International Journal of Innovative Technology and Exploring Engineering(TM)
Exploring Innovation| ISSN:2278-3075(Online)| Reg. No.:65021/BPL/CE/12| Published by BEIESP| Impact Factor:4.66
Author Guidelines
Publication Fee
Privacy Policy
Associated Journals
Frequently Asked Questions
Contact Us
Volume-5 Issue 6: Published on November 10, 2015
Volume-5 Issue 6: Published on November 10, 2015

 Download Abstract Book

S. No

Volume-5 Issue-6, November 2015, ISSN:  2278-3075 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.



Elda Maria Joy, Noorjahan V.A

Paper Title:

CORE: A Context-Aware Relation Extraction Method for Web Search Query

Abstract: Identify relation completion (RC) as one recurring problem that is central to the success of novel big data applications. Given a semantic relation R, RC attempts at linking entity pairs between two entity lists under the relation R. To accomplish the RC goals, propose to formulate search queries for each query entity α based on some auxiliary information, so that to detect its target entity β from the set of retrieved documents. Relatoion Extraction(CoRE) method that uses Relterms learned surrounding the expression of a relation as the auxiliary information in formulating queries. Graph based method is proposed to find similarity   of related terms.

  Relation Extraction, Relation Completion, Relation Expansion Terms

1.   E. Agichtein and L. Gravano. Snowball: Extracting relations from large plain-text collections. In ACMDL, pages 85–94, 2000.
2.   Zhixu Li, Mohamed A. Sharaf, Laurianne Sitbon, Xiaoyong Du and Xiaofang Zhou . Core:A context aware relation extraction method for relation, IEEE.2013

3.   S. Zhao and R. Grishman. Extracting relations with integrated information using kernel methods. In ACL, pages419–426, 2005.

4.   O. Etzioni, M. Banko, S. Soderland, and D. Weld. Open information extraction from the web. Communications of the ACM, 51(12):68– 74, 2008.

5.   R. Wang and W. Cohen. Iterative set expansion of named entities using the web. In ICDM, pages 1091–1096, 2008.

6.    Y. Shinyama and S. Sekine. Preemptive information extraction using unrestricted relation discovery. In ACL, pages 304–311, 2006

7.    M. Mintz, S. Bills, R. Snow, and D. Jurafsky. Distant supervision for relation extraction without labeled data. In ACL & AFNLP, pages 1003–1011, 2009.

8.    J. Finkel, T. Grenager, and C. Manning. Incorporating non-local information into information extraction systems by gibbs sampling. InACL, pages 363–370, 2005.




Adiba Siddiqui, Tazeem Ahmad Khan, M. Shuaeb

Paper Title:

Optimized WiMAX Network Model on The Basis of Traffic Load

Abstract:  With the development of wireless network, new technology, and growing needs of human being on the network services, it is essential for the network engineer that they will look forward to provide that Quality of Service (QoS) which is unbreakable, and suitable for future perspective. To provide the best QoS from any network required, the best optimized algorithm, strategies and decision parameter.  The current study reviewed the best algorithm present for Wi-MAX network optimization and tries to find the parameter which is basically required to develop a wireless network which will provide QoS.

Wi-MAX, Wireless Network, QoS, Traffic Load, power consumption


1.        So-In, C., Jain, R., &Tamimi, A. K. (2009). Scheduling in IEEE 802.16 e mobile WiMAX networks: key issues and a survey. Selected Areas in Communications, IEEE Journal on, 27(2), 156-171.
2.        Rong, B., Qian, Y., & Chen, “ Adaptive power allocation and call admission control in multiservice WiMAX access networks”,  Wireless Communications, IEEE, 14(1), 2007,  14-19.

3.        Xiao, X., Tao, X., & Lu, J. (2011, September). A QoS-aware power optimization scheme in OFDMA systems with integrated device-to-device (D2D) communications. In Vehicular Technology Conference (VTC Fall), 2011 IEEE(pp. 1-5). IEEE.

4.        Jin, J., & Li, B. (2010, March). Cooperative resource management in cognitive WiMAX with femto cells. In INFOCOM, 2010 Proceedings IEEE (pp. 1-9). IEEE.

5.        Wang, J., Venkatachalam, M., & Fang, “System architecture and cross-layer optimization of video broadcast over WiMAX”, Selected Areas in Communication 2010

6.        Kim, I., Kim, J., Moon, J., & Kim, “Optimized envelope shaping for hybrid EER transmitter of mobile WiMAX—Optimized ET operation” . Microwave and Wireless Communication, 2009

7.        Vereecken, W., Van Heddeghem, W., Deruyck, M., Puype, B., Lannoo, B., Joseph, W., ...&Demeester,“Power consumption in telecommunication networks: overview and reduction strategies.Communications”  Magazine, IEEE, 49(6), 2011,  62-69.

