Just Submited Papers List

S.No.: 1
Title : Multi-objective particle swarm optimization for flexible job shop scheduling problem
Authors Name: Kamble Sachin Vasant
Authors Affilation: Department of CSE, Rajarambapu Institute of Technology, Islampur(Sangli), MS, India
Volume & Issue No.: Volume3Issue4
Abstract: Abstract— In this paper, an effective hybrid algorithm based on Particle Swarm Optimization (PSO) and Simulated Annealing (SA) is proposed for solving Flexible Job Shop Scheduling with five objectives to be minimized simultaneously: makespan, maximal machine workload, total workload, machine idle time, total tardiness. Rescheduling strategy used for shuffle workload once machine breakdown in proposed algorithm. The hybrid algorithm combines the high global search efficiency of PSO with the powerful ability to avoid being trapped in local minimum of SA. A hybrid multi-objective PSO (MPSO) and SA algorithm proposed to identify an approximation of the Pareto front for Flexible job shop scheduling (FJSSP). Pareto front and crowding distance used for to identify the fitness of particle in proposed algorithm. MPSO is significant to global search and SA used to local search. The effectiveness and efficiency of the proposed MPSO algorithm is applied for two benchmark set. Result indicates that the proposed algorithm significant in term quality of non-dominated solution compared to the other algorithm in the literature.
S.No.: 2
Title : Sustainable Public Open Space Model in Residential and City Area, Jakarta
Authors Name: Siti Sujatini
Authors Affilation: Architecture Department, Universitas Persada of Indonesia YAI, Salemba Raya Street, No.7 Jakarta, Indonesia
Volume & Issue No.: Volume3Issue4
Abstract: The high density of Jakarta, the capital of Indonesia, has increased complexity of the problems. The less avaibility and higher cost of the land in Jakarta cause a need for public open space in particular as a function of the general public to be neglected. The existence of open space, espsesially as public functions needed for the community of Jakarta. This study aims to built model in the utilization of sustainable public open space for community in Jakarta. The methods used in this research is the study of literature and review journals, data collection method is use a qualitative approach, to the study of empirical and descriptive about the phenomenon of public open space utilization that occurred in Paseban Kampong and Taman Fatahillah. The result of research that can be recommand that: to achieve sustainable public open space required the presence of Community Empowerment by means of cooperation between the government, private and public
S.No.: 3
Title : DUAL STAIRCASE SHAPED MICROSTRIP PATCH ANTENNA
Authors Name: G.SREEDHAR KUMAR, P.C.PRAVEEN KUMAR, B.A.SARATH MANOHAR BABU, B.NARESH BABU
Authors Affilation: 1Assistant Professor, Department of ECE, G.PULLAIAH College of Engg & Technology, Kurnool, AP, India
Volume & Issue No.: Volume3Issue4
Abstract: The microstrip antenna finds its place in varied and upcoming technologies because it offers low profile, narrow bandwidth, high gain, and compact antenna element. The biggest disadvantage of microstrip antenna is its narrow bandwidth and poor impedance matching capacity. To make microstrip antenna compatible with commercial applications, the bandwidth enhancement and impedance matching of such antennas has to be done. The impedance matching of antenna depends upon type and position of the feed because impedance matching of source at the feeding point of antenna is very important for efficient operation of antenna. In order to improve the impedance matching a dual staircase shaped microstrip patch antenna is used in this paper. The dual staircase patch is fed with a coaxial feed technique. By using IE3D software, the simulated results gives good impedance matching and the bandwidth obtained is 6% at 3.79GHz frequency. The proposed antenna which comes under S-Band (2-4GHz) of microwaves can be used in RADAR applications like weather radar, surface ship radar, and some communications satellites.
S.No.: 4
Title : Study on bifurcation of H-H parameters and its variants contribution to neurology
Authors Name: Taslima Ahmed
Authors Affilation: tezpur university
Volume & Issue No.: Volume3Issue4
Abstract: The important application of bifurcation analysis of a system is estimated by the variables of H-H model. Graphical User Interface (GUI) is essential for proper visualization of results and therefore, here, we are discussing some GUI based bifurcation panels. Based on these panels, we can investigate different abnormal disorders for neurological applications
S.No.: 5
Title : COMPARATIVE ANALYSIS OF DATA CLASSIFICATION TECHNIQUES BY PROCESSING ON ELIMINATION OF MISSING VALUES DATA FROM WEB REPOSITORY FOR KNOWLEDGE DISCOVERY
Authors Name: Minaxi B. Prajapati
Authors Affilation: VJKM INSTITUTE, VADU
Volume & Issue No.: Volume3Issue4
Abstract: An emerging technology extensively used in every field – Data mining that deals with the innovation and analysis of usage pattern(s) and relationships within trends leading to discover knowledge. This is a way of process to analyze a data from different viewpoints and summarized it into meaningful information. Data can be stored in a range of forms of databases and storage area. This can be superior way to extracting valuable knowledge for decision making. The main objective of this study is to show the classifying data with a reasonable accuracy for improving the performance in data mining by applying elimination of missing values on a data. The learning converses data mining techniques to process a medical data set and classify the importance of heart diseases. The massive amounts of data related heart diseases to be gathered, unfortunately that are not “mined” to determine hidden information for valuable decision by healthcare practitioners. A heart disease covers the different diseases that have an effect on the heart. Some categories to be include related heart diseases - Cardiomyopathy and Cardiovascular. The objective will be focused on getting the higher level percentage of accuracy. The implementation of this result carried out with the open source software environment Orange Canvas with three Classification Techniques – NB, KNN and SVM.
S.No.: 6
Title : Automatic Image Segmentation Using Graph Cut
Authors Name: Prabhjot Singh, Er. Deepak Sharma
Authors Affilation: M.Tech Scholar, Deptt. of ECE, MMEC, Mullana, Ambala.
Volume & Issue No.: Volume3Issue4
Abstract: Image segmentation is the process of partitioning an image into multiple segments, so as to change the representation of an image into something that is more meaningful and easier to analyze. Several general-purpose algorithms and techniques have been developed for image segmentation. Image segmentation refers to partition of an image into different regions that are homogenous or similar and inhomogeneous in some characteristics as the new graph cut approach is an emerging technique for image segmentation, as it can minimize an energy function composed of data term estimated in feature space and smoothness term estimated in an image domain. Previous approaches using graph cuts have shown good performance for image segmentation, they manually obtained prior information to estimate the data term, thus automatic image segmentation is one of issues in application using the graph cuts method. As it requires low computational complexity and is therefore very feasible for real-time image segmentation processing. In the experiments, we investigated problems of previous methods such as mean shift segmentation, watershed technique and automatic graph cut based image segmentation As a result, the graph cut method showed better performance than previous methods.
S.No.: 7
Title : An Overview of Cloud Computing Security Issues
Authors Name: Ms. Kanchan Kumari
Authors Affilation: Baba Mast Nath University, Rohtak
Volume & Issue No.: Volume3Issue4
Abstract: Cloud Computing is a new general purpose internet-based technology through which information is stored in servers and provided as a service and on-demand to clients. It is a set of resources and services offered through the Internet. Cloud services are delivered from data centers located throughout the world. Cloud Computing is a model for enabling service user’s ubiquitous, convenient and on-demand network access to a shared pool of configurable computing resources. General example of cloud services is Google apps, provided by Google and Microsoft SharePoint. Deploying cloud computing in an enterprise infrastructure bring significance security concerns. Successful implementation of cloud computing in an enterprise requires proper planning and understanding of emerging risks, threats, and vulnerabilities, and possible countermeasures. In this we describe the reasons of that why people switch from traditional IT to the cloud and also discuss the characteristics and types of cloud computing. The security for Cloud Computing is emerging area for study.
S.No.: 8
Title : EFFICIENT AUDIT SERVICES FOR DATA OUTSOURCING IN CLOUDS
Authors Name: ANURAJ C.K
Authors Affilation: SAPTHAGIRI COLLEGE OF ENGINEERING, DHARMAPURI
Volume & Issue No.: Volume3Issue4
Abstract: This paper introduce a dynamic audit service for integrity verification of untrusted and outsourced storages. Our audit service is constructed based on the techniques, fragment structure, random sampling, and index-hash table, supporting provable updates to outsourced data and timely anomaly detection. Constructed on interactive proof system (IPS) with the zero knowledge property, our audit service can provide public auditability without downloading raw data and protect privacy of the data. Also, our audit system can support dynamic data operations and timely anomaly detection with the help of several effective techniques, such as fragment structure, random sampling, and index-hash table (IHT). We also propose an efficient approach based on probabilistic query and periodic verification for improving the performance of audit services. A proof-of-concept prototype is also implemented to evaluate the feasibility and viability of our proposed approaches. Our experimental results not only validate the effectiveness of our approaches, but also show that our system does not create any significant computation cost and require less extra storage for integrity verification.
S.No.: 9
Title : A New Segmentation Technique of Handwritten Offline Arabic Text
Authors Name: Asst. Prof. Dr. Ban N. Dhannoon*, Dr. Imad J. Mohammed** and Muna khalaf**
Authors Affilation: college of computer science /university of baghada
Volume & Issue No.: Volume3Issue4
Abstract: Arabic handwriting recognition is the hardest applications in the optical character recognition (OCR) because of the characteristics of Arabic characters and the variety of written styles which differ from writer to another, even for the same writer at a different time. To get good recognition, there must be a correct segmentation. This paper proposes a new segmentation technique for Arabic text. Three stages are needed to reach to highest ratio of segmentation. Line segmentation which depends on the row density to detect spaces among lines and baseline for each line. The second stage is used to extracts dots information from each line and erases them. Final stage is shape segmentation which is proposed to segment word/sub word into characters. The segmentation model is designed based on the nature of Arabic writing. Results are tested on the IfN/ENIT database of Tunisian city names which indicate the effectiveness of the proposed system.
S.No.: 10
Title : Secure Data Transmission Using DNA ENCRYPTION
Authors Name: ANUPRIYA AGGARWAL, PRAVEEN KANTH
Authors Affilation: Research Scholar, BRCM, Bahal, Haryana, India
Volume & Issue No.: Volume3Issue4
Abstract: DNA Encryption is preferable biological technique for securing text/image because of its parallelism, vast storage and fast computing quality. The process involve biological molecule present in human body called DNA abbreviated as Deoxyribose Nucleic Acid .The DNA molecule is synthesized and protein component part is extracted and then converted to nitrogen base . This nitrogen base is used in Encryption/Decryption and formulated as A (Adenine), C (Cytosine), T (Thymine) and G (Guanine) characters. DNA Cryptography components are ACTG characters only and how the message gets merged and located is known as DNA Cryptography. This ACTG characters create DNA Sequence S and merged with message M to produce new sequence S’ and send to receiver where Sequence S’ back converted to S. The paper will introduce traditional methods of DNA cryptography in which there is need of key and proposed methods ,in which introduction to key is not required ,hence removing the tension of securing the key. The proposed method involves Complementary pair method.
S.No.: 11
Title : Implementation of Artificial Immune System Algorithms
Authors Name: K. Srilakshmi
Authors Affilation: Associate Professor Department of CSE Dadi Institute of Engineering & Technology, Anakapalle, Visakhapatnam.
Volume & Issue No.: Volume3Issue4
Abstract: An artificial immune system (AIS) that is distributed, robust, dynamic, diverse and adaptive. It captures many features of the vertebrate immune system and places them in the context of the problem of protecting a network of computers from illegal intrusions .This involved investigating AIS algorithms and implementing a suitable one. A number of AIS algorithms were examined and chosen to achieve high classification accuracies while possessing less computational complexity than other algorithms. Using the AIS concepts and algorithms to find how the human immune system works. The immune recognition is based on the complementarily between the binding region of the receptor and a portion of the antigen called epitope. Antibodies present a single type of receptor, antigens might present several epitopes. This means that different antibodies can recognize a single antigen.
S.No.: 12
Title : Geo-informatics Ontology model:Review One
Authors Name: S.S.Pawar,Prof.P.A.jadhav
Authors Affilation: BVDUCOEP
Volume & Issue No.: Volume3Issue4
Abstract: Web based services or position based services related to spatial data is rising research domain in geographical knowledge processing schemes. This services are been used by desktop client in efficient information extraction from knowledge .the services have got wider in implementation in generating analytical solutions to a map ,current latitude /longitude positional information extraction from knowledge source. This web services are serving in form of android application, Desktop based services like GRASS, ARC MAP, which process accurately Geographical knowledge source from diverse dataset to form a consistent solution .The applications improve the ability of Geographical informatics scheme to provide expedient interface by user and facilitate the user spatial thought incorporation in query expansion and then query reformulation, finally to filter queries no natural language understanding to user modelled solution semantic web i.e. Structured knowledge dataset is the platform for development of framework, with ontology theory in concept mining to form meaningful set of queries and select a single to extract solution from knowledge base. Ontology language module OWL keeps a track of relations in between objects and features presented by them to form a class hierarchy of ontology in implementation domain, concept, and task ontology. The research domain formulated a new sub research domain in geographical informatics with platform as semantic web i.e Geosemantic web mapping of real word entities. This paper we present is a survey model of 10 research papers that incorporated similarity study of topic and sub research domain in scheme formulation. A combinational approach is selected in formulation of research topic with semantic web as platform of implementation. The major addressable research area is semantic incorporation in user interface which is level 1 research in scheme enhancement from point view of interface, modelling building a semantic, and concept mining interface on semantic data source
S.No.: 13
Title : Secure Information Brokering and Sharing in Distributed Systems
Authors Name: L. Ravi Sankar, E. Sudheer Kumar
Authors Affilation: (CSE, Sree Vidyanikethan Engg. College, Tirupati., India)
Volume & Issue No.: Volume3Issue4
Abstract: To facilitate extensive collaborations, today’s organizations raise increasing needs to share information through on-demand information access. Information Brokering System (IBS) is a peer-to-peer overlay network support information sharing among large collection of data sources. It consists of diverse data servers and brokering components, to locate data servers for client queries. Peer-to-peer (P2P) systems are gaining increasing popularity as a scalable means to share data among a large number of autonomous nodes. Earlier, Information Brokering Systems adopt server side access control deployment and honest assumptions on brokers. Little attention on privacy of data and metadata stored and exchanged within the IBS. We study the privacy in Privacy- Preserving Information Brokering in Distributed Information Sharing through an innovative automaton segmentation scheme and query segment encryption and data management for processing XML data in a p2p setting. The proposed system can integrate security enforcement and query routing while preserving system-wide privacy with reasonable overhead through privacy, end-to-end performance, and scalability.
S.No.: 14
Title : Identifying high energy molecules and predicting their detonation potency using chemometric modeling approaches
Authors Name: Kunwar P. Singh*, Shikha Gupta
Authors Affilation: Environmental Chemistry Division CSIR-Indian Institute of Toxicology Research (Council of Scientific & Industrial Research) Post Box 80, Mahatma Gandhi Marg, LUCKNOW-226 001, India
Volume & Issue No.: Volume3Issue4
Abstract: This study reports linear chemometric modeling methods for identification of explosives and prediction of their characteristic parameters using set of descriptors derived for diverse chemicals. Diversity and multi-collinearity in data were tested using Tanimoto index and variance inflation factor. Linear discriminant analysis (LDA) and k-means clustering methods were developed for discriminating the ideal, non-ideal, and non-explosives, whereas logistic regression (LR) and partial least squares regression (PLSR) methods for predicting the detonation velocity (DV) and pressure (DP). A set of 244 chemicals, comprised of 92 ideal, 84 non-ideal, and 68 non-explosives was considered and non-quantum mechanical descriptors were calculated. Optimal model parameters were determined through internal and external validation procedures. Generalization and prediction abilities of the models were evaluated using various statistical parameters. k-means clustering and LDA models yielded misclassification rate of 10.66 and 9.84 % in complete data. In LR, the correlations between measured and predicted values of DV and DP were 0.867 and 0.853 in training and 0.949 and 0.928 in test data, whereas for PLSR, the respective values were 0.870 and 0.824 in training, and 0.947 and 0.929 in test data. The models developed here can be used as tools for predicting new chemicals.
S.No.: 15
Title : TOWARDS HIGH SECURITY AND FAULT TOLERANT DISPERSED STORAGE SYSTEM WITH OPTIMIZED INFORMATION DISPERSAL ALGORITHM
Authors Name: Hrishikesh Lahkar
Authors Affilation: School of Engineering and Technology/Jain University
Volume & Issue No.: Volume3Issue4
Abstract: A Robust Data Storage System is one of the classes of fault tolerant systems. It is built around protocols that enable retrieval of data where only a subset of servers needs to be contacted. It enables efficient sharing and retrieval of data and the ability to scale to a number of servers as needed. A Robust Data Storage System basically comprises two main considerations. Firstly, integrity and consistency of data and secondly, security.
S.No.: 16
Title : Description of Rotation-Invariant Textures using Local Binary Pattern Features
Authors Name: Prashant H. Gutte, Prashant K. Kharat
Authors Affilation: Walchand College of Engineering, Sangli, India
Volume & Issue No.: Volume3Issue4
Abstract: Texture classification is one of the most interesting research topics in the field of computer vision. This paper aims at classifying static as well as dynamic textures (DT). Uniform Local binary pattern (LBP) is a combination of structural and statistical analysis model for classification of both static and dynamic textures. The LBP Histogram Fourier (LBP-HF) uses Fast Fourier Transform (FFT) for calculating global rotation invariant of LBP histogram for static texture classification. For dynamic texture classification, LBP-TOP method is used, which computes LBP from three orthogonal planes. It combines both motion and appearance together for classification. The results show that, LBP-HF outperforms uniform LBP as well as basic rotation invariant LBP method for static-textures and LBP-TOP gives higher accuracy for dynamic-textures.
S.No.: 17
Title : Image Segmentation and Clustering using Mahalanobis Distance
Authors Name: Sourabh Chandra, Smita Paira
Authors Affilation: Assistant Professor, Department of Computer Sc & Engineering, Calcutta Institute of Technolog
Volume & Issue No.: Volume3Issue4
Abstract: This algorithm is segmentation of images with clustering methods tested on ten color images, which are initially transformed to (R*B*G*) color space. The algorithm is useful to perform segmentation of images with clustering methods. Conditions, results and conclusions are described below. The results are compared using both Mahalanobis and Euclidean distances in the clustering algorithm.
S.No.: 18
Title : Preserving Security techniques and data privacy using encryption methods in cloud computing
Authors Name: Kodakanchi Vijay Kumar
Authors Affilation: Institute of Aeronautical Engineering(IARE)
Volume & Issue No.: Volume3Issue4
Abstract: Cloud Computing provides data computing to store and retrieve the user data and it is the use of activity of using Computer hardware and software. The primary usage of cloud computing is data storage and capacity of storage for cloud users. Ensuring an IT Services that are provided to a user over a network and Providing a services infrastructure as a service (IaaS), platform as a service (PaaS), or software as a service (SaaS). Nowadays the Cloud security implementation is the important factor by using various cryptographic algorithms, DES, AES, RSA and ECC. Cloud computing are facing problems like data privacy and other data protection issues. Security and privacy are the key issues for cloud storage. Computational privacy is a fact of crypto-graphic system that ensures the privacy of data (processing by untrusted server). Cryptography is tool for data and computer security i.e. by encryption of data. This paper proposes about the different security techniques, cryptographic algorithm to address the data security and privacy issue in cloud storage in order to protect the data stored in the cloud system.
S.No.: 19
Title : Accelerometer Technology Based Helmet to Control the Movement of Wheel Chair for Handicapped Persons
Authors Name: Renitto Jose E
Authors Affilation: Government Engineering College Idukki, Painavu
Volume & Issue No.: Volume3Issue4
Abstract: This paper introduces a “Human Computer Interfacing Device ”, A system/helmet to control the motor rotation of a wheel chair based on the head movement of a physically challenged person. In order to obtain the movement of the physically challenged person an accelerometer (ADXL335) based transmitter is fitted on persons head using a helmet. Based on the head movements the transmitter will generate command signals which will be received by receiver fitted on the wheel chair wirelessly. This receiver after receiving signal will drive the motor fitted to the wheel chair. The ADXL335 is a small, thin, low power, complete 3-axis accelerometer with signal conditioned voltage outputs, all on a single IC. The wheel chair supports the four directions i.e. left, right, forward, back. The wheelchair is controlled by a PIC16F877A microcontroller. The system also contains obstacle detection to detect various kind of obstacle comes in the path of wheel chair.
S.No.: 20
Title : A Review on fault diagnosis of Induction Motors using Artificial Neural Networks
Authors Name: Kanika Gupta
Authors Affilation: Baddi University
Volume & Issue No.: Volume3Issue4
Abstract: Different alternatives to detect and diagnose faults in induction machines have been proposed and implemented in the last years. The technology of artificial neural networks has been successfully used to solve the motor incipient fault detection problem. The characteristics, obtained by this technique, distinguish them from the traditional ones, which, in most cases, need that the machine which is being analysed is not working to do the diagnosis. This paper reviews an artificial neural network (ANN) based technique to identify rotor faults in a three-phase induction motor. The main types of faults considered are broken bar and dynamic eccentricity. At light load, it is difficult to distinguish between healthy and faulty rotors because the characteristic broken rotor bar fault frequencies are very close to the fundamental component and their amplitudes are small in comparison. As a result, detection of the fault and classification of the fault severity under light load is almost impossible. In order to overcome this problem, the detection of rotor faults in induction machines is done by analysing the starting current using a newly developed quantification technique based on artificial neural networks.
S.No.: 21
Title : A Review on Direct Torque Control For Induction Motor
Authors Name: Devender Kumar
Authors Affilation: Baddi University
Volume & Issue No.: Volume3Issue4
Abstract: The aim of this paper is to review the origin and developments of Direct Torque Control (DTC), an advanced control technique of induction motor drives yielding superior performance. The direct torque control is one of the excellent control strategies available for torque control of induction machine. It is considered as an alternative to Field Oriented Control (FOC) technique. The DTC is characterized by the absence of PI regulators, co-ordinate transformations, current regulators and pulse width modulated signal generators. DTC also allows a good torque control in steady state and transient operating conditions. The purpose of this study is to control the speed of 3-Phase Induction Motor with Artificial Neural Network (ANN) controller. The Artificial Neural Network Controller will be designed and must be tuned. This is about introducing the new ability of in estimating speed and controlling the 3-phase Induction Motor. In this paper, a study of ANN Controller is used to control the speed of 3-Phase Induction Motor. The ANN Controller is programmed to control the speed of 3-Phase Induction Motor at certain speed level. Direct Torque Control (DTC) is one of the latest techniques to control the speed of motor.
S.No.: 22
Title : A Data warehouse Approach to Soft Computing Related Fuzzy Data Mart
Authors Name: Y K Dinnesh
Authors Affilation: 1Assistant Professor, Dadi Institute of Engineering & Technology, Anakapalle, Vishakapatnam
Volume & Issue No.: Volume3Issue4
Abstract: A subset of data warehouse is called Data mart is a local data warehouse used for storing business oriented information for future analysis and decision making. In business scenarios, where some of the data are fuzzy Data Mart, it may be effective to strong warehouse the analysis of fuzzy data. This paper presents a Fuzzy Data Mart model that imparts the exile interface to the users and also extends the Data Warehouse for storing and managing the fuzzy data along with the approval data records. We have proposed, and design data mart, which improves the decision making processes. we use (ETL) Extraction, Transformation and Load tools for better performance. In addition to that, the membership function of fuzzy Data Mart is used for succinctly.
S.No.: 23
Title : Software reuse – changes in process and organizations
Authors Name: Dr. B V Ramana Murthy, Mr. Vuppu Padmakar
Authors Affilation: Department of CSE, Department of CSE Jyotishmathi College of Technology and Science, Guru Nanak Institutions Technical Campus Shamirpet, Hyderabad, India
Volume & Issue No.: Volume3Issue4
Abstract: The transition form no reuse to informal code reuse in which chunks of code are copied adapted slightly, and then incorporated the new systems occurs when developers are familiar with each other’s code and trust each other, later on the trend has changed and the programming paradigms’ has changed there is evolution of object orientations, which formally “ Never rewrite the code but reuse the code” reusability can be achieves by inheritance at the programming level but the context here is at the product level, which can be achieved by using component technologies which is order of the day, component is a readily available software module which can be used directly or can be tailor made according to the specification. For better reusability the company must have vision towards the market to find out which companies they create, the organizational strength must emphasize on domain engineering and application engineering. The company has to maintain reuse manager for the management of these components in a better way. Using component technologies the company can able to save development cost, time and can deliver product with quality.
S.No.: 24
Title : Model 2 Implementation of Forecast System for modeling user’s web-browsing conduct
Authors Name: Ajit Patil, Prof.P.A Jadhav, Prof.S.Z.Gawali
Authors Affilation: IT, BVDUCOEP
Volume & Issue No.: Volume3Issue4
Abstract: forecasting the subsequent leaf to be opened by mesh of network consumers partakes attracted a huge volume of investigation effort recently owing to the optimistic influence of such forecast on diverse extents of mesh of network centred submissions. Chief methodologies pragmatic for this target are design model of Markov and bunching of information. There are two types of Markow Model low and higher order. Markow Model of low order consists of with low accuracy, while Markow Models of high order are concomitant with great formal of Area complication. In additional view, clustering methods are not used for classifications as they are unsupervised methods. My Research article engages integrating in huddling with base order Markov model practices. Momentous huddle are fashioned by isolating pre-progression statistics and these are worn as tuition informatics in favour of Implementation of 2nd command Markov replica methodologies. Dissimilar detachment process of algorithmic procedure of k-means huddle process of algorithm are scrutinize in command to locate a most advantageous one. Trials disclose that integration of huddle of mesh text information in accordance to mesh informatics with base level order Markov replica perk ups the mesh page forecast truthfulness.
S.No.: 25
Title : The issues of cloud service delivery through virtualization of Dynamically Generated multiple virtual machines on the World Wide Web
Authors Name: G.Rajesh1, G.Sreenivasulu2
Authors Affilation: 1AUDISANKARA COLLEGE OF ENGINEERING &TECHNOLOGY,GUDUR 2AUDISANKARA COLLEGE OF ENGINEERING &TECHNOLOGY,GUDUR
Volume & Issue No.: Volume3Issue4
Abstract: Abstract— The issues of cloud service delivery through virtualization is of practical interest in many applications such as detecting an cloud service delivery failures. Cloud service is an umbrella term used to refer to web based development and services. In this paper, we investigate a variety VM cloud techniques.cloud VM technology allows multiple virtual machines to run on a single physical machine Furthermore, cloud multiple VM servers play the important key roles between users and web sites, we could reduce the response time ,processing time and save network bandwidth. We provide a generalized cloud framework for computing the amount of resources needed to support multiple VM services, without missing the deadline for any cloud service. We construct the problem as an optimization formulation that uses a generic cloud delivery dynamic cost function. Although using Dynamically Generated multiple virtual machines shared-memory IPC is a well-known strategy, the recent introduction of the VM shared memory mechanism to Linux KVM makes the strategy allows data stored remotely to be temporarily cached on desktop computers, mobile phones or other Internet-linked devices.Using the Amazon Simple Storage Service (S3), we confirm Unlimited Storage, $0.20 per GByte of data transferred, $0.15 per GByte-Month for storage used,Second Life Update:1TBytes, 40,000 downloads in 24 hours only and Cloud computing is impossible if you cannot connect to the Internet but our paper confirm Unlimited Storage, $0.80 per GByte of data transferred, $0.85 per GByte-Month for storage used,Second Life Update:3TBytes, 2,40,000 downloads in 24 hours and Cloud computing is impossible if you cannot connect to the Internet.
S.No.: 26
Title : SURVEY ON CLUSTERING AND OPTIMIZATION TECHNIQUES TO DEVELOP HYBRID CLUSTERING TECHNIQUE
Authors Name: Malwinder singh, Meenakshi bansal
Authors Affilation: Department of Computer Engineering, Punjabi University Yadavindra College of Engineering, Talwandi Sabo Punjab, India
Volume & Issue No.: Volume3Issue4
Abstract: Cluster is the process of partition or grouping of a given set of data into disjoint cluster. This is done in such a pattern that the same cluster are alike and data belong to different set is different. Main task of clustering are explorative data mining, and a common technique for statistical data analysis used in many fields, including machine learning, pattern recognition, image analysis, information retrieval, and bioinformatics. Optimization is process of finding the most cost effective or highest beneficial alternative under the given constraints by maximizing desired factors and minimizing undesired ones.
S.No.: 27
Title : Intrusion Detection using MFCC , VQA and LBG Algorithm
Authors Name: Charu Chhabra, Archit Kumar
Authors Affilation: 1Maharshi Dayanand University, CBS Group of Institutions, Jhajjar , Haryana, India
Volume & Issue No.: Volume3Issue4
Abstract: An Intrusion Detection system is a system whose main responsibility is to detect suspicious and malicious system activity . The main goal of any Intrusion Detection system is to alert the system administrator with any kind of an intrusion . In order to discriminate between normal and different types of attacks we use classification and clustering based algorithms . Many misuse detection system includes the rule based expert systems . A Speaker Recognition is one of the most useful biometric recognition techniques in this world where insecurity is a major threat. Many organizations like banks, institutions, industries etc are currently using this technology for providing greater security to their vast databases. The Vector Quantization algorithms (VQA) have been used to detect the intrusion and also by reporting with an accurate performance of 96% with minimum possible false alarms. The system extracts a small amount of data from the speaker’s voice signal that can later be used to represent that speaker is an intruder or not . Mel Frequency Cepstrum Coefficients (MFCC) have been used to extract a small amount of data from the speaker’s voice signal that can later be used to represent that speaker. LBG Algorithm is used for vector quantization .
S.No.: 28
Title : A TOOL TO EVALUATE THE PERFORMANCE OF UCP
Authors Name: Ms. Punam Bajaj, Ms. Dipeeka Rani Bathla
Authors Affilation: 1Assistant Professor, Department of CSE Chandigarh Engineering College, Mohali, Punjab, India
Volume & Issue No.: Volume3Issue4
Abstract: Software effort estimation is an important part of software development work and provides essential input to project feasibility analyses, bidding, budgeting and planning . A no. of techniques is used for estimation of effort amongst which widely used are COCOMO I and COCOMO II that estimates the cost in terms of efforts. But effort is linearly or non-linearly dependent on size of developing software. For size estimation Lines of Code(LOC) counts technique showed its comforts as developer do not have to solve any mathematical equation , just count the no. of lines of developed software. But uncertainties in its results and other limitations led us to different techniques. Then came Functions Point (FP) technique proving its goodness in almost every field where LOC lacked. FP had been used for long time for size estimation which is the main input for COCOMO I and COCOMO II. Nowadays softwares are based on Object Oriented Paradigm and OOP languages. Developers use Unified Modeling Language (UML) notations and diagrams for estimation of each aspect of software development. Hence, this paper presents a technique that supports OOPs for estimation purposes by implementing USE CASE POINT ESTIMATION TECHNIQUE (UCP) which overcomes the drawbacks of FP which is Procedural Oriented(POP). Further evaluation of the performance of UCP in comparative to COCOMO I and COCOMO II is taken. This all will be performed with the help of a self implemented tool having all the functionalities at one location.
S.No.: 29
Title : EVALUATION OF VARIOUS DIGITAL IMAGE FOG REMOVAL ALGORITHMS
Authors Name: Gagandeep Singh, Gagandeep Singh
Authors Affilation: Computer Science & Engg., S.I.E.T, Manawala, Amritsar
Volume & Issue No.: Volume3Issue4
Abstract: This paper is a review on the various fog removal algorithms. Fog removal otherwise called visibility restoration refers to diverse systems that suppose to lessen or evacuate the degradation that have happened while the digital picture was being acquired. In this paper, various fog removal techniques have been analysed. It has been shown that each fog removal technique has its own features and drawbacks. The presented methods have neglected the techniques to reduce the noise issue, which is presented in the output images of the existing fog removal algorithms. Not much effort has focused on the integrated approach of the CLAHE and Dark channel prior. The problem of the uneven illuminate has also neglected by the most of the researchers.
S.No.: 30
Title : Cryptanalyzing of Message Digest Algorithms Md5 Using Quadratic Salt
Authors Name: pradeep singh solanki
Authors Affilation: Suresh Gyan VIhar University ,Jaipur
Volume & Issue No.: Volume3Issue4
Abstract: Hashing based algorithms are the most commonly used method to strain passwords into hashes which are theoretically non decipherable. This paper proposes a new method and analyses of implementing one more tier to the message digest 5 algorithm using an enhancement of IDEA algorithm, a potential salt by the developer and an basic method to peruse a new root method to set the pattern for two roots as salt into the message digest 5 algorithm.
S.No.: 31
Title : IMPECT OF VIRUS: a strategy against virus attack in daily life
Authors Name: Pramod Kumar Maurya, Gireesh Dixit, Jay Prakash Maurya
Authors Affilation: 1M.Tech Scholar, Department Of Computer Science, MPM, Bhopal, Bhopal, 462021, India
Volume & Issue No.: Volume3Issue4
Abstract: Virus, worm & malware territory unit little projects is additionally connect the bit of programming framework or a benevolent email may undoubtedly be covering a bug. Once it will assault projects like document frameworks of programming bundle. It will devastate the windows composed record and little fix that territory unit utilized in the applying pulverized by it hurt done to the pc framework will change wherever from erasing records to stage move the system.
S.No.: 32
Title : Dynamic Trajectory Planning Algorithm for Automated Driving for Unmanned Ground Vehicles
Authors Name: Shivani Thakur, Virender Sharma, Amit Chhabra
Authors Affilation: Department of Computer Science & Engineering Swami Devi Dayal Institute of Engineering & Technology-Barwala Panchkula, Krukshetra University Krukshetra Haryana-126102 India
Volume & Issue No.: Volume3Issue4
Abstract: In this modern world, the need of automation is in every possible field of human interference. Instead of wasting time on trivial less productive jobs people can invest in more productive work while automating the petty jobs, driving being one such job. Further, human error while driving is a major issue. Unmanned Ground Vehicle was introduced to solve such a problem. UGV has been an area of research since its introduction as a concept. Obstacle detection and decision making are major areas of research in UGVs. Trajectory planning algorithm is implemented for this purpose. In our proposed algorithm, Dynamic trajectory planning algorithm, we have extended the scope of TPA. It can now be used for multiple detections thus enhancing decision making. Simulation results confirm the results of our modification.
S.No.: 33
Title : A Review of an Digital Audio Watermarking using DCT Technique
Authors Name: Priyanka Pattanshetti
Authors Affilation: G.H.Raisoni College of Engg and Management
Volume & Issue No.: Volume3Issue4
Abstract: Recent rapid improval in the communication technology through internet access is easier. In the field of digital media the issue of copyright protection is raised. Digital watermarking provides verification, protection and copyright security of digital media. The watermark provides a signature, embedded data of original signal which is inaudible to human ear and malicious attempts to remove it and undetectable. The main aim is to protect sharing and without authority copying the contents and the solution for this problem has been anticipated as “Audio watermarking”. This technique does the hiding of copyright information into audio signal without affecting the original signal. In this paper, an audio watermarking technique to embed and extract procedure in DCT domain is proposed.
S.No.: 34
Title : DYNAMIC HISTOGRAM EQUALIZATION, PCA & MAX-DCT BASED MULTI-FOCUS IMAGE FUSION
Authors Name: Shivdeep kaur
Authors Affilation: GIMET
Volume & Issue No.: Volume3Issue4
Abstract: The idea of image fusion in multi-focus cameras to combine data from various images of the similar landscape in order to bring the multi focused image. Discrete cosine transform is an image fusion method which is extra appropriate and acceptable in real-time systems using discrete cosine transform based standards of motionless image or video. This review paper shows an arranged approach for fusion of multi-focus images which is based on variance calculated in discrete cosine transform domain. In this paper a new technique is proposed which will combine the PCA, Max-DCT and dynamic histogram equalization to raise the outcome. The proposed algorithm is calculated and implemented in MATLAB using image processing toolbox. The experiments have shown that the proposed algorithm outperforms over the available techniques.
S.No.: 35
Title : IT for Environmental Sustainability
Authors Name: Ms. Deepa Gangwani, Ms. Navneet Popli
Authors Affilation: Working with MERI affiliated to GGSIPU, Delhi
Volume & Issue No.: Volume3Issue4
Abstract: Global warming and its increasing effects have shed light on the many global environmental issues. Our planets fragile ecosystem is under attack on many fronts as a result of industrialization and our growing usage of Information Technology. Worldwide change is needed in order to avert this catastrophe. According to survey, the upper limit of atmospheric CO2 is 350 pm (parts per million) which is currently 390ppm, more than the limit. This means that there is need to bring it down as soon as possible in order to avert the damages of global warming. This paper is divided in to three sections, wherein, in first section we will introduce the topic and also explain the reasons for deteriorating environmental conditions. In second section we will throw some light on the strategies adopted by IT companies for environmental sustainability, few suggestions towards green computing and finally a proposal on how the education sector can reduce its carbon footprint by using the strategies mentioned in the paper. This paper will end up by concluding the results and the future scope.
S.No.: 36
Title : COLOR IMAGE FUSION USING INTEGRATED MODIFIED DCT AND PCA BASED TECHNIQUE AND DARK CHANNEL PRIOR
Authors Name: Jasmeet kaur,Er.Rajdavinder Singh Boparai
Authors Affilation: CGC,GHARUAN
Volume & Issue No.: Volume3Issue4
Abstract: Image fusion is one of the most recent trends in image processing.In a number of applications several image fusion methods have been used. The main objective of image fusion is to combine information from multiple images of the same scene in order to deliver only the useful information. The discrete cosine transforms (DCT) based methods of image fusion are more suitable and time-saving in real-time systems using DCT based standards of still image. To eliminate the drawbacks of the previous work an integrated algorithm has been proposed in this paper. The proposed algorithm integrates the modified model of PCA and DCT to fuse the color images. The dark channel prior has also been used to remove color artefacts and improve the colors of the output image. The proposed algorithm has been designed and implemented in MATLAB tool using image processing toolbox. The comparative analysis carried out on the basis of various performance evaluating parameters has shown the significance of the proposed algorithm.
S.No.: 37
Title : EVALUATING THE SHORTCOMINGS OF VARIOUS VISUAL SENSOR FUSION TECHNIQUES
Authors Name: Simranjit singh, Gagandeep singh
Authors Affilation: Dept. of Comp. Sci. & Eng. Shri Sai College of Engineering And Technology
Volume & Issue No.: Volume3Issue4
Abstract: This paper has presents a study on the several digital image fusion methods. The most important function of visual sensor image fusion is found to be in multi-focus cameras to merge information from numerous digital images of the identical sight in order to bring only more informative fused digital image. The DCT based algorithms of visual sensor fusion are supplementary appropriate and time-saving in real-time organization. In this study an well-organized technique for fusion of multi-focus imagery based on variance calculated in DCT domain is presented. The overall objective is to find the gaps in existing literature and signifying a suitable method to decrease the gaps of existing techniques.
S.No.: 38
Title : Implementation of Steganography with Cryptography for Providing Data Confidentiality
Authors Name: M. N. Bhaskar, B. Naresh Achari
Authors Affilation: 1M. Tech 2nd year Department of CSE , Shri Shiridi Sai Institute of Science and Engineering College, Ananthapuramu,
Volume & Issue No.: Volume3Issue4
Abstract: Since many years, the protection of transmission knowledge is turning into important. The protection of this transmission knowledge is finished secret writing or knowledge concealment algorithms. To decrease the coordinated universal time, the info compression is important. Since few years, a replacement downside is attempting to mix in an exceedingly single step, compression, secret writing and knowledge concealment. So far, few solutions are planned to mix image secret writing and compression for instance. Nowadays, a replacement challenge consists to enter knowledge in encrypted pictures. Since the entropy of encrypted image is largest, the embedding step, thought-about like noise, is not potential by mistreatment normal knowledge concealment algorithms. a replacement plan is to use reversible knowledge concealment algorithms on encrypted pictures by want to get rid of the embedded knowledge before the image secret writing. Recent reversible knowledge concealment strategies are planned with high capability, however these strategies do not seem to be applicable on encrypted pictures. during this paper we tend to propose associate degree analysis of the native variance of the marked encrypted pictures so as to get rid of the embedded knowledge throughout the secret writing step. We have got applied our methodology on numerous pictures, and that we show and analyze the obtained results.
S.No.: 39
Title : Returning different against Large-Scale System online security attacks
Authors Name: chandrasekar
Authors Affilation: Institute of Aeronautical Engineering
Volume & Issue No.: Volume3Issue4
Abstract: In this manner, it is important to apply successful encryption/unscrambling systems to improve information security. On the off chance that any malignant assaults happened the confirmed client does not think about that. The proposed framework utilizes two calculations known us Bio-Metric Encryption Algorithm
S.No.: 40
Title : The issues of cloud service delivery through virtualization of Dynamically Generated multiple virtual machine Services without missing deadline on the World Wide Web
Authors Name: G.Rajesh1, G.Sreenivasulu2
Authors Affilation: AUDISANKARA COLLEGE OF ENGINEERING &TECHNOLOGY,GUDUR
Volume & Issue No.: Volume3Issue4
Abstract: Abstract— The issues of cloud service delivery through virtualization is of practical interest in many applications such as detecting an cloud service delivery failures. Cloud service is an umbrella term used to refer to web based development and services. In this paper, we investigate a variety VM cloud techniques.cloud VM technology allows multiple virtual machines to run on a single physical machine Furthermore, cloud multiple VM servers play the important key roles between users and web sites, we could reduce the response time ,processing time and save network bandwidth. We provide a generalized cloud framework for computing the amount of resources needed to support multiple VM services, without missing the deadline for any cloud service. We construct the problem as an optimization formulation that uses a generic cloud delivery dynamic cost function. Although using Dynamically Generated multiple virtual machines shared-memory IPC is a well-known strategy, the recent introduction of the VM shared memory mechanism to Linux KVM makes the strategy allows data stored remotely to be temporarily cached on desktop computers, mobile phones or other Internet-linked devices.Using the Amazon Simple Storage Service (S3), we confirm Unlimited Storage, $0.20 per GByte of data transferred, $0.15 per GByte-Month for storage used,Second Life Update:1TBytes, 40,000 downloads in 24 hours only and Cloud computing is impossible if you cannot connect to the Internet but our paper confirm Unlimited Storage, $0.80 per GByte of data transferred, $0.85 per GByte-Month for storage used,Second Life Update:3TBytes, 2,40,000 downloads in 24 hours and Cloud computing is impossible if you cannot connect to the Internet.
S.No.: 41
Title : Medical Data Mining Life Cycle and its Role in Medical Domain
Authors Name: Surabhi D Thorat,Seema S Kute
Authors Affilation: Marathwada Institute of Technology(E)
Volume & Issue No.: Volume3Issue4
Abstract: Data mining is defined as a computational process of pattern detection from large datasets that leads to the extraction of information that is valuable and often ‘hidden’ .Data mining plays a vital role in decision making and for predicting the future trends of market. In recent years data mining is becoming a buzzword in the field of medical science. In this paper, I highlighted the Medical Data Mining Life Cycle which represents the complete phases that are involved in making the best possible solutions for the issues arises in healthcare sectors, it also presents a brief introduction of data mining approach in the field of medical science and focuses on the challenges in healthcare sector and the tools that are used in data mining.
S.No.: 42
Title : DNA cryptography with chaotic mapping on images: a comparative study
Authors Name: Siyamol Chirakkarottu, Anil Johny
Authors Affilation: Federal institute of science & technology
Volume & Issue No.: Volume3Issue4
Abstract: Information in the form of digital images circulated over the networks is gaining popularity and great concern due to its enormous applications and necessities. in many of the applications, the images contain confidential information. the best method to protect images from unauthorized access is image encryption. Recent researches of image encryption algorithms have been increasingly based on chaotic systems. With the research of DNA computing has began, DNA cryptography is born as a new cryptographic field, in which DNA is used as information carrier and the modern biological technology is used as an implementation tool. Dna cryptography can be applied along with chaotic encryption for better performance.
S.No.: 43
Title : Secure Information Brokering and Sharing in Distributed Systems
Authors Name: L. RAVISANKAR, E. SUDHEER KUMAR
Authors Affilation: SREE VIDYANIKETHAN ENGG. COLLEHE - TIRUPATI
Volume & Issue No.: Volume3Issue4
Abstract: Now-a-days organizations raise increasing needs to share information through on-demand access. Information Brokering System (IBS) is a peer-to-peer overlay network support information sharing among large collection of data sources. The brokers are locate data servers for client queries. Peer-to-peer (P2P) systems are gaining increasing popularity as a scalable means to share data in a most number of different self nodes. The brokers on data privacy and metadata stored within the IBS. We study the privacy in Information Brokering and sharing in Distributed system propose a new method of automatically segmentation rule and segment query encryption and data management involves XML data in a p2p sharing. The proposed system can improve security and forward query with reasonable overhead through privacy, end-to-end performance, and scalability.
S.No.: 44
Title : An Effective Approach to Software Code Cloning Detection by Identifying Process Block
Authors Name: Ritesh patil, Sachin Shinde, Dr.v khanna, S.D.joshi
Authors Affilation: Bharat university
Volume & Issue No.: Volume3Issue4
Abstract: Code replication by means of copy and paste is becoming a recurrent pattern of behavior among software developers. Industries are also facing problem of code replication among various versions and thus a need of software to detect similar code. Since Code is developed on distributed system an effective way is needed to detect such redundancy. The challenge here is variety of syntax, compiler specific coding, and number of ways the same code can be written and change of variables adding comments inserting whitespace change the nature of comparison than normal text document comparison. This kind of challenges needs lots of statistical analysis. Clone evolution may be utilized to detect out the pattern, and some intelligent features that can be used to develop a training set where machine based on Context-free Grammar, Code Complexity analyzer, Code tagger can be generated. Such intelligent systems can be utilized by industries and their developer saving time of recoding of existing code rather than inheriting or extending the existing one, to adding new features as required by the application they wish to develop. As per our literature survey researchers are finding difficult to evolve code replication, even on regressive benchmarking the manual and existing software are limiting to accurate code clone detection. As code are developed by developer each may think in different way of implementation the same thing, to achieve space efficiency, execution time efficiency, cross platform development, execution environment, and device specific coding etc. Our implementation specify an effective approach in code clone detection which is a hybrid model that can cover maximum coding behavior and classes of clones with optimum value to fetch results, faster and reducing the number of comparison overhead. In this paper we also specify the key techniques that can save time and effort of comparing the code line by line between two files. which was followed in tradition algorithm. A review map of scholarly research articles reveals a concluding mark that no single scheme defines procedure for all types of clones detection thus a research corner remains unaddressed which has been taken up as problem statement in our research work. In this paper we proposed a hybrid model to resolve the problem in effective way with an objective to gain accuracy and improving retrieval performance of the system.
S.No.: 45
Title : Optimal Opportunistic Multi-copy Routing Performances in Mobile Social Networks
Authors Name: M Ashok
Authors Affilation: Sree Vidyanikethan Engineering College,Tirupati
Volume & Issue No.: Volume3Issue4
Abstract: : Mobile social networks are special kind of delay tolerant network where individuals with similar interests and connect with each other through their mobile phones and with social characteristics. Past there is many routing algorithms have been proposed, all that algorithms are not much capability to design Opportunistic optimal routing performance. In this paper we propose Community-Aware Opportunistic Routing algorithm, and also assume a Homing spread(HS). HS includes mainly three phases: homing, spreading, fetching, this algorithm can spread a multiple given number of message copies are spreading between the mobile nodes and community homes. By using both algorithms we can calculate the minimum expected delivery delays, faster message deliveries, and achieve the optimal routing performances, mainly the maintenance cost are low.
S.No.: 46
Title : k-TIER AND SELECTIVE BACKFILLING APPROACH FOR PARALLEL WORKLOAD SCHEDULING IN CLOUD
Authors Name: Shahabanath K K, Sreekesh Namboodiri T
Authors Affilation: 1Mtech Student, MES College of Engineering, Kuttippuram
Volume & Issue No.: Volume3Issue4
Abstract: Cloud computing is known as a provider of very large scalable dynamic services and virtualized resources over the Internet. Job scheduling is most important task in cloud computing environment because user have to pay for used resources based upon time. The main goal of scheduling is distribute the load among processors and maximizing their utilization by minimizing the total task execution time and also maintaining the level of responsiveness of parallel jobs. Existing parallel scheduling mechanisms have some drawbacks such as context switching rate, large waiting times and large response time. There exists two-tier priority based consolidation methods : conservative migration and consolidation supported backfilling and aggressive migration and consolidation supported backfilling. In this method, partition the computing capacity of each node into two tiers, the foreground virtual machine (VM) tier (with high CPU priority) and the background VM tier (with low CPU priority). In this paper propose a new scheduling method which is better than both conservative and aggressive backfilling. This method provide reservation selectively, only to the jobs that have waited long enough in the queue. Also divide the computing capacity into k-tier. There will be one foreground VM and number of background VMs.
S.No.: 47
Title : Multiple Granularity Locking Model With Colourd Petri Net
Authors Name: Kaveh abubakri,Saber mardkardideh, Behnam Kiani
Authors Affilation: Department of Computer Engineering ,Tabriz University,Tabriz,Iran
Volume & Issue No.: Volume3Issue4
Abstract: One of the methods of serializability in transaction commands is lock-based protocol. Although locking ensures mutual exclusion, it brings about starvation or deprivation in executing transactions. Locking on a tree structure through using multiple aggregation method is one of the locking methods for nodes of a tree that allows each node to have various sizes. At the same time, it creates a hierarchy of data in which smaller particles are located within the larger ones. This article fully explains the colored Petri Net model of the protocol along with shapes of places, transitions, functions and commands.
S.No.: 48
Title : Measurement of Rural Customers Satisfaction with Special Reference to Mobile Phone Service Providers in Allahabad
Authors Name: indal kumar
Authors Affilation: Nehru Gram Bharati University Allahabad
Volume & Issue No.: Volume3Issue4
Abstract: Abstract This study has been conducted on the basis of satisfaction of rural customers towards mobile phone service providers in Allahabad. Today’s mobile phone service providers are playing a big role for connecting one person to other person. Rural people can know the condition of their relatives/friends within a second, those who is living anywhere in the world but rural customers are suffering with the network connectivity reason behind problem of electricity. The first public phone network was started in Finland 1971. in the first generation mobile phone were introduced with the introduction Of GSM(Global System for Mobile Communication). TDMA (Time Division Multiple Access) and CDMA (Code Division Multiple Access) technologies. There are number of mobile service providers like Airtel, Vodafone, Idea, Uninor, Aircel, DOCOMO, and Reliance. They are providing number of services for the rural customers like; calling services, internet services, value added services (offered supplementary services), customer care (help services), portability services (change one service provider to other service provider) Key words: network coverage, billing services, customer care, and value added services, portability.
