Impact Factor:6.549
Scopus Suggested Journal: |
International Journal
of Computer Engineering in Research Trends (IJCERT)
Scholarly, Peer-Reviewed, Open Access and Multidisciplinary
International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed,Open Access and Multidisciplinary
ISSN(Online):2349-7084 Submit Paper Check Paper Status Conference Proposal
Paper Title | : | An Effective algorithm for Spam Filtering and Cluster Formation |
Authors | : | Kavitha Guda, , , , |
Affiliations | : | Associate Professor, Department of Computer Science and Engineering. |
Abstract | : | K-means clustering algorithm is one of the most widely used partitioning algorithms used for grouping the elements over spatiotemporal data. It is the fast, simple and can work with large datasets. It has some of the pitfalls regarding Number of iterations are more due to clusters details not known at an initial stage. It can detect only spherical clusters. Here we will propose a Hybrid K-Means clustering algorithm which will mostly work on the concept of splitting dataset and reducing the number of iterations. It will inherit the some of the features from two revised K-means algorithms. The advantage of separating more massive datasets is that handle easy, and the benefit of reducing iterations leads the easy cluster formation in this way the efficiency of the traditional K-means clustering algorithm is increased. Furthermore, we also proposed Naïve Bayes Algorithm for Email Spam Filtering on SPAMBASE Dataset. |
![]() | : | 10.22362/ijcert/2016/v3/i12/4321 |
DOI Link | : | 10.22362/ijcert/2016/v3/i12/4321 |
[1] Marek Rychly, Pavlina Ticha, “A tool for clustering in data miningâ€, International Federation for Information Processing, 2007. [2]P.Verma, D.Kumar, “Association Rule Mining Algorithm’s Variant Analysisâ€, International Journal of Computer Application (IJCA), vol. 78, no. 14, September 2013, pp. 26–34. [3]L.Firte, C.Lemnaru, R.Potolea, “Spam Detection Filter using KNN Algorithm and Resamplingâ€, 6th International Conference on Intelligent Computer Communication and Processing- IEEE, 2010, pp.27-33. [4] G.Kaur, R.K.Gurm, “A Survey on Classification Techniques in Internet Environmentâ€, International Journal of Advance Research in Computer and Communication Engineering, vol. 5, no. 3, March 2016, pp. 589–593. [5] Rushdi, S. and Robet, M, “Classification spam emails using text and readability featuresâ€, IEEE 13th International Conference on Data Mining, 2013. [6] Androutsopoulos, I., Paliouras, G., and Michelakis, “E. Learning to filter unsolicited commercial e-mailâ€, Technical report NCSR Demokritos, 2011. [7]Na shi, “Research on k-means clustering algorithmâ€, 3rd international symposium on intelligent information technology and security informatics, 2011. [8] Shah Sourabh, Singh Manmohan, “comparison of a time efficient modified k-mean algorithm with k-mean and kmedoid algorithm†international conference on communication systems and network technologies, 2012. [9] Boomjia M.D, “Comparison of partitioning based clustering algorithmsâ€. [10] Han kwai, “Approximate distributed k-means clustering over a peer-to-peer networkâ€, IEEE transactions on knowledge and data engineering, 2009. [11]Tariq, M., B., Jameel A. Tariq, Q., Jan, R. Nisar, A. S., “Detecting Threat E-mails using Bayesian Approachâ€, IJSDIA International Journal of Secure Digital Information Age, Vol. 1. No. 2, December 2009. [12]ML & KD- Machine Learning & Knowledge Discovery Group. http://mlkd.csd.auth.gr/concept drift.html. [13] Rizky, W. M., Ristu, S., Afrizal, D. “The Effect of Best First and Spreadsubsample on Selection of a Feature Wrapper With Naïve Bayes Classifier for The Classification of the Ratio of Inpatientsâ€. Scientific Journal of Informatics, Vol. 3(2), p. 41-50, Nov. 2016. [14]Feng, W., Sun, J., Zhang, L., Cao, C. and Yang,Q., “A support vector machine based naive Bayes algorithm for spam filtering,†2016 IEEE 35th International Performance Computing and Communications Conference (IPCCC), Las Vegas, NV, 2016, pp. 1-8. [15] Lalchand G. Titare1, Prof. Riya Qureshi,†Cloud Centric loT Based Farmer’s Virtual Market place†International Journal of Computer Engineering In Research Trends., vol.3, no.12, pp. 654-658, 2016.
Paper Title | : | Cloud Centric loT Based Farmer’s Virtual Market place |
Authors | : | Lalchand G. Titare, Prof. Riya Qureshi, , , |
Affiliations | : | Department of Computer Science and Engg, BIT, Ballarpur, India |
Abstract | : | Cloud computing is aimed at providing IT as a service to the cloud users on-demand basis with greater flexibility, scalability, reliability and availability with utility computing model. This new ideal model of computing has a tremendous potential in it to be utilized as a part of the agriculture furthermore in rural improvement viewpoint in creating nations like India. The fragmented supply chain and inadequate health, safety and quality mechanisms (means the quantity and quality of fruits and vegetables) often do not meet the demands of high-end or international markets. Moreover, Indian farmers receive less than a fifth of the end price for the fruits and vegetables they produce, while a long line of middlemen, transporters, wholesalers and retailers get the rest. So, the aim behind developing this app is to give India’s huge farming community a fair and consistent price for their produce. Using this android based app “Cloud centric IoT based platform for Farmer’s virtual marketplaceâ€, this paper concentrates on how Cloud Computing idea improves virtualization of supply chains in agribusiness segment which will help some of the farmers to overcome this problem. Using these app farmers can directly connect with the end users and supply the product directly to them. Farmers can get most advance grade cultivating and virtualization of supply chains systems, additionally track and check the entire methodology from production, distribution to consumption |
![]() | : | 10.22362/ijcert/2016/v3/i12/xxxx |
DOI Link | : | Not yet assigned |
1) Reto Meier, “Professional android 4 application developmentâ€. John Wiley & Sons, Inc. 10475 Cross point Boulevard Indianapolis, 2012 2) K.B.Priya Iyer. Intelligent Path Finder for Goal Directed Queries in Spatial Networks. International Conference on Advances in Mobile Network, Communication and Its Application 2012 3) Kerry Taylor, Colin Griffith, David Lamb, Greg Falzon, and Mark Trotter, “Farming the Web of Thingsâ€, IEEE INTELLIGENT SYSTEMS Published by the IEEE Computer Society. 4) C.N. Verdouw, A.J.M. Beulens, J.G.A.J. van der Vorst, ‘’ Virtualisation of floricultural supply chains: A review from an Internet of Things perspectiveâ€, Computers and Electronics in Agriculture 99 ,Elsevier (2013) 160–175 5) Acharya, S.S. (2005), “Agriculture marketing and rural credit: Status, Issues and Reform agenda, Area, Production and Yield of Principal Crops in Indiaâ€, Directorate of Economics and Statistics, Ministry of Agriculture. 6) Global Positioning System Open Courseware from MIT, 2012 7) van der Lans, Rick F. (September 7, 2009). The SQL Guide to SQLite (!st ed.) 8) Newman, Chris (November 9, 2004), SQLite (Developer’s Library)(1st ed.). 9) G. Suciu et al., “Smart cities built on resilient cloud computing and secure Internet of Things,†in Proc. 19th Int. Conf. Control Syst. Comput. Sci. (CSCS), May 2013, pp. 513–518. 10) X. Yu, F. Sun, and X. Cheng, “Intelligent urban traffic management system based on cloud computing and Internet of Things,†in Proc. Int. Conf. Comput. Sci. Service Syst. (CSSS), Aug. 2012, pp. 2169–2172. 11) Mentzer, John T., William DeWitt, James S. Keebler, Soonhoong Min, Nancy W. Nix, Carlo D. Smith, & Zach G. Zacharia (2001): “Defining Supply Chain Managementâ€, Journal of Business Logistics, Vol. 22, No. 2, pp. 1–25. 12) C. Perera, P. Jayaraman, A. Zaslavsky, P. Christen, and D. Georgakopoulos, “Dynamic configuration of sensors using mobile sensor hub in Internet of Things paradigm,†in Proc. IEEE Int. Conf. Intell. Sensors, Sensor Netw. Inf. Process., Apr. 2013, pp. 473–478. 13) A. E. Al-Fagih, F. M. Al-Turjman, W. M. Alsalih, and H. S. Hassanein, “A priced public sensing framework for heterogeneous IoT architectures,†IEEE Trans. Emerging Topics Comput., vol. 1, no. 1, pp. 133–147, Jun. 2013.
Paper Title | : | Employee Rewards and Employee Work Motivation: An Indispensable Linkage |
Authors | : | Dr. H S. ABZAL BASHA, , , , |
Affiliations | : | Assistant Professor, Department of Management Studies, G. Pullaiah College of Engineering & Technology, Pasupala (V), Kurnool -518452, A.P. |
Abstract | : | “People work for money, But go an extra mile for recognition, praise and rewards†- Dale Carnegie Today Indian banking sector is being considered as one of the most glorious, innovative service industry that has witnessed constant growth over the past three decades. Indian banking industry has a vital role in promoting public lending and public savings, and is widely recognized as a significant factor for the economic development of the country. The Indian banking industry is expected to be among the top 10 global markets in terms of value by 2025, strengthen by increasing domestic demand. Now-a-days managing talent in the banking sector is the most crucial Human Resource challenge all over the world, and it becomes as the main agenda of top management in every aspect in the predictable future. Employees who are pleased with rewards are more motivated to contribute and can do more effectively. This also converts into better customer experience and in turn, leads to stronger financial performance by the firm and overall economic growth. The present paper aims to decisively study and understand the role of Employee Reward System in SBI and ICICI bank and its impact on Employee Motivation and Organizational Performance. |
![]() | : | 10.22362/ijcert/2016/v3/i12/xxxx |
DOI Link | : | Not yet assigned |
1. Broad, M., “Rewarding staff is simply good mannersâ€, Personnel Today, 26 October, 2001. 2. Edward E Lawler, “Treat people rightâ€. San Francisco: Jossey-Bass Inc., 2003. 3. Deeprose Donna, “How to recognise and reward employeesâ€. Broadway, New York: American Management Association, 1994. 4. Aniruddha Limaye and Ralsi Sharma; “Rewards and Recognition: Make a difference to the talent in your organizationâ€, 2013. 5. Maslow Abraham., “Motivation and Personalityâ€, Harper and Row Publications: New York, First Edition, 1954. 6. Report of the National Commission on Labour: Government of India Ministry of Labour and Employment and Rehabilitation, 1969. 7. Gurvinder Kaur;“A Thesis on Employee Empowerment and Organizational Effectiveness: A Comparative Study of Public, Private and Foreign banks in Some North Indian States, submitted to Thapar University, Punjab, November, 2013. 8. Chandra Mohan Patnaik& Ashok Kumar Sahoo; “Empowerment of award staff in regional rural banks through training system: an analysis†Asian Journal of Multidimensional Research Vol.2 Issue 1, January 2013, ISSN 2278-4853. 9. Zorah Abu Kassim et al., “Job Empowerment and Customer Orientation of Bank Employees in Kuching, Malaysiaâ€, Contemporary Mgt Research, 131-140, Vol. 8, 2012. 10. Quratul-AinManzoor; Impact of Employees Motivation on Organizational Effectiveness, ISSN 2157-60682012, Vol. 3, No-1. 11. PreetiS.Rawat; Effect of Psychological Empowerment on Commitment of Employees: An Empirical Study, IPEDR vol.17 (2011), IACSIT Press, Singapore. 12. Angwenyi Callen Nyanchama; Employee Empowerment Practices in Commercial Banks in Kenya, School Of Business, University Of Nairobi, 2009. 13. Peters Silvia Chigozirim and ElhamMazdarani; The impact of employee empowerment on service quality and customer satisfaction in service organizations-A Case study of Lansforsakringar Bank AB, 2008,Malardalen University, Vasteras. 14. David E Bowen and Edward Lawler; The Employment Approach to Service, Center for Effective Organizations, January, 1994. 15. GbalahamGbadmosi: “Employee Commitment An overviewâ€, Management Review, 1995, vol. 12. pp. 87- 93 16. Decotics and summers; “A Path Analysis of a Model of the Antecodents and Consequences of Organisational Commitmentâ€, Human Relations, 1987, pp. 445-470. 17. O.R Krishnaswami and M. Ranganatham: Methodology of Research in Social Sciences, 2005, ISBN 81-8318-454-5. ****
Paper Title | : | Intellectual Property Rights Issues and Challenges of Academic Libraries in Digital Environment |
Authors | : | Firdous Maqbool Mir, , , , |
Affiliations | : | Library Assistant, Govt Degree College, Baramulla, Jammu & Kashmir ,India ,193101 |
Abstract | : | Intellectual property (IP) has emerged as a key driver in knowledge economy. In the present scenario, IPR awareness is the key to technological innovations and in the emerging knowledge-based economy; the awareness among the creators of information and knowledge about IPR has become essential in the digital environment because in the digital environment it is becoming difficult to prove rights violation whenever they occur. This paper gives an overview of intellectual property rights (IPR) issues & challenges in digital environment and the paper deals with the copyright law as well as the role of librarians in the protection of copyright literature. Study also focused on patrons need towards understanding IPR laws in using library services without infringement. With the advancement of technology, Intellectual Property Rights have added new dimensions and there is a strong need for awareness and understanding on Intellectual Property Rights for library patrons. |
![]() | : | 10.22362/ijcert/2016/v3/i12/xxxx |
DOI Link | : | Not yet assigned |
1. Copyright Office. (2016). About Copyright Government of India. Retrieved November 17th,2016 from http://copyright.gov.in/Default.aspx 2. Dolli, Manoj. (2012). Intellectual property rights: Regulations and trends in India. International Journal of Engineering Research, 3(12), 15-27 Retrieved November 15th , 2016 from http://www.ijeronline.com/documents/volumes/Vol%203%20issue%202/ijer20120301MA(2).pdf 3. Malwad,N.M &Anjanappa,M.(1994). IPR in digital environment: Issues of concern to library community. Retrieved November 20th , 2016 from http://ir.inflibnet.ac.in/bitstream/1944/130/1/cali_37.pdf 4. Kannan, N. (2010). Importance of Intellectual property rights. International Journal of Intellectual Property Rights, 1(1), 1-5 Retrieved November 16th ,2016 from http://iaeme.com/MasterAdmin/UploadFolder/IJIPR%20%20Importance%20of%20Intellectual%20Property%20Rights.pdf 5. Kore, Sayali. C, Jadhav, Shital.T, Kadam, Amruta. S & Chavan, S. ushila. D. (2015). Introduction to Intellectual Property Right. Asian Journal of Pharmacy and Technology,5(4), 222-230.Retrieved November 16th,2016 from http://www.asianpharmaonline.org/pdf.php?j=2231-5713&vol=5&issue=4&ab=ab176 6. Sinha, Abhijeet & Bhardwaj, R.K. (2010). Digital Libraries and Intellectual Property Rights. International Conference on Digital Libraries. Retrieved November 15th , 2016 from https://rajkbhardwaj.files.wordpress.com/2014/02/art-9.pdf 7. Rachchh, Manish.A.(2013). Module I- Basics of IPR; Gujarat Technological University. Retrieved November 15th ,2016 from http://www.gtu.ac.in/circulars/13Aug/Module-1-BasicsofIPR_3rdAug2013.pdf 8. Sinha, Abhijeet & Bhardwaj, R.K. (2010). Digital Libraries and Intellectual Property Rights. International Conference on Digital Libraries. Retrieved November 15th , 2016 from https://rajkbhardwaj.files.wordpress.com/2014/02/art-9.pdf
Paper Title | : | A Survey of Big Data Analytics in Banking and Health Care today |
Authors | : | P.Siva Kumar, B.Murthujavali, Surya Pogu Jayanna, , |
Affiliations | : | Asst.Professor,Department of Computer Science and Engineering.,G.Pullaiah College of Engineering & Technology (GPCET), Kurnool |
Abstract | : | This paper gives an perception of how we can disclose added value from the data generated by healthcare and banking sector where Health care Organizations and Financial institutions are making use of Big Data in big ways, from boosting cyber security to reducing customer or Patient churn, cultivating customer or Patient loyalty, and more through innovative and personalized offerings that make effective services. Large amount of heterogeneous data is generated by these organizations. But without proper data analytics methods these data became useless. Big Data Analytics using Hadoop plays an effective role in performing meaningful real-time analysis on the huge volume of data and able to predict the emergency situations before it happens. It describes about the big data use cases in healthcare and banking sectors. |
![]() | : | 10.22362/ijcert/2016/v3/i12/xxxx |
DOI Link | : | Not Yet Assigned |
1. Yanglin Ren, Monitoring patients via a secure and mobile healthcare system, IEEE Symposium on wireless communication,2011 2. Dai Yuefa, Wu Bo, GuYaqiang ,Data Security Model for Cloud Computing, International Workshop on Information Security and Application,2009 3. Jeffrey Dean and Sanjay Ghemawat,MapReduce: Simplified Data Processing on Large Clusters,ACM,2008 4.Kayyali B, Knott D, Van Kuiken S. The big-data revolution in US health care: accelerating value and innovation. McKinsey & Company. 2013 Apr. URL: https://digitalstrategy.nl/wp-content/uploads/E2-2013.04-The-big-data-revolution-in-US-health-care-Accelerating-value-and-innovation.pdf [accessed 2016-11-11] [WebCite Cache] 5. Cong Wang, Privacy-Preserving Public Auditing for Secure Cloud Storage,IEEE,2010 6. Konstantin Shvachko, HairongKuang, Sanjay Radia, Robert Chansler ,The Hadoop Distributed File System,IEEE,2010 7. Bill Hamilton, Big Data Is the Future of Healthcare, Cognizant white paper, 2010. 8. White Paper by SAS, How Government are using the Power of High Performance Analytics, 2013. 9. Michael Cooper &Peter Mell, Tackling Big Data Problems, NSIT Computer Security Workshop 10. Jean Yean, Big Data Bigger Opportunities, White Paper, U.S.General Services Administration. 11. Kruse CS, Goswamy R, Raval YJ, Marawi S Challenges and Opportunities of Big Data in Health Care: A Systematic Review JMIR Med Inform 2016;4(4):e38 URL: https://medinform.jmir.org/2016/4/e38 DOI: 10.2196/medinform.5359, PMID: 27872036 ,PMCID: 5138448.
Paper Title | : | Selection and Maintenance of Materialized View using Genetic Algorithm |
Authors | : | Ramesh S Gawali, Prof. Mrunali G. Vaidya, , , |
Affiliations | : | BIT Ballarpur Gondwana University ,India |
Abstract | : | Data warehouse is a repository of large amount of data collected from multiple heterogeneous and distributed data sources. Quick response time and accuracy are the key points for success of any database. Performance of query can be improved by different approaches like query optimization, use of proper data structure etc. But leaving all these alternatives we are planning to use materialized view approach |
![]() | : | 10.22362/ijcert/2016/v3/i12/xxxx |
DOI Link | : | Not yet assigned |
[1]Dr.T.Nalini, Dr.A.Kumaravel , Dr.K.Rangarajan,â€A Novel Algorithm with IM-LSI Index For Incremental Maintenance of Materialized View†JCS&T Vol. 12 No. 1 April 2012 [2] B.Ashadevi, R.Balasubramanian,†Cost Effective Approach for Materialized Views Selection in Data Warehousing Environmentâ€, IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.10, October 2008 [3] Gupta, H. & Mumick, I., Selection of Views to Ma-terialize in a Data Warehouse. IEEE Transactions on Knowledge and Data Engineering, 17(1), 24-43, 2005. [4] Yang, J., Karlapalem. K., and Li. Q. (1997). A framework for designing materialized views in a data warehousing environment. Proceedings of the Seven-tieth IEEE International Conference on Distributed Computing systems, USA, pp:458 [5] V.Harinarayan, A. Rajaraman, and J. Ullman.“Implementing data cubes efficientlyâ€. Pro-ceedings of ACM SIGMOD 1996 International Confer-ence on Management of Data, Montreal, Canada, pages 205--216, 1996. [6] A. Shukla, P. Deshpande, and J. F. Naughton, “Ma-terialized view selection for the multidimensional da-tasets,†in Proc. 24th Int. Conf. Very Large Data Bases, 1998, pp. 488–499. [7] Y.D. Choudhari and Dr. S. K. Shrivastava, “Cluster Based Approach for Selection of Materialized Viewsâ€, International Journal of Advanced Research in Com-puter Science and Software Engineering ,Volume 2, Issue 7, July 2012
Paper Title | : | Secure Data Communication Using IDEA for Decentralized Disruption-Tolerant Military Networks |
Authors | : | Atish D. Buddhe , Prof. Hirendra R. Hajare, , , |
Affiliations | : | BIT Ballarpur Gondwana University ,India |
Abstract | : | Nowadays Disruption tolerant network technologies are getting to be distinctly well known that permit wireless devices supported by soldiers to communicate with each other and access the confidential information or command consistently by abusing external storage nodes. The absolute most challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data retrieval. Ciphertext-policy attribute-based encryption is a promising cryptographic solution to the access control issues. However, the problem of applying CP-ABE in decentralized DTNs introduces several security and privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued from different authorities. We propose a secure data retrieval scheme using IDEA for decentralized DTNs where multiple key authorities manage their attributes independently. We demonstrate how to apply the proposed mechanism to productively deal with the classified information conveyed in the distributed in the disruption-tolerant military network. |
![]() | : | DOI:10.22362/ijcert/2016/v3/i12/xxxx |
DOI Link | : | Not Yet Assigned |
[1] J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine, “Maxprop: outing for vehicle-based disruption tolerant networks,†in Proc.IEEE INFOCOM, 2006, pp. 1–11. [2] M. Chuah and P. Yang, “Node density-based adap-tive routing scheme for disruption tolerant networks,†in Proc. IEEE MILCOM, 2006, pp.1,6. [3] M. M. B. Tariq, M. Ammar, and E. Zequra, “Mesage ferry route design for sparse ad hoc networks with mobile nodes,†in Proc. ACM MobiHoc, 2006, pp. 37–48. [4] S. Roy andM. Chuah, “Secure data retrieval based on ciphertext policy attribute-based encryption () system for the DTNs,†Lehigh CSE Tech. Rep., 2009. [5] M. Chuah and P. Yang, “Performance evaluation of content-based information retrieval schemes for DTNs,†in Proc. IEEE MILCOM,2007, pp. 1–7. [6] M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, “Plutus: Scalable secure file sharing on un-trusted storage,†in Proc. Conf. File Storage Technol., 2003, pp. 29–42.
Paper Title | : | Intelligent XML Query-Answering Support with Efficiently Updating XML Data in Data Mining |
Authors | : | Parag Zaware, Prabhudev.I, , , |
Affiliations | : | Vishwabharati Academy College of Engineering, Ahmednagar |
Abstract | : | Data is present in various unstructured format. Extracting information from non structured documents is a very difficult task and it is become more and more critical when the amount of digital information available over the internet increases. This paper is based on design of Branch Organization Rule (BOR) results in approximate answer of queries for mining. XML is popular portable language best suitable for many web technologies hence we prefer XML. While implementing XML Query Answering we are going to implement Naïve Bayes as Machine learning algorithm which we will use specially for Query Classification. We are also implementing same concept for rules classifications by using which the trees are generated after applying queries. Due to creating classification of queries our accuracy of results will increase. |
![]() | : | 10.22362/ijcert/2016/v3/i12/xxxx |
DOI Link | : | Not Yet Assigned |
[1] Mirjana Mazuran, Elisa Quintarelli, and Letizia Tanca “Data Mining for XML Query-Answering Supportâ€, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 24, NO. 8, AUGUST 2012 [2]A. Evfimievski, R. Srikant, R. Agrawal, and J. Gehrke, “Privacy Preserving Mining of Association Rules,†Proc. Eighth ACM Int’l Conf. Knowledge Discovery and Data Mining, pp. 217-228, 2002. [3]C. Combi, B. Oliboni, and R. Rossato, “Querying XML Documents by Using Association Rules,†Proc. 16th Int’l Conf. Database and Expert Systems Applications, pp. 1020-1024, 2005 [4]D. Braga, A. Campi, S. Ceri, M. Klemettinen, and P. Lanzi, “Discovering Interesting Information in XML Data with Asso-ciation Rules,†Proc. ACM Symp. Applied Computing, pp. 450-454, 2003. [5]D. Barbosa, L. Mignet, and P. Veltri, “Studying the XML Web: Gathering Statistics from an XML Sample,†World Wide Web, vol. 8, no. 4, pp. 413-438, 2005. [6]E. Baralis, P. Garza, E. Quintarelli, and L. Tanca, “Answer-ingXMLQueries by Means of Data Summaries,†ACM Trans.InformationSystems, vol. 25, no. 3, p. 10, 2007. [7]L. Feng, T.S. Dillon, H. Weigand, and E. Chang, “An XMLEnabled Association Rule Framework,†Proc. 14th Int’l Conf. Database and Expert Systems Applications, pp. 88-97, 2003. [8] World Wide Web Consortium, XML Schema, http:// www.w3C.org/TR/xmlschema-1/, 2001. [9]Chai, K.; H. T. Hn, H. L. Chieu; “Bayesian Online Classifiers for Text Classification and Filteringâ€, Proceedings of the 25th annual international ACM SIGIR conference on Research and Development in Information Retrieval, August 2002. [10] DATA MINING Concepts and Techniques, Jiawei Han, Micheline Kamber Morgan Kaufman Publishers, 2003
Paper Title | : | Indoor Environment Navigation for Blind with Voice Feedback |
Authors | : | Parimal A. Itankar, Prof. Hirendra R. Hajare , , , |
Affiliations | : | BIT Ballarpur Gondwana University ,India |
Abstract | : | this paper presents assistive system for visually impaired with voice feedback which focuses on independent movement of blind people who suffer in an unknown environment with no assistance. This system has Radio Frequency Identification (RFID) for the path guidance identifying certain paths for the navigation which give features such as location identification. This proposed system on the user side include a RFID reader module with an integrated microcontroller, zigbee transceiver for transmitting the tag’s information and for playing information to the blind person were on the server side zigbee transceiver for communication. For the direction identification technique, RFID passive tag is employed on the path and for location recognition required tools and r building will be embedded with passive RFID tags. A data unique to each object and path location is on the server. The RFID reader reads the RFID tags and transmits the data by Zigbee to the server PC which in turn locates for the received Tag ID in the database and gives respond to the user with its identification data which is played at the blind person side by converting it from text to speech with the help of SAPI module. |
![]() | : | DOI:10.22362/ijcert/2016/v3/i12/xxxx |
DOI Link | : | Not yet assigned |
[1]. Abdullah Rehman, MohsinMurad, Arif Ali Shah, Sal-imUllah, Muhammad Fahad, Khawaja M. Yahya , ''RFAIDE--An RFID Based Navigation and Object Recogni-tion Assistant for Visually Impaired People'', University of Engineering and Technology, Peshawar, Pakistan, 978-1-4577-0768-1/11/2011 IEEE. [2]. Andreas Hub, Joachim Diepstraten, Thomas Ertl, ''De-sign and Development of an Indoor Navigation and Object Identification System for the Blind'', Visualization and Interactive Systems Institute University of Stuttgart. [3]. Abdelsalam (Sumi) Helal, Steven Edwin Moore, Balaji Ramachandran, ''Drishti: An Integrated Navigation System for Visually Impaired and Disabled'', University of Florida,Gainesville, FL-32611. [4]. Guth, D.A.; Rieser, J.J. ''Perception and the control of locomotion by blind and visually impaired pedestrians''. Foundations of Orientation and Mobility, (Second Edition), AFB Press, pp. 9-38, 1997. [5]. H. Mori, S. Totani, ''Robotic Travel Aid for the Blind: HARUNOBU-6''. In Proceedings of the Second European Conference On Disability, Virtual Reality, and Assistive Technology, Sövde, Sweden, 1998. [6]. Jenny Crave, Research Fellow, ''Access to electronic resources by visually impaired people'', CERLIM, Manchester Metropolitan University, UK, Information Research, Vol. 8 No. 4, July 2003. [7]. Jinying Chen, Xuben Wang, Zhi Li, Min Dong, ''Blind Path Identification System Design Base on RFID'', 2010 International Conference on Electrical and Control Engineering. [8]. L. W. Alonzi, D. C. Smith, G. J. Burlak, M. Mirowski, (1992). ''Radio frequency message apparatus for aiding ambulatory travel of visually impaired persons'', U.S. Patent 5,144,294 issued Sept. 1, 1992. [9]. M.B. Hancock, ''Electronic auto routing navigation system for visually impaired persons''. U.S. Patent 5,806,017 issued September 8, 1998. [10]. P.Bahl andV.Padmanabhan, “Radar: An In-Building RF–Based User Location andTracking systemâ€, InProceed-ingsofthe IEEE INFOCOM 2000, MARCH 2000, PP775-784.