8.        Ghannouchi, F. M., Ebrahimi, M. M., &Helaoui, “ Inverse class F power amplifier for WiMAX applications with 74% efficiency at 2.45 GHz”,  In Communications Workshops, 2009. ICC Workshops 2009. IEEE International Conference on (pp. 1-5). IEEE.




Pradeep Kulshrestha, K.K.Misra, Dharmendra Goswami, Chandrakant Nakum, J J Bhatt

Paper Title:

Export Potential for Indian Denim Industry

Abstract:   Mostly Air jet looms are being used in the industry for production of high quality denim fabrics. Indian companies are producing denim fabric in millions of metres per annum while the export potential still remains weak. The main reasons for poor exports are quality of fabric not compatible with world class manufacturing with cost effective weaving, subjective decisions in four point fabric inspection system, urgency of delivery due to low production and retention of skilled manpower in a particular industry. Based on Market requirement only implementation and follow up of world class norms will improve the export of denim.

looms, industry, production, fabrics, export, skilled, delivery


1.     World Class Manufacturing by Kamalakar Mutalik (Symbiosis – 2011)
2.     Indian Textile Industry in 2015 – A Vision by Cygnus Business Consulting & Research, Hyderabad

3.     Demand – Supply Gap in Trained Manpower by Nayan C. Parikh

4.     Trend Analysis of India & China’s Textiles (Federation of Indian Chambers of Commerce & Industry)

5.     "Working Lives India: Denim king".  BBC News. Retrieved 20 May 2015.

6.     "RIL eyes Arvind Mills' manufacturing facilities". The Economic Times. 27 Oct 2007



9. products/Denim_Jeans.html




M. H. Jali, Z.H. Bohari, T.A. Izzuddin, H. Sarkawi, M.F. Sulaima, A. Ibrahim

Paper Title:

Numeric Model Analysis of a Large Scale Solar PV Generations

Abstract:    This paper presents a numeric model analysis of a large scale solar photovoltaic (PV) generations projects taking advantage of the Feed-in Tariff (FiT) policies by government. It proposed an optimal plan for low risk and high return investment of one of the most rapidly growth renewable energy technology. In order to achieved that target, several selection criteria has been described such as strategic location, long life time materials, high durability and reliability, less maintenance and affordable raw material price. The objective of this study is to propose an optimal investment plan using structured numeric model analysis based on the case study at the Kuala Lumpur International Airport (KLIA), Malaysia. The PV generation project investment achievement is measured using several parameters such as cash flow, Return of Investment (ROI), payback period, Net Present Value (NPV), Internal Rate of Return (IRR) and cost break-even analysis. Based on the analysis, it can be convinced that solar PV generation FiT project is desired to undertake where it provides good long-term investment.

Photovoltaic (PV), Feed-in tariff (FiT), renewable energy, numeric model analysis, investment.


1.     Muneer, W. ; Bhattacharya, K. ; Canizares, C.A. ,"Large-Scale Solar PV Investment Models, Tools, and Analysis: The Ontario Case",IEEETransactions on Power Systems , Vol. 26 , Issue: 4 2011 , Pp. 2547 - 2555, 2011.
2.     Radhika Perrot &AselDoranova, "The Dynamics of Renewable Energy Transforming in Developing Countries",Technological Systems of Innovation in Renewable Energy Technology of Developing Countries, Retrieved from /support/tiki-download_file.php?fileId=1959&display.

3.     M.H.Jali, H.Sarkawi, T.A.Izzuddin, M.F.Sulaima, M.N.M.Nasir,“Solar PV Project Implementation Feasibility Study based on Feed-in Tariff in Malaysia“, International Journal of Applied Engineering Research, Vol.  9 (21), pp  9629 - 9638, 2014.