S.No.: 49
Title : MAC Authentication for Compressed Image Using Diffie-Hellman Key Exchange Algorithm
Authors Name: Mr. B. Lakshmi Narayana Reddy, Dr. S. Kiran, Dr. T.Bhaskara Reddy, Dr M. Ram
Authors Affilation: Scholar in the department of Computer Science YV University., Kadapa
Volume & Issue No.: Volume3Issue4
Abstract: Image authentication is a mark on an image of trade to indicate its origin and authenticity. Image authentication is important in content delivery via untrusted intermediaries, such as peer-to-peer (P2P) file sharing or P2P multicast streaming. Technology has no limits today we have lot of software available in the market by which we can capture and alter any image. In this context, it is important to develop systems for copyright protection, protection against capturing, duplication, and authentication of content. In this paper we propose image compression with image authentication. From our experimental results, the technology provides a unique signature for every processed image. We can use the unique signature to confirm if the image is modified easily. With the proposed technology, we can strengthen image authentication effectively with image compression technique.
S.No.: 50
Title : ENHANCEMENT OF PRIVACY PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE
Authors Name: Shweta khidrapure,Prof.A.C. Lomte, Prof.Nirmala Chouhan
Authors Affilation: Bhivarabai sawant institute of technology and research, Wagholi, pune.
Volume & Issue No.: Volume3Issue4
Abstract: Cloud data security is concern for the client while using the cloud services provided by the service provider. In this paper we are analyzed various echanisms to ensure reliable data storage using cloud services. It mainly focuses on the way of providing computing resources in form of service rather than a product and utilities are provided to users over internet. In the cloud, application and services move to centralized huge data center and services and management of this data may not be trustworthy into cloud environment the computing resources are under control of service provider and the third-party-auditor ensures the data integrity over out sourced data. Third-party-auditor not only read but also may be change the data. Therefore a mechanism should be provided to solve the problem. We examine the problem contradiction between client and CSP, new potential security scheme used to solve problem. The purpose of this paper is to bring greater clarity landscape about cloud data security and their solution at user level using encryption algorithms which ensure the data owner and client that their data will be secured.
S.No.: 51
Title : Implement Reed Solomon Encoder/ Decoder Using Spartan FPGA
Authors Name: Manju Mangtani, Mukesh Maheshwari
Authors Affilation: Department of Electronics and Communication Engineering, JNU Jaipur, 2 Department of Electronics and Communication Engineering,JNU Jaipur
Volume & Issue No.: Volume3Issue4
Abstract: In this paper, (15, 11) reed Solomon codes have been designed and implement using Spartan field programmable gate array device. The design is carried out by writing VHDL code. The waveforms are tested using the package ISIM simulator and synthesis report and programming file are obtained using the Spartan 6. Simulation waveforms show that (15, 11) reed Solomon decoder could correct up to 2 error in given polynomial to the encoder.
S.No.: 52
Title : A Self-ORganizing Trust Model with Peer Acquaintance
Authors Name: S. V. Shirke, R. S. Chaure
Authors Affilation: P.K.Technical Campus, Chakan, Pune.
Volume & Issue No.: Volume3Issue4
Abstract: — In this paper problem with system is another issue about SORT is maintaining trust all over the network. If a peer changes its point of attachment to the network, it might lose a part of its trust network. These issues might be studied as a future work to extend the trust model. So we solve this issue in our proposed system, here we assign particular id to peer node which maintain by server. So if that node goes out of network, still when it again attach to network whole data information loaded to that node so we can get trustworthiness. Open nature of peer-to-peer systems exposes them to malicious activity. Building trust relationships among peers can mitigate. In the experiments, good peers were able to form trust relationships in their proximity and isolate malicious peers. Peers are equal in computational power and responsibility. There are no privileged, centralized, or trusted peers to manage trust relationships. Peers occasionally leave and join the network. A peer provides services and uses services of others. For simplicity of discussion, one type of interaction is considered in the service context, i.e., file download. We propose a Self-ORganizing Trust model (SORT) that aims to decrease malicious activity in a P2P system by establishing trust relations among peers in their proximity.
S.No.: 53
Title : Optimizing the Virtual Resources Allocation using Genetic Algorithm
Authors Name: D. Giridhar Kumar, K. Delhi Babu
Authors Affilation: Dept of CSE Dept of CSE Sree Vidyanikethan Engg College Sree Vidyanikethan Engg College Tirupati, A.P.
Volume & Issue No.: Volume3Issue4
Abstract: Optimal resource utilization is one of the biggest challenges for executing tasks within the cloud. The resource provider is responsible for providing the resources to create virtual machines for executing task over a cloud. To utilize the resources optimally, the resource provider has to take care of the process of allocating resources to Virtual Machine Manager (VMM). In this paper, an efficient way to utilize the resources, within the cloud, to create virtual machines has been proposed considering remaining resources should be maximum at a single machine but not distributed. As a framework to virtual resource mapping, a Simple Genetic Algorithm is applied to solve the heuristic of allocating problem. Based on the fitness of the each allocation pattern obtained by crossover operator we will be able to find the best allocation of request to available. We may also use conversion of multiple parameters into single equivalent parameter so that number of inputs and comparisons will be reduced.
S.No.: 54
Title : PERFORMANCE EVALUATION OF MODIFIED HOUGH TRANSFORMATION FOR LANE DETECTION
Authors Name: Gurveen Kaur, Dinesh Kumar
Authors Affilation: DAVIET, Jalandhar, Punjab
Volume & Issue No.: Volume3Issue4
Abstract: Among the various complex and challenging tasks of upcoming road vehicles, one is road detection or road boundaries detection. Many people die every year in roadway departure crashes caused by driver inattention in most of the cases. Lane detection systems are helpful in avoiding these accidents as safety is the major purpose of these systems. Such systems have the objective to detect the lane marks and to advise the driver in case the vehicle has a chance to depart from the lane. In this paper, after a brief overview of existing methods of lane detection and discovering their limitation of ineffective detection of curved roads, we present a novel lane colorization technique using modified Hough transformation. The proposed technique can detect both the straight and curved roads very efficiently and enhance the results.
S.No.: 55
Title : A Novel Secure Handover Mechanism in PMIPv6 Networks
Authors Name: K.Mayuri, K.S.Ranjith
Authors Affilation: Department of Computer Science and Department of Computer Science and Engineering, Engineering, Sree Vidyanikethan Engg.College , Sree Vidyanikethan Engg.College, Tirupati
Volume & Issue No.: Volume3Issue4
Abstract: The Internet Engineering Task Force NETLMM Working Group recently proposed a network-based localized mobility management protocol called Proxy Mobile IPv6 (PMIPv6) to support mobility management without the participation of mobile nodes in any mobility related signaling. In PMIPv6 Networks having many disadvantages like signaling overhead , handover latency ,packet loss problem and long authentication latency problems during handoff. So We Propose a new mechanism called SPAM which performs efficient authentication procedure globally with low computational cost. It also supports global access technique using ticket based algorithm. which allows user’s mobile terminals to use only one ticket to communicate with their neighbour Access Points. This protocol not only reduces the mobile terminal’s computation cost but also provides user ID protection to protect user privacy. Through this technique, it can implement handover authentication protocol and incurs low communication and computation costs, which in turn results in less computation and communication delay when compared with other existing methods.
S.No.: 56
Title : Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol
Authors Name: Monu Rani, Kiran Gupta, Arvind Sharma
Authors Affilation: Computer Science Department Swami Devi Dyal Group of Professional Institutions, Barwala, Distt: Panchkula (Haryana)
Volume & Issue No.: Volume3Issue4
Abstract: In a WSN power consumption and congestion are major bottlenecks. These two are inter-related too Power consumption causes several nodes to become dormant and thus increase congestion in the network. Also, congestion leads to abuse of network resources leading t increased power consumption. By using adaptive load balancing technique, we reduce the problem of congestion in a network. We improved the traffic splitting protocol (TSP).The proposed method distributes the load in the network to all the nodes in the parallel direction such that no node has a congestion value above threshold. Simulation results have shown the algorithm to be efficient.
S.No.: 57
Title : MCB PROBLEM IN ROUTING PROTOCOLS
Authors Name: O.Hogla,A.Sri Rama Chandra Murthy, Dr.S.Sai Satyanarayana Reddy
Authors Affilation: 1M.Tech, CSE, LBRCE, Mylavaram, 2Assistant Professor, CSE, LBRCE, Mylavaram, India, 3 Professor, CSE, LBRCE, Mylavaram, India.
Volume & Issue No.: Volume3Issue4
Abstract: We present a class of MCB problems in Wireless Mesh Networks (WMNs) with multi-path wireless routing protocols. We establish the provable superiority of multi-path routing protocols over conventional protocols against blocking, node-isolation and network-partitioning type attacks. In our attack model, an adversary is considered successful if it is able to isolate/capture of a subset of nodes such that no more than a certain amount of traffic from source nodes reaches the gateways. In that Two scenarios, (a) nodes high degree of node mobility, are evaluated. Scenario, and (b) low mobility for network nodes. Scenario (a) is proven to be #P-hard for the adversary (b) is proven to be NP-hard and scenario to realize the goal. Several approximation algorithms are presented which show that in the best case scenario and it is least exponentially hard for the adversary to optimally succeed in such blocking-type attacks. These results are verified through simulations, which demonstrate the robustness of multi-path routing protocols against such attacks. The best of our knowledge, it is the first work that evaluates theoretically and the attack-resiliency and performance of multi-path protocols with wire-less network node mobility.
S.No.: 58
Title : Load Balancing in mobile cloud computing
Authors Name: Neha Gupta
Authors Affilation: cgc landran
Volume & Issue No.: Volume3Issue4
Abstract: Mobile Cloud Computing is a fast developing technology today that faces the dominant problem of load imbalance due to the high demand of mobile applications. There are lots of techniques available to solve the problem but the load balancing performance can be improved by using more optimized solution. This paper proposes a load balancing scheme based on Genetic Algorithm (GA). The algorithm advances to balance the load of the mobile cloud infrastructure while trying to minimize the processing time or responsiveness of tasks with reduced number of migrations of virtual machines and improving the resource utilization by dividing the computing capacity of a datacenter into n number of virtual machines executing the number of requests at the same time and thereby improving the performance. The proposed load balancing scheme has been implemented using the cloudsim simulator. The simulation results shows the efficiency and effectiveness of the proposed algorithm.
S.No.: 59
Title : Detection and optimization scheme against sybil attack on MANETS
Authors Name: Simranjeet Kaur
Authors Affilation: cgc landran
Volume & Issue No.: Volume3Issue4
Abstract: It is quite challenging task to achieve security in a Mobile ad hoc network due to its wireless nature, lack of infrastructure and its topology which changes dynamically. Due to its wireless nature MANET is exposed to several attacks. Among them a harmful attack take the advantages of the above mentioned characteristics is the Sybil Attack. In this attack a malicious node uses several identities at a time and increases lot of misjudgments among the node of the network or it may access the identity of the other legitimate nodes and create false expression of that node in the network. In this paper two approaches are discussed to encrypt the data one is Advanced Encryption Standard (AES) and second is Rivest Cipher 5 (RC5) and one optimization technique is discussed that is Genetic Algorithm (GA).
S.No.: 60
Title : Association Rules and K-means Clustering Based Outlier Detection in Data Mining
Authors Name: C. Leela Krishna
Authors Affilation: Dept. of CSE, Sree Vidyanikethan Engg. College, Tirupati, A.P.
Volume & Issue No.: Volume3Issue4
Abstract: Most of the Outlier detection algorithms in data mining are used to find outliers in static databases. Those algorithms are generally inappropriate for detecting outliers in dynamic databases where data continuously arrives in the form of streams such as sensor data. Association rule based outlier detection method can be applied to streamed data where frequent item sets are evaluated internally. One of the outlier detection approaches used for static databases include clustering based method, where K-means clustering algorithm is used internally for discovering outliers from various static databases. In this paper, we propose two approaches for outlier detection. One is to use association rules based method for dynamic databases and the other is to use pruning based local outlier detection method, which internally uses K-means clustering method for static databases. Experiments on various data sets are performed to detect the deviant data effectively in fewer computations.
S.No.: 61
Title : An Anti-print-scan Document Watermark Scheme Based on Chinese Word Complexity
Authors Name: Yu YANG
Authors Affilation: Information Security Center, Beijing University of Posts and Telecommunications
Volume & Issue No.: Volume3Issue4
Abstract: As a way of information leaking, printed document is recently becoming a major security risk. Embedding digital watermark in document to identify data leaker when necessary is an effective resolution to curb the outflow of documents. The challenge of the solution is to get better compromise between robustness and transparency. The goal is achieved according to two features. Firstly, it is found out that heights of Chinese words of nature documents are natively not same, and most height relationships between adjacent words are reserved after print-scan. So, a watermark can be embedded into texts by modifying heights of words. Secondly, modification of same level may affect visual effect differently when apply to Chinese words with different weights, densities, aspect ratios, etc. The research studies all these elements to construct a visual model. By using the features, it is proposed a robust watermark scheme, which selectively modifies Chinese word’s height according to its complexity to achieve better transparency. The experimental result shows that by applying the method, the watermark can be extracted from distortion texts as a result of print-scan, print-copy, or print-photograph
S.No.: 62
Title : A Scenario English -Arabic Translation System (SEATS)
Authors Name: Ali A. Sakr
Authors Affilation: Computer Engineering Department, Faculty of Engineering, KFS University, Egypt
Volume & Issue No.: Volume3Issue4
Abstract: International traders, and politicians necessitate an interactive language system to keep their work secure. Using a direct language translator enables customers to deal with others using their mother languages. This machine fulfills security, and high confidence. The translating machines include in their memories, databases for both-languages, Speech to Text (ST) recognizers, and Text to Speech (TS) Synthesizer. This system may be used in teleconferences and international committees. This paper presents a modular translator that translates Arabic to English and English to Arabic. This necessitates standard references for ST and TS and Text to Text Translators (TTT). This paper tests the statistical correctness of transformation, it gives encouraging results.
S.No.: 63
Title : Efficient Routing in VANETs using Traffic Awareness
Authors Name: B. V. Visweswar Reddy, P. Bharagavi
Authors Affilation: Sree Vidyanikethan Engineering College
Volume & Issue No.: Volume3Issue4
Abstract: The basic idea in VANETs is to have an adhoc connection between close by vehicles. The routing in vehicular networks is exposed to danger by the harmful nodes which aim to endanger the delivery of messages. Compromised nodes can extremely impact the performance of the network by capitalizing a number of attacks. To minimize these problems, a way of securing beacon-less routing algorithm for vehicular environments (S-BRAVE) against selective forwarding attacks using neighbouring nodes as guard nodes is developed. They watch for the message to be sent by the next forwarder, in case this vehicle does not forward the message, they take the responsibility of sending the message to the next hop. To increase the packet delivery ratio S-BRAVE routing algorithm is extended by including the traffic awareness of the roads, thereby routing the packets in a denser environment gives higher probability of delivering the packets to their respective destinations.
S.No.: 64
Title : PERFORMANCE CHARACTERISTICS OF AN INTERNAL COMBUSTION ENGINE BY ARRANGING A FIXED CURVED BLADE BEFORE THE INTAKE MANIFOLD
Authors Name: N.RANJEETH1, R.SUDHEER2, Prof .V.PANDURANGADU3
Authors Affilation: Mechanical Engineering Department, JNTUA, Anantapuramu ,A.P, India
Volume & Issue No.: Volume3Issue4
Abstract: In the present context, the world is confronted with the twin crisis of fossil fuel and environmental degradation. The fuel economy is achieved by efficient combustion inside the cylinder which is possible by uniform mixing of air and fuel in the cylinder. The swirl can be generated in the diesel engine by modifying three parameters in the engine; they are the cylinder head, the piston crown, and the inlet manifold. The objective of the present study is to enhance the swirl effect in the cylinder which causes better performance and reduces the emissions. In this work an attempt is made using fixed curved blade with different inclinations placed before the intake manifold for effective air swirl motion. For this, the experiment is done on Kirloskar AV1 water cooled, natural aspirated direct injection diesel engine with pure diesel. Keywords: D.I.Diesel Engine, Fixed curved blade, Swirl, Emissions In the present context, the world is confronted with the twin crisis of fossil fuel and environmental degradation. The fuel economy is achieved by efficient combustion inside the cylinder which is possible by uniform mixing of air and fuel in the cylinder. The swirl can be generated in the diesel engine by modifying three parameters in the engine; they are the cylinder head, the piston crown, and the inlet manifold. The objective of the present study is to enhance the swirl effect in the cylinder which causes better performance and reduces the emissions. In this work an attempt is made using fixed curved blade with different inclinations placed before the intake manifold for effective air swirl motion. For this, the experiment is done on Kirloskar AV1 water cooled, natural aspirated direct injection diesel engine with pure diesel. Keywords: D.I.Diesel Engine, Fixed curved blade, Swirl, Emissions
S.No.: 65
Title : Infrared Touch Screen Bezel
Authors Name: Rishiraj Manwatkar, Saurabh Agrawal, Vaibhav Shivale
Authors Affilation: `Maharashtra Institute of Technology, Pune
Volume & Issue No.: Volume3Issue4
Abstract: Abstract: Infrared technology relies on the interruption of an infrared light grid in front of the display screen. This technology has apparent advantages in the large-sized applications, it is simple, low cost and highly feasible. In order to obtain a more cost effective touch screen for the average consumer’s personal use, a new design for an infrared LED touch screen bezel has been designed by utilizing infrared LEDs as well as photo transistors, both of which are embedded in a bezel which is comprised of PCBs on which these optoelectronics are mounted around the glass slab which allows the infrared beams to pass through. Upon touching the screen, one or more of the beams are obstructed resulting in an X and Y coordinates being sent to the MCU to process and indicate the exact touch point on the display unit.
S.No.: 66
Title : DATA ACQUISTION BASED ON USB DRIVER EMBEDDED CONTROLLER
Authors Name: Ms.Sneha Jaiswal, Ms. Sanamdikar Sanjay Tanaji
Authors Affilation: E & TC Dept G.S Moze College Of Engg, Balewadi, pune University Of Pune Pune, Maharasthra
Volume & Issue No.: Volume3Issue4
Abstract: USB driver controller is nothing but USB host and the concern of host is to pinpoint USB client. USB O-T-G (ON-THE-GO) empowers two USB gadgets to share data with each other without requiring assistance of pc. In any case, OTG expose to be a kind of architecture in which interconnected nodes share assets amongst each other without the usage of a consolidate regulatory system. On second thought, OTG propose the dual-role device (DRD), skillful of functioning either host or peripheral. The perfect charm of OTG is that host and peripheral device swap roles if significant. Prior concept of OTG, design of embedded host was formerly popularized in universe of USB [14] building them exceptional suited to embedded environment than pc with its enormous resources, vast scope for drivers and application software. USB was developed as quick fix to pc interconnectivity [1]. USB is super popular employment for data transfer from system/computer to another [1]. The appeal for these products is rising constantly with fame; there is obligation for them to impart both with USB peripherals and directly with each other when PC not available
S.No.: 67
Title : A Survey on Various Cryptography Techniques
Authors Name: Mitali, Vijay Kumar, Arvind Sharma
Authors Affilation: Swami Devi Dyal Group of Professional Instituitions
Volume & Issue No.: Volume3Issue4
Abstract: In modern era, evaluation of networking and wireless networks has come forward to grant communication anywhere at any time. Security of wireless networks is main aspect and encryption algorithms play an important role to provide the security to the wireless networks. This paper provides a fair performance comparison between the various cryptography algorithms. The survey is done on some of the more popular and interesting algorithms currently in use and their advantages and disadvantages are also discussed. In this paper we analyze the encryption and decryption time of various algorithms on different settings of data.
S.No.: 68
Title : Analysis & Design of Multi Share Secret Message Sharing Using Visual Cryptography
Authors Name: Anjali Varshney, Dinesh Goyal
Authors Affilation: 1CSE, SGVU, Jaipur, Rajasthan, India
Volume & Issue No.: Volume3Issue4
Abstract: Visual Cryptography is a special encryption technique to hide information in images in such a way that it can be decrypted by the human visual system. It is secret sharing scheme which uses images distributed as shares such that, when the shares are superimposed, the original image is revealed. In last decade Visual Cryptography has evolved as an entity which divides the data into different shares and then embedding is done. This technique is also is less secured. In this paper we propose an encryption algorithm, which is applied on the different shares of the images. Before embedding the image into the cover image, shares are also encrypted for which the size of share images and the recovered image is the same as for the original secret image. Pixel expansion and the quality of the reconstructed secret image has been a major issue of visual secret sharing (VSS) schemes. The proposed scheme maintains the perfect security and the size of the original image.
S.No.: 69
Title : Optimization of Multiserver Configuration for Profit Maximization using M/M/m Queuing Model
Authors Name: M.G.Madhusudhan, K.Delhi Babu
Authors Affilation: Sree Vidyanikethan Engg. College,Tirupati
Volume & Issue No.: Volume3Issue4
Abstract: Cloud computing is an emerging technology of business computing and it is becoming a development trend. The process of entering into the cloud is generally in the form of queue, so that each user needs to wait until the current user is being served. Cloud Computing User requests Cloud Computing Service Provider to use the resources, if Cloud Computing User finds that the server is busy then the user has to wait till the current user complete the job which leads to more queue length and increased of waiting time. So to solve this problem it is the work of Cloud Computing Service Providers to provide service to users with less waiting time otherwise there is a chance that the user might be leaving from queue. Cloud Computing Service Providers takes such factors into considerations as the amount of service, the workload of an application environment, the configuration of a multi-server system, the service-level agreement, the satisfaction of a consumer, the quality of a service, the quality of a service, the penalty of a low-quality service, the cost of renting and a service providers margin and profit. Cloud Computing Service Providers can use multiple servers for reducing queue length and waiting time. This project shows how the multiple servers can reduce the mean queue length and waiting time. The project approach is to treat a multi-server system as an M/M/m queuing model.
S.No.: 70
Title : Analyze & Classify Intrusions to Detect Selective Measures to Optimize Intrusions in Virtual Network
Authors Name: k Naveen Kumar
Authors Affilation: Sree idyanikethan Engineering College(Autonomous),Tirupathi,AP.
Volume & Issue No.: Volume3Issue4
Abstract: Cloud computing provides a rich set of features and facilitate user to install softwares and applications in virtual machine (VM) temporally to finish their task with that software which is required and not available in cloud. But some attackers mislead this feature to introduce vulnerability as applications into VM. These applications are distributed over the virtual network and denial some services running over the VM accessing unknowingly by multiple users. To prevent vulnerabilities in VM we are introducing a network agent periodically scans the VM for vulnerable things and reported to attack analyse. It build attack graph by analyse the attack to know its type and apply selective measures to optimize it by network controller with help of VM Profiler.
S.No.: 71
Title : Optimization of multiserver configuration in cloud computing using M/M/m Queuing Model
Authors Name: M.G.Madhusudhan
Authors Affilation: Sree Vidyanikethan Engineering College
Volume & Issue No.: Volume3Issue4
Abstract: Cloud computing is an emerging technology of business computing and it is becoming a development trend. The process of entering into the cloud is generally in the form of queue, so that each user needs to wait until the current user is being served. Cloud Computing User requests Cloud Computing Service Provider to use the resources, if Cloud Computing User finds that the server is busy then the user has to wait till the current user complete the job which leads to more queue length and increased of waiting time. So to solve this problem it is the work of Cloud Computing Service Providers to provide service to users with less waiting time otherwise there is a chance that the user might be leaving from queue. Cloud Computing Service Providers takes such factors into considerations as the amount of service, the workload of an application environment, the configuration of a multi-server system, the service-level agreement, the satisfaction of a consumer, the quality of a service, the quality of a service, the penalty of a low-quality service, the cost of renting and a service providers margin and profit. Cloud Computing Service Providers can use multiple servers for reducing queue length and waiting time. This project shows how the multiple servers can reduce the mean queue length and waiting time. The project approach is to treat a multi-server system as an M/M/m queuing model.
S.No.: 72
Title : Flood Attacks Mitigation in DTNs Using MD5 Algorithm
Authors Name: poojitha singu,B.Gurunadha Rao
Authors Affilation: sree vidhyanikethan engineering college
Volume & Issue No.: Volume3Issue4
Abstract: Disruption Tolerant Networks is network architecture which provides communication between two node in unstable or stressed environment areas. Due to limited network resources such as buffer space and bandwidth, these DTNs are easily vulnerable to flood attacks in attacker sends as many packets or replicas to overuse the limited network resources. To overcome these they employ Rate limiting to defend against flood attacks in DTNs. By using this rate limit each and every node over a particular packet so that if any node exceed rate limit then that node can be discarded. They propose a distributed scheme to identify attacker if they exceed rate limit. It is difficult to Identify / Track the address of the attacker node. For that the basic idea of detection is claim-carry-and check method. In these method each node itself counts the number of replicas or packets which was sent and claims the information to neighbour node, then receiving nodes carry the claims information when they move to other neighbouring node. And then cross-check these claim whether the carried node consistent or inconsistent. If inconsistent detected then discard that node and add to Blacklist. By using rate limit certificate we can find flood attacker when they exceed rate limit of that attacker node. To overcome this proposed uses MD5 Function. In which it will generates 32-bit hash key for the node who wants to send packets less than rate limit.32-bit hash key generation based on MD5 algorithm. Based on 32-bit hash keys, attackers who sends packet within the rate limit can also be easily identified.
S.No.: 73
Title : Fast and Secure Initial Access Authentication Protocol for Wireless LAN
Authors Name: Sandhya K, Nagaraju Rayapati
Authors Affilation: 1DEPt of CSE, Sree Vidyanikethan Engineering College Tirupati, AP, India
Volume & Issue No.: Volume3Issue4
Abstract: Nowadays there is widespread use of WLAN enabled devices, so it is equally important to have efficient initial link setup mechanism. In this paper a fast access authentication process is implemented which is faster than current 802.11i. Through experiments, it is observed that the inefficiency of 802.11i is due to its design from the framework perspective which introduces too many messages. Due to more number of round-trip messages in 802.11i authentication delay is intolerable under some scenarios. To overcome this, an efficient initial access authentication protocol FLAP is proposed which introduces two round-trip messages with authentications and key distribution. Proposed FLAP protocol scheme is more secure than 4-way handshake protocol. Simulations are conducted using different scenarios like Authentication delay, Throughput, Packet Delivery Ratio(PDR), Packet Drops are measured for different scenarios and compared between the 802.11i and FLAP protocol. The results shows that the FLAP is more advantageous when WLAN gets crowded.
S.No.: 74
Title : Suitable Node Location Update in MANETs for Geographical Routing
Authors Name: sudarsan.k,M.R.Pavan Kumar
Authors Affilation: Sree Vidyanikethan Engineering College
Volume & Issue No.: Volume3Issue4
Abstract: : Location information of the nodes is principal necessity in geographic routing. Forwarding nodes are selected among neighbors based on their location. Each node should be aware of its neighbors’ position at the time of data transfer condition. Hence each node should update its’ location information through a message called beacon. Existing mechanisms invokes periodic beacon update scheme which consumes the network resources such as energy and bandwidth specifically when the network traffic is high it creates packet loss in the network leads to retransmission of data packet causing additional delay and energy consumption. It is necessary to regulate the frequency of each node’s beacon update process. It should follow the beacon update frequency adaptively based on mobility and its forwarding topology or pattern instead of fixed ones. This project proposes the novel scheme of Adaptive Position Update (APU) including two rules named Mobility Prediction Rule (MP) and On demand Route Learning Rule (ODL). Nodes whose movements are harder to predict update their positions more frequently (and vice versa), and (ii) nodes closer to forwarding paths update their positions more frequently (and vice versa). This project contributes Mobility based forwarding node selection scheme to reduce the beacon overhead further. Performance of the proposed technique is conducted using Network Simulator. Proposed scheme achieves lesser over overhead than existing schemes.
S.No.: 75
Title : Mitigating Flood Attacks in DTNs using MD5 Algorithm
Authors Name: K.Naveen Kumar, Mr.M.Ganesh Karthik
Authors Affilation: Department of Computer Science and Engineering, SreeVidyanikethanEngg.College, Tirupati.
Volume & Issue No.: Volume3Issue4
Abstract: Disruption Tolerant Networks is network architecture which provides communication between two nodes in unstable or stressed environment areas. Due to limited network resources such as buffer space and bandwidth, these DTNs are easily vulnerable to flood attacks in attacker sends as many packets or replicas to overuse the limited network resources. To overcome these they employ Rate limiting to defend against flood attacks in DTNs. By using this rate limit each and every node over a particular packet so that if any node exceed rate limit then that node can be discarded. They propose a distributed scheme to identify attacker if they exceed rate limit. It is difficult to Identify / Track the address of the attacker node. For that the basic idea of detection is claim-carry-and check method. In this method each node itself counts the number of replicas or packets which was sent and claims the information to neighbour node, then receiving nodes carry the claims information when they move to other neighbouring node. And then cross-check these claim whether the carried node consistent or inconsistent. If inconsistent detected then discard that node and add to Blacklist. By using rate limit certificate we can find flood attacker when they exceed rate limit of that attacker node. To overcome this proposed uses MD5 Function. In which it will generates 32-bit hash key for the node who wants to send packets less than rate limit.32-bit hash key generation based on MD5 algorithm. Based on 32-bit hash keys, attackers who sends packet within the rate limit can also be easily identified
S.No.: 76
Title : DATA MINING INFORMATION SEARCH
Authors Name: Mr. Prashant S. Gawande, Prof. VivekkumarShrivastav
Authors Affilation: 1Information Technology Department, Institute of Technology and Management, Bhilware, Rajsthan
Volume & Issue No.: Volume3Issue4
Abstract: Data mining is a process of collecting and analyzing the data for different purpose. Now a days Data mining is not only used in industries but it is also required for educational institutes. Data mining is an effective tool for decision making, cost cutting, increasing revenues etc. Information can be changed into knowledge and it can become a good source for any organization to survive in today’s cut-throat competition.Most users take the help of search engines and browsers for obtaining data. However, the data we get from these sources is not ready to use type of data. It is very herculean task to covert these data into accurate information. It is just like searching diamonds in the huge ocean.This paper tries to give a new look to traditional data mining process. Web mining embodies three parts i.e. web structure mining, web content mining, web usage mining.This paper suggests a new frameworkfor text mining based on the integration of Information Extraction (IE). Traditional data mining assumes that the information to be “mined” is already in the form of arelational database. Web mining deals with three main areas: web content mining, web usage mining and web structuremining.
S.No.: 77
Title : Improving Cache Memory Efficiency & its Organization
Authors Name: Nidhi, Aastha Gupta, Neha
Authors Affilation: Computer Science and Engineering, Maharishi Dayanand University Haryana, India
Volume & Issue No.: Volume3Issue5
Abstract: This research paper gives details of the cache memory and its various Optimizing techniques. The early Beginning part of the paper makes you familiar with the term cache. Further ahead, the paper covers the Importance of cache memory in microprocessors. In order to mitigate the impact of the growing gap between CPU speed and main memory performance, todays computer architectures implement hierarchical memory structures. The idea behind this approach is to hide both the low main memory bandwidth and the latency of main memory accesses which is slow in contrast to the floating point performance of the CPUs. Usually, there is a small and expensive high speed memory sitting on top of the hierarchy which is usually integrated within the processor chip to provide data with low latency and high bandwidth; i.e., the CPU registers. Moving further away from the CPU, the layers of memory successively become larger and slower. The memory Components which are located between the processor core and main memory are called cache memories or caches. Thus, going through this paper one will end up with a good understanding of cache and its Optimizing techniques.
S.No.: 78
Title : Analyzing Defects and Techniques for Improving Software Quality
Authors Name: Nidhi, Aastha Gupta, Neha
Authors Affilation: Computer Science and Engineering, Maharishi Dayanand University Haryana, India
Volume & Issue No.: Volume3Issue5
Abstract: This research is a descriptive research on defect management process in software quality. Most large software products have elaborate quality control processes involving many tasks performed by different groups using a variety of techniques. The defects found are generally recorded in a database which is used for tracking and prioritizing defects. However, this defect data also provides a wealth of information which can be analyzed for improving the process. This paper, describe that when-who-how approaches for analyzing defect data to gain a better understanding of the quality control process and identify improvement opportunities. The proposed work is about to use defect tracking and defect prevention for quality improvement .
S.No.: 79
Title : Measurement of surfaces attack as parameter of metric for version change
Authors Name: Sukanth Sistla
Authors Affilation: Department of CSE , JNTUA College of Engineering Anantapur, India
Volume & Issue No.: Volume3Issue5
Abstract: In software metrics, developers increasingly focus on counting bugs at code level are no of vulnerabilities encountered at system level generally but we focus on surface attack as a measure to differentiate a version of two compare- able system to justify which is better than other. We measure a system’s attack surface in terms of three kinds of resources used in attacks on the system. The attack surface metric is validated by conducting an user survey . Our measure can be used as a parameter by software developers in the development process and consumers in their decision making process.
S.No.: 80
Title : ENHANCED GRID SCHEDULING ALGORITHM USING TABU SEARCH AND MACO
Authors Name: Aanchal Sewaiwar, Utkarsh Sharma, Manish Shrivastava
Authors Affilation: LAKSHMI NARAIN COLLEGE OF TECHNOLOGY BHOPAL (M.P.)
Volume & Issue No.: Volume3Issue5
Abstract: Grid computing is progressively considered as a next-generation computational stand that supports wide-area parallel and distributed computing Scheduling jobs to resources in grid computing is difficult due to the distributed and heterogeneous nature of the resources. In Grid computing finding optimal solution for such an environment is (in general) an NP-hard problem, and so heuristic technique must be used. The aim of grid task scheduling is to achieve high system throughput and less machine usage and to distribute various computing resources to applications. Unproductivity in grid computing scheme may occur when all jobs require or are assigned to the same resources. This paper proposed a Multiple Ant Colony Optimization Algorithm for task scheduling in grid computing with the concept of Tabu Search algorithm. The proposed MACO algorithm for job scheduling in the grid computing environment combines the techniques from Multiple Ant Colony System and Tabu Search algorithm. The algorithm focuses on local and global pheromone trail update.
S.No.: 81
Title : WIRELESS MOBILE COMMUNICATION USING HUMAN BODY AS A CHANNEL
Authors Name: Mr. Italia Hiren R.
Authors Affilation: Sharadchandra Pawar College of Engineernig
Volume & Issue No.: Volume3Issue5
Abstract: The mobile communication takes place using wired network, infrared and bluetooth which consumes lot of battery power and have security issues. The main objective of research in to mobile communication is to use human body as transmission channel for electrical signals. However, so many experiments has been performed under the research of intrabody communication like capacitive and galvanic coupling to optimize operating frequency, channel length, electrode used etc. In this paper a new methodology has been developed for the alternate wireless mobile communication.
S.No.: 82
Title : Fuzzy Technique for Software Project Feasibility
Authors Name: Vishal Choudhary
Authors Affilation: School of Engg.&Technology Department of Computer Science and Engineering Jaipur National University –Jaipur
Volume & Issue No.: Volume3Issue5
Abstract: Software product development life cycle, feasibility study is an integral part. Conventionally feasibility study requires dedicated infrastructure and resources that are expensive and only used sporadically. In the growing complexity of business applications it is harder to do feasibility and also to maintain the mimic real environments. Feasibility study tools provides resources which are Unlimited in nature along with flexibility, scalability and availability of distributed feasibility environment, thus it has opened up new opportunities for software feasibility It leads to cost-effective solutions by reducing the execution time of large project feasibility study. In this paper I propose a new fuzzy mathematical model to attain better scope for feasibility.
S.No.: 83
Title : Discover Semantic Relationships Over Distributed Networks Using Hierarchical Knowledge
Authors Name: N. Bharatha lakshmi, B. Narendra Kumar rao
Authors Affilation: Sree Vidyanikethan Engg. College
Volume & Issue No.: Volume3Issue5
Abstract: The availability of large volumes of Semantic Web data has created the potential of discovering vast amounts of knowledge. Semantic relation discovery is a fundamental technology in analytical domains, such as business intelligence and homeland security. Because of the decentralized and distributed nature of Semantic Web development, semantic data tend to be created and stored independently in different organizations. Under such circumstances, discovering semantic relations faces numerous challenges, such as isolation, scalability, and heterogeneity. This paper proposes an effective strategy to discover semantic relationships over large-scale distributed networks based on a novel hierarchical knowledge abstraction and an efficient discovery protocol. The approach will effectively facilitate the realization of the full potential of harnessing the collective power and utilization of the knowledge scattered over the Internet.
S.No.: 84
Title : Designing and Performance Evaluation of Text Data Hiding Technique using Sequential Encoding and Decoding Technique
Authors Name: Amrit Preet Kaur
Authors Affilation: Chandigarh Engineering College, Landran
Volume & Issue No.: Volume3Issue5
Abstract: Hidden data detection in cover images by using steganography is termed as Image steganalysis of image. All techniques of steganalysis can be classified into two categories i.e. blind or targeted. The main objective of a steganalytic is to detect stego images that are created by a any specific steganographic method. In case of a blind steganalytic technique the detection of stego image is independent of the steganographic algorithm used. Also, it is based on a machine learning classifier, which is trained with high-dimensional features. Lots of new image steganographic algorithms become content-adaptive, in order to improve security and processing speed. Great challenges are possessed by advanced content-adaptive steganographic techniques to steganalyzers. These challenges are especially possessed to the feature-based blind steganalyzers. So, a technique of encoding and decoding for image is proposed which is very much generalized to the case of a source with redundancy. Also, we have introduced the Computational entropy of the source analogous to the computational cut-off rate of the channel. Also, a range of transmission rates is found. The average number of decoding computations is finite for this rate. Our proposed technique also explores the tree code in such a way to try to minimise the computational cost and memory requirements to store the tree. Actually, it gives the possibility of encoding the source output into the channel input and also of decoding the output of the channel into source symbols. This technique avoids the intermediate operations for encoding and decoding. Performance of proposed algorithm will be evaluated by calculating computational or processing speed of simulation. All simulation will be implemented on MATLAB R2008a using image processing and general tool box.
S.No.: 85
Title : Blog-Spam Detection Using intelligent Bayesian Approach
Authors Name: Krushna Pandit,Savyasaachi Pandit
Authors Affilation:
Volume & Issue No.: Volume3Issue5
Abstract: Blog-spam is one of the major problems of the Internet nowadays. Since the history of the internet the spam are considered a huge threat to the security and reliability of web content. The spam is the unsolicited messages sent for the fulfillment of the sender’s purpose and to harm the privacy of user, site owner and/or to steal available resource over the internet (may be or may not be allocated to).For dealing with spam there are so many methodologies available. Nowadays the blog spamming is a rising threat to safety, reliability, & purity of the published internet content. Since the search engines are using certain specific algorithms for creating the searching page-index/rank for the websites (i.e. google-analytics), it has attracted so many attention to spam the SMS(Social Media Sites) for gaining rank in order to increase the company’s popularity. The available solutions to malicious content detection are quite a more to be used very frequently in order to fulfill the requirement of analyzing all the web content in certain time with least possible “false positives”. For this purpose a site level algorithm is needed so that it can be easy, cheap & understandable (for site modifiers) to filter and monitor the content being published. Now for that we use a “Bayes Theorem” of the “Statistical approach”
S.No.: 86
Title : An Aerial View of Hierarchical Energy Efficient Protocols in Wireless Body Sensor Networks
Authors Name: M.Devapriya, R.Sudha
Authors Affilation: Department of Computer Science, Government Arts college, Coimbatore, Tamilnadu, India
Volume & Issue No.: Volume3Issue5
Abstract: A wireless sensor network is a collection of nodes organized into a cooperative network. The nodes communicate wirelessly and often self-organize after being deployed in an ad hoc fashion. Currently, wireless sensor networks are beginning to be deployed at an accelerated pace. This new technology is exciting with unlimited potential for numerous application areas including environmental, medical, military, transportation, entertainment, crisis management, homeland defense, and smart spaces. In particular, their application to healthcare areas received much attention recently. The design and development of wearable biomedical sensor systems for health monitoring has drawn particular attention from both academia and industry. Therefore, focus has been given to the routing protocols for maximize the life time of wireless sensor network. In this paper we present a survey on power efficient hierarchical routing protocols in Wireless Sensor Network. Firstly, the routing techniques has been discussed for WSN. The drawbacks and comparative study of routing protocols has been discussed. Finally, the existing research issues in wireless sensor network is provided.
S.No.: 87
Title : Allocation Strategies of Virtual Resources in Cloud-Computing Networks
Authors Name: K.Delhi Babu, D.Giridhar Kumar
Authors Affilation: Department of Computer Science and Engineering, SreeVidyanikethanEngg.College , Tirupati
Volume & Issue No.: Volume3Issue5
Abstract: In distributed computing, Cloud computing facilitates pay per model as per user demand and requirement. Collection of virtual machines including both computational and storage resources will form the Cloud. In Cloud computing, the main objective is to provide efficient access to remote and geographically distributed resources. Cloud faces many challenges, one of them is scheduling/allocation problem. Scheduling refers to a set of policies to control the order of work to be performed by a computer system. A good scheduler adapts its allocation strategy according to the changing environment and the type of task. In this paper we will see FCFS, Round Robin scheduling in addition to Linear Integer Programming an approach of resource allocation.
S.No.: 88
Title : Review of Security and Privacy Issues in Internet of Things (IoT) based Healthcare Applications
Authors Name: Harshit Srivastava
Authors Affilation: Maharaja Agrasen Institute of Technology
Volume & Issue No.: Volume3Issue5
Abstract: In this paper, we discuss the concept and basic elements of Internet of Things and how it can be applied for healthcare applications from monitoring heart rates and blood pressure to ensuring regular usage of medicines. These health care related devices connected to the Internet will need to be secured so as to make this technology a success. With more and more IoT based devices getting connected to the Internet, resulting in the extended surface area for external attacks. Therefore, the issue of security and privacy remains the prime concern. In this paper, we do literature review of the on-going research in the field of securing Internet of Things in healthcare and based on the findings, we can say that they fail to address the security and privacy issues in one way or the other.
S.No.: 89
Title : Design and Performance Analysis of Microstrip Patch Antenna Using Different Dielectric Substrates
Authors Name: venkatrao kolli
Authors Affilation: S R K R engineering college Bhimavaram
Volume & Issue No.: Volume3Issue5
Abstract: Abstract: In recent years, the demand for compact handheld communication devices has grown significantly. Devices having internal antennas have appeared to fill this need. Antenna size is a major factor that limits device miniaturization. In the past few years, new designs based on the Microstrip patch antennas (MSPA) are being used for handheld wireless devices because these antennas have low-profile geometry and can be embedded into the devices. New wireless applications requiring operation in more than one frequency band are emerging. Dual-band and tri-band phones have gained popularity because of the multiple frequency bands used for wireless applications. Reducing antenna size generally degrades antenna performance. It is therefore important to also examine the fundamental limits and parameter tradeoffs involved in size reduction. In the handheld environment, antennas are mounted on a small ground plane. This paper presents the performance analysis of Different shapes Microstrip Patch antenna i.e. Z shape, H shape , E shape by using different dielectric substrate materials, to operate in the frequency range of 0.6 GHz to 2 GHz. The aim of this paper is to broaden the impedance bandwidth and to maximize the gain, thereby improving the performance of antenna. By comparing different substrates of dielectric material, an appropriate substrate was chosen to design Microstrip antenna. After simulation the antenna performance characteristics such as antenna input impedance, VSWR, Return loss and current density are obtained. Key Words: E –Shaped patch, H-Shaped patch, Z-patched patch, Microstrip antennas, Ansoft HFSS 13, wide band.
S.No.: 90
Title : Artificial Intelligence: one for the future
Authors Name: Abhimanyu Thakur,Akshat,Pokhriyal,Deepak Gahlot,Divyanshu Kukreti
Authors Affilation: Dronacharya College of Engineering
Volume & Issue No.: Volume3Issue5
Abstract: In order to create a system with human-level intelligence companies spend Billions of dollars each year in Research. Most researchers in artificial intelligence, along with the institutions that support them, advocate that AI research should conform to normal scientific standards and methods. One of the greatest challenges of HLAI is the amount of time it takes to make the necessary computations. Suppose for a moment that all problems could be framed as belief propagation in probabilistic graphical models or as logic theorem proving. Perhaps with the current available technology, we may be able to Build Individual Systems that Integrate Multiple Abilities and are capable to do multiple functions at just one click. Programs could be made repetitive or continuous so that once the task is complete, no resetting or re- running is required. But Modern fields that study intelligence have problems with respect to achieving HLAI, the methods they use to evaluate and incentivize research are not sufficiently focused or strong enough to direct progress towards the goal of human-level intelligence. We will be discussing about the increasing use of AI and the different approaches used in the Research field in this paper.
S.No.: 91
Title : Modelling and Control of 2-DOF Robotic Manipulator Using BLDC Motor
Authors Name: BHIMAVARAPU BUTCHIREDDY,GV SIVA KRISHNA RAO
Authors Affilation: ANDHRA UNIVERSITY
Volume & Issue No.: Volume3Issue5
Abstract: In this paper, a 2-DOF robotic manipulator is controlled to track motion of its end-effector in a plane using brushless DC motor as an actuator. Two brushless DC motor are used to actuate the each of two revolute joints of the 2-DOF robotic manipulator. To control the angular position of robotic arm fuzzy controller is used. To generate the Smooth trajectory for joint angle of robotic manipulator, cubic polynomial equation is used. The link lengths for two links and time for tracking is specified. It is shown that the end-effector of the manipulator reaches from initial to final co-ordinate , in specified time.
S.No.: 92
Title : DWT Domain Based Secure High Capacity Image Steganography Method
Authors Name: Arun Sharma
Authors Affilation: M.Tech (c.s.e.), Samrat Ashok Technological Institute, Vidisha,
Volume & Issue No.: Volume3Issue5
Abstract: Steganography is a one of the technique for information hiding. With the help of steganography people can communicate secretly. It involves communicating secret data in an appropriate multimedia carrier such as Text, Image, audio, and video files. The main motive of steganography is to ensure that the transmitted message is completely hidden inside the cover signal, and thereby ensuring that the message is accessible only by the intended receiver and not by any intruders or unauthorized parties. The main purpose of this research is to propose a novel and secure high-capacity image steganography technique with the help of wavelet transform with acceptable levels of imperceptibility and high level of overall security. our method works as follows: first gray scale image and secrete information is encrypted for security purpose and then message is hidden inside the encrypted grey scale image in dwt domain while maintaining high capacity of secret information and finally decrypts the image for maintaining same visual quality. Advantage of this method is full reconstruction of secret data without having original image present on the recipient side. According to the Analysis, the proposed approach provides fine image quality and enough embedding capacity.
S.No.: 93
Title : A Novel Cryptography Scheme Based on Decomposition of an Image or Its Transformed Version to be watermarked
Authors Name: Abhishek Tripathy, Dinesh Kumar
Authors Affilation: Dept of Computer Science & Engineering Dept of Computer Science & Engineering Shekhawati Institute of Engg. & Technology Shekhawati Institute of Engg. & Technology Sikar (Rajasthan)
Volume & Issue No.: Volume3Issue5
Abstract: Cryptography and watermarking are two key aspects for information hiding to communicate secure information from one source to other source over network. The communication over network is very secure due to these techniques. These two techniques are differing from each other for hiding information behind or in image. In this paper we present that if these two techniques are combined together than what good results can come out with effect. In the proposed method “Cryptography” is used to encrypt the plain text message in to the cipher text using the Hill Cipher Algorithm, and second technique is “Watermarking “for the image decomposition or its transformed version using self-fractional Fourier function (SFFFs). So this method is much effective than older ones.
S.No.: 94
Title : A Review of Watermarking Algorithms for Digital Image
Authors Name: Jaishri guru, hemant damecha
Authors Affilation: Student of M.E. Software systems(Computer science and Engineering department), Shri ram Institute of Technology, Jabalpur (R.G.P.V University Bhopal)
Volume & Issue No.: Volume3Issue5
Abstract: The growth of the Internet along with the increasing availability of multimedia applications has spawned a number of copyright issues. One of the areas that this growth has fueled is that of digital watermarking. Digital watermarking is the general technique of embedding a blob of information in the original file, such that an altered file is obtained. The blob of information, thus included, serves one of different uses, such as, identifying piracy, sensing tampering, or reassuring integrity. The approaches to watermarking are diverse and can be broadly classified based on their visibility, robustness, or fragility. Their uses are also versatile, as they can be applied to text, images, audio, or video. In this paper, we will go through various algorithms of watermarking for digital image.
S.No.: 95
Title : A FAST Algorithm for High Dimensional Data using Clustering-Based Feature Subset Selection
Authors Name: Puppala Priyanka
Authors Affilation: AVN INSTITUTE OF ENGINEERING AND TECHNOLOGY, JNTUH , Hyderabad.
Volume & Issue No.: Volume3Issue5
Abstract: ABSTRACT Feature subset clustering is a powerful technique to reduce the dimensionality of feature vectors for text classification and involves identifying a subset of the most useful features that produces compatible results as the original entire set of features. A novel approach called supervised attribute clustering algorithm is proposed to improve the accuracy and check the probability of the patterns. The FAST algorithm works in two steps. In the first step, features are divided into clusters by using graph-theoretic clustering methods. In the second step, the most representative feature that is strongly related to target classes is selected from each cluster to form a subset of features. A feature selection algorithm may be evaluated from both the efficiency and effectiveness points of view. Efficiency is related to the time required to find a subset of features while the effectiveness is related to quality of subset of features. Features in different clusters are relatively independent; the clustering-based strategy of FAST has a high probability of producing a subset of useful and independent features. To ensure the efficiency of FAST, we adopt the efficient minimum-spanning tree clustering method.
