able to amend its own routing shortest path between two nodes in a weighted
table to reflect the changes and then inform its graph. Link state routing is an improvement
neighbors of the changes. This process has been over distance vector routing protocols, the other
described as ‘routing by rumour because routers main class of routing protocols for packet
are relying on the information they receive from switched networks. These protocols, such as RIP
other routers and cannot determine if the (routing information protocol), normally use
information is actually valid and true. There are only a single metric (such as hop count) and
a number of features which can be used to help which exchange all of their table information
with instability and inaccurate routing with all other routers on a regular basis. Link
information. state routing normally requires more memory
Enhanced Gateway Protocol (EGP) and Border and processing than distance vector routing, but
Gateway Protocol (BGP) are not pure distance- there is less transmission overhead and it reacts
vector routing protocols because a distance- more quickly to changes in network
vector protocol calculates routes based only on connectivity. Despite their differences, both
link costs whereas in BGP, for example, the algorithm types perform well in most
local route preference value takes priority over circumstances [4].
the link cost [3]. OSPF rerouting time is an experiment objective
Link state routing is a complex routing in the network when there is a failure connection
technique in which each router shares link with the Border Gateway Protocol (BGP) in
information with other routers about the reach two separate areas. Optimized Network
ability of other networks and the metric to reach Engineering Tool (OPNET) is used to do
the other networks in order to determine the best simulation for comparison three protocols
path. Routing is the process of moving packets (OSPF, RIP, and EIGRP) and the results show
across a network from one host to another. It is that EIGRP has the smallest routing time,
usually performed by dedicated devices called memory time and CPU time, and the least delay
routers. Packets are the fundamental unit of time, but OSPF can transmit the most data.
information transport in all modern computer OSPF and EIGRP are also compared by OPNET
networks, and increasingly in other simulation for routing time, delay time and
communications networks as well. They are packet loss in video streaming and results show
transmitted over packet switched networks, that EIGRP has less packet loss but OSPF has
which are networks on which each message (i.e., less delay and more throughput. The rerouting
data that is transmitted) is cut up into a set of time after there is a failure link is experiment
small segments prior to transmission. The metric with many methods such as equal cost
is based on number of hops, link speeds, traffic multipath, loop free alternate, and U-turn
congestion and other factors as determined by alternate which are compatible in OSPF protocol
the network designers. A hop is the trip that a [5].
packet takes from one router to another as it EIGRP and OSPF are dynamic routing protocols
traverses a network on the way to its destination. used in practical networks to disseminate
In link state routing, every router on the network network topology to the adjacent routers. There
receives a map of the connectivity of the are various numbers of static and dynamic
www.gtia.co.in 14
International Journal of Information Technology & Systems, Vol. 4; No. 1: ISSN: 2277-9825 (Jan-June 2015)
routing protocols available but the selection of The formula that EIGRP uses to calculate scale
appropriate routing protocol is most important bandwidth is:
for routing performance. The right choice of
routing protocol is dependent on several Delay= Dn*256 ------------------------- (4)
parameters [6].
where: Dn represents in microseconds
2. Enhanced Interior Gateway and sum of the delays configured on the
interface to the destination [8].
Routing Protocol (EIGRP) versus
Open Shortest Path First (OSPF) While the Open Shortest Path First (OSPF) is a
routing protocol that was developed by the
Enhanced Interior Gateway Routing Protocol Interior Gateway Protocol (IGP) working group
(EIGRP) is a CISCO proprietary protocol, which of the Internet Engineering Task Force for
is an improved version of the interior gateway Internet Protocol (IP) networks. OSPF is a link
routing protocol (IGRP). EIGRP is being used as state routing protocol that is used to distribute
a more scalable protocol in both medium and information within a single Autonomous
large scale networks since 1992. EIGRP is said System. In 1989, the first version of OSPF was
to be an extensively used IGRP where route defined as OSPFv1, which was published in
computation is done through Diffusion Update Request for Comment (RFC) 1131. The second
Algorithm (DUAL). However, EIGRP can also version of OSPFv2 was introduced in 1998,
be considered as hybrid protocol because of which was defined in RFC 2328. In 1999, the
having link state protocol properties [7]. third version of OSPFv3 for IPv6 was released
With the use of total delay and the minimum in RFC 2740 [7].
link bandwidth, it is possible to determine the The path cost of an interface in OSPF is called
routing metrics in EIGRP. Composite metrics, metric that indicates standard value such as
which consists of bandwidth, reliability, delay, speed. The cost of an interface is calculated on
and load are considered to be used for the the basis of bandwidth. Cost is inversely
purpose of calculating the preferred path to the proportional to the bandwidth. Higher
networks. The EIGRP routing update takes the bandwidth is attained with a lower cost.
hop count into account though EIGRP does not
include hop count as a component of composite Cost = 108/bandwidth in bit per second
metrics. The total delay and the minimum (bps) ---------------------------------(5)
bandwidth metrics can be achieved from values
which are put together on interfaces and the where the value of 108 is 100000000 in bps is
formula used to compute the metric is followed
called reference bandwidth based on by default.
by:
256*(K1*BW+K2*BW/256-Load+K3*Delay)
*K5/K4+Reliability ------------------------------ (1) 2.1 Advantages and Disadvantages of
For weights, the default values are: EIGRP
ܭ1=1, ܭ2=0, ܭ3=1, ܭ4=0, ܭ5=0. There are some advantages provides by EIGRP
where: K1, K2, K3 ,K4, and K5 are EIGRP Metric as follows:
Weight. I. Easy to configure.
