• We are available for your help 24/7
  • Email: info@isindexing.com, submission@isindexing.com


International Journal of Linguistics and Computational Applications (IJLCA)

Journal Papers (4) Details Call for Paper Manuscript submission Publication Ethics Contact Authors' Guide Line
1 Detection of Hidden Information With Bit Plane Analysis, Dr.P.Sujatha
Steganalysis is the new research area that is appeared before the late 1990s. It is a technique that is used for detecting the presence of hidden information in some cover media. Normally steganalysis is a challenging task when the pattern of the hidden information is unknown to the steganalysts. To deal with this, bit plane analysis is proposed in this paper. Bit planes of cover and stego images are analyzed by computing the difference of corresponding 8 bit planes so that one can clearly see hidden information with varying densities. Black regions of the image represent the value that is similar for both the images and the white regions represent hidden secret message.
2 Live System Forensics for Internet Videos, Ajay Gadicha #1, Dr. M.V.Sarode *2
The increasing transmission of illegal videos over the Internet imposes the needs to develop large-scale digital video forensics systems for prosecuting and deterring digital crimes in the Internet. In this paper, we propose, design, and implement a novel large-scale Digital Forensics Service Platform (DFSP) that can effectively detect illegal content from Internet videos. More specifically, we propose a distributed architecture by taking advantage of Content Delivery Network (CDN) to improve scalability, which can process enormous number of Internet videos in real time. We propose CDN-based Resource-Aware Scheduling (CRAS) algorithm, which schedules the tasks efficiently in the DFSP according to resource parameters, such as delay and computation load. We deploy the DFSP system in the Internet, which integrates the CDN-based distributed architecture and CRAS algorithm with a large-scale video detection algorithm, and evaluate the deployed system. Our evaluation results demonstrate the effectiveness of the platform.
3 Skilled Agent Application as Software Detectives, Anupam
In today's environment each persons and computer are connected with network, a new entity has evolved: skilled agent software. Over the past few decade agents have emerged as a new software paradigm; they are in part distributed systems, autonomous programs and artificial life. The concept of agents is an outgrowth of years of research in the fields of AI and robotics. They represent concepts of reasoning, knowledge representation, and autonomous learning. Agents are automated programs and provide tools for integration across multiple applications and database running across open and closed networks. They are a means of retrieving, filtering, managing, monitoring, analysing and disseminating information over the Internet, intranets and other proprietary networks. Agents represent a new generation of computing systems and are one of the more recent developments in the field of AI. Agents are specific applications with predefined goals, which can run autonomously; for example, an Internet-based agent can retrieve documents based on user defined criteria. They can also monitor an environment and issue alerts or go into action based on how they are programmed. In the course of investigative data mining projects, for example agents can serve the function of software detectives, monitoring, shadowing, recognizing and retrieving information for analysis and case development or real time alerts. Agents can be used by investigators and analysts to work on their behalf; for example FinCEN, the U.S. Treasury agency set up to detect money laundering, must review all cash transactions involving dollar amounts of above $ 10000. This amount is roughly 10 million transactions a year, which cannot be manually monitored. The FinCEN Artificial Intelligence System users, an agent to weed through this large data space and search for abnormalities and fraud through the use of neural network and link analysis.
4 Comparative Survey of UNIX, Linux, Windows7 Operating System , Nilam K. Nakod
Here I has given the Comparative Survey of Unix, Linux and Windows 7 Operating System. First in brief I has given their history. Then compared their Design principles and then compared the Security provided by Unix, Linux and Windows 7 O.S. Finally i illustrate the comparison between Unix and Linux and then between Unix/Linux and Windows 7. By these Comparative Review Linux is found to be most secure O.S. and Open Source since it is available freely. Thus becoming the more Popular than Unix.