S.No.: 96
Title : Design of High Speed Architecture for an LDPC Decoder
Authors Name: Saranraj.B, Yuvetha.M and Suguna devi.K
Authors Affilation: Assistant Professor, Department of ECE, P.A. College of Engineering and Technology , Pollachi-642002, TamilNadu, India
Volume & Issue No.: Volume3Issue5
Abstract: From the given set of inputs finding the minimum number is a very easy task. But finding the second minimum requires the derivatives of the first minimum and finding the minimum number from the remaining numbers. This paper proposes new two techniques to find the first two minimum numbers. In these techniques first method is based on sorting algorithm and second method is based on tree structure. In this paper, implementation of previous techniques, the new two techniques are done in AlteraDE2 FPGA kit. Comparison of performance analysis of previous techniques and the new techniques are done. Efficient algorithms and cost effective hardware of finding the two smallest numbers are greatly needed for low density parity check (LDPC) decoder design.
S.No.: 97
Title : Wireless Sensor Networks Infrastructure and Architecture
Authors Name: Dr. M.Thangaraj, S.Anuradha
Authors Affilation: Madurai Kamaraj University
Volume & Issue No.: Volume3Issue5
Abstract: The current technology has made the paradigm shift from the wired to wireless by leaving the great impact on the industry and communications, application fields. Sensors, dusts, internet of things are the key area of research in now a day. This paper is going to discuss the technical details of the various components of the WSN with the options in the market, current trends, and key application areas. Never the less, this paper will highlight the diverse architecture, topology, protocol options with the valid classification and purpose. This paper is organized in such a way that any new comer will get the glimpse of different aspects of WSN all about and the pioneer will get the lead of different component details in a classified way whereas an expert will get the organized consolidated view of WSN trends and market vendors
S.No.: 98
Title : Implementation of IPTV service delivery through Virtualization using Optimizing Cloud Resources
Authors Name: Balaji Naik
Authors Affilation: AVN INSTITUTE OF ENGINEERING AND TECHNOLOGY
Volume & Issue No.: Volume3Issue5
Abstract: : Virtualized cloud-based services can take advantage of statistical multiplexing across applications to yield significant cost savings to the operator. Implementation of IPTV service delivery through Virtualization is of practical interest in many applications such as detecting an IPTV service delivery failures. In this paper, we seek to lower a provider’s costs of real-time IPTV services through a virtualized IPTV architecture and through intelligent time shifting of service delivery. The intrusion detection is defined as a mechanism for an IPTV service delivery through virtualization to detect the existence of inappropriate, incorrect, or anomalous moving attackers. In this paper, we consider this issue according to heterogeneous IPTV service delivery models. We take advantage of the differences in the deadlines associated with Live TV versus Video-on-Demand (VoD) to effectively multiplex these services. Furthermore, we consider two sensing detection models: single-sensing detection and multiple-sensing detection... we seek to lower a provider’s costs of real-time IPTV services through a virtualized IPTV architecture and through intelligent time shifting of service delivery, We provide a generalized framework for computing the amount of resources needed to support multiple services, without missing the deadline for any service. We implement a simple mechanism for time-shifting scheduled jobs in a simulator and study the reduction in server load using real traces from an operational IPTV network. We also show that there are interesting open problems in designing mechanisms that allow time-shifting of load in such environments. Our results show that we are able to reduce the load by 24% (compared to a possible 31%). We also show that there are interesting open problems in designing mechanisms that allow time-shifting of load in such environments.
S.No.: 99
Title : User Authentication using Naïve Bayes Classifier based on Keystroke Dynamics
Authors Name: Mays M. Hoobi
Authors Affilation: University of Baghdad College of Science Computer Science Department
Volume & Issue No.: Volume3Issue5
Abstract: Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for authentication has increased. User’s claimed identity can be verified by one of several methods, one of the most popular of these methods is represented by (something user know), such as a password or Personal Identification Number (PIN). Passwords are the commonly used method but this method is prone to fraud because password or PIN numbers could be forgotten or hacked because generally the user chooses very easy passwords for a machine to guess, even the best password can be stolen by dictionary and brute force attacks, also the digital thief who is armed with the password would appear to be the legitimate system user. Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior . In this paper Nave Bayes Classifier (NBC) is applied for keystroke authentication using unigraph and diagraph keystroke features. The unigraph Dwell Time (DT), diagraph Down-Down Time (DDT) features, and combination of (DT+DDT) are uses. The results show that the combination of features (DT+DDT) is produced the best results with lowest error rate.
S.No.: 100
Title : PUBLIC FIXED CAPITAL FORMATION IN INDIAN AGRICULTURE : REVISITING THE INTELLECTION
Authors Name: NITI PANDEYA
Authors Affilation: PANJAB UNIVERSITY
Volume & Issue No.: Volume3Issue5
Abstract: The present paper constructs an alternative series for public GFCF in Indian agriculture which accounts not only for direct but indirect GFCF as well. The series constructed at all-India level has also been compared with the conventional CSO series. Broadening of public GFCF series for agriculture reflected an altogether different picture as compared to the CSO series. Among the other sector sectors of the economy, transportation heads such as rural roads and railways were found to have a dominant contribution towards total public GFCF in Indian agriculture. It was also observed that manufacturing heads in general and agricultural machinery industry in particular experienced a declining share overtime in total public GFCF in the agricultural sector.
S.No.: 101
Title : WSN application in rural development: Smart Irrigation management
Authors Name: Rashid Hussian, Ankur Sharma, Parmod Kumar, Arvind Kumar
Authors Affilation: Suresh Gyan Vihar University, Jaipur
Volume & Issue No.: Volume3Issue5
Abstract: India has second highest agriculture land in the world. A majority of Indian population depends for their employment on the agriculture sector. Water management is a big issue of Indian agriculture sector, which affects the productivity. Indian irrigation system is mainly dependent on rain. Due to lower than expected rain and lack of water management, agriculture sector in India get highly affected every year. Therefore, irrigation system cannot be depended on rain. We have to take help of technology, if we want to increase productivity and profit in this sector. Wireless sensor networks may help to manage the use of water, increase crop productivity and provide the real time data instead of depending on prediction.
S.No.: 102
Title : DETECTION OF MISBEHAVING AND SELFISH NODE IN OPTIMIZED LINK STATE ROUTING (OLSR) IN MOBILE ADHOC NETWORK
Authors Name: Mansi Kharaya, prof.Neeraj Shukla
Authors Affilation: Gyan Ganga College of Technology
Volume & Issue No.: Volume3Issue5
Abstract: Mobile Ad-hoc Networks (MANET) is the self organizing collection of mobile nodes. The Optimized Link State Routing (OLSR) protocol was designed to improve scalability of Mobile Ad-Hoc Networks (MANETs). OLSR protocol implements Multipoint Relay (MPR) nodes as a flooding mechanism for distributing control information. Nevertheless, OLSR was designed without security measures. There-fore, a misbehaving node can affect the topology map acquisition process by interrupting the flooding of control information or disturbing the MPR selection process.
S.No.: 103
Title : SWITCHING FROM VENDOR LOCK-IN TO THE META CLOUD
Authors Name: B. SandhyaRani, Patil. SivaChandrika
Authors Affilation: 1Rajeev Gandhi Memorial College of Engineering and Technology, M.Tech, Asst. prof , Nandyal, India
Volume & Issue No.: Volume3Issue5
Abstract: Cloud Computing has been adopted widely in recent years by the organizations. Its major advantage is based on the usage of services on pay-as-per-use basis which is much more convenient. Low cost and scalability make turn towards cloud computing. Even with many advantages many companies are stepping back to look towards cloud because of availability of services and data lock in and legal concerns. Lock in is considered as problem particularly. Even on the high availability of public cloud, a temporary suspension of operation occurs still. The terms and policies of public cloud may change at any time and hence by this the business locked into such a cloud has no middle and longer control on IT costs. Business locked into cloud doesn’t guarantee that the provision of service quality will be continued.By considering the above problems there is a need for the business to permanently caring the cloud that is used and switching to another cloud if problems are discovered. Currently migrating to another cloud is not ignorable. Services like EC2 and S3 are incompatible and doesn’t follow specific standards but follow their own. For complicating still more many companies not only build on public on Public Clouds but their own Private Clouds will be combined with public cloud, evolving to the hybrid cloud. The concept of Meta Cloud is introduced that includes runtime and design time components. This Meta Cloud minimizes the technical incompatibilities and thus switching to another cloud. This helps the customers to choose appropriate cloud services for particular appropriate use case.
S.No.: 104
Title : Automatic Reassembly of fragmented images and painting
Authors Name: Amar Sakpal, Sumit Patil, Amit Kumar, Viraj Saindane
Authors Affilation: Sinhgad Institute of Technology & Science, Narhe Pune-41
Volume & Issue No.: Volume3Issue5
Abstract: Reassembling of Image fragment problems arises in many scientific field like archeology, forensics and many other. To solve such a problem of reassembling of image fragments by human intervention takes a lot time. And sometimes it might be costlier. To overcome this problem, we are working on a system which will automatically reassemble those image fragments to form original image. With the help of 2D image fragment and contour detection algorithms we can make an efficient use of this system. Reassembling technique is divided into four types. Initially content based image retrieval system is use to identify spatially adjacent fragment. The second step is dynamic programming technique to identify matching contour segment. Third step is to identify optimal transformation to align matching contour segment and last step is overall image reassembling. With the help of these algorithms an optimal transformation in contour can be detected. Doing automation in such work will certainly help in faster, more efficient and patiently reassembling this image fragments.
S.No.: 105
Title : Modified coverage technique for Energy Efficiency and Data Loss Reduction in WSN
Authors Name: Neha Aggarwal, Amandeep Kaur
Authors Affilation: LCET College, Katani Kalan, Ludhiana/ Punjab Technical University
Volume & Issue No.: Volume3Issue5
Abstract: Energy Efficiency is a fundamental problem in wireless sensor networks (WSNs) because wide utilization of WSNs depends upon severely limited energy constraints of individual sensor nodes. Because it is usually infeasible to recharge or replace batteries when they discharge. Also when a node dies out then whole of its energy is consumed, then the data of the region of that sensor node is lost. So the energy efficiency and data loss reduction in the WSN is one of the very important performance indicators. Thus, solving the efficient-energy coverage and data loss reduction problem is an important issue for a WSN. Therefore, it is necessary to schedule the activities of the devices in a WSN to save the network’s limited energy and loss of data and hence prolonging its lifetime. Sensor Scheduling for K-Coverage (SSC) is the coverage technique that guarantees the whole area to be the k-covered at any time with improved energy efficiency but the loss of data is not guaranteed in this due to which the energy was further wasted to recover the data of died out node. In the proposed work, Modified K-Coverage technique is implemented to improve the energy efficiency and data loss reduction. Simulation tests are performed to verify the effectiveness of the proposed Modified K-Coverage in comparison with the present SSC Technique. Simulation results show that Modified K-Coverage technique significantly improved the network lifetime and reduced data loss.
S.No.: 106
Title : Hybrid Scheduling For Heterogeneous Asymmetric Mobile Communication
Authors Name: R.Kavitha , M.V.Ramana Murthy
Authors Affilation: Siddhartha Institute of Engineering and Technology, Ibrahimpatnam , Hyderabad
Volume & Issue No.: Volume3Issue5
Abstract: Rapid development in wireless communication technology has paved a path for the increase in mobile users to access the information from anywhere and at anytime. Data broadcasting plays a vital role in asymmetrical communication environment. Here server disseminates the information required by the mobile users at a faster rate as the bandwidth of the downlink channel is much more than the uplink. In data broadcasting, the mobile users put their request for the required data item and continuously listen for the response upon the channel from the server. In order to save the precious battery power of the mobile clients it should be that they have to be served quickly by the server. That is the access time of the requested data item should be minimized. This paper focus on the lengths of the data items which uses stretch as the metric to devise a server broadcasting algorithm in order to achieve optimal results. Simulation results are obtained to evaluate the performance of the proposed algorithm.
S.No.: 107
Title : Assessment of some heavy metals contamination in some vegetable and canned foods
Authors Name: Gebregziabher Brhane1* and Haylom Dargo2
Authors Affilation: Department of chemistry, Adigrat University, P.o.box. 50, Ethiopia
Volume & Issue No.: Volume3Issue5
Abstract: Heavy metal depositions are associated with a wide range of sources such as small-scale industries including (battery production, metal products, metal smelting and cable coating industries), vehicular emissions, resuspended road dust and diesel generator sets. Such problem is getting more serious all over the world especially in developing countries. Heavy metals in general are not biodegradable, have long biological half- life and have the potential for accumulation in different body organs leading to unwanted side effects. Vegetables are vital to human diet as they contain essential components needed by the human body such as carbohydrates, proteins, vitamins, minerals and also trace elements. Consumption of vegetables is one of the pathways by which heavy metals enter the food chain. In order to eliminate the surface pollution from vegetable thoroughly effective washing must be done with clean water. It is clear from this study that even motor vehicle emissions can be a source of heavy metal contamination in vegetables at road side market. Vegetable farms must be irrigated with safe water, avoiding industrial effluents and sewage disposals.
S.No.: 108
Title : A Novel Genetic Algorithm Based Approach for Multimodal Medical Image Fusion
Authors Name: Aswathy S Nair, Jose Hormese
Authors Affilation: Marian Engineering College, Trivandrum, Kerala
Volume & Issue No.: Volume3Issue5
Abstract: Medical imaging has become a vital component in major clinical applications such as diagnosis and treatment. Joint analysis of medical data collected from same patient using different imaging modalities is required in many clinical applications. Some of the existing techniques for medical image fusion does not necessarily enhance the image contrast or make image features more distinguishable. This paper presents an optimal fusion technique for multiscale-decomposition based fusion of multimodal medical images. Coefficient selection is a prime factor regarding image fusion. The main question is how to select the optimal coefficient for fusing medical images. In this paper, Genetic Algorithm (GA) is proposed to select the coefficient efficiently. The algorithm is applied to coefficients extracted by Stationary Wavelet Transform (SWT) and Laplacian Pyramid Transform (LPT) to get a multi focus fused image that is focused in all of its parts. Genetic Algorithm is utilized to search the feature space for the optimal feature subset where features are carefully selected according to a well-defined discrimination criterion. An optimized fused image is obtained by the application of Genetic Algorithm based medical image fusion. Experiments on medical image fusion demonstrate the effectiveness and versatility of the proposed Genetic Algorithm based medical image fusion, which produce fused images with higher quality than existing rules. Compared to the other schemes for medical image fusion, the proposed approach transfer salient information (example: edge information) from the source images to the fused image. The performance of proposed work is found to be superior to existing schemes of medical image fusion.
S.No.: 109
Title : Email Security for Targeted Malicious Attacks
Authors Name: Mr. Jagdish R.Yadav and Dr.A.K.Srivastava
Authors Affilation: IET ,Alwar ,(Rajasthan)
Volume & Issue No.: Volume3Issue5
Abstract: The aim of this paper is to detect the Targeted email attacks as well as to find the malicious executables. Beyond spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) acquire sensitive information from targeted networks. These targeted malicious email attacks are not singular unrelated events, instead they are coordinated and persistent attack campaigns that can span years. This survey categorizes existing email filtering techniques, proposes and implements new methods for detecting malicious email and compares these newly developed techniques to traditional detection methods. Current research and commercial methods for detecting spam and phishing attacks, but not focused on addressing targeted malicious emails. Furthermore, This study first documents the existence of TME and characterizes it as a form of malicious email attack different than spam, phishing and other conventional illegitimate email. unseen malicious executables often arriving as email. Current anti-virus systems attempt to detect these new malicious programs but there is a overhead of updation of anti-virus This approach is costly and oftentimes ineffective. In this project focus is to design a system that detects new, previously unseen malicious executables accurately.
S.No.: 110
Title : DETECTION AND ANALYSIS IN POWER DISTRIBUTION NETWORK: ARTIFICIAL NEURAL NETWORK BASED
Authors Name: Uhunmwangho Roland and Omorogiuwa Eseosa
Authors Affilation: Electrical/Electronic Engineering Faculty of Engineering University of Port Harcourt Rivers State
Volume & Issue No.: Volume3Issue5
Abstract: Early detection and location of faults in networks has been a major challenge in power systems engineering as it results in loss of energy, revenue and damage to equipment and facilities. The reason for this delay in detection is because, in most cases operators of these network rely mainly on information/complaint provided by customers without actually having a scheme to check and verify the information whether it is misleading or correct. This work developed an Artificial Neural Network(ANN) based program written in mat lab 7.5 environment to detect various kinds of faults in the network. The results obtained when compared to exiting results from power holding companies were found to be satisfactory.
S.No.: 111
Title : ARTIFICIAL INTELLIGENT TECHNIQUES IN REAL-TIME DIAGNOSIS OF STATOR AND ROTOR FAULTS IN INDUCTION MACHINES
Authors Name: Uhunmwangho Roland and Omorogiuwa Eseosa
Authors Affilation: Electrical/Electronic Engineering Faculty of Engineering University of Port Harcourt Rivers State
Volume & Issue No.: Volume3Issue5
Abstract: This work involves the development of an artificial intelligent (AI) scheme in the detection of rotor and stator faults in induction machines. Using discrete wavelet transform technique to process the stator current signals measured from faulty motors with isolated cases of rotor and stator faults, the signals are then matched against known fault signatures for the types of fault. The statistical features of fault signals such as mean, Skewness etc. were then extracted and fed to an Artificial Neural Network (ANN) for training. Different ANN architectures were then compared in terms of their accuracy in classification. The network with the lowest mean squared error was then tested with separate data set and the results found to be satisfactory
S.No.: 112
Title : DATA WAREHOUSING AND MINING (“DISCOVERY MOBILE SERVICE PROTOCOL USING CLUSTERING ALGORITHM WITHOUT OVERHEAD”)
Authors Name: Kayalvizhi R
Authors Affilation: VINAYAKA MISSIONS ARTS & SICENCE COLLEGE
Volume & Issue No.: Volume3Issue5
Abstract: In this Thesis we propose a peer-to-peer service discovery protocol specially designed for Mobile Ad-hoc NET work (MANET) environment. The proposed Mobile Service Discovery Protocol (MSDP) uses a dynamic clustering algorithm to group nodes in a MANET, and utilizes Distributed Hash Tables (DHTs) to efficiently cache service information in a peer-to-peer manner. Simulation results under different scenarios show that MSDP has steady performance and is able to reduce message overhead efficiently.
S.No.: 113
Title : Information Dispersal and Reconstruction in Storage System
Authors Name: rajendraprasad B G,Ragini krishna
Authors Affilation: sapthagiri college of engineering
Volume & Issue No.: Volume3Issue5
Abstract: Earlier the data is stored in single place and that data is replicated to multiple systems for the availability purpose, this utilizes lot of storage space and also increases the computation cost. So rather than storing in single system the data is divided into multiple pieces and these pieces are stored in the different systems with some codewords, If a client desires to read a file, it retrieves subset of the blocks, which are combined to reconstitute the original file. Dispersing files across multiple sites yields a variety of obvious benefits, such as availability and offers physical proximity to distributed clients. Less obviously, it enables security to be achieved without relying on encryption keys. This describes a new dispersal scheme, called AONT-RS, which blends an All-Or-Nothing Transform with Reed-Solomon coding to achieve high security with low computational and storage costs, and also from this it is able to reconstruct the whole data with threshold number of pieces.
S.No.: 114
Title : Spatial Domain base Image Watermarking by Edge Features
Authors Name: AshwaryRajpoot
Authors Affilation: Swami Vivekananda College of Technology, Bhopal
Volume & Issue No.: Volume3Issue5
Abstract: The development of a geometrical invariant watermarking theme while not degrading image quality is challenging work. Watermarking is that the method that embeds data called a watermark, a tag, or a label into a multimedia object, like pictures, video, or text, for his or her copyright protection. In step with human perception, the digital watermarks can either be visible or invisible. A visible watermark may be a secondary clear image overlaid into the first image and looks visible to a viewer on a careful scrutiny. The invisible watermark is embedded in such a way that the modifications created to the image elements (pixels) value is perceptually not detected, Associate in its usually recovered only with associate applicable secret writing mechanism. So protects the originality of the information this paper has planned a watermarking methodology. This propose works among the spatial domain of the image it embedded watermarking and improve the standard of pictures or powerful against fully completely different fairly attack like noise, filter, compression. The Results show that the work has associate out stand performance at intervals the invisible watermarking theme.
S.No.: 115
Title : Review on Heart Disease Prediction System using Data Mining Techniques
Authors Name: Beant Kaur, Williamjeet Singh
Authors Affilation: Research Scholar, Dept of Computer Engineering, Punjabi University, Patiala, India
Volume & Issue No.: Volume3Issue5
Abstract: The steady growth of computers and information technology helped the availability of data on different location with various formats. The abundance of data, together with the need for powerful data analysis tools in many countries has been described as data rich but information poor society. This fast growth and tremendous amount of data, collected and stored in large and numerous databases need a powerful tool to extract useful information. The tool helps to get benefit from the collected data, by identifying relevant and useful information. Data mining is one of the solutions to analyze huge amount of data and turn such data into useful information and knowledge. Disease diagnosis is one of the applications where data mining tools are proving successful results. Heart disease is the leading cause of death all over the world in the past ten years. Several researchers are using statistical and data mining tools to help health care professionals in the diagnosis of heart disease. Using single data mining technique in the diagnosis of heart disease has been comprehensively investigated showing acceptable levels of accuracy. Applying data mining techniques to heart disease treatment data can provide as reliable performance as that achieved in diagnosing heart disease.
S.No.: 116
Title : Image Steganography using polynomials
Authors Name: Dr. K. Kanthamma, Dr. G. N. Kodandaramaiah
Authors Affilation: Associate professor dept. of ECE, GATES Institute of technology,Gooty,Andrapradesh. Professor dept of ECE,kuppam engineering college,kuppam,Andrapradesh
Volume & Issue No.: Volume3Issue5
Abstract: Steganography is the art of hiding secret messages inside other messages as until recently had been the poor cousin of cryptography, to communicate privately in open channel. The disadvantage of cryptography is that cryptanalysis’s will break the secret key and secret message will be revealed .Steganography serves as a better way of securing message than cryptography. Steganography gained importance in the past few years due to the increasing need for providing secrecy in an open environment like internet. Many techniques are used to secure information such as cryptography that aims to scramble the information sent and make it unreadable while steganography is used to conceal the information so that no one can sense its existence. There have been many techniques for hiding messages in images in such a manner that the alterations made to the image are perceptually indiscernible. A new steganography encoding scheme which separates the colour channels of the windows bit map images and then hides the images randomly using polynomials in the LSB of any colour component of choose pixel. The polynomials may be of any type with constants and variables. a new steganographic encoding scheme, randomly hide messages in the LSB of any component of the chosen pixel using polynomial. If polynomial is used, hacker needs to predict more than one number. i.e. all coefficients of polynomial correctly to decode and probability of finding all right coefficients correctly is less compared to predicting single seed as in case random generator. So the strength of the stealth is increased by choosing higher dimensional polynomial.
S.No.: 117
Title : A Review Paper on Analysis of Electrocardiograph (ECG) Signal for the Detection of Arrhythmia Abnormalities
Authors Name: ANAND KUMAR JOSHI, ARUN TOMAR, MANGESH TOMAR
Authors Affilation: DEPARTMENT OF ELECTRICAL ENGINEERING MAHARANA PRATAP COLLEGE OF TECHNOLOGY GWALIOR M.P.INDIA 474006
Volume & Issue No.: Volume3Issue5
Abstract: ECG conveys information regarding the electrical function of the heart, by altering the shape of its constituent waves, namely the P, QRS, and T waves. ECG Feature Extraction plays a significant role in diagnosing most of the cardiac diseases. One cardiac cycle in an ECG signal consists of the P-QRS-T waves. This feature extraction scheme determines the amplitudes and interval in the ECG signal for subsequent analysis. The amplitude and interval of P-QRS-T segment determine the function of heart. Cardiac Arrhythmia shows a condition of abnormal electrical activity in the heart which is a threat to humans. The aim of this paper presents analyses cardiac disease in Electrocardiogram (ECG) Signals for Cardiac Arrhythmia using analysis of resulting ECG normal & abnormal wave forms. This paper presents a method to analyze electrocardiogram (ECG) signal, extract the features, for the classification of heart beats according to different arrhythmia. Cardiac arrhythmia which are found are Tachycardia, Bradycardia, Supra ventricular Tachycardia, Incomplete Bundle Branch Block, Bundle Branch Block, Ventricular Tachycardia, hence abnormalities of heart may cause sudden cardiac arrest or cause damage of heart. The early detection of arrhythmia is very important for the cardiac patients. Electrocardiogram (ECG) feature extraction system has been developed and evaluated based on the multi-resolution wavelet transform.
S.No.: 118
Title : Android Application to Identify Breast Cancer Using DNA and Protein Analysis
Authors Name: Yousri Abdelhafiz
Authors Affilation: Management & Science University
Volume & Issue No.: Volume3Issue5
Abstract: Breast cancer is the second most common type of cancer that target large number of females. [1] Breast cancer is a female targeted carcinoma that can be caused by heredity genes, environmental factors and it could be associated with live style. Mutated Breast Cancer1 (BRCA1) and Breast Cancer2 (BRCA2) genes are one of the causes of breast cancer; however BRCA genes produce tumor repressor proteins, the proteins that function in repairing DNA damages. When these genes mutated or altered might not produce this protein or produce mutated proteins that are not functioning, and as a result, breast cancer begins to develop. Breast cancer can be detected by many tests and examinations. Some of these tests and examinations are costly or produce inaccurate results. For this reason, Breast Cancer App is a prospective mobile application that will be developed in Android operating system. Breast Cancer App has many benefits to the users, such as educates them and provides up to date information about breast cancer. This application implements several functions, including promote awareness about breast cancer, conduct monthly breast self-examination, stores user’s data and perform DNA and Protein analysis to detect breast cancer. However, this application detects few mutations of BRCA1 and BRCA2 genes only.
S.No.: 119
Title : DATA HIDING AND VISUAL CRYPTOGRAPHY
Authors Name: Miss. Deepti B. Khasbage
Authors Affilation: Sipna college of engg And Technology,Amravati
Volume & Issue No.: Volume3Issue5
Abstract: Abstract- In this paper, We emphasize on how to improve capacity of image carrier by hiding text data using combine approach of visual cryptography with data hiding technique. And to fulfill this requirement, the proposed system highlights a novel approach of an Optimize Multiple Bits Replacement Scheme with Multi-Layer Multi-Shares Visual Cryptography for Data Hiding. The proposed system hides textual data in a image carrier and achieve its encryption/decryption after going through visual cryptography. The overall effort of the proposed scheme is the achievement of encrypting/extracting multiple secret images and reference images from sharing images at different scale levels. The main aim of the proposed model is to improve security, reliability and efficiency of secret message by the combine use of data hiding and visual cryptography method.
S.No.: 120
Title : CHALLENGES ANDEFFECT OF PREPAID METER
Authors Name: Alumona T.L,JONAH C.G,igbokwe C., Nwosu .T.O
Authors Affilation: Nnamdiazikiwe university, awkaAnambra state
Volume & Issue No.: Volume3Issue5
Abstract: Prepaid metering in its simplest form refers to paying for electricity, gas or water before it is used. The consumer purchases credit and then uses the resource until the credit is exhausted.Smart meters can read real time energy consumption information including the value of voltage, phase angle thefrequency and securely communicate the data.A traditional electronic prepaid metering system operates on three levels. First are the meters which are installed at the consumer’s home. The next level is the vending stations, situated at the utility’s offices or at appointed agents. The communication between the vending stations and the meters is in the form of a token, Tokens also transfer or download information to the meter, and in some cases upload information (depending on the token choice) back to the vending station. At the top level is the System Master Station (SMS) or master client, necessary for a common database for reporting and to provide total management, administration, financial involvement. The prepaid meter system is capital intensive compared with the conventional meter, it also has some adverse effect on both the customers and utility company some which are; increase tariff, technical effects, self-disconnection as a threat to life, maintenance etc.
S.No.: 121
Title : AntHocNet - Multipath Routing Protocols in MANET’s using NS-2
Authors Name: M. Muni Babu
Authors Affilation: Ad-Hoc Lecturer Department of Computer Science and Engineering JNTUA College of Engineering, Pulivendula, Andhra Pradesh, India
Volume & Issue No.: Volume3Issue5
Abstract: A Mobile Ad-hoc Network or MANET is a collection of mobile nodes sharing a wireless channel without any centralized control or established communication backbone. We can classify the routing protocol as flat and hierarchal routing and flat routing protocols are classifying into reactive (source initiated) and proactive (table driven). In this paper we mainly focusing on hybrid routing protocols combination of proactive and reactive i.e. Ad-hoc on demand Multipath Distance Vector (AOMDV) for better performance in simulation by comparing AntHocNet Routing Protocol, NS2 simulator is used for comparison and critical analysis of AOMDV and AntHocNet is done to find its merits and demerits.
S.No.: 122
Title : KERBEROS AS A SERVICE IN CLOUD COMPUTING SECURITY ISSUES
Authors Name: Y. Shashank Rao, Dr. N. Chandra Sekhar Reddy
Authors Affilation: 1Student, M.Tech CSE Dept, Institute of Aeronautical Engineering, Hyderabad-500043, Telangana, India,
Volume & Issue No.: Volume3Issue5
Abstract: Cloud computing is present trendy expression in the IT business sector. It is paradigm in which assets can be leveraged on for every utilization premise accordingly decreasing the expense and intricacy of administration suppliers, Cloud computing guarantees to cut operational and capital expenses and all the more essentially let IT divisions concentrate on vital tasks as opposed to keeping datacenters running. It is significantly more than basic web. It is a build that permits client to get to applications that really dwell at area other than client machine or other Web associated gadgets. There are various profits of this develop. For example other organization has client application. This suggests that they handle expense of servers, they oversee programming redesigns and relying upon the agreement client pays less i.e. for the administration just. Secrecy, Trustworthiness, Accessibility, Validness, and Security are fundamental attentiveness toward both Cloud suppliers and purchasers also. KERBEROS serves as security apparatus in cloud computing administrations and the establishment layer for the other convenience models and an absence of security in this layer will absolutely influence the other conveyance models. Here this paper shows an esteemed investigation of a few security parts and trustworthiness levels which decides vulnerabilities and countermeasures. Administration Level Ascension ought to be viewed as a whole lot essentialness. Here it can possibly turn into a leader in pushing a safe, monetarily feasible IT arrangement in future.
S.No.: 123
Title : Designing Parallel and Distributed Architecture for Data Mining and Unification of Association Rule
Authors Name: Imran Qureshi, and Mohammed Ali Shaik, Kanchi Suresh
Authors Affilation: Assoc.Prof. Guru Nanak Institute of Technology, Ibrahimpatnam, RR District, Hyderabad
Volume & Issue No.: Volume3Issue5
Abstract: With the continually-increasing accessibility of information many methods have been evolved for encoding and storing the information that simultaneously grows all the time. Many available information sources includes traditional databases such as relational database , flat file system, parallel or distributed knowledge bases, simple or complex programs, object-oriented or object-based, text documents with distinct proprietary formats that are some variant of a traditional format. We are proposing four extensible architectures that provide flexibility to various data sources for handling data mining operations by creating or mining association rules.
S.No.: 124
Title : A COMPARATIVE ANALYSIS OF 802.11b AND 802.11g NETWORK
Authors Name: T. K. Alumona; Chiedozie O. Eze; Christian I. Eze; Akemu Efe N.
Authors Affilation: Nnamdi Azikiwe University/Electronic and Computer Engineering, Awka, Nigeria.
Volume & Issue No.: Volume3Issue5
Abstract: Recent advances in wireless technology has led to the introduction of new devices utilizing the 2.4GHz industrial scientific and medical (ISM) unlicensed band traditionally used by Wireless LANS (WLAN). The increasing demand of higher data rate in WLANs has prompted the continual emergence of different 802.11 protocols with increased performance. Interoperability and coexistence between these networks become key issues and must be catered for, to guarantee satisfactory performance of both networks. 802.11 refer to a family of specifications developed by the International Institute of Electrical Electronics Engineering (IEEE) for wireless LAN technology. IEEE accepted the specification for 802.11 in 1997. Wireless Local Area Network (WLAN) has become popular in the home due to ease of installation, and the increasing popularity of laptop computers. WLAN is based on IEEE 802.11 standard and is also known as Wireless Fidelity (Wi-Fi) [1]. In this paper, the comparative analysis of IEEE 802.11b and IEEE 802.11g networks are x-rayed.
S.No.: 125
Title : Analysis of DSSS – CDMA System for varying number of users
Authors Name: T. K. Alumona; Christian I. Eze; Chiedozie O. Eze.
Authors Affilation: Nnamdi Azikiwe University/Electronic and Computer Engineering, Awka, Nigeria.
Volume & Issue No.: Volume3Issue5
Abstract: Performance of Direct sequence spread spectrum code division multiple Access (DSSS – CDMA) under the presence of multiple users is addressed in this Engineering report. A system model for DSSS – CDMA, Quasi-orthogonal spreading code is developed. This Engineering report shows that as more access the system simultaneously, the noise level and hence the error rate increases, only gradual does the system degrade to the point of an unacceptable error rate increases, only gradual does the system degrade to the point of an unacceptable error rate. This property makes it more desirable than frequency Division multiple Access and Time Division multiple Access in cellular network that most have a fixed number of users.
S.No.: 126
Title : Multimodal Biometric Watermarking Techniques: A Review
Authors Name: C.Karthikeyan,D.Selvamani
Authors Affilation: Einstein College of Engineering
Volume & Issue No.: Volume3Issue5
Abstract: Multimodal biometric systems are being gradually deployed in much large scale biometric applications because they have several advantages such as lower error rates and larger population coverage compared to unibiometric systems. A number of watermarking algorithms have been proposed, they have limited real-world applicability due to the balance between credit performance and security of the template. In this paper, a universal evaluation of the main literature related to the Bio watermarking is presented together with classification by using a variety of techniques
S.No.: 127
Title : Words Recognitions Spoken By Non-Native Speakers
Authors Name: Mr.Kale Vijay Kisanrao
Authors Affilation: Department of Computer Science and IT, HCI Lab, Dr.Babasaheb Ambedkar Marathwada University,Aurangabad - 431003 (MS) India
Volume & Issue No.: Volume3Issue5
Abstract: The aim of this experiment is to recognize English Isolated spoken words by different male and female non-native English speakers from Marathwada region of the Maharashtra state. The linear Predictive Coding (LPC), and Mel Frequency Cepstral Coefficients (MFCC), of the audio signal, has been used as a features, which are subsequently used for testing the samples. Classification is done by using Confusion Matrix. The 61.40% and 95.75% recognition rate has been achieved by LPC and MFCCs features, when the proposed approach is tested using a dataset of 1000 speech samples.
S.No.: 128
Title : Isolated English Words Recognitions Spoken By Non-Native Speakers
Authors Name: Mr.Kale Vijay Kisanrao
Authors Affilation: Department of Computer Science and IT,HCI Lab, Dr.Babasaheb Ambedkar Marathwada University,Aurangabad (431003) MS India
Volume & Issue No.: Volume3Issue5
Abstract: The aim of this experiment is to recognize English Isolated spoken words by different male and female non-native English speakers from Marathwada region of the Maharashtra state. The linear Predictive Coding (LPC), and Mel Frequency Cepstral Coefficients (MFCC), of the audio signal, has been used as a features, which are subsequently used for testing the samples. Classification is done by using Confusion Matrix. The 61.40% and 95.75% recognition rate has been achieved by LPC and MFCCs features, when the proposed approach is tested using a dataset of 1000 speech samples.
S.No.: 129
Title : Improvement of Side Channel Cube Attack on PRESENT-80
Authors Name: Shahram Jamali, Erfan Aghaee Kiasaraee, Majid Rahimi, Hamed Yusefi
Authors Affilation: University of Mohaghegh Ardabili, Ardabil, IRAN
Volume & Issue No.: Volume3Issue5
Abstract: Security is one of the most important features of industrial products. Security of RFID tags and sensor networks depends on the security of light-weight block ciphers. PRESENT-80 is a light-weight block cipher. In this paper, we investigate a combinational attack, namely, Side Channel Cube Attack (SCCA) on PRESENT-80. Moreover, we propose some techniques, namely, choosing intelligent intermediate states, extracting quadratic equations, eliminating duplicated chosen plaintexts, and using cube iteration to improve theoretical aspects of the SCCA on PRESENT-80. The results show that the proposed model of SCCA can recover 64 key bits of PRESENT-80 only with 2^{5.81} chosen plaintexts in the first round and 80 key bits of PRESENT-80 only with 2^{6.13} chosen plaintexts in the second round. To the best of our knowledge, this is the most efficient SCCA on PERESENT-80.
S.No.: 130
Title : SURVEY ON COASTAL SYSTEM FOR INDIAN FISHERMAN USING RADAR AND GPS IN ANDROID PLATFORM
Authors Name: I. Harish Rohith, P.Gokul Raj, Jaiganesh
Authors Affilation: Student, ECE, Saveetha School of Engineering, Chennai, India
Volume & Issue No.: Volume3Issue5
Abstract: The main aim is to give a situation for Indian Fisherman to handlehazardous situation with the help of modern technology . One of the huge problems faced by Indian Fisherman is being threatened by neighbor country coastal guards for crossing IMBL. This is because of lack in knowledge of position system. This paper comes with a reliable solution for this problem and protects the Indian fisherman from dangerous situation and being crossing the maritime boundary and save their life and improve the safety of fisherman. This made possible by developing an application in Android Mobile OS which is fed in mobile computing smartphone device. The application uses the information of smartphone inbuilt GPS & GSM module. For positioning and give alert messages to base stations, Keeping the lives of Fisherman in mind, this system has been developed to help them not to move beyond Indian Boundaries. On the whole it’s an attempt to build a suitable device for fisherman at low cost.
S.No.: 131
Title : Data Analysis of Biosecurity Measures for Poultry Farms Registration in Khartoum State, Sudan
Authors Name: M .H. Tabidi, E. A. Mustafa and A .A. Ahmed
Authors Affilation: 1Sudan University of Science and Technology, College of Agriculture Studies, Dept. of Animal Production
Volume & Issue No.: Volume3Issue5
Abstract: Data on biosecurity measures were gathered from Ministry of Agriculture and Animal Resources (MAAR), Khartoum State, Sudan with the objective to evaluate biosecurity status in poultry industry in Khartoum state. The data referred to one year work executed by the veterinary authorities during 2013 with the objective of measuring biosecurity level for registration purposes. The data were organized in twelve biosecurity variables prior analysis. The total number of farms visited was 59 of which 16, 33 and 10 were characterized as traditional, modern and semi modern production systems, respectively. The results showed that modern and semi modern farms are located at Khartoum and Bahri provinces and that the percent of broiler farms (69.5%) was found to be greater than that of layers farms (30.5%). Broiler industry is dominated by modern and semi modern systems. The survey results indicated that there was an overall low frequency of adoption of biosecurity measures (P = 0.01) by the poultry growers in semi modern and traditional systems. However, biosecurity measures were higher in modern production system although the compliance with biosecurity measures was not uniform among all farms in this system (P = 0.01). The results also found that poultry farmers have laid more consideration on those biosecurity measures targeting dead birds disposal, veterinary supervision and vaccination variables.
S.No.: 132
Title : Automation of Testing Using a Microcontroller
Authors Name: Harman Malhotra
Authors Affilation: Department of Electronics and Communication Bhagwan Parshuram Institute of Technology New Delhi, India
Volume & Issue No.: Volume3Issue5
Abstract: Testing is very important for any company before launching its product in the market. Manual testing becomes both taxing and monotonous and after a point errors begin to creep into the products being tested. In the paper presented a method to automate the overall testing process is discussed. A remote controlled car is interfaced with a microcontroller and is tested using a computer; hence, the manual angle is eliminated out of the overall testing process. The paper highlights just one of the many possible ways in which testing can be automated, and the concept discussed can be expanded to meet industrial demands.
S.No.: 133
Title : Improved Version of DEC Protocol in Wireless Sensor Network
Authors Name: Geetika
Authors Affilation: Indo Global College of Engineering, Abhipur Mohali, Punjab
Volume & Issue No.: Volume3Issue5
Abstract: Energy saving is a vital issue while designing the Wireless Sensor Networks. The sensors are sensitive to energy consumption and cannot be recharged and replaced. The radio transmission and receiving data process of nodes consume more energy. Clustering is the technique based on node connectivity and splitting & merging of cluster performance provides more energy efficient network. DEC (Deterministic Energy-efficient Clustering) protocol is dynamic, distributive, self-organizing and more efficient in terms of energy than any other of the existing protocols. But DEC can be enhaced by multi level hierarchy. The fundamental concept of proposed protocol is that there is a pre-defined radius around the Base Station (located at centre), some nodes are inside the radius and others are outside the radius. Cluster Heads which are outside the radius find the nearest Cluster Head which is inside the radius and send data to it. Then these inside Cluster Heads aggregate the data and send it to the Base Station. The proposed scheme is compared against DEC protocol. The simulation result shows that the enhanced version of DEC improves the lifetime of the network as compared with DEC.
S.No.: 134
Title : Travel Time Prediction under Egypt Heterogeneous Traffic Conditions using Neural Network and Data Fusion
Authors Name: Mohamed Zaki, Alaa Hamouda and Basma Hisham
Authors Affilation: 1Al-Azhar University,Faculty of Engineering,Systems and Computers Department,
Volume & Issue No.: Volume3Issue5
Abstract: Cairo is experiencing traffic congestion that places it among the worst in the world. Obviously, it is difficult if not impossible to solve the transportation problem because it is multi-dimensional problem but its good to reduce this waste of money and the associated waste of time resulting from congestion. One way to accomplish this is to provide driver or passenger with current traffic information throughout their trip . Travel time prediction is becoming increasingly important and it is one of the most important traffic information for both drivers and passengers. It is difficult to measure the travel time directly so the present study estimates the travel time using the speed. In this paper we present a model based approach for travelling time prediction. It will provide both passenger or driver with the fastest routes depending on the travel time. The proposed method uses DSmT (Dezert-Smarandache Theory) as a fusion technique and Artificial Neural Network as mining tool . The estimates are corroborated using actual values and the results show the model performing well and gave us acceptable prediction.
S.No.: 135
Title : Image Masking and Compression Using user Private Key Generation
Authors Name: G. Thippanna, Dr. T. Bhaskara Reddy, Dr. S. Kiran
Authors Affilation: Sri Krishnadevaraya University
Volume & Issue No.: Volume3Issue6
Abstract: With the increasing application of image processing techniques in various areas contrast image compression methods. Among the available of image compression methods, unsharp masking is one of the efficient approaches that could produce satisfactory results on a wide range of digital images. However, properly setting the unsharp masking algorithmic parameters is a challenging task. In this paper random number generation phases made the image in unrecognized format. The property of this entitled is to increase the security levels of the encrypted encoded image. Here one key is needed to encrypt and decrypts the image, and then we had to applied compression techniques for a better compression and to prepare unrecognized and unreadable format. Finally the Experiments are conducted to demonstrate the feasibility of the security is providing to the image in network security.
S.No.: 136
Title : Survey of Flooding Attack Mobile Adhoc Network
Authors Name: Rajesh Shrivastava, Deependra Patel
Authors Affilation: Shri Ram Group of Institutions Near I.T.I, Madhotal, Jabalpur (M.P.)
Volume & Issue No.: Volume3Issue6
Abstract: Mobile ad hoc networks will appear in environments where the nodes of the networks are absent and have little or no physical protection against tampering. The wireless nodes of MANET are thus susceptible to compromise and are particularly vulnerable to denial of service (DoS) attacks launched by malicious nodes or intruders. Flooding attack is one such type of DoS attack, in which a compromised node floods the entire network by sending a large number of fake RREQs to nonexistent nodes in the network, thus resulting in network congestion. In this paper, the security of MANET AODV routing protocol is investigated by identifying the impact of flooding attack on it. A simulation study of the effects of flooding attack on the performance of the AODV routing protocol is presented using random waypoint mobility model The simulation environment is implemented by using the NS-2 network simulator. It is observed that due to the presence of such malicious nodes, average percentage of packet loss in the network, average routing overhead and average bandwidth requirement− all increases, thus degrading the performance of MANET significantly.
S.No.: 137
Title : Comparative Study of Software Testing Process & Automated Tools as a Service
Authors Name: Nitin Pathade, Smit Gosavi
Authors Affilation: MGM’S JAWAHARLAL NEHRU ENGINEERING COLLEGE Aurangabad, Maharashtra.
Volume & Issue No.: Volume3Issue6
Abstract: Software testing provides a means to reduce errors, cut maintenance and overall software costs. Testing has become most important parameter in the case of software development lifecycle (SDLC). In the case of software testing process making test cases, execute particular test cases one by one according to the test scenario. And finally create bug report and send it to the team leader. Testing automation tools enables developers and testers to easily automate the entire process of testing in software development. It is to examine & modify source code. Effective Testing produces high quality software. The objective of the paper is to conduct a comparative study of automated tools such as available in market in Selenium free source.
S.No.: 138
Title : Movable Detection of copied file Attacks in Mobile Sensor Networks Using Sequential Analysis
Authors Name: Ganesh Kr Yadav, Harpal Sing Kushwaha
Authors Affilation: SITM Lucknow
Volume & Issue No.: Volume3Issue6
Abstract: Abstract—Due to the unattended nature of wireless sensor networks, an adversary can capture and compromise sensor nodes, generate copied file(replica) of those nodes, and mount a variety of attacks with the replicas he injects into the network. These attacks are dangerous because they allow the attacker to leverage the compromise of a few nodes to exert control over much of the network. Several replica node detection schemes in the literature have been proposed to defend against these attacks in static sensor networks. These approaches rely on fixed sensor locations and hence do not work in mobile sensor networks, where sensors are expected to move. In this work, we propose a fast and effective mobile replica node detection scheme using the Sequential Probability Ratio Test. To the best of our knowledge, this is the first work to tackle the problem of replica node attacks in mobile sensor networks. We show analytically and through simulation experiments that our schemes achieve effective and robust replica detection capability with reasonable overheads.
S.No.: 139
Title : SMART SURVEILLANCE MONITOTORING SYSTEM USING RASBERRY-PI AND PIR SENSOR
Authors Name: SANJANA PRASAD , P.MAHALAKSHMI ,R.SWATHI and JOHN CLEMENT SUNDER.A
Authors Affilation: 1Bannari Amman Institute Of Technology Final year M.E Communication Systems ,,Erode District,Sathyamangalam
Volume & Issue No.: Volume3Issue6
Abstract: This paper deals with the design and implementation of Smart surveillance monitoring system using Raspberry pi and PIR sensor for mobile devices. It increases the usage of mobile technology to provide essential security to our homes and for other control applications . The proposed home security system captures information and transmits it via a 3G Dongle to a Smart phone using web application. Raspberry pi operates and controls motion detectors and videocameras for remote sensing and surveillance, streams live video and records it for future playback. It can also find the number of persons located with the help of the Infrared sensor.. For example , when motion is detected, The cameras automatically initiate recording and the Raspberry pi device alerts the owner of the possible intrusion having a smart phone. Raspberry- Pi has two main components interacting with each other: one is the Web Application that executes on the mobile devices browser and server-side scripts that run in a cloud which will be operated by the Raspberry Pi Hardware tool component
S.No.: 140
Title : Security methods used to prevent unauthorized access to data within the Cloud
Authors Name: POOJA P.KURHEKAR, SAMIDHA S.TUNGE
Authors Affilation: JNEC MCA, AURANGABAD MAHARASHATRA,INDIA
Volume & Issue No.: Volume3Issue6
Abstract: Cloud Computing is one of today’s most attractive technology areas due to its many advent Cloud ages like Highly scalable, on-demand, web-accessed IT resources with major cost / cash and flexibility. Various companies around the world adapting cloud computing as a means to increasing efficiency and reducing cost of their IT services. In this research paper efforts have been made to analyze the use of cloud computing with security means there is no unauthorized data access within cloud. The major security challenge with cloud is that the owner of data may not control of where the data is placed. This is because if one wants to exploit the benefits of using cloud computing one must utilize the resource allocation & scheduling provided by cloud. Therefore we need to safeguard the data in the midst of entrusted process.
S.No.: 141
Title : Ant Colony Optimization Approach for maximizing the lifetime of Heterogeneous Wireless Sensor Network
Authors Name: Saburi Uday Parvatkar
Authors Affilation: PESs Modern College of Engineering, Pune, India
Volume & Issue No.: Volume3Issue6
Abstract: Wireless Sensor Network is made up of number of tiny sensor nodes. They have a wide range of applications. Energy consumption is one of the biggest constraints of the wireless sensor network since the sensor nodes are powered by limited battery power and are usually deployed in remote and hostile environment. Hence there is a growing interest in providing energy efficient protocol for Wireless Sensor Network. Ant Colony Optimization, a swarm intelligence based optimization technique is used to maximize the lifetime of heterogeneous WSN. Proposed algorithm uses two types of pheromones to find shortest distance from source to destination. Based on pheromone and heuristic information, the ants seek an optimal path on the network. Further if the data packet to be sent is very small then the non participating nodes are put to low power state rather than to sleep state. This helps to reduce the power consumed during transition from active state to sleep state and vice versa. The results show that the approach is effective and efficient in finding high quality solutions for maximizing the lifetime of heterogeneous WSNs.
S.No.: 142
Title : A Secure Data Hiding In Video:A Review
Authors Name: Miss.Pallavi N.Holey, Prof.Ajay P.Thakare, Prof.Harsha R.Vyawahare
Authors Affilation: Master of Engineering Scholar Computer Science & Engineering Department. Sipna College of Engg. & Technology Amravati, India
Volume & Issue No.: Volume3Issue6
Abstract: A new compressed video secure steganography (CVSS) algorithmic rule is projected. within the algorithmic rule,embedding and detection operations ar each dead entirely within the compressed domain, with no would like for the ecompression method. The new criteria using applied math visibility of contiguous frames is employed to regulate the embedding strategy and capability,which will increase the safety of projected algorithmic rule.Therefore, the collusion resistant properties ar obtained. Video steganalysis with control system feedback manner is style as a checker to seek out out obvious bugs.Experimental results showed this theme are often applied on compressed video steganography with high security properties.
