NaSCoIT-2013(International Conference on ICT for Glocalization)
It is a great honor for me as a chairman to welcome you for the Seventh National Students Conference on Information Technology (NaSCoIT-2013). We are encouraged to continue the conference due to the success achieved from the past conferences. The main objective of these types of conferences is to encourage the IT students to write research papers.
In the recent years, information technology has been widely discussed subject of interest among all students and professionals. Particularly, the international market is interested in the information technology professional and has high job demands. This time the conference is expanded to the International level focusing on the recent development in ICT for Glocalization. I hope that such type of conference will enable the participants to understand more about the recent trends, prospects and directions in the field of Information Technology like the previous conferences.
I appreciate the initiation taken by Nepal College of Information Technology for providing this type of forum for the IT students and researchers. At last, I would like to express my sincere appreciation to the organizing committee for their dedicated efforts to materialize the conference. I hope that all participants will have a fruitful and beneficial conference this time too.
Shashidhar Ram Joshi, Ph.D.,
Departmant of Electronics and Computer Engineering
Institute of Engineering (IOE)
Real Time Digital Night Vision Using Nonlinear Contrast Enhancement
University of Nevada, Las Vegas
This paper describes a nonlinear contrast enhancement technique to implement night vision in digital video. It is based on the global histogram equalization algorithm. The effectiveness of global histogram equalization is examined for images taken in low illumination environments in terms of Peak signal to noise ratio (PSNR) and visual inspection of images. Our analysis establishes the existence of an optimum intensity for which histogram equalization yields the best results in terms of output image quality in the context of night vision. Based on this observation, an incremental approach to histogram equalization is developed which gives better results than the conventional approach in terms of PSNR. This algorithm is also applied to implementing video surveillance in poorly illuminated environments to achieve real time night vision. This involves the application of histogram equalization to digital video frames with data transmission and buffering over a computer network.
Index terms — Contrast enhancement, Histogram equalization, Peak signal to noise ratio (PSNR), Video transmission, Buffering, Flow control.
VAN: An integrated automation framework for Industrial Communication
Lappeenranta University of Technology
The importance of automation and integration with Information Technology for process industries has been drastically increased in recent years. Automation improves safety, plant availability, and efficient utilization of available resources within the industrial domain. The factory floor network and automation science have a different requirement than IT world. In an industrial automation system there are lots of challenges of data communication, synchronization with office automation and monitoring of operating processes in geographically distributed heterogeneous networks.
Two decades ago, field bus system was introduced for factory floor and industrial automation installation. Later Ethernet based technology became more popular and successfully installed in an office automation followed by use of Internet based applications. Today information technology became more powerful in office automation where factory floor, automation science and practice have different requirements than IT-world requirements, which mainly concerned with safety, real-time, wireless and public networks integration aspects. To make IT applicable in all fields of production industries, these technologies have to adopt or even modified. In Industrial automation systems, there is a challenge of data communication between heterogeneous communication networks. To integrate and communicate between workshop and office environment, wireless communication has been introduced whose standardization and investigation are still continuing. To integrate the automation and the back office networks, heterogeneous network, consists of local and wide area networks, which includes wired as well as wireless communication systems.
Keywords: Automation, integration, industrial communication.
Cooperative Cognitive Radio using MIMO
University of Greenwich
Cognitive radio has been proposed as an ideal solution to optimise spectrum usage. In this scheme secondary uses(unlicensed users) are given access to the licensed bands by using the spectrum holes i.e the parts of licensed spectrum currently not being used by the primary users. Further, in recent times, a new scheme called cooperative sensing has been incorporated in cognitive radio network. In this paradigm, licensed users are permitted to use some secondary users to relay the spectrum tra_c and in exchange some secondary users are given access to the primary spectrum band. But all cooperative cognitive radio networks operate in time or temporal domain, which implies that licensed users need to give out some _xed portion of channel access time to the secondary users, thus consequently limiting the performance of both the licensed and the unlicensed users. In order to overcome this drawback, Multiple Input Multiple Output( MIMO) technique could be incorporated, which will allow unlicensed users to simultaneously relay the trafic information for the licensed users and access the channel to transmit their own data streams. This paper intends to provide theoretical analysis of transmission rate of both types of users under MIMO and also compare the utility of transmission rates under MIMO with that of conventional cooperative scheme.
Incorporation of Cryptography Mechanism in a Smartphone File Sharing System Design
Department of Computer Science, Jawaharlal Nehru Technological University
Kakinada, Andra Pradesh, India
Modern day technology has become very advanced. Internet has become accessible to almost every corner of the world. Electronic Mail, commonly known as “email”, has become the primary mode of communication all over the world. Email serves as an integral part of our everyday life. Be it work, or to be in touch with distant family members, it has become the cheapest means of communication because of its nearly zero cost in terms of money. Among all other sharing medium, electronic sharing includes email as a primary medium. Besides that, smartphones have also become very easily accessible and widely used. Due to its ease of usage, and seamless connectivity options, it has become the top choice of every individual or organization. Sharing files on-the-go is the most desirable feature for smartphone users, but they fail to incorporate desired security level for the files. The least one can do before sharing a file electronically is to encrypt it in some form so that even if it gets into unauthorized hands, our content is unreadable and safe. The aim of this project is to develop a smartphone application that is able to encrypt any file to be shared using attachments using an email or any other way through the smartphone application and also decrypt it at the receiver s end, both with the user provided password.