These default values efficiently trimming down II. Loop free routes are offered.
the above formula to: III. It keeps a back up path in the network to
256∗ (BW + )ݕ݈ܽ݁ܦ------------------------------ (2) get the destination.
A significant and totally non-obvious fact is that, IV. Multiple network layer protocols are
if ܭ5=0, the term K5/K4+Reliability is not used included.
(i.e. take as 1). V. EIGRP convergence time is low and it is
responsible for the reduction of the
EIGRP uses to calculate scale bandwidth (Bw)
bandwidth utilization.
as:
VI. It can work with Variable Length
Bw = (10000000/Bn)*256 ----------------------- (3)
Subnet Mask (VLSM) and Class Less
Where: (݊) is in kilobits per seconds and Inter Domain Routing (CIDR).
represents the minimum bandwidth on VII. EIGRP also supports the routing update
the interface to destination. authentication.
www.gtia.co.in 15
International Journal of Information Technology & Systems, Vol. 4; No. 1: ISSN: 2277-9825 (Jan-June 2015)
www.gtia.co.in 16
International Journal of Information Technology & Systems, Vol. 4; No. 1: ISSN: 2277-9825 (Jan-June 2015)
www.gtia.co.in 17
International Journal of Information Technology & Systems, Vol. 4; No. 1: ISSN: 2277-9825 (Jan-June 2015)
www.gtia.co.in 18
International Journal of Information Technology & Systems, Vol. 4; No. 1: ISSN: 2277-9825 (Jan-June 2015)
* Department of Electronics and Communication Engineering, Vaish College of Engineering, Rohtak, India
** Professor, Department of Electronics and Communication Engineering, SGTIET, Gurgaon, India
Email: singhakshat001.as@gmail.com, kapoordhiraj79@gmail.com, rsap70@rediffmail.com
Abstract: The current SOI MOSFET technology supports the scaling down to nanometer regime but it is
unable to keep the performance level high as it suffers from the restrictions like effective interface coupling,
channel orientation, channel mobility, off-state leakage, switching delay and latch up. The additional parameters
such as injection velocity, short channel length effects, narrow channel effects, body effects, hot carrier effect,
depletion width effect, substrate doping effect and Band-to-Band Tunneling (BTBT) also results in decrease of
inversion charge, increase in leakage current and decrease in the drive current. In order to minimize these
effects, double gate came into existence, which relies on the exploration of novel higher mobility channel
materials such as SiGe, which might perform even better than Si. This paper reviews the double-gate N-
MOSFET using SiGe as channel material.
Keywords: Scaling, GAA, SOI, Fin-FET, Double-gate MOSFETs
Accepted On: 28.03.2015
www.gtia.co.in 19
International Journal of Information Technology & Systems, Vol. 4; No. 1: ISSN: 2277-9825 (Jan-June 2015)
insulator (SOI) MOS transistors have been Moreover, various SiGe-channel n-MOSFETs
generated from classical, planar, single-gate with high-K metal gate stacks together for
devices into three-dimensional devices with a providing enhanced value of drive current and
multi-gate structure (double-, triple- or transconductance and performance advantage
quadruple- gate devices). It must be noted that, in depends mainly on the ability to scale a shorter
most cases, the term "double gate" refers to a channel length and its structure with the high-K
single gate electrode, which is present on two dielectric gate stack is shown in Fig. 4 [10].
opposite sides of the device [6]. Ideally, double-
gate SOI and GAA can be viewed as important
structures for minimizing short channel effects
like DIBL, but they are found to be incompatible
with SOI CMOS standard [6]. The different gate
configurations of multi-gate are shown in Fig. 2
[7].
Fig. 4. Structure of a Ge channel DG MOSFET
with the high-k dielectric gate stack
2. Motivation
In a continuous effort to improve the
Fig. 2. Different gate configurations for SOI devices: semiconductor device features, down scaling of
1) single gate; 2) double gate; 3) triple gate; 4)
the devices is the major demand of VLSI
quadruple gate; 5) new proposed Pi-gate MOSFET [7]
industries. However, as on entering in sub-
micrometer regime the short channel effects
For DGMOS transistors, back and front gates are
hinder the device performance. Double gate
interconnected for achieving more ON current
MOSFETs are replacing the conventional MOS
(Ion) and to minimize short-channel effects. It
devices due to their capability to attain higher
must be noted that, larger is the current, more it
speeds and reduced short channel effects (SCE’s).
will be helpful in decreasing circuit delay in
The work done so far completely stress on
critical paths [8].
providing the explanation regarding the transport
If we plot the I-V Characteristics of the double
in Si MOSFETs through simple band structure
gate, for Si and consider the cases of connected
and mobility calculations. However, as we carry
front and back gates (VF gate=VB gate) and
out scaling on MOSFETs with very short channel
independent gate control (with back gate bias
lengths, it is found that the effect of the high-field
voltage of zero) it is found to be one as shown in
transport, density of states (DOS), band structure,
Fig. 3 [9]. When these gates are connected
mobility and effective mass, plays out important
together, two inversion channels are formed: one
role in carrying out the calculations of the
at the top of the silicon film near the top gate
eventual drive current, we require expanded
insulator, and the other at the bottom near the
investigation [11].
bottom insulator [9].