S.No.: 143
Title : Objective of Keystroke Dynamics Application Identifying Emotional State
Authors Name: Mr. Shivshankar Rajput , Miss Priyanka Vijayvargiya
Authors Affilation: Shri Vaishnav Institute of Technology and Science Indore
Volume & Issue No.: Volume3Issue6
Abstract: This paper describes the concept based on using standard input devices, such as keyboard and mouse, as sources of data recognition of user’s emotional states. Emotions are generally considered as products of evolution. Conventional emotional identification methods (facial expressional analysis, voice intonation analysis, thermal imaging of the face) use intrusive, lab-based, and expensive tools which are unsuitable for real-world situations. The idea behind keystroke dynamics is that people have different typing styles and by analysing the timings of keystrokes, a person’s mental state can be identified. A possible solution for emotion identification is to determine user emotion by analyzing the rhythm of their typing pattern on a keyboard
S.No.: 144
Title : Automated Parking System In Sri Lanka
Authors Name: N.Arunraj, C.P.V Paul, W.N.D Fernando, D.M.D Jayawardena
Authors Affilation: Sri Lanka Institute of Information Technology
Volume & Issue No.: Volume3Issue6
Abstract: : Traffic congestion with increased numbers of vehicles is already a serious issue for many countries. The absence of sufficient parking spaces adds to the issue. Motorists are forced to wait in long queues to park their vehicles. This adds to the inconvenience faced by a motorist, kept waiting for a slot allocation, manually done along with the parking payment calculation. In Sri Lanka, nowadays, parking systems use barcode technology to identify the vehicles at both the entrance and the exit points. Customer management is handled by the use of man power. A parking space is, generally permanently sub divided according to the vehicle type. Here, again, is an issue. Parking spaces are not utilized to the maximum. The current arrangement leaves room for unutilized parking spaces. Accordingly, there is a need to manage the parking space dynamically. As a vehicle enters the parking area, available space has to be assigned for the vehicle according to the vehicle type. The system, Automated Parking System (APS), provides an automated solution using RFID Technology to identify the vehicles. Simultaneously, an algorithm manages the space allocation dynamically. With this system, there is no permanent parking slot allocation for a vehicle type. A desktop application manages the customer. A Web application is used to manage the external users with their reservations. The system also has an android application to view the nearest parking area from the current location. APS is built using java and php. It uses LED panels to guide the user inside the parking area to find the allocated parking slot accurately. The system ensures efficient performance, saving precious time for a customer. Compared with the current parking systems, APS interacts with users and increases customer satisfaction as well. Keywords: RFID, Android, Web based system, Barcode, Algorithm, LED panels
S.No.: 145
Title : Cloud Computing Security Issues
Authors Name: Sasmit R Apsingekar
Authors Affilation: MCA – Jawaharlal Nehru Engineering College Aurangabad
Volume & Issue No.: Volume3Issue6
Abstract: Cloud computing is current buzzword in the market. It is paradigm in which the resources can be leveraged on per use basis thus reducing the cost and complexity of service providers. Cloud computing promises to cut operational and capital costs and more importantly let IT departments focus on strategic projects instead of keeping datacenters running.Many organizations use the Cloud in a variety of different service models (SaaS, PaaS, and IaaS) and deployment models (Private, Public, and Hybrid). There are number of security issues/concerns associated with cloud computing but these issues fall into two broad categories: security issues faced by cloud providers and security issues faced by their customers. The responsibility goes both ways, however, the provider must ensure that their infrastructure is secure and their clients’ data and applications are protected while the user must ensure that the provider has taken the proper security measures to protect their information, and we need to take measures to use strong passwords and authentication measures. This paper introduces some security concerns of Cloud computing when considering moving critical applications and sensitive data to public and shared cloud environments. It also focuses on attacks on cloud computing and the security control measures on it.
S.No.: 146
Title : Li Fi (LIGHT FIDELITY) – ILLUMINATING CIVIL PLACESFOR COMMUNICATION
Authors Name: Adwait R. Pinglikar, Priyanka A. Shandilya
Authors Affilation: Student, MCA, JNEC, Aurangabad, Maharashtra, India
Volume & Issue No.: Volume3Issue6
Abstract: Now a days everyone carries tablet, smart phone and laptop everywhere and everyone searches for Wi-Fi in public places for connecting to internet but problem is Wi-Fi is not allowed in public places like hospitals, power plant, chemical reactors, petrol pumps and airplanes due to radio wave/ radiation disturbance, also number of increasing users hamper the network speed, range is matter in case of Wi-Fi and Wi-Fi is not so secure and bandwidth is limited due to radio frequency so it also matter, but Now we can solve this problem by applying Li-Fi technology in this public places. A German physicist Harald Hass, professor at university of Edinburgh, UK enlighten this Li-Fi technology in front of world in his TED Global speech on 12th July 2011; he said data through illumination by taking fibber out of fibber optic by sending data through a LED i.e. light emitting diode light bulb that varies in intensity faster than the human eye can follow. If we use Li-Fi in public places like hospitals, public transport stations, airplanes, petrol pumps that time LED will not only illuminate that place but empower us for communication via illumination.
S.No.: 147
Title : Pre-emptive Resource Allocation in Grid Computing Using Multiple Priority Scheduler (PRAGUMPS)
Authors Name: Ashwini N S
Authors Affilation: RVCE
Volume & Issue No.: Volume3Issue6
Abstract: Computational grids have the potential for solving large scale scientific problems using heterogeneous and geographically distributed resources. This paper introduces PRAGUMPS - a resource allocation technique that is pre-emptive in nature. The critical problem in this approach is starvation of jobs, if only timing aspect is of job is of concern not any other parameters for priority allocation. This paper addresses those problems by a pre-emptive technique for resource allocation using advance reservation planning with multiple priority handler(time, cost as well as administrator priority considered) and time limit (duration of a job after that its priority is incremented). The grid agent performs job scheduling based on the Advance reservation request, and immediate reservation request on allocated resources. The main aim of this technique is to minimize the total time to execute all jobs, minimize the waiting Time by using pre-emptive scheduling that eliminates starving of jobs in Global Queue, maximize resource utilization rate and balance the load among resources.
S.No.: 148
Title : One compound Steroids from n-hexane fraction of the stem bark of Shorea Singkawang Mig and anticancer activity test with Murin leukemia P-388 cells
Authors Name: Yusnelti#, Yunazar Manjang, Abdi Dharma, Djaswir Darwis*
Authors Affilation: #Chemistry, Departemen of Teacher Training and Education science Edinburgh University, Jambi-Indonesia *Departement Chemistry of Natural Sciences, University of Andalas Padang -Indonesia
Volume & Issue No.: Volume3Issue6
Abstract: abstract: It has been succeeded to isolation steroid compounds from n-hexane fraction of bark of shorea singkawang (Miq) .Miq and has been identified as campesterol or 5-ergost-en-3-ol (3beta) based on the data of UV spectroscopy, IR, GC-MS and 1H NMR and 13C NMR, HMBC and HSQC. This compound is derived from steroid which was first discovered in the current plant and bioassay cytotoxic activity by using Murin leukemia of P-388 cells, with LC50> 100 µm / ml
S.No.: 149
Title : e-election system
Authors Name: Haval Mohammed Sidqi Kharib
Authors Affilation: Sulaimania Polytechnic University
Volume & Issue No.: Volume3Issue6
Abstract: . Proposed system, E-election struggling to improve toward fully electronic election over public network to collect voting and send data to database
S.No.: 150
Title : To Designing a Simulator for Skin Colour Segmentation
Authors Name: Pankaj Mor, Surender Singh
Authors Affilation: Om Institute of Technology &Management, Hisar (Haryana)
Volume & Issue No.: Volume3Issue6
Abstract: Abstract – In this era of various technologies we used the concept of skin color segmentation. The main emphasis of this work is on understanding the skin color segmentation which supports to design YCbCr and CIELab algorithm for skin color segmentation which use in various applications such as face detection, human computer interaction, medical x-rays scan, agriculture etc. In present research work YCbCr and CIELab algorithms which has proven to be a useful and sturdy cue for face detection, localization and tracking, hand detection etc. Keywords- skin color segmentation, YCbCr, CIELab.
S.No.: 151
Title : Secure & Encrypted Accessing and Sharing of Data in Distributed virtual cloud: A Review
Authors Name: Ashish G. Ahuja, Asst.Prof. Komal B. Bijwe
Authors Affilation: 1Department of Computer Science and Engineering, Pote Engg/Sant. Gadge Baba Amravati University, India.
Volume & Issue No.: Volume3Issue6
Abstract: Cloud Computing has been accepted as the next generation architecture of IT Enterprise. The Cloud computing idea offers dynamically scalable resources provisioned as a service over and the Internet Economic benefits are the main driver for the Cloud, since it promises the reduction of capital expenditure and operational expenditure Placing critical data in the hands of a cloud provider should come with the guarantee of security and availability for data and in use. various alternatives available for storage services, while data confidentiality is the solutions for the database as a service pattern are still undeveloped This architecture is supporting purely distributed clients to connect directly to an encrypted cloud database, and to execute simultaneous and independent operations including those modifying the database structure. The Access control policy is set out in which only authorised users are able to decrypt the stored information. This scheme prevents from replay attacks and supports formation, modification, and reading data stored in the cloud. This unique attribute, however, creates many new security challenges which have not been well understood. Security is to protect data from danger and vulnerability. There are various dangers and vulnerabilities to be handle. Various security issues and some of their solution are explained and are concentrating mainly on public cloud security issues and their solutions. Data should always be encrypted in a time when stored and transmitted.
S.No.: 152
Title : Identification of Emotions from Speech using Anchor Model
Authors Name: Surabhi Agrawal
Authors Affilation: G.H.R.C.E.M Wagoli,Pune
Volume & Issue No.: Volume3Issue6
Abstract: A technique for refining the anchor modelling system introduced enhanced emotion detection system from speech. Anchor representation was then put on the speaker detection issue. Identification mistake transaction productivity uncovered that the anchor displaying system missed the mark supply of a state-of the-craftsmanship GMM-UBM framework. It had been more observed that its computational efficiency was exceptional to that specific of the GMMUBM. Correlation of the anchor product and GMM-UBM programs for speaker indexing uncovered an indistinguishable trade-off between point of interest versus review productivity and computational efficiency. A cascaded speaker indexing system was arranged that uses the anchor item program as the first stage and the GMM-UBM as the second stage. In that configuration, the anchor system diminished the data pressing on the GMM-UBM while to some degree lessening effectiveness in working parts of low review. The impact of the cascaded project was to join the peculiarities of both projects at the inconvenience of some decrease in both computational productivity and accuracy of recognition. For extensive chronicles, the detection effectiveness of the anchor program and the absence of computational productivity of the GMM-UBM project can keep their application to speaker indexing. The cascading system may give a handy treatment to the speaker indexing application.
S.No.: 153
Title : An Interactive Educational Mobile Application for System Programming
Authors Name: Prof.Mrs.Sunita M. Dol, Rushikesh Pise, Parmeshwar Reure, Rajkumar Madde, Aniru
Authors Affilation: Walchand Institute of Technology, Solapur
Volume & Issue No.: Volume3Issue6
Abstract: The purpose of this mobile application proposed for System programming of Computer Science and Engineering is to provide study material, question bank, games like word search puzzle, videos etc. This application also provides answers to the questions in the question bank to help student to clear their doubts in handy manner. It is a type of Modern learning content delivery system. This application will clear all doubts related to System Programming.Students can use this application anywhere, at free of cost. This application can be useful for android based mobile as well as tablets. Students can access all chapters related to the subject System programming. User can check their concept by solving quiz. Student can improve their programming skills by trying Hands-On feature, which is provided in this application. Main vision of this application is to provide a complete set of notes for System programming subject.
S.No.: 154
Title : AN EN-ROUTE SCHEME OF FILTERING DATA IN WIRELESS SENSOR NETWORK
Authors Name: Siva Prakash T
Authors Affilation: 1M.E. CSE student, Krishnasamy college of engineering and technology
Volume & Issue No.: Volume3Issue6
Abstract: Monitoring and controlling physical systems through geographically distributed sensors and actuators have become an important task in numerous environment and infrastructure applications. Unlike more traditional embedded systems. The existing en-route filtering schemes are based on T authentication, i.e., a legitimate measurement report must carry at least T valid message authentication codes (MACs) generated by different valid sensor nodes in CPNS, where T is the threshold and predefined before CPNS is deployed. When a report is transmitted from a sensor node to the controller, each forwarding node checks whether the forwarding reports actually carry T valid MACs. If not, the report is considered as a false one forged by the adversary and then dropped. Otherwise, the report is forwarded to the next forwarding nodes along the route. In our proposed system, we propose a Polynomial-based Compromise- Resilient En-route Filtering scheme (PCREF) for CPNS, which can filter false injected data effectively. PCREF adopts polynomials instead of MACs (Message Authentication Codes) to verify reports, and can mitigate node impersonating attacks against legitimate nodes. In our scheme, two types of nodes are considered, they are sensing node and forwarding node. These two types of nodes are denoted as sensor nodes. Each node stores two types of polynomials: authentication polynomial and check polynomial, which are derived by different primitive polynomials. The sensing node can not only sense and endorse the measurement reports of the monitored components, but also forward the measurement reports along the route. The forwarding node is used to forward the received measurement reports to the controller.
S.No.: 155
Title : Review of the Evaluation Process for the Validation of Virtual Assembly Training Systems
Authors Name: Alyson Langley
Authors Affilation: University of Nottingham
Volume & Issue No.: Volume3Issue6
Abstract: Virtual training is an emerging trend within manufacturing industries and involves the use of virtual reality technology to train worker in the procedural and motor skills. This paper presents a review of the current literature relating to the evaluation processes used to validate virtual assembly training systems with specific focus on the automotive industry. It includes only papers which reported experimental evaluations with papers reporting solely on the development of new virtual reality (VR) technologies being excluded. Analysis of the literature resulted in a categorisation of the papers into four key themes based on the evaluation processes employed within each study. The four themes were: evaluation of transfer of skills; evaluation of the usability of the system; evaluation of specific elements of the system; and evaluation of the integrated training program, with the content of each paper associated with one or more of these themes. Examination of each of these categories suggested that future studies must consider multi-measure objective and subjective data collection that encompasses all elements of the system. However, this review highlights the lack of research within the literature regarding the integrated training programs. The overall analysis showed that providing a full and comprehensive evaluation of virtual training is essential if the technology is to be taken seriously by managers within industry.
S.No.: 156
Title : Attribute based Secure Data Sharing for Hierarchical Subgroups in Cloud
Authors Name: IMPANA K P , Dr A S POORNIMA
Authors Affilation: SIT
Volume & Issue No.: Volume3Issue6
Abstract: With the character of low maintenance, cloud computing provides an economical and efficient solution for sharing group resource among cloud users. Unfortunately, sharing data in an attribute based manner while preserving data and identity privacy from an untrusted cloud is still a challenging issue, due to the frequent change of the membership. In this paper, we propose a secure data sharing scheme for hierarchical subgroups in the cloud. By leveraging group signature and dynamic broadcast encryption techniques with hierarchical attribute based system, only privileged cloud user can store and share data. Meanwhile, the storage overhead and encryption computation cost of our scheme are independent with the number of revoked users.
S.No.: 157
Title : Ameliorate Degraded Document Images Using Adaptive Image Contrast Technique
Authors Name: k.lakshmipriya,k.udhayalakshmi
Authors Affilation: E.G.S.Pillay engineering college
Volume & Issue No.: Volume3Issue6
Abstract: Abstract—Degraded document images are often suffered from different types of degradation that renders the document image binarization a challenging task. A novel document image binarization technique that segments the text from badly degraded document images accurately. A novel document image binarization technique that addresses these issues by using synergized image contrast. The synergized image contrast is a combination of the local image contrast and the local image gradient that is tolerant to text and background variation caused by different types of document degradations. For a given document image, initially the contrast map is constructed. The contrast map is then combined with the improved Canny’s edge map to identify the text stroke edge pixels. A new edge expansion model is presented for recovering broken edges of the words or characters on the front side. The document text is further segmented by a local threshold. Aim of this project is to extract clear textual image in simple and efficient manner.
S.No.: 158
Title : Fingerprint image enhancement based on mean adjustment feature extraction and matching
Authors Name: vikas
Authors Affilation: Piet panipat
Volume & Issue No.: Volume3Issue6
Abstract: Fingerprint are best source for identification of individuals . Fingerprinting a well researched topic widely used in image processing applications
S.No.: 159
Title : Review: Various Image Segmentation Techniques
Authors Name: Swati Matta
Authors Affilation: Manipal University Jaipur
Volume & Issue No.: Volume3Issue6
Abstract: In recent times segmentation of images is a growing and a research based field, as image segmentation is a very important part in the field of image processing and computer vision. When a set of pixels are combined together they form a digital image. Segmentation of such an image or a video is useful to extract region of interest (ROI) which further can be used for various applications such as tracking and detection of objects, medical imaging, recognition of face, eyes, etc. There are various algorithms designed to do proper segmentation of the ROI. Each one of them has its own advantages and disadvantages. This paper discusses the various segmentation techniques which are available.
S.No.: 160
Title : IMAGE QUALITY ESTIMATION OF TREE BASED DWT DIGITAL WATERMARKS
Authors Name: MALVIKA SINGH
Authors Affilation: MEDI-CAPS INSTITUTE OF TECHNOLOGY& MANAGEMENT, INDORE
Volume & Issue No.: Volume3Issue6
Abstract: A new and novel semi-fragile-watermarking technique has been proposed in this paper. The watermark is embedded in the tree structure of the colored digital image. Three different watermarks are embedded in a single cover picture in order to enhance the security of the digital media. But these digital images incorporating watermarks may get tampered many a times while traveling from sender’s end to the receiver’s end. Hence, the paper also addresses the Image Quality Assessment (IQA) problem using the objective metrics of the watermarks. Here, a general Digital watermarking based quality evaluation framework is proposed which shows how three watermarks are embedded in a tree structure of an image using “wavelet packet decomposition (wpdec)”. The proposed framework also evaluates the level degradation in original image. The added parameters wPSNR and MSSIM (compared with MSE and PSNR) in the proposed framework makes the quality evaluation procedure more flexible. The experimental results suggest that the proposed framework works effectively and efficiently.
S.No.: 161
Title : Surface analysis of nano thinfilm on of Cu-Ni-Ti in artificial blood plasma
Authors Name: S. John Mary, S. Rajendran
Authors Affilation: 1Dept. of Chemistry, Loyola College, Chennai, India
Volume & Issue No.: Volume3Issue6
Abstract: This paper focuses on the Corrosion inhibition of Cu-Ni-Ti in artificial blood plasma in absence and presence of 50ppm and 100ppm of Amoxicillin were studied by potentiodynamic polarization study. The inhibition efficiencies of amoxicillin for the corrosion of Cu-Ni-Ti are increased with increasing concentration. Potentiodynamic polarization study shows that the corrosion of metal surface is greatly reduced with presence of amoxicillin .This may occur due to the formation of protective layer formed on the metal in presence of amoxicillin The corroded surface were analysed using AFM SEM and EDAX and the results were compared with those obtained by potentiodynamic polarization study. .The polarization study leads to the corrosion inhibition of Cu-Ni-Ti in artificial blood plasma in absence and presence of 50 ppm of amoxicillinand100 ppm of is in the following decreasing order.
S.No.: 162
Title : SMARTPHONES TO COMPUTER REMOTE CONTROL
Authors Name: Mr. Abdul Faheem, Mr. Rahul Bedre, Mr. Piyush Mahajan
Authors Affilation: MCA , MGM’s Jawaharlal Nehru Engineering College, Aurangabad
Volume & Issue No.: Volume3Issue6
Abstract: There exist several situations where we want to wirelessly and comfortably operate a computer, where the computer screen is projected onto a big screen through a projector or big-screen television, such as classrooms, conference/meeting rooms, mobile, workgroup project environments and modern office environments, and even living rooms. This article presents the design and implementation of turning smartphones into computer remote controllers that allow users to wirelessly operate a computer. Smartphones talk to a computer through either wireless Ad Hoc or Wi-Fi access point network. A computer user uses a smartphone as the mouse and keyboard of the computer and operates the computer remotely and wirelessly. Such a system has wide application in many environment settings, such as conference rooms, classrooms, workgroup project environments, and even people’s living rooms, where the computer screen is projected onto a big screen, such as a projector screen or a big-screen television.
S.No.: 163
Title : To Improve Fault Tolerance in Mobile Distributed System
Authors Name: Anupma Padha, Meenakshi Sharma
Authors Affilation: Student, Dept. of CSE1, HOD of Dept. of CSE2 Sri Sai college of Engg. and Technology, Badhani,Punjab
Volume & Issue No.: Volume3Issue6
Abstract: Distributed system is a system which is heterogeneous in nature and better than centralized systems. There are some issues in distributed systems like fault tolerance, scalability, openness etc. In this paper we focused to improve the fault tolerance of the mobile distributed system so that it will take less time for execution when one node moves from its position as compared to other systems.
S.No.: 164
Title : SCALABILITY OF PHASE BASED BINARIZATION OF ARCHAIC DOCUMENT IMAGES
Authors Name: Arivumalar, Rejini
Authors Affilation: 1P.G Student, M.E CSE, Anand institute of higher technology, Chennai, T.N, India
Volume & Issue No.: Volume3Issue6
Abstract: Text segmentation between the foreground and background images is high challenging task because of large inter/intra variation. Human visual system is able to detect blur and evaluate sharpness of visual images. An image captured by an imaging system represents the degraded version of an original image due to the additive noise. Document image binarization is of great importance in the document image analysis and recognition pipeline.It affects the stages of the recognition process and identifies pixel-based binarization evaluation methodology for archaic handwritten/machine-printed document images.Also the, rates of broken and missed text, false alarms, background noise, character enlargement, and merging are identified. The first two steps are phase derived,then Gaussian and Trimmed median filter are used in the post processing step. One of the outputs of the existing adaptive median filter is also removing the needed portions of image.Based on that, use the trimmed median filter for high performance. The pre-processing of degraded handwritten documents including the steps of binarization and form line removal. It shows high recall performance to improve the binarization methodologies. Also the mean shift method is used to fasten the ground truth process for ancient documents.
S.No.: 165
Title : AD HOC NETWORKS ON ANDRIOID
Authors Name: P.kusuma priya,narendra babu.T
Authors Affilation: KLUNIVERSITY,GUNTUR,A.P.
Volume & Issue No.: Volume3Issue6
Abstract: Mobile telephony has become a common thing, and is generally taken for granted in developed countries. However, there are situations in which it is unavailable, because of the lack, or failure, of, the necessary infrastructure. In developing Societies, it is an expensive service to most. In this paper we demonstrate that telephony can be made independent of mobile operators and costly infrastructure. Mobile phones have evolved to become small devices with strong Computational power and enhanced networking capabilities. By adapting cutting-edge networking software to these devices, we can make telephony autonomous and free. We describe our experiences with applying the B.A.T.M.A.N. routing protocol to smart phones running Android OS. We evaluate the performance and reliability of the self-established mesh network, and discuss the remaining steps to free adhoc telephony.
S.No.: 166
Title : Continuous User Identity Verification Via Mouse Gesture Dynamics
Authors Name: Prasanna Kumawat
Authors Affilation: SRES,COE Kopargaon (Pune University)
Volume & Issue No.: Volume3Issue6
Abstract: Most of the online websites and ebanks uses alphanumeric username and password to identity user. But such a credentials like passwords,PIN’s(Personal identification Number), smart cards etc. are easily stolen by hackers. User verification method provides additional layer of security to existing computer security. So in this paper I am introducing a novel method that continuously verifies users according to characteristics of their interaction with pointing device of the computer (e.g. mouse,touch pad ) .
S.No.: 167
Title : A Survey Paper On Solving TSP using Ant Colony Optimization on GPU
Authors Name: Khushbu Khatri
Authors Affilation: Hasmukh Goswami College Of Engineering
Volume & Issue No.: Volume3Issue6
Abstract: Ant Colony Optimization (ACO) is meta-heuristic algorithm inspired from nature to solve many combinatorial optimization problem such as Travelling Salesman Problem (TSP). There are many versions of ACO used to solve TSP like, Ant System, Elitist Ant System, Max-Min Ant System, Rank based Ant System algorithm. For improved performance, these methods can be implemented in parallel architecture like GPU, CUDA architecture. Graphics Processing Unit (GPU) provides highly parallel and fully programmable platform. GPUs which have many processing units with an off-chip global memory can be used for general purpose parallel computation. This paper presents a survey on different solving TSP using ACO on GPU.
S.No.: 168
Title : A SURVEY PAPER ON EARLY DIAGNOSIS OH CARDIO-VASCULAR DISEASE USING DATA MINING AND NEURAL NETWORK
Authors Name: Zarna Parekh
Authors Affilation: Hasmukh Goswami College of Engineering
Volume & Issue No.: Volume3Issue6
Abstract: Cardiovascular diseases are major cause of humanity and death-rate in modern civilization. Medical assessment of these diseases is very important but the tortuous task should be performed efficiently and accurately. In this era of computing and intelligence it is an easy but complicated task to estimate the probability of disease on the basis of data and fact provided to the system. With the growing research it has become important to categories the research outcomes and provides readers with an overview of the existing heart disease prediction techniques in each category. The data mining algorithms are typically used to recognize the disease that occurs in original form the database. Neural Networks is a data mining analytical tools that is used to make prediction for medical data. In this paper, we present a survey report on the use of data mining algorithms & techniques and Neural Network Learning for the detection of Cardiovascular Disease.
S.No.: 169
Title : Efficient Handwritten Alphabet Recognition Using LBP based Feature Extraction and Nearest Neighbor Classifier
Authors Name: Amrita Hirwani, Neelmani Verma, Sandeep Gonnade
Authors Affilation: 1MATS School of IT, MATS University, Arang, Raipur (C.G.), India
Volume & Issue No.: Volume3Issue6
Abstract: Handwritten Alphabet Recognition is one of the artificial intelligence applications which provide an important fundamental for various advanced applications, such as information retrieval and human-computer interaction applications. An off-line handwritten alphabetical character recognition system using local binary pattern (LBP) as feature descriptor and nearest neighbor classifier is described in the project work. In conventional hand written alphabet recognition technique mostly vertical and horizontal or diagonal blocks average value is used as a feature value of alphabets. Most of the time these techniques failed to prove itself as an efficient feature and hence results poor alphabet recognition efficiency. This work brought forward a robust feature descriptor for alphabets using local binary pattern. At the classifier side a nearest neighbor classifier is proposed. Nearest neighbor classifiers are a class of non-parametric methods used in statistical classification (or pattern recognition). This method classifies objects based on closest training examples in the feature space. A set of seventy alphabets including capital letters, small letters and numbers are used for testing of the proposed method. The proposed recognition system performs efficiently yielding higher levels of recognition accuracy compared to the systems employing the conventional feature extraction methods.
S.No.: 170
Title : Association Rule Mining In Horizontally Distributed Databases
Authors Name: Ms. Manali Rajeev Raut, Ms. Hemlata Dakhore
Authors Affilation: Mtech CSE (III sem) Dept. of Computer Science and Engineering G.H. Raisoni Institute of Engineering and Technology for Women, Nagpur RTMNU, Nagpur
Volume & Issue No.: Volume3Issue6
Abstract: Data mining is used to extract important knowledge from large datasets, but sometimes these datasets are split among various parties. Association rule mining is one of the data mining technique used in distributed databases. This technique disclose some interesting relationship between locally large and globally large item sets and proposes an algorithm, fast distributed mining of association rules (FDM), which is an unsecured distributed version of the Apriori algorithm used to generates a small number of candidate sets and substantially reduces the number of messages to be passed at mining association rules. The main ingredient in proposed protocol are two novel secure multi party algorithm – one that computes the union of private subsets that each of the interacting player holds and another that test the inclusion of an element held by one player in a subset held by another. This protocol offers enhanced privacy with respect to the protocol. In addition, it is simpler and significantly more efficient in terms of communication rounds, communication cost and computational cost.
S.No.: 171
Title : Image Enhancement at a Glance
Authors Name: Alokita Kasu
Authors Affilation: MATS University
Volume & Issue No.: Volume3Issue6
Abstract: ABSTACT-Contrast enhancement has an important role in image/video processing. Histogram equalization (HE) is one of the most commonly used methods for image contrast enhancement. However, HE and most other contrast enhancement methods may produce unnatural looking images. The images obtained by these methods are not suitable to use in applications such as consumer electronic products where brightness preservation is necessary to avoid annoying artifacts. To solve such problems, we proposed an hybrid and efficient contrast enhancement method based on best features of previous methods. Moreover, expected result of the method shows the images were suitable for consumer electronic products
S.No.: 172
Title : DESIGN OF AN EFFICIENT METHOD FOR MULTIRESOLUTION WATERMARKING ALGORITHM TO IMPROVE THE ROBUSTNESS
Authors Name: R.GANESH, Dr.S.THABASU KANNAN
Authors Affilation: Research Scholar and Assistant Professor, Department of Computer Science, NMSSVN College, Madurai
Volume & Issue No.: Volume3Issue6
Abstract: Now-a-days watermarking plays a pivotal role in most of the industries for providing security to their own as well as hired or leased data. This paper its main aim is to study the multiresolution watermarking algorithms and also choosing the effective and efficient one for improving the resistance in data compression. Computational savings from such a multiresolution watermarking framework is obvious. The multiresolutional property makes our watermarking scheme robust to image/video down sampling operation by a power of two in either space or time. There is no common framework for multiresolutional digital watermarking of both images and video. A multiresolution watermarking based on the wavelet transformation is selected in each frequency band of the Discrete Wavelet Transform (DWT) domain and therefore it can resist the destruction of image processing. The rapid development of Internet introduces a new set of challenging problems regarding security. One of the most significant problems is to prevent unauthorized copying of digital production from distribution. Digital watermarking has provided a powerful way to claim intellectual protection. We proposed an idea for enhancing the robustness of extracted watermarks. Watermark can be treated as a transmitted signal, while the destruction from attackers is regarded as a noisy distortion in channel. For the implementation, we have used minimum nine coordinate positions. The watermarking algorithms to be taken for this study are Corvi algorithm and Wang algorithm. In all graph, we have plotted X axis as peak signal to noise ratio (PSNR) and y axis as Correlation with original watermark. The threshold value ά is set to 5. The result is smaller than the threshold value then it is feasible, otherwise it is not.
S.No.: 173
Title : Performance enhancement of H.264 video decoder using NVIDIA CUDA
Authors Name: OM Mehta , Jitiksha Patel
Authors Affilation: Indus Institute of Technology , A.D.Patel Institute of Technology
Volume & Issue No.: Volume3Issue6
Abstract: H.264/AVC is an industry standard for video compression, the process of converting digital video into a format that takes up less capacity when it is stored or transmitted. It provides a good compression ratio with good quality as compared to the previous video compression standards. But it all comes at a higher computational cost. So some part of this standard can be computed on GPU to free the CPU. In this paper, we have discussed the H.264 video compression standard and have explored the NVIDIA CUDA for using the GPU for reducing the computational requirements. NVIDIA provides Video decoding API using which we can enhance the efficiency of the decoding process. Here, we have implemented a decoder using this API’s functions and compared its execution efficiency in terms of time and its Frame rate with the Joint Model(JM) Reference Software. JM Reference software is used for academic reference of H.264 and it was developed by JVT (Joint Video Team) of ISO/IEC MPEG and ITU-T VCEG (Video coding experts group).
S.No.: 174
Title : A Described Feasibility Analysis on Web Document Clustering
Authors Name: Ganesh Kr Yadav, Harpal Sing Kushwaha
Authors Affilation: SITM Lucknow
Volume & Issue No.: Volume3Issue6
Abstract: The paper articulates the unique requirements of Web document clustering and reports on the first evaluation of clustering methods in this domain. A key requirement is that the methods create their clusters based on the short snippets returned by Web search engines. Surprisingly, we find that clusters based on snippets are almost as good as clusters created using the full text of Web documents. To satisfy the stringent requirements of the Web domain, we introduce an incremental, linear time (in the document collection size) algorithm called Suffix Tree Clustering (STC), which creates clusters based on phrases shared between documents. We show that STC is faster than standard clustering methods in this domain, and argue that Web document clustering via STC is both feasible and potentially beneficial.
S.No.: 175
Title : Spatio-Temporal Modeling over WSN
Authors Name: Ali Frihida, Karim Fathallah, Karim Fougha, Christophe Claramunt
Authors Affilation: CONTOS², Cognition and Ontology of GeoSpatial Systems, National Engineering School of Tunis, University of Tunis ElManar, Tunisia
Volume & Issue No.: Volume3Issue6
Abstract: Wireless Sensors Network (WSN)}} technology is slowly but surely invading the ubiquitous computing domain by offering innovative solutions for many issues related to security, early warning, observing and monitoring sites for many applications such as agriculture, health, transportation or hazardous fields. WSNs produce large volumes of data streams while data persistence is partially handled. However, large amounts of data observations values are often lost despite their intrinsic historical value. The research and experimental setup presented in this paper introduces a spatio-temporal design and application for a hybrid a emph{data stream management system (DSMS). This database will keep the way the data are handled using a Sensor Network Query Processor but also provides a way of storing the data enriched with their spatial and temporal dimensions. In particular, the underlying database model is augmented by emph{an abstract data type, ADT} that supports appropriate spatial, temporal and spatio-temporal queries to fully exploit the semantics of the stored data.
S.No.: 176
Title : Software Test Automation in Practice: Empirical Study from Sri Lanka
Authors Name: Parthiban R., Wanigasekara S. S. S, Lewis D. A. R., Perera J. S. P.,Manawadu D.
Authors Affilation: Sri Lanka Institute of Information Technology (SLIIT)
Volume & Issue No.: Volume3Issue6
Abstract: oftware trade is an accelerating industry in Sri Lanka for past couple of years. Economic growth have been a key factor behind the stage. Export of software products exceed 250 million US dollars. At this point demand for highly complex systems like ERP (Enterprise Resource Planning) and automating systems is growing. With the complexity of a software, time and effort that requires for test the system, increase parallel. Since time is a least flexible factor in a project it is impractical to spend huge amount of time on testing. As a solution, software testing have been automated. This helps the developers to check the system more efficiently and faster. Large software companies like Microsoft and Oracle are already using software testing automation systems. Currently Sri Lanka also concentrating on automating the software testing process. This research paper is accomplished for perform an empirical study on how software test automation is achieved in Sri Lanka as a practice. Paper have addressed current questions and objectives. It will be essential report to Sri Lankan software developers who is checking in for software automation. Keywords — Automate, Complexity, Empirical, Enterprise, Export, Resource, Trade
S.No.: 177
Title : Decision Tree C4.5 and Its Application in Educational Data Mining
Authors Name: Preeti Patidar
Authors Affilation: LNCT Indore (M.P.)
Volume & Issue No.: Volume3Issue6
Abstract: Educational Data Mining is concerned with developing new methods to discover knowledge from educational database and can used for decision making in educational system. Decision Tree is the most widely applied supervised classification technique. The classification and learning steps of decision tree induction are simple and fast and it can be applied to any field. Mining in education environment is called Educational Data Mining (EDM). In this research student qualitative data has been taken from educational field and the performance analysis using ensemble learning is applied. In statistics, machine learning and ensemble methods use multiple models to obtain better predictive performance than could be obtained from any of the constituent models. Comparative study is done within ID3, C4.5, SLIQ and CART. This paper describes a set of experiments with bagging – a method, which can improve results of classification algorithm. Results of performance tests focused on the use of the bagging method on binary decision trees are presented.
S.No.: 178
Title : A Prototype Web Application For Basic DNA and Protein Analysis Using R Language.
Authors Name: Siva Kumar Chandran
Authors Affilation: Management and Science University
Volume & Issue No.: Volume3Issue6
Abstract: Analysis of DNA and protein has become a very important aspect in the field of research, especially for Bioinformatics. This is important as the basic analysis of these protein and DNA can lead to further advanced analysis of the sequence, which may lead to new discoveries. Basic analysis of sequences is done in the industry, research as well as education. R language is a statistical program that is used in the analysis of DNA and protein sequences, through the application of packages in the Comprehensive R Archive Network. This analysis package helps to analyze sequences, but in a command prompt analysis. However, the process is slow as the researcher has to enter several lines of codes to obtain the result for the analysis. The research is to develop a prototype web application package with an interactive new interface for the DNA and protein analysis. The prototype is fully coded in R with options to download the results as well as providing information about the codes being used for the analysis and the package reference. This application is made to assist in the sequence analysis of DNA and protein without having to write the codes.
S.No.: 179
Title : DESIGN OF AN ARCHITECTURE FOR OPTIMIZING IMAGE RETRIEVAL BY USING GENETIC ALGORITHM
Authors Name: S.SELVAM , Dr.S.THABASUKANNAN
Authors Affilation: Research Scholar and Assistant Professor, M.Phil., MBA., M.Phil.,M.Tech., Ph.D, Dept. of Computer Applications, Principal, Pannai College of Engg& Tech, N.M.S.S.VN. College, Madurai
Volume & Issue No.: Volume3Issue6
Abstract: In recent years especially in the last decade, the rapid development in computers, storage media and digital image capturing devices enable to collect a large number of digital information and store them in computer readable formats. The large numbers of images has posed increasing challenges to computer systems to store and manage data effectively and efficiently. Although this area has been explored for decade sand many researches have been done to develop some algorithms that solve some of its problems, no technique has achieved the accuracy of human visual perception indistinguishing images. Nowadays, virtually all domains of human life including commerce, government, academics, hospitals, crime prevention, surveillance, engineering and historical research use information as images, so the volume of digital data is increasing rapidly. These images and their data are categorized and stored on computers and the problem appears when retrieving these images from storage media. Thus CBIR from large resources has become an area of wide interest in recent years especially in the last decade. To retrieve any image, we have to search for it among the database using some search engine. Then, this search engine will retrieve many of images related to the searched one. The main problem for the user is the difficulty of locating his relevant image in this large and varied collection of resulted images. To solve this problem, text-based and content-based are the two techniques adopted for search and retrieval. The main objective of this paper is to build more generalized CBIR system which increase the searching ability and provide more accurate results. To improve the retrieval accuracy the system has taken the feedback from the user automatically. Here we used WANG database to evaluate the performance of the new system by calculating the precision and recall metrics. We also compared the new system with other existing CBIR systems. The performance of the new architecture in terms of average precision, recall and retrieval time has been shown to perform good. From the experimental results, it is evident that the new system has beaten other existing systems in terms retrieval time.
S.No.: 180
Title : Comparison of WiMAX technology using different modulation technique
Authors Name: Priya Sharma, Prof.Suresh Gawande
Authors Affilation: HOD, Electronic and Communications, B.E.R.I, BHOPAL
Volume & Issue No.: Volume3Issue6
Abstract: In recent months, Mobile WiMAX has gained momentum as a top candidate to deliver the dream of full mobile wireless internet. In spite of this,the available data regarding the performance of Mobile WiMAX in real world scenarios is still scarce. In this paper, the available downlink (DL) throughput as a function of distance to the Base Station (BS) is estimated for a number of propagation scenarios.
S.No.: 181
Title : Hierarchical Clustering Approach for Monitoring and Securing the Data in E-Government Systems
Authors Name: Hanaa. M. Said, Mohamed Hamdy, Rania El Gohary and Abdel-Badeeh M. Salem
Authors Affilation: Ain Shams University, Faculty of Computer and Information Sciences,, Abbasia, Cairo, Egypt
Volume & Issue No.: Volume3Issue6
Abstract: Security is one of the most important issues that face online e-government services. Cyber-terrorism is one of the major terrorist threats posed to our world today. The strategies of Frequencies, logistic regression, and Hierarchical Clustering are useful approaches for monitoring and securing the data in e-government systems. This paper aims to apply the strategies of Frequencies, logistic regression, and Hierarchical clustering on a case study Cairo Cleaning and Beautification Agency, where streets coding, areas, neighborhoods and services were collected and stored through a database. This includes relational, transactional, and advanced database systems, data warehouses, flat files, and the advanced World-Wide Web. Database systems include object-oriented and object-relational databases and specific application-oriented databases. The results showed that, the hierarchical clustering approach is a robust technique that enables the decision-maker to measure the extent of data securing, and the provided services.
S.No.: 182
Title : The Empirical study of different XML parsers across various applications
Authors Name: Ms.Prachi V. Kale
Authors Affilation: P.R.Patil College of Engg. & Tech. ,Amravati
Volume & Issue No.: Volume3Issue6
Abstract: As XML has become a standard for data representation and exchange, XML data processing becomes more and more important for server workloads like web servers and database servers.Every application that processes information from XML documents needs an XML Parser which reads an XML document and provides interface for user to access its content and structure. Parsing is a core operation performed before an XML document can be navigated, queried or manipulated. We focus on four representative XML parsing models—DOM, SAXPull, SAXPush, XOM using real time system , seing its performance on cloud and with android mobile platform In this paper we are representing the process where multi-banking transaction table as xml file and this xml file is parsed by XML parser like SAX, DOM and XOM. In it we are analyzing which parser is more efficient with respect to time and memory space. This analysis is shown by the graph, also we are analysing the performance through the android mobile platform and with the cloud. The handful of studies has been done for comparing the XML parser performance acorss various applications using different platform. Previously we have done the comparision of various parsers through .net as a platform
S.No.: 183
Title : Analysis and Security Implementation in Embedded Systems
Authors Name: E.Pradeep, Ch.sridhar
Authors Affilation: kamala institute of technology and science
Volume & Issue No.: Volume3Issue6
Abstract: One of the most important challenges that need to be currently faced in securing resource-constrained embedded systems is optimizing the trade-off between resources used and security requirements. Security is constantly evolving as threats change over time. As a device becomes popular exists in the market longer, it becomes more susceptible to attack. Many devices in the past were not designed to be field programmable or accept updates without significant modifications. Those days are gone. Devices today must be field upgradeable to not only change and improve functionality, but to deal with bugs and security issues. Including security planning in the life cycle management of your device is critical. Moreover, it’s important that your organization deal with security vulnerabilities as they arise with high priority and rapid response times. This paper first surveys the current situation and then proposes a approach where security is considered from the beginning of the Embedded systems development approach. Obviously, prevention is not the complete solution. A 5-level security strategy assures not only that a system has been properly designed in terms of security, but also that the liabilities of its designers are adequately covered. Keywords: Embedded systems, attacks, security issues, security planning.
S.No.: 184
Title : A Predictive-Reactive Procedure for improving the strength of simultaneous data Services
Authors Name: 1.Mrs. M.S. Vinamathi 2.Ms. V.Sathiya 3. Mrs. M.Maheswari
Authors Affilation: Panimalar Engineering College
Volume & Issue No.: Volume3Issue6
Abstract: Real-time data services can benefit data-intensive real-time applications, e.g., e-commerce, via timely transaction processing using fresh data, e.g., the current stock prices. Stock quote queries and trade transactions should be processed within the acceptable response time bound using up-to-date stock prices. If the service delay is longer than a few seconds, most e-commerce clients tend to leave. Transaction processing based on stale data, such as outdated stock prices, may adversely affect decision making. Similarly, data service requests for transportation management should be processed in a timely manner using fresh data representing the current traffic status.
S.No.: 185
Title : A survey on intrusion detection techniques and sceneraio for intrsuion mechanism
Authors Name: Sandeep Balaiya
Authors Affilation:
Volume & Issue No.: Volume3Issue6
Abstract: Security has become the greatest problem within and outside the organizations. User ID, passwords and firewalls are the common steps that organizations take to secure their computers. However, these are not so effective mediums in current context of unsecure eon. Intruders and attackers are so advanced that they access the computer and manipulate it, so they cannot be traced easily. Through this contribution objective is to find out & present existing intrusion detection system (IDS) with their pros and cons that will be helpful to select the best one and provide the secure environment so that system will be protected from instrusion and attacks.
S.No.: 186
Title : FUZZY BASED SENSORLESS DIRECT SPEED CONTROL FOR BLDC MOTOR DRIVES
Authors Name: SAJLA REHMAN
Authors Affilation: M.E. POWER ELECTRONICS AND DRIVES
Volume & Issue No.: Volume3Issue6
Abstract: This project presents the groundwork for a novel concept of sensor less direct speed control in BLDC motor drives. Unlike the conventional senseless speed controls consider the motor back emf and motor current. Thus feedback mechanism is minimized. Speed regulation is achieved by controlling rotational speed of stator flux linkage. The fuzzy logic control strategy has been implemented for the inverter control. This entire control concept has been implemented using SIMULINK model. The proposed control scheme will effectively reduces the torque ripple in a brushless dc motor and provides better control over the motor performance. The PI regulator is replaced with a simple comparator. The brushless dc motor is excited based on the inverter feedback. This proposal is applicable to both two-phase and three-phase conduction modes of the a brushless dc motor. In this project, principles of the proposed sensorless strategy and speed ripple calculation are described in details. The validity of this claim is verified through the simulation results.
S.No.: 187
Title : Identification of Sugarcane Leaf Scorch Diseases using K-means Clustering Segmentation and K-NN based Classification
Authors Name: Umapathy Eaganathan, Dr.Jothi Sophia, Vinukumar Luckose
Authors Affilation: 1Research Scholar in CS, Vels University-India,
Volume & Issue No.: Volume3Issue6
Abstract: Sugarcane is the most important plant in Indian agriculture as well as in economy also. In this world, India is a second largest production of sugarcane. Sugar is the by-product of sugarcane and it participates in our day today life in all the essential food items. Farmers are much interested to gain profit when they harvest from their land. Normally the plants may affect by the natural deficiency like water, sunlight and soil. Most of the plants leaves are affected by fungal diseases caused by viruses. Same way the sugarcane also affected by the bacterial diseases and it will leads the farmer to spend more time to identify the diseases and it increase cost to prevent from the diseases. The samples of sugarcane leaf scorch taken for the experiment. This leaf scorch caused by the bacterium which is popularly known as “Xylella Fastidiosa”. This paper emphasizes to detect and classify the sugarcane leaf scorch diseases automatically by using image processing techniques they are acquisition, filtering, segmentation and feature extraction. The accuracy of this experiment is given 95%.
S.No.: 188
Title : Design of Network Security Warning System Using Network Defense Depth Model
Authors Name: Samruddhi Thawkar, Shivani Harde
Authors Affilation: Shri Datta Meghe Polytechnic, Nagpur.
Volume & Issue No.: Volume3Issue6
Abstract: The development of networks technology, network security early-warning has become a key technology of constructing networks defense in depth architectures. Focusing on network real environment, upgrading comprehensive capacity of the network security defense, a complete set of network security early-warning control mechanism are first discussed; then, based on network defense in depth model, the design ideas, reaching goals, design principle and implementation technology of network security early­warning system are presented; and finally, from the dynamic. monitoring, intrusion detection, real-time early-warning and process status tracking, the system function design and the procedure design of main function module are also given. This design model is proposed for developing network security early-warning system. Keywords: Network defense in depth, Network security early-warning system, Security early­ Warning server
S.No.: 189
Title : Readiness and Mobile Learning Process for Higher Education Students in Jordanian Universities
Authors Name: Ammar Kh. Moh. Almasri
Authors Affilation:
Volume & Issue No.: Volume3Issue6
Abstract: Mobile learning is still in its infancy, adoption and implementation of M-learning are significant issues for universities. Although the TAM is applicable to various technologies, constructs in the TAM must be extended by incorporating additional factors. These additional factors depend on the target technology, users, and the context. In order on increase the number of students who will use M-learning especially with higher education students, in this study will adopt TAM model as a theoretical framework and extending this model with external variables to propose new model. Therefore, this study will extend TAM model with external variables (Mobile Readiness). Moreover, this research will examine the following seven factors: perceived usefulness, perceived ease of use, Attitude to Use, Mobile Readiness, and Intention to Use Mobile Learning. Finally, the results will provide valuable implications for ways to increase college students’ acceptance of mobile learning.
S.No.: 190
Title : Fine-grain Redundancy Techniques for High-reliable SRAM FPGA`s In Space Environment: a brief Survey
Authors Name: PRABHAKAR J
Authors Affilation: NALLA MALLA REDDY ENGINEERING COLLEGE
Volume & Issue No.: Volume3Issue6
Abstract: SRAM based reprogrammable FPGA with high-flexibility combined with high-performance have become increasingly important for use in space applications. With the advances in technology, the device size decreasing below nm, FPGAs used in space environment are more susceptible to radiation. The radiation effects can cause Single Event Upset (SEU) which are soft-errors and non-destructive. This can appear as transient pulses in logic or support circuitry, or as bit flips in memory cells or registers of SRAM cells and respectively change the function of logic elements within FPGA. There are various methodologies proposed in the literature that would reduce the effects and the mask them for proper device operation. In the paper we study the various redundancy techniques that have been proposed to improve reliability of the system designed with SRAM FPGA`s.
S.No.: 191
Title : Effectual Analytical Big Uncertain Data Processing using CT-PRO
Authors Name: Ms. Aditi Dilip Shinde
Authors Affilation: Annasaheb Dange College of Engineering & Technology, Ashta
Volume & Issue No.: Volume3Issue6
Abstract: Recently the uncertain data grabbed more attention of the data mining community. Big Data is a term about the use of techniques to capture, process, analyze and visualize potentially large datasets. The most of the data generated by many applications is uncertain. So there is need to consider this big uncertain data. To reduce the volumes of big data the frequent items may be generated from this large data so we can easily manage this data for processing. Frequent itemset mining (FIM) is an essential part of association rules mining. Its application for other data mining tasks has also been recognized. It has been an active research area and a large number of algorithms have been developed. CT-PRO is classic variation of FP-Growth based upon compact tree structure. This algorithm is used to find the frequent patterns. This paper proposes an effectual analytical big uncertain data processing using CT-PRO algorithm. First we find the frequent itemsets from uncertain data then the CFP-Tree will be constructed from the frequent itemsets using CT-PRO algorithm. The CFP-Tree will be mine to form desired pattern.
S.No.: 192
Title : AN IMPLEMENTATION OF WEB PERSONALIZATION USING WEB MINING TECHNQIUES
Authors Name: Mr.S.KANNAN, Dr. A. MUTHUKUMARAVEL
Authors Affilation: BHARATH UNIVERSITY, SELAIYUR, CHENNAI-73.