Dynamic Utilization of Sensed Spectrums with Co-operation for Performance Enhancement of Wireless Communication
Kamal Chapagain* and Nanda B. Adhikari
Department of Electronics and Computer Engineering,
Institute of Engineering, Pulchowk Campus,
Tribhuvan University, Nepal
Modern wireless applications demand the higher data rates and that led to the problem of scarcity of spectrum. According to Federal Communication Committee 70% of statically allocated spectrums are underutilized. Field surveying during this research work also supports the FCC data because just 16.83% of spectrum is used where apart from FM radio and GSM band, other licence band are almost void. In such a scenario dynamic spectrum allocation got the higher priority and new concept based on cognitive radio technology emerged. Cognitive radio technology is an innovation software defined radio design that is proposed to increase the spectrum utilization by exploiting unused spectrum dynamically chaning environment. This paper envisions the current scenario of spectrum utilization and proposed a model for the secondary user which is not only an opportunistic user but also a co-operative user of primary user and assist for the transmission of data packet of primary user according to MG1 queuing theory. Secondary user uses the channel to transmit its own packet if and only if, the packet of primary data is empty. The hypothesis of sharing resource increase the performance is became true by assuming the 8GB primary s data on queue and on sharing of 50% of this data by the secondary transmitter as co-operative user, performance is increased by 12% to 40.35% as normalized traffic load increased from 0.02 to 0.96.
Keywords: White Space, Software Defined Radio, Cognitive Radio, Dynamic Spectrum Allocation, MG1 queue.
Automated Detection of Text-Based CAPTCHA Using ANN with Back propagation
Dhan B. ThapaMagar
A CAPTCHA is a program that protects websites against bots by generating and grading tests that humans can pass but current computer programs cannot. The main purpose of detecting the CAPTCHA is to suggest its weaknesses, which in turn helps to develop more secure CAPTCHA. In our scheme, we detected text-based CAPTCHAs that first preprocessed the given CAPTCHA, segmented its characters, and then recognized the characters using Artificial Neural Network with back propagation learning algorithm. The detection rate is found to be significant for automated attack.
Keywords: CAPTCHA, Internet Bots, Image Segmentation, Image Recognition, Artificial Neural Network.
User Optimization of Field Based Routing traffic for Intelligent Trnsportation Systems to control traffic and route guiding road users (UOFBR-ITS)
Shiva Raj Pokharel Ram Chandra Pandey
M.E. Computer Engineering, NCIT M.E. Knowledge Engineering, IOE
To nullify traffic congestion, intelligent transportation systems have proposed various route guidance strategies. Series of strategies with a systematic survey, in the past decade for bidirectional asymmetric traffic have also been presented. In order to assess the Field Based Routing (FBR) [1, 2] traffic, this research carried out eight strategic prevalent in asymmetric network traffic to behave differently for alternative routes. The results show that only the velocity feedback strategy is able to match the average travel time, i.e. the best user optimization, while others fail because they cannot establish the relationship between the parameters and travel time feedback. This
research paper demonstrates all these strategies, and suggests mean velocity feedback strategy for achieving user optimality.
Keywords—Nagel-Schrekenberg model, Asymmetric traffic system, Route guidance strategy, Intelligent Transportation System.
ICT for Management and Monitoring of SMART Energy for Sustainable Empowerment
AnandShrestha SachinMalego UjjwalKhanal
St. Xavier s College (Mentor: Vishnu K. Rana)
Information Communication Technology (ICT) has great potential in changing the way the contemporary enterprises functions, still venture on ICT altogether is kind of a taboo. Implementation of ICT in SMART energy can bring a optimistic change in the overall development and strategy making cycle. It is a complete package to make accusation, charge on the imperative technical and economic factors of a nation.
According to World Bank report “Power and People” it evidently states the need of a management and monitoring system in an enterprise to identify the overall progress and plan effectively for future. This paper proposes for such a system in accordance with AEPC (Alternative Energy Promotion Centre) a major enterprise working for endorsement of renewable energy in Nepal. The paper proposes for online data management and easy access of information via the available networking medium. With the assist of such applications it will not only be easy for planning and policy making but also to generate awareness by imparting facts about the use of SMART energy and its benefits.
Information and Communication Technology in Education: Practices, Plans and Possibilities in Nepalese Context
Er. Shankar NathAdhikari
BE, MSc (E-Business), MPhil (MIS)
PhD Scholar, Kathmandu University
Advent of modernization changes the life of people and makes it more complex. The rapid growth in Information and Communication Technologies (ICT) has brought remarkable changes on the life style of people. ICT is becoming increasingly important in our daily lives and in our educational system. Educational system plays a vital role to cope the changes of modern society. Realizing the effect of ICT on the workplace and everyday life, today s educational institutions try to restructure their educational curricula and classroom facilities, in order to bridge the existing technology gap in teaching and learning. It is a time to move beyond the walls of our classrooms to learn from the real case situation from society to revitalize education.
People from modern society have limited time to attain higher degree education on formal way. They demand the use of virtual classroom, online education and distance education system to continue their degree. Students from school and colleges need interactive classrooms with the real learning situation.
This paper focuses on the use of technology in education that will greatly contribute to meet student needs for learning from anywhere in anytime. The creative use of ICT in education makes the people s life easy and advance.In Nepalese context, we are talking about the ICT education but still we have not entered into the ICT in education. This paper discusses current practices, plans and possibilities of ICT integration in Nepalese educational system.