In addition, based on the analysis carried for 1-3
nm thick SOI MOSFET, in double-gate (DG)
mode and single mode, strong interface coupling,
ideal subthreshold swing, improved
transconductance and volume inversion
demonstrates the superiority of DG-MOSFETs
over SG-MOSFETs[12].The scaling of MOSFETs
is defined based on the criteria of International
Technology Road Map for Semiconductors
(ITRS), which enables us to take part in the
worldwide semiconductor market, which is
growing at a phenomenal rate. If the device
dimensions are continuously scaled down, then we
Fig. 3. I-V Characteristics [9] can achieve high performance and low power
www.gtia.co.in 20
International Journal of Information Technology & Systems, Vol. 4; No. 1: ISSN: 2277-9825 (Jan-June 2015)
www.gtia.co.in 21
International Journal of Information Technology & Systems, Vol. 4; No. 1: ISSN: 2277-9825 (Jan-June 2015)
current drive and better control on short-channel Its operation starts with off state condition, where
effects. electrons can’t be transferred from source to the
body without threshold voltage so gate potential
4. Double Gate SiGe MOSFET is applied on the both terminals as it start to
increase the potential of the surface start to
The important characteristic for SiGe is lattice increase which reduces the source limit and
thermal conductivity, which decreases notably forward biases the source-body junction. As the
with increase in Germanium content until 50% source limit is reduced, there is exponential
[18]. Above, 50% this reverses to give increase in injecting electron from source to body
conclusion that the value is moving towards pure is noticeably seen because of increase in the
germanium [18].Using this property, construction energy level of electrons [19].
of device with property of has been done [18].
Table 1. Comparison between Si DG NMOS and SiGe DG NMOS [22]
www.gtia.co.in 22
International Journal of Information Technology & Systems, Vol. 4; No. 1: ISSN: 2277-9825 (Jan-June 2015)
performance in nanoscale MOSFETs; it is found (100nA/µm) and mainly due to the enhancement
that SiGe shows the best performance in terms of / delay reduction (~3X compared to Si) [11] and
driver current and enhancement/delay reduction very low off-state leakage (<1nA/µm) [11]. Thus,
(~2X compared to Si) [11]. However, minimum SiGe can be utilized as channel material in
off-state leakage due to BTBT is rather high future.
www.gtia.co.in 23
International Journal of Information Technology & Systems, Vol. 4; No. 1: ISSN: 2277-9825 (Jan-June 2015)
www.gtia.co.in 24
International Journal of Information Technology & Systems, Vol. 4; No. 1: ISSN: 2277-9825 (Jan-June 2015)
Abstract: Cross-site scripting (XSS) is an attack against web applications in which scripting code is injected
into the output of an application that is then sent to a user’s web browser. In the browser, this scripting code is
executed and used to transfer sensitive data to a third party (i.e., the attacker) The trusted website is used to
store, transport, or deliver malicious content to the victim. The target is to trick the client browser to execute
malicious scripting commands. JavaScript, VBScript, ActiveX, HTML, or Flash. In today’s world more than
80% of the web applications are vulnerable to XSS threats. User friendly web applications are developed to
increase the customer base and hackers utilize the features provided by the web applications. Cross Site
Scripting (XSS) Attacks are currently the most popular security problems in modern web applications. This
paper was through light on one conceptual solution for all applications. This concept was used to protect all
types of web application from XSS attack and from different attack also.
www.gtia.co.in 25
International Journal of Information Technology & Systems, Vol. 4; No. 1: ISSN: 2277-9825 (Jan-June 2015)
many researchers. Among the important static b) Stored (Persistent) - Forum, bulletin
analysis methods the static analysis method board, feedback form
proposed by Nenad Jovanovic et al., addressed c) DOM based XSS - PDF Adobe Reader ,
the problem of vulnerable web applications FLASH player
using static source code analysis. They used a a) Reflected (Non-Persistent): In this attack
flow sensitive analysis and context sensitive data the malicious code will not been stored on
flow analysis to discover vulnerable points in a web server. The attacker were simply send a
program [2]. malicious link to the victim and when a
In the past, many woks pertaining to dynamic victim click on that link the code attach with
analysis have been proposed and implemented that link will be executed and attack will be
by various researchers to secure web perform on victim machine as shown in Fig.
applications from SQL injection and cross site 1.
scripting attacks. Yao Wen Huang et al.,
proposed techniques for web application security
assessment mechanisms in order to identify poor
coding practices that render web applications
vulnerable to attacks such as SQL injection and
cross site scripting attacks. They used software
testing techniques (including dynamic analysis,
black box testing, fault injection, and behavior
monitoring), for testing the security in web
applications [3].
3.Objectives
The main objective of this research paper is to Fig. 1. Reflected (Non-Persistent)
protect web application from XSS attack in a b) Stored (Persistent): In this attack if any
effective manner with a simple technique to web server will vulnerable from XSS attack
develop an addons or extention for a web brower then attacker will stored the malicious code
who protect the client from this XSS attack. The to that server and when any victim will
main objective of this technique is to provide a request to that web server so in respond to
security to each and every web appllication by that request web server download the
not to concentrate on creation of secure code for webpage with the malicious code to the
web application but to protect it by an tools of victim computer then this malicious code
browser means addons or extension of web will be automatically executed by the victim
browser. This tools will be updated according to browser and attack will be performed on the
the discovery of new vulnerablity that’s why its victim machine [4, 5] as shown in Fig. 2.
an easy and secure way to protect any web
application from XSS attack.it’s an easy and
user friendly way to secure from XSS attack. By
this technique web developer and a cyber-
security team both perform their task in different
but co-ordinate and in effective manner. After
using this security concept web application will
be more secure as previous one.