Paper Title | : | A Multilevel Scoring Mechanism to Compute Top - K Routing Plans for a Keyword Query |
Authors | : | Mr Bharath Reddy, Mr. Manas Kumar Yogi, Grandhi Satya Suneetha, , |
Affiliations | : | Dept of CSE, Pragati Engineering College, Kakinada. Andhra Pradesh, India |
Abstract | : | In recent years Keyword search over database is explored. For information retrieval keyword query used, but due to ambiguity of multiple queries over database should be explored. while getting multiple result to keyword query we need effective crawlers, if search engine might be give multiple result to the single query then computation of all the these results and suggesting best one among all result defined as problem statement. In this paper, the label ranking system over unpredictable is presented. The Keyword directing strategy is utilized to course the catchphrases to significant source. In this methodology two techniques are incorporated. If user gives a keyword query to the search engine then the search engine should process the query and returns the appropriate result based rank. The result construction done based on R-Tree and it allows NN queries should be computed and based on I-Index we will construct the score for each NN query result. |
![]() | : | 10.22362/ijcert/2016/v3/i11/1212 |
DOI Link | : | NA |
[1] Wangchao Le, Feifei Li, Anastasios Kementsietsidis, Songyun Duan, Scalable Keyword Search on Large RDF Data", IEEE2013. [2] George Kollios, Michalis Potamias, and EvimariaTerzi, Clustering Large Probabilistic Graphs, IEEE vol. 25, NO. 2, February 2013 [3] Ye Yuan, Guoren Wang, Lei Chen, and HaixunWang, Efficient Keyword Search on Uncertain Graph Data, IEEE vol. 25, no. 12, December 2013. [4] Jun Gao, Jiashuai Zhou, Jeffrey Xu Yu, and TengjiaoWang, Shortest Path Computing in Relational DBMSs, IEEE vol. 26, no. 4, April 2014. [5] ZhaonianZou, Jianzhong Li, Member, IEEE, Hong Gao, and Shuo Zhang, Mining Frequent Subgraph Patterns from Uncertain Graph Data‖, IEEE vol. 22, no. 9, September 2010. [6] Lifang Qiao, Yu Wang, A Keyword Query Method for Uncertain Database‖, 2nd International Conference on Computer Science and Network Technology, IEEE, 2012. [7] Bolin Ding, Jeffrey Xu Yu, Shan Wang, Lu Qin, Xiao Zhang, Xuemin Lin,‖ Finding Top-k Min-Cost Connected Trees in Databases‖, IEEE 1- 4244-0803-2/07/2007. [8] Thanh Tran and Lei Zhang, ‖ Keyword Query Routing‖, IEEE vol. 26, no. 2, February2014. [9] Ye Yuan, Guoren Wang, Haixun Wang, Lei Chen,‖ Efficient Subgraph Search over Large Uncertain Graphs‖. In Proceedings of the VLDB Endowment, Vol. 4,pp. 876-886, 2011. [10] Hao He, Haixun Wang, Jun Yang, Philip S. Yu,‖ BLINKS: Ranked Keyword Searches on Graphs‖, SIGMOD'07, June 2007. [11]Haoliang Jiang, HaixunWang, Philip S. Yu, and Shuigeng Zhou GString: A novel approach for efficient search in graph databases. In ICDE, 2007. [12] DennisShasha, Jason T.L.Wang, and RosalbaGiugno. Algorithmics and applications of tree and graph searching. In PODS, pages 39–52, 2002. [13] Xifeng Yan, Philip S. Yu, and Jiawei Han. Substructure similarity search in graph databases. In SIGMOD, pages 766–777, 2005. [14] Branimir T. Todorovic, Svetozar R. Rancic, Ivica M. Markovic, Eden H. Mulalic, Velimir M. Ilic, ―Named Entity Recognition and Classification using Context Hidden Markov Model,‖ 9th Symposium on Neural Network Application in Electrical Engineering, NEUREL, pp. 43-46, 2008. [15] Dekai Wu, Weifeng Su and Marine Carpuat, ―A Kernel PCA Method for Superior Word Sense Disambiguation,‖ Proceedings of the 42nd Meeting of the Association for Computational Linguistics, pp. 637-644, 2004. [16]AbdelazizZitouni, AsmaDamankesh, ForooghBarakati, Maha Atari, Mohamed Watfa, FarhadOroumchian, ―Corpus-based Arabic Stemming Using N-grams,‖ Asia Information Retrieval Symposium - AIRS, vol. 6458, pp. 280-289, 2010. [17] Hassan Mohamed, Nazlia Omar, MohdJuzaidinAb Aziz, ―Statistical Malay Part-of-Speech (POS) Tagger using Hidden Markov Approach,‖ International Conference on Semantic Technology and Information Retrieval, pp. 231-236, June 2011.
Paper Title | : | Parametric Optimization of Rectangular Beam Type Load Cell Using Taguchi Method |
Authors | : | D.M. Kalai, V.A.Kamble, A.M.Rathod and B. K. Khot , , |
Affiliations | : | Department. Of Mechanical Engineering DKTE’s TEI, Ichalkaranji, Maharashtra, India |
Abstract | : | In this work, Rectangular beam type load cell is considered for stress and strain analysis by using finite element method. The stress analysis is carried out to minimize the weight of Rectangular beam- type load cell without exceeding allowable stress. The intention of the work is to create the geometry of Rectangular beam-type load cell to find out the optimum solution. FEM software HyperWorks11.0.0.39 is using for parametric optimization of Rectangular beam type load cell. If the stress value is within the permissible range, then certain dimensions will be modified to reduce the amount of material needed. The procedure will be repeated until design changes satisfying all the criteria. Experimental verification will be carried out by photo-elasticity technique with the help of suitable instrumentation like Polariscope. Using Photo-elasticity technique, results are crosschecked which gives results very close to FEM technique. Experimental results will be compared with FEM results. With the aid of these tools the designer can develop and modify the design parameters from initial design stage to finalize basic geometry of load cell. |
![]() | : | under process |
DOI Link | : | Not yet assigned |
[1] “Use of FEM and Photo elasticity for shape optimization of ‘S’ type load cellâ€; Mr. V. A. Kamble, Mr. P. N. Gore; International Journal of Science and Technology, Volume 5, Issue 3; March 2012. [2] “Shape Optimization of ‘S’ Type Load Cell Using Finite Element Methodâ€; Mr. S. M Ghanvat, Prof. S. G. Patil; International Journal of Engineering Innovation & Research Volume 1, Issue 3; 2012. [3] “Stress Analysis of Crane Hook and Validation by Photo-Elasticityâ€; Rashmi Uddanwadiker; Scientific Research Engineering; Sept.2011. [4] “Finite Element Analysis and Optimization of a Beam Type Load Cell for an External Balance Designâ€; Ankit Soni, Pankaj Priyadarshi; Indian Institute of Space Science and Technology, Trivandrum; 2010. [5] “Performance Evaluation of Strain Gauge Based Load Cell to Improve Weighing Accuracyâ€; Prof. Kamlesh H. Thakkar, Prof. Vipul. M. Prajapati, Prof. Bipin D. Patel; International Journal of Latest Trends in Engineering and Technology (IJLTET), vol. 2; 2013. [6] “Measurement Systems, Application and Designâ€; Earnest Doebelin; Tata McGraw Hill, Page 438-446; 2009. B. BOOKS [1] “Experimental Stress Analysisâ€; James W. Dally, William F. Riley; Tata McGraw Hill; 1991. [2] “Experimental Stress Analysisâ€; Dr. Sadhu Singh; Khanna Publications; Fourth edition; 2009. C. MANUALS [1] ADI ARTECH Transducers Pvt. Ltd.
Paper Title | : | Robust Resource Allocation in Relay Node Networks for Optimization Process |
Authors | : | G.Lalitha, Lakshmi Viveka K, Leelavathy Narkedamilly, , |
Affiliations | : | Dept of CSE, Pragati Engineering College, Kakinada |
Abstract | : | Overlay steering has risen as a promising way to deal with enhances unwavering quality and effectiveness of the Internet. For one-jump overlay source steering, when a given essential way experiences the connection disappointment or execution debasement, the source can reroute the movement to the destination by means of a deliberately set transfer hub. Be that as it may, the over-substantial activity going through the same transfer hub may bring about incessant bundle misfortune and postponement jitter, which can corrupt the throughput and usage of the system. To defeat this issue, we propose a Load-Balanced One-jump Overlay Multipath Routing calculation (LB-OOMR), in which the activity is first part at the source edge hubs and afterward transmitted along numerous one-bounce overlay ways. So as to decide an ideal split proportion for the activity, we plan the issue as a direct programming (LP) definition, whose objective is to minimize the more regrettable case system blockage proportion. Since it is hard to take care of this LP issue in commonsense time, a heuristic calculation is acquainted with select the transfer hubs for building the disjoint one-jump overlay ways, which enormously lessens the computational multifaceted nature of the LP calculation. Reproductions in light of a genuine ISP system and an engineered Internet topology demonstrate that our proposed calculation can diminish the system clog proportion significantly, and accomplish top notch overlay directing administration. |
![]() | : | under process |
DOI Link | : | Not yet assigned |
[1] D. G. Andersen, H. Balakrishnan, M. F. Kaashoek, and R. Morris, “Resilient overlay networks,†Proceedings of SOSP 2001, Oct. 2001. [2] S. Banerjee, C. Kommareddy, K. Kar, B. Bhattacharjee, and S. Khuller, “Construction of an efficient overlay multicast infrastructure for real-time applications,†Proceedings of INFOCOM 2003, April 2003. [3] D. G. Andersen, A. C. Snoeren, and H. Balakrishnan, “Best-path vs. multi-path overlay routing,†Proceedings of IMC 2003, Oct. 2003. [4] C.L.T. Man, G. Hasegawa, and M. Murata, “Monitoring overlay path bandwidth using an inline measurement technique,†IARIA International Journal on Advances in Systems and Measurements, vol.1, no.1, pp.50–60, Feb. 2008. [5] P. Rodriguez, S.M. Tan, and C. Gkantsidis, “On the feasibility of commercial, legal P2P content distribution,†SIGCOMM Computer Communication Review, vol.36, no.1, pp.75–78, Jan. 2006. [6] S. Seetharaman and M. Ammar, “Characterizing and mitigating inter-domain policy violations in overlay routes,†Proceedings of ICNP 2006, pp.259–268, Nov. 2006. [7] T. Karagiannis, P. Rodriguez, and K. Papagiannaki, “Should Internet service providers fear peer-assisted content distribution?,†Proceedings of IMC 2005, pp.6–6, Oct. 2005. [8] IETF ALTO Working Group web site. available at http:// datatracker.ietf.org/wg/alto/. [9] H. Xie, Y. R. Yang, A. Krishnamurthy, Y. G. Liu, and A. Silberschatz, “P4P: Provider portal for applications,†SIGCOMM Computer Communication Review, vol.38, no.4, pp.351–362, Oct. 2008. [10] Planet Lab web site. available at http://www.planet-lab.org/. [11] G. Hasegawa, Y. Hiraoka, and M. Murata, “Effectiveness of overlay routing based on delay and bandwidth information,†[12] S. J. Lee, S. Banerjee, P. Sharma, P. Yalagandula, and S. Basu, “Bandwidth-aware routing in overlay networks,†Proceedings of INFOCOM 2008, pp.1732–1740, April 2008. [13] G. Smaragdakis, V. Lekakis, N. Laoutaris, A. Bestavros, J.W. Byers, and M. Roussopoulos, “EGOIST: overlay routing using selfish neighbor selection,†Proceedings of CoNEXT 2008, pp.1–12, Dec. 2008. [14] Z. Li and P. Mohapatra, “QRON: QoS-aware routing in overlay networks,†IEEE Journal on Selected Areas in Communications, vol.22, no.1, pp.29–40, Jan. 2004. [15] M. Kamel, C. Scoglio, and T. Easton, “Optimal topology design for overlay networks,†Proceedings of NETWORKING 2007, pp.714– 725, May 2007. [16] R. Cohen and D. Raz, “Cost effective resource allocation of overlay routing relay nodes,†Proceedings of INFOCOM 2011, 2011.
Paper Title | : | A Survey on: Sound Source Separation Methods |
Authors | : | Ms. Monali R. Pimpale, Prof. Shanthi Therese , Prof. Vinayak Shinde,, , |
Affiliations | : | Department of Computer Engineering, Mumbai University, Shree L.R. Tiwari College of Engineering and Technology,Mira Road, India. |
Abstract | : | now a day’s multimedia databases are growing rapidly on large scale. For the effective management and exploration of large amount of music data the technology of singer identification is developed. With the help of this technology songs performed by particular singer can be clustered automatically. To improve the Performance of singer identification the technologies are emerged that can separate the singing voice from music accompaniment. One of the methods used for separating the singing voice from music accompaniment is non-negative matrix partial co factorization. This paper studies the different techniques for separation of singing voice from music accompaniment. |
![]() | : | under process |
DOI Link | : | Not yet assigned |
[1] Tuomas Virtanen ,â€Unsupervised Learning Methods for Source Separation in Monaural Music Signals†Tuomas Virtanen [2] T. Virtanen, “Monaural sound source separation by nonnegative matrix factorization with temporal continuity and sparseness criteria,†IEEE Trans. Audio, Speech, Lang. Process., vol. 15, no. 3, pp. 1066–1074,Mar. 2007. [3] J. Yoo et al., “Nonnegative matrix partial co-factorization for drum source separation,†in Proc. IEEE Int. Conf. Acoust. Speech, Signal Process., 2010, pp. 1942 1945. [4] M. Kim et al., “Nonnegative matrix partial co-factorization for spectral and temporal drum source separation,†IEEE J. Sel. Topics Signal Process., vol. 5, no. 6, pp. 1192–1204, Dec. 2011. [5] Y. Hu and G. Z. Liu, “Singer identification based on computational auditory scene analysis and missing feature methods,†J. Intell. Inf. Syst., pp. 1–20, 2013. [6] McAulay, Robert J., and Thomas F. Quatieri. "Pitch estimation and voicing detection based on a sinusoidal speech model." Acoustics, Speech, and Signal Processing, 1990. ICASSP-90., 1990 International Conference on. IEEE, 1990. [7] T. Virtanen, A. Mesaros, and M. Ryynanen, “Combining pitch-based inferenceandnon-negative spectrogram factorization in separating vocals from polyphonic music,†in Proc. ISCA Tutorial Res. Workshop Statist. Percept. Audit. (SAPA), 2008 [8] Zafar Rafii and Bryan Pardo, “REpeating Pattern Extraction Technique (REPET): A Simple Method for Music/Voice Separationâ€, IEEE Transactions on Audio, Speech, and Language Processing, vol. 21, no. 1, pp. 71 – 82, January 2013. [9] Ying Hu and Guizhong Liu, “Separation of Singing Voice Using Nonnegative Matrix Partial CoFactorization for Singer Identificationâ€, IEEE/ACM Transactions on Audio, Speech, and Language Processing, vol. 23, no. 4, pp. 643 – 653, April 2015. [10] Yipeng Li, DeLiang Wang, Separation of Singing Voice from Music Accompaniment for Monaural Recordings, IEEE Transactions on Audio, Speech, and Language Processing,v.15 n.4, p.1475-1487, May 2007. [11] Virtanen, Tuomas. "Sound source separation using sparse coding with temporal continuity objective." Proc. ICMC. Vol. 3. 2003. [12] ICASSP 2007 Tutorial - Audio Source Separation based on Independent Component Analysis Shoji Makino and Hiroshi Sawada (NTT Communication Science Laboratories, NTT Corporation) [13] Makino, Shoji, et al. "Audio source separation based on independent component analysis." Circuits and Systems, 2004. ISCAS'04. Proceedings of the 2004 International Symposium on. Vol. 5. IEEE, 2004. [14] Virtanen, Tuomas. "Separation of sound sources by convolutive sparse coding." ISCA Tutorial and Researc Workshop (ITRW) on Statistical and Perceptual Audio Processing. 2004. [15] Non-negative matrix factorization based compensation of music for automatic speech recognition, Bhiksha Raj, T. Virtanen, Sourish Chaudhure, Rita Singh, 2010. [16] Reynolds, Douglas A., Thomas F. Quatieri, and Robert B. Dunn. "Speaker verification using adapted Gaussian mixture models." Digital signal processing 10.1 (2000): 19-41. [17] Hochreiter, Sepp, and Michael C. Mozer. "Monaural separation and classification of mixed signals: A support-vector regression perspective." 3rd International Conference on Independent Component Analysis and Blind Signal Separation, San Diego, CA. 2001.
Paper Title | : | Software Engineering Domain Knowledge to Identify Duplicate Bug Reports |
Authors | : | Dr.J.KEZIYA RANI, , , , |
Affiliations | : | ASST.PROFESSOR, DEPT.OF.CS&T, S.K.UNIVERSITY, ANANTHAPURAMU. |
Abstract | : | Earlier, many methodologies was proposed for detecting duplicate bug reports by comparing the textual content of bug reports to subject-specific contextual material, namely lists of software-engineering terms, such as non-functional requirements and architecture keywords. When a bug report includes a word in these word-list contexts, the bug report is measured to be linked with that context and this information is likely to improve bug-deduplication methods. Here, we recommend a technique to partially automate the extraction of contextual word lists from software-engineering literature. Evaluating this software-literature context technique on real-world bug reports creates useful consequences that indicate this semi-automated method has the potential to significantly decrease the manual attempt used in contextual bug deduplication while suffering only a minor loss in accuracy. |
![]() | : | under process |
DOI Link | : | Not yet assigned |
[1] P. Runeson, M. Alexandersson, and O. Nyholm, “Detection of duplicate defect reports using natural language processing,†in Software Engineer-ing, 2007. ICSE 2007. 29th International Conference on. IEEE, 2007, pp. 499–510. [2] C. Sun, D. Lo, X. Wang, J. Jiang, and S.-C. Khoo, “A discriminative model approach for accurate duplicate bug report retrieval,†in Pro-ceedings of the 32nd ACM/IEEE International Conference on Software Engineering-Volume 1. ACM, 2010, pp. 45–54. [3] C. Sun, D. Lo, S.-C. Khoo, and J. Jiang, “Towards more accurate retrieval of duplicate bug reports,†in Proceedings of the 2011 26th IEEE/ACM International Conference on Automated Software Engineering. IEEE Computer Society, 2011, pp. 253–262. [4] A. Alipour, A. Hindle, and E. Stroulia, “A contextual approach towards more accurate duplicate bug report detection,†in Proceedings of the Tenth International Workshop on Mining Software Repositories. IEEE Press, 2013, pp. 183–192. [5] A. Alipour, “A contextual approach towards more accurate duplicate bug report detection,†Master’s thesis, University of Alberta, Fall 2013. [6] D. Han, C. Zhang, X. Fan, A. Hindle, K. Wong, and E. Stroulia, “Understanding android fragmentation with topic analysis of vendor-specific bugs,†in Reverse Engineering (WCRE), 2012 19th Working Conference on. IEEE, 2012, pp. 83–92. [7] R. S. Pressman and W. S. Jawadekar, “Software engineering,†New York 1992, 1987. [8] M. L. Murphy, The Busy Coder’s Guide to Advanced Android Develop-ment. CommonsWare, LLC, 2009. [9] N. Klein, C. S. Corley, and N. A. Kraft, “New features for duplicate bug detection.†in MSR, 2014, pp. 324–327. [10] N. Bettenburg, R. Premraj, T. Zimmermann, and S. Kim, “Duplicate bug reports considered harmful. . . really?†in Software Maintenance, 2008. ICSM 2008. IEEE International Conference on. IEEE, 2008, pp. 337–345. [11] N. Jalbert and W. Weimer, “Automated duplicate detection for bug tracking systems,†in Dependable Systems and Networks With FTCS and DCC, 2008. DSN 2008. IEEE International Conference on. IEEE, 2008, pp. 52–61. [12] Y. Dang, R. Wu, H. Zhang, D. Zhang, and P. Nobel, “Rebucket: A method for clustering duplicate crash reports based on call stack similarity,†in Proceedings of the 2012 International Conference on Software Engineering. IEEE Press, 2012, pp. 1084–1093. [13] A. Sureka and P. Jalote, “Detecting duplicate bug report using character n-gram-based features,†in Software Engineering Conference (APSEC), 2010 17th Asia Pacific. IEEE, 2010, pp. 366–374. [14] A. Lazar, S. Ritchey, and B. Sharif, “Improving the accuracy of duplicate bug report detection using textual similarity measures,†in Proceedings of the 11th Working Conference on Mining Software Repositories. ACM, 2014, pp. 308–311. [15] A. Kiezun. Basic tutorial eclipse 3.1. [On-line]. Available: http://archive.eclipse.org/eclipse/downloads/drops/R-3. 1-200506271435/org.eclipse.jdt.doc.user.3.1.pdf.zip [16] Sun Microsystems. (2008) Openoffice.org 3.0 developer’s guide. [Online]. Available: https://wiki.openoffice.org/w/images/3/34/DevelopersGuide_ OOo3.0.0.odt [17] Mozilla Developer Network and individual contributors. Mozilla developer guide. [Online]. Available: https://developer.mozilla.org/enUS/docs/Mozilla/Developer_guide
Paper Title | : | An Image representation using Compressive Sensing and Arithmetic Coding |
Authors | : | Dr. Renuka Devi S M , , , , |
Affiliations | : | ECE Dept, GNITS, Hyderbad-500008 |
Abstract | : | The demand for graphics and multimedia communication over intenet is growing day by day. Generally the coding efficiency achieved by CS measurements is below the widely used wavelet coding schemes (e.g., JPEG 2000). In the existing wavelet-based CS schemes, DWT is mainly applied for sparse representation and the correlation of DWT coefficients has not been fully exploited yet. To improve the coding efficiency, the statistics of DWT coefficients has been investigated. A novel CS-based image representation scheme has been proposed by considering the intra- and inter-similarity among DWT coefficients. Multi-scale DWT is first applied. The low- and high-frequency subbands of Multi-scale DWT are coded separately due to the fact that scaling coefficients capture most of the image energy. At the decoder side, two different recovery algorithms have been presented to exploit the correlation of scaling and wavelet coefficients well. In essence, the proposed CS-based coding method can be viewed as a hybrid compressed sensing schemes which gives better coding efficiency compared to other CS based coding methods. |
![]() | : | 10.22362/ijcert/2016/v3/i11/48908 |
DOI Link | : | http://www.dx.doi.org/10.22362/ijcert/2016/v3/i11/48908 |
[1] Donoho D.L., “Compressed sensing,†IEEE Transac-tions on Information Theory, vol. 52, pp. 1289–1306, 2006. [2] Cand`es E. J. and Wakin M. B. , “An introduction to compressive sampling,†IEEE Signal Processing Magazine, vol. 25, pp. 21–30, 2008. [3] Tropp, Joel A., and Stephen J. Wright. "Computational methods for sparse solution of linear inverse problems." Proceedings of the IEEE 98.6 (2010): 948-958. [4] Candès E., Romberg J. and Tao T., “Robust uncertainty principles: Exact signal reconstruction from highly incomplete frequency information,†IEEE Trans. Inform. Theory, vol. 52,no. 2, pp. 489–509, Feb. 2006. [5] J. A. Tropp and A. C. Gilbert, “Signal recovery from random measurements via orthogonal matching pur-suit,†IEEE Transactions on Information Theory, vol. 53, pp. 4655–4666, 2007. [6] D. L. Donoho, Y. Tsaig, I. Drori, and J.-L. Starck, “Sparse solution of underdetermined linear equations by stagewise orthogonal matching pursuit,†March 2006, preprint. [7] B. Efron, T. Hastie, I. Johnstone, and R. Tibshirani, “Least angle regression,†Annals of Statistics (with discussion), vol. 32,pp. 407–499, 2004. [8] [Online]. Available: http://www.cs.ubc.ca/~mpf/spgl1/ [9] Deng C.W., Lin W. S., Lee B. S. and Lau C. T., “Robust image compression based upon compressive sensing,†in Proc. IEEE Int. Conf. Multimedia and Expo. (IC-ME’10), Jul. 2010, pp. 462–467. [10] Ji S. , Xue Y. , and Carin L., “Bayesian compressive sensing,†IEEE Transactions on Signal Processing, vol. 56, 2008, pp. 2346–2356. [11] Said A. and Pearlman W. A., “A new, fast, and efficient image codec based on set partitioning in hierarchical trees,†IEEE Transactions on Circuits and Systems for Video Technology, vol. 6, 1996, pp. 243–250. [12] Pavithra V, Renuka Devi SMand Ganapathy Reddy Ch , "A survey of robust image coding techniques", IJCA (0975-8887),Volume No 71, No 5,May 2013,pp. 41-51 [13] Pavithra V, Renuka Devi SM ‘An image representa-tion scheme by hybrid compressive sensing’ IEEE Asia Pacific Conference on Postgraduate Research in Microelectronics and Electronics (PrimeAsia), 19-21 December 2013
Paper Title | : | Multiple Encryption using ECC and Its Time Complexity Analysis |
Authors | : | Vishal Kumar, Ratnesh Kumar, Mashud A. Barbhuiya and Monjul Saikia, , |
Affiliations | : | Department of Computer Science and Engineering North Eastern Regional Institute of Science and Technology Arunachal Pradesh, INDIA |
Abstract | : | Rapid growth of information technology in present era, secure communication, strong data encryption technique and trusted third party are considered to be major topics of study. Robust encryption algorithm development to secure sensitive data is of great significance among researchers at present. The conventional methods of encryption used as of today may not sufficient and therefore new ideas for the purpose are to be design, analyze and need to be fit into the existing system of security to provide protection of our data from unauthorized access. An effective encryption/ decryption algorithm design to enhance data security is a challenging task while computation, complexity, robustness etc. are concerned. The multiple encryption technique is a process of applying encryption over a single encryption process in a number of iteration. Elliptic Curve Cryptography (ECC) is well known and well accepted cryptographic algorithm and used in many application as of today. In this paper, we discuss multiple encryptions and analyze the computation overhead in the process and study the feasibility of practical application. In the process we use ECC as a multiple-ECC algorithm and try to analyze degree of security, encryption/decryption computation time and complexity of the algorithm. Performance measure of the algorithm is evaluated by analyzing encryption time as well as decryption time in single ECC as well as multiple-ECC are compared with the help of various examples. |
![]() | : | 10.22362/ijcert/2016/v3/i11/48907 |
DOI Link | : | http://www.dx.doi.org/10.22362/ijcert/2016/v3/i11/48907 |
[1] Anoop MS “Elliptic Curve Cryptography-An Implementation Guide†anoopms@tataelxsi.co.in. [2] Himanshu Gupta and Vinod Kumar Sharma "Multiphase Encryption: A New Concept in Modern Cryptography" IJCTE 2013 Vol.5(4): 638-640 ISSN: 1793-8201 DOI: 10.7763/IJCTE.2013.V5.765 is referred. [3] William Stalling “Cryptography and Network Security†book (fourth edition). [4] N. Koblitz. “A Course in Number Theory and Cryptographyâ€, Springer-Verlag, second edition, 1994. [5] W. Diffie and M. Hellman, “Exhaustive Cryptanalysis of the NBS Data Encryption Standardâ€, June 1977, pp. 74-84. [6] NIST Special Publication 800-78-2, “Cryptographic Algorithms and Key Sizes for Personal Identity Verificationâ€, February 2010. [7] Darrel Hankerson, Julio Lopez Hernandez, Alfred Menezes, “Software Implementation of Elliptic Curve Cryptography over Binary Fieldsâ€, 2000 [8] M. Brown, D. Hankerson, J. Lopez, A. Menezes, “Software Implementation of the NIST Elliptic Curves Over Prime Fieldsâ€, 2001 [9] Certicom, “Standards for Efficient Cryptography, SEC 1: Elliptic Curve Cryptographyâ€, Version 1.0, September 2000 [10] Certicom, “Standards for Efficient Cryptography, SEC 2: Recommended Elliptic Curve Domain Parametersâ€, Version 1.0, September 2000, [11] Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone, “Handbook of Applied Cryptographyâ€, CRC Press, 1996 [12] Data Security for e-Transaction. Retrieved on April 12th 2008, from Weblink: http://www.comp.nus.edu.sg/~jervis /cs3235/set.html [13] Ralph C. Merkle, Martin E. Hellman, “On the Security of Multiple Encryption, A technical note on Programming Technique & Data Structure†published in ACM, 1981, Volume 24, Number 7. [14] M. Saikia, S.J. Bora, Md. A. Hussain “A Review on Applications of Multimedia Encryption†in ISBN: 987-81-8487-088-6 in national conference on Network Security- issues 2010, Tezpur University [15] Vandana Thakur, Monjul Saikia "Comprehensive Survey of Multimedia Encryption Techniques" 26th National Conv. of Comp. Eng. held at the IEI (India), Assam February 4, 2012 [16] Boruah, Debabrat; Saikia, Monjul, "Implementation of ElGamal Elliptic Curve Cryptography over prime field using C," International Conference on Information Communication and Embedded Systems (ICICES), 2014, vol., no., pp.1,7, 27-28 Feb. 2014 [17] Kapoor, Vivek, Vivek Sonny Abraham, and Ramesh Singh. "Elliptic curve cryptography." Ubiquity 2008.May (2008): 7. [18] Merkle, Ralph C., and Martin E. Hellman. "On the security of multiple encryption." Communications of the ACM 24.7 (1981): 465-467. [19] Dahl, Ulf. "Data security system for a database having multiple encryption levels applicable on a data element value level." U.S. Patent No. 6,321,201. 20 Nov. 2001. [20] Zhang, Linhua. "Cryptanalysis of the public key encryption based on multiple chaotic systems." Chaos, Solitons & Fractals 37.3 (2008): 669-674. [21] Raju, G. V. S., and Rehan Akbani. "Elliptic curve cryptosystem and its applications." Systems, Man and Cybernetics, 2003. IEEE International Conference on. Vol. 2. IEEE, 2003. [22] Önen, Melek, and Refik Molva. "Secure data aggregation with multiple encryption." European Conference on Wireless Sensor Networks. Springer Berlin Heidelberg, 2007. [23] Bhati, Sunita, Anita Bhati, and S. K. Sharma. "A New Approach towards Encryption Schemes: Byte–Rotation Encryption Algorithm." Proceedings of the World Congress on Engineering and Computer Science. Vol. 2. 2012.