Trends in Banking Industry of Nepal through ICT: Traditional to Transactional Banking
Chief IT Officer, IT Department
ICFC Finance Limited
ICT has always served as a backbone infrastructure in many service providing institutions among which banking industry is one. In context of Nepal, landscape ranging from high himalayas to low land terrai with poor physical infrastructure, ICT serves as the only means to reach wide customer. Among many, banking industry is the only sector in the country where ICT innovations have been used extensively. Banking is much secure, more productive, wide reach to customer from office to home and quite innovative due to use of ICT. ICT has revolutionized the banking service and the way of doing banking in the country by increasing both in terms of productivity and quality. The concept of traditional banking has been gradually shifting to transactional banking with wide customer reach by various means of ICT. Timely modifications in IT policies and efficient regular monitoring mechanism by the authorized body have made banking much morereliable. This paper emphasis not only the development trends observed in banking industry of the country but also the problems, complications and difficulties due to social, economical and technical factors in implementing ICT enabled solutions
An Adaptive Multicast Routing Protocol Based on Mobility Index to Optimize the Quality of Service of MANET
Er. NirajRai Prof. DR. Shashidhar Ram Joshi
Master of Computer Engineering Department of Computer and Electronic
Nepal College of Information Technology Engineering, IOE, Tribhuvan University Kathmandu, Nepal
Pokhara University, Kathmandu, Nepal Email: email@example.com
Due to the dynamic nature of the network topology and restricted resources in Mobile Ad-hoc Network (MANET), the stable routing based on Quality of Service (QoS) is a challenging task. The unpredictable mobility of nodes, variation of received signal strength and limited battery power in nodes of MANET creates the link, node vulnerability and instability. Most of the current ad-hoc multicast routing protocols for group communication are based on link availability, received signal strength and link cost. In this thesis, illustration of an adaptive multicast routing protocol based on mobility index to optimize QoS of MANET (AMMOM) is proposed. First of all stable multicastroutes are identified on the basis of signal strengths between the nodes and battery life of each node. After that if there are multiple paths from source to every multicast destination, the best route is identified having maximum value of Mobility Index (MI). MI is dependent upon three factors; link persistence, differential signal strength Ds and distance between the nodes Lm+1. The results obtained from the simulations demonstrate that the proposed AMMOM protocol overcomes On-Demand Multicast Routing Protocol (ODMRP) with respect to packet delivery ratio and control overhead.
Keywords: MANET, QoS, Multicast Routing, Signal Strength, Mobility Index, Link Availability, Link Persistence..
Comparative Study on Payload based Network Anomaly Detection Algorithms Using Histogram Similarity
MadhavKarki Kumar Pudashine
The rapid growth of computer networks has changed the prospect of network security. An easy accessibility
condition causes computer networks to be vulnerable against numerous and potentially devastating threats from hackers. Researchers and developers have proposed two types of intrusion detection techniques: Header based and Payload based. Among these two techniques, Payload based anomaly detection has been taken as a great interest by many researchers. In order to have a better understanding and use of the strength and weakness of different Payload based Anomaly Detection approaches, this preliminary comparative study will explore the behaviors of four Algorithms used for Payload based Anomaly detection using histogram similarity: Mahalanobis Distance, Manhattan Distance, Euclidian Distance , and Correlation. The goal will be to observe and investigate the Precision and Recall of different algorithm for Histogram Similarity methods and finally compute the FMeasure and to suggest the best Algorithm among them.
Keywords: Payload based Anomaly Detection, Histogram Similarity, IDS, Header based Anomaly Detection.
A Modified CBR Tool for Software Effort Estimation Using K-means Clustering Algorithm
Sanjay Prasad Kushwaha
National Institute of Technology,
Most of the software estimates are performed at the beginning of the software project life cycle since it helps project managers to allocate resources, control costs, schedule and improve current practices to finish the project on time and within budget. Effort estimation is used to predict how much man-hour is needed to develop a project. Estimating the effort with a high grade of reliability is a challenging task, since the project manager has to deal with it from the beginning of the project. Estimation by analogy (case based reasoning) is mainly a machine learning data-driven method. It compares the project under consideration with similar historical projects through their common attributes. In the case-based reasoning systems, the efficiency and quality of case retrieval is an important factor to evaluate systems. Case base needs to store many cases to meet the user s needs for knowledge. However, with the growth of the case in case base, the efficiency of case retrieval will be gradually reduced. In order to improve the retrieval of cases, we propose a modified CBR technique that applies k-means clustering algorithm to cluster the case base. The implementation results show that our scheme finds most similar project in reduced time and minimum number of comparisons. Thus the proposed tool proved to be faster and better accuracy than CBR-C.
Keywords- software cost estimation; case base reasoning; k-means clustering; retrieval algorithms; CBR tools.
Impact of Bit Plane Slicing with JPEG Compression on BMP Image
1Anil Kumar Yadav, M.E.C.E -10902
2Professor Dr. Shashidhar Ram Joshi
1Nepal College of Information Technology, Balkumari, Lalitpur, Kathmandu
2Institute of Engineering, Pulchowk, Lalitpur, Kathmandu
The storage space in computer field is precious. It is necessary and time demand to use each single bit for fruitful act. So, saving space is most important act in this arena. As we know images use more space compare to text. Day by day uses of space is growing up. The growth of space occupancy led to a need for compression, i.e. the ability to reduce the amount of storage, which in turn reduces bandwidth required for the transmission. In this research the main focus was on image compression of the BMP format. The JPEG compression algorithm was used to compress the “.BMP” image and same compression algorithm was applied after the compression algorithm “bit plane slicing”. It was compared among the JPEG compression after bit plane slicing and JPEG compression only. Their comparative compression percentage was considered. Here compression ratio was main decision making parameter. Here 500 images of different category had been considered.