4. Conceptual Study
4.1. Types of XSS
According to their attacking technique Cross Fig. 2. Stored (Persistent)
Site Scripting (XSS) is classified in three types c) DOM based XSS: As their name, Document
a) Reflected (Non-Persistent) - Link in Object Modeling (DOM) the attack with
other website or email document that means some site provides a
facility for upload and download of PDf or
www.gtia.co.in 26
International Journal of Information Technology & Systems, Vol. 4; No. 1: ISSN: 2277-9825 (Jan-June 2015)
any document file and if this document will guide line which guides a program to prevent
not filter before stored to database. Then their web application from each and every attack
attacker take an advantage for that and he can which was present in cyber world. This cheat
store any malicious code file in place of that sheet provide a guide to how a secure web
document file so if any user can click on that application built and which function and
file so this malicious code will be executed at techniques will be used to prevent their web
the client side by client browser without any application from different attacks.
command of that victim as shown in Fig. 3.
5. New Concept of XSS Security
In all the previous research all attention has been
given on the vulnerable code of the web
application that means where the loop hole is
present on the web application and how to
protect this loop hole or a vulnerability of the
web application. But the web application
developer will not been aware of each and every
security concept of the web application at every
level. Because now a day’s web attack will be
increase in very fast manner that’s why now web
security is not just a part of web application
development. These both are different and much
Fig. 3. DOM based XSS wide fields [6].
In the web application development process a
4.2. Prevention Techniques web application developer try to develop secure
This attack will be performed by attacker web application and after that a web security
because developers of web-based applications team were appointed to find vulnerability and
often have little or no security background. secure the web application from XSS attack. But
That’s why they were unable to create a secure the attacker will take an advantage of the gap
code. But due to the importance of security point between the development and the security of
of view there are some prevention techniques web application. That means after the
which help in securing web application and development of an web application an attacker
programmer use this to secure their web can scan or find the vulnerability in a web
application. Those prevention techniques are as application and then perform the attack on that
follows: vulnerability to harm company web server,
Validate Input client etc [7].
o Letters in a number field? Many different types of vulnerability will be
o 10 digits for 4 digit year field? find in web application so that attackers will use
o Whitelist (e.g. /[a-zA-Z0-9]{0,20}/) different techniques to attack on them
o Reject, don’t try and sanitize application that’s why it’s a big task for cyber
Use of function like:-There are many secrete to prevent all the application from all
function available in web development that attack [8,9].
language’s which help to secure the web My research say that cyber security team have to
application from XSS attack by filter the develop one conceptual solution for all web
input provided by the user. Some example of applications that means providing security for
PHP function are as follows: every XSS vulnerablity to each web application
o Stripslashes(); its a most diffcult task. So cyber security team
o mysql_real_escape_string(); have to develop an new addons or new extension
o str_replace(); for security purpose. That means develop of that
o addslashes(); tool which was added to the browser and this
tool will scan all the request and reponses from
Cross site scripting (XSS) prevention cheat
browser to server and vice versa and if it find
sheet:-It is a most effective way to secure any
any XSS attack malicious code and it denined
web application. XSS prevention cheat sheet is a
this request at that time and stop futher process.
list of tools and technique or we can say it is
www.gtia.co.in 27
International Journal of Information Technology & Systems, Vol. 4; No. 1: ISSN: 2277-9825 (Jan-June 2015)
This tool will be update as new type of context sensitive string evaluation. Recent
vulnerablity will be discover [10]. Advances in Intrusion Detection (RAID
2005), 2005.
6. Conclusion [6] Su, Z. and Wasserman, G. The essence of
command injections attacks in web
Cross site scripting is a most popular and a applications. 33rd ACM Symposium on
dangerous attack in today’s world. Cross site Principles of Programming Languages,
scripting (XSS) vulnerability is found in most of 2006.
the web application so it’s a big task for cyber [7] Livshits, B. and Erlingsson, U. Using web
security team to protect this all web application application construction frameworks to
of the world. So use of one conceptual solution protect against code injection attacks. 2007
for all web applications that protect web workshop on Programming languages and
application and clients from XSS attack. So by analysis for security, 2007.
creating a addons or extension tools of XSS [8] Christina Warrender, Stephanie Forrest, and
security for web browser will provide the Barak Pearlmutter. Detecting intrusions
security from XSS attack by scan each and every using system calls: Alternative data models.
request and reponses between client and a web In In IEEE Symposium on Security and
server that‘s why if there is any attacking Privacy, IEEE Computer Society, 1999.
malicious code is present there then this code [9] P. Vogt, F. Nentwich, N. Jovanovic, E.
will be remove by that addons and remaining Kirda, C. Kruegel, and G. Vigna. Cross-site
usefull code will be executed by the web scripting prevention with dynamic data
browser and the attack will not be perform on tainting and static analysis. In Proceeding of
client machine. the Network and Distributed System
This is the new concept which work as a middle Security Symposium (NDSS), San Diego,
man between web server and a client to protect CA, February 2007.
the client and the web application from the cross [10] C. Reis, J. Dunagan, H. Wang, O.
site scripting attack.this concept is different from Dubrovsky, and S. Esmeir. Browser-shield:
all the previous security research and it is most Vulnerability-driven _ltering of dynamic
effective and easy way to protect from cross site html. ACM Transactions on the Web, 1(3),
scripting attack. 2007.