Paper Title | : | Locating Common Styles Based Totally On Quantitative Binary Attributes Using FP-Growth Algorithm |
Authors | : | RAVULA KARTHEEK, B. SAMPATH BABU, CH. HARI KRISHNA, , |
Affiliations | : | Assistant professor, Rise Krishna Sai Gandhi Group of Institutions: Ongole, |
Abstract | : | Discovery of frequent patterns from outsized information is taken into account as a crucial facet of data mining. There is always associate degree ever increasing demand to search out the frequent patterns. This paper introduces a technique to handle the categorical attributes associate degree numerical attributes in an economical means. Within the planned methodology, the ordinary database is reborn into quantitative information and thus it's reborn into binary values reckoning on the condition of the coed information. From the binary patterns of all attributes bestowed within the student information, the frequent patterns are known exploitation FP-growth; the conversion reveals all the frequent patterns within the student database. |
![]() | : | under process |
DOI Link | : | Not yet assigned |
[1] Bo Wu, Defu Zhang, Qihua Lan, Jiemin Zheng ,An Efficient Frequent Patterns Mining Algorithm based on Apriori Algorithm and the FP-tree Structure Department of Computer Science, Xiamen University, Xiamen
[2] Lei Want, Xing-Juan Fan2, Xing-Long Lot, Huan Zha Mining data association based on a revised FP-growth Algorithm Proceedings of the 2012 International Conference on Machine Learning and Cybernetics, Xian, 15- 17 July,
[3] R. Agrawal and R. Srikant. Fast algorithms for mining association rules. In VLDBY94, pp. 487-499.
[4] R. Agrawal, T. Imielinski, and A. Swami. Mining association rules between sets of items in large databases. In Proc.1993 ACM-SIGMOD Int. Conf. Management of Data, Washington, D.C., May 1993, pp 207216
[5] A. Savasere, E. Omiecinski, and S. Navathe. An efficient algorithm for mining association rules in large databases. Proceedings of the 21st International Conference on Very large Database,1995.
[6] J.S .Park ,M.S.Chen and P.S.Yu.An effective hash-based algorithm for mining association rules. In SIGMOD1995, pp 175-186.
[7] J. Han, J. Pei, and Y. Yin. Mining Frequent Patterns without Candidate Generation(PDF), (Slides), Proc. 2000 ACM-SIGMOD Int. May 2000.
[8] A.B.M.Rezbaul Islam, Tae-Sun Chung An Improved Frequent Pattern Tree Based Association Rule Mining Techniques Department of Computer Engineering Ajou University Suwon, Republic of Korea
[9] Agarwal R,Aggarwal C,Prasad V V V.A tree projection algorithm for generation of frequent item sets. In Journal of Parallel and Distributed Computing (Special Issue on High-Performance Data Mining),2000
[10] E. Ramaraj and N. Venkatesan, ― Bit Stream Mask Search Algorithm in Frequent Itemset Mining,‖ European Journal of Scientific Research,‖ Vol. 27 No.2 (2009).
[11] Qihua Lan, Defu Zhang, Bo Wu ,A New Algorithm For Frequent Itemsets Mining Based On Apriori And FP-Tree,Department of Computer Science, Xiamen University, Xiamen China 2009 IEEE
Paper Title | : | Design of DC-DC Boost Converter in CMOS 0.18µm Technology |
Authors | : | M.RAMA DEVI, R.SUNIL KUMAR, M.MADHAVA KUMAR, , |
Affiliations | : | Gayatri Vidya Parishad College of Engineering for Women, Visakhapatnam, Andhra Pradesh, India. |
Abstract | : | A CMOS DC-DC boost converter with fastest settling time and less quiescent current with a feedback control is implemented. An extra path is introduced because of an error amplifier (OTA) which has an effective control for fast response. Efficient compensation with soft-start is used to make the quiescent current low. An on-chip current sensing circuit is introduced with less number of I/O pins for current mode control. In this project, the DC-DC boost converter is designed in Cadence virtuoso 0.18µm technology with a 5V supply. With a wide range of loads, it provides 25V at the output, 50mA load current with 90% efficiency. The circuit is operated at 500 KHz clock frequency with output ripple voltage of 20mV by using 4.7µF off-chip capacitor and 75µH off-chip inductor. |
![]() | : | 10.22362/ijcert/2016/v3/i10/48905 |
DOI Link | : | http://www.dx.doi.org/10.22362/ijcert/2016/v3/i10/48905 |
[1] Ned Mohan, Tore M. Undeland, William P. Robbins, “Power Electronics: Converters, Applications, and Designâ€, 3rd Edition, Wiley. [2] Robert W Erickson, Fundamentals of Power Electronics, International Thomson Publishing (1997) [3] C. F. Lee and P. K. T. Mok, “A monolithic current-mode CMOS DC-DC converter with on-chip current-sensing technique,†IEEE J. Solid-state Circuits, vol. 39, no. 1, pp. 3–14, Jan. 2004. [4] Yushan Li, Kevin R. Vannorsdel, Art J. Zirger, Mark Norris, and DraganMaksimovi´c, “Current Mode Control for Boost Converters with Constant Power Loads,†in IEEE Transactions on Circuits and Systems-I: Regular Papers, vol. 59, no. 1, pp. 198-206, January 2012. [5] Weiwei Huang,Xiao Yang,Chaodong Ling,â€Novel current sensing circuit for boost DC-DC converter†[6] Kalpesh B. Pandya, Kehul A. shah “Performance Evaluation of Different Types of CMOS Operational Transconductance Amplifier†International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064. [7] HyunseokNam,InseokKim,YoungkookAhn,andJeongjinRoh,â€A High efficiency Boost converter for TFT-LCD bias supplyâ€, THE 23rd international Technical conference on circuits/systems, computers and communications (ITC-CSCC 2008).
Paper Title | : | Human Activity Recognition Using Smartphone and Smartwatch |
Authors | : | Hamid M. Ali, Ali M. Muslim, , , |
Affiliations | : | Computer Engineering Dept., Baghdad University, Iraq |
Abstract | : | Human activity recognition is influential subject in different fields of human daily life especially in the mobile health. As the smartphone becomes an integrated part of human daily life which has the ability of complex computation, internet connection and also contains a large number of hardware sensors, encourage implementation of the human activity recognition system. Most of the works done in this field imposed the restriction of firmly fixing the smartphone in a certain position on the human body, together with machine learning mechanism, to facilitate the process of classifying human activities from the smartphone sensors raw data. To overcome this restriction, the proposed approach incorporated a smartwatch, fixed on the human ankle, together with smartphone freely carried by the user. The use of smartwatch assisted in providing distinct separable signal variation from the smartwatch accelerometer and gyroscope sensors raw data which in turn facilitated the use of a threshold-based mechanism to classify 20 various human activities. Furthermore, this work provides a service for remotely real-time monitoring of the user human activities. The system is tested with different subjects and achieved an accuracy of 97.5%. |
![]() | : | 10.22362/ijcert/2016/v3/i10/48906 |
DOI Link | : | http://www.dx.doi.org/10.22362/ijcert/2016/v3/i10/48906 |
[1] S. Adibi, "Introduction," in Mobile Health A Technology Road Map, Springer International Publishing Switzerland, 2015, p. 1. [2] R. Amin, C. Chien-An and L. Yan, "Human Activity Recognition using Smartphone," CSCE666, 2011. [3] K. Mustafa, I. Ozlem Durmaz and E. Cem, "Online Human Activity Recognition on Smart Phones," in 2nd International Workshop on Mobile Sensing, Beijing, China, 2012. [4] H. Yi and L. Ye, "Physical Activity Recognition Utilizing the Built-In Kinematic Sensors of a Smartphone," International Journal of Distributed Sensor Networks, vol. 9, no. 1550-1477, p. 10, 2013. [5] A. Davide, G. Alessandro, O. Luca, P. Xavier and L. R.-O. Jorge, "A Public Domain Dataset for Human Activity Recognition Using Smartphones," in European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning, Bruges Belgium, ESANN, 2013, pp. 437-442. [6] Y. Bingchuan, H. John and E. Yalda, "Smartphone-based Activity Recognition Using Hybrid Classifier-Utilizing Cloud Infrastructure for Data Analysis," in Proceedings of the 4th International Conference on Pervasive and Embedded Computing and Communication Systems, Lisbon, Portugal, 2014. [7] T. H. Cesar and A. L. Andres, "Accelerometer-Based Human Activity Recognition in Smartphones for Healthcare Services," in Mobile Health A Technology Road Map, Springer International Publishing Switzerland, 2015, p. 147. [8] D. Natarajasivan and M. Govindarajan, "Filter Based Sensor Fusion for Activity Recognition using Smartphone," International Journal of Computer Science and Telecommunications, vol. 7, no. 5, pp. 26-31, 2016.
Paper Title | : | Secure data hiding Using Robust Firefly Algorithm |
Authors | : | Ms.Ankita Kadu, Prof.Arun Kulkarni, Prof.Deepali Patil, , |
Affiliations | : | Computer Engineering Department ,Shree L.R.Tiwari College of Engineering,Mumbai,India |
Abstract | : | In recent times a lot of work has been carried out in the field of reversible data hiding (RDH) to prevent the secret data from theft, illegal copying and to provide copyright protection. In RDH the cover image will be recovered after extracting the secret data which was inserted in that image. This paper presents a new technique in reversible data hiding technique based on robust Firefly algorithm. The optimal location to hide the secret data will be found by firefly algorithm. The image scrambling is applied by Framelet Transform to prevent perceptual visibility of embedded secret image signal which increase the security level.2D bilateral filter is used to filter the image after hidden the secret information. The decomposition is done with Haar which is humble, symmetric and orthogonal wavelet and the direct weighting factor is used in secret embedding and extraction process. |
![]() | : | |
DOI Link | : | Not yet assigned |
[1] A. Amsaveni and C. Arun kumar,â€An Efficient Data Hiding Scheme Using Firefly Algorithm in Spatial Domainâ€, IEEE sponsored 2nd international conference on electronics and communication system, 2015. [2] M. Manju and Dr.V.Kavitha,†Survey on Reversi-ble Data Hiding Techniquesâ€, International Journal of Security and Its Applications Vol.8, No.4 (2014), pp.297-306. [3] Princy Raj and Sreekumar K,†A Survey on Re-versible Data Hiding in Encrypted Imageâ€, Inter-national Journal of Computer Science and Infor-mation Technologies, Vol. 5 (6), 2014, 7748-7751. [4] Ya-Fen Chang and Wei-Liang Tai, â€Histogram-based Reversible Data Hiding Based on Pixel Differences with Prediction and Sortingâ€, Ksii Transactions On Internet And Information Systems Vol. 6, No. 12, Dec 2012. [5] Kede Ma, Weiming Zhang and Xianfeng Zhao,†Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryptionâ€, IEEE Transactions on Information Forensics and Security, Vol. 8, No. 3, March 2013. [6] Shruti Goel , V. K. Panchal,†Performance Evaluation of a New Modified Firefly Algorithm†IEEE 978-1-4799-6896-1/14,2014. [7] Jiantao Zhou, Xianming Liu,†Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulationâ€, IEEE Transactions on Circuits And Systems for Video Technology, 2015. [8] S.Sulochana and R.Vidhya, â€Texture Based Image Retrieval Using FrameletTransform–Gray Level Co-occurrence Matrix(GLCM)â€, International Journal of Advanced Research in Artificial Intelligence, Vol. 2, No. 2, 2013. [9] Ming Zhang and Bahadir K. Gunturk,†Multiresolution Bilateral Filtering for ImageDenoisingâ€, IEEE Transactions on Image Processing, Vol. 17, No. 12, December 2008. [10] Shivani Sharma and Gursharanjeet Singh Kalra,â€An Image Denoising Framework with Multi-resolution Bilateral Filtering and Normal Shrink Approach†Research Journal of Applied Sciences, Engineering and Technology 7(6): 1054-1060, 2014 ISSN: 2040-7459, e-ISSN: 2040-7467. [11] Sushil Kumar,â€A Comparative Study of Trans-form Based on Secure Imag Steganographyâ€, ijc-ce.2015.v4.389, December 16, 2014.
Paper Title | : | Accident Tracking and Visual Sharing Using RFID and SDN |
Authors | : | Ms.Alpana Gopi , Ms.Litty Rajan , Ms.Surya Rajan ,Ms.Divya P R and Mrs.Shini Renjith, , |
Affiliations | : | Department of Computer Science and Engineering, SBCE, Pattoor |
Abstract | : | In this era, many situations request tracking systems. GPS can be used for location tracking, but it has some limitations. By analyzing the problems of using GPS for location tracking, RFID technology integrated with SDN for vehicle tracking has put forward in this paper. In case of road accidents RFID can be used to track the vehicle thereby the authority get information about the vehicle and its owner. With the help of SDN visual sharing is also possible which is useful in case of getting accident claims. This system overcomes the limitations of vehicle tracking using GPS. The main goal of this paper is complete solution architecture for locating, tracking and informing the authority in the right time when accidents are detected. |
![]() | : | Not Yet Assigned |
DOI Link | : | Not Yet Assigned |
[1] Tracking and localization system using android mobile phones by AdellePuscasium, Alexander Fanca, HonoriuValean, IEEE journal on mobile computing, 2016 [2] Smart Sensing Material for low cost chip less RFID sensor by EmranMd Amin, Student Member, IEEE, Jhantu Kumar Saha, and Nemai Chandra Karmakar, Senior Member, IEEE sensor journal on IoT,July 2014. [3] Cyber physical vehicle tracking system: Requirements for using Radio Frequency Identification Technique, Dietmar P.F. Möller,Tatiana Deriyenko, Hamid Vakilzadian, IEEE Conference paper on IoT [4] Software defined Home Networking Devices for Multi-home Visual Sharingfor Multi-home Visual Sharing.Jinyong Jo, Soyeon Lee, and JongWon Kim, Senior Member, IEEE transaction on Consumer Electronics 2014 [5] H. Kim and N. Feamster, “Improving network management with software defined networking,†IEEE Communications Magazine, vol. 51,no. 2, pp. 114-119, Feb. 2013. [6] J. Jo, S. Lee, and J. Kim, “Programmable IP service gateway for software defined networking: assisting easy composition of service overlays,†IEICETrans. Comms., vol. 96-B, no. 7, pp. 1918-1929, July 2013. [7] R. Mortier, T. Rodden, T. Lodge, D. McAuley, C. Rotsos, A.W. Moore,A. Koliousis, and J. Sventek, “Control and understanding: owning yourhome network,†in Proc. IEEE International Conference onCommunication System and Networks, pp. 1-10, Jan. 2012. [8] B.A. Miller, T. Nixon, C. Tai, and M.D. Wood, “Home networking withuniversal plug and play,â€IEEE Communications Magazine, vol. 39, no.12, pp. 104-109, Dec. 2001. [9] N.Randolph, D.Gardner, C.Anderson, M.Minutilloe, Proffessional Visual Studio, Wrox Programmer to Programmer, 2010. [10] R. Meyer, Proffessional Android Development (Wrox Programmer to Programmer), John Wiley & Sons,2008. [11] F. Xia, J: Ma: Building Smart Communities with Cyber-Physical Systems. In: 13th ACM International Conference onUbiquitous Computing Symposium on Social andCommunity Intelligence, Beijing, China, pp: 1-6, September 2011. [12] Cyber-Physical Systems Summit Report, http://varma.ece.cmu-edu/summit/, 2008. [13] Development of a Low Cost Printable Chipless RFID Humidity Sensor by Emran Md. Amin, Student Member, IEEE, Md. ShakilBhuiyan, Student Member, IEEE, Nemai C. Karmakar, Senior Member, IEEE, and BjørnWinther-Jensen 2014. [14] Metamaterial-inspired passive chipless radio-frequency identification and wireless sensing,C.Mandel, B. Kubina, M. Schüßler, and R. Jako, Ann. Telecommun., vol. 68, nos. 7–8, pp. 385–399, 2013. [15] Chipless RFID: Bar code of the future,S. Preradovic and N. C. Karmakar, IEEE Microw. Mag., vol. 11, no. 12, pp. 87–97, Dec. 2010
Paper Title | : | Computer Science Technology: Tutor, Tool and to explore Language Teaching |
Authors | : | Dr.G. Mohana Charyulu, Prof. S. Venkateswarlu, Dr. DBK Kamesh and Ms.S.Sreelekha, , |
Affiliations | : | Associate Professor & RPAC Chairman, Dept. of English K L University, A.P |
Abstract | : | Computer Technology is now being used in all facets of Teaching in English language classroom. It gives wide range of scope for discussions on usage of Computer Technology in Language class room. The application of Technology on Language study raises questions like what role should these technology plays in Teaching and Learning. This paper discusses the Application of Computer Technology in Language Class room with different roles. As there are many roles to play, this paper limits only to Computer Technology as Tutor, Tool and Ways to explore language. |
![]() | : | 10.22362/ijcert/2016/v3/i10/48903 |
DOI Link | : | http://www.dx.doi.org/10.22362/ijcert/2016/v3/i10/48903 |
1. Turkle, S. (1984). The second self: Computers and the human spirit. New York: Simon & Schuster 2. Knapp, L. R. (1986). The word processor and the writing teacher. Englewood Cliffs, NJ: Prentice-Hall. 3. Warren, B., & Rosebery, A. S. (1988). Theory and practice: Uses of the computer in reading. Remedial and Special Education, 9, 29-38. 4. McConkie, G. W., & Zola, D. (1985). Computer aided reading: An environment for developmental research. Paper presented at the Society for Research on Child Development, Toronto, Canada. 5. Marcus, S., & Blau, S. (1983, April). Not seeing is relieving: Invisible writing with computers.Educational Technology, 11, 12-15.
Paper Title | : | GSM Based Patient Monitoring System using biomedical sensors |
Authors | : | S.Ummay Atiya, K.Swarna Madhuri, , , |
Affiliations | : | Assistant professor in the dept. of ECE, RECW, Kurnool ,Assistant professor in the dept. of ECE, RECW, Kurnool |
Abstract | : | The main theme of the paper is to continuously monitor the patient health parameters like ECG, Heartbeat, Blood Pressure, Temperature etc. by using different sensors and also used to track the location of the patient. The message regarding the condition of the patient is received by the doctor or any other person who takes care of the patient. Sensors like heart beat sensor, temperature sensor are interfaced with the microcontroller (ARDUINO). The location of the patient can be identified by using GPS(Global Position System) which is space -based navigation system that provides data in all the climate conditions. In the event that the parameters of the patient vary abnormally, the message is being sent to the doctor through the GSM module, indicating the patient’s condition along with his location. All the parameter data of the patient are visualized by using LCD display. |
![]() | : | 10.22362/ijcert/2016/v3/i09/3914 |
DOI Link | : | |
• www.national.com • www.atmel.com • www.microsoftsearch.com REFERENCE PAPERS [1] Chaya Khandelwal S. and Manish Patil M., Implementation of Patient Monitoring System Using GSM Technology, International Journal of Electronics and Communication technology, 4(1) 18-24 (2013). [2] Qun Hou, Research and Implementation of Remote Heart Rate Monitoring System Based on GSM and MCU, Institute of Electrical and Electronics Engineers, 978-1-4244- 7618-3 (2010). [3] Edwards S., Heart rate Monitor Bookâ€, Leisure systems international, 1(3), 122-134 (1993) [4] Chiranjeevini Kumari B. and Rajasekar K., Implementation of SMS based Heartbeat monitoring system using PSoC Microcontroller, 2230-7109, International Journal of Electronics and Communication technology, 2(1), (2011) [5] Mohammad Ari Mazidi and Janci Gillispie, the 8051 Microcontroller and Embedded Systems, (2), 5-17 (2007) [6] Lee. W.C.Y, Mobile Cellular Telecommunications, (2), 463-467 (1995) .
Paper Title | : | Mining Opinion Features in Customer Reviews |
Authors | : | Havinash P.H, Jeril Johnson N, Glen Thomas and Emily Stephen P, , |
Affiliations | : | |
Abstract | : | Now days, E-commerce systems have become extremely important. Large numbers of customers are choosing online shopping because of its convenience, reliability, and cost. Client generated information and especially item reviews are significant sources of data for consumers to make informed buy choices and for makers to keep track of customer’s opinions. It is difficult for customers to make purchasing decisions based on only pictures and short product descriptions. On the other hand, mining product reviews has become a hot research topic and prior researches are mostly based on pre-specified product features to analyse the opinions. Natural Language Processing (NLP) techniques such as NLTK for Python can be applied to raw customer reviews and keywords can be extracted. This paper presents a survey on the techniques used for designing software to mine opinion features in reviews. Elven IEEE papers are selected and a comparison is made between them. These papers are representative of the significant improvements in opinion mining in the past decade. |
![]() | : | 10.22362/ijcert/2016/v3/i9/48875 |
DOI Link | : | |
Paper Title | : | Light Dimmer with Implementation of Data Abstraction While Crashing |
Authors | : | Ansa Babu, Anu Joseph, Filiya Francis and Krishnadas J, , |
Affiliations | : | |
Abstract | : | The paper proposes a system to automatically dim the headlight of opposite vehicles by changing from high beam to low beam. The system envisioned is automatic collision avoidance and detection. Many methods are available to dim the headlight of vehicles. In the earlier days dip mechanism was used. Similarly there are several mechanisms for automatic accident detection. An automatic alarm gadget for traffic accidents is presented. It can consequently discover a car crash; hunt down the spot and after that send the essential data to hospitals. This system will highly aid the search and rescue of vehicles that have met with an accident. |
![]() | : | 10.22362/ijcert/2016/v3/i9/48874 |
DOI Link | : | |
Paper Title | : | Customer Behavior towards Purchasing Mutual Fund- A Study of Dehradun City |
Authors | : | Monirul Islam , , , , |
Affiliations | : | -- |
Abstract | : | Mutual Fund is a retail product designed to target small investors, salaried people and others who are intimidated by the mysteries of stock market but, nevertheless, like to reap the benefits of stock market investing. At the retail level, investors are unique and are a highly heterogeneous group. Hence, their fund/scheme selection also widely differs. Investors demand inter-temporal wealth shifting as he or she progresses through the life cycle. This necessitates the Asset Management Companies (AMCs) to understand the fund/scheme selection/switching behavior of the investors to design suitable products to meet the changing financial needs of the investors. With this background a survey was conducted among 200 Mutual Fund Investors in Dehradun city to study the factors influencing the fund/scheme selection behavior of Retail Investors. This paper discusses the survey findings. It is hoped that it will have some useful managerial implication for the AMCs in their product designing and marketing. Now mutual fund industry is facing competition not only from within the industry but also from other financial products that may provide many of the same economic functions as mutual funds but are not strictly MFs, and in this research project it is discussed which financial product customer like most and the reason why an investor wants that financial product and the reason found with the help of the survey conducted. |
![]() | : | 10.22362/ijcert/2016/v3/i9/48902 |
DOI Link | : | http://www.dx.doi.org/10.22362/ijcert/2016/v3/i9/48902 |
[1] Anjan Chakrabarti and Harsh Rungta, 2000, “Mutual Funds Industry in India: An indepth look into the problems of credibility, Risk and Brandâ€, The ICFAI Journal of Applied Finance, Vol.6, No.2, April, 27-45. [2] De Bondt, W.F.M. and Thaler, R, 1985, “Does the stock market over react?†Journal of Finance, 40, 793-805 [3] Gupta, L.C., 1994, Mutual Funds and Asset Preference, Society for Capital Market Research and Development, Delhi. [4] Helena Agnes S. Valderrama and Carlos C. Bautista University of the Philippines December 2003, “The Development and Performance of the Philippine Mutual Funds Industry†in the context of Philippines. [5] Ippolito, R., 1992, “Consumer reaction to measures of poor quality : Evidence from Mutual Fundsâ€, Journal of Law and Economics, 35, 45-70. [6] Kavitha Ranganathan (M.Phil- Commerce), Maduri Kamaraj University, “A study of fund selection behavior of individual investor towards Mutual Fundâ€, in context of Mumbai City. [7] Madhusudan V. Jambodekar, 1996, Marketing Strategies of Mutual Funds – Current Practices and Future Directions, Working Paper, UTI – IIMB Centre for Capital Markets Education and Research, Bangalore. [8] Raju, September 2006, “Mutual Fund Investment Preferred or Induced?†Portfolio Organizer Vol. .. No. , 33-40. [9] Shankar, V., 1996, “Retailing Mutual Funds: A consumer product modelâ€, The Hindu, July 24, 26. [10] Shanmugham, R., 2000, “Factors Influencing Investment Decisionsâ€, Indian Capital Markets – Trends and Dimensions (ed.), Tata McGraw-Hill Publishing Company Limited, New Delhi, 2000. [11] Sujit Sikidar and Amrit Pal Singh, 1996, Financial Services : Investment in Equity and Mutual Funds – A Behavioural Study, in Bhatia B.S., and Batra G.S., ed., Management of Financial Services, Deep and Deep Publications, New Delhi, Chapter 10, 136-145. [12] Syama Sundar, P.V., 1998, “Growth Prospects of Mutual Funds and Investor perception with special reference to Kothari Pioneer Mutual Fundâ€, Project Report, Sri Srinivas Vidya Parishad, Andhra University, Visakhapatnam. [13] T.R. Rajeswari (Ms. T.R. Rajeswari & Prof. V.E. Rama Moorthy), “ An Empirical Study On Factor Influencing The Mutual Fund/ Scheme Selection By Retail Investor†WEBSITES I. www.amfiindia.com II. www.capitalmarket.com III. www.mutualfundindia.com IV. www.valueresearch.com
Paper Title | : | Classification of Concept Drifting Data Streams Using Adaptive Novel-Class Detection |
Authors | : | Ms. Aparna Yeshwantrao Ladekar, Dr. M.Y. Joshi, , , |
Affiliations | : | MGM’s College of Engineering, SRTMUN University, Nanded |
Abstract | : | In data stream classification there are many problems observed by the data mining community. Four major problems are addressed, such as, concept-drift, infinite length, feature-evolution and concept-evolution. Concept-drift occurs when underlying concept changes which is common in data streams. Practically it is not possible to store and use all data for training purpose whenever required due to infinite length of data streams. Feature evolution frequently occurs in many text streams. In text streams new features like words or phrases may occur when stream progresses. New classes evolving in the data stream which occurs concept-evolution as a result. Most existing classification techniques of data stream consider only the first two challenges, and ignore the latter two. Classification of concept-drifting data stream using adaptive novel-class detection approach is used to solve concept-drift and concept-evolution problem where novel-class detector is maintained with classifier. Novel-class detector is more adaptive to the dynamic and evolving data streams. It enables to detect more than one novel-class simultaneously. This approach solves feature-evolution problem by using feature set homogenization technique. Experiments done on Twitter data set and got reduced ERR rate and increased detection rate as a result. This approach is very effective as compared with existing data stream classification techniques |
![]() | : | 10.22362/ijcert/2016/v3/i9/48901 |
DOI Link | : | http://www.dx.doi.org/10.22362/ijcert/2016/v3/i9/48901 |
[1] Mohammad M. Masud, Member, IEEE, Qing Chen, Member, IEEE, Latifur Khan, Senior Member, IEEE, Charu C. Aggarwal, Fellow, IEEE, Jing Gao, Member, IEEE, Jiawei Han, Fellow, IEEE, Ashok Srivastava, Senior Member, IEEE, and Nikunj C. Oza, Member, IEEE,†Classification and Adaptive Novel-class Detection of Feature-Evolving Data Streams,†IEEE Transactions on Knowledge and Data Engineering, vol. 25, no. 7, July 2013. [2] M.M. Masud, Q. Chen, J. Gao, L. Khan, J. Han, and B.M. Thuraisingham, “Classification and Novel-class Detection of Data Streams in a Dynamic Feature Space,†Proc. European Conf.Machine Learning and Knowledge Discovery in Databases (ECML PKDD), pp. 337-352, 2010. [3] M.M. Masud, J. Gao, L. Khan, J. Han, and B.M. Thuraisingham, “Integrating Novel-class Detection with Classification for ConceptDrifting Data Streams,†Proc. European Conf. Machine Learning and Knowledge Discovery in Databases (ECML PKDD), pp. 79-94, 2009. [4] A. Bifet and R. Kirkby. Data stream mining − a practical approach. http://moa.cs.waikato.ac.nz/downloads/. [5] M.M. Masud, Q. Chen, L. Khan, C. Aggarwal, J. Gao, J. Han, and B.M. Thuraisingham, “Addressing Concept-Evolution in ConceptDrifting Data Streams,†Proc. IEEE Int’l Conf. Data Mining (ICDM), pp. 929-934, 2010. [6] G. Hulten, L. Spencer, and P. Domingos, “Mining Time-Changing Data Streams,†Proc. ACM SIGKDD Seventh Int’l Conf. Knowledge Discovery and Data Mining, pp. 97-106, 2001. [7] Christopher D. Manning, Prabhakar Raghavan & Hinrich Schütz, “Introduction to Information Retrieval,†e, 2008. [8] “Stemmingâ€, http://en.wikipedia.org/wiki/Stemming. [9] M.F.Porter, “An algorithm for suffix stripping,†Computer Laboratory, Cambridge. [10] E.J.Spinosa, A.P. de Leon F. de Carvalho, and J. Gama, “ClusterBased Novel Concept Detection in Data Streams Applied to Intrusion Detection in Computer Networks,â€Proc. ACM Symp. Applied Computing (SAC), pp. 976-980, 2008. [11] I. Katakis, G. Tsoumakas, and I. Vlahavas, “Dynamic Feature Space and Incremental Feature Selection for the Classification of Textual Data Streams, †Proc. IntlWorkshop Knowledge Discovery from Data Streams (ECML/PKDD), pp. 102-116, 2006. [12] M.M. Masud, J. Gao, L. Khan, J. Han, and B.M. Thuraisingham, “Classification and Novel-class Detection in Concept-Drifting Data Streams under Time Constraints,†IEEE Trans. Knowledge and Data Eng., vol. 23, no. 6, pp. 859-874, June 2011. [13] B.Wenerstrom and C.Giraud-Carrier, “Temporal Data Mining in Dynamic Feature Spaces,†Proc. Sixth Int’l Conf. Data Mining (ICDM), pp. 1141-1145, 2006. [14] W. Fan, “Systematic Data Selection to Mine Concept-Drifting Data Streams,†Proc. ACM SIGKDD 10th Int’l Conf. Knowledge Discovery and Data Mining, pp. 128-137, 2004.