Keywords— Bit Plane Slicing, JPEG, Compression, Space Occupancy, Bandwidth.
Singular Value Decomposition (SVD) Based Image Watermarking using Interpolation
Barun Kumar Dhakal SarojShakya
Nepal College of Information Technology Associate Professor
Balkumari, Lalitpur, EPC 1525, GPO Box 8975, Kathmandu, Nepal
With the vast growth of internet technology, digital content protection has become very important. Various algorithms have been/being developed for preserving proprietary rights. Digital watermarking technique is the good measure for preserving such rights. In this thesis, SVD based digital image watermarking using interpolation method was done where the watermark was added in the singular values of a digital image using interpolation method. The resultant watermarked image was treated with different distortion operation. Finally the watermark was extracted for each method and each recovered watermark was compared with the original watermark using normalized correlation and accuracy rate. The better method was prescribed based on comparison results. The selected method can be easily implemented in real world application for the purpose of copy right protection, authentication, integrity etc
Keywords: Digital Watermarking, Copy right protection, Singular value decomposition (SVD)
Scalability of efficient and dynamic workload distribution inautonomic cloud computing
Prof. Shashidhar Ram Joshi Sushil Kumar Sah
Department of Electronics and Computer Engineering Nepal College of Information Technology
Institute of Engineering, Pulchowk Campus Balkumari, Lalitpur, Nepal
The expectations of human desire on the technology are unlimited, so we need much more scalable system that manage themselves and fulfills our desire automatically. The current state of cloud computing infrastructure is not fully industrialized. To provide good quality of service (QOS) through cloud, the autonomic cloud computing, offers self management properties of Autonomic Computing. With this technique, we scale up workload distribution dynamically and efficiently for cloud environment. With traditional system, centralized approach exists which are inefficient to scale up and proper workload distribution can be complex which required extra cost for large operation. In this paper, we integrate autonomic computing principals for automatic workload distribution through distributed decision in cloud. We will demonstrate the entire scenario based on cloud computing where individual resource allocated to the users (consumers) processes.
Index Terms—Autonomic Computing, Resource, Management, Cloud Computing.
Role of ICT In Agriculture and its Impact on Nepal
B.E(Information technology) B.E(Electronics & communication) B.E(Electronics & communication)
4th semester 6th semester 6th semester
9807071781 9841970074 9849335954
Agriculture is an important sector with the majority of the rural population in developing countries. The benefits of ICTs for increased agricultural productivity and strengthening the Agricultural sector include timely and updated information. Information and communication technologies play an important role in addressing challenges and uplifting the livelihoods of the rural poor. The main aspect of this paper is to present about the role of information and communication technology in Nepalese agriculture. This paper talks about the present situation of agriculture in Nepal. How can ict make a difference in the method of farming and the technology being used worldwide for different agriculture purposes? The changes and advantages it can bring and the challenges that arise while implementing ICT technology and its proposed solutions.
Issues In Distributed Real Time Replication database System
Amit k. Shrivastava
Dept. of Computer Science and Engineering
Nepal College of Information Technology, Lalitpur
An issue in a distributed real time database system environment time after time involves caching or duplication. In many cases, a distributed device has access not only to data that is stored locally, and much of that data arrives via replication from other devices, Server, and other services. Certain manageable devices with limited resources, weak or discontinuous connectivity, and security vulnerabilities, data replication serves to increase availability, reduce communication costs, forward sharing, and improve survivability of critical information. Such systems generally provide weak consistency models in which read and update operations can be performed at any replica without coordination with other devices. Distributed real time computing is a new emerging computing paradigm of the future. Issues in this model pose many challenging problems to the database area. In this paper we identify these new challenges and plan to investigate their technical consequence
Keywords: Database, Distributed Real Time database, replicated database, transaction.
Cyber Warfare: Potential Role of Nepal
Tej Prasad Dhamala
Masters in computer Engineering(MECE)
Nepal College of Information Technology(NCIT)
This paper propose some outlines about the cyber warfare in the scenario of Nepal. The basic main beliefs of warfare are well mentioned, but are not always applicable to cyber-warfare in particular environment that may be offensive or defensive. One can take active steps to hide in the cyber world, but everything one does is visible; the question is whether someone is looking. The entities of cyber-warfare are distinct dual-use. Both the defender and the attacker control a very small part of the cyberspace they use. Whoever can control a part of cyberspace that the opponent uses can control the opponent. Physical distance from the target is almost irrelevant. Nepal is one of the developing country. It is also the country that is growing rapidly in the field of information and communication technology in short time duration. Nepal is also a probable country for the cyber space due to its physical location itself. This paper proposed the basic guidelines about the strategy of the Nepal in cyberspace.
Keywords- Cyber-warfare, cyberspace, ICT
Analogy-based software cost estimation: A review
Sanjay Prasad Kushwaha
National Institute of Technology,
Most of the software estimates should be performed at the beginning of the Software Project Life Cycle since it helps project managers allocate resources, control costs, and schedule and improve current practices to finish the project on time and within budget. Effort estimation is used t o predict how many hours of work and how many workers are needed to develop a project. Estimating the effort with a high grade of reliability is a problem which has not yet been solved and even the project manager has to deal with it since the beginning. Estimation by analogy is mainly a machine learning data-driven method. It compares the project under consideration with similar historical projects through their common attributes. The aim of this survey is t o analyze the use of Analogy based systems in the existing models and to provide in depth review of software and project estimation techniques existing in industry and literature, its strengths and weaknesses.