References:
www.gtia.co.in 28
International Journal of Information Technology & Systems, Vol. 4; No. 1: ISSN: 2277-9825 (Jan-June 2015)
Abstract: Detection of bradycardia, and tachycardia is the common fatality in the current scenario of the health
care society. Thus, the proposal presents an innovative solution that addresses problems of integration, such as
medical staff from one institution being able to monitor patients located at another. Many hospitals are sharing
patient data on cloud as service. Hence in the present study, a new approach of Cloud based Wireless Remote
Elderly Patient Monitoring system during emergency was proposed as a prototype to monitor the vital health data
and needed drugs are prescribed. The heart rate, pulse, oxygen saturation, body temperature, lungs air volume and
blood glucose level are measured. The ECG arrhythmia classification scheme is composed of data acquisition,
feature extraction and normalization, feature reduction, and classification. A multi-class support vector machine
(SVM)-based classifier is proposed. A particle swarm optimization algorithm is propose to search for the best value
of the SVM parameters and upstream by looking for the best subset of features that feed the classifier. Different
types of arthymia are classified. Sensitivity, Specificity Accuracy is calculated.
In this paper, I present an extensive review of the significant researches associated with wireless patient monitoring
using wireless sensor networks based on network issues and cloud based patient monitoring using wireless sensor
networks and provided description about the emergency department.
www.gtia.co.in 29
International Journal of Information Technology & Systems, Vol. 4; No. 1: ISSN: 2277-9825 (Jan-June 2015)
components in routing based networks are routers, their internal IT infrastructure to a cloud service
designed to compute, calculate and distribute the provider.
routing tables. The National Institute of Standards and
Technology (NIST) has formalized the cloud
services being offered to consumers into three
different types : Infrastructure-as-a- Service
(IaaS), Platform-as-a-Service (PaaS), and Software
as- a-Service (SaaS). At the most basic level, IaaS
is the model in which a service provider makes a
set of virtualized computer components (e.g.,
virtual machines or networked storage) available
to consumers as a fully outsourced service that can
be used to build and run applications without
purchasing the actual computer components.
Fig. 1. The proposed architecture Each of these hardware components is visible to
the consumer. An example of an IaaS service is
In the Fig. 1. at the patient's bedside, there are Amazon which allows customers to dynamically
sensor nodes which are loaded with software to provision new virtual machines on the Amazon
collects, encode, and transmit data through cloud using configuration templates with their own
wireless communication channels to be stored. custom settings.
The Deploy Service acts like a broker between Moving to the next highest level, PaaS is the
local and remote services. It is responsible to model in which a service provider or vendor offers
receive collect data from sensors and to dispatch it to the client an entire runtime environment for an
to appropriate to storage service hosted on cloud. application (i.e., design, deployment, and test).
It also receives requests from content service to This would include the basic hardware in addition
retrieve data from the Cloud Service, whose to critical libraries that the consumer’s application
functionality is two folded: will rely on. An example of a PaaS service is
i. It is responsible to provide services to store Google AppEngine which allows developers to
collected data. make use of some of the same tools and libraries
ii. It provides a platform for development, testing used in Google Web applications to build their
and Deployment of applications needed by own custom applications by building on a
medical staff. Mobile and stationary devices common application platform. At the highest level,
interacts with applications using Content SaaS provides consumers with the use of on-
Service. demand software (e.g., business applications)
iii. This service acts like a “door” where medical running on the provider’s servers and the
staff devices can access all available associated data over the Internet.
information.
2.1 Hardware Setup
2. Cloud computing In the Fig. 2 three electrodes for sensing the
potential NI ELVIS for hardware platform is used
Cloud computing has become a compelling and it has an instrumentation amplifier and a band
business model for companies that own large data pass filter built on it.
centers to essentially rent out different layers of
their computing resources.
This phenomenon has emerged in large part
because many companies now internally rely both
on technologies that must be able to scale
dynamically and on large sets of computing
hardware for their processing. Therefore,
organizations have found that they can reduce IT
costs by merely outsourcing one or more types of Fig. 2. Hardware setup
www.gtia.co.in 30
International Journal of Information Technology & Systems, Vol. 4; No. 1: ISSN: 2277-9825 (Jan-June 2015)
www.gtia.co.in 31
International Journal of Information Technology & Systems, Vol. 4; No. 1: ISSN: 2277-9825 (Jan-June 2015)
(ii) Multi-Factorial Interventions their data to a central processing node for data
All elderly people with recurrent falls or assessed fusion [8].
as being at increased risk of falling should be Agent Based Health Monitoring of Elderly People
considered for an individual. in Indoor Environments Using Wireless Sensor
Networks, [9] has proposed a design of a health
4. Extensive Review of Significant care monitoring system based on wireless sensor
Researches on Wireless Patient networks (WSN) which is capable of collecting,
retrieving, storing and analysing the vital signs of
Monitoring the patient. Vital signs such as body temperature,
blood pressure, pulse rate and respiratory rate are
The significant researches can be classified based monitored.
on network issues, cloud based approaches. Technological monitoring in elderly patients has
A new approach of wireless patient monitoring proposed WSN based home monitoring system for
system was proposed [1] using Zigbee to monitor elderly activity [10].
the patient. Real time monitoring of ECG signal using PIC and
A Prioritization Based Congestion Control web server has proposed the design of a wireless
Protocol for Healthcare Monitoring Application in sensor network to monitor patients suffering from
Wireless Sensor Networks [2] was proposed to chronic diseases in their homes without regularly
have congestion control and service prioritization going to health center [11].
protocol for real time monitoring of patients’ vital Wireless Sensor Networks for Ambient Assisted
signs using wireless biomedical sensor networks. Living was proposed to develop arrhythmia
Detecting mobility for monitoring patients with detection algorithm [12].