Paper Title | : | Relational Database to NoSQL Conversion by Schema Migration and Mapping |
Authors | : | Neelima Kuderu, Dr. Vijaya Kumari, , , |
Affiliations | : | JNTUH, Hyderabad |
Abstract | : | In pc software development, migration from a Data Base Management System (DBMS) to NOSQL, specifically applications like material administration systems with distinct attributes is a challenge for coders and database directors. Changes in the application rule in purchase to comply with new DBMS tend to be generally vast, causing migrations infeasible. In order to tackle this problem that is nagging we present RDBDMS-to-NoSQL by schema migration and query mapping to help conveniently migrating from relational DBMS to NoSQL DBMS. This framework is presented in two components: (1) schema mapping by reverting the forms that are regular, (2) mapping SQL query to NoSQL. Initial one is a set of practices enabling migration that is smooth relational DBMS to NOSQL DBMS. The latter provides a persistence layer to process database needs, becoming capable to translate and execute these demands in any DBMS, going back the information in a format that is suitable really. Experiments shown that the proposed design is scalable and robust to manage volume that is huge of of applications such CMS that contrasted to conventional relational DBMS techniques. |
![]() | : | 10.22362/ijcert/2016/v3/i9/48900 |
DOI Link | : | http://www.dx.doi.org/10.22362/ijcert/2016/v3/i9/48900 |
[1] S. Lombardo, E. Di Nitto, and D. Ardagna, "Issues in Handling Complex Data Structures with NoSQL Databases," Proceedings of the 14th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC), pp. 443-448, Sept. 2012 [2] Yishan Li and S. Manoharan, "A performance comparison of SQL and NoSQL databases," Proceedings of IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM), pp. 15- 19, Aug. 2013. [3] A. Boicea, F. Radulescu, and L.I. Agapin, "MongoDB vs Oracle - - Database Comparison," Proceedings of The 3rd International Conference on Emerging Intelligent Data and Web Technologies (EIDWT), pp.330- 335, Sept. 2012. [4] K. Grolinger, M. Hayes, W.A. Higashino, A. L'Heureux, D.S. Allison, and M.A.M. Capretz, "Challenges for MapReduce in Big Data," Proceedings of IEEE World Congress on Services (SERVICES), pp.182- 189, Jun. 2014. [5] W. Naheman and Jianxin Wei, "Review of NoSQL databases and performance testing on HBase," Proceedings of International Conference on Mechatronic Sciences, Electric Engineering and Computer (MEC), pp. 2304-2309, Dec. 2013. [6] M. Scavuzzo, E. Di Nitto, and S. Ceri, "Interoperable Data Migration between NoSQL Columnar Databases," Proceedings of IEEE 18th International Enterprise Distributed Object Computing Conference Workshops and Demonstrations (EDOCW), pp.154-162, Sept. 2014. [7] Jen-Chun Hsu, Ching-Hsien Hsu, Shih-Chang Chen, and YehChing Chung, "Correlation Aware Technique for SQL to NoSQL Transformation," Proceedings of the 7th International Conference on Ubi-Media Computing and Workshops (UMEDIA), pp. 43-46, Jul. 2014. [8] Gansen Zhao, Libo Li, Zijing Li, and Qiaoying Lin, "Multiple Nested Schema of HBase for Migration from SQL," Proceedings of 9th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), pp.338-343, Nov. 2014. [9] Gansen Zhao, Qiaoying Lin, Libo Li, and Zijing Li, "Schema Conversion Model of SQL Database to NoSQL," Proceedings of 9th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), pp.355-362, Nov. 2014. [10] R. Sellami, S. Bhiri, and B. Defude, "ODBAPI: A Unified REST API for Relational and NoSQL Data Stores," Proceedings of IEEE International Congress on Big Data (BigData Congress), pp.653-660, Jun. 2014. [11] Xiang Li, Zhiyi Ma, and Hongjie Chen, "QODM: A queryoriented data modeling approach for NoSQL databases," Proceedings of IEEE Workshop on Advanced Research and Technology in Industry Applications (WARTIA), pp.338-345, Sept. 2014. [12] A. Gadkari, V.B. Nikam, and B.B. Meshram, "Implementing Joins over HBase on Cloud Platform," Proceedings of IEEE International Conference on Computer and Information Technology (CIT), pp. 547- 554, Sept. 2014. [13] Zhou Wei, G. Pierre, and Chi-Hung Chi, "Scalable Join Queries in Cloud Data Stores," Proceedings of the 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid), pp.547- 555, May 2012. [14] R. Lawrence, "Integration and Virtualization of Relational SQL and NoSQL Systems Including MySQL and MongoDB," Proceedings of International Conference on Computational Science and Computational Intelligence (CSCI), pp.285-290, Mar. 2014. [15] D. Van Hieu, S. Smanchat, and P. Meesad, "MapReduce join strategies for key-value storage," Proceedings of the 11th International Joint Conference on Computer Science and Software Engineering (JCSSE), pp.164-169, May 2014. [16] Mysql proxy. http://dev.mysql.com/refman /5.6/en/mysqlproxy.html. Accessed:2014-09-24. [17] Roberto Ierusalimschy, Luiz Henrique de Figueiredo, and Waldemar Celes Filho. Lua—an: Ex-tensible extension language. Softw. Pract. Exper., 26(6):635–652, June 1996. [18] Jsql parser. http://jsqlparser.sourceforge.net/. Accessed:2014- 09-24. [19] Mongodb mapping chart. http://docs.mongodb.org/ manual/reference/sql-comparison. Accessed:2014-09-24.
Paper Title | : | Cryptographic Protocol Based Laurel System for Multi agent Distributed Communication |
Authors | : | Sreedhar Jyothi, Dr. A. Damodar, , , |
Affiliations | : | JNTU, Ananthapur 2VC, SVU |
Abstract | : | In order to expedite detection of unfaithful and malicious agents, an agent recognition mechanism is proposed for multi agent communication, which is based on a laurel model and a cryptographic protocol. A laurel system for multi agent communication can be let down by a set of malicious agents. Such a group can maliciously raise the laurel of one or more agents of the group. There is no known method to protect a laurel system against swindler agent groups. So there is a need for false proof laurel management mechanism to avoid malicious agents providing false state of laurel. The modern systems that entertain multi-agent communication are more vulnerable to agents who behaves maliciously or simply do not cooperate. The lack of core level trusted third party in multi agent communication strategy postures distinctive issues for laurel management. These issues feature agent recognition strategy, dependable laurel maintenance. The disadvantage of the existing system is the laurel of the agent that responds to a request is considered but the credibility of the agent that attempts to update the laurel of the other agent is ignored. This proposal aims to devise a model to encapsulate the laurel of both the agent that respond and the agent that request. The proposed protocol reduces the number of malicious transactions. It also manages the issue of highly inconsistent accessibility pattern of the agents in multi agent communication based systems. |
![]() | : | 10.22362/ijcert/2016/v3/i9/48899 |
DOI Link | : | http://www.dx.doi.org/10.22362/ijcert/2016/v3/i9/48899 |
[1] J.M. Vidal and E.H. Durfee, ‚The impact of Nested Agent Models in an Information Economy‛, Second Int. Conf. on Multi-Agent Systems, 377-384, 1996. [2] J. Sabater, ‚Trust and Reputation for Agent Societies‛, Phd Thesis, Universitat Autnoma de Barcelona, 2003. [3] S. Sen and N. Sajja, ‚Robustness of Reputation-based Trust: Boolean Case‛, Proc. of the First Int. Joint Conf. on Autonomous Agents and Multiagent Systems (AAMAS-02), Bologna, Italy, 288–293, 2002. [4] M. Wooldridge, An Introduction to MultiAgent Systems, Chichester: John Wiley and Sons, 2002. [5] T. Tran and R. Cohen, ‚Learning Algorithms for Software Agents in Uncertain and Untrusted Market Environments‛, Proc. of the Eighteenth Int. Joint Conf. on Artificial Intelligence, 2003. [6] B. Krulwich, ‚The Bargainfinder Agent: Comparision Price Shopping on the Internet‛, Bots, and other Internet Beasties, J. Williams (Ed.), 257-263, Macmillan Computer Publishing, 1996. [7] R. Till, ‚Transforming the way we do business‛, In: Electronic Commerce, T.Nash, editor, 9-12, Kogan Page, London, UK, 1998 [8] M. He, N. R. Jennings, and H. Leun. "On Agent-Mediated Electronic Commerce" IEEE Trans on Knowledge and Data Engineering, Vol. 15(4) 985-1003, 2003. [9] S. D. Ramchurn, T. D. Huynh, and N. R. Jennings, ‚Trust in Multi-Agent systems‛, The Knowledge Engineering Review, Vol. 19(1), 1-25, 2004. [10] K. Regan, T. Tran, and R. Cohen, ‚Sharing Models of Sellers amongst Buying Agents in Electronic Marketplaces‛, Decentralized Agent Based and Social Approaches to User Modelling (DASUM), July 2005. [11] R. Jurca, and Faltings, B. (2003). ‚Towards IncentiveCompatible Reputation Management‛, In: Trust, reputation and security: theories and practice, Lecture Notes in AI, R. Falcone, S. Barber, L. Korba, & M. Singh, (Eds.), SpringerVerlag, Vol. 2631, 138–147, 2003. [12] T. Tran, ‚Reputation-Oriented Reinforcement Learning Strategies for Economically-Motivated Agents in Electronic Market Environment‛, Ph.D. Dissertation, University of Waterloo, 2003. [13] K. Regan, and R. Cohen, ‚A Model of Indirect Reputation Assessment for Adaptive Buying Agents in Electronic Markets‛, Business Agents and the Semantic Web (BASeWEB), May 2005. [14] R.H. Guttman and P. Maes, ‚Agent-mediated Electronic Commerce: A Survey‛, The Knowledge Engineering Review, Vol. 13(2), 147-159, 1998. [15] P. Maes, "Artificial Life Meets Entertainment: Life like Autonomous Agents," Communications of the ACM, Vol. 38(11), 108-114, 1995. [16] A. Abdul-Rahman and S. Hailes, ‚Supporting Trust in Virtual Communities‛, Proc. Hawaii International Conference on System Sciences, Maui, Hawaii, 2000. [17] C. Dellarocas, ‚Towards Incentive-compatible Reputation Management‛, Workshop on Deception, Fraud and Trust in Agent Societies, Bologna, Italy, 26–40, 2002. [18] M. Wooldridge and N. Jennings, ‚Intelligent Agents: Theory and Practice‛, The Knowledge Engineering Review, Vol. 10(2), 115-152, 1995. [19] EBay, www.ebay.com . [20] R.B Doorenbos, O. Etzioni, and D. Weld, ‚A Scalable Comparison-Shopping Agent for the World Wide Web‛, First Int. Conf. on Autonomous Agents, 39- 48, 1997. [21] P. Maes, R.H. Guttman, and A.G. Moukas, ‚Agents that Buy and Sell‛, Communications of the ACM, Vol. 42(3), 81-91, 1999. [22] B. Esfandiari and S. Chandrasekharan, ‚On How Agents Make Friends: Mechanisms for Trust Acquisition‛, Proc. of the Fifth Int. Conf. on Autonomous Agents Workshop on Deception, Fraud and Trust in Agent Societies, 27-34, 2001. [23] J. Carbo, J. Molina, and J. Davila, ‚Comparing Predictions of SPORAS vs. a Fuzzy Reputation Agent System‛, Third Int .l Conf. on Fuzzy Sets and Fuzzy Systems, Interlaken, 147–153, 2002. [24] D. Huynh, N.R. Jennings, and N.R. Shadbolt, ‚Developing an Integrated Trust and Reputation Model for Open Multi-Agent Systems‛, Proc. of 7th Int. Workshop on Trust in Agent Societies, 65-74, New York, USA, 2004. [25] Amazon, www.amazon.com . [26] C. Goldman, S. Kraus, and O. Shehory, ‚Equilibria Strategies for Selecting Sellers and Satisfying Buyers,‛ In: Lecture Notes in Artificial Intelligence, M. Klusch and F. Zambonelli (Eds.), Springer, Vol. 2182, 166-177, 2001. [27] J. Carter, E. Bitting, and A. Ghorbani, ‚Reputation Formalization for an Information-Sharing Multi-Agent System‛, Computational Intelligence, Vol. 18(2), 515–534, 2002. [28] T.D. Huynh, N.R. Jennings, and N.R. Shadbolt, ‚An Integrated Trust and Reputation Model for Open Multi-Agent Systems‛, Autonomous Agents and Multi-Agent Systems, Vol. 13(2), 119-154, Sep. 2006. [29] S. Marsh, ‚Formalizing Trust as a Computational Concept‛, Ph.D. Thesis, Department of Mathematics and Computer Science, University of Stirling, 1994. [30] B. Yu and M.P. Singh, ‚A Social Mechanism of Reputation Management in Electronic Communities‛, Cooperative Information Agents (CIA), Vol. 24, 154-165, Boston, USA, 2000. [31] T. Grandison, and M. Sloman, ‚A Survey of Trust in Internet Application‛, IEEE Communications Surveys, Vol. 4(4), 2-16, 2000. [32] Y. Mass, and O. Shehory, ‚ Distributed Trust in Open MultiAgent Systems‛, In: Trust in cyber-societies, R. Falcone, M. Singh, & Y. Tan, (Eds.), Springer-Verlag, 159–173, 2001. [33] C. Castelfranchi, and R. Falcone, ‚Principles of Trust for MAS: Cognitive Anatomy, Social Importance, and Quantification‛, Proc. of the Intel Conf. on Multi-Agent Systems (ICMAS’98), Paris, France, 72–79, 1998. [34] A. Greenwald and J. Kephart, ‚Shopbots and Pricebots‛, Proc. of the Sixteenth Int. Joint Conf . on Artificial Intelligence, Vol. 1, 506-511, 1999 [35] G. Zacharia and P. Maes, ‚Trust Management through Reputation Mechanisms‛, Applied Artificial Intelligence, Vol. 14(9), 881-907, 2000 [36] A. Chavez and P. Maes, ‚Kasbah: An Agent Marketplace for Buying and Selling Goods‛, First Int. Conf. on the Practical Application of Intelligent Agents and Multi-Agent Technology, London, UK, 1996. [37] J. Sabater and C. Sierra ‚ REGRET: A Reputation Model for Gregarious Societies‛, Proc. of the Fifth Int. Conf. on Autonomous Agents, Montreal, Canada, 194-195, 2001. [38] T. Sandholm, ‚Distributed Rational Decision Making‛, In: Multi-Agent Systems: A Modern Approach to Distributed Artificial Intelligence, Weiss, G. (ed.), MIT Press, 1999. [39] J. Sabater and C. Sierra, ‚Review on Computational Trust and Reputation Models‛, Artificial Intelligence Review, Vol. 24(1), 33-60, 2005 [40] M. Schillo, M. Rovatsos, and P. Funk, ‚ Using Trust for Detecting Deceitful Agents in Artificial Societies‛, Special Issue of the Applied Artificial Intelligence Journal on Deception, Fraud and Trust in Agent Societies, Vol.14(8), 825– 848, 2000.
Paper Title | : | Optimization of Resistance Spot Welding of 304 Steel Using GRA |
Authors | : | M.R. Rawal, R.R. Kolhapure, S.S. Sutar and V.D. Shinde, , |
Affiliations | : | Department of Mechanical Engineering, DKTE Society’s Textile and Engineering Institute, Ichalkaranji, -416115(India) |
Abstract | : | Resistance spot welding (RSW) quality is mainly depends upon the parameters and their levels selected, like welding current, electrode force and welding time etc. So selection of optimal parameter levels plays an important role. Therefore, optimization of weld tensile strength and nugget diameter is selected for study. In this paper, use of Taguchi with Grey relational analysis (GRA) method to determine significant process parameters and their levels for optimal tensile shear strength (T-S) and nugget diameter (N-D) is reported. Taguchi based L27 (33) orthogonal array is selected for experimentation. Experiments are carried out on Stainless Steel 304. The level of importance of the welding parameters on the tensile shear strength and nugget diameter is determined by using analysis of variance (ANOVA) using Minitab 16 software. To improve the spot weld quality (i.e. T-S and N-D) multi objective process parameter optimization is performed using grey relational analysis. |
![]() | : | 10.22362/ijcert/2016/v3/i9/48869 |
DOI Link | : | http://www.dx.doi.org/10.22362/ijcert/2016/v3/i9/48869 |
[1] A. V. Dennison, D. J. Toncich, and S. Masood, Control and Process-Based Optimization of Spot-Welding in Manufacturing Systems, International Journal of Advance Manufacturing Technology, 1997, 13, p 256-263. [2] U. Esme, Application of Taguchi Method for the Optimization of Resistance Spot Welding Process, The Arabian Journal for Science and Engineering, 2008, 34, p 519-528. [3] A. G. Thakur, and V. M. Nandedkar, Application of Taguchi Method to Determine Resistance Spot Welding Condition of Austenitic Stainless Steel AISI 304, Journal of Scientific and Industrial Research, 2010, 69, p 680-683. [4] N. Muhammad, and H. P. Manurung, Design Parameters Selection and Optimization of Weld Zone Development in Resistance Spot Welding, World Academy of Science, Engineering and Technology, 2012, 72, p 1220-1225. [5] D. Das., A. Sahoo, R. Das, and B. Routara, Investigations on Hard Turning Using Coated Carbide Insert: Grey based Taguchi and Regression Methodology, Procedia Material Science, 2014, 6, p 1351-1358. [6] M. Durairaj , D. Sudharsun , and N. Swamynathan , Analysis of Process Parameters in Wire EDM with Stainless Steel using Single Objective Taguchi Method and Multi Objective Grey Relational Grade, Procedia Engineering, 2013, 64 , p 868-877. [7] J.L. Lin, and C. L. Lin, The Use of The Orthogonal Array With Grey Relational Analysis to Optimize the Electrical Discharge Machining Process With Multiple Performance Characteristics,†International Journal of Machine Tools and Manufacture, 2002, 42, p 237- 244. [8] C. L. Lin, J. L. Lin, and T. C. Ko, Optimization of the EDM Process Based on the Orthogonal Array with Fuzzy Logic and Grey Relational Analysis Method, International Journal of Advanced Manufacturing Technology, 2002, 19, p 271-277. [9] N. Tosun, Determination of Optimal Parameter for MultiPerformance Characteristics in Drilling by Using Grey Relational Analysis, International Journal of Advanced Manufacturing Technology, 2006, 28, p 450-455. [10] U. A. Dabade, Multi-objective Process Optimization to Improve Surface Integrity on Turned Surface of Al/SiCp Metal Matrix Composites Using Grey Relational Analysis, Procedia CIRP, 2013, 7, p 299-304. [11] A.S Shivade, and V.D Shinde, Multi-objective Optimization in WEDM of D3 Tool Steel Using Integrated Approach of Taguchi Method and Grey Relational Analysis, Journal of Industrial Engineering international, 2014, 10, p 149-162. [12] R. Kolhapure, V. D. Shinde and V. A. Kamble, Optimization of Strain Gauge Transducer for Weighing Application Using GRA Method, Asian Journal of Engineering and Applied Technology, 2015, 4, p 1-7
Paper Title | : | Achieving better Authentication and Copyright protection Using DWT and SVD Based Watermarking Scheme |
Authors | : | Anil Kumar Uppula, Srinivasulu Tadisetty , , , |
Affiliations | : | Dept of ECE, KU College of Engineering and Technology, Warangal, Telangana, (506132), INDIA |
Abstract | : | Digital watermark has created ample solutions for securing hidden information in digital images. Incidental hacking and accidental hacking has increased in modern world which paves way for copying the legal information in illegal way. Although digital image processing has registered enormous growth in last few years but providing proper security to privacy information is still unresolved issue and watermarking is considered as accurate solution to all authentication and copyright protection issues in optimized way. DWT-SVD combinational watermarking scheme is proposed in this work for effective performance to provide good authentication and copyright protection and both techniques solves the technical issues related to embedding and ext raction of information in three planes R (Red), G (Green) and B (Blue). Finally simulation results shows that the proposed method provides good performance over traditional state of art methods in effective way. |
![]() | : | 10.22362/ijcert/2016/v3/i9/48868 |
DOI Link | : | http://www.dx.doi.org/10.22362/ijcert/2016/v3/i9/48868 |
[1] Wang Hui-Qin; Zhao Min; , “A Blind Watermarking Algorithm for Color Image Based on Singular Value Quantization†6th International Conference on Digital Content, Multimedia Technology and its Applications (IDC), 2010 ,PP 59 – 62,IEEE. [2] Yan Xing and Jieqing Tan, A Color Watermarking Scheme Based on Block-SVD and Arnold Transformation, Second Workshop on Digital Media and its Application in Museum & Heritages, PP 3 – 8,IEEE 2007. [3] Jianyong Huang and Changsheng Yang , Image Digital Watermarking Algorithm Using Multiresolution Wavelet Transform, IEEE International Conference on Systems, Man and Cybernetics,PP 2977 - 2982 ,vol.3,IEEE 2004 . [4] Chaokun Wang; Jianmin Wang; Ming Zhou; Guisheng Chen; Deyi Li; ATBaM: An Arnold Transform Based Method onWatermarking Relational Data, . International Conference on Multimedia and Ubiquitous Engineering, 2008. MUE 2008,PP 263 – 270,IEEE 2008 [5] Mabtoul, S.; Hassan, E.; Elhaj, I.; Aboutajdine, D.;†Robust color image watermarking based on singular value decomposition and Dual tree complex wavelet transform†14th IEEE International Conference on Electronics, Circuits and Systems, 2007. ICECS 2007.,PP 534 – 537,IEEE [6] Deng Jianghua ,â€Color Image Digital Watermarking Algorithm Based on Singular Value Decompositionâ€, International Conference on Multimedia Information Networking and Security, 2009. MINES '09. PP 130 – 133,IEEE [7] Wang Hui-qin; HaoJi-chao; Cui Fu-ming; Color Image Watermarking Algorithm Based on the Arnold Transform, 2010 International Conference on Communications and Mobile Computing,PP 66 – 69,IEEE 2010 [8] Liu Fang; Wang YuKai; “ Restoring Of The Watermarking Image In Arnold Scramblingâ€, 2nd International Conference on Signal Processing Systems (ICSPS),PP V1-771 - V1-774,IEEE 2010 [9] Chih-Chin Lai; Cheng-Chih Tsai; Digital Image Watermarking Using Discrete Wavelet Transform and Singular Value Decomposition , IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, VOL. 59, NO. 11, NOVEMBER 2010 [10]. Fanzhi Kong; YizhunPeng; “Color Image Watermarking Algorithm Based On HSI Color Space†, 2nd International Conference on Industrial and Information Systems (IIS), PP 464 – 467,IEEE 2010
Paper Title | : | Mitigation of ICI Through Optimized SSR ICI Self Cancellation Scheme in OFDM |
Authors | : | Shyam Sunder Kongonda , Dr.Srinivasulu Tadishetty, , , |
Affiliations | : | Kakatiya University College of Engineering and Technology, Warangal, India |
Abstract | : | Orthogonal frequency division multiplexing (OFDM) is extensively used in wireless communication systems because it offers high data rates and provides a better solution to inter symbol interference (ISI) caused by a multipath channel. A well known problem of OFDM system is sensitive to carrier frequency offset (δ) between the transmitted and received signals. The Frequency offset in wireless communication systems ruins the Orthogonality between subcarriers resulting in Inter Carrier Interference (ICI).Which is a severe problem in OFDM system and eventually decrease the performance of the system. There are numerous techniques are in existence to mitigate the effect of ICI caused by CFO (carrier frequency offset). This paper investigates an innovative ICI cancellation method termed as optimized SSR (symmetric symbol repeat) ICI self cancellation scheme. The proposed method utilizes an optimum data allocation (1,-λ) and combining (1,-µ) scheme to improve CIR performance for an estimated normalized frequency offset δ. However, this requires continuous CFO estimation and feedback circuitry. To avoid the requirement of CFO, sub optimal values (λso, µso) are considered for combating the effect of ICI. This paper mainly focus on comparison of proposed method with the previous reduction methods and standard OFDM system in terms of CIR (carrier to interference) & BER (bit error rate) performance. |
![]() | : | 10.22362/ijcert/2016/v3/i9/48867 |
DOI Link | : | http://www.dx.doi.org/10.22362/ijcert/2016/v3/i9/48867 |
[1] Y.Wu and W. Y. Zou, “Orthogonal frequency division multiplexing: A multicarrier modulation schemeâ€, IEEE Transaction on Consumer Electronics, vol. 41, no. 3,pp 392-399, Aug. 1995 [2] R. van Nee and R. Prasad, OFDM for Wireless Multimedia Communications. Norwood, MA: Artech House, 2000 [3] P.H.Moose, “A Technique for orthogonal frequency division multiplexing frequency offset correction,’’, IEEE Trans. Commun., vol.42, pp2908-2914, Oct. 1994. [4] Zhao Y, Haggman SG. “Inter carrier Interference SelfCancellation Scheme for OFDM Mobile Communication Systemsâ€, IEEE Trans.Commun 2001; 49(7): 1185-1191 [5] Yeh HG, Chang YK, Hassibi B. “A scheme for cancelling inter carrier interference using conjugate transmission in multicarrier communication systemsâ€, IEEE Trans. Wireless Communication 2007; 6(1): 3-7. [6] Wang C-L, Huang Y-C. “Inter carrier Interference Cancellation Using General Phase Rotated Conjugate Transmission for OFDM Systemsâ€, IEEE Transactions on Communications 2010; 58(3): 812-819. [7] K.Sathanantham, R.M.A.P.Rajatheva and Slimane Ben Slimane “Analysis of OFDM in the Presence of Frequency Offset and a Method to Reduce Performance Degradation†Global Tele communications Conference, 2000. GLOBECOM '00. IEEE,vol. 1,pp. 72-76, 2000 [8] Ashish goel, ankit nagpal and jasmeet kaur, "Optimized data allocation and combining scheme for ICI self cancellation in OFDM system" IEEE 978-1-4673-1989-8/12, Aug 2012. [9] J. H. Mathews, K. K. Fink, “Numerical Methods using Mat lab’, 4thedition, Prentice-Hall Inc. , 2004.