4.     Ir.AhmadHadriHaris, "Renewable Energy Bill and SEDA Bill", retried from

5. GPEKS Clean Energy Developments and Services, "Feasibility Analysis for 520kW Solar Photovoltaic Project at Consejo Belize", Retrieved from




Yongseok Choi, Cheol-Hoon Lee

Paper Title:

PCI Express Optical Repeater for Server I/O Expansion

Abstract: We suggested a new PCI Express Optical Repeater Device which can locate I/O Devices externally for I/O expansion, not locate all I/O Devices in Server that has limit in Volume and Power in this paper. This Device doesn't convert PCI Express signal to Optical Signal directly, but in PCI Express Switch Architecture, uses the layered architecture to make Switch's internal bus or interconnection the optical interface. Thus there is no disadvantage of wasting bandwidth. This solves signal attenuation and over-power dissipation for the sake of Optical Interface Characteristics and can meet distances requirement for Server Environment. We expect that the methods and research results in this paper can be used in Small Server which will want I/O Expansion

PCI Express, Optical Repeater, Server, I/O, Interconnection

1.     PCISIG, "PCI Express External Cabling Specification Revision 1.0", pp53-134, 2007

3.     Avago, "A Demonstration of PCI Express Generation 3 over a Fiber Optical Link", 2012

4.     PCISIG, "PCI Express Base Specification Revision 2.1", pp43, 2009




Palak Thadeshwar, Rohan Vora, Aishwarya Ramachandran, Lakshmi Kurup

Paper Title:

Proposed Model for Sandboxing in Linux

Abstract:  The proliferation and popularity of the Internet has led to average Internet users downloading various utilities and applications from the Internet very frequently. Often, these applications are downloaded from untrusted users and websites, or from unverified third parties and suppliers. Due to this, it has become very important for a casual user to differentiate between a malicious and a benign application. This has become excessively difficult because of the rise in number of malicious applications on the Internet. In computer Security, Sandboxing is a mechanism that allows unknown or untrusted code into the system, and yet does not let it damage the system. A sandbox isolates the running program from the rest of the system by imposing restrictions on network resources and file system access, and keeps the host system safe. A sandbox system heavily restricts the program from inspecting the host or reading from the input device. In this paper, we review existing tools that provide sandboxing mechanisms. We compare what features have been used by each, and highlight the advantages and disadvantages of each. In the end, we propose a system that will incorporate the best features of these tools, yet be user-friendly.

Computer Security, Sandboxing, Seccomp-bpf, System call interposition.

1.     Taesoo Kim and Nickolai Zeldovich. Practical and effective sandboxing for non-root users. In Proceedings of the 2013 USENIX Conference on Annual Technical Conference, USENIX ATC’13, pages 139–144, Berkeley, CA, USA, 2013. USENIX Association.
2.     Graphical Security Sandbox For Linux Systems Topaktas, Cosay Gurkay (2014) Graphical Security Sandbox For Linux Systems. Masters thesis, National University of Ireland Maynooth.

3.     Anurag Acharya and Mandar CoolRaje. MAPbox: Using parameterized behavior classes to confine untrusted applications. In Proceedings of the 9th Conference on USENIX Security Symposium—Volume 9, SSYM’00, Berkeley, CA, USA, 2000. USENIX Association.

4.     David A. Wagner. Janus: An approach for confinement of untrusted applications. Technical report, University of California at Berkeley, Berkeley, CA, USA, 1999

5.     Garfinkel, Pfaff, and Rosenblum. Ostia: A delegating architecture for secure system call interposition. In Proceedings of Network and Distributed Systems Security Symposium, NDSS 04, San Diego, CA, 2004.
6. A Policy-driven, Host-Based Intrusion Detection System, ISOC Symposium on Network and Distributed System Security, San Diego, CA, USA, February 2002. ISOC




Sahil Modak, Suril Shah, Sagar Vikmani, Lakshmi Kurup

Paper Title:

Voice Driven Dynamic Generation of Webpages

Abstract: Designing dynamic webpages is a hectic task for experts and a complicated job for new users. Techniques imparting natural language processing provide a simple interface to the new users to handle the cumbrous applications. The proposed system incorporates natural language processing as a mean for human computer interaction to automate webpages generation. User will interact with our proposed system by communicating his requirements in natural spoken language. The proposed system will hence help the users to not worry about the coding aspect as the desired webpages will be automatically generated by first fetching the user input in the form of speech, understanding the natural language speech of the user, extracting the necessary data and then correspondingly generating the required webpage. This automated system can thus save a lot of time of practically any user to design webpages.

Human Computer Interaction, Natural Language Processing, Automatic code generation, Webpage generation, Text understanding, Voice driven systems.