Parkinson’s disease at home using RSSI in a Patient Health Monitoring Based on ZigBee
Wireless Sensor Network was proposed [3] and Module was proposed to monitor the health of
wireless monitoring of the patients with patients continuously [13].
Parkinson's disease, for preventing potential falls A Robust Wearable Health Monitoring System
and injuries and recording the number of based on WSN was proposed for wearable health
occurrences of Freezing of Gait (FoG) over single monitoring system [14].
or multiple days. New Frontier to Monitor, Track and Assist Older
A new patient monitoring framework and Energy- Adults Suffering from Type-2 Diabetes was
aware Peering Routing Protocol (EPR) for Body proposed in wireless sensor network system within
Area Network [4] was proposed in Body Area the home environment that captures activity of
Networks (BANs). daily living [15].
Efficient location tracking system for patient
Monitoring focused on an efficient location
tracking system design for monitoring elder
5. Review on Significant Research on
patients in home environments [5]. Cloud Based Approach on Patient
Using ZigBee low-power wireless standard for Monitoring
monitoring patients’ signs presents Wireless Body
Area Network [6] was proposed. Highly Personalized Health Services using Cloud
An improved localization algorithm with Wireless and Sensors has proposed new medical services
heartbeat monitoring system for patients safety such as telemedicine, monitoring of chronic
was proposed in hospitals to maintain patient patients, personalized health services, creating
safety and ensure that patients do not leave to new services for dependants [16].
hospital without system can ease the workload of Novel Cloud and SOA Based Framework for E-
nurses, help locate patients, and monitor patient’s health Monitoring using Wireless biosensors, has
heartbeats [7]. proposed Chronic Diseases (CD) in governmental
Biometric Monitoring System for Multi Sensor and private healthcare systems [17]
Multi-modal Node has proposed a general network Applying Cloud computing technologies to
topology used for wireless body area networks is Gerontology and Geriatrics Health Care System
the star topology with the sensor nodes sending (GGHCS) has proposed overall healthcare IT
www.gtia.co.in 32
International Journal of Information Technology & Systems, Vol. 4; No. 1: ISSN: 2277-9825 (Jan-June 2015)
www.gtia.co.in 33
International Journal of Information Technology & Systems, Vol. 4; No. 1: ISSN: 2277-9825 (Jan-June 2015)
[12] Saurabh Prakash, V.Venkatesh ,”Real time [17] Diego Gachet Páez, Fernando Aparicio,
monitoring of ECG signal using PIC and web Manuel de Buenaga, Margarita Rubio, Highly
server “, International Journal of Engineering Personalized Health Services using Cloud and
and Technology (IJET). Sensors ,IEEE, 2013.
[13] Raúl Aquino-Santos Diego Martinez-Castro [18] Abdelghani Benharref, Novel Cloud and
, Arthur Edwards-Block and Andrés Felipe SOA Based Framework for E- health
Murillo-Piedrahita , Wireless Sensor Monitoring Using Wireless Biosensors, IEEE
Networks for Ambient Assisted Living , 2013.
Sensors, 13, 16384-16405, 2013. [19] Tse-Chuan Hsu, Chih Hung Chang, Applying
[14] A. Deepa ,P. Nirmal Kumar, Patient Health Cloud computing technologies to
Monitoring Based on ZigBee Module, IEEE , Gerontology and Geriatrics Health Care
2013 . System(GGHCS), IEEE, 2013.
[15] Young Hwan Kim, Kuk-Jin Jang, Seung-chul [20] Minwoojung, Kabsu Han, Cloud Computing
Lee, and HeeYong Youn, A Robust Wearable for u-Health and Automotive, IEEE, 2013.
Health Monitoring System based on WSN, the [21] Jiafu Wan and Caifeng Zou, Cloud-Enabled
10th Annual IEEE- CCNC Smart Spaces and Wireless Bod Area Networks for Pervasive
Sensor Networks. Healthcare”, IEEE, 2013.
[16] Samir Chatterjee, Kaushik Dutta, Harry (Qi) [22] Xiaoliang Wang, Qiong Gui, Bingwei Liu,
Xie Jongbok, A New Frontier to Monitor, Zhanpeng Jin, and Yu Chen, Enabling Smart
Track and Assist Older Adults Suffering from Personalized Healthcare: a Hybrid Mobile-
Type- 2 Diabetes, 1530-1605, IEEE, 2012. Cloud Approach for ECG Telemonitoring.
www.gtia.co.in 34
International Journal of Information Technology & Systems, Vol. 4; No. 1: ISSN: 2277-9825 (Jan-June 2015)
Abstract: Biometric system is becoming more popular and increasingly important, since they provide more
reliable and accurate means of identification. These days biometric systems are used almost everywhere for
identification. In Japan, banks have used the palm vein authentication technology for customer identification
since July 2004. In addition, Fujitsu has integrated the technology into the access control of electronic door lock
systems. Their system has a false acceptance rate of less than 0.00008% and a false rejection rate of 0.01%. In
this paper, biometric user recognition system based on Palm Print has been proposed. The proposed system
attempts to reduce the complexity of Palm Vein Authentication system. The proposed system is implemented
using MATLAB and LBP method and uses SVM technique which reduces the complexity there by a increase
the performance. The system has an average 97.5% recognition rate. This Research work is an attempt to
propose such a system that can bring out a reduced complexity for Palm vein recognition. Palm vein recognition
is easily implemented using a feature extraction algorithm (LBP) and SVM for classification which reduces
complexity thereby increases performance. The performance analysis is done using CASIA database.