Keywords-case base reasoning; analogy effort estimation; retrieval algorithms.
A Revolutionary approaches of Game Development in Android
Advanced College of Engineering and Management
As we all know that the world is in transition to mobile computing from desktop Pc and laptops. The mobile phones around us are the combination of hardware and the software. Android is a Linux-based Operating System designed especially for smart phones and tablet computers developed by Google and the Open Handset Alliance. It is a software bunch comprising not only operating system but also middleware and key applications. Android comes with an Android market which is an online software store. It allows Android users to select, and download applications developed by third party developers and use them. Android is available as open source for developers to develop applications which can be further used for selling in android market. It allows developers to write managed code in a Java-like language that utilizes Google-developed Java libraries, but doesn t support programs developed in native code. Applications written in C and other languages can be compiled to ARM native code and run, but Google doesn t officially support this development path.
Google threw open the entire source code (including network and telephony stacks) that were not available previously, under an Apache license. Certain parts that relate to a specific hardware can t be made open and are not considered part of the Android platform. With Apache License, vendors are free to add proprietary extensions without submitting those back to the open source community. While Google s contributions to this platform are expected to remain open-sourced, the branches could explode using varieties of licenses.
Keywords: Android OS,Game development, SQLite
Under-Representation of Female In ICTs, It s Break-Down and Transformation to ICTs Career
Nepal College of Information Technology,
ICTs, the most important essence of 21st century, are one of the fastest growing sectors of development; resulting the strongest foundation of economy in the world. In today s context, the use of information technology has reached such a pinnacle that without it none of the sectors is complete. So, at least basic knowledge of information technology is a must to get used to respective areas of interest. Booming of ICT reveals the scope of career in information technology. Numerous number of IT educated man powers is needed to fulfill the demand; however, only small numbers of female (represents all age group of female) are engaged in IT careers comparatively with male and in context of Nepal the ratio is very small. We have less numbers of female computer engineers, IT specialists, programmers, developers and so forth. This bitter fact has to be paid attention in root level if we think the best sector of career development for female is ICT. The main study of this paper is on the reason behind less involvement in IT career; break-down of the barriers and ways to encourage them to get involved in IT career.
Keywords: ICT, female, IT profession, factors, overcoming barrier, ICT club, counseling, encouragement.
Nepal Engineering College, Changunarayan ,Bhaktapur
This concept paper presents a study on assistive technology that helps visually impaired people in their mobility in a more confident and independent manner. The study hypothesizes that an assistive technology device, cane “Smart Chhadi” could assist visually-impaired people while walking by alerting and notifying him about the nearby obstacle, pit and ground-water with a distinct vibration. The study also hypothesizes that it could notify him/her about direction, location and temperature via voice. In case of any accident or difficulty to visually impaired person, it could send notification to his/her guardians along with location information. The development work involves mathematical calculations, software and hardware simulation and modeling, testing and verification. Few assumptions have been made during the development. The testing and verification involves, obstacle detection and ranging testing by software simulations and hardware tests, direction and SMS testing by hardware and software tests on android phone and location testing by comparing the GPS data with either Google Map vector data or Open Street Map vector data.
A data streaming algorithm for signature generation and clustering of log messages
PhD Research consultant
Chief application architect
A Log file consists of several independent lines of text data and contains information about the events from one or different services which may come from one or modes nodes on the network. Mining patterns from these log messages are valuable for real-time analysis of network behavior and then detecting fault, anomaly and security threats. A sequential data analysis approach will not be sufficient for ubiquitous logs rather a data-streaming algorithm with efficient pattern finding approach is necessary. Thus, in this paper the authors purpose a novel approach for finding patterns in log data sets where a locally sensitive signature is generated for similar log messages. The similarity of the log messages is identified by parsing the log messages with non alphanumeric characters and logically analyzing signature bit stream associated with them. The clustering of log messages from different servers are done with the purposed algorithm and the validation of result is done by checking the word order matched percentage and comparing the results with a log clustering tool.
Keywords: Data mining, Nearest neighbor searches, Log clustering, Local sensitive hashing, Sketching.
Information Retrieval and the Semantic Web DataManagement
Nepal College of Information Technology
MCIS 3rd Semester
The Semantic Web aims to build a common framework that allows data to be shared and reused across applications, enterprises, and community boundaries. It proposes to use RDF as a flexible data model and use ontology to represent data semantics. Currently, relational models and XML tree models are widely used to represent structured and semi-structured data. But they offer limited means to capture the semantics of data. Information retrieval technology has been central to the success of the Web. For semantic web documents or annotations to have an impact, they will have to be compatible with Web based indexing and retrieval technology. Web based indexing and search systems such as Google and Yahoo have profoundly changed the way we access information. Expressing and accessing relational data as RDF resources through a mapping between database and ontology is highly valuable. Three key issues to implement semantic web technologies enabled data Management and integration. The first is on the semantic web data representation, such as RDFS and OWL specifications. The second is on the ontology mapping which defines correspondences among different ontologies. The third issue is on the mapping between ontology and underlying data sources (such as relational databases and XML stores).
In this paper, it is intended to present a framework for integrating search and inference in this setting that supports both retrieval-driven and inference-driven processing, uses both text and markup as indexing terms, exploits today s text-based Web search engines, and tightly binds retrieval to inference. The Semantic Web is also likely to contain documents whose content is entirely encoded in an RDF based markup language such as OWL.