1.        Imran S. Bajwa, M. Asif Naeem, Riaz-Ul-Amin, M A. Choudhary, Speech Language Processing Interface for Object-Oriented Application Design using a Rulebased Framework, 4th International Conference on Computer Applications 2006 Rangoon, Myanmar
2.        Malaisé Véronique, Zweigenbaum Pierre, Bachimont Bruno, Mining Defining Contexts to Help Structuring Differential Ontologies Terminology, 11:1, 2005

3.        A. R. Ahmad, O.Basir, K.Hassanein, “Fuzzy Inferencing in the Web Page Layout Design”, Proc. of the 1st Workshop on Web Services: Modeling, Architec. & Infrastructure, France, pp. 33-41, April 2003.

4.        J. Foley, W. Kim, S. Kovacevic, and K. Murray, “UIDE-An Intelligent User Interface Design Environment”, In J W Sullivan and S.W. Taylor (Eds.), Intelligent User Interface, ACM, NY, 1991

5.        A.R. Ahmad, O. Basir, K. Hassanein, “Efficient Placement Heuristics for Genetic Algorithm based Layout Optimization”, Working Paper, Systems Design Engineering, University of Waterloo, 2003m.

6.        Bajwa, Imran Sarwar, Waqar Aslam, and Syed Irfan Hyder. "Speech Language Engineering System for Automatic Generation of Web based User Forms."

7.        Chomsky, N. Aspects of the Theory of Syntax. MIT Press, 1965.

8.        Bobrow, D. G. and Fraser, J. B. An Augmented State Transition Network Analysis Procedure. Proc. Int. Jt. Conf. on Artificial Intelligence, Washington, D. C, 1969,
pp. 557-567.

9.        Woods, W. A. "Transition Networ k Grammar s for Natural Languag e Analysis." Comm. ACM 73, 10 (Oct. 1970), 591-606.

10.     Hayes, Philip J., and Jaime Guillermo Carbonell. "A tutorial on techniques and applications for natural language processing." (1983).W.-K. Chen, Linear Networks and Systems (Book style).       Belmont, CA: Wadsworth, 1993, pp. 123–135.




Abhinav Kharbanda, Meena Kumari

Paper Title:

Analysis and Detection of DMA Malware for Peripheral Devices

Abstract:  Malware or malicious code aimed at exploiting information systems are continously evolving at a pace at which it becomes exacting to counter them. As the complexity of information systems and encryption techniques increases exponentially, the malwares developed to exploit the loopholes in them also become difficult to detect and comprehend. In this research paper, various innovative approaches to develop malware that can bypass existing counter measures to snoop and modify information present in system’s primary memory or RAM, via Direct Memory Access (DMA), is analyzed. The exploits using DMA that easily dissemble from various end-user security mechanisms by executing their code on the processor and memory of the peripheral are described. The peripherals infected from DMA malware, if introduced in any one system, can spread across numerous inter-connected network systems in a data center, and hence have a devastating potential. The approach of exploiting systems using peripherals becomes pertinent because of the ability of a DMA malware to affect numerous users without being detected and the inadequacy of present counter-measures. The paper is concluded by describing major threats to information systems from malware installed on peripheral devices, executing stealthily and harnessing the advantage of a separate execution environment, perceptibly innocuous outlook, and DMA to host’s primary memory.

 DMA malware, Direct Memory Access (DMA), Graphics processing unit (GPU), Malware, NIC, Peripherals, Rootkit.

1.        Stewin, Patrick, and Iurii Bystrov. "Understanding DMA Malware." Detection of Intrusions and Malware, and Vulnerability Assessment Lecture Notes in Computer Science (2013): 21-41. Web. <              >.
2.        Kruegel, Christopher. "Behavioral and Structural Properties of Malicious Code." Pub. In Advances in Information Security Malware Detection (2007). Web. <>.

3.        U. Bayer, C. Kruegel, and E. Kirda. “TTAnalyze: A Tool for Analyzing Malware.” In 15th Annual Conference of the European Institute for Computer Antivirus Research (EICAR), 2006. Web. <>

4.        M. Christodorescu, S. Jha, S.A. Seshia, D. Song, and R.E. Bryant, “Semantics-aware malware detection,” Proc. of the IEEE Symposium on Security and Privacy, 2005, pp. 32-46.

Cohen, Fred "Computer Viruses - Theory and of experiment" (1984). Web.<>
6.        McGraw G, Greg Marrisett. “Attacking malicious code”. Submitted to IEEE Software and presented to Infosec Research Council. [Online](2000).Web.<>

7.        Skoudis, Ed, and Lenny Zeltser. ”Malware: Fighting Malicious Code.” Pub: Prentice Hall PTR, 2004. Web. <>.

John Aycock, Computer Viruses and Malware (Advances in Information Security), Advances in Information Security, vol 22 - Springer, 2006
9.        Vasudevan, A. and Yerraballi, R. “SPiKE: Engineering Malware Analysis Tools using Unobtrusive Binary-Instrumentation.” In Proc. Twenty-Ninth Australasian Computer Science Conference (ACSC 2006) pages 311–320.