Volume & Issue No.: Volume3Issue6
Abstract: ABSTRACT Web mining is the application of data mining techniques to extract knowledge from web. Web mining has been explored to a vast degree and different techniques have been proposed for a variety of applications that includes “web search “, classification and personalization etc. Most research on web mining has been from ma ‘data-centric’ point of view. In its paper, we highlight the signifance of studying the evolving nature of the web personalization. Web usage mining is used to discover interesting user navigation patterns and can be applied to many real-world problems, such as improving web sites/pages, making additional topic or product recommendations, user/customer behavior studies, etc. a web usage mining system performs five major tasks. i) Data Gathering, ii) Data Preparation, iii) Navigation Pattern Discovery, iv) Pattern Analysis and Visualization and v) Pattern Applications. Each task is explained in detail and its related technologies are introduced. The web mining research is a converging research area from several research communities, such as databases, information retrieval, and artificial intelligence. In this paper we implement how web mining techniques can be apply for the customization. i.e., Web personalization. Keywords: Usage Mining, Navigation Patterns, Pattern Analysis, Content Mining, Structure Mining.
S.No.: 193
Title : Hyperspectral Data Unmixing and Endmember Extraction Process Using Vertex Component Analysis Algorithm
Authors Name: POOJA PRAKASH SUTAR
Authors Affilation: SINHGAD INSTITUTE OF TECHNOLOGY LONAVLA
Volume & Issue No.: Volume3Issue6
Abstract: The hyperspectral images have very huge number of pixel which stores the reflection of light beam from surface of material or object. Variations in the reflectivity of surface materials across different spectral bands provide a fundamental mechanism for understanding features in remotely-sensed multispectral hyperspectral images. Pixel in such images are mixed pixel because of its spatial resolution.A spectral unmixing is performed on mixed pixels,that contain a linear mixture of pure reflectance ground surface materials or objects called as endmember weighted by correspondent abundance fraction.
S.No.: 194
Title : Security issues analysis on online banking implementations in Nigeria
Authors Name: Nwogu Emeka Reginald
Authors Affilation: Department of Information and Communication Technology, Michael Okpara University of Agriculture, Umudike
Volume & Issue No.: Volume3Issue6
Abstract: A study of the Nigerian internet banking system was conducted. The study analyzed the levels of internet banking with an in-depth analysis of their security needs and associated issues. A particular reference was made on the attacks and vulnerabilities in the current systems. Next, is an analysis of the current defense mechanisms and how successful they have been in counteracting the occurrence and effects of Internet banking attacks in Nigeria. We established from the study and research, that the current defense mechanisms have not been very effective, as they still have vulnerabilities which have been exploited by attackers severally.
S.No.: 195
Title : Survey on High Utility Itemset Mining
Authors Name: Nilovena K.V and Anu K.S
Authors Affilation: KMCT College of Engineeering, Calicut University, Kerala,India
Volume & Issue No.: Volume3Issue6
Abstract: Data mining is the process of mining new non trivial and potentially valuable information from large data basis. Data mining has been used in the analysis of customer transaction in retail research where it is termed as market basket analysis. Earlier data mining methods concentrated more on the correlation between the items that occurs more frequent in the transaction. In frequent itemset mining they do not consider the utility or importance of an item. The limitations of frequent items at mining led to a emerging area called utility mining. In utility items at mining the usefulness or profit of an item is considered. The term utility means the importance or profit of an item in a transaction. The main objective of high utility items at mining is to find the item set having utility values above the given threshold. In this paper we present a literature study on various mining algorithms.
S.No.: 196
Title : SURVEY ON INFERRING USER SEARCH GOAL
Authors Name: Asha.P, Ambily Balaram
Authors Affilation: Calicut University, KMCT College of Engineering, Kalanthode,Calicut,India
Volume & Issue No.: Volume3Issue6
Abstract: The information explosion on the internet makes high demand on search engine. But the existing search engines are not satisfying the user’s needs. Most of the search engines returns irrelevant document in response to the user search query. Sometimes the search query may be imperfect description. For such imperfect query the search engine cannot retrieve relevant document to the user’s needs inferring user search goal can improve search engine relevance and user search experience. In this paper propose a new method to infer user search goal by analyzing search engine query logs. For better performance construct a feedback session from click through logs of search engine and map these sessions in to corresponding pseudo documents for clustering. By using clusters organize the search results according to the user relevance. By using CAP algorithm optimize the number of clusters and evaluate the performance of inferring user search goal.
S.No.: 197
Title : Improved Digital Image Processing based Detection for Alzheimer’s disease using MATLAB
Authors Name: Anirban Saha
Authors Affilation: J.I.S University
Volume & Issue No.: Volume3Issue6
Abstract: Digital medical imaging is very expensive and is highly complex due to the requirement of sophisticated software and expert personnel. This paper introduces an improved and a simple, very user friendly, visualization program specially designed in a software called MATLAB for the detection of brain disorder called Alzheimer’s disease as earliest as possible. This application will provide quantitative and clinical analysis of digital medical images i.e. MRI ( Magnetic resonance imaging ) scans of brain. Very tiny and small structural difference of brain cells may gradually & slowly results in serious disorder of brain which may lead to Alzheimer’s disease. Here the primary and main focus is given for detection & diagnosis of Alzheimer’s disease which will be implemented by using kriging interpolation technique .
S.No.: 198
Title : A Survey Paper on Cluster Head Selection Techniques for Mobile Ad-hoc Network
Authors Name: NILESH GORIYA, INDR JEET RAJPUT, MIHIR MEHTA
Authors Affilation: HASMUKH GOSWAMI COLLEGE OF ENGINEERING, VAHELAL
Volume & Issue No.: Volume3Issue6
Abstract: Wireless Technologies are very useful due to their use. Mobile Ad-hoc Network (MANET) has become an essential technology in field of research In MANET, Clustering is an important research area, it offers several advantages like it improves stability and decrees the overhead of the network that increases the efficiency of the network. Clustering increases system capacity by reusing available resources. This Survey paper analyzes number of Cluster head Selection Techniques that are widely used for partitioning mobile host into distinct virtual groups. Each Clustering Technique uses various parameters for selecting Cluster head in cluster. Cluster head is work as leader in cluster and maintain the whole network information which decreases the computation cost and routing overhead of the network in MANET. Each technique is used on the bases of their parameters. Each approach has its own pros and cons.
S.No.: 199
Title : Phishing Attacks Techniques
Authors Name: Ritika Arora,Neha Arora
Authors Affilation: Panjab University Punjabi University Patiala
Volume & Issue No.: Volume3Issue6
Abstract: — Now in a day’s phishing is a special type of network attack where the attacker creates a replica of an existing web page to fool users in to submitting personal, financial, transaction orpassword data to what they think is their service provider’swebsite. Phishing has two techniques, deceptive phishing and malware – based phishing. Here we focus on deceptive phishing using social engineering schemes. To protect users against phishing, various anti-phishing techniques have been proposed. In this paper we have reviewed various phishing and anti-phishing methods for detecting and preventing phishing attack. .
S.No.: 200
Title : An approach for improving the concept of cyclomatic complexity in object-oriented programming
Authors Name: Ankita
Authors Affilation: Thapar university
Volume & Issue No.: Volume3Issue6
Abstract: Measuring software complexity plays an important role to meet the demands of complex software. The cyclomatic complexity is one of most used and renowned metric among the other three proposed and researched metrics that are namely: Line of code, Halstead’s measure and cyclomatic complexity. Although cyclomatic complexity is very popular but also serves some of the problems which has been identified and showed in a tabular form in this research work. It lacks the calculation of coupling between the object classes for object oriented programming and only calculates the complexity on the basis of the conditional statements. Thus there is requirement to improve the concept of cyclomatic complexity based on coupling. Paper includes the proposed algorithm to handle the above stated problem.
S.No.: 201
Title : A Result evaluation of Image Compression using Multilayer Perceptron technique
Authors Name: Niharika Saxena, Mrs.Komal Tahiliani
Authors Affilation: M.Tech(CSE) Bhopal
Volume & Issue No.: Volume3Issue6
Abstract: This paper presents a neural network based technique that may be applied to image compression. Conventional techniques such as Huffman coding and the Shannon Fano method, LZ Method, Run Length Method, LZ-77 are more recent methods for the compression of data. A traditional approach to reduce the large amount of data would be to discard some data redundancy and introduce some noise after reconstruction. We present a neural network based MLP technique that may be a reliable and efficient way to achieve vector quantization. Typical application of such algorithm is image compression. Moreover, Kohonen networks realize a mapping between an input and an output space that preserves topology. This feature can be used to build new compression schemes which allow obtaining better compression rate than with classical method as JPEG without reducing the image quality .the experiment result show that proposed algorithm improve the compression ratio in BMP, JPG and TIFF File
S.No.: 202
Title : Segmentation and Feature Extraction of Lymphocytes WBC Using Microscopic Images
Authors Name: Dr. Mazin Z. Othman , Alaa B. Ali
Authors Affilation: Electronic Engineering /Mosul’s University/Computer and Information Engineering
Volume & Issue No.: Volume3Issue6
Abstract: This paper presents a proposition for an algorithmic procedure to isolate and count the lymphocytes White Blood Cell (WBC) form microscopic Images. The process involves segmentation of cells, scanning algorithm ,feature extraction, and recognition of lymphocyte cells. The scanning algorithm returns the number and location of candidate area in WBC images. For feature extraction, a combination of the shape feature moment invariants and the roundness are found to have an excellent recognition accuracy for identifying the lymphocyte cells from other WBC types. The whole work has been developed using MATLAB environment, in particular the Image Processing Toolbox.
S.No.: 203
Title : Flexible Agent-Based Real-Time Supervisory Of Industrial Processes
Authors Name: Hosny A. Abbas
Authors Affilation: Electrical Engineering department-Faculty of engineering- Assiut uinversity, Egypt
Volume & Issue No.: Volume3Issue6
Abstract: SCADA stands for Supervisory Control and Data Acquisition; it can be described as an architectural pattern for industrial control systems with many components are distributed over a wide area. SCADA systems historically distinguish themselves from other industrial control systems by being large-scale processes that can include multiple sites, and large distances. This research provides an approach for designing and developing SCADA systems by the integration of multi-agent systems (MAS) and open process control protocol (OPC). The applicability of the proposed approach is demonstrated by a real experimental case study example carried out in a paper mill.
S.No.: 204
Title : A High speed Low Power Adder in Dynamic logic base on Transmission Gate
Authors Name: Neeraj Jain
Authors Affilation: NIIST bhopal
Volume & Issue No.: Volume3Issue6
Abstract: Speed operation is depends on the longest critical paths in the multi-bit adders and also the MOSFET transistor gain which in turn depends on transistor size. The power consumption in MOSFET is depends on the switching frequency, sub threshold leakage and switching time. In this paper author proposed the speed and area efficient transistor base adder using static CMOS pass transistor logic. In this method we shortened the longest critical path to decrease the total critical path delay. The design simulation on microwind layout tool calculates the worst-case delay in nanosecond and total power consumption in microwatt range.
S.No.: 205
Title : METADATA CONSTRUCTION MODEL FOR WEB VIDEOS: A DOMAIN SPECIFIC APPROACH
Authors Name: Siddu P. Algur, Prashant Bhat, Suraj Jain
Authors Affilation: Department of Computer Science, Rani Channamma University, Belagavi-591156, Karnataka, India
Volume & Issue No.: Volume3Issue6
Abstract: Abstract: The advances in computer and information technology together with the rapid evolution of multimedia data are resulted in the huge growth of the digital video. Due to the rapid growth of digital data and video database over the Internet, it is becoming very important to extract useful information from visual data. The scientific community has increased the amount of research into new technologies, with a view to improve the digital video utilization: its archiving, indexing, accessibility, acquisition, store and even its process and usability. All these parts of the video utilization entail the necessity of the extraction of all important information of a video, especially in cases of lack of metadata information. This paper describes importance of descriptive metadata of video, categorization of video contents based on video descriptive metadata, and high level metadata based web video modeling. The main goal of this paper is to construct high level descriptive metadata with and without timeline for all the category of videos and extraction of metadata from web videos such as YouTube and Face Book. By using the high level descriptive metadata information, a user is facilitated on the one hand to locate a specific video and on the other hand is able to comprehend rapidly the basic points and generally, the main concept of a video without the need to watch the whole of it.
S.No.: 206
Title : A Survey on Hybrid Cloud with De-duplication
Authors Name: Pooja S Dodamani , Pradeep Nazareth
Authors Affilation: Mtech Student, Computer science and Engineering, NMAMIT, Karkala, Karnataka, India
Volume & Issue No.: Volume3Issue6
Abstract: A survey on industry trends is been noted where the usage of hybrid cloud architecture can be used which supports, the upcoming industry challenges by providing the efficient way of storing their data in the cloud environment by using the combination of both public and private clouds, So that it provides the facility to store sensitive data in private cloud and less critical data on to the public cloud where huge savings can be made. Since the demand for data storage is increasing day by day and by the industry analysis we can say that digital data is increasing day by day, but the storage of redundant data is excess which results in most of the storage used unnecessary to keep identical copies. So the technology de-duplication is introduced to efficiently utilize the cloud storage system.
S.No.: 207
Title : Overview of Relay Selection and dynamic resource Allocation for Cooperative Wireless Network
Authors Name: Priyanka, Usha Pal
Authors Affilation: A.P. , Bharat Institute Of Technology,Meerut
Volume & Issue No.: Volume3Issue6
Abstract: In the past decades, increasing demand for wireless multimedia and interactive Internet services, along with rapid proliferation of a multitude of communications and computational gadgets, are fuelling intensive research efforts on the design of novel wireless communication systems architectures for high speed, reliable and cost effective transmission solutions. Cooperative relay communication is a new paradigm shift for the next generation wireless system that will guarantee high data rates to all users in the network. It is anticipated to be the key technology aspect in the fifth generation wireless networks. In this Paper, we use system level simulations to gain insight into and quantify the influence of channel state information feedback delay in a multi-cell cooperative wireless system, and focus is put in relay selection and resource allocation for its optimal use. We analyzed the interplay between scheduling, power control in a multi-cell environment when the channel state information is subject to feedback delay. Detailed analysis is carried out using MATLAB and subsequent results are thoroughly discussed for deeper insight into the dynamics of cooperative networks.
S.No.: 208
Title : A Review paper on Performance Comparisons of Ad hoc Network Routing Protocols In MANETs
Authors Name: AARTI KHARE
Authors Affilation: Patel college of science and technology,indore
Volume & Issue No.: Volume3Issue6
Abstract: The need of wireless network is to enforce participating nodes to forward packets to other nodes to foster secure and reliable communication. Our work mainly focused on the performance of protocols of different varying type of traffic (UDP/CBR and TCP/FTP).In this paper We have only study and analyzed the performance of protocols by varying type of traffic (UDP/CBR and TCP/FTP).This paper aims to compare performance of two routing protocols for Mobile Ad-Hoc networks (MANET’s). Since routing is a critical issue in MANET, so the focus of this paper along is the performance analysis of routing protocols.In previous work they are compare between two protocoals AODV and DSR and they are only two metrics is used for performance analysis is Packet Delivery Ratio and Average end-to-end Delay and they are not compare traffic (UDP/CBR and TCP/FTP) and analysis is based on Packet size and Sending time But we are again compare between two protocols AODV and DSR and we are three metrics are used for performance analysis Packet Delivery Ratio,Average end-to-end Delay and Throughput and we are simulation done compare with (UDP/CBR and TCP/FTP). A detailed simulation has been carried out in NS-2. In this paper we have compared the performance of two reactive MANET routing protocol AODV and DSR by using mobility model. Both share similar On-Demand behavior, but the protocol’s internal mechanism leads to significant performance difference. We have analyzed the performance of protocols by varying network load, mobility and type of traffic (CBR and TCP).
S.No.: 209
Title : A Comparative Study and Analysis of Performance Comparisons of Two Reactive Routing Protocols In MANETS
Authors Name: AARTI KHARE
Authors Affilation: patel college of science and technology,indore
Volume & Issue No.: Volume3Issue6
Abstract: In this paper Our work mainly focused on the performance and analysis of protocols of different varying type of traffic (UDP/CBR and TCP/FTP).In this paper We have done simulation and results are showing that which protocol are given in best performance in varying type of traffic (UDP/CBR and TCP/FTP).We have analyzed the performance of protocols by varying network load, mobility and type of traffic (CBR and TCP). It has been observed that AODV gives better performance in CBR traffic and real time delivery of packet. Where as DSR gives better results in TCP traffic and under restricted bandwidth condition.The final analysis and valuation is presented at the end of this paper.
S.No.: 210
Title : CHSM-An Effective Mechanism for Cluster Head Selection in MANET
Authors Name: Sivaranjani.V,Madhavan.P
Authors Affilation: Sri Krishna college of Technology
Volume & Issue No.: Volume3Issue6
Abstract: The tremendous amount of using mobile nodes in wireless communication medium makes energy efficiency a fundamental requirement of Mobile Adhoc network. Energy plays vital role in prolonging the network life time. An energy aware clustering algorithm for the optimized link state routing protocol is used. This algorithm takes into account the node density and mobility and gives major improvements regarding the number of elected cluster heads. It increases the network lifetime by considering the adhoc residual energy. The objective is to elect a reasonable number of cluster heads. The proposed scheme introduces the weighted clustering algorithm to form a clustered OLSR network, which helps to decide the mode of each node. Reclustering mechanism is included, which results in electing the new cluster head, when a node has just arrived or it has just left its cluster.
S.No.: 211
Title : Evaluating the key findings of Image Fusion Techniques
Authors Name: Harkamal preet kaur, Sunny Dhawan
Authors Affilation: CTIEMT, Jalandhar
Volume & Issue No.: Volume3Issue6
Abstract: An objective of digital image fusion combine two or more source images to get a single digital image known as fused image. This fused image will be more informative for human as well as machine also. We can used the different methods of fusion has been proposed in literature both in spatial domain and wavelet domain. This paper will be propose a pixel level image fusion using multiresolution (BWT). The two more methods we can use in this paper is DCT and PCA. PCA based on fusion and sharpness of fused image. PCA performance evalution of proposed method used matric like: fusion factor, entropy, standard deviation, to get the better results. DCT will be suitable and time saving in real time system for fusion of multifocus images based on variance calculation.
S.No.: 212
Title : Website Security using GeoLocation and Behavior Patterns in Cloud Computing
Authors Name: Kalpit G. Soni
Authors Affilation: Shri A. N. Patel P.G. Institute, Anand
Volume & Issue No.: Volume3Issue6
Abstract: The purpose of this research paper is to research the use of location and user behavior patterns in authentication and fraud detection. The research paper introduces a new approach of detecting fraud and internet attacks by using geolocation. The new approach is the result of an effort to standardize the ways an information system may use to authenticate a user and detect fraud based on geolocation. Using geolocation as an authentication mechanism poses multiple issues and challenges including that location is not a suitable authentication factor, there are privacy concerns related to tracking user location and user location information can be forged. However, location and user behavior based security is not going to be a replacement for existing authentication and fraud detection mechanisms. It is intended to augment current technologies and make security attacks more difficult and be a deterrent against internet fraudsters.
S.No.: 213
Title : Object Orientation UML Enhancement for Developing Intelligent Semantics
Authors Name: Mansoor Alaali & Samia Yousif
Authors Affilation: Ahlia University
Volume & Issue No.: Volume3Issue6
Abstract: This research presents a new SEMANTIC dictionary system developed by utilizing the features of the computer science Object Orientation (OO) approach. SEMANTIC dictionary system contains English words, their Arabic meanings, associated actions, semantic relationships, inherited actions and attributes, exceptional relationships and other semantics and characteristics. SEMANTIC dictionary system utilizes Object Orientation major features such as objects, classes, aggregation, inheritances, encapsulation and polymorphism. SEMANTIC dictionary is a knowledge base which can be considered as an intelligent language model and can be used for many language teaching purposes. This research shows how simple phrases can be generated or validated to be semantically correct. In the process of using OO UML to represent semantic knowledge, we have made enhancements and additions to UML itself.
S.No.: 214
Title : Implement reed Solomon encoder/ decoder using Spartan FPGA
Authors Name: Manju Mangtani, Mukesh Maheshwari
Authors Affilation: 1Department of Electronics and Communication Engineering, JNU Jaipur
Volume & Issue No.: Volume3Issue6
Abstract: In this paper, (15, 11) reed Solomon codes have been designed and implement using Spartan field programmable gate array device. The design is carried out by writing VHDL code. The waveforms are tested using the package ISIM simulator and synthesis report and programming file are obtained using the Spartan 6. Simulation waveforms show that (15, 11) reed Solomon decoder could correct up to 2 error in given polynomial to the encoder.
S.No.: 215
Title : Significance of Mobile Ad hoc Networks in the Growth of Cloud Based Services
Authors Name: Aniket Deshpande
Authors Affilation: Mewar University, Chittorgarh, Rajasthan
Volume & Issue No.: Volume3Issue6
Abstract: Mobile ad hoc networks has gained considerable popularity in the past few decades. It is because; these networks facilitate secured, integrated, and cost effective wireless combination. Recently, studies have established an approach that mobile ad hoc networks may commendably support the growth of cloud based services, as the operations of both of these networks are comparable. This manuscript will assist in identifying the role and performance of mobile ad hoc networks in the growth of cloud based services, while recognizing different issues and challenges. Mobile ad hoc performance limitation and challenges may play a major role in affecting the performance and growth of cloud based services. In this regard, different techniques and methods will also be analyzed and encapsulated in the research study, in order to assure the reliability of cloud based services’ operations.
S.No.: 216
Title : Different Types of Attack in Image Watermarking including 2D, 3D Images
Authors Name: Dr. Sanyam Agarwal, Priyanka, Usha Pal
Authors Affilation: Department of ECE BIT MEERUT, U.P., INDIA
Volume & Issue No.: Volume3Issue6
Abstract: Digital Watermarking is a method through which we can authenticate images, texts and videos. Watermarking functions are not only authentication purpose, but also protection for such documents against malicious intentions to change such documents or even claim the rights of such documents. The aim of Watermarking is adding “ownership” information in multimedia contents to prove the authenticity.In this paper, we used DCT technique and different types of attack for digitally watermarked 2D and 3D images .Common attacks to watermark usually aim to destroy the embedded watermark or to impair its detection.
S.No.: 217
Title : IMPROVING ANNOTATION PROCESS AND INCREASE THE PERFORMANCE OF TAG DATA
Authors Name: A.HARIKRISHNA, (M.Tech), Mr.K.BHASKAR NAIK, M.Tech,
Authors Affilation: SREE VIDYANIKETHAN ENGINEERING COLLEGE(autonomous).
Volume & Issue No.: Volume3Issue6
Abstract: ABSTRACT- In nowadays so many organizations generates and share textual description of their products, services, action etc. It contains for most amount of structured information and which remains worried about unstructured information. If information extraction structural relation by using algorithm facilitating they are often more cost and inaccurate. When working top of a text it does not contains structural information. An alternative approach to the generation of the structured metadata by identifying document that are likely to contain information of interest .This data is going to be valuable for questioning the information base. Approach relies on the idea that humans are more likely to add the necessary metadata during creation time. Based on CADS (Collaborative Adaptive Data Sharing Platform) technique used to improving the visibility of the document with respect to the query workload by up to 50% only. So that Probing algorithm with Bayesian Approach technique was included, this is used to improve the effiencent of visibility of the document with respect to the querying workload more than 50 percent
S.No.: 218
Title : Energy Conservation in WSN for Application without Prior Knowledge of Cluster Numbers
Authors Name: Neha R. Jaiswal
Authors Affilation: Sant Gadge baba Amravati University
Volume & Issue No.: Volume3Issue6
Abstract: Abstract the large-scale deployment of wireless sensor networks (WSNs) and the need for data aggregation necessitate efficient organization of the network topology for the purpose of balancing the load and prolonging the network lifetime. The nodes in sensor networks have limited battery power and it is not feasible to recharge or replace the batteries, therefore power consumption should be minimized so that overall network lifetime will be increased. In this paper, we review the few clustering protocol &we present the clustering method which improve energy-efficiency & is useful in those application where the number of clusters is not known a priori, or distribution of nodes is random. For this purpose we use genetic algorithm (GA) to evolve the population of nodes over generations to find those node which can survive in next population. For clustering we use k-means algorithm which effectively selects the cluster head (CH).Therefore, this clustering scheme does not need to pre-specify the number of clusters as in existing methods.
S.No.: 219
Title : Investigation of Using Concrete Pavements in Developing Countries: A Case Study for Conditions of Khartoum State in Sudan
Authors Name: Galal Ali, Nuha Akasha
Authors Affilation: Professor and Consultant Engineer, Sudan University of Science & Technology (SUST) P O Box 12281, Khartoum, Sudan
Volume & Issue No.: Volume3Issue6
Abstract: Recent years have witnessed several advances in pavement industry, such as superpave and asphalt-rubber mix-design, mechanistic-empirical design and pavement recycling. Nevertheless, development is lacking search for feasibility of using concrete pavements developing countries, while cities are seeking improvements in terms of reduced life-cycle cost, shorter construction period and less disruption of activities. This is in contrast to flexible-pavement poor performance with frequent premature failure and ever-increasing utility cuts. Although some doubts exist regarding their economics under certain conditions, those countries predominantly use flexible pavements. It appears then the cost factor is the main reason for this preference although the most two crucial parameters that govern the design of both asphalt and plain-jointed concrete pavements are soil subgrade strength and the design traffic. This paper applied popular design methods for both pavement types to compare construction and maintenance costs of typical sections and a length of one-km. It was found that there was difference in the respective costs justifying that it is economically viable to use rigid pavements for urban roads.
S.No.: 220
Title : Fuzzy Model for Human Face Expression Recognition
Authors Name: Mr. Akshay A. Adsod, Prof. Dinesh S. Datar
Authors Affilation: G.H.Raisoni College of Engg. and Management, Amravati
Volume & Issue No.: Volume3Issue6
Abstract: Facial expression recognition plays a vital and effective role within the interaction between man and computer. During this project, brand new system supported the mathematical logic is projected for this purpose. Fuzzy is one helpful approach for fuzzy classification, which might verify the intrinsic division in an exceedingly set of untagged knowledge and notice representatives for undiversified teams. This method acknowledges seven basic facial expressions particularly concern, surprise, happy, sad, disgust, Neutral and anger. For description of detail face facial features, Face Action writing (FACS) was style. First, we tend to gift a unique methodology for facial region extraction from static image. For determination of face effective areas is employed from integral projection curves. This methodology has high ability in intelligent choice of areas in facial features recognition system. Extracted face expression fed to fuzzy rule based mostly system for facial features recognition.Results of tests indicate that the projected theme for facial features recognition is powerful, with smart accuracy and generating superior results as compared to different approaches. Keywords—facial expression recognition; face action coding system; integral projection; fuzzy logic.
S.No.: 221
Title : Securing Audio Watermarking System using Discrete Fourier Transform for Copyright Protection
Authors Name: Miss. Rushali J. Watane, Prof. Nitin R. Chopde
Authors Affilation: G.H.Raisoni College of Engg.and Management, Amravati
Volume & Issue No.: Volume3Issue6
Abstract: The recent growth in pc networks, and a lot of specifically, the planet Wide internet, copyright protection of digital audio becomes a lot of and a lot of necessary. Digital audio watermarking has drawn in depth attention for copyright protection of audio information. A digital audio watermarking may be a method of embedding watermarks into audio signal to point out genuineness and possession. Our technique supported the embedding watermark into audio signal and extraction of watermark sequence. We tend to propose a brand new watermarking system victimization separate Fourier remodel (DFT) for audio copyright protection. The watermarks area unit embedded into the best outstanding peak of the magnitude spectrum of every non-overlapping frame. This watermarking system can provides robust lustiness against many styles of attacks like noise addition, cropping, re-sampling, re-quantization, and MP3 compression and achieves similarity values starting from thirteen sound unit to twenty sound unit. Additionally, planned systems attempting to realize SNR (signal-to-noise ratio) values starting from twenty sound unit to twenty-eight sound unit. Keywords—Audio Segment, Discrete Fourier Transform (DFT), Signal-to-noise-ratio (SNR)
S.No.: 222
Title : MPPT BASED MULTIPURPOSE BATTERY SWAPPING SPY CUM ARMY DEFENCE ROBOT
Authors Name: Sureshkumar R, sharmila K
Authors Affilation: Kumaraguru college of technology, coimbatore,Tamilnadu
Volume & Issue No.: Volume3Issue6
Abstract: This project presents the spy cum army defence robot with the solar panel to charge the batteries. To maximize the energy obtained from the sunlight we are using MPPT (Maximum Power Point Tracking) technique. Maximum power point tracking (MPPT) is used in the photovoltaic (PV) system to maximize the PV output power, irrespective of the temperature and irradiation conditions. The MPPT system consists of a buck-type Direct Current (DC)/DC converter, which is controlled by a microcontroller unit. The microcontroller is programmed with a simple and reliable MPPT technique. This robot the capability of swapping the battery between two batteries, whenever it detects the battery which provides the power supply to the robot is dead. The robot is controlled by a remote controller which has RF transmission to send commands to direct the robot and to receive the information from it. The robot continuously senses about the metal detection, obstacle detection and the present temperature value. This information is transmitted through RF transmitter and the information is received and displayed at the receiver end on the LCD display which is interfaced with the remote controller. Meanwhile the video of the remote environment is captured by the wireless camera which is mounted on the robot and transmits with the help of RF transceiver. Now a day’s army requires LASER gun. So the LASER gun is fixed with the robot which can be operated remotely. Keywords: Obstacle sensor, Micro-controller, LCD Display and Remote.
S.No.: 223
Title : Encroachment of power optimization in Parallel Systems using OpenMP
Authors Name: Sujata Khobragade, Mr. Avinash Dhole
Authors Affilation: RITEE Computer Science Engineering Raipur, RITEE Computer Science Engineering Raipur Chhattisgarh,India
Volume & Issue No.: Volume4Issue1
Abstract: The term parallel systems refer to the systems connected and work together in order to perform a task by isolating it into smaller task and managing them on individual systems connected together. In the history of computational world, sequential uni-processor computers have been exploited for years to solve scientific and business problems. To satisfy the demand of compute & data hungry applications, it was observed that better response time can be achieved only through parallelism. In this paper we are going to take a survey of parallel computing process along with their advantages, disadvantages and area of applicability for power optimization process.
S.No.: 224
Title : Evaluation E-Trust Factors of E-Transactions in the Context of E-Commerce
Authors Name: Issa Najafi
Authors Affilation: Quchan University of Advanced Technologies Engineering , Computer & IT Engineering Department Quchan , Khorasan Razavi , Iran
Volume & Issue No.: Volume4Issue1
Abstract: : Studying trust in online environment has especial importance for researchers, engineers, managers, economic investors. E-Commerce has recently been one of the new solutions in the efficiency function of business firms. Trust is a complex concept that has been studied by many disciplines, such as laws, business, political, sociology, psychology, among others. Therefore, in business, factors affecting the relationship between customers and vendors in trade either small or large scale, such as security, satisfaction, loyalty and trust must be examined in each form. In addition, the behaviors before purchase, during purchase, after the purchase are also different with each other in three forms of commercial transactions, and the topic of trust is brought up in a chain of trading processes. In other words, to assess the trust of the people or customers to any electronic trading system, we have to review and compare factors of trust and security in the chain of electronic business. Trust is a factor whose establishment is influenced by the type of the business, because the business type is actually the way of interaction between the two parties involved in exchange and its chain. The flow of information in any type of business has its diversity and difference. In this research, we investigate trust factors at electronic transactions in the context of e-commerce.
S.No.: 225
Title : A Survey on Different Existing Technique for Detection of Black Hole Attack in MANETs
Authors Name: Heta Changela, Amit Lathigara
Authors Affilation: 1PG Scholar, Computer Engineering, RK University Rajkot, Gujarat ,India
Volume & Issue No.: Volume4Issue1
Abstract: Mobile ad hoc network (MANET) is a continuously self-configuring, infrastructure-less network. In which mobile devices are connected directly without wires. Communication will occur between nodes directly or through intermediate nodes. The node is acting as a host and router both, it will communicate with each other through multi-hops due to limited transmission ranges. MANETs vulnerable to various attacks including Black Hole attack .The black hole attack is present at network layer. Black hole is an attack in which malicious node Incorrectly due itself as a valid node. It will receive the information and it will not forward the information to next nodes .This paper presents a review of various techniques used to detect and prevent the black hole attack in AODV routing protocol.
S.No.: 226
Title : Study of Detection and Prevention Technique for Flooding attack of AODV over MANET
Authors Name: Shruti Bhalodiya, Prof. Krunal Vaghela
Authors Affilation: 1PG Scholar, Computer Engineering, RK University Rajkot, Gujarat ,India
Volume & Issue No.: Volume4Issue1
Abstract: Mobile means moving and ad hoc means temporary without any fixed infrastructure. Hence, mobile ad hoc network is a temporary network in which nodes are moving without any fixed infrastructure or centralized administration. MANETs are vulnerable to security attacks because of the decentralized authentication. Black hole, gray hole, worm hole, Flooding are such type of security threats that affects the network. This paper presents a review on MANET, AODV routing protocol, flooding attack and comparison of various detection and prevention techniques of flooding attack. Among all this techniques, RFAP technique can easily find the attacker node and protect the network from RREQ flooding attack.
S.No.: 227
Title : Cooperative Gray Hole Attack Detection and Prevention Techniques in MANET: Review
Authors Name: Shani Makwana, Krunal Vaghela
Authors Affilation: 1PG Scholar, Computer Engineering, RK University Rajkot, Gujarat ,India
Volume & Issue No.: Volume4Issue1
Abstract: MANET (Mobile Ad Hoc Network) is a type of ad hoc network that can change locations and configure itself, because of moving of nodes. As MANETS are mobile in nature, they use wireless connections to connect various networks without infrastructure or any centralized administration. Open medium, dynamic topology, distributed cooperation are the characteristics of MANET and hence ad hoc networks are open to different types of security attacks. This paper represents a review of different techniques of Gray Hole Attack detection and prevention, using AODV Routing Protocol. All the techniques provide some advantage and disadvantage. Among all of these techniques, the credit based technique gives better performance in terms of end to end delay, throughput and packet delivery ratio. And the results can be improved in different cases under various scenarios like pause time, number of nodes and varying speed of nodes.
S.No.: 228
Title : Secure Authorized De-duplication Using Hybrid Cloud
Authors Name: Shilpa Giri
Authors Affilation: 1Department of Computer Engineering G.H Raisoni College of Engineering & Management, Pune
Volume & Issue No.: Volume4Issue1
Abstract: Data de-duplication is most widely used for eliminating data redundancy. Instead of saving the files having the same data, it stores single file thus reduces the memory space usage. In many organizations, their database contains the data de-duplication. For example, the different user saves the same file having the same data at different, different spaces. De-duplication eliminates these all extra copies by saving just one copy of the data and replacing the other all copies with pointers that lead back to the original copy. It is one of the compression techniques so that we can improve the bandwidth efficiency and storage utilization. Cloud contains no. of resources having no. of applications, software, and storage, so data redundancy may be there. So could computing uses Data De-duplication technique. It reduces the data management and storage problem. Data de-duplication protects the confidentiality of sensitive data. Data de-duplication uses convergent encryption technique to encrypt the data before uploading in the cloud. Companies frequently use de-duplication in backup and disaster recovery applications. Here we trying to use authorized de-duplication check, combine with convergent encryption for providing security to sensitive data using hybrid cloud computing.
S.No.: 229
Title : DESIGNING AND IMPLEMENTING OF ELECTRONIC HEALTH RECORD SYSTEM IN KSA USING SQL & ASP.NET
Authors Name: Samir Mahmoud A. Abdallah, Magdy Shayboub A. Mahmoud, Nasreldin M. El-Tayeb, Mohamed I. Abdel Magid
Authors Affilation: 1Computer Science Dept., Applied Medical Sciences College, Taif University, KSA.
Volume & Issue No.: Volume4Issue1
Abstract: Electronic health record (EHR) rapid progress for reporting electronic data storage that employs uniform data standards will enable health care organizations to respond more quickly to federal state, and private reporting requirements, including those that support patient safety and disease surveillance. An examination of many hospitals that recently implemented in King Saudi Arabia (KSA). A little of electronic health record (EHR) system finds that clinical and administrative leaders built EHR adoption into their strategic plans to integrate, inpatient and outpatient care system and a provide continuum of coordinated services. Using Relational Data Base Management Systems (RDBMS) with eXtend Marker Language (XML) Systems and ASP.NET as web based system. Successful implementation depended on: strong leadership, full involvement of clinical staff in design and implementation, mandatory staff training, and strict adherence to timeline and budget. The EHR systems facilitate patient safety and quality development through; use of checklists, alerts, and predictive tools embedded clinical guidelines that promote standardized, evidence-based practices electronic prescribing and test-ordering that reduces errors and redundancy and discrete data fields that foster use of performance dashboards and compliance reports. The proposed system will be developed using ASP.NET as a technology of web based system. In this paper; most of the services, enjoyed on the Web are provided by web database applications and using .net technology. Such as, Web-based email, online shopping, forums and bulletin boards, corporate web sites, and sports and news portals are all database-driven. The main goals in this work, building a modern web site of electronic health record system in KSA hospitals.
S.No.: 230
Title : ENHANCED ONE TO MANY DATA LINKAGE
Authors Name: RINTU GEORGE
Authors Affilation: SATHYABAMA UNIVERSITY, CHENNAI
Volume & Issue No.: Volume4Issue1
Abstract: The association of data items in the same or different databases is called as data linkage. In the conventional data linkage methodology it uses the linkage of entries of similar attribute types. So it is important to implement the associativity of data items to multivalued attribute types. For developing such a linkage a One Class Clustering tree is been used. In this tree, the key element from one data set is set as the root and the leaves consisting of best possible matches to it in another data set. To reduce such a vast matching nodes, the resulting tree is been splitted and the sub trees are generated. For this, the Maximum Likelihood Estimation (MLE) splitting criterion is performed. The output is a score representing the probability of match. If the score is greater than the predefined threshold it is considered as the best match. The proposed system is to implement the concept of data matching of multivalued attributes in the Tourist Recommender Domain.
S.No.: 231
Title : University examinations scheduling problem using genetic algorithms
Authors Name: AlirezaGoli-Hamid Mirhosseini
Authors Affilation: Isfahan University of Technology
Volume & Issue No.: Volume4Issue1
Abstract: Exam scheduling at universities and institutes of higher learning is known as an issue with heavy constrain so that it can contract at issue NP-COMPLETE. In many cases it is necessary to manually create exams timetable that it require much time and lacks quality so that in many cases , student complain of inappropriate examination timetable. In this situation finding the best manually is not an easy task. Studies have shown the use of evolutionary algorithms, which offers a good response time may not be optimal but the constraints is necessary for use to consider and provide us an acceptable exam timetable. In this paper, with using genetic algorithms with a completely random population and with changes in normal process of this algorithm, we try to solve the population and provide the best exam timetable in a short time.
S.No.: 232
Title : Recommendation system in Education field
Authors Name: Mr. Samir Pandarinath Gulave, Prof. Vikas Maral
Authors Affilation: M.E. Research scholar, Department of Computer Engineering KJ college of Engineering and Management Research Pune.
Volume & Issue No.: Volume4Issue1
Abstract: The big data is massive data in volume, velocity and variety. It is challenging to process such a data by using current technology. Data analysis is used in crucial organizational decisions. Due to vast use of internet technology data is generating in large volume and in variety of format (structured, semi-structured and unstructured). The main goal of this system is to provide effective support for decision making in big data environment. This system will help in achieving goals of educational institution. In the last decade online information has been grown rapidly which yields the big data analysis problem for service recommendation and suggestions. The recommender system provides valuable tools for providing proper recommendations to users. The recommendation and suggestion in the educational field is important because the huge data can be tracked on internet. The students will upload their resume on web application. The institution will analyze it to make effective decisions its huge data at institutional level. Old service recommender systems often suffer from scalability and inefficiency problems when processing or analyzing such large scale data. This problem can be solved by hadoop. This paper will suggest the content based system. For improving scalability and efficiency in data mining, this algorithm can be implemented on hadoop. It considers users preferences for optimizing result.
S.No.: 233
Title : AUTOMATIC NAMING OF DOMAIN SPECIFIC CLUSTERS FOR EFFICIENT SEARCHING
Authors Name: Anshika Nagpal, Mukesh Rawat
Authors Affilation: Deptt of CS,Meerut Institute Of Engineering and Technology, Meerut
Volume & Issue No.: Volume4Issue1
Abstract: This paper proposes a new and efficient methodology for clustering of html documents. The topic wise categorization of documents into different clusters makes searching easier and efficient. This technique can be utilized by search engines to provide relevant results to the user according to query and also utilized by online journal domains that are maintaining large set of documents. This paper suggests a good word matching and naming of automatic generated clusters , so, the time consume for finding the appropriate cluster for a document will be reduced. This paper shows the use of an efficient technique for finding the similarity between the documents and assigns them a proper cluster. The proper clustering of documents will be further utilized by multidocument summarization system, which produces a summary for the documents related to each other.
S.No.: 234
Title : Survey On A Methodology for Sensitive Attribute Discrimination Prevention In Data Mining
Authors Name: Naziya Tabassum Qazi , Prof. Ms.V.M.Deshmukh
Authors Affilation: Research Scholar,Department of Information Technology, Prof. Ram Meghe Institute Of Technology Research, Badnera Amravati.(M.S)
Volume & Issue No.: Volume4Issue1
Abstract: Today, Data mining is an increasingly important technology. It is a process of extracting useful knowledge from large collections of data. There are some negative view about data mining, among which potential privacy and potential discrimination. Discrimination means is the unequal or unfairly treating people on the basis of their specific belonging group. If the data sets are divided on the basis of sensitive attributes like gender, race, religion, etc., discriminatory decisions may ensue. For this reason, antidiscrimination laws for discrimination prevention have been introduced for data mining. Discrimination can be either direct or indirect. Direct discrimination occurs when decisions are made based on some sensitive attributes. It consists of rules or procedures that explicitly mention minority or disadvantaged groups based on sensitive discriminatory attributes related to group membership. Indirect discrimination occurs when decisions are made based on non sensitive attributes which are strongly related with biased sensitive ones. It consists of rules or procedures that, which is not explicitly mentioning discriminatory attributes, intentionally or unintentionally, could generate decisions about discrimination.
S.No.: 235
Title : “Review Paper on MICROCONTROLLER BASED IRRIGATION SYSTEM “
Authors Name: V R GOSAVI and Dr Anil K Deshmane
Authors Affilation: MIT AURANGABAD, BITS, Bharshi
Volume & Issue No.: Volume4Issue1
Abstract: Abstract--The objective of this paper is to propose a modeling of the renewable energy applications for agriculture sector. Modernization has reached the farming sector and we know that more than 70% of Indians directly depends on agriculture products while remaining are indirectly .But when we come across the real life problems of Indian farmers they are facing the current crises like load shading, higher electricity bill, uneven distribution of water in the farm, inefficient manpower, shock of higher voltage etc. In our system design the entire water delivery of the farm is managed by the micro-controller, which also includes some intelligent features and the whole system is operated on wind energy. Wind mill which lift the water from the well or bore as well as it generates the electricity which is the unique feature I embedded. The second most important factor is price, so this system uses very economical components, simple construction and maintenance.
S.No.: 236
Title : A Review on Various Approaches for Detection of Cyber Crimes via Instant Messaging Filters
Authors Name: Ankita M. Shendurkar, Prof. Nitin Chopde
Authors Affilation: PG Students, Department of Computer Science & Engineering, SGBAU, India
Volume & Issue No.: Volume4Issue1
Abstract: Instant messaging is popular and relatively new form of social interaction. Instant Messengers (IMs) and Social Networking Sites (SNS) may contain harmful and suspicious messages, which are untraced, leading to hindrance for network communication and cyber security. In this paper, we provided an introduction to various frameworks and review the details of different systems developed so far. Here we attempted to analysis various frameworks and classify them based on different factors, which leads to a better understanding on their operation. We also discuss the implementation details of these systems including the tools used by various authors and the metrics used to measure their performance.
S.No.: 237
Title : Application of Non-Linear ProgrammingOptimization Technique inPower Transformer Design
Authors Name: Omorogiuwa Eseosa O, Oboma, S. O
Authors Affilation: Department of Electrical and Electronic Engineering, #University of Port Harcourt, Choba, Nigeria
Volume & Issue No.: Volume4Issue1
Abstract: Due to huge number of power transformers yearly consumed and installed in the utility networks, it is always required and targeted to build transformers with the most reasonable cost. Achieving the guaranteed characteristics of transformers is an important factor that should be considered knowing that transformer design task is time consuming. In this work, a successful attempt for designing large size power transformer using non-linear programming (NLP) technique was presented. The mathematical transformer design formulation is explained in a systematic way for a typical power transformer. Optimization methodologies and implementation results were also presented. The results showed the effectiveness of the proposed mathematical formulation of transformer design problem and the reduction of total cost when compared to conventional designs.
S.No.: 238
Title : A Review of Intelligent Based Optimization Technique in Power Transformer Design
Authors Name: Ibe, A. O, Omorogiuwa Eseosa, O, Oboma, S. O
Authors Affilation: Department of Electrical and Electronic Engineering, #University of Port Harcourt, Choba, Nigeria
Volume & Issue No.: Volume4Issue1
Abstract: One of the major components of power system and its reliability is the transformer which serves as the heart of electrical transmission and distribution system. The voltage transformation of any transformer is dependent on the complexity of the design. However, with the fast-paced changing technologies in the power industry, new references addressing new technologies that satisfy constraints imposed on international standards, low weight, small size and good performances for economic viability are coming to the market. A current research of transformer design reveals the continued interest in the use of intelligent techniques for transformer design optimization. This paper gives a bibliographical study and general backgrounds of research and developments in the field of transformer design and optimization using intelligent based techniques for the past 42 years, based on over 100 published articles, 65 transformer books. The benefit of this work is to provide a reference point for educational development on recent published research in this field and stimulate further research interests and efforts in the respective topics.
S.No.: 239
Title : Secure data transfer through a combination of steganographic and cryptographic encryption technique
Authors Name: swasti saxena
Authors Affilation: SRM UNIVERSITY, KAttankulathur, India
Volume & Issue No.: Volume4Issue1
Abstract: Security for information has become a great concern in today’s internet era. Thus sending sensitive information from one end to another end via common communicating channel has become inevitable. Steganography has various useful applications and the technique employed depends on the requirements of the application to be designed for. For instance. applications may require absolute invisibility of the secret data, larger secret data to be hidden or high degree of robustness of the carrier. This paper aims at studying popular encryption techniques and their drawbacks due to which they could not be put to practical use along with a proposed method of successfully encrypting information both in image and text format combing their successful delivery to the destination using steganographic and cryptographic techniques of information encryption
S.No.: 240
Title : Survey on Student Location Tracking Using RFID-Based Tag
Authors Name: Ms. Apurva Ambarkhane, Asst. Prof. Vivek Kshisagar
Authors Affilation: 1 PG student Government College of Engineering Aurangabad, India
Volume & Issue No.: Volume4Issue1
Abstract: In recent years numerous researchers proposed different approaches for handling material and information flows within network. RFID is communication channel that is one of the most promising and challenging technology by which particular location can be marked. Application of present technologies, like Global Positioning Systems, active radio frequency identification, ultrasonic, cell of origin architecture and infrared, for finding location and control the resources. As a result, it is critical to develop a cost effective scheme to integrate the resource and information flow of network in which the visibility can be improved in order to the making the real-time decisions. The present system work in the indoor environment by utilizing the ultrahigh frequency (UHF) passive radio-frequency identification (RFID) tags. By the use of passive RFID technology, the object can be easily located with the help of readers and tag messaging.
S.No.: 241
Title : Design of low power CMOS 3-bit flash ADC Using 90nm technology
Authors Name: Dinesh Raju V
Authors Affilation: Rama Chandra College of engg & Tech
Volume & Issue No.: Volume4Issue1
Abstract: Design of low power CMOS 3-bit flash ADC Using 90nm technology
S.No.: 242
Title : Method for Extracting Subpart from UML Sequence Diagram
Authors Name: Vineet Richhariya , Alekh Dwivedi, Sneh Krishna
Authors Affilation: LNCT, Bhopal Madhya Pradesh, India
Volume & Issue No.: Volume4Issue1
Abstract: Software visualization is lone promising technique meant at helping developers and testers to recognize the performance of object-oriented systems successfully. However, it is still complex to understand this performance, because the size of involuntarily generated model diagrams tends to be ahead of the study capacity. In this paper, a novel methodology to simplify the problem of software visualization has been planned, that uses the concept of slicing UML diagrams and model based slicing technique.
S.No.: 243
Title : A Review on "Adaptive Propagation-Based color-Sampling for Image Matting"
Authors Name: Nilesh N. Chawande, Amit M. Sahu
Authors Affilation: G.H.R.C.E.M,Amravati
Volume & Issue No.: Volume4Issue1
Abstract: Image matting refers to the problem of accurate foreground extraction or estimation in an image and transparency determination of each pixel in an image whether it is foreground, background, or mixing parameter. Although different matting algorithms are proposed, most are not sufficiently strong to get satisfactory matting results in different regions of an image. Analyze the previous propagation-based approaches that use either local or non-local propagation methods, our propagation framework adaptively uses both local and nonlocal processes according to the detection results of the different regions in an image. Propose color-sampling method, which is based on the characteristics of the super-pixel, combined with propose color-sampling method, it can effectively handle different regions in an image and produced visually and quantitatively high-quality matting results.
S.No.: 244
Title : Smart Poster Advertisement using Near Field Communication
Authors Name: Deebika d
Authors Affilation: MNMJEC
Volume & Issue No.: Volume4Issue1
Abstract: The main objective of my project is to design Smart posters ,so that users with an NFC enabled mobile phone can simply tap to receive interactive content, download vouchers and promotions ,website link and text, loyalty programs and brand apps, links to join interactive games, product information, social media connections and more. This paper is designed with the intention to develop Smart posters, a next generation of poster, it still has the visual impact of a traditional poster that showcases your promotion but it also has an enhanced interactivity which connects the physical world to the virtual world. Using smart posters users by touching their nfc enabled phone against the poster they can be instantly redirected on their mobile phone to the advertising content. In addition ,the website promoting the smart poster is aimed at crafting sites to provide an optimal viewing experience i.e., responsive web design that changes display resolution of the website according to the user mobile.