Security in Wireless Communication System
BikashRijal and SantoshShrestha
Nepal College of Information Technology
Security in wireless Communication System is a critical issue for both users and service providers of such systems. The explosive growth in wireless networks over the last few years resembles the rapid growth of Internet within the last decades. With the continuous advance develop in technology, coupled with worth/presentation advantages; wireless accessibility is being deployed increasingly in office, home and public environments.Wireless communication is convenient, and for the most part, available almost anywhere. Common types of wireless communication are Bluetooth, WI-Fi, and Wi -Max.Emerging wireless networks share many common characteristics with traditional wire-line networks such as public switch telephone/data networks, and hence many security issues with the wire-line networks also apply to the wireless environment.
This paper discusses the security threats and risks associated with wireless networks, and outline a number of best practices for deploying wireless networks in corporate and home environments. Finally, a set of security tips is provided for end-users surfing the Internet using public wireless networks.
Keywords: Semantic Web; Information Retrieval; Semantic search; Ontology; Knowledge representation; RDF; OWL; SPARQL;
Security Issues in Cloud Computing
Shameer Kumar Pradhan
Bachelor of Engineering in Information Technology (BEIT)
Nepal College of Information Technology
Cell phone: 9849564737
Since the development of a computing system, a computer has been used for different processes ranging from household activities to business ones, from research to industrial tasks. After development of microcomputers in the 1970s and widespread availability of such since 1980s, the world of computing has changed dramatically. A computer used to be a machine used by big corporations and laboratories, but now, it is a device used by millions of people in their homes and workplace for millions of different tasks. The form factor of a computer has also changed significantly, from a giant box to a small mobile device that can fit into the palm. The era of graphical user interface in the 90s and Internet in the 2000s framed the computing industry. Local standalone machine has primarily been both the host and the client of software and data for most of the applications. Internet used to be just the source of information. However, the way computers are being used is changing at a fast pace. Communication and information sharing are done at the rate of as when an event happens. The future of computing is presumed to be “in the cloud”. In cloud computing, both the software and the data is hosted and stored in some offshore location in some service provider s servers. Many benefits can be incurred by the adoption and use of cloud computing. With global sharing of data and information, many benefits can also be gained locally. Cloud computing is not limited to borders and its extension can reach literally, to anywhere in the world with Internet connection. However, there lie doubts of complete adoption due to data privacy issues among people. There lies many security loopholes in cloud computing. Many types of attacks such as denial of service attack, man-in-the-middle attack, and so on can occur in a cloud system. Yet, there are not full-proof security solutions to the threats. However there are different techniques to lessen the impact of such threats and attacks. There lie emotional effects of cloud computing as well in people. So, use of a hybrid model is preferred unless ultimate security can be maintained in cloud computing.
SNORT for the secured network
Nepal College of Information Technology (NCIT)
Nepal College of Information Technology (NCIT)
We are standing in front of the 21stcentury which is the age of computer and information technology. Using internet and web based application is very common and equally important to use the secured network. To maintain the security of the network it is wise to use snort. It is to keep in mind that security is a process, not a product. Security requires ongoing vigilance, attention to detail, and understanding of current trends and exploits. This paper covers how and why we use snort for the purpose of network security, snort rules, snort architecture, and BASE (Basic Area Security Engine).
Utilization of Cloud Computing in Institution
Department of Graduate Studies
M.E. Computer Program, 2006
Cloud computing is a type of computing that relies on sharing computing resources rather than having local servers or personal devices to handle applications. It is used as a metaphor for "the Internet," so the phrase cloud computing means "a type of Internet-based computing," where different services -- such as servers, storage and applications -- are delivered to an organization s computers and devices through the Internet. Cloud computing is comparable to grid computing, a type of computing where unused processing cycles of all computers in a network are harnesses to solve problems too intensive for any stand-alone machine. The goal of cloud computing is to apply traditional supercomputing, or high-performance computing power, normally used by military and research facilities, to perform tens of trillions of computations per second, in consumer-oriented applications such as financial portfolios, to deliver personalized information, to provide data storage or to power large, immersive computer games. Cloud computing has started to obtain mass appeal in corporate data centers as it enables the data center to operate like the Internet through the process of enabling computing resources to be accessed and shared as virtual resources in a secure and scalable manner. The benefits of cloud computing is currently driving adoption. In these sectors there are often a lack of time and financial resources to purchase, deploy and maintain an infrastructure such as the software, server and storage.
In this paper we will discuss on today s high school graduates live in the cloud-computing era. It s typical for a high school student to use multiple web-communication tools, such as social networks. Students music, news and videos are delivered via the cloud. They use e-mail and text using software that monitors their preferences and adapts to their usage patterns. In short, students are at home in the cloud. Most students are using cloud-based educational tools even before they begin their college search. Some high schools offer electronic transcripts, and many private schools use cloud-based applications for admission and financial aid. Colleges and universities looking to recruit the best and the brightest have rapidly become aware of this trend, and with good reason.
Keywords: cloud, grid computing, server, web communication, social network, electronic transcripts
Pyro: Python API for Integrated Robotics Environment Development
ManojGautam Amar Subedi
Nepal College of Information Technology Nepal College of Information Technology
Pyro, a python API which stands for Python Robotics, is a Python-based robotics programming environment that enables researcher, student and hobbyist to explore the topics in the field or robotics. It is a library in python that enables you to build applications in which objects can talk to each other over the network, with minimal programming cost of learning to use robot.This paper present the features and use s of pyro in the field of robotics environment.