Paper Title | : | Agile Methodology in Theory and Practice an Indian Perspective |
Authors | : | Dr. Himanshu Aggarwal , Ms.Khushdeep Sharma, , , |
Affiliations | : | Department of Computer Engineering Punjabi University, Patiala India |
Abstract | : | During the past years, many new software development methodologies were introduced to develop the high quality software in short period of time with minimal costs and within unpredictable changing environment and Agile Methodology is one of them. This paper presents the difference between the agile methodology concepts in reality and in theory. For this data is collected from four small scale industries that are using Agile methodologies concepts during software development and analysis about the practical adoption level of Agile is framed out. |
![]() | : | 10.22362/ijcert/2016/v3/i9/48866 |
DOI Link | : | http://www.dx.doi.org/10.22362/ijcert/2016/v3/i9/48866 |
[1] Beck, Kent; et al. (2001). "Manifesto for Agile Software Development" Agile Alliance retrieved 14 June, 2010 [2] Manish et al, “A Detail Study of Agile Software Development with Extreme Programmingâ€.International Journal of Advanced Research in Computer Science and Software Engineering 5(10), October- 2015, pp. 719-725. [3] Leo R. Vijayasarathy, “AGILE SOFTWARE DEVELOPMENT: A SURVEY OF EARLY ADOPTERSâ€. Journal of Information Technology Management, 2008. [4] Nayab Zya, “AGILE METHODOLOGIES IN SOFTWARE DEVELOPMENTâ€. International Journal of Engineering Technology, Management and Applied Sciences, 2014. [5] Sakshi Sachdeva, “Agile Methodologiesâ€, 2016", International Journal of Computer Science and Information Technologies, Vol. 7 (1) , 2016, 40-44. [6] MALIK HNEIFe, “Review of Agile Methodologies in Software Developmentâ€. International Journal of Research and Reviews in Applied Sciences, 2009. [7] Dan Turk, “Limitations of Agile Software Processesâ€, Third International Conference on Extreme Programming and Flexible processes in Software Engineering, XP 2002, May 26-30, Alghero, Italy, pg 43-46, 2002. [8] Richard Downs, "Challanges of Migration to Agile Methodologiesâ€, COMMUNICATIONS OF THE ACM May 2005/Vol. 48, No. 5 [9] Bjørnar Tessem, "Experiences in Learning XP Practicesâ€. Springer-Verlag Berlin Heidelberg 2003. [10] Sonia Thakur, "Role of Agile Methodology in Software Development." IJCSMC, Vol. 2, Issue. 10, October 2013, pg.86 – 90[11] IEEE Standards Collection: Software Engineering, I. S. 610.12-1990, 1993. [12] W. W. Royce, "Managing the development of large software systems: concepts and techniques," presented at the Proceedings of the 9th international conference on Software Engineering, Monterey, California, United States, 1987. [13] B. W. Boehm, "A Spiral Model of Software Development and Enhancement," Computer, vol. 21, pp. 61-72, 1988. [14] R. S. Pressman, Software Engineering: A Practitioner's Approach, 6 ed.: McGraw - Hill International Edition, 2005. [15] (2001). Manifesto for Agile Software Development. Available: www.agilemanifesto.org
Paper Title | : | Investigate the effectt of approaching angle on cutting force during EN 8 steel turning |
Authors | : | V. B. Magdum, , , , |
Affiliations | : | Dept., of CS&E, JNTU, Ananthapur, |
Abstract | : | This paper deals ith the measurement of cutting force generated in turning for different cutting parameters and diferrent tools having various approaching angles while machining EN 8 steel. The approaching angles of the cutting tool were changed using selected parameters; and cutting force components were measured. The selected cutting variables and tools with diferrent approaching angles were tested practically under workshop conditions. During the experimentation, cutting speed and depth of cut were kept constant and each experiment was conducted with new sharp tools. Finally, the effects of cutting parameters and approaching angles on cutting force were analyzed. A cylindrical EN 8 workpiece was turned using carbide tools for three diferrent approaching angles (60ÌŠ, 75ÌŠ and 90ÌŠ). A total 9 experiments were carried out with three feed rates (0.065, 0.13 and 0.26 mm/rev) for each approaching angle, keeping the cutting speed (384 rpm) and depth of cut (1 mm) constant. During the experimentation forces were measured using dynamometer. The experimental result show that the thrust force were decreased by increasing approaching angles and feed force were increased by increasing approaching angles |
![]() | : | 10.22362/ijcert/2016/v3/i9/48865 |
DOI Link | : | http://www.dx.doi.org/10.22362/ijcert/2016/v3/i9/48865 |
[1] S. Lombardo, E. Di Nitto, and D. Ardagna, "Issues in Handling Complex Data Structures with NoSQL Databases," Proceedings of the 14th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC), pp. 443-448, Sept. 2012 [2] Yishan Li and S. Manoharan, "A performance comparison of SQL and NoSQL databases," Proceedings of IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM), pp. 15- 19, Aug. 2013. [3] A. Boicea, F. Radulescu, and L.I. Agapin, "MongoDB vs Oracle - - Database Comparison," Proceedings of The 3rd International Conference on Emerging Intelligent Data and Web Technologies (EIDWT), pp.330- 335, Sept. 2012. [4] K. Grolinger, M. Hayes, W.A. Higashino, A. L'Heureux, D.S. Allison, and M.A.M. Capretz, "Challenges for MapReduce in Big Data," Proceedings of IEEE World Congress on Services (SERVICES), pp.182- 189, Jun. 2014. [5] W. Naheman and Jianxin Wei, "Review of NoSQL databases and performance testing on HBase," Proceedings of International Conference on Mechatronic Sciences, Electric Engineering and Computer (MEC), pp. 2304-2309, Dec. 2013. [6] M. Scavuzzo, E. Di Nitto, and S. Ceri, "Interoperable Data Migration between NoSQL Columnar Databases," Proceedings of IEEE 18th International Enterprise Distributed Object Computing Conference Workshops and Demonstrations (EDOCW), pp.154-162, Sept. 2014. [7] Jen-Chun Hsu, Ching-Hsien Hsu, Shih-Chang Chen, and YehChing Chung, "Correlation Aware Technique for SQL to NoSQL Transformation," Proceedings of the 7th International Conference on Ubi-Media Computing and Workshops (UMEDIA), pp. 43-46, Jul. 2014. [8] Gansen Zhao, Libo Li, Zijing Li, and Qiaoying Lin, "Multiple Nested Schema of HBase for Migration from SQL," Proceedings of 9th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), pp.338-343, Nov. 2014. [9] Gansen Zhao, Qiaoying Lin, Libo Li, and Zijing Li, "Schema Conversion Model of SQL Database to NoSQL," Proceedings of 9th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), pp.355-362, Nov. 2014. [10] R. Sellami, S. Bhiri, and B. Defude, "ODBAPI: A Unified REST API for Relational and NoSQL Data Stores," Proceedings of IEEE International Congress on Big Data (BigData Congress), pp.653-660, Jun. 2014. [11] Xiang Li, Zhiyi Ma, and Hongjie Chen, "QODM: A queryoriented data modeling approach for NoSQL databases," Proceedings of IEEE Workshop on Advanced Research and Technology in Industry Applications (WARTIA), pp.338-345, Sept. 2014. [12] A. Gadkari, V.B. Nikam, and B.B. Meshram, "Implementing Joins over HBase on Cloud Platform," Proceedings of IEEE International Conference on Computer and Information Technology (CIT), pp. 547- 554, Sept. 2014. [13] Zhou Wei, G. Pierre, and Chi-Hung Chi, "Scalable Join Queries in Cloud Data Stores," Proceedings of the 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid), pp.547- 555, May 2012. [14] R. Lawrence, "Integration and Virtualization of Relational SQL and NoSQL Systems Including MySQL and MongoDB," Proceedings of International Conference on Computational Science and Computational Intelligence (CSCI), pp.285-290, Mar. 2014. [15] D. Van Hieu, S. Smanchat, and P. Meesad, "MapReduce join strategies for key-value storage," Proceedings of the 11th International Joint Conference on Computer Science and Software Engineering (JCSSE), pp.164-169, May 2014. [16] Mysql proxy. http://dev.mysql.com/refman /5.6/en/mysqlproxy.html. Accessed:2014-09-24. [17] Roberto Ierusalimschy, Luiz Henrique de Figueiredo, and Waldemar Celes Filho. Lua—an: Ex-tensible extension language. Softw. Pract. Exper., 26(6):635–652, June 1996. [18] Jsql parser. http://jsqlparser.sourceforge.net/. Accessed:2014- 09-24. [19] Mongodb mapping chart. http://docs.mongodb.org/ manual/reference/sql-comparison. Accessed:2014-09-24.
Paper Title | : | Analytical and Parametric Optimization of Force Transmissibility by Taguchi Method for Double Stage Engine Mountings |
Authors | : | G.C.Mekalke, R.R.Kolhapure, , , |
Affiliations | : | DKTE’S Textile and Engineering Institute, Ichalkaranji |
Abstract | : | It is essential to design a warship to avoid detection by submarines or enemy ships. One of the recent techniques used is to mount all vibrant machinery on a double stage vibration isolation system. For high structure-borne noise attenuation there is requirement of two-stage mounting system. The main goal of current research work is to reduce vibration levels from machinery to foundation, and thereby to reduce radiate noise levels from ship hull. The present work deals with the mathematical modeling and parametric optimization of force transmissibility (Ftr) for design of engine foundation system. The vertical vibrations of the system are assumed to be most predominant, and other types of vibrations are neglected. The research work is carried out for finding parameters of mounts and optimizing the same. The analysis is based on discrete system modeling. Taguchi method is used for finding optimal combination of process parameters based on S/N ratio and analysis of variance (ANOVA) is statistical technique to investigate contribution of each process parameters on the performance characteristic. The result shows that spring stiffness is most affecting process parameter. |
![]() | : | 10.22362/ijcert/2016/v3/i9/48864 |
DOI Link | : | http://www.dx.doi.org/10.22362/ijcert/2016/v3/i9/48864 |
[1] Adigunaa, H, M Tiwaria, and H E Tsengb."Transient Response of a Hydraulic Engine Mount." Scientific Research Laboratory, Center of Automotive Research Oh43210-1107, No.Mi48124 (Dec 2002). [2] Gaul, L N. "Substructure Behavior of Resilient Support Mounts for Single and Double Stage Mounting Systems." Mechanical Systems and Signal Processing. 5(1991). [3] Hutton, S G. Optimization of Vibration Mounts Properties for Application to Shipboard Diesel Engines. Technical Report Drea Cr 2000-077,Defence Research Establishment Atlantic, Jan 2001. [4] Joong, Jae Kim, and Young Kim Heon. "Shape Design of an Engine Mount by a Method of Parameter Optimization." Kwangmyungshi,Kyungki (Department of mechanical engineering, Kwangweon national university),may 1994: 781-88. [5] Muravyov, A, and S G Hutton. "Analysis of an Engine-Mount System with Time-Dependent and Velocity Matrices." Univercity of British Columbia, Vancouver. Canada: Department of Mechanical, 14 August 1997.Peter, J, Ran Tian, and K Chris. "A Study of Vibration and Vibration Control of Ship Structures." Marine Structures 22(4) (2009): 730-743. [6] Ramachandran, T, And K P Padmanaban. "Review On Internal Combustion Engine Vibrations and Mountings." Psna College of Engineering and Technology, Dindigul. Tamilnadu. [7] Singh, R. "Dynamic Design of Automotive Systems: Engine Mounts and Structural Loints."Department of Mechanical Engineering, Ohio State University. [8] Tao, J S, and G R Liu. "Design optimization of marine engine mount system." journal of sound and vibration 235(3) (2000): 474-494. [9] Vijayan, V, And T Karthikeyan. "Design and Analysis of Compliant Mechanism for Active Vibration Isolation Using Fea Technique."International Journal of Recent Trends in Engineering 1, No.5 (May 2009). [10] Yunhe, Yu, G Naganathan Nagi, and v Dukkipati Rao. "A literature review of automotive vehicle engine mounting systems."Mechanical, Industrial and Manufacturing Journal (The univercity of Toledo) Ct06430, no.OH43606 (1999). [11]Durairaj M., Sudharsun D., Swamynathan N.,(2013) “Analysis of Process Parameters in Wire EDM with Stainless Steel using Single Objective Taguchi Method and Multi Objective Grey Relational Grade,†Procedia Engineering, 64 ,868 – 877. [12]Raghuraman S., Thiruppathi K., Panneerselvam T., Santosh S., (2013)“Optimization of EDM Parameters using Taguchi Method and Grey Relation Analysis for Mild Steel IS 2026,†International Journal of Innovative Research in Science, Engineering and Technology,2,7,3095-3104. [13]Dean E., (1991) “Taguchi Approach to Design Optimization for Quality and Cost: An Overview,†Annual Conference of the International Society of Parametric Analysis, 1-9. [14] Rao R., (2011), “Advanced Modeling and optimization of Manufacturing Processes,â€International Research and Development Springer, 1-380.
Paper Title | : | Propeller Shaft in Automobile: Review the Allocation Procedure in Front Axle and springs |
Authors | : | Dr Porag Kalita, , , , |
Affiliations | : | Head: Automobile Engineering Department, Govt. of Assam,Vocational Education (+2), M R S Higher Secondary School, Titabor, Assam. |
Abstract | : | While vehicle on moving position, torque is converted from the rear wheel through the propeller shaft. The propeller shaft, which is transmit full engine power from the gear box to the differential and propeller shaft one end connected to the gear box, while the other is connected to the differential in the rear axle assembly. As per study it was found that while vehicle is moving on the curve road or angle in turning moment on the road surfaces , without propeller shaft may caused accident , if vehicle rear wheel drive. Because the distance between gear box and differential changes when the vehicle encounters an uneven surface. Axles act as axis for the wheels to spin around and it is consists by Live Axles and Dead Axle. For the example, live axle which contain differential and through rotary motion is transmitted to the wheels. Dead axle, which do not contain differential and these are simply beams which support the vehicle weight and serve as axis for the wheels. A coiled piece of round or square steel wire which, when compressed exerts, a force that may be used to do some work. Leaf springs or carriage springs are used in the vehicles to cushion the shocks imparted to the wheels by road obstacles. |
![]() | : | 10.22362/ijcert/2016/v3/i9/48863 |
DOI Link | : | http://www.dx.doi.org/10.22362/ijcert/2016/v3/i9/48863 |
[1] Book on Automobile Design problem, by Mr.Agrawal, India. [2] Book ISBN No. 81 219 0214 2 , by H.B. Singh Reyat, Punjab. [3] Course Material, Workshop Manager Training programme, Telco, Jamshedpur, 1993. [4] www.alibaha.com [5]Service Manual, Maruti Udyog Ltd, N. Delhi. [6] Training Programme in Telco, M/S Gargo Motors, Assam, 1993.
Paper Title | : | Low Voltage High Accurate Current Mode Analog Multiplier |
Authors | : | Sushma.Devarapalli , I.Lavanya, , , |
Affiliations | : | |
Abstract | : | The Low voltage high accurate current mode analog multiplier is a basic building block in analog signal processing. This proposed circuit is a four quadrant multiplier, designed using squarer circuit. The squarer circuit is designed based on the translinear loop principle. The major advantages of proposed design are low voltage (VDD=1V), high accurate, high bandwidth (122MHZ), less area, and small linearity error. The linearity error is obtained as 0.5%. The simulations of circuit are done in the pyxis schematic editor using Mentor graphics tool with 0.18µm standard CMOS technology. |
![]() | : | |
DOI Link | : | |
Paper Title | : | Analog and Digital PLL with Single Ended Ring VCO for “Full Swing Symmetrical Even Phase Outputs†|
Authors | : | Moulika Devi Vankala, G.P.S Prasanthi, , , |
Affiliations | : | |
Abstract | : | The most versatile application of a phase locked loop (PLL) is clock generation and clock recovery in microprocessors, networking, wired and wireless communication system and frequency synthesizers. Voltage controlled oscillators (VCO) are the important and crucial building block in the PLL. This paper proposes a “Single Ended Type Ring VCO with a New Delay Cell†for Full Swing Symmetrical Even Phase outputs. To meet the requirements of high-quality performance in portable device systems at low cost, a ring VCO structures of numerous differential delay cells have been commonly implemented in recently developed VCO monolithic integrated chips (ICs). However, compared with ring VCOs of single-ended delay cells, implementing ring VCOs of differential delay cells typically require a larger area, greater power consumption and a tail current circuit. Therefore, determining a method for designing a “Single Ended Ring-type VCO†with a wide tuning range, a small layout area ((without a tail current circuit) and high Signal to Noise Ratio (SNR) is crucial. Therefore, the designed Ring VCO is placed in PLL and simulates the miscellaneous blocks of phase locked loop (PLL). In addition that the proposed VCO with a new delay cell achieved (16.6-33) MHz wide tuning range with full swing symmetrical even phase outputs, which yielded -174.28dbc/Hz phase noise at 1MHz, occupied small layout area with only 5 transistored delay cell and consumed less power approximated to 0.48Megawatts operated at only 1.2V supply voltage in TSMC 180nm deep submicron technology. |
![]() | : | |
DOI Link | : | |
Paper Title | : | A Multi-level Self-Controllable Authentication in Distributed m-Healthcare Cloud Environments |
Authors | : | A.Yogananda, Chepuri Sai Teja, , , |
Affiliations | : | |
Abstract | : | Secrecy in the distributed m-healthcare cloud computing reflect concurrently attaining data confidentiality and identity privacy with high efficiency in this connection Cloud Computing providing several advantages to service providers and to customers, Hence it have a good preference in the technical world. The health care industries are growing in various fields over the few years. For the patients and doctors or to other physicians the communication is an important requirement for the inquiries and suggestions. The m-Healthcare cloud computing is significantly providing such type of communication for efficient patient treatment and medical consultation by sharing the personal health information to health care service providers (Hospitals, Research Centres etc. ). Even though a service is good there are some privacy breaches in the present scenario they are following. They are (1) Data Confidentiality and (2) Patient’s Identity Privacy. Much existing access and authentication schemes introduced by several types of research but they cannot be exploited in a straightforward manner. To solve this issue, in this paper we propose an Authorized Accessible Privacy Model (AAPM). By this, a patient can authorize a physician by setting a multi-level access tree of threshold predicates. According to this, we introduce a new technique called attribute-based designated verifier signature for multi-level patient self-controllable authentication in cloud computing environment realizing three levels of privacy and security requirement in distributed m-Healthcare cloud computing system. The three levels of authentication involve directly authorized a physician, indirectly authorized physician and unauthorized persons for medical consultation and decipher the personal health information and to verify the identities by satisfying the access with the help of their own set of attributes. |
![]() | : | |
DOI Link | : | |
Paper Title | : | A Unique Strategy for Swift Generation and Contrast of Applied Feature Vectors |
Authors | : | N. Navya Teja , Mahender Veshala, , , |
Affiliations | : | |
Abstract | : | The easiest formula for determining an example in the test set is known as the closest Neighbor method. The item of great interest is in comparison to each sample within the training set, utilizing a distance measure, a similarity measure, or a mix of measures. The conventional deviation, also is referred to as square cause of the variance, informs us something concerning the contrast. It describes multiplication within the data, so a higher contrast image has a high variance; along with a low contrast image have a low variance. Even though this techniques could be enhanced if some pre-processing steps are utilized. In content-based image retrieval systems (CBIR) the best and straightforward searches would be the color based searches. In CBIR image classification needs to be computationally fast and efficient. Within this paper a brand new approach is introduced, which works according to low-level image histogram features. The primary benefit of this process may be the extremely swift generation and comparison from the applied feature vectors. It also includes the analysis of pre-processing calculations and the look classification. We are able to result in the Nearest Neighbor method better quality by choosing not only the nearest sample within the training set, but also by thought on several close feature vectors. Using each training set, the histograms from the three color channels were produced and also the above mentioned histogram features were calculated. |
![]() | : | |
DOI Link | : | |
Paper Title | : | Department Management System Using Arduino |
Authors | : | Ms. Mitha Raj, Ms. Niveditha K.S, Ms. Shinta Joseph K,Mr. Jose Mon Tomy and Mr.Rijo P.C, , |
Affiliations | : | |
Abstract | : | In older times information were stored and conveyed by papers and other physical media. But now our world has changed and everything around us are almost digitized. The proposed Department Management System aims to replace the traditional time table management system to reduce the usage of papers and to ease the process . It displays the staffroom timetable with room temperature in an LCD screen and includes a power saving module. This can be used in institutions such as Schools , Colleges, Universities ,Offices etc. It is even possible to store multiple timetables and switch between them. Thus it becomes easier for the staff to refer to the entire departments timetable , check temperature all at the same time. The power saving module saves the energy by switching off all unwanted electrical appliances like fans and lights when there is nobody in the staffroom. |
![]() | : | |
DOI Link | : | |
Paper Title | : | A Study on Entrepreneurial Challenges of Floriculture in Odisha. |
Authors | : | Dr Nishi Kanta Mishra , Mr Durga Prasad Mishra, , , |
Affiliations | : | |
Abstract | : | Floriculture is the activity of planting and growing of flowers for business purpose. Odisha is a state which has rich potentiality for flower farming and marketing. Considering the demand and scope of flowers in the state the govt. has also made some policy for floriculture under the department of Horticulture. Floriculture provides ample opportunity not only for farming benefit but also vast employment to the people of the state. Flowers like rose, marigold, jasmine, lotus and champa are some of the flowers which has a large demand over the years and now it has been meant for export purpose. The agro climatic condition of the state is suitable for flower plantation and it is rising day by day to meet the domestic demand as well as the demand of the entrepreneurs of the state. Now floriculture is absolutely meant for commercial purpose where small and medium entrepreneurs depend on this farming activity. |
![]() | : | |
DOI Link | : | |
Paper Title | : | Design and development of test setup to study the basic procedure of vibration analysis |
Authors | : | G. C. Mekalke, B. B. Kabnure, , , |
Affiliations | : | |
Abstract | : | In past several years Vibration monitoring and vibration diagnosis of various machines has gained enormous importance which includes smaller and medium sized machines with increasing machine frequency. For localization of defects and causes of damage to machines, vibration diagnosis is a fantastic tool, also one can used as an objective defense against unjustified warranty claims. At low speed, vibration can be ignored but at moderate and high speed this becomes larger and various parts of machines will not work properly as a result failure of machine parts. Fast Fourier transform (FFT) analyzer with 8 channel accelerometer probe are used for measuring the vibration amplitude. Accelerometer is a transducer which is used for converting mechanical vibration into electrical signal. The transducer output is proportionate to frequency and amplitude which describes what is wrong with the machine and relative severity of the problem respectively. By understanding the importance of vibration analysis, to study the different methods of vibration diagnosis we made a small setup, and all the methods are studied experimentally on that test setup. |
![]() | : | |
DOI Link | : | |
Paper Title | : | An Innovative Piecewise Linear Companding Method for PAPR Reduction and Companding Distortion in OFDM System |
Authors | : | Sangam Sai Krishna Kumar, Mahender Veshala, , , |
Affiliations | : | |
Abstract | : | Orthogonal frequency division multiplexing (OFDM) is a popular modulation/multiplexing scheme offers high dataratesIt is considered as multicarrier transmission scheme supports future generation wireless as well as wireline communication systems.OFDM frequently suffers from high Peak to Average Power Ratio (PAPR) which eventually increases the Analogue to Digital and Digital to Analogue converters complexity levels and reduces HPA (RF) efficiency. Various Peak to average power ratio (PAPR) reduction schemes have been proposed in the past and companding is the popular PAPR reduction which is inserted after modulation in the OFDM system. Although companding scheme provides better results but simultaneously its presence as extra operation increases the bit error rate. In this paper, a novel piecewise linear companding scheme is implemented to reduce the PAPR impact and control the commanding distortion in the OFDM system. The piecewise linear companding scheme reduces the peak to average power ratio by clipping the amplitudes over the compounded peak amplitude. Finally, the simulation result yields the better spectral efficiency and batters BER performance while mitigating the companding distortion better way the PAPR is reduced in an accurate way. |
![]() | : | |
DOI Link | : | |
Paper Title | : | Online Java Compilers Using Cloud Computing |
Authors | : | Gopal Krishna.A, Parimala.G, Durga Charan.K, , |
Affiliations | : | |
Abstract | : | on these days it is common utilization of Internet, in this web world every one of the things are on the web. Cloud computing model is for empowering helpful and in addition as needed network access to a common pool of configurable computing assets which can be immediately provisioned and discharged with least administration endeavors. So we develop software as a service like online compiler. This research main goal is we can easily write programs, compile and debug in online. Using these cloud compilers we can reduce the storage space and movability, centralized compiler using cloud computing that helps to save the time, storage and cost using this concept. So that it’s a most appropriate tool to compile the code, remove the errors and debug it. Using these compilers will provide online compiler service, like SaaS installation of separate compiler on each machine is avoided. Once we use this application in cloud we can access the compiler from the web. So that we can obtain the common errors and analysis of time complexity of compiler. |
![]() | : | |
DOI Link | : | |
Paper Title | : | Bio Inspired Bees Behavior Approaches for Computer Science Problems |
Authors | : | Mr. A.S. Shelar, Mr. U. A. Nuli, Mr. V. V. Kheradkar, , |
Affiliations | : | |
Abstract | : | Bio inspired algorithms plays an important role in solving complex and huge problems in computer science. It helps us in finding the optimal desired way to solve extremely dynamic, difficult and robust problems. These algorithm help us to cope with the technological need of a new era. Many researchers did enormous work in this area from the past few decades. However, bees based algorithm on its different behavior is more useful to solve such kind of problems. This paper presents a few, detailed in of some bees behavior algorithm, which was used in order to tackle various challenges faced in different problems. Bees foraging and marriage behavior is applied to solve many problem such as job scheduling, color graph, Association Rule Mining problem, etc. This paper discussed different bees behavior approaches and basic bee algorithm used to solve different computer science problems. |
![]() | : | |
DOI Link | : | |
Paper Title | : | Bus Pass and Ticket automation System |
Authors | : | P.Sharmila , A.Ponmalar , Skanda Gurunathan R, , |
Affiliations | : | |
Abstract | : | The rapidly aging population causes long waiting times for taking bus pass. Diagnosing record of real-time data of each who are all using bus passes, Bus pass automation would be beneficial for government to implement proper and better rates for passes and also it would be useful for people who forget to renew their bus passes. Also taking tickets in an MTC bus is a tedious process now-a-days. Giving exact change for tickets to a large crowd is also a tedious process for conductors in the buses. In this paper, we propose a facility to take bus tickets and bus passes using android mobile application. This system provides a facility for taking tickets on the go, by just scanning the QR code user can book a ticket and pay online. This system also provides a facility to remind when the bus pass is about to expire. The app is also used to take print out of the pass, so that it can be shown to the conductors who are unfamiliar with android phones. The system is also provided with digital wallet where the user can load money as a whole and use it in each buses the user travels. |
![]() | : | |
DOI Link | : | |
Paper Title | : | Engine Oil Mixing in Radiator Water: Study on I.C. Engine (Diesel) Performance |
Authors | : | Dr. Porag Kalita, Mr. Alakesh Kalita , , , |
Affiliations | : | |
Abstract | : | A high compression internal combustion engine, in which the fuel is ignited by the heat of compression. The diesel cycle may be completed in either two or four strokes. A German Engineer, Dr. Rudolf Diesel designed on engine in 1802, which worked on a much higher compression ratio the petrol engines working on otto cycle. Diesel oil which fits the requirements for use in diesel engine. The reason that the application of an oil or grease to reduce friction between two or more moving parts. This lubricating system, in the engine that supplies moving parts with lubricating oil to prevent actual contact between any of the moving metal surface. Because as per theories of lubrication, is consisting by Hydrocarbons, Boundary and Hydrostic respectively. In automobiles engine, only 25% of the total heat produced by the combustion of fuel is actually converted into useful mechanical energy. The rest of the heat energy is used up in the cooling and exhaust systems. The main function of radiator, in the cooling system, a cooling chamber through which the water heated by the engine, passes so heat the temperature of the water can be controlled. |
![]() | : | |
DOI Link | : | |
Paper Title | : | Maximum network lifetime with load balance and connectivity by clustering process for wireless sensor networks |
Authors | : | Dr. C. Gulzar, AmeenaYasmeen, , , |
Affiliations | : | |
Abstract | : | Wireless sensor networks are formed by a large number of low-power, low-cost and multifunctional wireless sensor nodes. The basic philosophy of wireless sensor network is to provide maximum coverage and connectivity of a sensing environment. Thus the network lifetime must be maximized as long as possible. As the usage of wireless sensor network has grown enormously the need for efficient management of energy has also increased. Wireless sensor networks are applied to a variety of range of applications such as home health care, battlefield surveillance, machine failure diagnosis, biological detection, home security, smart spaces, inventory tracking, machine monitoring, and environmental monitoring. These application tasks require full coverage at any time. Energy is a very scarce resource in case of wireless sensor network and it has to be managed properly to extend the life of the sensors. The nodes must be organized into maximal number of subgroups (clusters) capable of monitoring all discrete points of interest. To guarantee the connectivity of sensor nodes is also important while achieving full coverage. In this paper, thus we develop a novel Fully Clustered Energy-efficient Connected Coverage (FCECC) algorithm. The proposed (FCECC) consists of two components: |