Keywords: Authentication System, Acquisition, Median Filter, Segmentation, Clustering, SVM, LBP,
Recognition
www.gtia.co.in 35
International Journal of Information Technology & Systems, Vol. 4; No. 1: ISSN: 2277-9825 (Jan-June 2015)
devices. Iris input devices are expensive and the image with a training image the line matching
method is intrusive as people might fear of technique has been used which is based on pixel-
adverse effects on their eyes. to-area algorithm.
Palm print is therefore suitable for everyone and Online Palm print Identification system (Zhang,
it is also non-intrusive as it does not require any Kong, You and Wong [9]) takes online palm
personal information of the user. prints, and uses low resolution images. Low pass
• Vein patterns are unique to individuals and filter and boundary tracking algorithm is used in
contain detailed characteristics for pre-processing phase. Circular Gabor filter used
formulation of algorithm template. Contact for feature extraction and 2-D Gabor phase
less authentication is hygienic and non- coding is used for feature representation. A
invasive, thus promoting high-level of user normalized hamming distance is applied for
acceptance. matching.
• Extremely difficult to forge, thereby enabling A dynamic selection scheme by introducing
a high level of security. global texture feature measurement and the
• Palm print is hardly affected by age and detection of local interesting points had also been
accessories in comparison to face proposed by J. You, W. Kong, D. Zhang, and K.
recognition. Cheung [10].
• Palm print images contain more information An effective indexing and searching scheme for
and needs only low resolution image an image database to facilitate fast retrieval when
capturing devices when compared with the size of a palmprint database is large search
fingerprint recognition. [11].
• Compared with iris recognition the palm Palmprint Authentication Using Fusion of
print images can be captured without Wavelet Based Representations had been
intrusiveness as people might fear of adverse proposed by Prasad, Govindan and Sathidevi[12].
effects on their eyes and cost effective. Features extracted are Texture feature and line
Hence it has become an important and rapidly features. In proposed system pre-processing
developing biometrics technology over the last includes low pass filtering, segmentation,
decade. location of invariant points, and alignment and
extraction of ROI.
Bhattacharyya et al. [13] proposed three different
2. Literature Review algorithms for processing Palm Vein Pattern
Many approaches have been proposed for palm Image of an individual. These three different
print matching in the recent years. processes are: Vascular Pattern Marker
An indexing technique that can employ two Algorithm (VPMA); Vascular Pattern Extractor
biometric matcher was proposed by A. Algorithm (VPEA); and Vascular Pattern
Gyaourova and A. Ross [5]. Thinning Algorithm (VPTA).
A method for palm print matching that deals with Verification system which utilizes these hand
skin distortion, discrimination power and geometry features for user authentication was
computational complications was given by Jifeng proposed by Jobin J [14].
Dai et. al. [6]. They used the method of cascade Mohit Soni et. al. presents a technique which
filtering in matching process. The matching extracts the forking from the skeleton image by
algorithms proposed in this paper deals with examining the local neighborhood of each ridge
noise and distortion efficiently. pixel using a 3X3 window. It can be seen from
Palm print matching using high resolution the preprocessing image that an ROI contains
images and uses multiple features for matching. some thinned lines/ridges. These ridges
[7]. Here multiple features such as density, representing vein patterns can be used to extract
orientation, minutiae, and principle lines were features [15].
taken to significantly improve the matching Sunita Aeri et. al. proposed a new approach for
performance. biometric authentication system using infrared
Palm print verification based on robust line thermal hand vein patterns. The proposed work
orientation code was proposed by Jiaa, Huanga presents a Euclidean distance based vein’s
and Zhang [8]. Modified finite Radon transform pattern based biometric authentication that can be
has been used for feature extraction, which used for matching the biometric identity of
extracts orientation feature. For matching of test person under scanner [16].
www.gtia.co.in 36
International Journal of Information Technology & Systems, Vol. 4; No. 1: ISSN: 2277-9825 (Jan-June 2015)
www.gtia.co.in 37
International Journal of Information Technology & Systems, Vol. 4; No. 1: ISSN: 2277-9825 (Jan-June 2015)
3.3 Feature Extraction • Write “1” where the center pixel's value
After segmentation stage, it is necessary to is greater than the neighbor's value.
extract the features of the Palm before matching. Otherwise, “0” is to be written which
Various algorithms have been used in literature gives an 8-digit binary number.
for Feature extraction such as Gabor filter, SIFT,
• Histogram is computed, over the cell, of
PCA. I have used Linear Binary Pattern (LBP)
the frequency of each "number"
which is the latest method and gives us the better
occurring ((i.e., each combination of
results and accuracy. It is a simple and fast for
which pixels are smaller and which are
implementation.
greater than the center).