ICT for Agriculture in Nepal
HridayaKandel BinayaBhattari AnishShrestha
BScCSIT BIM BScCSIT
St. Xavier s College St. Xavier s College St. Xavier s College
+977-9840051763 +977-9818239154 +977-9849636757 firstname.lastname@example.org email@example.com firstname.lastname@example.org
Co-author/s: Vishanu Kumar Rana; HOD, Computer science and information Technology, St. Xavier s College; +977-9840069916; email@example.com;
The major part of Nepal is comprises of rural areas, which is underdeveloped. The farmers who are the engine of producing the food for the urban areas do not get enough facilities as compared to urban people. This paper presents the importance of agriculture in Nepal and the importance of bridging the two major groups of population, Urban and Rural population of our country for development of agriculture. It is important to think about the 70% of farmer who plays an important role in economic development of our country. The paper explains about the major problems that exist in agriculture sector.
The paper explains ICT as a problem-solving tool in agriculture sector. Information in agriculture is important and the paper explains how small information can help the farmer to increase their production and livelihood. During past, several countries have been using ICT in vital services like health, education, good governance and creation of employment opportunities, ICT in agriculture was ignored the most. Realizing that ICT have great potential in enhancing every sector, countries around the globe have taken ICT initiatives in Agriculture. Such initiatives have been proven to solve the various problems of the farmers and enhance the agriculture productivity hence contributing in poverty reduction.
Machine-Aided Back-of-the-Book Indexing
Hem Sharma Acharya
Gandaki College of Engineering
“Machine-aided Back-of-the-book Indexing” is a tool which aids in the preparation of the index contained at the back of the book. The main idea behind developing this system is to save the time and money involved in the process of publishing a book by automating some of the manual tasks. This system takes the document file as input, process it in order to extract the words along with information such as term frequency, document frequency and corpus frequency. Custom data structures were created to facilitate the process of optimized organization of the information gathered. These words are fed to the matrix processor for weight evaluation and words filtering using information retrieval techniques such as: term frequency- inverse document frequency and singular value decomposition. The output of the system will be a structured list of the keywords giving the information about their location through their respective page numbers. The system was evaluated in comparison with existing indexing tools and the results supported our approach.
Optical Fiber Communication in the Present Nepalese Scenario
NipeshPrasai Pratik Ghimire
Sagarmatha Engineering College Sagarmatha Engineering College
Sanepa, Lalitpur Sanepa, Lalitpur
Ph: +977- 9843527280 Ph: +977-9843527280
Communication has been an integral part of our daily life. The communication system involves information generation, transmission, reception and interpretation. As there has been increase in demand for the voice, video, image and data communications the need for the large transmission capacity has also increased. To meet the large transmission capacity the rapid development in the light wave technology has introduced optical or light wave communication. Optical communication uses light waves as the carrier for the transmission of data and has been replacing the copper wire from the telecommunication infrastructure over the last decade largely due to the technological innovations in the field, which has been able, to deliver higher and higher bandwidth over the longer distances reducing the cost per bit transmitted. The optical fiber communication involves transmitter, channel and receiver. The transmitters are the light sources, the receivers are the light detectors and channels are the optical fibers. The channel i.e. optical fibers play an important role as it carries the data from transmitter to the receiver. This report introduces optical communication and its status on present communication system.
Role of ICT in football in context of Nepal
2nd Sem, NCIT
2nd Sem, NCIT
2nd Sem, NCIT
2nd Sem, NCIT 2nd Sem: NCIT
firstname.lastname@example.org email@example.com VishwadeepGhimire
2nd Sem, NCIT
Information Communication Technology has now become globalized all around the world. Development of ICT has now lead the world in such way that world now has totally inclined towards this sector. Dependency of ICT has increased so much that even in sports, ICT has been integrated. Now, the technology is trying to overcome the defect of management in sports field.
This article will address the topic of ICT for sports management in efficient ways and will attempt to provide an overview of how ICT can change the nature of practices in the field of Nepalese sports for proper management.
Keywords: ICT, Globalized, Technology, Management, Sports, Goal line
Real Time Simulated Robotic Arm ForTelerobotics
Department of Electrical and
Nepal College of Information Technology
Sudan Krishna Balami
Nepal College of Information Technology
Advancement in the field of electronics and communication is ongoing in rapid manner. Such advancement forces the human beings to have better facilities with efficient and effective outputs. This paper presents the method of use of "Real Time simulated Robotic Arm” with the help of which we can replicate the causal human arm motions. The paper describes the design prototype of human arm as the robotic arm. The robotic arm uses the wearable sensors to take the human arm motions as input. Inputs are then processed in processing section and provided to output driver so as to drive the robotic arm. Robotic arm just replicates and moves just as the human arm does. The main goal of our project is to show how the prototype robotic arm can replicate the causal human arm motion with the use of wearable sensors.
Artificial intelligence in driveless car
Bachelors in computer engineering
Nepal College of Information Technology
+977 980 865 8050
This paper has been designed to give a comprehensive idea of the Driverless Car (AI-car). Robotic car is referred as a car with artifact intelligence and that runs on Auto Pilot and gives immense luxury to humans. The objective of this project is to design and understand the system of driverless cars like “Google cars”. Although, number of attempts has been made to make an intelligent cars, including RADAR technology, Cameras, LIDAR, CELLULAR, GPS and DSRC and a number of problems have been solved using these concepts but each of this theory covers only some aspects that have been able to be implemented. Still there is a large gap between artificial intelligence driver and human driver. The paper gives an idea of an artifact which is supposed to match the intelligence and behavior of a human being that I have researched during the last few months. This paper also discusses some natural practical experience of Google cars and how they can be confirmed by the revised definition of driverless cars. Based on the sensors inputs a driving algorithm residing on a micro-controller takes decisions to navigate the system. The paper does not claim that existing technology of driverless cars having some faults but augments the existing definition by some other features that can make it more close to human driver.