![]() | : | |
DOI Link | : | |
Paper Title | : | A Survey on Load Balancing Algorithms in Cloud |
Authors | : | T.Deepa, S Sharon Amulya Joshi, , , |
Affiliations | : | |
Abstract | : | In the cloud computing environment, load balancing is one of the important issues, with great increase in the users and their requirements for different services on the cloud computing platform, efficient usage of resources in the cloud environment is very important. An efficient load balancing algorithm ensures efficient resource utilization by providing resources to user’s on-demand in pay-per-use manner. Load Balancing uses scheduling for prioritizing users. The performance indicators of load balancing algorithms in cloud are response time and waiting time. This paper presents various load balancing schemes in cloud environments. |
![]() | : | |
DOI Link | : | |
Paper Title | : | Image Compression using Vector Quantization based on MSE Approach |
Authors | : | Ms.Sneha Rahul Mhatre, Prof.Arun Kulkarni, Prof.Madhuri Gedam, , |
Affiliations | : | |
Abstract | : | Vector Quantization is an essential and fundamental technique for lossy image compression. Codebook generation is very important influence in Vector Quantization (VQ).The objective of this research is to create a new inventive Algorithm which can be used to take input image in bits and apply Haar transform to input image to create codebook for Vector Quantization. The new system in this research is used to create codebook based on MSE of input sequences which gives the better quality of image. The codebook generated will be more efficient for low frequency image.If the image size is too large then retrieval time is more so will used Fast Search algorithm can be used to reduce time and used to obtain PSNR with less mean square error (MSE). |
![]() | : | |
DOI Link | : | |
Paper Title | : | Alternative Fuel for I.C. Engine: Review the Effect from Ethanol in Carburetor |
Authors | : | DR. PORAG KALITA, , , , |
Affiliations | : | |
Abstract | : | We know that Ethanol as a gasoline blend has helped to reduce dependence on oil import and harmful vehicular emission. Due to the globalization impact as well as controlling the automobile exhaust emission, the automobile companies are introducing Multi Point Fuel Injector (MPFI) and Gasoline Direct Injection (GDI) respectively. However, introducing ethanol as alternative automobile fuel (E10, E85), the proper mixture ethanol and air mixture (for oxygenate compound), need of Carburetor for the function of the I C Engine combustion process. Because, it is of utmost necessity that ethanol (20% ethanol and 80% petrol) supplied to the engine should be completely vaporized before actual combustion. This is possible only when it is broken up into a fine spray, i.e. atomized. The process of atomization takes place normally in the inlet manifold. Carburetion process consists of vaporizing ethanol; mixing thoroughly with air and distributing the ethanol-air mixture evenly into the cylinder. |
![]() | : | |
DOI Link | : | |
Paper Title | : | Information Security On eGovernment As Information-Centric Networks |
Authors | : | Tri Kuntoro Priyambodo, Didit Suprihanto, , , |
Affiliations | : | |
Abstract | : | Information security is a major factor in the service of eGovernment. The using of host to host in previous services of eGovernment is considered as lacking in security. Therefore, it needs more security to serve clients more efficiently and to obtain reliable data provided from the host. One of approach ways to solve the previous security services are based on the safety approach on the contents. The approach on content is used to improve the security which has been used. The approach offered in this paper is called Information Centric Network, this approach is one of the alternatives that is used to secure the content on eGovernment, in addition to approaches by using encryption and captcha. Human aspect is also included as one of the factors of eGovernment security itself. |
![]() | : | |
DOI Link | : | |
Paper Title | : | Investigation of Various Image Steganography Techniques in Spatial Domain |
Authors | : | Gunjan , Er. Madan Lal, , , |
Affiliations | : | |
Abstract | : | In this internet era the security of information has become a big concern. People are communicating over internet. Their communication can be made secure through information hiding technique known as steganography .It is a Greek world which literally means enclosed writing. Image steganography is very popular because it exploits the weakness of human visual system and also large amount of redundant bits are present in digital representation of an image. In this paper various image steganography techniques in spatial domain are investigated. |
![]() | : | |
DOI Link | : | |
Paper Title | : | Intensification of Resolution in the Realm of Digital Imaging |
Authors | : | Shivangi Jindal , Harkiran Kaur, , , |
Affiliations | : | |
Abstract | : | High resolution (HR) images have great importance in many areas, such as astronomy, medical, video surveillance, etc. These HR images give some additional details which are of great significance for analysis in various applications. This paper investigates mainly on various methods of super resolution that are existing, and putting it all together for a literature survey. Scope of this study mainly focuses on the different available techniques of image processing to get high resolution images. |
![]() | : | |
DOI Link | : | |
Paper Title | : | Indian Smart Cities Programme it’s Challenges & Solutions |
Authors | : | Mr.K.K.JAIN FIE (PhD), Dr D.P.KOTHARI, Dr J.PRAVEEN, , |
Affiliations | : | |
Abstract | : | Smart city mission in India is of several major development program focused on Indian rapid growth and its challenges & opportunities. The aim is to promote economic growth, stronger governance to improve quality of life. Government of India recently pledged to create 100 new smart cities in India phased wise. On the basis of an international slandered ISO 37120. Smart cities councils of India are prime consultants for this work. There are many challenges ahead in implementation and there innovative solutions. Smart Cities Challenge is competition designed to inspire to support municipal offices as they develop smart proposals to improve resident’s lives in year 2015 JULY. 97 cities competed in 1st round with best proposals receiving funds from ministry of Urban Development. .FOR funding. Out of 97 cities 20 were selected for best proposals. They will be receiving funds remaining cities entered in fast track program to up great their proposals. And will compete in next cycle. In June –July 2016. Currently 31% Indian populations are residing in cities. And expected that it would be 50 % by 2030. Here we shall discuss the international standards and how it would be implemented?. Many countries including U.K. have expressed their desire to help India financially and technically. Bristol University is talking leading role in this matter. They are going to drive innovation *we are creating an environment. So world will look towards Bristol for future of smart cities.*. |
![]() | : | |
DOI Link | : | |
Paper Title | : | Source Anonymity using multiple mixes in Packet Scheduling |
Authors | : | Mrs.S.Suganyadevi , Mrs.Dr.V.Anuratha , , , |
Affiliations | : | |
Abstract | : | Secret communication, where users converse without revealing the personalities of communicating parties or the trails of data stream is critical in data networks. On the Internet, Chaum mixes, intermediate nodes, or proxy servers, which use coated encryption and packet shuffling techniques to hide source identities, are used to provide anonymity to network users. In this analysis, an information theoretic structure is developed to study the maximum anonymity possible by packet shuffling when the merges are memory restricted—in other words, they can store a finite number of packets. Network of mixes over receiving packet sources from an eavesdropper’s perspective as the measure of secrecy, the maximum achievable secrecy of a single mix with buffer size b (packets which contains the source and destination details of itself ) serving for achieving multiple mixes (network of mixes). By obtaining network of mixes the source anonymity is achieved successfully. For a general multiuser system, the maximum anonymity as buffer size b→∞ is shown to approach the entropy of the source arrival probabilities at a convergence rate no less significant than 1/b2. When the arrival probabilities of the general multiuser system can be expressed as a rational portion k/2n for some fixed n, this union rate is shown to be achievable. The secrecy analysis is extended to a common network of mixes linking the sources to multi destination, where the source secrecy achievable on the target link is shown to be lower enclosed by a weighted sum of the secrecy achievable by each individual mix. |
![]() | : | |
DOI Link | : | |
Paper Title | : | Morphometric Analysis of Kelo Basin for Environmental Impact Assessment |
Authors | : | Bhargava K. Iyengar, , , , |
Affiliations | : | |
Abstract | : | The Chhattisgarh region is characterized by non-perennial streams, which actually are rain-fed rivers. They carry water only during and immediately after rain. During the dry season either they may cease to flow entirely, or there is hardly any water in most of the drainage channels. Clearly, watersheds with a higher proportion of area drained by non-perennial streams will tend to have lower soil moisture retention and water harvesting capability than those areas where perennial streams pre-dominate. Ceteris paribus, areas with proportionately more perennial streams should be fewer droughts vulnerable. 44 Stream Patterns Catchment areas can be described by their stream channel patterns, as viewed from maps or from the air. Each stream has its characteristic channel, based on the topographical obstacles encountered, as it seeks the `path of least resistance' in its journey towards the sea. Stream patterns may develop randomly on uniform soils, or in response to weaknesses in the underlying geology (McKnight, 1990; 1985). |
![]() | : | |
DOI Link | : | |
Paper Title | : | Review of Agile Software Development Methodologies |
Authors | : | Khushdeep Sharma, Dr. Himanshu Aggarwal, , , |
Affiliations | : | |
Abstract | : | During the past forty years, many new software development approaches were introduced to fit the new cultures of the software development companies which aim to produce valuable software in short time period with minimal costs, and within unstable, changing environments and Agile Methodology is one of them. This paper presents a review of agile methodologies, comparison between agile methodologies, how they are divergent from the traditional process methods. |
![]() | : | |
DOI Link | : | |
Paper Title | : | Context Based XML Data and Diversification for Keyword Search Queries |
Authors | : | Mr. RAHUL HON , Mrs. N.SUJATHA, , , |
Affiliations | : | |
Abstract | : | In searching process user enter particular candidate searching keyword and with the help of searching algorithm respective searching query is executed on targeted dataset and result is return as an output of that algorithm. In this case it is expected that meaningful keyword has to be entered by user to get appropriate result set. In case of confusing bunch of keywords or ambiguity in it or short and indistinctness in it causes an irrelevant searching result. Also searching algorithms works on exact result fetching which can be irrelevant in case problem in input query and keyword. This problem statement is focused in this system. By considering the keyword and its relevant context in XML data , searching should be done using automatically diversification process of XML keyword search. In this way system may satisfy user, as user gets the analytical result set based on context of searching keywords. For more efficiency and to deal with big data, HADOOP platform is used. baseline efficient algorithms are proposed to incrementally compute top-k qualified query candidates as the diversified search intentions. Compare selection criteria are targeted: the k selected query candidates are most relevant to the given query while they have to cover maximal number of distinct results on real and synthetic data sets demonstrates the effectiveness diversification model and the efficiency of algorithms |
![]() | : | |
DOI Link | : | |
Paper Title | : | A Novel Additive Multi-Keyword Search for Multiple Data Owners in Cloud Computing |
Authors | : | Mr. M. VEERABRAHMA CHARY, Mrs.N.SUJATHA, , , |
Affiliations | : | |
Abstract | : | Observing the view of cloud computing, it has become augmenting popular for data owners to outside supplier their information to public cloud servers while allowing data users to regain this data. To relate to seclusion, safe searches over encrypted cloud data have provoke more research works under the sole owner model. However, most cloud servers in practice do not just Serve unique owner; instead, they support multiple owners to share the benefits brought by cloud computing. In this paper, we suggest -To keep safe the secrecy and several owner model search several keywords and Ranked. To make possible cloud servers to execute safe to look omission knowing the real information of both keywords and trapdoors, To keep alive the privacy of related scores between keywords and files and rank the search result, we suggest a novel Additive Order and Privacy Preserving Function family and dynamic hidden key creation rule and a new data user to establish as genuine rule. |
![]() | : | |
DOI Link | : | |
Paper Title | : | Discovery of ranking fraud for Mobile Apps |
Authors | : | Mrs. CH APPORVA, Mr. K.ASHOK KUMAR, , , |
Affiliations | : | |
Abstract | : | Ranking fraud in the mobile App market refers to false or deceptive activities which have a reason of bumping up the Apps in the popularity list. Certainly, it becomes more and more frequent for App developers to use shady means, such as inflating their Apps' sales or posting phony App ratings, to commit ranking fraud. While the importance of preventing ranking fraud has been widely recognized, there is limited understanding and research in this area. A ranking fraud detection system for mobile Apps was developed. Specifically, this ranking fraud happened in leading sessions and provided a method for mining leading sessions for each App from its historical ranking records and identified ranking based evidences, rating based evidences and review based evidences for detecting ranking fraud. Moreover, we proposed an optimization based aggregation method to integrate all the evidences for evaluating the credibility of leading sessions from mobile Apps. An unique perspective of this approach is that all the evidences can be modelled by statistical hypothesis tests, In this paper we want to propose more effective fraud evidences and analyze the latent relationship among rating, review and rankings. Moreover, we will extend our ranking fraud detection approach with other mobile App related services, such as mobile Apps recommendation, for enhancing user experience. |
![]() | : | |
DOI Link | : | |
Paper Title | : | User-Defined Privacy Grid System for T-Broker: A Trust-Aware Service Brokering Scheme Multiple Cloud Collaborative Services |
Authors | : | Mr. C.CHAITANYA, Mr. V.N.VENU GOPAL, , , |
Affiliations | : | |
Abstract | : | To facilitate extensive collaborations, today’s organizations raise increasing needs for information sharing via on-demand information access. Information Brokering System (IBS) a top a peer-topeer overlay has been proposed to support information sharing among loosely federated data sources. It consists of diverse data servers and brokering components, which help client queries to locate the data servers. However, many existing IBSs adopt server side access control deployment and honest assumptions on brokers, and shed little attention on privacy of data and metadata stored and exchanged within the IBS. More importantly, T-broker uses the maximizing deviation method to compute the direct experience based on multiple key trusted attributes of service resources, which can overcome the limitations of traditional trust schemes, in which the trusted attributes are weighted manually or subjectively. Finally, T-broker uses a lightweight feedback mechanism, which can effectively reduce networking risk and improve system efficiency. The experimental results show that, compared with the existing approaches, our T-broker yields very good results in many typical cases, and the proposed system is robust to deal with various numbers of dynamic service behavior from multiple cloud sites. |
![]() | : | |
DOI Link | : | |
Paper Title | : | User-Defined Privacy Grid System for Continuous Location Based Services |
Authors | : | Mr. G.SAI KUMAR, Mr. G.LAKPATHI, , , |
Affiliations | : | |
Abstract | : | In this paper we have demonstrated Location-Based Services (LBSs) which has surfaced as prominent applications in mobile networks. An important challenge in the wide deployment of location-based services (LBSs) is the privacy aware management of location information, providing safeguards for location privacy of mobile clients against vulnerabilities for abuse. This paper describes a scalable architecture for protecting the location privacy from various privacy threats resulting from uncontrolled usage of LBSs. This architecture includes the development of a personalized location anonymization model and a suite of location perturbation algorithms. In particular, our algorithm makes use of a variable-sized cloaking region that increases the location privacy of the user at the cost of additional computation, but maintains the same traffic cost. Our proposal does not require the use of a trusted third-party component, and ensures that we find a good compromise between user privacy and computational efficiency. we propose a user-defined privacy grid system called dynamic grid system (DGS); the first holistic system that fulfils four essential requirements for privacy-preserving snapshot and continuous LBS. Our experiments show that the personalized location k-anonymity model, together with our location perturbation engine, can achieve high resilience to location privacy threats without introducing any significant performance penalty. Experimental results show that our DGS is more efficient than the state-of-the-art privacy preserving technique for continuous LBS. |
![]() | : | |
DOI Link | : | |
Paper Title | : | PROGRESSIVE DUPLICATE DETECTION |
Authors | : | Mr .BETKAR AKSHAY SURESH, Mrs. N.SUJATHA, , , |
Affiliations | : | |
Abstract | : | One of the difficult issues confronted in a few applications with individual subtle elements administration, client alliance administration, information mining, and so on is copy location. This overview manages the different copy record identification strategies in both little and substantial datasets. To identify the deception with less time of execution furthermore without exasperating the dataset quality, strategies like Progressive Blocking and Progressive Neighborhood are utilized. Progressive sorted neighborhood method likewise called as PSNM is utilized as a part of this model for finding or recognizing the copy in a parallel methodology. Progressive Blocking calculation takes a shot at huge datasets where discovering duplication requires massive time. These calculations are utilized to improve copy location framework. The productivity can be multiplied over the ordinary copy recognition technique utilizing this calculation. A few distinct strategies for information examination are considered here with different methodologies for copy discovery. |
![]() | : | |
DOI Link | : | |
Paper Title | : | Experimental Study on Automobiles Exhaust Emission Control |
Authors | : | Dr. Porag Kalita, , , , |
Affiliations | : | |
Abstract | : | The biggest question today before the metropolitan population of our country in particular is, “Pollution is, snuffing us out†and pollution ever be controlled? There are no doubts that the progress was achieved in the last few decades in some areas in very negligible in comparison with the overall picture. For the controlling of automobile exhaust emission, the honorable Supreme Court of India, in June 1999 ruled that vehicular emission had to be reduced at a much quicker pace than planned so far. Engine manufactures was facing the challenging task to quality find solutions that are production feasible, technological explained with Euro norms, and therefore, they have been changing the concept of IC engine design, multipoint fuel injection system, Catalytic Converter and incorporation of Exhaust Gas Re-circulation (EGR) remarkably. To reduce the automobile exhaust emission the several control equipment’s are: 1. Catalytic Converter, 2. Exhaust Gas Re-circulation (EGR), 3. Air Aspiration System, 4. Positive Crankcase Ventilation, etc. NOx control system that recycles a small part of the inert exhaust gas back through the manifold to lower the combustion temperature and this system is called Exhaust Gas Re-Circulation system. Catalytic converter converts harmful gases to harmless gases. A catalyst is a material that causes a chemical change without entering into the chemical reaction. For example, in the Catalytic converter converts harmful gases to harmless gases. A catalyst is a material that causes a chemical change without entering into the chemical reaction. |
![]() | : | |
DOI Link | : | |
Paper Title | : | Effective Analysis of Data from Remote Sensing Application |
Authors | : | Santhosh Gowda T.R, Vijay G.R, , , |
Affiliations | : | |
Abstract | : | At present applications like Internet, mobile devices, social media, geospatial devices, sensors will generate massive volume of data.Processing and extracting the useful information in an efficient manner leads a system toward a major computational challenges, such as to analyze, aggregate, and store data. For these Big data analytical architecture is proposed. The architecture comprises three main units, such as 1) remote sensing Big Data acquisition unit (RSDU); 2) data processing unit (DPU); and 3) data analysis decision unit (DADU). RSDU acquires data from the sensors and sends this data to the Base Station. DPU provides an efficient processing of Data by providing filtration, load balancing, and parallel processing. DADU is responsible for compilation, storage of the results, and generation of decision based on the results received from DPU. |
![]() | : | |
DOI Link | : | |
Paper Title | : | Defensive Cloud Service Providers Against Stealthy Denial of Service Strategy |
Authors | : | Mrs. P.SRILAKSHMI, Mrs. N.SUJATHA, , , |
Affiliations | : | |
Abstract | : | Cloud Computing allows customers to access cloud resources and services. On-demand, self-service and pay-by-use business model are adapted for the cloud resource sharing process. Service level agreements (SLA) regulate the cost for the services that are provided for the customers. Cloud data centers are employed to share data values to the users. Denial-of-Service (DoS) attack is an attempt by attacker to prevent legitimate users from using resources. Distributed Denial of Service (DDoS) Attacks is generated in a “many to one†dimension. In DDoS attack model large number of compromised host are gathered to send useless service requests, packets at the same time .DoS and DDoS attacks initiates the service degradation, availability and cost problems under cloud service providers. Brute-force attacks are raised against through specific periodic, pulsing and low-rate traffic patterns. Rate-controlling, time-window, worst-case threshold and pattern-matching are adapted to discriminate the legitimate and attacker activities. Stealthy attack patterns are raised against applications running in the cloud. Slowly-Increasing- Polymorphic DDoS Attack Strategy (SIPDAS) can be applied to initiate application vulnerabilities. SIPDAS degrades the service provided by the target application server running in the cloud. Polymorphic attacks changes the message sequence at every successive infection to avoid signature detection process. Slowly-increasing polymorphic behavior induces enough overloads on the target system. XML-based DoS (XDoS) attacks to the web-based systems are applied as the testing environment for the attack detection process we describe both how to apply the proposed strategy, and its effects on the target system deployed in the cloud. |
![]() | : | |
DOI Link | : | |
Paper Title | : | A Scalable and Reliable Matching Service for Content-based Publish/Subscribe Systems |
Authors | : | Mrs.B.PRATHYUSHA, K.ASHOK KUMAR, , , |
Affiliations | : | |
Abstract | : | Security is one of the extensive and complicated requirements that need to be provided in order to achieve few issues like confidentiality, integrity and authentication. In a content-based publish/subscribe system, authentication is difficult to achieve since there exists no strong bonding between the end parties. Similarly, Integrity and confidentiality needs arise in published events and subscription conflicts with content-based routing. The basic tool to support confidentiality, integrity is encryption. In this paper, we propose SREM, a scalable and reliable event matching service for content-based pub/sub systems in cloud computing environment. To achieve low routing latency and reliable links among servers, we propose a distributed overlay SkipCloud to organize servers of SREM. Through a hybrid space partitioning technique HPartition, large-scale skewed subscriptions are mapped into multiple subspaces, which ensures high matching throughput and provides multiple candidate servers for each event. Moreover, a series of dynamics maintenance mechanisms are extensively studied. |
![]() | : | |
DOI Link | : | |
Paper Title | : | Location-aware and Personalized Collaborative Filtering for Web Service Recommendation |
Authors | : | Mr.A.AVINASH, Mrs.N.SUJATHA, , , |
Affiliations | : | |
Abstract | : | As the number of web services with similar functionality increases, the service users usually depend on web recommendation systems. Now a days the service users pay more importance on nonfunctional properties which are also known as Quality of Service (QoS) while finding and selecting appropriate web services. Collaborative filtering[3] approach predicts the QoS values of the web services effectively. Existing recommendation systems rarely consider the personalized influence of the users and services in determining the similarity between users and services. The proposed system is a ranking oriented hybrid approach which integrates user-based and item-based QoS predictions. Many of the non-functional properties depend on the user and the service location. The system thus employs the location information of users and services in selecting similar neighbors for the target user and service and thereby making personalized service recommendation for service users. General Terms Service computing, Recommendation |
![]() | : | |
DOI Link | : | |
Paper Title | : | Discovery of ranking fraud for Mobile Towards Optimized Fine-Grained Pricing of IaaS Cloud Platform |
Authors | : | Mrs. S.JYOTHIREDDY, Mr. G.LAKPATHI, , , |
Affiliations | : | |
Abstract | : | In Cloud many pricing schemes in IaaS platform are already proposed with pay-as-you-go and subscription/spot market policy to guarantee service level agreement, it is still inevitable to suffer from wasteful payment because of coarse grained pricing scheme. In this paper, we investigate an optimized fine-grained and fair pricing scheme. Two tough issues are addressed: (1) the profits of resource providers and customers often contradict mutually; (2) VM-maintenance overhead like startup cost is often too huge to be neglected. Not only can we derive an optimal price in the acceptable price range that satisfies both customers and providers simultaneously, but we also find a best-fit billing cycle to maximize social welfare (i.e., the sum of the cost reductions for all customers and the revenue gained by the provider). We carefully evaluate the proposed optimized fine-grained pricing scheme with two large-scale real-world production traces (one from Grid Workload Archive and the other from Google data center). We compare the new scheme to classic coarse-grained hourly pricing scheme in experiments and find that customers and providers can both benefit from our new approach. The maximum social welfare can be increased up to 72:98% and 48:15% with respect to DAS-2 trace and Google trace respectively. |
![]() | : | |
DOI Link | : | |
Paper Title | : | A Low Voltage Tuned Colpitt’s Oscillator Using CDTA |
Authors | : | NAWAZ SHAFI, SHREYA GUPTA, , , |
Affiliations | : | |
Abstract | : | In this paper by using current differencing trans-conductance amplifier (CDTA) as an active building block COLPITT’s oscillator has been proposed. The oscillator is realized by a single block of CDTA, two capacitors and an inductor. The resistor is replaced by a NMOS transistor connected to z terminal of the CDTA. The frequency of the oscillation can be controlled by the tank circuit. The oscillator can produce oscillation of frequency ranging from 10KHz to 100MHz. The operation of the proposed Colpitt’s oscillator has been verified using SPICE. The CDTA was implemented on 350nm CMOS technology. |
![]() | : | 0 |
DOI Link | : | |
Paper Title | : | Implementation of H.264/AVC Video Authentication System Using Watermark |
Authors | : | Manasa C, Pramod Sunagar, , , |
Affiliations | : | |
Abstract | : | This paper presents a hybrid approach to encode and decode the data received from the video using H.264 encoder/decoder and to derive the compressed data for the given image using the compression algorithm such as DCT. The encoded data derived from the output of the Encoder part, while the decoded data reconstructed from the encoded video output. The watermarking was also done on the input video in order to increase the robustness of the overall system. The watermark is an image and it was embedded into the frames of the input video which results as the watermarked video. The watermark is embedded in to the frames using DWT algorithm. From the watermarked video, the watermark (image) is decrypted and the input video is reconstructed. Experimental results demonstrate the superiority of the proposed system compared to the former existing schemes in encoding and watermarking tasks. The H.264 Encoder/Decoder method compresses the frames of the video efficiently, and at the same time, the actual input frames of the video can be reconstructed from the corresponding compressed data stream. |
![]() | : | 0 |
DOI Link | : | |
Paper Title | : | Improving Web Services Maintenance through Regression Testing |
Authors | : | Divya Rohatgi, Prof. (Col) Gurmit Singh, , , |
Affiliations | : | |
Abstract | : | Software maintenance is considered to be the most expensive activity in software development and is used to ensure quality to the product. Regression Testing is a part of software maintainers which is done every time the software is changed. For software like Web services which represent a class of Service oriented architectures this activity is a challenging task. Since web services incorporate business functionality thus maintaining proper quality is an important concern. Due to inherent distributed, heterogeneous and dynamic in nature, regression testing is difficult and time consuming activity. Thus in order to reduce maintenance cost we have to reduce regression testing cost. Thus in this paper, we have given a comprehensive study of regression testing of web services exploring the challenges, approaches and tools used for them to ensure proper quality and inherently reducing the maintenance costs. |
![]() | : | 0 |
DOI Link | : | |
Paper Title | : | Digital Media: Role and Efficacy in developing and managing Political Campaigns |
Authors | : | Dr. Akshat Dubey, Ms. Palak Gupta, , , |
Affiliations | : | |