S.No.: 245
Title : A Overview on Security in Internet of Things
Authors Name: Girish R.Talmale
Authors Affilation: G.H.Raisoni College of Engineering,Nagpur(MH) India
Volume & Issue No.: Volume4Issue1
Abstract: Abstract—Internet of Things (IoT) consists of several tiny devices connected together to form a collaborative computing environment. Recent advances in radio, network, mobile, and cloud technologies have supported the development of the first generation Internet of Things (IoT) services and products.The Paper focuses on the different issues which are related with Internet of Things(IOT) such as security, strong access control and authentication, configuration of massive amount of devices etc.
S.No.: 246
Title : Optimization of Location Management cost by mobility pattern
Authors Name: Dr.S.Thabasukannan, N.Shakeela
Authors Affilation: PRIST University
Volume & Issue No.: Volume4Issue1
Abstract: Now-a-days mobile plays a pivotal role for connecting the global matters with in the hold of our palm. The main factor which influences the availability of mobile system in the market is speed and portability. Hence the speedy retrieval is the tharaga manthra pronounced in the minds of mobile users. In the instant world, time is the major constraint for the user who relies on the performance. If the system contains intelligence the reliability level of the system also increases, otherwise it will go down even to the point of zero. In this paper, we proposed a new mobility management schemes based on mobility pattern to minimize the total cost and to balance the Location update and search Paging. The new system its main aim is to get the speedy retrieval by using mobility pattern.
S.No.: 247
Title : A Survey on Energy Balanced Clustering and Routing Protocol for Wireless Sensor Network
Authors Name: Pateel H S
Authors Affilation: BMSCE Bangalore Karnataka India 560018
Volume & Issue No.: Volume4Issue1
Abstract: Abstract—The Wireless Sensor Networks (WSN) consists of hundreds of sensor nodes which are resource constrained. WSN nodes monitor various physical and environmental conditions very cooperatively. WSN uses various nodes for the communication. WSN has become one of the interested areas in the field of research from last few years. To enhance the lifetime of the whole networks energy reduction is the necessary consideration for design and analyze of the clustering and routing protocols. In this paper we present a study of various protocols which are used to enhance energy efficiency of the WSN such as LEACH (Low Energy Adaptive Clustering hierarchy), HEED (Hybrid Energy-Efficient Distributed Clustering), and CEBCRA (Cost Based Energy Balanced Clustering and Routing Algorithm). Finally we conclude this paper with future research and challenges. Key words— Wireless Sensor Network; clustering; Network lifetime; Energy Efficient.
S.No.: 248
Title : Comparative Analysis of Clustering Protocols for Wireless Sensor Networks
Authors Name: Harpinder Kaur, Sandeep Wraich
Authors Affilation: Department of Computer Science Guru Nanak Dev University, Amritsar (Punjab)
Volume & Issue No.: Volume4Issue1
Abstract: Wireless Sensor networks include large amount of low power, low priced sensor nodes generally deployed in hostile and harsh environment to sense, collect and transmit data to sink at far distance. Clustering has been widely studied to enhance the lifetime of WSN by reducing the number packet transmission. In clustering, the nodes selected as cluster head, often suffer from high overload and thus consume more energy. Re-clustering is eventually performed to talk about the resource intensive cluster head role, which requires global time synchronization. To handle this problem, some recent research has been considered in the field of the wireless sensor networks. The overall objective is to judge the various limitations of the sooner techniques. This paper ends up with the suitable future directions to boost the existing protocol further.
S.No.: 249
Title : Prediction of Financial Performance Using Genetic Algorithm and Associative Rule Mining
Authors Name: Shruti Samant
Authors Affilation: Assistant Professor, Goa University
Volume & Issue No.: Volume4Issue1
Abstract: The proposed system introduces a new genetic algorithm for prediction of financial performance with input data sets from a financial domain. The goal is to produce a GA-based methodology for prediction of stock market performance along with an associative classifier from numerical data. This work restricts the numerical data to stock trading data. Stock trading data contains the quotes of stock market. From this information, many technical indicators can be extracted, and by investigating the relations between these indicators trading signals can discovered. Genetic algorithm is being used to generate all the optimized relations among the technical indicator and its value. Along with genetic algorithm association rule mining algorithm is used for generation of association rules among the various Technical Indicators. Associative rules are generated whose left side contains a set of trading signals, expressed by relations among the technical indicators, and whose right side indicates whether there is a positive ,negative or no change. The rules are being further given to the classification process which will be able to classify the new data making use of the previously generated rules. The proposed idea in the paper is to offer an efficient genetic algorithm in combination with the association rule mining algorithm which predicts stock market performance
S.No.: 250
Title : Survey Paper On Pipelining In IIR And FIR Filter
Authors Name: Tuhina Hiralal Dhuware,Varunesh Waman Nichante,Prof. Gouri Morankar
Authors Affilation: Ramdeobaba College Of Engg, and Management Nagpur-440013
Volume & Issue No.: Volume4Issue1
Abstract: Speed is chief interest in today’s era so digital filters can be designed using HDL languages. The speed of IIR and FIR filters can be increased using pipelining. Pipelining leads to the reduction in critical path which increases the speed and reduces the power consumption. In order to increase the speed of the whole system, speed of the individual block is increased. Speed and power are mainly focused parameters. Pipelining in IIR filter can be done by either clustered look ahead pipelining or by scattered look ahead pipelining with decomposition.
S.No.: 251
Title : Robust project scheduling model with resource constrained and solving it using particle swarm optimization
Authors Name: Mohammadhosein nabizadeh, Alireza shokri
Authors Affilation: Masters of Systems Engineering & Researcher of Systems Research Center Imam Hosein Comprehensive University
Volume & Issue No.: Volume4Issue1
Abstract: In the current situation, in spite of sanctions by Western countries, several solutions will be introduced to manage projects, so as to realize the resilience economy. The purpose of resilience economy is to neutralize of sanctions and pressures the sanctioning countries. One of these solutions in project management is increase project schedule robustness in uncertainty situation. So, more attention to the robustness of the project makes sense. In this paper, at first a real robust scheduling model for a refinery project has been presented and as the scheduling is constrained by resources including NP-Hard problem, the meta-heuristic particle swarm optimization were used. In order to validate the model, 4 small scale problems were selected and the solutions obtained from the proposed algorithm were compared with the exact solution obtained by Lingo software. The results show that the proposed algorithm are efficient and converge to the optimal solution
S.No.: 252
Title : Throughput Evaluation Of IPV4/IPV6 Networks
Authors Name: T.VENGATESH. M.C.A.,M.Phil.,Dr.S.THABASU KANNAN, M.Tech, Ph.D, MBA,
Authors Affilation: T.VENGATESH. M.C.A.,M.Phil., Research scholar, Research and Development Center, Bharathiar University, Coimbatore-641046, HOD, Dept of MCA, VPMM College of Arts and Science for women, Krishnankoil, Srivilliputtur Taluk,Virudhunagar Dt, Tamilnadu, India E-Mail: venkibiofinix@gmail.com; Mobile :9787021160, Dr.S.THABASU KANNAN, M.Tech, Ph.D, MBA, Principal, Pannai College of Engg& Tech, Sivagangai – 630 561, Tamilnadu, India E-Mail: thabasukannan@gmail.com, Mobile: 9944436258, 96000536699
Volume & Issue No.: Volume4Issue1
Abstract: The work presented in this paper is intended to introduce to both IPv4 and IPv6. This paper is a comprehensive guide to the evaluation of IPv6 from beginning to end and, therefore, it is meant for audiences of varying expertise from beginners to experts who wish to learn about the next generation internet protocol (IPv6), and have a clear unbiased performance overhead of the new internet protocol. As of October 2011, about 3% of domain names and 12% of the networks on the internet have IPv6 protocol support. Since 2009, the DNS can be used in IPv6 as major web sites like Google. IPv6 was first used in a major world event during the 2009 Summer Olympic Games. Finally, modern cellular telephone specifications mandate IPv6 operation and deprecate IPv4 as an optional capability. The paper its main aim is to perform an unbiased empirical performance analysis between the two protocol stacks (IPv4 and IPv6), and how it related to the performance on identical settings. Over the last decade, many fundamental changes have occurred in data communications and network infrastructure that will be shaping the future of IT for years to come. The Internet is now at the core of communications for worldwide economy and individuals. IPv4 is the basic building block of the Internet and has served well, but it has limitations that hinder its growth. The solution is IPv6, which addresses inherent problems of the earlier version. However, due to the increased overhead in IPv6 and its interaction with the operating system that hosts this communication protocol, there may be network performance issues. The overhead between the IPv4 and IPv6 should be directly proportional to the difference in the packet’s header size, however according to our findings, the empirical performance difference between IPv4 and IPv6 are taken into consideration. Here two OSs (W2K and Linux Ubuntu) are configured with the two versions of IP and empirically evaluated for performance difference. We first examine the performance of IPv4 and IPv6 independently. This is a necessary and crucial step for IPv6’s success since clear performance limitations and advantages should be well defined and agreed upon in advance. Here performance related metrics throughput is empirically measured on P2P test-bed implementation. The results show that network performance depends not only on IP version and traffic type, but also on the choice of the OS. Our empirical evaluation proved that IPv6 is not yet a mature enough technology. The performance of IPv6 in many cases proved to be worse than IPv4, incurring an overhead much higher than its anticipated theoretical counterpart.
S.No.: 253
Title : e-governance in rural india
Authors Name: Nidhi Srivastava
Authors Affilation: AMity University, Lucknow
Volume & Issue No.: Volume4Issue1
Abstract: In India, where a major population lives in rural area it becomes essential that e-governance is available there. ICT plays a key role in e-governance, and so it becomes essential that ICT reaches rural masses. This will lead to good governance which in turn will lead to better administration, better interaction, less corruption and more transparency in government. This paper deals with the challenges faced in implementing e-governance in rural areas of India, various e-governance projects taken by the Government and initiatives that should be taken by the Government for successful implementation of e-governance in rural India.
S.No.: 254
Title : SORCE: SECURITY OF I/O RESOURCES IN CLOUD STORAGE ENVIRONMENT FOR THIRD PARTY SERVICES
Authors Name: P.MURUGESAN and A.VEGI FERNANDO
Authors Affilation: 1M.E (Computer Science and Engineering) SCAD college of engineering and technology, Cheranmahadevi
Volume & Issue No.: Volume4Issue1
Abstract: The proceed paradigm of cloud computing, e.g., Amazon Elastic cipher Cloud (EC2), guarantees a extremely flexible however strong setting for large-scale perform. Ideally, whereas multiple virtual machines (VM) share an equivalent nature property each perform ought to be allot to associate degree severally managed VM and isolated from each other. Like that, the absence of natural isolation inevitably opens doors to variety of care threats. This demonstrate in EC2 a brand new variety of security vulnerability caused by competition between virtual I/O workloads - i.e., by investing the competition for shared resources associate degree individual may designed curtail the execution of a targeted application during a VM that shares an equivalent hardware. Specially, we have a tendency to specialise in I/O resources like hard-drive turnout and/or network information measure - that area unit essential for data-intensive applications .This model implement SORCE, a framework that uses a fastidiously designed tasks at hand to incur important delays on the driven perform and VM with minimum value.
S.No.: 255
Title : Performance Evaluation of Data Security in Computer Network Enterprise
Authors Name: Ohaneme, L.C., Ibiejugba, M.A. and Adejo, B.O
Authors Affilation: Department of Computer Science, Federal Polytechnic, Oko Anambra State
Volume & Issue No.: Volume4Issue1
Abstract: With the introduction of enterprise computer networks, the need arose for automated schemes for protecting files and other information transverse and stored on these networks. The generic name for the schemes designed to protect the network devices, data and to thwart hackers is computer security. While, various schemes for computer network security and network optimal performance have been proposed in literature, it was shown that by far the most important automated scheme for network and communications security is encryption. The essence of the encryption technique is mapping data to a domain in a manner that is sniffing-proof. Two major techniques used in encryption are symmetric and asymmetric encryption. This paper therefore deals with the analysis and evaluation of computer security in enterprise computer network using MTN, Airtel, Globacom and Support vendors. Research Design Methodology technique as well as perceptron algorithm are used to carry out a security survey for computer network evaluations in enterprise organizations. The result shown that the technique deployed enhance the evaluation of computer security in enterprise computer network.
S.No.: 256
Title : Performance Improvement In Adaptive Routing Strategy In Mobile Adhoc Network
Authors Name: SAMINA ANJUM, PROF SAPNA KHAPRE
Authors Affilation: G.H. RAISONI INSTITUTE OF ENGG. AND TECHNOLOGY FOR WOMENS
Volume & Issue No.: Volume4Issue1
Abstract: It has been a big challenge to develop a routing protocol that can meet different application needs and optimize routing paths according to the topology change in mobile adhoc networks. Based on their forwarding decisions only on the local topology, geographic routing protocols have drawn a lot of attention in recent years. In routing, nodes need to maintain up-to-date status of their immediate neighbors for making effective forwarding decisions. The periodic broadcasting of beacon packets that contain the geographical location coordinates of the nodes is a popular method used by most routing protocols to maintain neighbor status. Each node can determine and adjust the protocol parameter values independently according to different network environments, data traffic conditions and node’s own requirements. The project offers the Adaptive Status Update strategy for routing, which dynamically adjusts the frequency of status updates based on the mobility dynamics of the guests and the forwarding patterns in the network based on nodes whose movements are harder to predict update their status more frequently, and nodes closer to forwarding paths update their Status more frequently.
S.No.: 257
Title : Overview of the Algorithm used for the Enhancement in Detection and Determination of Duplicated Regions in Copy-Move Image Replica
Authors Name: kiran kumari,Surender Bilouhan Dubey
Authors Affilation: Technocrats Institute of Technology, Bhopal, India
Volume & Issue No.: Volume4Issue1
Abstract: In this paper we have studied the various techniques used to improve the key point localization and detection of duplicated regions in same image. These techniques create an enduring image by copying the certain potion of an image and pasting it to the different location of the same image. The key points in this image cloning are that the content is copied from the same image so the noise components, texture and patterns are compatible with the same image. The most important thing is the discovery of similar parts in the same image and then it becomes more complex to make clusters of those parts. We have presented Scale Invariant Feature Transform (SIFT) technique to determine the feature matches in the image.
S.No.: 258
Title : College Web Content Management System
Authors Name: BankarSandeep ,Doiphodepankaj,GunawareBapu,WaghmodeBarikrao, Prof. Nalawade V.S
Authors Affilation:
Volume & Issue No.: Volume4Issue1
Abstract: A Web content administration framework (WCMS or Web CMS) is content administration framework (CMS) programming, normally implemented as a Web application, for creating and managing web content. It is utilized to oversee and control an expansive, dynamic accumulation of Web material ( records and their related pictures). A WCMS encourages content creation, substance control, altering, and numerous fundamental Web upkeep capacities. Usually the software provides authoring (and other) tools designed to allow users with little or no knowledge of programming languages or markup languages to create and manage content with relative ease of use. Most systems use a database to store content, metadata, and/or artifacts that might be needed by the system. Content is frequently, but not universally, stored, to facilitate reuse and enable flexible presentation options. A presentation layer shows the substance to general Web-website guests .
S.No.: 259
Title : NON GPS NAVIGATION USING SIMULTANEOUS LOCALIZATION AND MAPPING IN UAV
Authors Name: Razeen Ridhwan.U, Aasish.C, Bharath Raj.S, MOHAMMED AZARUDEEN JAFFURULLAH3
Authors Affilation: Hindustan University and ADVETI
Volume & Issue No.: Volume4Issue1
Abstract: This project is solution for the task of autonomous navigation of a UAV through a completely unknown environment by using solely a single camera and inertial sensors onboard. Many existing solutions suffer from the problem of drift from the dependency on a clean GPS signal. The novelty in the here-presented approach is to use a monocular simultaneous localization and mapping (SLAM) framework to stabilize the vehicle in six degrees of freedom. This way, we overcome the problem of both the drift and the GPS dependency. The pose estimated by the visual SLAM algorithm is used in a linear optimal controller that allows us to perform all basic maneuvers Such as hovering, set point and trajectory following, vertical takeoff, and landing. All Calculations including SLAM and controller are running in real time and online while the UAV is flying. No offline processing or preprocessing is done. We will show real experiments that demonstrate that the vehicle can fly autonomously in an unknown and unstructured environment.
S.No.: 260
Title : ANDROID STUDENT RESULT ANALYSIS SYSTEM (APP DEVELOPMENT)
Authors Name: NIVETHA SHRI.M, DIVYA.R
Authors Affilation: Avinashilingam Institute for Home Science and Higher Education for Women
Volume & Issue No.: Volume4Issue1
Abstract: Android student result analysis system is software which is helpful for students as well as the colleges. In the system all the activities are done manually. It is very costly and time consuming. Our proposed system, students can analyse the result directly into the college server and views the mark using Android mobile. The data will be stored in the college server. When the internet connection is available, then the faculty can login into their college account and update the academic result.
S.No.: 261
Title : A Novel Mechanism For Handover Management in PCS Networks
Authors Name: Alyaa Abdou Hamza 1, Ahmed.I.Saleh 2, Mohamed sherif elkasas3
Authors Affilation: Mansoura University, Faculty of Engineering, Department of Computer Engineering And Systems
Volume & Issue No.: Volume4Issue1
Abstract: with the development technology of mobile communication, it is importance improvement the quality of service (QOS) in PCS networks by treating problems which appear in users’ movements. Handover (handoff) is one of process which effect on the quality of the call during users mobility from cell to another. in this paper, we propose a new mechanism to reduce handover problem by predicting the future movement of mobile users .this mechanism is composed of two system to cover all probabilities, first is Fuzzy Prediction Engine (FPE) is used when a mobile user has a history, it depend on 6 factors (GPS, Distance, Famous Places, Time, Date, User Profile) to predict future user mobility. Second is Ant Prediction Engine (APE) is used when a user has insufficient history or a new mobile user.it depend on neighbors’ history to predict future user mobility.
S.No.: 262
Title : Proficient System for Feature Subset Selection in High Dimensional Data
Authors Name: 1V.Thirumani Thanagm ME 2Dr.G.Tamil Pavai M.E., PhD 3P.senthil Kumari ME
Authors Affilation: Goernment College of Engineering
Volume & Issue No.: Volume4Issue1
Abstract: Feature selection is widely used in preparing high-dimensional data for effective data mining. Getting fast popularity in the social media dataset presents new challenges for feature selection. Web search media data consists of traditional high- dimensional, attribute-value data such as posts, tweets, comments, and images and linked data. The FAST algorithm applies to on data set and produces smaller subsets of features and also improves the accuracy. The FAST not only produces smaller subsets of features but also improves the performances of the process. Experimental results show that our FAST algorithm implementation can run faster and obtain better-extracted features than other methods.
S.No.: 263
Title : PERMIT ACCESS CONTROL OF DATA STORED IN CLOUD TO AUTHENTICATE USERS
Authors Name: VELAMPUDI ANUSHA
Authors Affilation: DADI INSTITUTE OF ENGINEERING AND TECHNOLOGY
Volume & Issue No.: Volume4Issue1
Abstract: This paper discuss about data stored in cloud and providing security to the data. Main aim of this paper is to permit accessing control of data to authenticate user. This will be done by secret key which is provided by administrator to authenticate user.If any anomaly user try to access he cant access the data.
S.No.: 264
Title : Enhancing the Performance of Transmission in Cloud Based Multimedia using Fault Tolerance Technique
Authors Name: Mr. K.Rengasamy , Mr. M.B Bose
Authors Affilation: M.Tech (CSE), PRIST University, Thanjavur.
Volume & Issue No.: Volume4Issue1
Abstract: An analyze to increase the speed of transmission , task arrival rate, response time, distribution probability of the response time Specifically the response time of the cloud base multimedia is structured and the fault tolerance in multimedia is analyzed thereby distribution probability is derived imposing the retrying tasks arrival rate are analyzed taking innumerable examples. Probability distribution of the response time is derived using metric that reflects in a better way the requirements of the customers. Analyze carried out on the percentage of response time that characterizes threshold response time. Inter relationship among the number of service resources, service rate ,system performance, task. were also analyzed Retrying for fault tolerance is compared with the check- pointing technique. In the competitive world of wireless communication and the growth of multimedia services like real-time conferencing, photo- sharing ,video-on- demand , editing, image search is on high demand for cloud computing. The slogan of access to serve billions of people those who use mobile and wireless transmission on any device, anytime, anywhere. The cloud computing emerged to facilitate the execution of complicated multimedia tasks and are able to store and process multimedia application and distribute them without any discrepancies thereby eliminating the complexity of software installation and maintenance in users devices.
S.No.: 265
Title : Query Confidentiality in Wireless Sensor Networks
Authors Name: Nawghare Pushpmala S.
Authors Affilation: ZESs DCOER Pune, Maharashtra.
Volume & Issue No.: Volume4Issue1
Abstract: Abstract: Wireless sensor networks processing sensitive data are facing the risks of data manipulation, data fraud and sensor destruction or replacement. This concerns applications such as the gathering of data on environmental pollution around industrial installations, or sensor systems replacing traditional video monitoring. Large-scale deployment in practice is conditioned by solving these kinds of security problem and reducing the risks due to limited physical protection of the devices and openness of the wireless communication channel. While modern cryptography and computer security offer many ways of solving these problems. In this paper we propose SafeProtocol to improve the strength of security, for wireless transaction which is designed using combination of both symmetric and asymmetric cryptographic techniques. This protocol provides three cryptographic primitives such as integrity, confidentiality and authentication. These three primitives can be achieved with the help of DES, and HMCA Message Digest MD5. That is it uses Data Encryption Standard (DES) for encryption, HMACMD5 for authentication and integrity.
S.No.: 266
Title : A Survey on Modular Approach to share Secure and efficient Streaming over Cloud
Authors Name: 1.Radha A.Mundhada 2.Sapna Khapre
Authors Affilation: G.H.R.I.E.T.E.WOMEN>NAGPUR
Volume & Issue No.: Volume4Issue1
Abstract: Over the past years, more traffic is increased due to different forms of video streaming and downloading by the mobile users in their day to day life. The user request for videos throught the mobiles through their corresponding wireless links, this wireless links capacity failed be corporate with the traffic demand. As diference between traffic demand and link capacity increases, with link conditions, result poor quality service and sending data on this channel result in long buffering time . Hence,a mobile video streaming architechture of cloud is proposed, which has two main parts: AMoV (adaptive mobile video streaming) and ESoV Over the past years, more traffic is increased due to different forms of video streaming and downloading by the mobile users in their day to day life. The user request for videos throught the mobiles through their corresponding wireless links, this wireless links capacity failed be corporate with the traffic demand. As diference between traffic demand and link capacity increases, with link conditions, result poor quality service and sending data on this channel result in long buffering time . Hence,a mobile video streaming architechture of cloud is proposed, which has two main parts: AMoV (adaptive mobile video streaming) and ESoV
S.No.: 267
Title : Literature Survey on Sign Language Recognition
Authors Name: Sandeep B. Patil
Authors Affilation: SSGI, SSTC, FET, Junwani, Bhilai.
Volume & Issue No.: Volume4Issue1
Abstract: Sign Language is a language which uses visually transmitted sign patterns to convey the information to the others. The different sign patterns are generated by various hand gesture based shapes, facial expressions, orientation and movement of arms, hands to express personal feelings. Sign Language is commonly develops for deaf communities that include family members, friends, and interpreter, as well as people who are deaf and hard hearing. Different sign languages used around the world are based on the cores of local deaf culture. In India, because of less awareness the development of Sign Language resources is still in its initial stages. This paper reports various literature and research contributions in this direction.
S.No.: 268
Title : Emendation of Undesirable Attack on Multiparty Data Sharing With Anonymous Id Assignment Using AIDA Algorithm
Authors Name: Rene Thomas, Sushitha Susan Joseph
Authors Affilation: Student, Department of CSE, Mar Baselios Christian College of Engineering and Technology, Kerala, India1 Assistant Professor, Department of CSE, Mar Baselios Christian College of Engineering and Technology, Kerala, India2
Volume & Issue No.: Volume4Issue1
Abstract: Security is a state of being free from danger or threat. When someone finds the vulnerabilities and loopholes in a system without permission means the system lacks its security. Wherever a secure data sharing occurs between multiparty there would be the possibility for undesirable attacks. In a variety of application domains such as patient medical records, military applications, social networking, electronic voting, business and personal applications there is a great significance of anonymity. Using this system we can store our data as groups and also encrypt it with encryption key. Only the privileged person can see the data. The secure computation function widely used is secure sum that allows parties to compute the sum of their individual inputs without mentioning the inputs to one another. This function helps to characterize the complexities of the secure multiparty computation. Another algorithm for sharing simple integer data on top of secure sum is built. The sharing algorithm will be used at each iteration of this algorithm for anonymous ID assignment (AIDA). By this algorithm and certain security measures it is possible to have a system which is free from undesirable attacks.
S.No.: 269
Title : Identification of Data Leakage and Detecting Guilty Agents Using Data Watcher
Authors Name: Navnath Kondalkar
Authors Affilation: M.M.I.T.Lohgaon,pune
Volume & Issue No.: Volume4Issue1
Abstract: Researchers have proposed several mechanisms to secure data from unauthorized use but there is very less work in the field of detecting and managing an authorized or trustworthy agent that has caused a data leak to some third party advertently or unknowingly. In this project, we implement methods aimed at improving the odds of detecting such leakages when a distributers sensitive data has been leaked by trustworthy agents and also to possibly identify the agent that leaked the data.We also implement some data allocation strategies that can improve the probability of identifying leakages and can also be used to assess the likelihood of a leak at a particular agent assuming the fact that the data was not simply guessed by the third party where the leaked data set has been found. We also propose new allocation strategies that work on the basis of SRF(Shortest Request First) algorithm.In this paper we implement a system called the Data Watcher for find out guilty agent .
S.No.: 270
Title : COMPUTING ALL THE REAL AND COMPLEX ROOTS OF POLYNOMIAL OF ‘N’ DEGREE WITH REAL COEFFICIENTS BASED UPON BAIRSTOW’S METHOD USING C PROGRAMMING.
Authors Name: Dipak Majhi
Authors Affilation: Kalyani Government Engineering College
Volume & Issue No.: Volume4Issue1
Abstract: — This program uses Bairstow’s method to find the real and complex roots of a polyomial with real coefficients. There are several reasons for developing a routine based Bairstow’s method. It is sometimes the case that all of the roots of a polynomial with real coefficients are desired. Bairstow’s method provides an iterative process for finding both the real and complex roots using only real arithmetic. Further, since it is based on Newton’s Method for a systemof two nonlinear equations in two unknowns, it has the rapid convergence property of Newton’s method for systems of equations. The major drawback of this method is that it sometimes fail to converge. This is because it is difficult to find an initial starting guess which satisfies the strict conditions necessary to assure convergence. When these conditions are not satisfied, the sequence of approximations may jump away from the desired roots or may iterate away from the roots indefinitely. The program obtains an initial approximation to two roots of the polynomial and uses these two roots to estimate initial starting values of the Bairstow interaction. These values are the coefficients r and s of an approximate quadratic factor x^2 + rx + s, of the given polynomial. The given polynomial will go through synthetic division by the quadratic function which will eventually give all the real or complex or both in pairs depending upon the degree of the polynomial.
S.No.: 271
Title : FACE ANALYSIS BY LOCAL DIRECTIONAL NUMBER PATTERN
Authors Name: MANJUNATHA S B, GURUPRASAD A M
Authors Affilation: COORG INSTITUTE OF TECHNOLOGY, PONNAMPET, COORG-DISTRICT, KARNATAKA, INDIA
Volume & Issue No.: Volume4Issue1
Abstract: In Face analysis, the Local directional number pattern method encodes the directional information of the face’s textures producing a more discriminative code than current methods. We compute the structure of each micro pattern with the support of a compass mask, that extracts directional information, and we encode such information using the prominent direction indices and sign, which allows us to distinguish among similar structural patterns that have different intensity transitions. Then we divide the face into several regions, and extracting the distribution of the LDN features from them. Then, concatenating these features into a feature vector, and we use it as a face descriptor. The descriptor performs consistently under noise, illumination, expression, and the time lapse variations.
S.No.: 272
Title : efficient validation and source aloofness in wireless sensor networks
Authors Name: g.s.priya
Authors Affilation: A.V.C.College Of Engineering
Volume & Issue No.: Volume4Issue1
Abstract: Message authentication is one of the most effective ways to thwart unauthorized and corrupted messages from being forwarded in wireless sensor networks (WSNs). For this reason, many key management techniques have been developed for message authentication, based on either symmetric-key cryptosystems or public-key cryptosystems. Most of the authentication schemes have the limitations of security, in addition to lack of scalability and resilience to node compromise attacks. To address these issues, a polynomial-based scheme was recently introduced. The polynomial schemes have the weekness to build in threshold value determined by the degree of the polynomial. In the proposed system, a scalable authentication scheme is SAMA based Modified Elgamal Signature (MES). It enabling intermediate nodes authentication and allows any node to transmit an unlimited number of messages without suffering the threshold problem. In addition this scheme can also provide message source privacy.
S.No.: 273
Title : ENTREPRENEURSHIP EDUCATION: A POTENT TOOL FOR ACHIEVING GOOD GOVERNANCE AND DIVIDENDS OF DEMOCRACY IN NIGERIA.
Authors Name: Oyerinola David Sunday , Bolaji, Ibrahim Akanbi , Ibrahim, Muraina Tunji
Authors Affilation: 1Economics Department, Kwara State College of Education, Oro, Nigeria.
Volume & Issue No.: Volume4Issue1
Abstract: The emergence of the need for entrepreneurship education in the mid 1990s has shed light on its roles as a catalyst for good governance and invariable a prominent key factor that can be used to achieve dividends of democracy. The paper applied descriptive and inferential statistical techniques. The target population comprised of 120 Students of Economics and Business Education Departments of three tertiary institutions in Kwara State. A questionnaire tagged entrepreneurship education questionnaire (EEQ) was used for data collection. Data was analyzed using chi-square statistical technique. The finding of the paper has shown that there is a significant relationship between vocational skills, financial knowledge, good governance and actualization of dividends of democracy. However, the paper concluded that generation of massive employment and eradication of poverty which is indices of good governance and the dividends of democracy are achievable through the infusion of teaching and learning of entrepreneurship education into the tertiary institutions’ curricula.
S.No.: 274
Title : SECURITY ISSUES IN CLOUD AND TRENDS IN CLOUD COMPUTING IN 2015-2016
Authors Name: Asst prof G.S.Raghavendra, Asst prof D.R.N.S.Lakshmi,Asst prof B.Rajkumar
Authors Affilation: RVR & JC College of Engineering., Guntur
Volume & Issue No.: Volume4Issue1
Abstract: Cloud computing is an emerging technological solution that provides a robust and scalable information technology infrastructure to enable business agility. Cloud computing offers, continuous availability, and low cost services as major benefits, but as with most new technologies, it introduces new risks and vulnerabilities too. There are different vulnerabilities in cloud computing and various threats to cloud computing. The main obstacle which was stopping the growth of this Technology is security. In this paper importance of cloud and various types of security attacks, solutions that providers developed, cases studies and cloud computing trends in 2015-16 are presented.
S.No.: 275
Title : PSBS: Preference &Sensor Based Search For Smartphone Users
Authors Name: Bobby Jasuja
Authors Affilation: Medicaps Institute of Science and Technology,Indore, India
Volume & Issue No.: Volume4Issue1
Abstract: Mobile search is a developing branch for data retrieval and analysis,centered on the use of mobile platforms.Compared to web based search there is huge scope of advancement in mobile based search through the use of sensors like GPS.They helps in generating more user specific and relevant results.Preference and Sensor based mobile search (PSBS) takes into account users’ choice by analyzing their past history data..It also takes into account location based search through the use of GPS. GPS gives the accurate latitude and longitude location of smartphone over the entire globe.PSBS groups these detail into two parts-past data history(content based preference) and location based preference.The user choice are arranged in an ontology-based fashion.This arrangement is used to obtain a preferential ranking function for ranking of future search results.To recognize the diversity of the results returned through a query and their impact on the user’s need,proportion ratio is calculated to balance the retrieved results between the location and content factor.In our architecture, the client’ smartphone locally stores the historical data to protect privacy concerns,whereas heavy tasks such as data extraction,analyses and training and re-organizing of retrieved results are performed at the PSBS server.
S.No.: 276
Title : A Survey on Automatic MRI Brain Tumor Image Segmentation
Authors Name: Sugandha Singh, S. P. Tripathi
Authors Affilation: 1Department of Computer Science and Engineering Institute of Engineering & Technology, UPTU, Lucknow, 226021 2Head of Department, IET, Lucknow, India.
Volume & Issue No.: Volume4Issue1
Abstract: This paper presents effectiveness of biomedical imaging & medical image processing. Brain tumor segmentation consists of separating the different tumor tissues from normal brain tissues. In the brain tumor studies, the existence of abnormal tissues may be easily detectable most of the time. In the past, many researchers in the field of medical imaging and soft computing have made significant survey in the field of brain tumor segmentation MRI is a non-invasive imaging technology that produces three dimensional detailed anatomical images without the use of damaging radiation. Brain tumor or intracranial neoplasm occurs when abnormal cells form within the brain. This article presents an overview of the most relevant brain tumor segmentation methods, conducted after the acquisition of the image. Given the advantages of magnetic resonance imaging over other diagnostic imaging, this survey is focused on MRI brain tumor segmentation.
S.No.: 277
Title : Rainfall prediction in Nigeria using Artificial Neural Networks
Authors Name: Ewona, I. O., Osang, J. E., and Udo, S. O
Authors Affilation: 1Department of Physics, Cross River University of Technology, Calabar, Nigeria
Volume & Issue No.: Volume4Issue1
Abstract: Rainfall data from the Nigerian Meteorological Agency, Oshodi, Lagos collected over thirty (30) years and from twenty three weather measuring stations spread across Nigeria have been used for the study. By applying stochastic and data reduction procedures the data was filtered to fast track the actual variables to be used for modeling rainfall. There were a total of 360 monthly mean data points for each station. The first 300 data points representing 25 years were used for training the network. The remaining 60 data points representing 5 years were used to cross validate the model. Each set of data was trained for 5 different sets of epochs. The number of epochs was chosen at intervals of about 500, 1000, 1500 2000 and 3000 epochs. By varying the weights and learning cycles, 5 different sets of predicted values were obtained. The predicted values were then correlated with actual values for corresponding periods. We obtained correlation coefficients between measured and predicted values up to 0.80 with an average value of 0.56. Compared on latitudinal basis, the coefficients were in ascending order from south to North. This means that the predictability of rainfall using Neuro Xl was better at higher latitudes.
S.No.: 278
Title : AN EMPIRICAL STUDY OF WIND ENERGY POTENTIAL IN CALABAR, CROSS RIVER STATE, NIGERIA
Authors Name: Osang, J. E., Egor, A. O., Emeruwa, C., Alozie, S. I., Udonsa, E. P.
Authors Affilation: 1Department of Physics, Cross River University of Technology, Calabar, Nigeria
Volume & Issue No.: Volume4Issue1
Abstract: This paper focuses on wind energy potentials in Calabar – a coastal city. The wind speed data were collected from Margaret Ekpo International Airport, Calabar (NIMET). The Objective of this study is to examine whether the wind energy in Calabar can generate sufficient energy to supplement electricity generation for the Calabar region. The primary data obtained is monthly mean in the form of wind speed for a period of 5year (2008 - 2012). These was used to estimate the available wind energy potential in calabar. The results show that, the annual wind is 1.3 m/s indicating Calabar as a low wind speed region. The wind power density value of 3.11W/m2 indicates that Calabar wind can only be used for small stand-alone wind power systems, such as battery charging and for powering street light and water pumps (fig 4.1, 4.2, 4.3 & 4.4). The weibull probability distribution scale parameters (k) are higher in values and variability than the shape parameter (c) for the monthly distribution. Calabar wind cannot be used to generate electricity because the wind speed data at 10m height doesn’t exceed 2.5m/s due to the standard cut in speed.
S.No.: 279
Title : Combing Ability and Genetic Distance Measured from Molecular Markers to Predict Heterosis and F1 performance in Ethiopian Mustard (Brassica carinata A. Braun)
Authors Name: Wassu Mohammed, D.P. Pant, Chander Mohan and Mohan Arif Khan
Authors Affilation: Haramaya University, School of Plant Science, P.O.Box 219, Dire Dawa, Ethiopia
Volume & Issue No.: Volume4Issue1
Abstract: This study was conducted at G.B. Pant University of Agriculture and Technology in India to determine the association of genetic distances of seven Brassica carinata A. Braun varieties measured by random amplified polymorphic DNA (RAPD) markers, heterosis, F1 performance and general combining ability (GCA) and to compare GCA and genetic distance in predicting heterosis and F1 performance. Seven Brassica carinata lines and their 21 F1s generated in half diallel fashion were evaluated in a replicated field trail for two years (2009/10 and 2010/11) and heterosis, F1 performance and GCA were calculated on the basis of the mean of two years for 13 traits. Correlation was computed to asses the association among genetic distance, heterosis, GCA and F1 performance. Genetic distances among the parents were calculated from 95 random amplified polymorphic DNA (RAPD) markers and dendrogram constructed using Unweighted Pair Group Method with Arithmetic Means (UPGMA) method efficiently grouped parental lines in to three major clusters. However, the measured genetic distance was significantly correlated with parental GCA sum only for plant height (r=0.6) and percent oil content (r=0.55), while the correlation with mid parent heterosis and F1 performance was non-significant for all traits. On the other hand, correlation of GCA and F1 performance (r=0.26 to 0.91) was positive and significant for most of the traits. GCA was significantly correlated with mid-parent heterosis for days to 90% maturity (r=0.68), length of main shoot(r=0.64) and number of secondary branches(r=0.41) and the correlation was positive (r=0.08 to 0.38) for other five traits. Correlation of parents GCA effect and their performance was positive (r=0.49 to 0.99) for all traits and significant in most cases. This study revealed that molecular marker based distances was a reliable prediction of heterosis, combining ability and F1 performance rather GCA is better in predicting heterosis, parental lines and F1 performance in Brassica carinata A. Braun.
S.No.: 280
Title : Variability and Associations of Yield and Yield Related Traits in 7 x 7 Diallel Cross of Ethiopian mustard (Brassica carinata A. Braun)
Authors Name: Wassu Mohammed Ali
Authors Affilation: Haramaya University, School of Plant Science, P.O.Box 219, Dire Dawa, Ethiopia
Volume & Issue No.: Volume4Issue1
Abstract: This study was conducted to determine heritability, genetic advance, phenotypic and genotypic correlations as well as genetic variability for yield and yield related traits of 28 parents and hybrids of Brassica carinata A. Braun. Analysis of variance of 14 traits data showed significant variation among the genotypes. Days to 50% flowering, length of main shoot, number of primary and secondary branches, number of pods per plant, seed yield per plant and biological yield showed high to moderate heritability (31.76 to 91.29%) as well as expected genetic gain (22.40 to 41.49%). These traits also showed high to moderate phenotypic (17.75 to 39.94) and genotypic coefficient of variation (14.63 to 27.51) and the gap between the two values were narrow. These results suggested the less influence of environment in the inheritance of these traits and the possibility of improving these traits through selection. Positive and very strong genotypic correlations were estimated between seed yield per plant with biological yield, number of primary, number of pods per plant, secondary branches, harvest index and plant height ranged from 0.44 to 0.80, as well as between oil content with plant height, number of primary branches, days to flowering and maturity with coefficient values of 0.39 and 0.40. For these traits, phenotypic correlation values were in the same direction of genotypic correlation and in most case genotypic correlation values were higher than phenotypic correlations. This indicates that simultaneous selections of the traits would be an effective way to improve the two most important economic traits.
S.No.: 281
Title : GMINESYS: Efficient approach to reduce storage area using LZW compression
Authors Name: Ulka A. Panchal, Prof. Vina M. Lomte
Authors Affilation: RMD-Sinhgad School of Engineering, Savitribai Phule Pune University Warje-Pune, Maharashtra, India
Volume & Issue No.: Volume4Issue1
Abstract: Now days there are several graph visualization tools exist to represent the graph. However, they are not able to handle large graphs, and/or they do not allow interaction. We are interested on large graphs, with hundreds of thousands of nodes. Such graphs bring two challenges: the first one is that any straightforward interactive manipulation will be prohibitively slow. The second one is sensory overload: even if we could plot and replot the graph quickly, the user would be overwhelmed with the vast volume of information because the screen would be too cluttered as nodes and edges overlap each other. Our GMine system addresses both these issues, by using summarization and multi-resolution. GMine offers multi-resolution graph exploration by partitioning a given graph into a hierarchy of communities-within-communities and storing it into a novel R-tree-like structure which we name G-Tree. GMine offers summarization by implementing an innovative subgraph extraction algorithm and then visualizing its output. Storage and processing of large data of the large graph is an significant challenge so by using LZW compression technique we can reduce the storage area required to store the huge data of the sparse graph without occurring the data loss.
S.No.: 282
Title : Enhancing Routing Techniques to Trace Efficient Transfer Links in Network: A review
Authors Name: Kavita Kalambe, Hemlata Dakhore
Authors Affilation: M-tech / Computer Science and Engineering Department R.T.M.N.U. Nagpur, 440009, India
Volume & Issue No.: Volume4Issue1
Abstract: The use of real-time applications over wired or wireless networks force on service providers to operate breaches-free networks. Modern routing techniques need to maintain a very high level of service availability, manageability and acceptability. In case of physical structure of network changes such as addition or removal of router, or any link or router failure then whole network will be going into convergence (recover from failure) phase, this may lead to forwarding loops in networks. Also network congestion may occur due to offered traffic on that link. These leads to loop instability, service unavailability, reducing the frequency at which operators can adapt the network topology. In this paper we presents a survey of various routing techniques to trace fast and reliable shortest path from source to destination without losing the packets. We presents an algorithm progressively shifts of the traffic flows in or out of the updated router. In case of any link failure or traffic on that link, we use rerouting algorithm to choose any other alternative route to reach destination avoiding transient forwarding loops also network congestion. This will increase throughput and network latency. The evaluation of our implementation also reveals that these shortest path can be computed in a minimum time.
S.No.: 283
Title : DEFINING SAAS FEATURES FOR SELECTION OF AN APPROPRIATE SOFTWARE AS A SERVICE PROVIDER
Authors Name: Mamta Dadhich, Prof. (Dr.) V.S. Rathore
Authors Affilation: Research Scholar, THE IIS UNIVERSITY, Jaipur
Volume & Issue No.: Volume4Issue1
Abstract: Software as a service (SAAS) is a software delivery model in which the software is hosted by someone else’s system and delivered via web, on customer’s demand and pay as they use. These days, number of service providers is available to ensure that they select the most appropriate SaaS product as per their needs. In this paper we will define Software as a service (SAAS) features to select an appropriate Software as a service provider.
S.No.: 284
Title : Adaptive Learning using Data Mining Techniques
Authors Name: Dhaval Doshi, Nikhil Tiwari, Himey Jain
Authors Affilation: Medicaps Institute of Science and Technology
Volume & Issue No.: Volume4Issue1
Abstract: E-learning is defined as a Virtual Learning Environment (VLE) which provides resources for interaction between students and teachers. The latest advancement in the field of Information Technology and enhanced use of internet has facilitated tremendous proliferation towards usage of E-learning. It provides a new way of distributing information with better efficiency and lesser cost by clustering similar resources into groups of meaningful data using data mining algorithms. One of the recent advancement in e-learning is adaptive e-learning. This type of learning provides the content to the users according to their current level of learning. The learning abstraction system consists of huge amount of data so there is a requirement of some specific way to retrieve useful data with speed and ease. The traditional approach does not take into account the fact that the mental level of the learners varies significantly from person to person. Consequently it would be unfair if every learner gets access to similar kind of data. Adaptive E-learning is a concept which provides content dynamically to users according to their mental level by employing data mining technique.We propose the use of k-means algorithm for implementing adoptive learning.
S.No.: 285
Title : Comparative Analysis of Demultiplexer using Different Logic Styles
Authors Name: ABDHESH KUMAR JHA, ANSHUL JAIN
Authors Affilation: SHRI RAM COLLEGE OF ENGINEERING & MANAGEMENT BANMORE, MORENA (M.P.)
Volume & Issue No.: Volume4Issue2
Abstract: Low power and high speed digital circuits are basic needs for any of digital circuit; De-multiplexer is a basic circuit for any digital circuit. In this paper de-multiplexer has been designed using CMOS, transmission gate pseudo nmos logic. The performance of designs has been compared in terms of power consumption, delay and transistor counts. The proposed design demonstrates the superiority in terms of power dissipation, delay and transistor counts, compared with existing 1:4 de-multiplexer and comparative analysis on 90nm and 45nm technology. The schematic of developed de-multiplexer has been designed and simulated using Tanner EDA tool.
S.No.: 286
Title : Multiple File Reader with Doc Editor
Authors Name: Mayuri Moharkar,Raunak Sirsat,Rahul Khedekar
Authors Affilation: Rajendra Mane College of Engineering and Technology,Ambav, Devrukh
Volume & Issue No.: Volume4Issue2
Abstract: At present to view different documents, a user has to install multiple application related to it. If a user wants to view a word document then there should be MS Office installed on his/her PC. In addition, to view PDF file, there must be Adobe PDF Reader installed. Now just for viewing all these files, installing these many applications would be hectic and cumbersome as it utilizes many PC resources like hard disk space, CPU utilization etc. In addition, if a user subscribed to a licensed copy of this software/application than there is large cost involved in it. In addition, if a user had many files opened related to different applications then the taskbar would be filled up with many windows open in it. Multiple file reader with doc editor (MFRDE), can be used to view different types of documents. It is an integration of different applications like Notepad, MS Word, PPT, Adobe PDF Reader, Web Browser, Image Viewer and Media Player in to one single application. It overcomes the hurdle of installing separate application for different files. The main objective of MFRDE is that it can open almost all the types of documents and multimedia files under it. The tabbed feature allows you to open different files retaining or without closing the previous one Doc Editor will have all the basic features of a Text Editor. In addition it will have many additional innovative features like word prediction, auto word completion, inbuilt mail facility, multiple file reader.This
S.No.: 287
Title : LOW POWER DIGITAL PULSE CONTROLLER USING FOOTER METHOD
Authors Name: M.Vivek kumar,sS.Rathimeena,S.Sarmila,Anila ramachandran
Authors Affilation: Anna university/Sri Eshwar college of Engineering
Volume & Issue No.: Volume4Issue2
Abstract: Abstract- A digitally controlled pulse width modulator (PWM) targeting on-chip power management applications is proposed in this paper. A current starved ring oscillator, with digitally controlled current source based headers and footers, is used to provide a versatile duty cycle and an accurate frequency control.The proposed circuit achieves i) a controlled duty cycle that can vary between 20% and 90% and ii) a compensation circuit that guarantees a constant duty cycle under process, voltage, and temperature (PVT) variations. A fast response time of 5 ns – 20ns with a fine duty cycle granularity has been achieved through the proposed control techniques. The circuit operates at a frequency range of 500 MHz – 1.66 GHz and is implemented with a 22 nm CMOS predictive technology model.
S.No.: 288
Title : Comparison of Hybrid TCP Congestion Control for High-Speed Networks by a new Evaluation index called Stability Index (SI)
Authors Name: shahram jamlai, mir mahmoud talebi
Authors Affilation: Department of Computer Engineering, Germi branch, Islamic Azad University, Germi, Iran
Volume & Issue No.: Volume4Issue2
Abstract: In recent years, the majority of internet users use the Transmission Control Protocol (TCP) for fast transfer of big data over networks, and improvement of the TCP congestion control algorithm is an ideal solution to this challenge. In the last decade, many solutions; based on packet loss, based on RTT delay and the hybrid methods is presented, past research results show that the hybrid approaches have better efficiency of available bandwidth, more robustness , and better performance in Fairness, TCP-friendly. Several hybrid algorithms is presented for congestion control in high-speed networks. This paper emphasizes on the study of the behavior of these protocols for a range of parameters under heterogeneous networking environments, and also under various network conditions. We tried to analysis the strengths and weaknesses suggested hybrid protocol solutions for high-speed networks as a special study with uses a new evaluation index called Stability Index (SI).
S.No.: 289
Title : DYNAMIC MESSAGE AUTHENTICATION CODE FOR SHORT MESSAGES
Authors Name: D GANESH
Authors Affilation: SREE VIDYANIKETHAN ENGINEERING COLLEGE
Volume & Issue No.: Volume4Issue2
Abstract: There is an increase of technology in every field, many applications rely on the existence of small devices that can exchange information and form communication networks. Short messages are widely in use these days. So many applications rely on the existence of small devices for communication. Here the confidentiality and the integrity play a major role. So we propose two techniques. In the first technique we authenticate the message and encrypt it with a short random string. In the second technique the extra assumptions are made whether the algorithm used is a block cipher and also improve them. MACs provide integrity for messages. Without taking it as an advantage the message must be checked whether it is encrypted or not. The main goal is to utilize the security that the algorithm can provide to design more efficient authentication mechanism.
S.No.: 290
Title : PERFORMANCE ANALYSIS OF CLASSIFIERS FOR THE PREEMINENT CONCEPT LABELING
Authors Name: 1Ms.C.THAVAMANI, 2 DR.A.RENGARAJAN,
Authors Affilation: WOMENS CHRISTIAN COLLEGE, CHENNAI
Volume & Issue No.: Volume4Issue2
Abstract: Abstract The rapid construction of supervised text classification models is becoming a pervasive need across many modern applications. To reduce human-labeling bottlenecks, many new statistical paradigms have been vigorously pursued in recent literature with varying degrees of empirical success. In this paper we propose a new framework to extract supervisory information from such ontologies and complement it with a shift in human effort from direct labeling of examples in the domain of interest to the much more efficient identification of concept-class associations. In this paper, we propose an efficient method in concept labeling by using classification method. The classifiers we use are Naïve Bayes, Decision Tree, and k-Nearest Neighbor. Our experiments how that Decision Tree has the fastest classification time followed by Naïve Bayes and k-Nearest Neighbor. The differences between classification time of Decision Tree and Naïve Bayes also between Naïve Bayes and k-NN are about an order of magnitude. Based on Precision, Recall, F-measure, Accuracy, and AUC, the performance of Naïve Bayes is the best. It outperforms Decision Tree and k-Nearest Neighbor on all parameters but precision.