Host Based Intrusion Detection System
Mohan Khanal Deepak Gautam Ashok Adhikari AbinashKoirala
+977-9841739217 +977-9841047764 +977-9856036407 +977-9841047157
firstname.lastname@example.org@gmail.com email@example.com firstname.lastname@example.org
Bachelor in Computer Engineering, Institute Of Engineering, Pulchowk, Campus, TU .
The last few years have seen a dramatic increase in the number of attempts of invasion on our computer systems. While antiviruses provide protection against malicious programs, they become useless against newly created ones and have to be updated each time a new one is found. This is where the power of intrusion detection systems (IDS) get realized. IDS have the capability of detecting the abnormal characteristics even of new programs, which are the possible sources of intrusion attempts. The purpose of IDS is to help computer systems prepare for and deal with attacks, known or unknown. IDS collect information from a variety of sources within computer systems and networks. This information is then used to create a behavioral model to represent normal characteristics of the system. In order to model the behavior of the system various techniques are used among which Neural Networks, Support Vector Machine, Markov Models, Clustering are popular. When any program runs in our system its behavior is the set of system calls that it makes during its execution. We can model the normal behavior of programs using the systems calls made by them.System calls have frequency and transitional property, which we have used to model the behavior of the programs. In our research, we have developed an Anomaly Based Intrusion Detection System. We have modeled our system to capture the frequency and transitional behavior of the programs. In order to capture the frequency property, we have used Self Organizing Maps and in order to capture the transitional behavior, we have used Markov Model. Any set of behavior, exhibited by a program that needs to be tested for anomaly, is then passed through the model. The model will then determine whether the program is anomalous or not. Based on this result we can conclude that the program may be the possible source of intrusion. The system developed is both trained and tested using the datasets provided by DARPA (Defense Advanced Research Projects Agency).
Keywords: Host Based Intrusion Detection System, Anomaly Based Intrusion Detection System, Self-Organizing Maps, Markov Model.
Security challenges in cloud computing
SwarupRajbhandari and SudinShrestha
BEIT 4th Semester
Nepal College of Information Technology
Cloud computing is a booming sector of computer technology. It s a concept of creating a virtual computing world, and making it accessible to user as much as possible. There are many forms of cloud computing distinguished mainly as public and private on the basis of security measures provided. One of the main advantage of cloud computing can be the cost effectiveness in buying the hardware. But with great possibility, comes great hindrance. Cloud computing, is totally like an internet thing. And however strong may the security be, there always is the chance of leakage and hacking. That means, we can never be assured that we or our data in the cloud is totally safe. We are going to discuss about the different security modules, effective national policy to handle the security issue and individual security measure that can be implemented. The other cons related to cloud computing are like data loss due to different factors is discussed here in this paper. Explanation related to cloud computing by different global companies are also discussed and observed here.
Our paper is going to discuss about the Cloud Computing, its advantages and disadvantages, specially the security issues that are to be handled
POSSIBILITY OF KOTHAMALE AND POUPATEMPO IN NEPAL: An approach to successful e-Governance
MaheshworShrestha Er.RajanKarmacharya Vishnu Kumar Rana, Mentor
+977 9803636384 +977 9851168465 +977 9840069916
email@example.com firstname.lastname@example.org email@example.com
Abstract— E-governance initiatives seems to be very common in many of the countries as they intend to provide a more citizen-centric government and reduce operating cost. But it is unfortunate that many of these initiatives have not been able to attain the benefits claimed. Habituating people to work on an automated environment is one important challenge of eGovernance, especially in country like Nepal where citizen s readiness is actually a bottleneck. Most developed countries had experienced an initial failure in their projects of e-Government. So, intermediary projects are suggested in this paper. The projects are once highly successful, cheap and fast and ad-hoc model of e-Governance. This paper aims to sightsee the essential initiatives by the government, the challenges encountered and some of the mitigating measures
List of Participating Colleges/Institutes
ACEM Advance College of Engineering and management.
nec Nepal Engineering College
NCIT Nepal College of Information Technology
IOE Institute of Engineering
WRC Western Region Campus
NTC Nepal Telecom
SXC St. Xavier s College
KU Kathmandu University
JNTU Jawaharlal Nehru Technical University
GCE Gandaki College of Engineering
ICFC ICFC Finance
SEC Sagarmatha Engineering College
UN University of Nevada, Las Vegas (USA)
NaSCoIT Program Committee
C/O: Nepal College of Information Technology,
Balkumari, Lalitpur, Nepal
Tel: +977-1-5006354, 5006270
Email: firstname.lastname@example.org ,email@example.com
URL: www.nascoit.org ,www.ncit.edu.np
All Right Reserved
The views and opinions expresses in the proceeding papers are those of the respective authors of the paper appearing in the conference proceeding, and in no case, can be attributed neither to the NaSCoIT Program committee nor to the Nepal College of Information Technology.
NaSCoIT Program Committee,
Balkumari, Lalitpur, Nepal
Tel: +977-1-5006354, 5006270
Email: firstname.lastname@example.org ,email@example.com
URL: www.nascoit.org , www.ncit.edu.np
- See more at: http://www.ncit.edu.np/index.php?page=content&id=207#sthash.QGeF86eQ.dpuf