Abstract | : | The marketing landscape is witnessing a paradigm shift with the revolutionary effect of technology. No marketing space is left unaffected with the impact of digital media. Political marketing or campaigns run by political parties is no exception to this thunderous phenomenon. The way in the last few years political parties have adopted this new trend and benefited from it is as interesting as any general election. The traditional methods have been outshined by these new technology tools and have forever changed the way electoral campaigns are managed. The NDA and Aam Aadmi Party were highly successful through the adoption of these tools. This paper tries to identify the role and the reasons which led to the growth and immense impact of these digital marketing tools. |
![]() | : | 0 |
DOI Link | : | |
Paper Title | : | Electronic Mouse for Disabled People |
Authors | : | Shubham Pradip Navale, Prasad Suresh Tatar, Prashant Rajendra Teli and D.B.Salunke4, , |
Affiliations | : | |
Abstract | : | This paper shows the design of computer mouse for disabled people using MEMS accelerometer, MIC and reflection sensor. The movement of cursor on computer is controlled by accelerometer which is mounted on the side of head with the help of rubber band. When head is tilted in some direction, in left/right/forward/backward, accelerometer will sense the tilt. To perform click operation two sensors are used. First is MIC, when air is blown on MIC which is placed in front of mouth it performs clicking operations. If there is a single air blow then it will perform left click operation and if air is blown two times then it will perform right click. Suppose the person is not able to blow air on MIC or is exhausted then second sensor is used. The second sensor is reflection sensor which is mounted in front of cheek. When cheek muscle is moved it is sensed by reflection sensor. If cheek muscle is moved one time then left click operation is performed and if it is moved twice then right click operation is performed. The equipment uses AVR microcontroller ATmega 16A as a control unit. It is used to capture the output of all three sensors and process the data. After processing microcontroller sends commands to computer through MAX232 and DB9 connector. The commands coming from serial port are decoded in the software. Then software will perform the operation of mouse on computer. |
![]() | : | 0 |
DOI Link | : | |
Paper Title | : | Design Optimization and Buckling Analysis of Pressure Vessel |
Authors | : | N.Karthik, M.Jaypal Reddy, M.NagaKiran, , |
Affiliations | : | |
Abstract | : | Pressure vessels like pre-water heaters essentially heat exchangers that are used in closed power cycles. These pressure vessels are used to preheat the water fed into Boilers or heat the water before entering the boiler using expanded steam to increase the efficiency of the cycle. These heavy duty pressure vessels are in working condition throughout the year. The vessel strength will be reduced with time. This can be reduced by providing a winding coil around the vessel as a strip. The strip material will not affect the boiler but increases the life. The modeling was done by using Creo 2.0. Which is an advanced modeling software used in almost all the manufacturing industries. After the modeling the model was imported into the ANSYS 14.0. The linear buckling analysis of the pressure vessel will be done before and after the winding coil was placed at different load conditions and the maximum buckling load will be estimated. By considering some different type of materials to the mod el for showing the differences. Finally the results will be tabulated and graphs will be plotted. |
![]() | : | 0 |
DOI Link | : | |
Paper Title | : | Car Pooling Using Android Operating System-A Step towards Green Environment |
Authors | : | Santhosh Kumar M, Harshavardana Doddamani, , , |
Affiliations | : | |
Abstract | : | Carpooling is one of the latest technologies discovered which has made travelling convenient and efficient to the common man. It also known as car-sharing in which one can travel to their destination while sharing the vehicle and the expenses. Hence fuel costs, tolls and the stress of driving will be reduced when more people travel together in one vehicle. Carpooling is also an environment friendly app and we can save our mother nature by using this app. It also helps in reducing traffic congestion, and other poisonous gases in the air. We can save a lot of space in the Parking lot. We will make an Android based application that will allow passengers to collaborate with other like-minded people and plan out their journey using the easy UI of the app after signing in to it. People will be able to share expenses and not worry about reaching late while making new connections. |
![]() | : | 0 |
DOI Link | : | |
Paper Title | : | SECURE DATA RETRIEVAL FOR DECENTRALIZED DISRUPTION TOLERANT MILITARY NETWORKS |
Authors | : | SHUBHAM P. VERMA , MAMTA S. MAHAJAN, KALYANI M. ZAWAR and TIPUSULTAN S. TADAVI, , |
Affiliations | : | |
Abstract | : | A battlefield or a hostile region are partitions in military environments . Intermittent network connectivity is major problem in such environment. Frequent partitions are there. A true and easy solution is Disruption-tolerant network DTN technologies. To interact with each other people in a military environment carries devices that are wireless. The confidential information is accessed by these devices and they command reliably by exploiting external storage nodes. DTN is very successful technology in these networking environments. When there is no wired connection between a source and a destination device, the information from the source node may need to wait in the middle nodes for a huge amount of time until the connection would be correctly established. ABE is one of the challenging approaches which is attribute-based encryption that satisfies the requirements for retrieving secure data in DTNs. An appropriate way of encryption of data is given by Cipher text Policy ABE (CP-ABE) .Decryption should possess an attribute set which was used during encryption in order to decrypt the cipher text. Hence, multiple users may be allowed to decrypt different parts of data according to the security policy. |
![]() | : | 0 |
DOI Link | : | |
Paper Title | : | Concurrent Access to Encrypted Cloud Database |
Authors | : | Bhupendra G. Hatzade, Deepa Amne, , , |
Affiliations | : | |
Abstract | : | Now a days “cloud computing†is a renowned technology. Most of the organizations prefer to store the data on cloud, because every user wants to access their data at any time and at anywhere. Cloud is one of the storage device used to access their data at anywhere through networks. But because of this service, users always worry about privacy and confidentiality for their personal data. This paper gives quick introduction of a new technique that provides data confidentiality and concurrent access of encrypted cloud database, and discuss about cloud computing security issues and their solutions. |
![]() | : | 0 |
DOI Link | : | |
Paper Title | : | Suggested method for hiding secret data in cover image depending on the Connected Component Labeling algorithm |
Authors | : | Mr.Atheer Hussein Zyara, , , , |
Affiliations | : | |
Abstract | : | the encryption and concealment of important areas to maintain the confidentiality of data , Where the proposed method is working on the coordination between the confidential data and the cover image and that is through combining between the encryption process and the concealment process (Creating the appropriate environment to conceal confidential data encoded in a special way at specific locations According to certain conditions ) , Where the proposed method is divided into three phases , First stage : converting confidential data to a binary system , And then dividing them to two matrices , 1's matrix that contains 1's with 0 between each frequent two groups from 1's , and 0's matrix that contains 0's with 1 between each frequent two groups from 0's . Second stage: converting the cover image to labeled image and thus determining the locations of pixels that its value 1 and the locations of pixels that its value 0 .Third stage : hiding 1's matrix and 0's matrix in the specific locations , And thus obtaining embedded image . Then sending the embedded image, And four keys (the start storage location, and length for 1's matrix. the start storage location, and length for 0's matrix) to the recipient to compare it with original image (unembedded image) for extracting the secret data . This method is characterized by flexibility where can be applied on image types and data of different, and the durability because the concealment locations be random semi. To illustrate the proposed method has been tested on the cover image of type the gray sacle , and textual data , also using the metrics (PSNR) and (MSE) To test the efficiency of the proposed method And that by using the language of MATLAB . |
![]() | : | 0 |
DOI Link | : | |
Paper Title | : | Data Security Using Elliptic Curve Cryptography |
Authors | : | Karishma Bhirud, Dipashree Kulkarni, Renuka Pawar and Prachi Patil., , |
Affiliations | : | |
Abstract | : | Cryptography technique is used to provide data security. In existing cryptography technique the key generation takes place randomly. Key generation require shared key. If shared key is access by unauthorized user then security becomes disoriented. Hence existing problems are alleviated to give more security to data. In proposed system a algorithm called as Elliptic Curve Cryptography is used. The ECC generates the key by using the point on the curve. The ECC is used for generating the key by using point on the curve and encryption and decryption operation takes place through curve. In the proposed system the encryption and key generation process takes place rapidly. |
![]() | : | 0 |
DOI Link | : | |
Paper Title | : | Hard starting every initial stage: Study on Less Engine Pulling Power |
Authors | : | DR. PORAG KALITA, , , , |
Affiliations | : | |
Abstract | : | Automobiles engine, it is a prime mover; and a machine in which power is applied to do work, often in the form of converting heat energy into mechanical work. We know that the power unit of an automobile is called I C engine. The power developed by the engine depends upon the calorific value of the fuel used. This value is equal to the total heat produced to combustion of hydrogen and carbon. Fuel injection pump (FIP), has to supply various quantities of fuel in accordance with the different engine load and in-line pumps, which correctly positioned connects the fuel supply from gallery. Diesel engines compress pure air during compression stroke and must have some means to force fuel into the combustion chamber with a pressure higher from the compression pressure. The injection nozzle atomizes the fuel very small droplets (3 to 30 microns) and delivers it to the combustion chamber. This achieved by small orifice. |
![]() | : | 0 |
DOI Link | : | |
Paper Title | : | SecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication |
Authors | : | Mrs. P. Rizwana khatoon, Dr.C.Mohammed Gulzar, , , |
Affiliations | : | |
Abstract | : | In this paper, we show the trustworthiness evaluating and secure deduplication over cloud data utilizing imaginative secure frameworks .Usually cloud framework outsourced information at cloud storage is semi-trusted because of absence of security at cloud storage while putting away or sharing at cloud level because of weak cryptosystem information may be uncover or adjusted by the hackers keeping in mind the end goal to ensure clients information protection and security We propose novel progressed secure framework i.e SecCloudPro which empower the cloud framework secured and legitimate utilizing Verifier(TPA) benefit of Cloud Server. Additionally our framework performs data deduplication in a Secured way in requested to enhance the cloud Storage space too data transfer capacity i.e bandwidth. |
![]() | : | 0 |
DOI Link | : | |
Paper Title | : | A Survey on Web Page Recommendation and Data Preprocessing |
Authors | : | Ms. Sonule Prashika Abasaheb, Prof. Tanveer I. Bagban, , , |
Affiliations | : | |
Abstract | : | In today’s era, as we all know internet technologies are growing rapidly. Along with this, instantly, Web page recommendations are also improving. The aim of a Web page recommender system is to predict the Web page or pages, which will be visited from a given Web-page of a website. Data preprocessing is one basic and essential part of Web page recommendation. Data preprocessing consists of cleanup and constructing data to organize for extracting pattern. In this paper, we discuss and focus on Web page Recommendation and role of data preprocessing in Web page recommendation, considering how data preprocessing is related to Web page recommendation. |
![]() | : | 0 |
DOI Link | : | |
Paper Title | : | Secure Routing for MANET in Adversarial Environment |
Authors | : | Nilima N. Patil, Kuldeep K. Vartha, Ashwini W. Wankhade and Sagar A. Patil, , |
Affiliations | : | |
Abstract | : | Collection of mobile nodes is known as ad-hoc network in which wireless communication is used to connect these mobile nodes. A major requirement on the MANET is to provide unidentifiability and unlinkability for mobile nodes. There are various secure routing protocols have been proposed, but the requirement is not satisfied. The existing protocols are unguarded to the attacks of fake routing packets or denial-of-service broadcasting, even the node identities are protected by pseudonyms. We propose a new secure routing protocol which provides anonymity named as authenticated anonymous secure routing (AASR), to satisfy the requirement of mobile networks and defend the attacks. The route request packets are authenticated by a group signature and public key infrastructure, to defend the potential attacks without exposing the node identities. The cocept of key-encrypted onion routing which provides a route secret verification message, to prevent intermediate nodes from inferring a real destination. Simulation results have demonstrated the effectiveness of the proposed AASR protocol with improved performance as compared to the existing protocols. |
![]() | : | 0 |
DOI Link | : | |
Paper Title | : | Real Time Detection System of Driver Fatigue |
Authors | : | Pranali Shelke, Shraddha Magar, Rutuja Jawkar, , |
Affiliations | : | |
Abstract | : | The leading cause of vehicle crashes and accidents is the driver distraction. With the rapid development of motorization, driver fatigue has become a very serious traffic problem. Reasons for traffic accidents are driving after alcohol consumption, driving at night, driving without taking rest, aging, sleepiness, and fatigue occurred due to continuous driving, long working hours and night shifts. So to reduce rate of accidents due to above reasons, is aim of this project. This paper presents a method for detection of early signs of fatigue using feature extraction, Haar classifier and delivering of information and whereabouts of the driver to the emergency contact numbers. |
![]() | : | 0 |
DOI Link | : | |
Paper Title | : | Implementation of Motion Model Using Vanet |
Authors | : | Komal Patil, Geeta Mahajan, Disha Patil and Chitra Mahajan, , |
Affiliations | : | |
Abstract | : | A collection of mobile nodes is known as ad-hoc network in which wireless communication network is used to connect these mobile nodes. A major requirement on the MANET is to provide unidentifiability and unlinkability for mobile nodes During the last few decades, continuous progresses in wireless communications have opened new research fields in computer networking, goal of extending data networks connectivity to environments where wired solutions are impracticable. Among these, vehicular traffic is attracting a increasing attention from both academic and industry, due to the amount and importance of the related applications, ranging from road safety to traffic control, up to mobile entertainment. Vehicular Ad-hoc Network(VANETs) are self-organized networks built up from moving vehicles, and are part of the broader class of Mobile Ad-hoc Net- works(MANETs). Because of their peculiar characteristics, VANETs require the definition of specific networking techniques, whose feasibility and performance are usually tested by means of simulation. One of the main challenges posed by VANETs simulations is the faithful characterization of vehicular mobility at both macroscopic and microscopic levels, leads to realistic non-uniform distributions of cars and velocity, and unique connectivity dynamics. There are various secure routing protocols have been proposed, but the requirement is not satisfied. The existing protocols are unguarded to the attacks of fake routing packets. Simulation results have demonstrated the effectiveness of the proposed AODV protocol with improved performance as compared to the existing protocols. |
![]() | : | 0 |
DOI Link | : | |
Paper Title | : | Prevention of Packet Hiding Methods In Selective Jamming Attack |
Authors | : | Shital Patil , Vishaka Patil , Rupali Warke and Priyanka Patil, , |
Affiliations | : | |
Abstract | : | The sharing nature of wireless medium provides various challenging features among various set of users. It is very important in real world and it provides better transfer rate but authentication is ignored. The limitations of existing wired network are overcome by wireless network. These networks act as source for various types of jamming attacks. In analysis and detection of jamming attack various methods are available but sometime they fail. In case of external threat the analysis and reporting of jamming attack is very easy model but it is quite difficult in terms of internal threat model, these internal term uses the knowledge about network secrets and network protocols to launch various attacks with very low effort. Various cryptographic techniques are implemented to prevent these attacks. The main goal of this project is to prevent the information at the wireless physical layer and allowed the safe transmission among communicated nodes although the attacker is present. |
![]() | : | 0 |
DOI Link | : | |
Paper Title | : | AUTOMATIC SPEECH RECOGNITION- A SURVEY |
Authors | : | Julna Nazer, Sajeer K, , , |
Affiliations | : | |
Abstract | : | Speech recognition is the next big step that the technology needs to take for general users. An Automatic Speech Recognition (ASR) will play a major role in focusing new technology to users. Applications of ASR are speech to text conversion, voice input in aircraft, data entry, voice user interfaces such as voice dialing. Speech recognition involves extracting features from the input signal and classifying them to classes using pattern matching model. This can be done using feature extraction method. This paper involves a general study of automatic speech recognition and various methods to generate an ASR system. General techniques that can be used to implement an ASR includes artificial neural networks, Hidden Markov model, acoustic –phonetic approach |
![]() | : | 0 |
DOI Link | : | |
Paper Title | : | Intelligent Device TO Device Communication Using IoT |
Authors | : | Madhuri More, Snehal Mote, Amruta Neel, Poonam Nerkar and Prof. P. S. Hanwate, , |
Affiliations | : | |
Abstract | : | Internet is becoming the most intrinsic part of the human life. There are many users of the internet but the devices will be the main users in the Internet of Things (IoT). These devices communicate with each other efficiently and gather the information to transfer the data to particular device. The quality of this information depends on how smart the devices are. IoT coverage is very wide and consists of the things or devices connected in network like camera, android phones, sensors etc. Once all these devices are connected with each other, they are capable of processing smartly and satisfying basic needs of environment. Thus the communication between the devices is achieved using various technologies and devices. |
![]() | : | 0 |
DOI Link | : | |
Paper Title | : | A Mobile Robostick for Visually Impaired People |
Authors | : | Chaitali M. Patil, Abhishek P. Deshmukh, Kiran K. Jadhav and Mohini S. Deshmukh, , |
Affiliations | : | |
Abstract | : | God gave sense of perception to the human being is an important aspect of our life. But there are some unfortunate people have less ability of vision. The visually impaired have to face many challenges in their daily life. The problem gets bad when they visit to an unknown location. Only few of the navigation systems available for vision impaired people can provide active navigation through speech output. None of these systems work perfectly for both indoor and outdoor applications. The proposed system is very useful in blind people to indicate the alarm for avoiding accident. In system microcontroller is used to as oscillator to generate the frequency signal. Then ultrasonic transmitter gets generated frequency signal. Ultrasonic transmitter and receiver are fixed in front of the robostick. The sender transmits the ray towards receiver. The transmitting pulse has been changed according to the distance. From this, the microcontroller monitors the distance between the object and the stick and gives navigation through headphone jack to blind person. |
![]() | : | 0 |
DOI Link | : | |
Paper Title | : | GSM Based Device Controlling and Fault Detection |
Authors | : | Dr. P.V. Rama Raju, K.S.S. Phani Kumar, Y. Guna Teja, K. Bhargav and T.V.K. Prasanna, , |
Affiliations | : | |
Abstract | : | The mobile communication has expanded to a great extent such that it can be applied for controlling of electrical devices. These projects make use of this capability of mobile phone to control three electrical devices with some use of embedded technology which can be extended up to eight devices. Apart from controlling it also does the sensing of the devices. Thus a user can be able to know of the status of the devices and in addition to that the user get notified if any fault is detected. Here in the project controlling and sensing is done for three electrical devices only. According to the user need both of this can be expanded. |
![]() | : | 0 |
DOI Link | : | |
Paper Title | : | Efficient Multi Server Authentication and Hybrid Authentication Method |
Authors | : | Priya S. Birhade, Chaitanya V. Bhirud, Sangam D. Walke and Jyoti S. Borse, , |
Affiliations | : | |
Abstract | : | Password is used for authentication on many major client-server system, websites etc. Client and a server share a password using Password-authenticated key exchange to authenticate each other and establish a cryptographic key by exchanging generated exchanges. In this scenario, all the passwords are stored in a single server which will authenticate the client. If the server stopped working or compromised, for example, hacking or even insider attack, passwords stored in database will become publicly known. This system proposes that setting where multiple servers which are used to, so that the password can be split in these servers authenticate client and if one server is compromised, the attacker still cannot be able to view the client’s information from the compromised server. This system uses the Advance encryption standard algorithm encryption and for key exchange and some formulae to store the password in multiple server. This system also has the hybrid authentication as another phase to make it more secure and efficient. In the given authentication schema we also use SMS integration API for two step verification. |
![]() | : | 0 |
DOI Link | : | |
Paper Title | : | Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc Network |
Authors | : | Laxmi R. Shinde, Trupti A. Jadhav, Prajakta R. Baviskar, , |
Affiliations | : | |
Abstract | : | MANET is a collection of mobile devices that can communicate with each other without the use centralized administration. One of the interesting application of MANET is File Sharing. File Sharing in MANET is similar to that of the regular file sharing, what makes the difference is it allow user to access the data or memory of that nodes only which are connected to it. This File sharing many a times leads to Network Partitioning, i.e dividing a network into two different networks .Due to which the nodes may act selfishly. The selfishness of some of the nodes may lead in reduction of performance in terms of accessing data. The proposed system will use the SCF-tree technique for building a tree of Node which will share their data in terms of Replica, and as a result it detects the selfish node in the network. The replica insures that performance is not degraded. |
![]() | : | 0 |
DOI Link | : | |
Paper Title | : | Data Trend Analysis by Assigning Polynomial Function For Given Data Set |
Authors | : | Dhaneesh T, , , , |
Affiliations | : | |
Abstract | : | This paper aims at explaining the method of creating a polynomial equation out of the given data set which can be used as a representation of the data itself and can be used to run aggregation against itself to find the results. This approach uses least-squares technique to construct a model of data and fit to a polynomial. Differential calculus technique is used on this equation to generate the aggregated results that represents the original data set. |
![]() | : | 0 |
DOI Link | : | |
Paper Title | : | Online Payment System using Steganography and Visual Cryptography |
Authors | : | Priyanka More, Pooja Tiwari, Leena Waingankar,Vivek Kumar and A. M. Bagul, , |
Affiliations | : | |
Abstract | : | In recent time there is rapid growth in E-Commerce market. Major concerns for customers in online shopping are debit card or credit card fraud and personal information security. Identity theft and phishing are common threats of online shopping. Phishing is a method of stealing personal confidential information such as username, passwords and credit card details from victims. It is a social engineering technique used to deceive users. In this paper new method is proposed that uses text based steganography and visual cryptography. It represents new approach which will provide limited information for fund transfer. This method secures the customer's data and increases customer's confidence and prevents identity theft. |
![]() | : | 0 |
DOI Link | : | |
Paper Title | : | Engine Sudden Stopped after the Heavy Noise: Study on Crankshaft |
Authors | : | Dr. Porag Kalita, , , , |
Affiliations | : | |
Abstract | : | The main engine shaft driven round by the piston is called Crankshaft. Crankshaft converts reciprocating motion of the piston into rotary motion. Crankshaft rotates at high speeds and bears the stresses due to power impulse during power stroke. Counterweight balance the forces caused due to out of balance of the crank offset from shaft axis. Crankshaft of an engine has to be designed for strength and stuffiness against bending and torsion stresses due to gas loads and also to take care of stress due to vibration and provide sufficient bearing area to suit the bearing pressure. Crankshafts have drilled oil passages through which oil flows from the main to the connecting rod bearings. The power impulses tend to setup twisting vibration in the crankshaft. When a piston makes down on its power stroke, it thrusts, through the connecting rod, against a crankpin with a force that may exceed 2 tones and this motion is called torsion vibration. Experimental was conducted on Heavy Commercial Vehicle engine that excessive blow by as well as excessive engine oil consumption and as a result engine sudden stopped after the heavy noise. |
![]() | : | 0 |
DOI Link | : | |
Paper Title | : | Design Issues and Threats in Security Risk Management |
Authors | : | Naveen Kumar R, G. Ravindra Babu, , , |
Affiliations | : | 1Reseaech Scholar, Department of Computer Science and Engineering, Siddhartha Institute of Engineering and Technology, Hyderabad, Telangana, India. |
Abstract | : | Risk management can be thought of as a process, a theory, a procedure, or a methodology. Its primary objective is to identify assets, vulnerabilities, and threats and then to protect those assets. Risk management is crucial to any organization for the simple reason that it is the best available tool that enables them to determine the level of protection required for their many different assets at the lowest possible cost. A few different approaches have been created for the purpose of managing the risks associated with information security. These methodologies incorporate a variety of strategies, procedures, and perspectives in order to analyses and evaluate risks. |
![]() | : | Not Assigned |
DOI Link | : | Not Assigned |
1. C. Alberts and A. Dorofee, Managing Information Security Risks: The OCTAVE Approach. Addison Wesley Professional, July 2002. 2. K. Stolen, F. den Braber, T. Dimitrakos, R. Fredriksen, B. A. Gran, S.-H. Houmb, Y. C. Stamatiou, and J. O. Aagedal., Business Component-Based Software En-gineering, ch. Model-based risk assessment in a component-based software engineering process: the CORAS approach to identify security risks, pp. 189–207. Kluwer, 2003. 3. C. S. S. Ltd, “Security risk analysis and ISO 17799 / BS7799 compliance tool.” http://www.riskworld.net/. 4. R. Inc. http://www.riskwatch.com. 5. M. Hamdi and N. Boudriga, “Computer security risk management: Theory, challenges, and countermeasures,” International Journal of Communication Systems, vol. 18, no. 8, pp. 763–793, 2005. 6. M. Hamdi and N. Boudrgia, “Computer network security risk management: A survey,” in Jordan International Conference on Computer Science and Engineer-ing, (Jordan), October 2004. 7. T. R. Peltier, Information Security Risk Analysis. AUERBACH, 1st ed., 2001. 8. B. A. Fessi, M. Hamdi, S. Benabdallah, and N. Boudriga, “A decisional framework system for computer network intrusion detection,” European Journal of Operational Research, vol. 177, pp. 1824–1838, 2007. 9. M. Hamdi, N. Boudriga, and M. S. Obaidat, Handbook of Information Security, vol. 3, ch. Security Policy Guidelines, pp. 945–959. John Wiley & Sons, Inc, 2006. 10. E. Verzuh, The Portable MBA in Project Management, ch. Project management is a strategic strength, pp. 5–25. John Wiley & Sons, Inc., 1 ed., 2003. 11. H. Kerzner, Strategic Planning for Project Management using A Project Manage-ment Maturity Model. John Wiley & Sons, Inc., 2001. 12. K. Heldman, PMP: Project Management Professional Study Guide. SYBEX Inc., 2002. 13. P. M. Institute, A Guide to the Project Management Body of Knowledge: PMBOK Guide. Project Management Institute, 3rd ed., 2004. 14. R. L. Kliem and I. S. Ludin, Project Management Practitioner’s Handbook. AMA-COM, 1998. 15. Harvard Business School, Project Management Manual, October 1997. 9-697-034. 16. Project management: Guide to project management. No. BS6079-1:2002, British Standards Institute, May 2002. 17. I. O. for Standardization, ISO 10006:2003 Quality management systems - Guide-lines for quality management in projects. June 2003. 18. I. O. for Standardization, ISO 10007:2003 Quality management systems - Guide-lines for configuration management. 2003. 19. V. Temnenco, “Software estimation, enterprise-wide: Reasons and means.” IBM developer Works, June 15 2007. 20. H. Leung and Z. Fan, Handbook of Software Engineering and Knowledge Engineering, vol. II, ch. Software Cost Estimation. 2001. 21. B. Boehm, C. Abts, and S. Chulani, “Software development cost estimation approaches - a survey,” Tech. Rep. USC-CSE-2000-505, USC Center for Software Engineering, April 10 2000. 22. R. Smith and L. Edwards, “Cocomo- scorm: Interactive courseware project cost modeling,” in Proceedings of International Council of Systems Engineering Con-ference, 2006. 23. B. Boehm, R. Valerdi, J. A. Lane, and A. W. Brown, “Cocomo suite methodology and evolution,” CROSSTALK The Journal of Defense Software Engineering, pp. 20–25, 2005. 24. C. A. I. (CAI), “Focus on lawrence putnam: A cai state of the practice interview,” IT Metrics and Productivity Journal, vol. Special Edition, pp. 1–12, September 2006. 25. O. Marban, E. Menasalvas, and C. Fernandez-Baizan, “A cost model to esti-mate the e?ort of data mining projects (dmcomo),” Information Systems ournal, vol. 33, pp. 133 – 150, 2008. 26. B. W. Boehm, C. Abts, A. W. Brown, S. Chulani, B. K. Clark, E. Horowitz, R. Madachy, D. Reifer, and B. Steece, Software Cost Estimation with COCOMO II. Prentice Hall, 2000. 27. T. E. Hastings and A. Sajeev, “A vector-based approach to software size measurement and effort estimation,” IEEE Transaction on Software Engineering, vol. 27, no. 4, pp. 337–350, 2001.