S.No.: 291
Title : Survey on Secure Mining of Association Rule in Distributed Databases
Authors Name: Pankaj P. Joshi
Authors Affilation: MIT Academy of Engineering
Volume & Issue No.: Volume4Issue2
Abstract: Discovering frequent item sets is a needful amongest the most fields of data mining. Numerous current data mining tasks can be fulfilled effectively just in a distributed setting. The field of distributed data mining has consequently increased expanding significance in the last decade. Mining frequent itemsets in data streams is an essential task in stream data mining. In this paper, we have taken a review on securing rules in transaction databases. Proficient algorithms for mining frequent itemsets are critical for mining association rules and additionally for numerous other task of data mining. Techniques for mining frequent itemsets have been executed utilizing a Bit Table structure. Apriori Algorithm is the most prevalent and valuable algorithm of Association Rule Mining of Data Mining. As Association rule of data mining is utilized as a part of all utilizations of business and industry. The main objective of taking Apriori is to discover the frequent itemsets and to reveal the hidden data. Various methods are used for solving the problem of securing mining of association rules. In the previous study, it has been shown the issue of finding association rules between items in an expansive database. New algorithms used for tackling this issue that are in a far-reaching way different from the known algorithms. Study result demonstrates that these algorithms beat the known algorithms by components ranging from various little issues to more than a request of magnitude for huge issues.
S.No.: 292
Title : Online Network Security Using CaRP
Authors Name: Ashvini P. Patil, Manju R. Patil, Nilima R. Barhate, Priyanka Y. Patil, Prashant C. Harne
Authors Affilation: SSBT COET, Bambhori, Jalgaon (NMU), MS, India .
Volume & Issue No.: Volume4Issue2
Abstract: Today, there is cut throat competition in Network Security and is major issue in Computer world also several security parameters are based on hard mathematical problems are available to tackle this problem. So many researchers trying to solve this problem from last decades. Using hard AI problems for security is up-and-coming as an exciting new concept so we have to show keen interest in this domain. Hence, in this paper, we are introducing better security parameters based on hard AI problems, explicitly, a novel family of graphical password systems built on top of Captcha technology, which we are proposing Captcha and Graphical Passwords (CaRP). CaRP is both a Captcha and a graphical password system. CaRP sort some security problems, such as online guessing attacks, relay attacks and shoulder-surfing attacks. Especially, a CaRP password can be establish only probabilistically by automatic online guessing attacks even if the password is in the search position. CaRP also offers a novel approach to address the well-known image hotspot problem in popular graphical password systems, such as PassPoints that often leads to less password choices. CaRP is not a universal solution but it offers reasonable security and usability and it may use few practical applications for getting better online security such as banking, railway reservation etc.
S.No.: 293
Title : Review paper on Authentication Key Exchange by Using Privacy Preserving over the Internet
Authors Name: Priyanka Wankhade and Dinesh Datar
Authors Affilation: CBS college of Engineering and Management Amravati.
Volume & Issue No.: Volume4Issue2
Abstract: Because of advances in technology and communication, it requires more hard facility to ensure security and privacy in communication network. There is very high need for every organization has the right level of security. In recent communication systems, as there is most use of Internet, the security services have become essential. Authentication in security had emerged to be an essential factor in the key establishment over Internet. It seems that recently Yang et.al propose provably secure 3PAKA protocol for secure exchange and similarly Key-exchange in Diffie–Hellman key-exchange (DHKE) is the valuable cryptographic mechanisms to ensure network security .The DIKE (Deniable Internet Key Exchange) was the family of privacy preserving authenticated DHKE protocol, both in the traditional PKI setting and in the identity based setting. There are lots of mechanism are provided for key exchange mechanism in recent year as given, but these mechanism only secure the message or key which is share by both trusted party over the Internet, but if the intruder authenticate the message which is send by the sender and when that message will receive by receiver without knowing that this message is already accessed by the intruder then what? There will be no use of that accessed message or key. So in this project there is a database in which the key sent by sender to receiver will be stored already, so that when receiver receives the valid key only that key will match with the key which is stored in the database and the message or the document which is sent by sender can be accessed by the receiver ,as well as if the intruder knows the secret key then also he cannot accessed the message For that, the concept of Internet key exchange(IKE), and REA Algorithm are used. Keyword: Authentication, DHKE, REA, Database.
S.No.: 294
Title : A SURVEY ON SORT RANGE COMMUNICATION
Authors Name: Mohit Rathore
Authors Affilation: Shri dadaji institute of technology and science khandwa
Volume & Issue No.: Volume4Issue2
Abstract: Abstract—wireless sensor network are becomes more popular now in these days due to their adoptability in indoor as well as outdoor communication systems. In this presented paper provides the detailed description about the WSN network and their relative application, in addition of that this paper provide the previously made efforts on routing in WSN networks. Routing is working as backbone for any communication network thus data in a network travels on the basis of routing guidelines, this paper provide the information of routing techniques that are supportable with WSN network and also we provide the future proposed work under optimization of routing path discovery.
S.No.: 295
Title : AUTOMATED ESSAY SCORING SYSTEM
Authors Name: AMRUTHA JOSEPH,ANNA MARIA JOSE,DEEPTHY JOSHY,TRESSA MARY JAMES
Authors Affilation: AMAL JYOTHI COLLEGE OF ENGINEERING,KANJIRAPPALLY,KERALA
Volume & Issue No.: Volume4Issue2
Abstract: Automated Essay Scoring System, reduces the burdens of the scoring process. To implement the system, we extract several features, including the surface features such as the number of words in the essay, filtration, stemming and assigning weight age to the keywords based on the three reference documents which contain the answer keys.
S.No.: 296
Title : Hadoop Architecture and its functionality
Authors Name: Mr. V Padmakar, Dr. B V Ramana Murthy
Authors Affilation: Department of CSE, Department of CSE Guru Nanak Institutions Jyotishmathi College of Technology, Technical Campus, Hyderabad
Volume & Issue No.: Volume4Issue2
Abstract: Hadoop is nothing but a framework of tools and it is a java based programming framework (In simple terms it is not software). The main target of hadoop is to process the large data sets into smaller distributed computing. It is part of the Apache project sponsored by the Apache Software Foundation. As we observe in database management system, all the data are stored in organized form by following the rules like normalization , generalizations etc., and hadoop do not bother about the DBMS features as it stores large amount of data in servers. We are studying about Hadoop architecture and how big data is stored in servers by using this tools and the functionalities of Map Reduce and HDFS (Hadoop File System).
S.No.: 297
Title : Shadow Detection Using Object Oriented Segmentation, Its Analysis And Removal From High Resolution Remote Sensing Images
Authors Name: Anju J
Authors Affilation: TKM Institute OF technology
Volume & Issue No.: Volume4Issue2
Abstract: Very high resolution satellite images available from satellites such as QuickBird, IKONOS etc are used for obtaining information about the earth surface. But these high resolution images are usually affected with shadows. These shadows reduces the information content of the images. Previous methods are pixel based shadow detection methods, detect shadows directly from the input image pixels. In this paper, an object oriented shadow detection method is used to detect the shadows from high resolution images. In object oriented approach each object in the input image is extracted through a segmentation process. Suspected shadows are detected by comparing the threshold obtained from the original image and the gray scale average of each object in the segmented image. Dark objects which may be included in the suspected shadows are eliminated by comparing the gray scale average in different image bands. For the restoration of information, relative radiometric correction is used. For this inner-outer outline lines along the shadow boundary are generated. For shadow removal, relative radiometric correction is applied to the homogeneous points obtained from IOOPL similarity matching. Some experimental analyisis conducted on high resolution satellite images collected by QuickBird satellite sensor. Experimental result shows that the proposed algorithm effectively detected majority of shadows within the high resolution satellite images compared to pixel based methods. IOOPL based relative radiometric correction restored shadow area accurately.
S.No.: 298
Title : DESIGN OF ACCIDENT DETECTION SYSTEM BASED ON VEHICULAR NETWORKS AND INFRASTRUCTURE NETWORKS FOR FUTURE GENERATION VEHICLES
Authors Name: MR.A.VIVEK YOGANAND, SAGALA NITIN, S.PARTHASARATHY M.VIGNESH
Authors Affilation: Veltech Multitech Dr.Rangarajan Dr.Sakunthala Engineering College, Avadi, Chennai.
Volume & Issue No.: Volume4Issue2
Abstract: Modern communication technology integrated into vehicles offer an opportunity for better assistance to people injured in traffic accidents. To improve the overall rescue process, a fast and accurate estimation of the severity of the accident is needed. Our system is able to automatically detect road accidents, notify them through vehicular networks, and estimate their severity based on the concept of data mining and knowledge inference and thereby reduce the time needed to alert and deploy emergency services after an accident takes place.Results show that a complete Knowledge Discovery in Databases (KDD) process, with an adequate selection of relevant features, allows generating estimation models that can predict the severity of new accidents.
S.No.: 299
Title : ENHANCING FRAMEWORK FOR DEPLOYING INFORMATION IN CLOUD SERVICE PROVIDER WITH SECURITY APPLICATION
Authors Name: K.V.V. Satyanarayana ,B Krishna Sahitya, K Manisha, Sk Monisha, N Sai Manoj Kumar
Authors Affilation: KL University,Vijayawada,India
Volume & Issue No.: Volume4Issue2
Abstract: The use of cloud computing has enormously increased promptly in many of the organizations. Cloud computing offers many benefits in terms of low cost and openness of data, but still there is a major problem i.e., lack of security, as users often store confidential data with cloud storage providers but these cloud providers might be un trusted. To enhance privacy, the available cryptography techniques are in nature. By using some of those cryptography techniques, built a cloud security application for encrypting the sensitive information before uploading with virtual data centers via internet. This work aims to promote a method of providing security by implementing cryptography techniques using Microsoft windows azure to the information that will be stored in the third party area.
S.No.: 300
Title : An Alternative For Database Queries:Auto Query Forms
Authors Name: pratik bhavsar
Authors Affilation: Department of Information Techonolgy,SSBT’s COET, Jalgaon, India
Volume & Issue No.: Volume4Issue2
Abstract: Modern databases contains very huge amount of data. Also the databases have exists various complex relationships among them. These databases contains over thousands of relations and their entities. Existing query forms are unable to generate queries dynamically as per the user requirements. Alternative Query Form which takes input in the form of human understandable language and converts it into appropriate SQL query and the query will be fired on relational database to fetch the appropriate data. It is very easy and convenient to ask questions to database in natural language especially to the non-technical users who do not understand the database query language such as SQL. Our system will provide easy access to complex databases using NLP which perform lexicon processing, query formulation, and dynamic generation of SQL queries which can be easily reused or modified.
S.No.: 301
Title : An Intelligent System for the Detection of Breast Cancer Using Feature Selection and PCA Methods
Authors Name: M Ramya devi, Dr. B Gomathy
Authors Affilation: 1 Dept. of Computer Science and Engineering Bannari Amman Institute of Technology Erode, India
Volume & Issue No.: Volume4Issue2
Abstract: Breast cancer becomes a serious disease in the modern world. It is caused due to obesity, lack of physical exercise, alcohol consumption, hormone replacement therapy during menopause, early age at first menstruation, ionizing radiation. Breast cancer is the second leading cause of cancer death in women, exceeded by lung cancer. The chance that breast cancer will be responsible for a womans death is about 1 in 36 (about 3%). Death rates due to breast cancer have been declining since about 1989, with greater decreases in younger women. The decreases are the result of earlier detection through screening techniques and increased awareness, as well as the treatment. The detection of breast cancer and the dimensional reduction of high dimensional data become difficult for large datasets using association rule mining. A new hybrid method called feature selection method which combines Association rules (Apriori algorithm) and Principal Component Analysis (PCA) with artificial neural network classifier (ANN). Feature selection method distinguishes features from a set of features and eliminates the irrelevant and redundant data. It results in increased accuracy and reduces the processing time. Neural network classification uses the output of AP method as input and extracts the features. The average accuracy of AP and NN is 98.29%. Finally, comprehensive experimental study is made and the accuracy is increased by combining PCA and Linear Discriminant Analysis (LDA) methods in future to reduce the size.
S.No.: 302
Title : Review on Securing Audio Watermarking System for Copyright Protection
Authors Name: Miss Rushali J. Watane, Prof Nitin R. Chopde
Authors Affilation: G H Raisoni College of Engineering and Management, Amravati
Volume & Issue No.: Volume4Issue2
Abstract: The recent growth in pc networks, and a lot of specifically, the planet Wide internet, copyright protection of digital audio becomes a lot of and a lot of necessary. Digital audio watermarking has drawn in depth attention for copyright protection of audio information. A digital audio watermarking may be a method of embedding watermarks into audio signal to point out genuineness and possession. Our technique supported the embedding watermark into audio signal and extraction of watermark sequence. We tend to propose a brand new watermarking system victimization separate Fourier remodel (DFT) for audio copyright protection. The watermarks area unit embedded into the best outstanding peak of the magnitude spectrum of every non-overlapping frame. This watermarking system can provides robust lustiness against many styles of attacks like noise addition, cropping, re-sampling, re-quantization, and MP3 compression and achieves similarity values starting from thirteen sound unit to twenty sound unit. Additionally, planned systems attempting to realize SNR (signal-to-noise ratio) values starting from twenty sound unit to twenty-eight sound unit.
S.No.: 303
Title : Review On Usage of Cloud Computing Technology In Education System
Authors Name: Vinod S.Agrawal
Authors Affilation: Asst Prof., Jawaharlal Nehru Engineering College, Aurangabad
Volume & Issue No.: Volume4Issue2
Abstract: Now a days cloud computing is the vast growing area in each area due to which we can minimize the required computing resources, minimize the cost and enhance the performance. We can use cloud computing technology under education system to enhance the quality of education. Many colleges run under one roof(University) with same syllabus, exam system, admission system. So if we apply cloud computing technology in education system we can make it more transparent system that it minimizes the communication gap between student and faculty and student and parent.
S.No.: 304
Title : A Robust QR-Code Video Watermarking With DCT Domain
Authors Name: Parkar Shalaka Bhaskar
Authors Affilation: PARVATIBAI GENBA MOZE COLLEGE OF ENGINEERING,WAGHOLI,PUNE
Volume & Issue No.: Volume4Issue2
Abstract: Domestic or industrial facilities on the internet and social media sites lacks in security to improve protection. The digital watermark embedded 2D Barcode is a most popular research in the digital field. This paper gives a watermarking of video with text data by applying the Quick Response (QR) Code method. The QR Code is generated to be watermarked via a robust video watermarking method based on the SVD and DWT. In addition to that logo (or) watermark gives the authorized ownership of video document. An attractive algebraic transform is SVD for applications of watermarking. SVD is applied to the cover I-frame. After extraction of the diagonal value it is fused with logo (or) watermark. After that DWT is applied on SVD cover image and QR code image. The watermarked image is inverse transformed and added to the frame into video which is then watermarked (include logo and QR code image) the video file sends to authorized customers. In reverse of this process we check the logo and then QR code for authorization of ownership.The imperceptibility and certain robustness in video processing can be used and achieved after experimental results. .Keywords— 2D Barcode; Quick Response (QR) Code; singularvalue decomposition (SVD); Discrete Wavelet Transform (DWT)
S.No.: 305
Title : A Review on Fuzzy Model For Human Face Expression Recognition
Authors Name: Mr. Akshay Adsod, Prof. Dinesh Datar
Authors Affilation: G.H. Raisoni College of Engineering and Management, Amravati
Volume & Issue No.: Volume4Issue2
Abstract: Facial expression recognition plays a vital and effective role within the interaction between man and computer. During this project, brand new system supported the mathematical logic is projected for this purpose. Fuzzy is one helpful approach for fuzzy classification, which might verify the intrinsic division in an exceedingly set of untagged knowledge and notice representatives for undiversified teams. This method acknowledges seven basic facial expressions particularly concern, surprise, happy, sad, disgust, Neutral and anger. For description of detail face facial features, Face Action writing (FACS) was style. First, we tend to gift a unique methodology for facial region extraction from static image. For determination of face effective areas is employed from integral projection curves. This methodology has high ability in intelligent choice of areas in facial features recognition system. Extracted face expression fed to fuzzy rule based mostly system for facial features recognition. Results of tests indicate that the projected theme for facial features recognition is powerful, with smart accuracy and generating superior results as compared to different approaches.
S.No.: 306
Title : A Review on Securing Audio Watermarking System for Copyright Protection
Authors Name: Miss. Rushali Watane, Prof. Nitin Chopde
Authors Affilation: G.H. Raisoni College of Engineering and Management, Amravati
Volume & Issue No.: Volume4Issue2
Abstract: The recent growth in pc networks, and a lot of specifically, the planet Wide internet, copyright protection of digital audio becomes a lot of and a lot of necessary. Digital audio watermarking has drawn in depth attention for copyright protection of audio information. A digital audio watermarking may be a method of embedding watermarks into audio signal to point out genuineness and possession. Our technique supported the embedding watermark into audio signal and extraction of watermark sequence. We tend to propose a brand new watermarking system victimization separate Fourier remodel (DFT) for audio copyright protection. The watermarks area unit embedded into the best outstanding peak of the magnitude spectrum of every non-overlapping frame. This watermarking system can provides robust lustiness against many styles of attacks like noise addition, cropping, re-sampling, re-quantization, and MP3 compression and achieves similarity values starting from thirteen sound unit to twenty sound unit. Additionally, planned systems attempting to realize SNR (signal-to-noise ratio) values starting from twenty sound unit to twenty-eight sound unit.
S.No.: 307
Title : Enhancement of Wireless Mesh Network Using Cognitive Radio’s
Authors Name: Anusha M, Srikanth Vemuru
Authors Affilation: K L University
Volume & Issue No.: Volume4Issue2
Abstract: Even though Wireless Mesh Networks (WMN’S) have immediately been effectively installed but the dual utilization of wireless communication makes them extremely resource needy. The proposed concept Cognitive Radio’s (CR’s) is a good result to furnish WMN’S with extra data transfer capacity by enhanced its efficiency. Likewise, we accept that applying CR’s to WMN’S can be advantageous to CR’s for speeding the advancement of the technology.
S.No.: 308
Title : RFID Based Automatic Toll Collection System
Authors Name: ,R.More,P.Mane,R. Palkar,D. Takawale,N.V. Puri
Authors Affilation: Universal College of engineering and research
Volume & Issue No.: Volume4Issue2
Abstract: ATCS (Automated Toll Collection System) use for collecting toll automatically with the help of RFID technique. Radio Frequency Identification (RFID) is an auto identification technology used for collecting toll automatically. This system can be classified by types of tag and RFID detector. RFID tag will be attached to vehicle. The tags contain information related to vehicle. RFID detector will be present at each toll-plaza. RFID detector passes infra red waves to detect presence of vehicle. Most important that, the stolen vehicle will be able to catch easily with the help of RFID technique. Signaling between detector and tag is done in different ways, depending on the frequency band used by the tag. RFID is one of the best methods for Automatic Identification and Data Capture. (AIDC).
S.No.: 309
Title : AUTOMATIC VEHICLE NUMBER PLATE RECOGNITION FOR VEHICLE PARKING MANAGEMENT SYSTEM
Authors Name: Ganesh R. Jadhav
Authors Affilation: SKN Sinhgad College of Engineering
Volume & Issue No.: Volume4Issue2
Abstract: A license plate recognition (LPR) system is one type of intelligent transportation system (ITS). It is a type of technology in which the software enables computer system to read automatically the license number plate of vehicle from digital pictures. Reading automatically the number plate means converting the pixel information of digital image into the ASCII text of the number plate. This paper discuses a method for the vehicle number plate recognition from the image using mathematical morphological operations. The main objective is to use different morphological operations in such a way that the number plate of vehicle can be identified accurately. This is based on various operation such as image enhancement, morphological transformation, edge detection and extraction of number plate from vehicle image. After this segmentation is applied to recognize the characters present on number plate using template matching. This algorithm can recognize number plate quickly and accurately from the vehicles image.
S.No.: 310
Title : A Review Paper on Big Data Analytics
Authors Name: Ankita S. Tiwarkhede, Prof. Vinit Kakde
Authors Affilation: GHRCEM, Amravati, India
Volume & Issue No.: Volume4Issue2
Abstract: We live in on-demand world with vast majority of data. People and devices are constantly generating data, while streaming a video, active in social media, playing games, search any location using GPS. This data increase day by day from many resources, various types of techniques and technologies. The data is categories as “Big Data”. Big Data is huge in Variety, Velocity and Sheer volume. It is structured and unstructured data and heterogeneous in nature. The goal of Big Data analysis is to extract useful values, suggest conclusions and/or support decision making. In this topic, we provide an extensive survey of big data analytics research, while highlighting the specific concern in big data world. According to Application evolution, we discuss six types of big data application such as structured data analytics, Text analytics, Web analytics, Multimedia analytics, and Mobile analytics. We illustrate the techniques of analyzing the big data such as A/B testing, classification, crowdsourcing, and data mining.
S.No.: 311
Title : DATABASE TRAVERSAL TO SUPPORT SEARCH ENHANCE TECHNIQUE USING SQL
Authors Name: sivakumar k, sriram u, yasar arafath s
Authors Affilation: dhanalakshmi college of engineering
Volume & Issue No.: Volume4Issue2
Abstract: A search-as-you-type system computes answers on-the-fly as a user sorts during a keyword question character by character. We have a tendency to support search-as-you-type on information residing during a relative software. We have a tendency to target the way to support this kind of search mistreatment the native information language, SQL. A main challenge is the way to leverage existing information functionalities to satisfy the high performance demand to realize associate interactive speed. We have a tendency to use auxiliary indexes hold on as tables to extend search performance. We have a tendency to gift solutions for each single-keyword queries and multi keyword queries, and develop novel techniques for fuzzy search mistreatment SQL by permitting mismatches between question keywords and answers. We gift techniques to answer first-N queries and discuss the way to support updates expeditiously. Experiments on massive, real information sets show that our techniques modify software systems on a trade goods pc to support search-as-you-type on tables with a lot of records.
S.No.: 312
Title : Review of Initial approach to develop Multi-Cloud Storage System
Authors Name: Pravin Sonsare,Jignyasa Sanghavi
Authors Affilation: Shri Ramdeobaba College of Engineering and Management,Nagpur
Volume & Issue No.: Volume4Issue2
Abstract: Cloud computing is simply a rate server. A huge amount of data being retrieved from geographically distributed data sources, and nonlcalized data handling requirements, creates such a change in technological as well as business model. One of the prominent services offered in cloud computing is the cloud data storage, in which, subscribers do not have to store their data on their own servers, where instead their data will be stored on the cloud service providers servers. Multi-Cloud Storage System model in cloud computing which holds an economical distribution. Multi-Cloud Storage System provide customers with data availability as well as secure storage. And better decision for customers according to their available budgets and amount of data they need to store particular period of time.
S.No.: 313
Title : DESIGNING A RDBMS FOR STORING AND MANAGING THE USAGE OF PHOTOVOLTAIC PANELS
Authors Name: Eng.Luciana Toti, Edlira Kalemi, Eng.Gerti Kallbaqi, Eng.Ajakida Eski
Authors Affilation: Edlira KALEMI, PhD Assistant Professor University of Tirana
Volume & Issue No.: Volume4Issue2
Abstract: In everyday life the production and broadcast of material goods, computer and management in global communication can not be realized without an electrical power source, the output of which is associated with environmental and safety problems. Current methods for providing electricity departing from limited natural resources, such as oil, gas, coal, etc. Simultaneously every day we face not only with the increasing prices for them, but also the problem of environmental pollution, which brings their burning. Fortunately there is a solution, and it is the use of renewable energy sources, such as biomass, solar energy, wind power, etc. Because of the benefits obtained from their use on dozens of regions in the world are directed to the use of these resources, especially solar energy. This energy is collected through solar panels and back into thermal or electric energy. Systems that convert the energy of sunlight into electricity are called photovoltaic systems. In this paper we will focus on the structuring of data collection about technologies and parameters to use photovoltaic systems in Albania. In order that these data collected be managed with high efficiency, it is appropriate that they are stored in a DB. DB Design brings genuine analysis of the current situation, but the future forecast for our country can be done on its basis. So on the basis of the studying of the DB, can be judge the economic and ecological benefits that come from the use of solar energy. The consumer can judge the energy efficiency, technology used, methods of installation, etc.Responsible institutions can deal with completing the updates of data for the completion of a DB at the national level.
S.No.: 314
Title : A new approach for File Transfer via SMS using Graphical Password Authentication
Authors Name: Prashant jawade,Pooja Desurkar,Prachi Kubde,Sonali,Bhakti
Authors Affilation: Goverment college of Engineering,Karad. Dist. Satara
Volume & Issue No.: Volume4Issue2
Abstract: In today’s world, for sending data, Internet or Bluetooth is essential. In some cases, where Internet cannot be available and necessity to send any text file, it creates problem and user unable to send the file. To overcome this problem, this project proposes to send a text file via SMS. The idea is implemented using compression method known as ‘Gzip compression algorithm’. The text file is attached to an SMS and send like a normal SMS. The charges for sending are also nominal. Another useful and simple mechanism attached to this application program is graphical password authentication. In digital environment authentication plays major role. Textual authentication is vulnerable to threats and attacks. So to overcome the drawbacks of textual passwords, graphical based password is one of the most promising and upcoming alternative. For maintaining security the AES algorithm with Persuasive Cued Click Point (PCCP) method is used.
S.No.: 315
Title : FILTER FALSE MESSAGE FROM USER WALL
Authors Name: SUNANDA REDDY
Authors Affilation: YADAVRAO TASGAONKAR INSTITUTE OF ENGINEERING AND TECHNOLOGY
Volume & Issue No.: Volume4Issue2
Abstract: The social network is mainly used for communication and sharing information and some people also send some false and unwanted message. So this works as a filtering system to filter unwanted messages and allow it to be displayed to user public/private wall.
S.No.: 316
Title : OPTIMIZATION OF CENTRIFUGAL PUMP IMPELLER OUTLET VANE ANGLE BY USING MODAL ANALYSIS
Authors Name: kotakar sandeep G; Prof D S Khedekar
Authors Affilation: jawaharlala neharu Engineering college, Aurangabad
Volume & Issue No.: Volume4Issue2
Abstract: A number of variety of centrifugal pump have been constructed and used in many different applications in domestics, Agricultural, industry and other technical sectors. Due to the great number of free geometric parameters, their design and performance prediction process is still a difficult task, mainly the effect of which cannot be directly evaluated. The significant cost and time of the trial-and-error process by constructing and testing physical prototypes is always undesirable. For this reason taking one analysis parameter, design the pump result check by software and finally check the result by experimental method. Analysis is currently being used in the design and construction stage of various pump types, the use of which reduces significantly the new pump development time and costs. The numerical simulation can provide quite accurate information on the fluid behavior in the machine, and thus helps the engineer to obtain a thorough performance evaluation of a particular design. Performance study predicts the performance of pump impellers and helps us rapidly to establish the efficiency of the pump over various operating conditions.
S.No.: 317
Title : “Web amenities commendation and visualization for custom-madeQoS”
Authors Name: Ms. Komal D. Kshatriya, Mr. Santosh Durugkar
Authors Affilation: SNDCOE and RC, Yeola
Volume & Issue No.: Volume4Issue2
Abstract: Web amenities are integrated software components for the support of interoperable machine to machine interaction over a network.Some previous problems are1) earlier approaches are not succeed to consider the QoS variation according to users’locations; and 2) earlier recommender systems are all black boxes it just takes input from user and provide different amenities that provide incomplete or limited information on the performance of the amenity applicant.In this system we provide novel collaboration filtering based web amenities recommender system to helps users select amenities with best QoS performance. Our approach employs the characteristic of QoS and achieves considerable improvement on commendation accuracy.We present exact web amenities location in an interactive visualization map. Interaction is providing through SOM based interaction visualization techniques.
S.No.: 318
Title : SQL Injection attack detection and Defence Mechanism
Authors Name: Prashant Jawade,Jadhav Dhanashree, More Ashwini, Kanase Janhavi and Munde Sangita
Authors Affilation: Dept. of Information technology Govt. College of Engineering. Karad, India.
Volume & Issue No.: Volume4Issue2
Abstract: — SQL injection attack targets a serious security threat to web applications they allow hackers or attackers to gain unrestricted access to the databases underlying the applications which contains sensitive information. Many researchers have addressed these problems but they are not successful completely. Many researchers are familiar with the techniques available to attackers who are trying to take advantages of SQL injection vulnerabilities; web application did not realize that their applications have vulnerability. To address this problem, we present comprehensive review of different types of SQL injection attack. For every attack which is discussed in this paper, we provide example of how the attack launches and we proposes the solution to defeat SQL injection attack.
S.No.: 319
Title : SURVEY ON MOBILE CLOUD WITH KERBOS
Authors Name: RAMYA PATEL R
Authors Affilation: DR.AMBEDKAR INSTITUTE OF TECHNOLOGY
Volume & Issue No.: Volume4Issue2
Abstract: mobile computing a big trend in which byod devices to allow access the enterprise data while using kerbos
S.No.: 320
Title : An Android Security System Against Automatic Update and Data Leakage for Smartphones
Authors Name: GIRISANKAR.N , NATARAJAN.G
Authors Affilation: IFET COLLEGE OF ENGINEERING,VILLUPURAM
Volume & Issue No.: Volume4Issue2
Abstract: Sensitive information leakage is a major problem due to automatic updation and there is no security for analyzing android apps running in background. Generally android OS adopts permissions to protect sensitive resources from untrusted apps. However, after permissions are granted by users at install time, apps could use these permissions (sensitive resources) with no further restrictions.Due to this reason, applications always keeps on leaking sensitive information such as Contact Details, SMS logs, Social Networking Connections and Bank Related Details.. Due to these limitations the applications are only used whenever it is needed.The proposal of Denial of App algorithm used to mitigate these security concerns.It checks for manual blockage for application authentication in real time.Background running apps and their updating always attracks unwanted malwares and commercial adds .It blocks all these harmful activities running in background.
S.No.: 321
Title : A Survey on Machine Transliteration Systems
Authors Name: Debashis Sen
Authors Affilation: Lovely Professional University, Phagwara
Volume & Issue No.: Volume4Issue2
Abstract: Machine transliteration deals with the conversion of one source language to its corresponding target language. The languages involved can be either identical type like English-French pair or dissimilar type like English-Bengali pairs. It generally is the mapping of one alphabet from a source language to its corresponding target alphabet. It helps in bridging the gap between machines and natural language understanding. This paper deals with the various machine transliteration systems that have been developed, their methods and approaches.
S.No.: 322
Title : Survey on Malicious URL Hitches and Propagation Mechanisms
Authors Name: samridhi sharma
Authors Affilation: kurushetra university
Volume & Issue No.: Volume4Issue2
Abstract: Malicious URL detection has become increasingly difficult due to the evolution of phishing campaigns and efforts to avoid attenuation blacklist. The current state of cybercrime has allowed pirates to host campaigns with shorter life cycles, which reduces the effectiveness of the blacklist. As the same time, normal supervised learning algorithms are known to generalize in specific patterns observed in the training data, which makes them a better alternative against piracy campaigns. However, the highly dynamic environment of these campaigns requires models updated regularly, which poses new challenges as most typical learning algorithms are too computationally expensive retraining. This paper surveys Malicious URL propagation mechanisms and methods for detecting the same.
S.No.: 323
Title : Measuring Quality Metrics using Object Oriented Approach
Authors Name: Lalima Soni, Meena Sharma
Authors Affilation: ME Scholar Department of Computer Engineering, Institute of Engineering & Technology, DAVV Indore (M.P), India
Volume & Issue No.: Volume4Issue2
Abstract: In this age of object oriented language most of the softwares are developed by object oriented approach only. Object-oriented software is easier to maintain because its structure is inherently decoupled. In object oriented approach classes and objects are interlinked with each other. Using this characteristics of classes and objects many object oriented metrics like coupling, cohesion, polymorphism, inheritance etc. can be derived. For better product quality, first measure the product and then identify that improvement is required or not. In this paper object oriented metrics like encapsulation, design size, composition, abstraction etc. are used to measure quality metrics like reusability, effectiveness, extendibility, understandability etc. This paper also includes desirable value of object oriented metrics which help to identify the current state of project. And using these desirable metrics values this paper also observes the relationship between object oriented metrics and quality metrics.
S.No.: 324
Title : Optimization of an S-Bend structure for optics integrated
Authors Name: F. Brik, R.Khalfi, A.Hocini, N. Doghmane, T. Boumaza
Authors Affilation: Department of Electronics, Technological Sciences Faculty, University BMA, Algeria BRIK Fatima
Volume & Issue No.: Volume4Issue2
Abstract: The S-Bend structures are used to connect different parts ofa circuit such as: optical couplers, modulators and switches. These devices must be conceived to minimize the signal loss caused by the curve. For this purpose, we undertook the simulation of a curved structure(S-Bend), using the BeamProp simulator integrated in the Rsoft software. The results of simulation confirm that the radius of curvature has a great influence on the losses,and that the latter become higher when the radius becomes smaller. However, it is possible to reduce these losses using the side shifts to each junction of the S-Bend structure.
S.No.: 325
Title : Literature Survey on Implementation of Highway Driving Automation and accident detection severity system
Authors Name: Prof. P Parthasaradhy, Dr.K.Manjunathachari
Authors Affilation: Guru Nanak Institutions Technical Campus, Hyderabad. GITAM University, Hyderabad
Volume & Issue No.: Volume4Issue2
Abstract: The integration of Information and communication technologies with embedded system has given a new technological world. The service of Ad hoc Networks (Wireless Sensor Networks) for the society is an important aspect and can be possible with only the integrated environment of interdisciplinary technologies. All the remote technologies are assisting people in safety manner. Artificial Intelligence and Intelligent Transportation system also one of the service of Ad hoc networks. This paper presents about the literature survey on various Highway Driving Automation and accident detection severity system implementations. The objective of this literature is to have sufficient knowledge to build highly automated system with traffic rules, human rules and system rules, intelligent speed adaptation system and Lane keep assistance with changing functionalities. Finally to achieve safe driving and reduce accidents.
S.No.: 326
Title : NON REPUDIATION PROTOCOL IN CLOUD NETWORKING
Authors Name: Shraddha G. Kokate
Authors Affilation: H.V.P.M’s C.O.E.T Amravati, India
Volume & Issue No.: Volume4Issue2
Abstract: Non Repudiation Protocol is used in cloud networking. It is a technology that uses the internet and central remote servers to maintain data and applications. Non repudiation means that a sender must not be able to deny sending a message that he sent. Non repudiation protocol provides a message integrity, authentication and non repudiation. It cannot provide confidentially for the message. If confidentially is needed, a cryptosystem must be applied over the scheme. The Non repudiation protocol is Internet based, shared software information and resource to world. These cloud network resources are shared to all servers, and separate users. The Non repudiation protocol supports distributed services multi-domain Infrastructure, and multi-users. This paper proposed user authentication to secure data of encryption algorithm with Non repudiation protocol in cloud computing. This infrastructure guaranteed to secure the Information in cloud server.
S.No.: 327
Title : A Review: Analysis and Forecasting of GDP by Using ANN
Authors Name: Nikit Kumar, Pency Juneja
Authors Affilation: 1School of Computer Science & Engineering Lovely Professional University Jalandhar,India
Volume & Issue No.: Volume4Issue2
Abstract: Gross Domestic Product is one of the most economic factors. Importance of GDP forecasting needed Because during the period of 2007 to 2009 Indian Economy was Suffering from Recession and GDP growth rate also affected by Recession .By Observing Past Experiences it have seen that the variances in the GDP economy got up and down. Simulated annealing is one of the crucial algorithms which can be used to optimize the weight value of the Artificial Neural Network. Back Propagation algorithm process the weight values from back to forth. but here simulated annealing algorithm consider all the weight values together and process to all these weights to find optimal weights.SA algorithm here improves the performance over the BPN.SA technique can be apply on a specific application by knowing the input and output parameter. Forecasting is helpful to decrease the uncertainty in the economy.
S.No.: 328
Title : VEHICLE TRACKING SYSTEM IN MOBILE NETWROK
Authors Name: Y. Arockia Raj
Authors Affilation: Assistant Proffessor, Department of Computer Science and Engineering, PSNA College of Engineering and Technology, Dindigul, Tamil Nadu, India
Volume & Issue No.: Volume4Issue2
Abstract: In todays economy companies aiming to increase productivity while reducing costs may need to consider new data-gathering and business processes, just to stay competitive. Mobile computing is becoming more prevalent in the normal day-to-day tasks of the average workforce employee. This project describes how we can use existing mobile technology to track the vehicle. Here the mobile is used to prevent the vehicle from being stolen and its location can be tracked. Mobile technology is the fastest growing communication mode. In today mobile technology we all are acquainted with short message service (SMS). This system provides the current location of the vehicle to the owner via SMS. So owner can know the current location of the vehicle easily. This technique is using behalf of GPS technology. Because of the GPS product cost is higher than the mobile cost. The small concerns can use this technology and know the location of their vehicle. This system is cost effective, reliable and user friendly. The limitation of this system is that it will only applicable for small concerns with lower cost and higher usability.
S.No.: 329
Title : Optimization of clustering quality and noise for multi represented objects
Authors Name: M. Parvathi MCA.,M.Phil., (Ph.D)
Authors Affilation: Senthamarai College of Arts andScience, VRS Garden, Vadapalanji, Madurai - 625 016. Tamil Nadu, India
Volume & Issue No.: Volume4Issue2
Abstract: Abstract: Recent technological advances have tremendously increased the amount of collected data. Besides the total amount of collected information, the complexity of data objects increases as well. With the growing amount of data the complexity of data objects increases. Modern methods of KDD should therefore examine more complex objects than simple feature vectors to solve real-world KDD applications adequately. To analyze these data collections, new data mining methods are needed that are capable to draw maximum advantage out of the richer object representations. This paper contributes to the field of data mining of complex objects by introducing methods for clustering and classification of compound objects The area of KDD deals with analyzing large data collections to extract interesting, potentially useful, so far unknown and statistical correct patterns. The data objects to be analyzed are of complex nature. Thus, they are not represented in the best possible way by the common approach using feature vectors. So, data mining algorithms have to handle more complex input representations. KDD is necessary to analyze the steady growing amount of data caused by the enhanced performance of modern computer systems. Multi-represented objects are constructed as a tuple of feature representations where each feature representation belongs to a different feature space. The goal of clustering multi-represented objects is to find a meaningful global clustering for data objects that might have representations in multiple data spaces. This paper contributes to the development of clustering and classification algorithm that employ more complex input representations to achieve enhanced results. Therefore, the paper introduces solutions for real-world applications that are based on multi-represented object representations. To analyze multi-represented objects, a clustering method for multi-represented objects is introduced that is based on the projected based clustering algorithm. This method uses all representations that are provided to find a global clustering of the given data objects. To map new objects into ontology a new method for the hierarchical classification of multi-represented objects is described. The system employs the hierarchical structure of the efficient classification method using support vector machines.
S.No.: 330
Title : Resource Discovery and Load Balancing in Grid Environment
Authors Name: Bhairavnath Jadhav, Riyaz Shaikh, Irshad Sagar
Authors Affilation: SKN Sinhgad Institute Of Tech. And Sci. ,Pune
Volume & Issue No.: Volume4Issue2
Abstract: Grid technology has emerged as a new way of large scale distributed computing with high-performance orientation. Grid computing is being adopted in various areas from academic, industry research to government use. Grids are becoming platforms for high performance and distributed computing. Grid computing is the next generation IT infrastructure that promises to transform the way organizations and individuals compute, communicate and collaborate. The goal of Grid computing is to create the illusion of a simple but large and powerful self-managing virtual computer out of a large collection of connected heterogeneous systems sharing various combinations of resources. The main goal of load balancing is to provide a distributed, low cost, scheme that balances the load across all the processors. To improve the global throughput of Grid resources, effective and efficient load balancing algorithms are fundamentally important. Focus of this project is on analyzing Load balancing requirements in a Grid environment and proposing a centralized and sender initiated load balancing algorithm. In this work we have proposed an efficient load balancing algorithm which optimizes the response time and latency time with respect to the server.
S.No.: 331
Title : Energy Efficient Routing with Route Minimization and Utilization Based on Threshold Scheme in MANET Using NS2- A Novel Approach
Authors Name: Ashutosh Dixit , Sandeep Kumar, Surendra Nagar
Authors Affilation: M.Tech Scholar (CTA) A.P., Dept. of CTA A.P., Dept. of CTA IITM, IITM, IITM, Bhopal, India
Volume & Issue No.: Volume4Issue2
Abstract: Efficient routing protocols can provide significant benefits to mobile ad hoc networks in terms of both performance and reliability. Mobile Ad-hoc Network (MANET) is an infrastructure less and decentralized network which needs a very strong dynamic routing protocol. There are many routing protocols available for such networks and many have been proposed so far. Amongst the most popular ones are Dynamic Source Routing (DSR)[12], Ad-hoc On-demand Distance Vector (AODV)[9], Temporally Ordered Routing Algorithm (TORA) and Destination-Sequenced Distance Vector (DSDV) routing protocol. The performance of DSDV routing protocol have been evaluated for Mobile Ad-hoc Networks (MANETs) in terms of throughput, the average end to end delay, Packet Delivery Ratio(PDR). The performance of the DSDV routing protocol is improved my applying a threshold technique. This paper focuses on better utilization of energy of nodes and minimizing its loss. A network simulator-2 (NS-2) simulator has been used as platform for performance evaluation of DSDV routing protocol in this paper. To compare the performance of DSDV routing protocol before applying the threshold and after applying the threshold, the simulation results were analyzed by graphical manner and trace file based on Quality of Service (QoS) metrics: such as throughput, the average end to end delay, Packet Delivery Ratio (PDR) etc. Finally, the performance differentials based on network load, mobility, and network size have been analyzed. The simulation result analysis verifies that DSDV routing gives better results after applying threshold technique.
S.No.: 332
Title : A Survey of Existing Question Answering System
Authors Name: Sharad Pandey,Kamal Deep Garg
Authors Affilation: lovely Professional University
Volume & Issue No.: Volume4Issue2
Abstract: In the text mining, the question answering is the main field of research process. In this process, the user is finding a particular answers by the use of text document or paragraphs. It provides a path for finding an accurate and useful answers for question which is provided by user use by natural language. The languages are Hindi, Punjabi, Bengali, Marathi, Kannada and Telugu are the main spoken languages in India. Not so much resources are available for these Indian language and more of research is going on for developing basic language resources in these languages. This paper discuss a survey of different Indian languages question answering system.
S.No.: 333
Title : Study of Crawlers and Indexing Techniques In Hidden Web
Authors Name: Sweety Mangla, Geetanjali Gandhi
Authors Affilation: 1M.Tech Student, Department of CSE, B.S.Anangpuria Institute of Technology and Management, Alampur, India
Volume & Issue No.: Volume4Issue2
Abstract: The traditional search engine work to crawl, index and query the Surface web. The Hidden Web is the willing on the Web that is accessible through a html form. not general search engines. This Hidden web forms 96% of the total web .The hidden web contains the high quality data and has a broad coverage. So hidden web has always stand like a golden egg in the eyes of the researcher. This high quality information can be retrieved by hidden web crawler using a Web query front-end to the database with standard HTML form attribute. The documents retrieved by a hidden web crawler are more proper, as these documents are attainable only through dynamically generated pages, delivered in response to a query. A large amount of data is hidden in the databases behind the search interfaces which need to be indexed so in order to serve users query. To index these documents adequate, the search engine requires new indexing technique that optimizes speed and performance for finding relevant documents for a search query. Efficient index structures need to build to maintain the Hidden web data, which are then accessed to provide proper answers to many types of users query.
S.No.: 334
Title : Survey of Attacks and Security Schemes in MANET
Authors Name: Shivani Rajput
Authors Affilation: Rajiv gandhi proudyougiki mahavidyalaya,bhopal,MP
Volume & Issue No.: Volume4Issue2
Abstract: security schemes are protecting the network from attacks Mobile ad hoc networks (MANETs) are maintain the temporary connection between the mobile stations or hosts having the capability of routing can established connection without any fixed infrastructure. The dynamic topology of MANET allows nodes to join and leave the network at any point of time. The network is decentralized, where network organization and message delivery must be executed by the nodes themselves. Message routing is a problem in a decentralize environment where the topology fluctuates. In MANET, all networking functions such as routing and packet forwarding, are performed by nodes themselves in a self-organizing manner. For these reasons, securing a mobile ad hoc network is very challenging. This generic characteristic of MANET has provided it susceptible to security attacks which results in deterioration in the performance characteristics as well as raises a serious problem stain about the reliability of such networks. In MANET, uncooperative node is malicious node. The nodes that are faulty and therefore cannot follow a protocol, or are intentionally malicious and try to attack the system. Malicious nodes falsely advertise the information as like normal node to the destination node with an intension to disrupt the communication. In this paper, we will address the different types of attacks and their security schemes. These attacks are degrades the network performance and the. Keywords- MANET, AODV, Malicious node, routing, security
S.No.: 335
Title : A Modified Approach Based On SLM for OFDM PAPR Reduction Using Time Domain Sub-Block Conversion Matrix
Authors Name: Mrs.Yasmeen Z.Attar, Prof.Sheetal Bhujade
Authors Affilation: 1 PG Student, EXTC, Saraswati College of Engineering, Kharghar, Navi Mumbai
Volume & Issue No.: Volume4Issue2
Abstract: OFDM is a digital transmission method developed to meet the increasing demand for higher data rates in communications which can be used in both wired and wireless environments. This paper describes the issue of the PAPR in OFDM which is a major drawback, and presents new and variations to existing algorithms to reduce it. The effect on system performance in terms of the BER and Power Spectral Density is simulated for an OFDM transceiver with a saturated High Power Amplifier. A modified SLM approach based on time-domain sub-block conversion matrices to reduce the computational complexity due to multiple IFFTs. This scheme is modified from the conversion matrix scheme. By dividing the frequencydomain signals into multiple sub-blocks, the number of the valid conversion matrices can be increased, and thus more candidate signals are available for PAPR reduction. By applying proposed scheme, the number of candidate signals can be increased from 12 in the original conversion matrix scheme to 28 and 128 for the two sub block and four-sub block cases, respectively. The scheme will provide improved PAPR reduction performance. In the same paper problem occurs due to the side information is also try to reduced. false side information detection degrades the bit error rate (BER) performance significantly. In this paper, we propose a novel SLM scheme without any side information by devising phase rotation and simple scrambler detection in the receiver.
S.No.: 336
Title : Survey Paper on Secure Routing in MANET
Authors Name: Miss. Vidya N. Patil
Authors Affilation: Pad. Dr. D.Y.Patil Institute of Engineering and Technology, Pimpri, Pune.
Volume & Issue No.: Volume4Issue2
Abstract: Mobile ad hoc networks (MANETs) are collections of wireless mobile devices with restricted resources and broadcast range, and no fixed infrastructure. The unique characteristics of mobile ad hoc networks pose a number of nontrivial challenges to security design, such as open peer-to-peer network architecture, shared wireless medium, stringent resource constraints, and highly dynamic network topology. Security has become a primary concern in order to provide protected communication between mobile nodes in a hostile environment. Secure ad hoc networks have to meet five security requirements: confidentiality, integrity, authentication, non-repudiation and availability. This paper focuses on different security issues in MANET, different known routing attacks and mechanisms that are used to prevent these attacks. This paper presents review for typical representatives of secure data routing protocols designed for mobile ad hoc networks, their strengths and limitations.
S.No.: 337
Title : Highly Accurate Recognition of Body Mass Index and Human Diabetics through Sensors
Authors Name: Abinash k
Authors Affilation: Dhanalakshmi srinivasan college of Engineering and Technology
Volume & Issue No.: Volume4Issue2
Abstract: Monitoring of diabetics and BMI (Body Mass Index) is used in many medical field and research applications. This paper suggests a method for performing highly accurate recognition of pressure, sugar, height from data collected by a shoe monitor (Smart Shoe) through sensors. This paper describes the prototype of the Smart Diabetic Shoe that has been developed in the context of bio-medical project. The objective is to prevent pressure from foot for diabetic persons. Signals from pressure and sugar sensors embedded in Smart Shoe are used as raw sensor data. Pressure can also be controlled by giving a minimum amount of shock. Data’s from the sensors are sending through GSM (Global System for Mobile communication) to mobile phones. In case of risks for pressure ulcer, an alert is sent to the person and/or to the clinician. A watch, a smart-phone or a distant laptop can be used for providing such alert.
S.No.: 338
Title : A Survey of Energy-Efficient, Fair Routing in MANET
Authors Name: Mrs.Sapna Choudhary, Sonal Jain
Authors Affilation: SRIT,JBP
Volume & Issue No.: Volume4Issue2
Abstract: Mobile AdHoc Networks (MANETs) also called mesh networks are self-configuring networks of mobile device connected by wireless links. MANETs are deployed in situations where there is no existing infrastructure, such as emergency search and rescue, military, etc. Each application has a different set of requirements. In this paper we concentrate on emergency search and rescue operations which rely heavily on the availability of the network. The availability is a direct cost of the overall network lifetime, i.e., energy of the nodes. The first objective of our work is to select two existing energy efficient routing protocols based on AODV, each of which is based on a different energy cost metric. We then propose the design of a protocol that is a combination of two energy cost metrics in a single protocol. The second objective is to evaluate the performance of the proposed protocol against the two protocols chosen for combination and against the traditional AODV. The performance metrics used for evaluation are packet delivery ratio, throughput, network lifetime and average energy consumed. The simulation will be done using NS2 network simulator.
S.No.: 339
Title : Learning Image Compression based on Fractal Theory
Authors Name: Dr. P. Julia Grace, Miss. Bushra
Authors Affilation: Assistant Professor & Research Supervisor M.Phil. Computer Science Scholar Department of Computer Science Mother Teresa Women’s University JBAS College for Women, Chennai.
Volume & Issue No.: Volume4Issue2
Abstract: Fractals, one of the new areas of Mathematics, are geometric or data structures which do not simplify under intensification. Fractal Image Compression (FIC) is a new method in image compression field by using a contractive transform for which the fixed points are closed to that of original image. This method is best suited for textures and natural images, relying on the fact that parts of an image often resemble other parts of the same image. In this paper, we methodically discuss the basic concepts of fractal image compression and decompression techniques. It is incredibly motivating and used in image analysis, segmentation, and recognition of medical applications.
S.No.: 340
Title : Fuzzy Logic and Genetic Algorithm for Data Mining based Intrusion Detection System: A Review Approach
Authors Name: Anshul Atre and Rajesh singh
Authors Affilation: NITM ,Gwalior (M.P.)