The feature extraction module will output the
• Normalize the histogram optionally.
biometric template, which will be used in the
matching stage. The feature extraction technique • Now, Histogram of all cells are
used in the developed system is the Linear concatenated which gives the feature
Binary pattern (LBP) which is the latest method vector for the window.
and gives us the better results and accuracy.LBP The feature vector can now be processed using
is texture based approach. the Support vector machine (SVM) or confusion
A useful extension to the original operator is the matrix to classify images.
so-called uniform patterns, which can be used to Given a central pixel in the image, a pattern code
reduce the length of the feature vector and is computed by comparing it with its neighbors
implement a simple rotation invariant descriptor. [18] as given in equation 1 below:
This idea is motivated by the fact that some LBPP,R =∑ − 2
----(1)
binary patterns occur more commonly in texture
1, ≥ 0
images than others. A local binary pattern is S(x) =
called uniform if the binary pattern contains at 0, < 0
most two 0-1 or 1-0 transitions. For example, Where gc is the gray value of the central pixel, gp
00010000(2 transitions) is a uniform pattern, is the value of its neighbors, P is the total number
01010100(6 transitions) is not. In the of involved neighbors and R is the radius of the
computation of the LBP histogram, the histogram neighborhood.
has a separate bin for every uniform pattern, and
all non-uniform patterns are assigned to a single 3.4 Classification and Matching
bin. Using uniform patterns, the length of the Support Vector Machine (SVM) is mostly used
feature vector for a 3x3 window reduces from for splitting clustered data into two classes. We
256 to 59. It is shown in Fig. 2. have two sets training set and testing set which is
The LBP feature vector, in its simplest form, is used for matching. An SVM classifies data by
created as discussed below: finding the best hyper plane that separates all
data points of one class from those of the other
class. The best hyper plane for an SVM means
www.gtia.co.in 38
International Journal of Information Technology & Systems, Vol. 4; No. 1: ISSN: 2277-9825 (Jan-June 2015)
the one with the largest margin between the two preprocessed using median filter and
classes. Margin means the maximal width of the segmentation. Fig. 4 shows the filtered and
slab parallel to the hyper plane that has no segmented images hence completing
interior data points. Fig. 3 below shows the preprocessing stage.
hyper plane.
www.gtia.co.in 39
International Journal of Information Technology & Systems, Vol. 4; No. 1: ISSN: 2277-9825 (Jan-June 2015)
correct detected and incorrect detected diagonal values are correct detected and
images. whichever comes under other than diagonal are
The following Fig. 6 and 7 shows the incorrect.
matching stage. The very last two diagonal elements(yellow
color and green color) shows the overall
recognition rate, and the value left side of
that(green color) shows that 2 are correctly
recognized and one is false detected.
We can calculate overall recognition rate as
follows.
Firstly add total number of test samples (all
values in matrix diagonally and off-diagonally),
secondly add correctly recognized values
(diagonal elements) and then add off-diagonal
elements (false detected).
Fig. 6. Matching showing correct detection Recognition rate=correctly recognized/total
number * 100
It gives the overall recognition rate which is
97.5%. Table 1 shows the average percentage of
positive recognition using SVM
5. Conclusion
Biometrics is being used all over the globe and is
undergoing constant development. The Palm
Print has proved to be a reliable biometric.
Several existing methods have been reviewed for
palm print recognition.
Here in this Paper I proposed a hybrid LBP
method for extracting features which reduces the
complexity of the system thereby increasing
efficiency and is fast to compute. The input is
Fig. 8. Confusion Matrix full Palm Print and the output shows the
recognition performance and confusion matrix.
The confusion matrix actually tells about the Using SVM, I have classified images and match
target and the actual result got. For example, on x with database. Hence it shows increase in
axes we have targeted and on y axes we have performance.
actual then if the samples which come under
www.gtia.co.in 40
International Journal of Information Technology & Systems, Vol. 4; No. 1: ISSN: 2277-9825 (Jan-June 2015)
www.gtia.co.in 41
Dear Researchers,
This is to inform you that Call for Paper is open for 2015 in
It is our honor to invite you to submit your research paper for the same.
Name of Journal: INTERNATIONAL JOURNAL OF PHYSICAL, CHEMICAL AND MATHEMATICAL SCIENCES (IJPCMS)
Issue: Vol. 4, Issue 2. July-Dec., 2015
ISSN: 2278–683X
Global Impact Factor: 0.236
Period of Processing: 15 to 20 days
Details are given on our website: www.gtia.co.in
Email: editorijpcms@gmail.com
Name of Journal: INTERNATIONAL JOURNAL OF PHARMACY, BIOLOGY AND MEDICAL SCIENCES (IJPBMS)
Issue: Vol. 4, Issue 2. July-Dec., 2015
ISSN: 2319 – 3026
Global Impact Factor: 0.352
Period of Processing: 15 to 20 days
Details are given on our website: www.gtia.co.in
Email: edditorijpbms@gmail.com
All the above journals are printed copy, open access, peer reviewed international journals with a primary
objective to provide the academic community and industry for the submission of original research and
applications. Submitted papers should not have been previously published nor be currently under
consideration for publication elsewhere. All papers are refereed through a double blind process.
A prompt response will reflect your interest to research world. Contact us for any queries.
Published By
Global Technocrats and Intellectual’s Association