Paper Title | : | A System for Denial of Service Attack Detection Based On Multivariate Corelation Analysis |
Authors | : | Sonam Deshmukh, Shoaib Inamdar, Sachin Waghmode, , |
Affiliations | : | |
Abstract | : | in computing world, a denial-of-service (DoS) or is an process to make a machine or network resource unavailable to its regular users.DoS attack minimizes the efficiency of the server, inorder to increase the efficiency of the server it is necessary to identify the dos attacks hence MULTIVARIATE CORRELATION ANALYSIS(MCA)is used, this approach employs triangle area for obtaining the correlation information between the ip address. Based on extracted data the denial of service-attack is discovered and the response to the particular user is blocked, this maximizes the efficiency. Our proposed system is examined using KDD Cup 99 data set, and the influence of data on the performance of the proposed system is examined. |
![]() | : | 0 |
DOI Link | : | |
Paper Title | : | Weighing Parameters and Analysis of Congestion using Markov Chain Model |
Authors | : | Nimma Mukesh Raghavendra, Avinash Poojari, , , |
Affiliations | : | |
Abstract | : | Markov chain (discrete-time Markov chain named after Andrey Markov, is a random process that undergoes transitions from one state to another on a state space. It must possess a property that is usually characterized as "memorylessness": the probability distribution of the next state depends only on the current state and not on the sequence of events that preceded it. This specific kind of "memorylessness" is called the Markov property. Here the parameters are land use, road inventory, traffic characteristic and pedestrian. These parameters are enhancing the travel time of the road user because of not reaching the standards. These parameters helps to identify the gap .Linear equation helps to quantile measure of delay and encounter by meeting the needs of the user by standards to provide LOS A. |
![]() | : | 0 |
DOI Link | : | |
Paper Title | : | Clustering and Parallel Empowering Techniques for Hadoop File System |
Authors | : | K.Naga Maha Lakshmi , A.Shiva Kumar , , , |
Affiliations | : | |
Abstract | : | In the Big Data group, Apache Hadoop and Spark are gaining prominence in handling Big Data and analytics. Similarly MapReduce has been seen as one of the key empowering methodologies for taking care of large-scale query processing. These middleware are traditionally written with sockets and do not deliver best performance on datacenters with modern high performance networks. In this paper we investigate the characterizes of two file systems that support in-memory and heterogeneous storage, and discusses the impacts of these two architectures on the performance and fault tolerance of Hadoop MapReduce and Spark applications. We present a complete methodology for evaluating MapReduce and Spark workloads on top of in-memory file systems and provide insights about the interactions of different system components while running these workloads |
![]() | : | 0 |
DOI Link | : | |
Paper Title | : | AI & NPC IN GAMES |
Authors | : | Kshama Tupe, Pankaj Singh, Sagar Parmar and Tushar Pandey, , |
Affiliations | : | |
Abstract | : | Here we have proposed a system with better AI and NPC Behavior algorithms that improve the competition level of the non-playable characters making the game additional realistic and difficult. Additionally with more realism, it enriches the experience for the user resulting in user satisfaction and higher game play realism resulting in further growth of gaming and entertainment. The NPCs can learn from the gameplay and therefore the encompassing setting in addition as tricks methods and techniques of the player and consequently style its own set of strategies which might facilitate it to extend its possibilities of winning. |
![]() | : | 0 |
DOI Link | : | |
Paper Title | : | Smart Content Security Policy for Mozilla Firefox |
Authors | : | Dr. Kailas R. Patil, Madhulika Jhawar, Rashida Mumin, Aashay Mokadam and Kunal Kharsadia, , |
Affiliations | : | |
Abstract | : | Use of Internet is very common these days. There are a lot of websites containing different kinds of content over the internet. An average person visits atleast 8-10 web pages per day. The web page sometimes contains malicious contents or some inline scripts which the user is not aware of. The scripts try to force display contents on user’s screen or try to steal information from the user without the user’s awareness. This makes the user vulnerable. Content Security Policy is a way to defeat these types of attacks. If CSP is enforced on the web browser, content will be displayed from trusted sources only and all other contents will be blocked. UserCSP was implemented to facilitate this purpose. In UserCSP, users could specify the policies they want to enforce. However, this had a drawback too. An average user is not familiar with the concept of CSP. So, we are making SmartCSP, an add-on for Mozilla Firefox. This will facilitate the users who are not aware of CSP by inferring the policies based on the structure of HTML pages loaded. |
![]() | : | 0 |
DOI Link | : | |
Paper Title | : | Review of Various Image Processing Techniques for Currency Note Authentication |
Authors | : | Trisha Chakraborty, Nikita Nalawade, Abhishri Manjre, Akanksha Sarawgi and Pranali P Chaudhari , , |
Affiliations | : | |
Abstract | : | In cash transactions, the biggest challenge faced is counterfeit notes. This problem is only expanding due to the technology available and many fraud cases have been uncovered. Manual detection of counterfeit notes is time consuming and inefficient and hence the need of automated counterfeit detection has raised. To tackle this problem, we studied existing systems using Matlab, which used different methods to detect fake notes. |
![]() | : | 0 |
DOI Link | : | |
Paper Title | : | Course Scheduling in University using Agent Exploration in Timetable Media |
Authors | : | Jamaludin Hakima, Sri Hartatib, , , |
Affiliations | : | |
Abstract | : | Course scheduling in University is still a study area that is interesting for researchers to explore and search its optimization [4]. Scheduling optimization still depends on the needs of a University. Manual scheduling is still the most commonly used option, but it requires a skilled and expert person or person who has been accustomed to do so. However, the result still needs a lot of corrections. Course scheduling in College/University in Indonesia using semester credit system (SKS) is a challenge in making course schedule. Some scheduling methods have been proposed in several studies such as genetic methods [10], integer programming [1] and other methods using other agents [2] [7]. In the previous studies, the generated schedules must still be adjusted and or inflexible when there are changes in the schedule or its pattern, and its model cannot be applied to all Colleges/Universities in Indonesia using semester credit system (SKS). This study offers a method which is referring to the constrains/conditions in Universities but still flexible in its formation and change. Agent will explore timetable media to locate time cell/slot corresponding to the scheduling using credit system (SKS). |
![]() | : | 0 |
DOI Link | : | |
Paper Title | : | Generating Aggregate Key for Group Data Sharing by Means of Cloud Data Storage |
Authors | : | Sandeep Srinivas Dwaram, 2 P.Venkateswara Rao., , , |
Affiliations | : | |
Abstract | : | Sharing of encrypted data with various kinds of users via public cloud storage always leads to greater security concerns over many types of data leaks in the cloud. To make it possible, efficient generation of keys and their management should take place in developing schemes. In the situation of sharing any class of documents to any class of users demands various numbers of encryption keys for each document used. Further, need a large number of keys for keyword query searching for each document used. This increases the complexity in generating various numbers of keys for decrypting the document and decreases the efficiency of keyword query searching. This also makes the user to store large number of keys for both encryption and search which makes the situation impractical. In this we approached, by suggesting concept of key aggregate searchable encryption (KASE) and initializing the idea through a real KASE scheme, in which the data owner will send a single aggregate key of group of documents to group of authorized users, and the user will send a single trapdoor to the cloud server for keyword query searching. |
![]() | : | 0 |
DOI Link | : | |
Paper Title | : | OBD-II and Oxygen Sensor: Review the I.C Engine - Emissions related Performance |
Authors | : | DR. PORAG KALITA, , , , |
Affiliations | : | |
Abstract | : | Increased awareness regarding the adverse effects of pollutants from automobile exhaust gases has been the main driving force for implementation of more and more stringent legislation on automobile exhaust emissions in many Countries. On Board Diagnostic (OBD), regulations in the USA for light and medium duty vehicles (I. C. Engines) are introducing to implement the air quality standard. California and the Federal Government used a driving cycle to certify 1966 and newer models which referred to as either California Cycle or the Federal Test Procedure (FTP). The California Air Resource Board (CARB) and the objective to reduce hydrocarbon (HC) emission caused by malfunction of the vehicles emission control systems adopted the California code of Regulations (CCR) known as OBD – II. The diagnosis is based on the oxygen sensor response time that is the amount of time to complete a switch from rich to lean or lean to rich transition that gives the ability to control the engine at stochiometric Air Fuel ratio. Typical values of lean mean voltage and rich mean voltage are 300 to 600 mill volts respectively. For post-cat O2 sensor, in particular, voltage level checks and heater systems checked and done and the failure thresholds for the post O2 sensor, diagnostic must not be set at a point beyond the failure limit where the catalyst diagnostic is affected. |
![]() | : | 0 |
DOI Link | : | |
Paper Title | : | Hybrid Protocol for Security Peril Black Hole Attack in MANET |
Authors | : | Priya Manwani, Deepty Dubey, , , |
Affiliations | : | |
Abstract | : | MANETs (Mobile Ad hoc Network) is a self-governing system in which different mobile nodes are connected by wireless links. MANETs comprise of mobile nodes that are independent for moving in and out over the network. Nodes are the devices or systems that is laptops, mobile phone etc. those are participating in the network. These nodes can operate as router/host or both simultaneously. These nodes can form uninformed topologies as per their connectivity among nodes over the network. Security in MANETs is the prime anxiety for the fundamental working of network. MANETs frequently will be ill with security threats because of it having features like altering its topology dynamically, open medium, lack of central management & monitoring, cooperative algorithms and no apparent security mechanism. These factors draw an attention for the MANETs against the security intimidation. In this paper we have studied about security attack in MANET and its consequences, proposed technique for black hole detection is hybrid in nature which combines the benefit of proactive and reactive protocol and proposed technique is compared with AODV. |
![]() | : | 0 |
DOI Link | : | |
Paper Title | : | Heat Transfer Analysis of Helical Tubes Using Ansys and Catia |
Authors | : | Md Ameer Basha, Prof. K Supriya, , , |
Affiliations | : | |
Abstract | : | A CFD package (ANSYS FLUENT 15.0) was used for the numerical study of heat transfer characteristics of a helical coiled double pipe heat exchanger for counter flow. The CFD results when compared with the results from different studies were well within the error limits. The study showed that the effective configuration of heat transfer performances of the counter-flow. The simulation was carried out for fluid to fluid heat transfer characteristics for different fluids, solids and different inlet temperatures were studied. Effectiveness of Helical Tube Heat Exchanger is calculated on different fluids and solid configurations. Among different fluids and solid configurations copper-water combination gives more effectiveness 16.33% than other combinations. From the velocity vector plot it was found that the fluid particles were undergoing an oscillatory motion inside both the pipes. From the pressure and velocity contours it was found that along the outer side of the pipes the velocity and pressure values were higher in comparison to the inner values. |
![]() | : | 0 |
DOI Link | : | |
Paper Title | : | Fatigue Life Estimation of Forged Steel and Ductile Iron Crankshaft of Single Cylinder Engine Using Fatigue assessment Techniques |
Authors | : | Mr Md Mozaiyan Ahsan, Mr.N Amara Nageswara Rao, , , |
Affiliations | : | |
Abstract | : | Crankshaft is one of the critical components of an IC engine, failure of which may result in disaster and makes engine useless unless costly repair performed. It possesses intricate geometry and while operation experiences complex loading pattern. In IC engines, the transient load of cylinder gas pressure is transmitted to crankshaft through connecting rod, which is dynamic in nature with respect to magnitude and direction. However, the piston along with connecting rod and crankshaft illustrate respective reciprocating and rotating system of components. the dynamic load and rotating system exerts repeated bending and shear stress due to torsion, which are common stresses acting on crankshaft and mostly responsible for crankshaft fatigue failure. Hence, fatigue strength and life assessment plays an important role in crankshaft development considering its safety and reliable operation. The present paper is based on comparative studies of two crankshafts of fatigue life assessment of a single cylinder diesel engine crankshaft by using High cycle fatigue (HCF) technique |
![]() | : | 0 |
DOI Link | : | |
Paper Title | : | Design and Analysis of Engine Cylinder Fins of Varying Geometry and Materials. |
Authors | : | Mr. Manir Alam, Mrs. M. Durga Sushmitha, , , |
Affiliations | : | |
Abstract | : | The Engine cylinder is one of the major automobile components, which is subjected to high temperature variations and thermal stresses. In order to cool the cylinder, fins are provided on the cylinder to increase the rate of heat transfer. By doing thermal analysis on the engine cylinder fins, it is helpful to know the heat dissipation inside the cylinder. The principle implemented in this project is to increase the heat dissipation rate by using the invisible working fluid, nothing but air. We know that, by increasing the surface area we can increase the heat dissipation rate, so designing such a large complex engine is very difficult. The main purpose of using these cooling fins is to cool the engine cylinder by air. Presently Material used for manufacturing cylinder fin body is Cast Iron. In this thesis, using materials Copper and Aluminium alloy 6082 are also analyzed. Thermal analysis is done using all the three materials by changing geometries, distance between the fins and thickness of the fins for the actual model of the cylinder fin body. |
![]() | : | 0 |
DOI Link | : | |
Paper Title | : | Automotive Tyres: Study on Vehicle Computerized Wheel Alignment†|
Authors | : | Dr. Porag Kalita, , , , |
Affiliations | : | |
Abstract | : | Buying high quality tyres, buying the proper size for any automobiles, buying from a reputable tyre retailer, are of all these things are importance for tyre safety, long tyre life and driving satisfaction. While alignment is that aligning the front wheels relative to each other. Setting of castor, camber, toe-in or toe-out and king pin inclination. Computerized wheel alignment, a series of tests and adjustments to ensure that wheels and tyres are properly positioned on the vehicle. There are two types of wheel aligners, i.e. Mechanical types, which is attach to the wheel spindle and some have light beams that display the measurement on a computer screen and others are electronic that indicate the measurements on meter, display or printouts. Many vehicles today are equipped with a rear suspension design that allows adjustments for rear wheel alignment or with a design that requires a rear wheel check. When a rear suspension is not in alignment, it may create problems for the front as well as the rear wheels problems like an apparent crooked steering wheel, camber or toe induced front tyre wear and directional pull or lead. Vehicles have changed the suspension , steering and drive train design all require a total vehicle i.e. four wheels approaches to alignment for proper performance of today’s vehicles. |
![]() | : | 0 |
DOI Link | : | |
Paper Title | : | Power Generation by Hybrid Model |
Authors | : | Prof .P .Y. Kumbhar, Ankita Dhanashetti, Mubeen Chitgupkar and Meghanjali Bidave, , |
Affiliations | : | |
Abstract | : | As there is lack of conventional energy on the earth. One another way to generate power is by non-conventional energy. In this experiment power is generated by non-conventional energy sources like solar energy, wind energy and some another kind ofenergy that is usually get watsted by human being i.e from human energy. We are focusing mainly on pressure energy by human along with solar and wind energy. One can now experiment on other types of energy like vehicle pressure on road, train’s pressure on railway track etc. In this experiment piezoelectric crystals are used for the purpose of generating power. One step ahead we can implement it on the road so that by pressure of car and other vehicle and solar energy we can generate power and use it in many applications like road lights, traffic lights etc. We can implement the same principle on the Railway track to generate power by pressure of wheel of Trains.. |
![]() | : | 0 |
DOI Link | : | |
Paper Title | : | High Dimensional Data Clustering with Hub Based DEC |
Authors | : | Ms. Ghatage Trupti B. , Prof. Takmare Sachin B., , , |
Affiliations | : | |
Abstract | : | Clustering is an important topic in various fields like machine learning and data mining. In many real applications, we often face very high dimensional data. Many dimensions are not always helpful or may even worsen the performance of the subsequent clustering algorithms. To deal with this problem one way is to employ first dimensionality reduction and then apply clustering. But if we consider the requirement of clustering in the process of dimensionality reduction and vice versus then the performance of clustering will be improved. Discriminative Embedded Clustering (DEC) is an algorithm that combines clustering and subspace learning. Hubness is the tendency of high dimensional data to have hubs. Hubs are situated near cluster centeres; therefore major hubs can be successfully used as cluster prototypes or guide during centroid based configurations. Use of hubness for clustering leads to improvement over centroid-based approaches. In this paper we propose a system for clustering high dimensional data using Discriminative Embedding Method with Hub based clustering. |
![]() | : | 0 |
DOI Link | : | |
Paper Title | : | Detection and Avoidance of Sensitive Data in Host-assisted Mechanism using Fuzzy Fingerprint Technique |
Authors | : | Ms. Patil Deepali E., Prof. Takmare Sachin B, , , |
Affiliations | : | |
Abstract | : | The Data-leak cases, human mistakes are one of the causes of data loss. Deliberately planned attacks, inadvertent and human mistakes lead to most of the data-leak incidents. The detecting solutions of inadvertent sensitive data leaks caused by human mistakes and provide alerts for organizations. A common approach is to screen content in the storage and transmission for exposed sensitive information. Such an approach requires the detection operation to be conducted in secrecy. The data-leak detection (DLD) privacy- preserving solution to solve the special set of sensitive data digests is used in detection. The advantage of data owner is safely delegate the detection operation to a semihonest provider without revealing sensitive data to the provider. Internet service providers can offer their customers DLD as an add-on service with strong privacy guarantees. Evaluation results support accurate detection with very small number of false alarms under various data-leak scenarios. Host-assisted mechanism for the complete data-leak detection for large-scale organizations. To design the Host-assisted mechanism for DLD, using data signature and fuzzy fingerprint. |
![]() | : | 0 |
DOI Link | : | |
Paper Title | : | Privacy-Preserving Scalar Product Computation over Personal Health Records |
Authors | : | K.Samunnisa, Maloth Bhavsingh, , , |
Affiliations | : | |
Abstract | : | Cloud computing utilizes networks of substantial gatherings of servers normally running minimal effort shopper PC innovation with particular associations with spread data-processing errands crosswise over them. This common IT framework contains extensive pools of frameworks that are connected together. Frequently, virtualization techniques are utilized to expand the force of Cloud computing. Checking and prompting patients by means of versatile social insurance framework is the present pattern in a therapeutic field that goes about as a lifeline because of its accessibility at whatever time and anyplace. This e-social insurance framework requires patient's private data to be accessible at a cloud, outsourced data stockpiling. This situation confronts privacy issues. In this paper, we concentrate on attribute-based access control and another privacy-preserving scalar product computation (PPSPC) strategy and giving a private cloud to versatile clients to guarantee less cost, compelling and secure capacity. The data entered in the versatile is exchanged to the private cloud, which thus is handled and again exchanged to people in a general cloud. The affect ability of the outsourced cloud data is kept up utilizing Attribute-based Encryption method which restricts data access based on encoding/unscramble of data with its access structures. The data privacy is guaranteed by PRF based key administration and secures indexing methodologies. Individual Health records perceptibility access control to the real data proprietor is the center thought of this venture. The undertaking isolates the access clients into Public Domain Users and Private Domain client |
![]() | : | 0 |
DOI Link | : | |
Paper Title | : | Experimental Study on Automobile Clutch Plate Juddering |
Authors | : | Dr.Porag Kalita, , , , |
Affiliations | : | |
Abstract | : | The coupling of two working parts, for example two shaft, in such a way as to permit connection or disconnection at will without the necessity of bringing both parts to rest, and when connected to transmit the required amount of power without sign is known as Clutch and or, the friction or hydraulic actuated mechanism used for coupling two shafts or similar parts, one or which drives and the other of when is driven by the Clutch. Clutch plate assembly has three principal components i.e. Flywheel, Clutch plate and Pressure Plate. The device used is the Clutch which transmits the rotary motion of the engine to the transmission, which required by the driver and located between the engine and the gear box and which it connects and disconnects the two units smoothly without shock. As per the theory of the Clutch, first assumption is used in case of problems involving power absorption by friction. Second assumption is used in case of problems involving power transmission by friction between the surfaces. |
![]() | : | 0 |
DOI Link | : | |
Paper Title | : | Experimental Study on Auto- Electrical Centre (VEC) |
Authors | : | Dr. Porag Kalita, , , , |
Affiliations | : | |
Abstract | : | With the complex electronic sensors, controls and conveniences in today’s 21st century designs , the modern vehicles has become a massive collection of electrical wiring and hardware. Consequently, the electrical wiring content in a vehicle has become a significant factor in the overall cost and major factor in vehicle safety and reliability. Quality and Reliability terms are often used in relation to each other in reference to produce quality. Because, of the numerous issue relating to wire management in complex electrical system, design must be carefully planned and developed. To eliminate, these problems in today’s power distribution systems has developed as the series 3000 Vehicle Electrical Centre or VEC. The compact series 3000 offers components density up to 32 device and is ideal for distributed power approaches n, “ add-on†situation and applications where space is at a premium. Because the VEC is modular, it can be stacked to accommodate large and more complex distributions systems. |
![]() | : | 0 |
DOI Link | : | |
Paper Title | : | V3I105 Efficient Technique to Optimize Cloud Storage in Multi-Tenant Environment |
Authors | : | P Jyothi , , , , |
Affiliations | : | |
Abstract | : | With the advent of cloud computing technologies, a paradigm of migrating on-premise cloud storage management to multitenant cloud storage management is been an active challenge for the researchers. Storage management in cloud environment aims to enhance performance of the data center by efficiently optimizing the underlying storage resources. The vital concept behind the centralized multitenant storage management is defining an integrated platform for data analytics, collection and governance which in turn increases the efficiency and effectiveness of the multitenant storage environments. This paper introduces an optimized multitenant cloud storage framework that incorporates the storage data analytics that suggest the service recommendation for the storage administrator. In addition, secured cloud storage architecture is presented to assure the security of the data stored in the multitenant cloud storage system. |
![]() | : | 0 |
DOI Link | : | |
Paper Title | : | V3I104 Detection and Rectification of Distorted Fingerprints |
Authors | : | S.Bindu Madhuri, Dr. V.V.V.Ramana, Dr.S.Prem Kumar, , |
Affiliations | : | |
Abstract | : | Elastic distortion of fingerprints is the chief causes for fake mismatch. As this reason disturbs all fingerprint detection applications, it is particularly risk in negative identification applications, such as watch list and deduplication applications. In such applications, cruel persons may deliberately distort their fingerprints to hide recognition. In this paper, we recommended novel algorithms to identify and correct skin distortion based on a single fingerprint image. Distortion detection is demonstrated as a two-class classification problem, for which the registered ridge orientation map and period map of a fingerprint are helpful as the feature vector and a SVM classifier is educated to act the classification task. Distortion rectification (or equivalently distortion field estimation) is analyzed as a regression difficulty, where the input is a distorted fingerprint and the output is the distortion field. To simplify this problem, a database (called reference database) of various distorted reference fingerprints and matching distortion fields is built in the offline stage, and then in the online stage, the closest neighbor of the input fingerprint is planned in the reference database and the equivalent distortion field is used to change (Convert) the input fingerprint into a normal fingerprints. Capable results have been achieved on three databases having many distorted fingerprints, namely NIST SD27 latent fingerprint database, Tsinghua Distorted Fingerprint database, FVC2004 DB1, |
![]() | : | 0 |
DOI Link | : | |
Paper Title | : | V3I103 Decentralized Access Control to Secure Data Storage on Clouds |
Authors | : | D.V. Himaja, K.Lakshmi, Dr.S.Prem Kumar, , |
Affiliations | : | |
Abstract | : | Cloud computing is a growing computing standard in which the computing structure is given as a examine over the Internet. The Cloud computing tool gives ability of data storage and access for cloud users, but when outsourcing the data to a third party results in safety issue of cloud data so data are confined by restricting the data. We propose a new decentralized access control system for secure data storage in the clouds that supports anonymous authentication. In this method, the cloud checks the means of the series without knowing the user’s individuality before storing data in the clouds. Our method adds extra feature in access control for which only skilled users are able to decrypt the data stored on cloud. This method prevents repeat attacks and supports the creation, alteration, and reading data stored in the cloud. We also address, user revocation. We propose a new representation for data storage and access in clouds. Our method avoids storing multiple encrypted copies of the same data. In our structure for secure data storage, cloud stores encrypted data (without being able to decrypt them). The main innovation of this model is addition of key distribution centers (KDCs). |
![]() | : | 0 |
DOI Link | : | |
Paper Title | : | V3I102 Provable Multicopy Dynamic Data Possession in Cloud Computing Systems |
Authors | : | R.Bindu, U.Veeresh, Dr.S.Prem Kumar, , |
Affiliations | : | |
Abstract | : | Gradually more and more organizations are opting for outsourcing data to remote cloud service providers (CSPs). clients can rent the CSPs storage infrastructure to store and get back almost infinite amount of data by paying amount per month. On behalf of an improved level of scalability, availability, and durability, some clients may want their data to be virtual on multiple servers across multiple data centers. The more copies the CSP is asked to store, the more amount the clients are charged. As a result, clients need to have a strong assurance that the CSP is storing all data copies that are decided upon in the service contract, and all these copies are reliable with the most recent modifications issued by the clients. Map-based provable multicopy dynamic data possession (MB-PMDDP) method is being proposed in this paper and consists of the following features: 1) it affords an proof to the clients that the CSP is not corrupt by storing less copies; 2) it supports outsourcing of dynamic data, i.e., it supports block-level functions, such as block alteration, addition, deletion, and append; and 3) it permits official users to effortlessly access the file copies stored by the CSP. In addition, we discuss the security against colluding servers, and discuss how to recognize corrupted copies by a little revising the projected scheme. |
![]() | : | |
DOI Link | : | |
Paper Title | : | V3I101 |
Authors | : | K.Sudhamani, P.Rama Rao, Dr.S.Prem Kumar, , |
Affiliations | : | |
Abstract | : | |
![]() | : | |
DOI Link | : | |
Latest issue :Volume 10 Issue 1 Articles In press
☞ INVITING SUBMISSIONS FOR THE NEXT ISSUE : |
---|
☞ LAST DATE OF SUBMISSION : 31st March 2023 |
---|
☞ SUBMISSION TO FIRST DECISION : In 7 Days |
---|
☞ FINAL DECISION : IN 3 WEEKS FROM THE DAY OF SUBMISSION |
---|
Citations Indices | All |
Citations | 1026 |
h-index | 14 |
i10-index | 20 |
Source: Google Scholar |
Acceptance Rate (By Year) | |
Year | Rate |
2021 | 10.8% |
2020 | 13.6% |
2019 | 15.9% |
2018 | 14.5% |
2017 | 16.6% |
2016 | 15.8% |
2015 | 18.2% |
2014 | 20.6% |