10.     Tereshkin, A., and R. Wojtczuk. "Introducing Ring -3 Rootkits." Proc. Of Black Hat conf., USA, 2009. Web. <>.

11.     Ladakis, Evangelos, Lazaros Koromilas, Giorgos Vasiliadis, Michalis Polychronakis, and Sotiris Ioannidis. "You Can Type, but You Can't Hide: A Stealthy GPU-based Keylogger." Proc. of The 6th European Workshop on System Security. EuroSec, Prague, Czech Republic, Apr. 2013. Web. <>.

12.     Duflot, Loïc. "Can You Still Trust Your Network Card?" Proc. of CanSecWest conf.., Mar. 2010. Web.<>.

13.     Triulzi, Arrigo. "Project Maux Mk.II." Proc. of PACSEC conf., 2008. Web.<>.

14.     Triulzi, Arrigo. "Project Maux Mk.III." Proc. of Central Area Networking and Security (CANSEC) conf., 2010. Web. <>.

15.     Team Jellyfish, Project Jellyfish, (2015), GitHub repository, <>

16.     Kovacs, Eduard. "PoC Linux Rootkit Uses GPU to Evade Detection." Security Week. Online Security Magazine, 08 May 2015. Web.<>.
17.     Yanlin Li, Jonathan M. McCune, and Adrian Perrig. SBAP: Software-based Attestation for Peripherals. In Proceedings of the 3rd International Conference on Trust and Trustworthy Computing, TRUST’10, pages 16–29, Berlin, Heidelberg, 2010. Springer-Verlag.
18.     Li, Yanlin, Jonathan M. Mccune, and Adrian Perrig. VIPER: Verifying the Integrity of PERipherals’ Firmware. In Proceedings of the ACM Conference on Computer and Communications Security (CCS), October 2011: n. pag. Web. <>.




Josseena Jose, Hafsath C.A

Paper Title:

Enhancing Web Search by Mining Task Trails in Web Logs

Abstract: Web search logs record the users search queries and related actions in search engines. By mining these information it is possible to understand user search behaviors. A task can be defined as atomic user information need, whereas a task trail represents all user activities within that particular task, such as query reformulations, URL clicks. In most of the previous works, web search logs have been studied mainly at session, query or task level where users may submit several queries within one task and handle several tasks within one session. Instead of analyzing task within a session, cross session task can be analysed to determine the user search behaviour much more efficiently.

  Search log mining, task trail, cross-session search task


1.     R. White and J. Huang, “Assessing the scenic route: measuring the value of search trails in web logs,” in Proc. 33rd Int. ACM SIGIR Conf. Res. Develop. Inform. Retrieval, 2010, pp. 587–594.
2.     Y. Liu, B. Gao, T.-Y. Liu, Y. Zhang, Z. Ma, S. He, and H. Li, “Browserank: letting web users vote for page importance,” in Proc. 31st Annu. Int. ACM SIGIR Conf. Res. Develop. Inform. Retrieval, 2008, pp. 451–458.

3.     D. Beeferman and A. Berger, “Agglomerative clustering of a search engine query log,” in Proc. 6th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2000, pp. 407–416.

4.     J. C. K. Huang, L. F. Chien, and Y. J. Oyang, “Relevant term suggestion in interactive web search based on contextual information in query session logs,” J. Amer. Soc. Inform. Sci. Technol., vol. 54, pp. 638–649, 2003.

5.     R. Jones and K. L. Klinkner, “Beyond the session timeout: Automatic hierarchical segmentation of search topics in query logs,” in Proc. 17th ACM Conf. Inform. Knowl. Manage., 2008, pp. 699–708.
6.     C. Lucchese, S. Orlando, R. Perego, F. Silvestri, and G. Tolomei, “Identifying task-based sessions in search engine query logs,” in Proc. 4thACMInt. Conf. Web Search Data Mining, 2011, pp. 277–286.
7.     Z. Liao, Y. Song, L. -w. He, and Y. Huang, “Evaluating the effectiveness of search task trails,” in Proc. 21st Int. Conf. World Wide Web, 2012, pp. 489–498.

8.     Zhen Liao, Yang Song, Yalou Huang, Li-wei He, and Qi HeTask Trail: An effective segmentation of user search behavior” IEEE transactions on knowledge and data engineering, vol. 26, no. 12, December 2014