Volume & Issue No.: Volume4Issue2
Abstract: Along with the modernization of technological era, the technological advancement has also raised concerns about the security of web activities. These activities are in a way or the other are attempted to be compromised by the adversary with the aim of gaining knowledge which may be somehow useful for him/her. In addition, terrorists are also utilizing web for fulfilling their inhuman goals which is currently an utmost concern for security agencies. Although there are many successful attempts have been made to restrict the existence of these illegitimate people, there still is a need for an effective affirmation solution. In respect to this, data mining comes out as a solution by bringing into existence a mining concept named Terrorist Network Mining. Terrorist network mining has proved as the most feasible solution where detection and analysis of terrorists is well performed. Still there were some improvements required to this concept which was efficiently done by combining fuzzy with genetic algorithms with the intrusion detection system (IDS) resulting into significant and efficient detection process. Hence the paper discusses about how well an intrusion detection system performs when combined with fuzzy data mining (reveal patterns whose behavior is intrusive) with genetic algorithm (leads to the success of efficient detection of intruders).
S.No.: 341
Title : Applied Cryptography in Password Encryption Using Neural Networks and Binary Trees
Authors Name: Venkata Karthik Gullapalli, Rishi Verma, Rahul Brungi
Authors Affilation: Vellore Institute of Technology
Volume & Issue No.: Volume4Issue2
Abstract: Today the world depends on computers and information systems for processing information in various fields. These systems must be developed in such a way that they are less vulnerable to attacks and more reliable and secured. Internet is the biggest platform to perform various operations by individuals, organizations and government sectors and most of these operations must be classified and protected against security breach. These systems are more vulnerable to technical issues and many cases of data trawling have been reported as a result of password breaches. Encryption and decryption plays a major role in the modern era as the rate of data flow increased tremendously. Social networking sites such as Facebook and Google stores the most important and private data of people electronically in the servers. All the data stored in these servers should be secured so that they cannot be breached. Cryptography is one such security measure that is used to protect the data. Artificial intelligence took over many functions of computer systems in different fields including data security. Neural networks process information with care and certainty like human mind does. This paper proposes a methodology to implement encryption and decryption using the feed forward neural networks and to improve the security of information systems.
S.No.: 342
Title : Spark Core Based Wireless Remote Door Lock and Multiple Access Synchronization
Authors Name: Shirsankar Basu, Arshad Feeroz, Diljit PR, Neha Firdaush, Faraz Alam
Authors Affilation: Department of Computer Science and Enginereeing GuruNanak Institute of Technology West Bengal University of Technology, India
Volume & Issue No.: Volume4Issue2
Abstract: With the rapid advancement of technology, Internet usage and connectivity has grown manifold, things have become mostly mobile and innovations have taken a new turn with the seamless, ubiquitous computing accelerated by Internet of Things(IOT).The Internet of Things is the Network of Things wherein blended are several electronic modules, software packages, sensors, actuators alongside the internet connectivity to enable it to achieve greater value and service. Backed by the idea of IOT, this paper puts forward the concept of a door lock that can be controlled remotely from anywhere across the globe through an Android ADK based mobile application or a web application. In essence, the smart-lock-project concentrates on the replacement of keys with a smartphone or a computer, and also resolving the access requests issued by multiple users. For the existing hardware module, the project uses Spark Core Microcontroller equipped with the Arduino board on one side and Texas Instruments Wi-Fi Module on the other.The Spark-firmware mentioned above interleaves the background CPU activity associated with WiFi and cloud activity.
S.No.: 343
Title : An Ultimate Stack Implementation
Authors Name: D. Abhyankar, P. Saxena
Authors Affilation: School of Computer Science, D.A. University, Indore M.P. India
Volume & Issue No.: Volume4Issue2
Abstract: Stack is a fundamental data structure with a lot of applications in real world computing. For instance implementation of function calls in a compiler is an elegant application of stack data structure. Also, we can remove recursion using an implicit stack. Linked implementation and resizing array implementation are two prominent stack implementations in the literature. Linked stack involves performance overhead in the form of new and delete calls. Resizing array implementation involves O(n) as worst case running time, which is undesirable. We propose a stack implementation which is on average significantly efficient and involves O(1) as worst case running time.
S.No.: 344
Title : Review of Estimation of Reliability in Software Applications
Authors Name: Sweety, Vijaya Raju
Authors Affilation: 1Student, Computer Science & Engineering, Lovely Professional University, India
Volume & Issue No.: Volume4Issue2
Abstract: Software reliability measurement is a main technique for evaluating the performance of a performance of purposed system. On the basis of different parameters of software reliability software quality assurance has been described. Different models have been utilized for the measurement of the software reliability. In this paper different approaches have been studied that has been used for reliability measurement. In this paper different parameters that are essential for measurement of the reliability has been described. NHPP, S-Shaped, Neural Network and logistic model for software reliability measurement have been described. In this paper these approaches have been discussed in brief and results provided by these approaches has also been described.
S.No.: 345
Title : Energy consumption of intermediate node in AODV
Authors Name: khushboo parmar,shah bhavisha,asmita patel,savaliya parita,Nital Mistry
Authors Affilation: SVMIT,bharuch
Volume & Issue No.: Volume4Issue2
Abstract: A MANET (Mobile Ad-Hoc NETwork) is a network of wireless mobile nodes,without a centralized control. MANET can be characterized as unstructured Ad-Hoc mobile nodes with limited resources including energy. AODV is one of the most popular, widely accepted and researched reactive protocol of MANET. AODV doesn’t consider the residual energy and local situation of the nodes while route selection. So, sometimes the choosen route gets fail because either the node starts acting selfishly (because of their low energy) or the node gets disconnected (because of battery life). To analyse this problem, in this paper, authors have studied in detail role of the node in a communication for AODV protocol i.e source, intermediate and destination. The goal of this work is to find out where are the chances of energy being more consumed. Either as source or intermediate or as destination. For this NS-2 simulator has been used. The simulator study/research can concluded that intermediate node consume more energy.
S.No.: 346
Title : Use Of RFID In Library Management System: A Practical Implementation
Authors Name: Rishabh Jain,Sakshi Sharma, Tushar agarwal,Shivanshu Gupta
Authors Affilation: GLA Institute of Technology, Mathura
Volume & Issue No.: Volume4Issue2
Abstract: Radio-frequency identification (RFID) is an automatic identification method, which can store and remotely retrieve data using devices called RFID tags. The technology requires cooperation of RFID reader and RFID tag. The RFID based LMS facilitates the fast issuing, reissuing and returning of books with the help of RFID enabled modules. It directly provides the book information and library member information to the library management system and does not need the manual typing. This technology has slowly begun to replace the traditional barcodes on library items and has advantages as well as disadvantages over existing barcodes. The RFID tag can contain identifying information, such as a books title or code, without having to be pointed to a separate database. The information is read by an RFID reader, which replaces the standard barcode reader commonly found at a librarys circulation desk. For which utmost care has been taken to remove manual book keeping of records, reduce time consumption as line of sight and manual interaction are not needed for RFID-tag reading and improve utilization of resources like manpower, infrastructure etc.
S.No.: 347
Title : A Review of Various Routing Techniques used in Wireless Sensor Networks
Authors Name: Tarun Bhalla, Raman Kumar
Authors Affilation: D A V Institute of Engg & Technology, Jalandhar
Volume & Issue No.: Volume4Issue2
Abstract: In today’s era with the rapid advancement in the field of wireless communication highlight the concept of Wireless sensor network (WSN) and now this topic become the center of attraction for all research scholars these days. The main reason for tremendous demand of sensor network is its use in almost every field where human can’t even think to approach. Beside of number of advantages WSN has to go through number of design issues and challenges to make proper use of sensing nodes in almost all over the network to satisfy the ongoing demand of market. Wireless Sensor networks are generally used for to transmit collective information from number of nodes to one base station. To carry information from a single node to base station every node utilize some energy. The aim of wireless sensor network is to minimize the use of energy to transmit information from senor node placed at different location to base station and to achieve this number of routing protocols are designed for WSN. In this paper we are comparing various routingprotocols based on their features, operation, area in which they are used, lifetime and the amount of energy they consumed to transmit message
S.No.: 348
Title : ANALYSIS ON (15,7) BINARY BCH ENCODER AND DECODER FOR 7-BIT ASCII CHARACTERS
Authors Name: P. Mozhiarasi, C. Gayathri
Authors Affilation: 1(ME Student VLSI Design, Sri Eshwar College of Engineering, Coimbatore, Tamil Nadu, India)
Volume & Issue No.: Volume4Issue2
Abstract: In digital communication, the data is transmitted through the channel to the receiver side. If noise is included in the channel, data that is received at the receiver side will not be the actual data. This may create a corruption of data which is intolerable. In such situations, an error control must be employed so that errors may be detected and afterwards corrected. In this paper, (15,7,2) BCH encoder and decoder are designed mathematically. The block length(n), data length(k) and maximum number of correctable errors(t) are 15, 7 and 2 respectively. The encoding and decoding operates over the Galois Field GF (24) with an irreducible polynomial x4+x+1. Decoder includes 3 major steps: 1) Syndrome calculation (SC) 2) Berlekamp Massey Algorithm (BMA) 3) Chein Search (CS). The error is then corrected effectively in decoder part with the help of NAND Flash memory.
S.No.: 349
Title : A Survey on Sentence Similarity based Automatic Text Summarization Techniques
Authors Name: Renjith S R
Authors Affilation: College of Engineering Cherthala Kerala
Volume & Issue No.: Volume4Issue2
Abstract: Text Summarization is the process of generating a short summary for the document, that contains the significant portion of information.In an automatic text summarization process, a text is given to the computer and the computer returns a shorter less redundant extract of the original text.It has been an area of interest since many years.The similarity of a sentence to other sentences in the document plays a key role in summarization procedure.Several summarization methods have been developed based on this aspect.This paper performs a survey on various automatic text summarization techniques based on sentence similarity feature.Performance of different methods in terms of precision, recall and f-measure values are compared.
S.No.: 350
Title : Baseline JPEG Image Compression with K-Means Clustering Based Algorithm
Authors Name: Karri Tata Rao, Ch. Ramesh
Authors Affilation: AITAM
Volume & Issue No.: Volume4Issue2
Abstract: Applications of Digital Image Communication have increased drastically in our day to day activities. Baseline Joint Photographic Experts Group (JPEG) is the common image compression method for reducing bandwidth. Baseline JPEG Compression system comprises of a DCT unit followed by a normalizer and encoder. At the receiving end, image is reconstructed by inverse DCT. In this paper, we develop a JPEG Compression algorithm that joins K-Means clustering technique and DCT to further reduce the bandwidth requirements. Experiments are carried out with many standard images. Our algorithm proved to be giving approximately same Peak Signal-to-Noise Ratio (PSNR) as that of Base line conventional JPEG algorithm.
S.No.: 351
Title : A survey for Black hole Attack in MANET
Authors Name: ABDULLAH MUKHTAR
Authors Affilation: GALGOTIAS UNIVERSITY
Volume & Issue No.: Volume4Issue2
Abstract: Mobile Ad Hoc Network (MANET) is a major next generation wireless technology which is mostly used in future. MANET is a collection of communication devices or nodes that wish to communicate without any fixed infrastructure and predefine organization of available links. In a MANET mobile node will be increases and moveable, so that attacker will be attack by a malicious node which brings great challenges to the security of Mobile Ad Hoc network. The Black hole attack is one of such security issue in MANET. Our focus is specifically is on ensuring the security against the Black hole attack with the help of the popular routing protocol which is mostly used in MANET.
S.No.: 352
Title : A Survey on Crop Disease Detection and Prevention using Android Application
Authors Name: Santosh Reddy, Abhijeet Pawar, Sumit Rasane, Suraj Kadam
Authors Affilation: #1Asst.Prof in CSE Dept, #2 Students of CSE Dept. JCEM K.M.Gad.
Volume & Issue No.: Volume4Issue2
Abstract: Nowadays, farmers have diversified portfolio of crops in their farms. also they are trying to plant more type of crops in their farm. This kind of Experimental farming attitude of farmers sometimes responsible for huge losses because they dont predict diseases of crops at early stage. It has become more expensive to them to learn from previous experience. This article has made an attempt to study the need of an electronic expert system (android app) which help farmers to take proper decisions and improve their farming experience without suffering from heavy losses.
S.No.: 353
Title : A Review on Bengali to English Machine Transliteration System
Authors Name: Debashis Sen, Kamal Deep Garg
Authors Affilation: Dept. of Computer Science Dept. of Computer Science Lovely Professional University, Phagwara
Volume & Issue No.: Volume4Issue2
Abstract: Transliteration is the conversion of a text from one script to another. It is basically the conversion of one writing system to another. The characters from a source language are mapped to the characters of the target language. Designing a transliteration system is based on grapheme, phoneme, and correspondence and hybrid methods. In this paper, all these methods will be discussed. The idea is to develop a Bengali to English Machine Transliteration system using rule-based approach. A forward transliteration system for proper nouns, names of cities, states and rivers will be discussed in this paper.
S.No.: 354
Title : A Literature Survey of Keyframe Extraction Techniques for Video Content Summarization
Authors Name: Pritam Hilal Patil Dr. Sudeep D. Thepade
Authors Affilation: Pimpri Chinchwad College of Engineering Pune
Volume & Issue No.: Volume4Issue2
Abstract: In the current era, most of the digital information in the form of multimedia with a giant share of videos. Videos do have audio and visual content where the visual content has number of frames put in a sequence. In video summarization process, several frames containing similar information are need to get processed. This leads to redundant slow processing speed and complexity, time consumption. Video summarization using key frames can ease the speed up of video processing. Key frame extraction plays an important role in content-based video stream analysis, retrieval and inquiry. Video summarization, aimed at reducing the amount of data that must be examined in order to retrieve the information desired from information in a video, is an essential task in video analysis and indexing applications. In order to extract key frame efficiently from different type of videos. In this paper study of various techniques for key frames based video summarization available in the literature.
S.No.: 355
Title : PLC INSTALLATION ON INNER RING BORE SHG GRINDING MACHINE
Authors Name: Saurabh Waykole,Ajinkya Thorat,Nitin Sapru
Authors Affilation: Pimpri Chinchwad College of Engineering
Volume & Issue No.: Volume4Issue2
Abstract: Grinding is a process by which scrap material is removed using silica based grinding tool by continuously rubbing the inner surface of the product with the tool. Grinding is used to finish work-pieces that must show high surface and high accuracy of shape and dimension. A grinding machine, which is a type of machine, used an abrasive wheel on cutting tool. The up gradation of Inner Ring Bore SHG grinding machine is to be done using a new PLC. The multitasking controller has to use numerous spare parts for the control of grinding machine. The machine can be described from its name by:- S: Surface H: Inner G: Grinding Main Objectives:- 1. To reduce the cycle time of machine. 2. To improve the quality of the bearing. 3. To reduce the cost of maintenance. We meet our objective with the help of Mitsubishi PLC (Programmable Logic Controller) and Servo System. PLC gives following benefits as 1. More efficient and reliable 2. Improve flexibility of system and quality of the product. The new MITSUBISHI PLC has integrated parts and reduced need of spare parts. This PLC has (Human Machine Interface) HMI before connection to CPU.
S.No.: 356
Title : A Review On: Character and Digit Recognition using Optical Character Reader
Authors Name: Aman Kumar, Ambrish Gangal
Authors Affilation: 1School of Computer Science & Engineering Lovely Professional University Jalandhar, India
Volume & Issue No.: Volume4Issue2
Abstract: This paper presents Font recognition problem in Language Processing. It represents the font recognition to identify the text document. It considers those features are extracted that are not dependent on the document of text image. The very important benefit of this is that it provides the less calculation complexity, high speed and also provides less feature dimensions, to recognize the text document.
S.No.: 357
Title : Graphical Based Password Using Keystroke Dynamic Authentication System For Banking Application
Authors Name: Manisha lole
Authors Affilation: Progreesive Educatoin Society Modern College Of Engineering Shivaji nagar pune -05.
Volume & Issue No.: Volume4Issue2
Abstract: Abstract Most of the existing authentication system has certain drawbacks for that reason graphical passwords are most preferable authentication system where users click on images to authenticate themselves. An important usability goal of an authentication system is to support users for selecting the better password. User creates memorable password which is easy to guess by an attacker and strong system assigned passwords are difficult to memorize. So researchers of modern days gone through different alternative methods and conclude that graphical passwords are most preferable authentication system. The proposed system combines the existing cued click point technique with the persuasive feature to influence user choice, encouraging user to select more random click point which is difficult to guess. We are making use of encryption for sending user id and password on server from the user’s mobile phone. Once the user is authenticated he will be shown with a graphical password screen. Using graphical based password technique user’s click on the images rather than typing alphanumeric passwords. User is shown with sequence of images with 4x4 blocks; user has to select N blocks from each image. We measure KDA (Keystroke Dynamic-based Authentication) for each images click. This project proposes a new graphical-based password KDA system for touch screen handheld mobile devices. The graphical password enlarges the password space size and promotes the KDA utility in touch screen handheld mobile devices. In addition, this paper explores a pressure feature, which is easy to use in touch screen handheld mobile devices, and applies it in the proposed system.
S.No.: 358
Title : Guilt Model Assessment in Data Leakage Detection using Cloud Computing
Authors Name: Archana U. Bhosale, Prof. Sushilkumar N.Holambe
Authors Affilation: T.P.C.T. College Of Engineering. Osmanabad. 413501
Volume & Issue No.: Volume4Issue2
Abstract: R/S I sending u research paper of above title. In this paper, we develop a model for finding the guilty agents. We also present algorithms for distributing objects to agents, in a way that improves our chances of identifying a leaker. Finally, we also consider the option of adding ―fake objects to the distri-buted set. Such objects do not correspond to real entities but ap-pear realistic to the agents.
S.No.: 359
Title : Defense Mechanisms against Network Attacks: A Review
Authors Name: Abhijit Pande, Rahul Lanjewar, Rahul Pitale
Authors Affilation: RGCER,RGCER,NMIET
Volume & Issue No.: Volume4Issue2
Abstract: In the past few years there is tremendous increase in the use of internet. Open nature of the internet leads to a significant increase in the network threats. A flooding attack uses massive volumes of non-useful traffic to occupy the bandwidth of the network links or all the resources of a service. This paper reviews different network attacks and mechanism used to provide defense against those attacks.
S.No.: 360
Title : EFFICIENT MODEL FOR VIDEO TRANSMISSION BY UDP LITE PROTOCOL
Authors Name: Mayank Dubey, Surmeet Kaur
Authors Affilation: Research Scholar Asst. Proffesor Lovely Professional University, Department of computer Science, Phagwara, Punjab.
Volume & Issue No.: Volume4Issue2
Abstract: In this work we present a model that is used for transmission of video with the help of UDP Lite protocol. Before transmission of video, we are compressing the video by bitwise operator. This model is work for MJPEG format. The basic idea of this proposed model is that firstly we select the file which is in the form of video. Generally, in the computer network all the data is in the form of packets or 0’s or1’s. These packets are then compressed using bitwise operator. After compressing the packets, we will use the transport protocol that is UDP Lite Protocol. In the UDP Lite protocol checksum is used for reducing the packet loss and in this model we use a program which is called an Error Trace Program by which we can know if there is any loss of packet. Generally, we can increase the number of packets in an individual block by doing compression but only disadvantage is that some of the packets are lost. Nowadays a number of audios, videos, images files are increasing continuously on internet. During transmission of these files, sometimes bits are losses by many reasons and quality of data is reduced [7, 8]. So, this work improves the quality of data and increase the performance during transmission of data by managing the packets.
S.No.: 361
Title : Breast Cancer Diagnosis and Recurrence Prediction using Machine Learning Techniques
Authors Name: Mandeep Rana, Pooja Chandorkar, Alishiba Dsouza, Nikahat Kazi
Authors Affilation: Fr. Conceicao Rodrigues college of Engineering, University of Mumbai
Volume & Issue No.: Volume4Issue2
Abstract: Breast Cancer has become the common cause of death among women. Due to long hours invested in manual diagnosis and lesser diagnostic system available emphasize the development of automated diagnosis for early diagnosis of the disease. Our aim is to classify whether the breast cancer is benign or malignant and predict the recurrence and non-recurrence of malignant cases after a certain period. To achieve this we have used machine learning techniques such as Support Vector Machine, Logistic Regression, KNN and Naive Bayes. These techniques are coded in MATLAB using UCI machine learning depository. We have compared the accuracies of different techniques and observed the results. We found SVM most suited for predictive analysis and KNN performed best for our overall methodology.
S.No.: 362
Title : Two step authentication with data deduplication in cloud
Authors Name: Rathod Manohar Vasantrao,Prof.S.G.Vaidya
Authors Affilation: Shreeyesh college of engineering & Technology,Auranagabad
Volume & Issue No.: Volume4Issue2
Abstract: Data optimization is a method for reducing the amount of storage space an organization and wants To protect its data in most companies the data storage system contains same copies of many parts of data for example some file may be appear in several different part by different users. De-duplication reduced this unwanted copies by saving only one copy of data and exchanging the other copies with reference that parts to first copy. Also in this paper we provide the two step authentication scheme for user to protect user privacy against different types of attacks. Also we provide data privacy, integrity, authorization techniques for data storage in cloud.
S.No.: 363
Title : Contactor Logic Circuit Replacement In Die Casting Machine (LK-12T) Using MITSUBISHI PLC
Authors Name: AKHIL NAIR
Authors Affilation: PIMPRI CHINCHWAD COLLEGE OF ENGINEERING
Volume & Issue No.: Volume4Issue2
Abstract: The paper discusses the replacement of Contactor Logic Circuit (CLC) in Die Casting machine (LK-12T) with Mitsubishi PLC and Graphics Operator Terminal (GOT1000) controller. The demand for higher quality, greater efficiency and lesser downtime has lead to the need of automation in industries. Due to automation, the downtime in the industry has reduced significantly and the productivity of industries have increased to a large scale. The previously Contactor Logic Circuit in Die Casting machine is replaced by a PLC(Programmable Logic Controller) so that it has more enhanced capabilities when it comes to speed, storage, programming and power consumption. The improvement in the product quality in Die Casting machine is done by replacing the Contactor Logic Circuit with Mitsubishi FX3U-64M PLC which is being interfaced with the help of Graphics Operator Terminal(GOT1000) controller for easy maintenance. The aim of our system is to reduce the down time of the die casting machine i.e. to increase the productivity of products. Apart from down time, our objective is to improve the quality of the products. Quality defines the speed, precision and efficiency of products. Reduction of the cost of maintenance of the machine is also our prime objective.
S.No.: 364
Title : EVALUATE ACADEMIC MISCONDUCT BY UNIVERSITY STUDENTS AND FACULTIES: INVENT OF GREEN IT IN SOCIETY PERFORMANCE
Authors Name: Sudhakar Murugesan, Seenuvasan Arumugam, Nivash Thirunavukarasu
Authors Affilation: 1Lecturer, Department of Information Technology, 2Assistant professor dhaneesh Ahamed College of Engineering 1Valley View University, Techiman, Ghana, West Africa. TM 183,2 Tamil Nadu, Chennai, India
Volume & Issue No.: Volume4Issue2
Abstract: This research and proposed system is deals with both students and lecturers bio data to check the deviant behavior of students and lecturers, NAB to validate authenticity of students certification with regards to admissions into the universities in Ghana. The bio datas stored in the central point on this system. This shall mandatory for the Universities as a requirement from the National Accreditation Board (NAB) regulations. This gives the details of Lecturers and students upon request and a click of a button the eligibility of the candidates to be accepted in the tertiary institutions of Ghana. With all these records integrated on one central point, all tertiary institutions can access students and lecturers records from other institutions. Better still, there are portals for staff and students which monitors to ensure decent conduct and ethical conduct as the information on their employment can be accessed from these portals when there is misconduct in an intuition in Ghana. The government through the National Accreditation Board (NAB)/Ghana Education Service (GES)/Ministry of Education (MOE) as well as WAEC in collaboration will monitor the behavior and conduct of both students and lecturers in the university. The main aim of this research is to reduce misconduct both students, staffs and lecturers.
S.No.: 365
Title : Attacks on Phoenix Coordinate System
Authors Name: Manpreet Kaur, Akhil Sharma
Authors Affilation: Research Scholar Lovely Professional University Department of computer Science, Phagwara (Punjab)
Volume & Issue No.: Volume4Issue2
Abstract: The network coordinate system provides the easy and efficient mechanism for estimating the network latencies by assigning the virtual coordinates to every node in the network. The network latency is calculated in terms of RTT. Most of the systems relays on Euclidean model, which contains the problem of TIV. To overcome this problem, matrix factorization was introduced which has better prediction accuracy. However, the accuracy of such systems often based on good corporation of coordinates and it is assumed that they always provide correct information. But when a malicious node provides incorrect information the performance may degrade. In this work, we study the impact of different malicious activities on the phoenix coordinate system.
S.No.: 366
Title : Fuzzy rules incorporated skyhook theory based vehicular suspension design for improving ride comfort
Authors Name: Munaim Akhtar, Dr. Shahnawaz Alam, Faiz Mohd
Authors Affilation: Mech. Engg., Integral University Lucknow, India
Volume & Issue No.: Volume4Issue2
Abstract: The vehicle suspension system supports and isolate the vehicle body and payload from road vibrations due to surface roughness by maintaining a controllable damping traction force between tires and road surface. In modern luxury vehicles semi active suspension system are offering both the reliability and accuracy that has enhanced the passenger ride comfort with less power demand. In this paper we have proposed the design of a hybrid control system having a combination of skyhook theory with fuzzy logic control and applied on a semi-active vehicle suspension system for its ride comfort enhancement. A two degree of freedom dynamic model is simulated using Matlab/Simulink for a vehicle equipped with semi-active suspension system with focused on the passengers ride comfort performance.
S.No.: 367
Title : Smart Prediction of Surface Finishing Quality of EN-8 work piece by ANN model
Authors Name: Suhail Tyagi, Mohd. Suhail Siddiqui, Faiz Mohd
Authors Affilation: Mech. Engg., Integral University Lucknow, India
Volume & Issue No.: Volume4Issue2
Abstract: Turning is a material removal process a subtractive form of machining which is used to create parts of circular or rotational form of desired geometry/shape by removing unwanted material. Accuracy of any process depends on involvement of operational variables. The operating parameters that contribute to turning process are Cutting speed, Depth of cut, Feed rate. Vibrations, tool life, tool wear, surface finish and cutting forces etc are also in direct relation with values selected for process parameters. So to improve the efficiency of process and quality of the product it is necessary to control the process parameters. We have considered surface roughness the parameters with main focus as it dictates the aesthetics and sometimes ergonomical characteristics of the product. In this work a neural network is created using feed forward back propagation technique for simulation of the process using the Matlab Neural network toolbox. So with assurance of accuracy of the predictive capabilities of the neural network it was then used for optimization.
S.No.: 368
Title : Document Retrieving Using Content and Query Based value with Attribute Suggestion Techniques
Authors Name: Shaikh Ifat Mushtaque
Authors Affilation: SITRC, Nashik
Volume & Issue No.: Volume4Issue2
Abstract: Now a day, there are so many organizations today who create and share textual details of their productions, creations, and services, Such textual data contains different collection of structured information, which should be reside inside the unstructured text. Many people are wanted to search it from data sources either in educational field or industrial fields or scientific and engineering application domain. but sometimes it is so costly, expensive and some time inaccurate, when top of textual data that does not contain any required the targeted structured information. We present a novel contains some different approach which uses the query based searching data from unstructured text files that provides the generation of the structured metadata files by identifying documents that are used to contain information of required data and sometimes this information is very useful for searching data from database. As using Information Extraction algorithms which are used to extract the selected data matching with attributes from structured data relations, Our main approach is based on searching the useful information that humans are more likely to use and we will more number of attributes in our proposed system so that human gets the required data easily, efficiently and quickly but if sometimes user want to need some attributes which are present in database then we can provide facility to give suggestion for related attribute again we are adding one more approach to add more number of necessary metadata during creation time so one document can be searched by multiple attributes, if it implemented by the interface; then it is much easier for humans to identify the actual data then such information which exactly contains in the document, we make our implementation user friendly so instead of naively prompting users who can extract information that are not available in the document. As a most important part of this paper, we are presenting such algorithms which can identify structured attributes that should be appear within the document, plus we are utilizing the content of the text to search the documents and the query workload which will be implemented on unstructured data. Our experimental evaluation tells this approach generates superior results as compared to other approaches which based on the textual content or based on only the query wise, to identify selected attributes of users’ interest.
S.No.: 369
Title : A Thesis On Detection Of Mining Service Information Discovery Using SASF Crawler
Authors Name: Suganiya R, Haripriya K
Authors Affilation: 1Department of Computer science and engineering, Ratnavel Subramaniamcollege of engineering and technology, Dindigul,India.
Volume & Issue No.: Volume4Issue2
Abstract: The internet has occupies the largest place in online shopping and online transaction systems. At presentthe online shopping has became more popular by the service advertisements with various industries. The mining service information are effectively carried out through the mining service advertisements. During this process there exist three major issues such as heterogeneity, Ubiquity and Ambiguity. The proposed work of this paperis using Self Adaptive Semantic Focused Crawler –SASF crawler, this technique presents the efficient discovering of information, Formatting and indexing mining service information discovery. Here incorporating the technique of semantic focused crawling and ontology based learning to maintain the performance of the crawler. The idea of this paper is based on the design of an unsupervised framework for vocabulary-based ontology learning, and also a hybrid algorithm is used for matching semantically relevant concepts and metadata.
S.No.: 370
Title : Implementation of Storage Tiering Using OpenStack to Improve Data dynamics on Cloud Computing
Authors Name: 1. Bhagyashri N. Kulkarni
Authors Affilation: Vidyalankar Institute of Technology.
Volume & Issue No.: Volume4Issue2
Abstract: Tiered storage is the assignment of different categories of data to different types of storage media in order to reduce total storage cost. Tier 1 data is frequently accessed critical data and it should be stored on reliable and high-quality media. Tier 2 data is seldom-used less critical data and should be stored on less reliable media. As the tier number increased, less reliable (hence cheaper) media could be used. Thus, tier 3 in a 3-tier system might contain rarely used data. In OpenStack, Cinder component provides Block storage capabilities. Block storage volumes created by Cinder provide persistent block level storage for compute instance (Virtual machines). Cinder has support for numerous storage platforms. Cinder also provides support to have different type of storage devices in the backend. Storage tiering solution for OpenStack moves data across different Cinder backend based on frequency of use to save overall storage cost.
S.No.: 371
Title : DUPLICACY REMOVAL APPLICATION FOR ANDROID
Authors Name: Vaibhav Vyas ,Yogita Sinha, Karnica Sharma, Madhu Kumari,Pooja Tripathi
Authors Affilation: Banasthali Vidyapith
Volume & Issue No.: Volume4Issue2
Abstract: Duplicate removal application for android helps us to remove the duplicate data for the external as well as internal memory of a smart phone. This application will help the user to get convenient towards, not searching the duplicate file and deleting them. This application will find the duplicate files not only on the basis of the name but on the basis of content as well.
S.No.: 372
Title : Text Mining Approach to Classify Technical Research Documents using Naïve Bayes
Authors Name: Mahesh M Kini, Saroja Devi H, Prashant G Desai, Niranjan Chiplunkar
Authors Affilation: NMAM Institute of Technology, Nitte.
Volume & Issue No.: Volume4Issue2
Abstract: World Wide Web is the store house of abundant information available in various electronic forms. Since past few years, the increase in the performance of computers in handling large quantity of text data has led researchers to focus on reliable and optimal retrieval of visible and implied information that exist in the huge resources. In text mining, one of the challenging and growing importances is given to the task of document classification or text characterization. In this process, reliable text extraction, robust methodologies and efficient algorithms such as Naive Bayes and other made the task of document classification to perform consistently well. Classifying text documents using Bayesian classifiers are among the most successful known algorithms for machine learning. This paper describes implementations of Naïve Bayesian (NB) approach for the automatic classification of Documents restricted to Technical Research documents based on their text contents and its results analysis. We also discuss a comparative analysis of Weighted Bayesian classifier approach with the Naive Bayes classifier.
S.No.: 373
Title : LOGO RECOGNITION TECHNIQUE USING SIFT DESCRIPTOR, SURF DESCRIPTOR and HOG DESCRIPTOR
Authors Name: CHINMOY BISWAS, Mr. Joydeep Mukherjee
Authors Affilation: Jadavpur University KOLKATA INDIA
Volume & Issue No.: Volume4Issue2
Abstract: Logos sometimes also known as trademark have high importance in today’s marketing world. Logo or trademark is of high importance because it carries the goodwill of the company and the product. Logo matching and recognition is important to discover either improper or unauthorized use of logos. Query images may come with different types of scale, rotation, affine distortion, illumination noise, highly occluded noise. Sift descriptor, surf descriptor and hog descriptor are very good features to use among the existing techniques to recognize the logo images from such difficulties more accurately.
S.No.: 374
Title : Sybil Attack and Security Threats in MANETs
Authors Name: Ankit Gupta, Amrita Tiwari
Authors Affilation: 1PG Scholar, Oriental University Indore
Volume & Issue No.: Volume4Issue2
Abstract: Network security in mobile Adhoc network is major issue. MANET system efficiency and security is compromised to create instability, disrupt network performance reducing fault tolerance, capability and attack on confidentiality, integrity and availably of information in network .the attack on adhoc is launched mainly in network layer to reducing Trust ship of system. Open nature communication makes wireless connection prone for various security threats. This paper consist a brief review of mobile ad-hoc network along with effect and vulnerabilities into same. It also enlists and explores the challenges to derive new mechanism over security threats. Subsequently, a compressive study has performed on Sybil Attack and its effect on ad-hoc networks. Work also consider some existing solution mitigate Sybil attack. This study ends with significant identification of gap among existing solutions and techniques of implementation to Sybil attack
S.No.: 375
Title : Brain Tumor Detection Through MR Images: A Review of Literature
Authors Name: Ritu Rana, Parvinder Singh
Authors Affilation: CSE Department, Deenbandhu Chottu Ram Universitu of Science and Technology
Volume & Issue No.: Volume4Issue3
Abstract: A brain tumor is an abnormal growth of tissue in the brain or central spine that can disrupt proper brain function and creates an increasing pressure in the brain. This paper is intended to present a comprehensive review of the methods of brain tumor detection through Magnetic Resonance Imaging (MRI) technique used in different stages of Computer Aided Detection System (CAD). It also provides a brief background on brain tumors in general and non-invasive imaging of brain tumors in order to give a comprehensive insight into the field. Lastly, the paper concludes with a concise discussion and provides a direction toward the upcoming trend of more advanced research studies on brain image segmentation and tumor detection.
S.No.: 376
Title : SECURITY IN WIRELESS CELLULAR NETWORKS
Authors Name: Sobharani kuracha, K. Karthik
Authors Affilation: BVRIT, Hyderabad
Volume & Issue No.: Volume4Issue3
Abstract: In the present scenario security in wireless cellular networks plays a key role in protecting cellular data, conduct monetary transactions and send text messages. In the wireless cellular networks there are many security threats and risks associated. The present paper will throw light towards the basic features of wireless cellular technology, threats which come along with the package and their solutions. Also, the security features of the Wireless Application Protocol (WAP) used to access the Internet will be discussed. The paper will go over some new security mechanisms that have been proposed by researchers.
S.No.: 377
Title : VISUAL CRYPTOGRAPHY SCHEME FOR COLOUR IMAGES BASED ON MEANINGFUL SHARES
Authors Name: KARTHIK K
Authors Affilation: NMAMIT NITTE
Volume & Issue No.: Volume4Issue3
Abstract: A Share based visual cryptography scheme deals with sharing of image based upon splitting the image into various shares. The main concept of visual secret sharing scheme is to encrypt a secret image into n meaningless share images. It cannot leak any information about the original image unless all the shares are obtained. The original image is obtained by superimposing all the shares directly. In this paper we propose a share based visual secret sharing scheme for color images with no pixel expansion and high security. Visual Cryptography is a special technique which is used to send the images securely over the network. Simple Visual Cryptographic technique is insecure. This cryptographic technique involves dividing the secret image into n shares and a certain number of shares (m) are sent over the network. The decryption process involves stacking of the shares to get the secret image. In the current work, we have proposed a cryptographic technique for color images with encryption and decryption model. The shares are developed using XOR operation. The key generated for decryption process is sent securely over the network. This approach produces less distorted image and the size of the decrypted images is same as the original image.
S.No.: 378
Title : DISCIPULUS CURA SYSTEM BASED ON RFID AND GSM
Authors Name: RANGARAO ORUGU
Authors Affilation: VISHNU INSTITUTE OF TECHNOLOGY
Volume & Issue No.: Volume4Issue3
Abstract: In this paper an attempt is made to solve recurrent lecture attendance monitoring problem using RFID technology. The application of RFID to student for allocation of appropriate attendance scores and for further managerial attendance monitoring is capable of eliminating time wasted during manual collection of attendance and an opportunity for the educational administrators to capture face-to-face classroom statistics decisions.
S.No.: 379
Title : A Review on “Gray Hole Attack in Wireless Sensor Network”
Authors Name: Dharmendra Mishra, Sunil Patel
Authors Affilation: PG Scholar Oriental University, Indore
Volume & Issue No.: Volume4Issue3
Abstract: Sensor networks are currently used in wide spread deployment, so security issues are also a large concern in Sensor Networks, or Sensor Node Networks. Gray Hole attack is very much deleterious attack against the sensor node networks, and makes the whole networks malfunctioning, and also affects the whole sensor networks communication. In this paper I have described different defense intrigue according to my knowledge, and also as per different research papers studied. As per my knowledge, I have described drawbacks of Gray Hole Attack, or Selective Forwarding Attack, thus providing better way to understand the Gray Hole Attack in better way and the proposed solution. In the proposed solutions, I have tried to give better solutions in the sense of detection and prevention of Gray Hole Attack or Selective Forwarding attack.
S.No.: 380
Title : A Review on Multimedia Transmission Cryptographically
Authors Name: Jalpa Chaudhary
Authors Affilation: Parul institute of enginneering and technology,Waghodiya,Vadodara,Gujarat.
Volume & Issue No.: Volume4Issue3
Abstract: Advances in digital content transmission have been increased in the past few years. Security and privacy issues of the transmitted data have become an important concern in multimedia technology. Transmission of multimedia like text, audio, image and video using an approach of cryptography is more efficient due to such parameters are security, formate compliance, compression rate, Encry-ption and Decryption speed ect.
S.No.: 381
Title : A Novel Mechanism For Handover Management in PCS Networks
Authors Name: Alyaa Abdou Hamza 1, Ahmed.I.Saleh 2, Mohamed sherif elkasas3
Authors Affilation: Mansoura University, Faculty of Engineering, Department of Computer Engineering And Systems
Volume & Issue No.: Volume4Issue3
Abstract: with the development technology of mobile communication, it is important improvement of the quality of service (QOS) in PCS networks by treating problems which appear in users’ movements. Handover (handoff) is one of process which affects the quality of the call during users mobility from cell to another. In this paper, we propose a new mechanism to reduce handover problem by predicting the future movement of mobile users . This mechanism is composed of two systems to cover all probabilities, first Fuzzy Prediction Engine (FPE) is used when a mobile user has a history, it depend on 6 factors (GPS, Distance, Famous Places, Time, Date, User Profile) to predict future user mobility. Second is Ant Prediction Engine (APE) is used when a user has insufficient history or a new mobile user. It depends on neighbors’ history to predict future user mobility.
S.No.: 382
Title : A Survey on techniques for Automatic Detection of Diabetic Retinopathy
Authors Name: Kanchan Nemade
Authors Affilation: J: T: Mahajan College of Engineering; faizpur, Maharastra(425524)
Volume & Issue No.: Volume4Issue3
Abstract: Diabetic Retinopathy is a medical condition where the retina is damaged because fluid leaks from blood vessels into the retina. In extreme cases, the patient will become blind. So, early detection of DR is important. Since the presence of microaneurysm (MA) is usually the first sign of DR and occurs due to damage in the retina as a result of long term illness. Early (MA) can help to reduce the incidence of blindness and MA detection is the first step in automated screening of Diabetic retinopathy. The presence of MA and retinal bleeding in the retina is the earliest symptom of DR. The number and the shape of MA or retinal bleeding are used to indicate the severity of the disease. considering to Provide readers a view of existing work this paper reviews various existing techniques of DR detection and classification of DR into different stages based on severity levels.
S.No.: 383
Title : An Encryption Scheme Based on AES and SHA-512
Authors Name: Veerpal Kaur
Authors Affilation: Lovely Professional University
Volume & Issue No.: Volume4Issue3
Abstract: As the network is growing at a much faster rate, more people are getting involved in communication with different perspectives. Some make use of the network to provide some harm to others. In order to protect such harms, there is a need to provide security to sensitive data and integrity check to verify the data if modified. To achieve this purpose, an encryption system is provided. For confidentiality, AES along with RSA is used and for integrity purpose, SHA-512 is used. AES alone provides great speed of encryption but is insecure if key get compromised. So key is secured by RSA. RSA alone for encryption is very slow. So AES-RSA hybrid is used to achieve both targets i.e. greater security with faster speed.
S.No.: 384
Title : A Survey: Combined Impact Of Cryptography And Steganography
Authors Name: Madhura S Hegde, Aarabhi Putty
Authors Affilation: Sri Jayachamarajendra College of Engineering
Volume & Issue No.: Volume4Issue3
Abstract: Security of confidential information has always been a major issue from the past times to the present time. Steganography is a method of hiding secret messages in a cover object while communication takes place between sender and receiver whereas cryptography is a method of encrypting data and transmitting it. Both these methods do have their own short comings. This paper present two approaches namely RSA with hash LSB and S-DES with LSB, that uses the advantage of steganography and cryptography for secure data transmission.
S.No.: 385
Title : Network Security Situation Awareness System
Authors Name: Prashanth chillabatte , Puneeth Lakshmana Sankadal
Authors Affilation: Sri Jayachamarajendra college of engineering
Volume & Issue No.: Volume4Issue3
Abstract: With the rapid development of the Internet, the network structure has become larger and more complicated. Along with, attacking methods are also more sophisticated. With tremendous attacks and increasing attack types in the Internet, there is a high demand for network analysts to know about the situations of network security effectively. To enhance network security, Network Security Situation Awareness (NSSA) technology is a research hot spot in the domain of network security. NSSA provides you the high level security view of the monitoring network based upon the security alert events. Existing network security tools lack the capability of analyzing and assessing network security situations comprehensively. Complexities and diversities of the alert data from modern networks make analysis extremely a difficult one. This paper provides a general overview of what is network security situation awareness and its elements and comments on few existing frameworks of NSSA.
S.No.: 386
Title : ORGANIZATIONAL SECURITY
Authors Name: HUDA MIRZA SAIFUDDIN, SPOORTHI B.S
Authors Affilation: SRIJAYACHAMARAJENDRA COLLEGE OF ENGINEERING, MYSORE
Volume & Issue No.: Volume4Issue3
Abstract: Over the past decade, information security has been one of the most sensitive areas of concern. There has been a considerable advice practice oriented literature and research on the topic of Information security. A security policy which includes the appropriate phases of implementation, enforcement, auditing and review is vital to protecting an organization’s information security. This paper discusses a variety of highly insightful, practical and implementable approaches to assist organizations in an effort to effectively and efficiently manage information security. The purpose of this paper is so that it identifies those factors that are required to ensure successful implementation of information security
S.No.: 387
Title : An Experimental Study of Data Mining Techniques in Blood Donors Sector
Authors Name: Deepthi Srambical Poulose, Dinesh Kumar Sahu, Anil Rajput
Authors Affilation: 1M.Tech Scholar, Department of CSE, Sri Satya Sai College of Engineering , Bhopal M.P., India
Volume & Issue No.: Volume4Issue3
Abstract: In todays computer age data storage has been growing in size to unthinkable ranges that only computerized methods applied to find information among these large repositories of data available to organizations whether it was online or offline. Data mining was conceptualised in the 1990s as a means of addressing the problem of analyzing the vast repositories of data that are available to mankind, and being added to continuously. Data mining is necessary to extract hidden useful information from the large datasets in a given application. This usefulness relates to the user goal, in other words only the user can determine whether the resulting knowledge answers his goal. The growing quality demand in the blood bank sector makes it necessary to exploit the whole potential of stored data efficiently, not only the clinical data and also to improve the behaviours of the blood donors.
S.No.: 388
Title : A REVIEW PAPER ON ANDROID AMELIORATION TOWARDS DEVICE AUTOMA-TION USING EMBEDDED SYSTEM.
Authors Name: shrikant chavhan
Authors Affilation: bncoe,pusad
Volume & Issue No.: Volume4Issue3
Abstract: Nowadays automation is playing important role in human life. Device automation allows us to control household appliances like light, door, fan, AC etc. It also provides home security and emergency system to be activated. Device automation not only refers to reduce human efforts but also energy efficiency and time saving. The main objective of home automation and security is to help handicapped and old aged people which will enable them to control home appliances and alert them in critical situations. This paper put forwards the design of home automation and security system using Android ADK. The design is based on a standalone embedded system board Android ADK(Accessory Development Kit) at home. Home appliances are connected to the ADK and communication is established between the ADK and Android mobile device or tablet. The home appliances are connected to the input/output ports of the embedded system board and their status is passed to the ADK. We would develop an authentication to the system for authorized person to access home appliances. The device with low cost and scalable to less modification to the core is much important. It presents the design and implementation of automation system that can monitor and control home appliances via android phone or tablet.
S.No.: 389
Title : M-Banking Using Persuasive Cued Click Points
Authors Name: Supriya Ghadge, Snehal Kate, Vaibhav Mohite, Shweta Patil
Authors Affilation: Computer Science, RMD Sinhgad School of Engineering, Pune, India
Volume & Issue No.: Volume4Issue3
Abstract: This paper presents M-Banking using persuasive cued click points which provide high security. Now a days technology changed a lot. Every manual work is done with machine and automated software. As now the many applications requires internet connectivity it comes to point of security, Any application in the Smartphone world provides alphanumeric password which very easy to guess for attackers one picture is better than thousands of worlds, so we are using graphical password in M Banking System, which is easy to remember for user but difficult to guess by attackers. To include this technique in proposed system here we are using sha1 algorithm with persuasive clued click points. A persuasive cued click points is technique which helps user to select more secure, strong password which is difficult to guess to attackers. Cued click points is a technique in which user selects some random point on image which becomes part of graphical password, secure hash function (sha 1) algorithm provides user authentication. Our method significantly reduces the drawbacks of the current authentication method that is being used.
S.No.: 390
Title : Observe_Progress_In_Adaptive_Routing_Approach_In_Mobile_Adhoc_Network
Authors Name: Samina Anjum
Authors Affilation: G. H. Raisoni Institute of Engineering and Technology for womens
Volume & Issue No.: Volume4Issue3
Abstract: In the last few decades have tremendously increased the use of mobile communication systems. The playing area of mobile communication networks has thus been a neat area of research in the last ten. Ace of the important parameters for efficient performance of any mobile adhoc network is the routing algorithm. Yet the choice of the routing algorithm depends not just on the physical topology and geography of the network but also along the application. . In routing, hosts need to preserve up-to-date status of their immediate neighbors for making effective forwarding decisions. The periodic broadcasting of beacon packets that contain the geographical location coordinates of the nodes is a popular method used by most routing protocols to maintain neighbor status. The project offers the Adaptive Status Update strategy for routing, which dynamically adjusts the frequency of status updates based on the mobility dynamics of the guests and the forwarding patterns in the network based on nodes whose actions are harder to predict update their status more frequently, and nodes closer to forwarding paths update their Status more frequently.
S.No.: 391
Title : Improving the performance of Google file system to support Big Data
Authors Name: Ms. Pooja Mittal, Munesh Kataria
Authors Affilation: 1Assistant Professor, Department of Computer Science & Application, M.D. University, Rohtak
Volume & Issue No.: Volume4Issue3
Abstract: After doing research on Google File System, we find out some methods to improve the performance of Google file system. Google File System is a scalable distributed file system for large size distributed data-intensive applications. It provides high fault tolerance while running on inexpensive commodity hardware and it delivers high aggregate performance to a large number of clients. But there are some limitations in it such as it uses same chunk size to append and write data. Fixed chunk size decreases its performance for append data. So we will explain some methods to increase its performance by changing some attributes of typical Google File System. This paper is divided into five parts. First part presents the basic introduction of Google File System, second part provides the performance of GFS cluster for a 64 MB chunk size, third part shows the performance of real time GFS clusters, fourth part presents a method to increase the performance of GFS, and finally part fifth concludes the effect of variable size chunk on GFS.
S.No.: 392
Title : A Review: Information Security Risk Management Tools
Authors Name: SachinKumar H S, Yadunanandan Huded
Authors Affilation: 1Sri Jayachamarajendra College of Engineering, Mysore, Karnataka, India M.Tech, 2nd Semester, Computer Engineering
Volume & Issue No.: Volume4Issue3
Abstract: Information is a key asset for an organization and reducing the risk of information compromise is a high priority. There are different approaches to manage different information security risks and more are emerging every day. The fundamental objectives of these models are same but they attempt to hit the target from very different approaches. The main objective of the study is to compare and contrast the different activities, inputs, and outputs required by each model of information security risk assessment. Some models can be applied to all types of risks whereas others are specific to particular type of risks. At present, there are number of risk analysis methodologies and tools are available, some those are qualitative while others are quantitative are in nature. The common goal of these methodologies is to estimate the risk associated with the information. An organization must choose the best available methodology based on their specific requirements.
S.No.: 393
Title : Node Failure Identification and Replacement Algorithm to Enhance the Lifetime & Defending Vampire Attack in WSNs
Authors Name: Yerneni Devi Priya Poojitha, Pasumarthy Rambabu
Authors Affilation: Sasi Institute of Technology and Engineering
Volume & Issue No.: Volume4Issue3
Abstract: Abstract-- The thesis of this paper Node Failure Identification and Replacement Algorithm to Enhance the Lifetime & Defending Vampire Attack in WSNs, is to replacement the sensor nodes which will abandon due to the operational threshold or which have exhausted battery power and also used to maintain pre-existing surveillance essentially on denial of communication at the routing or MAC levels. The proposed algorithm is used to find the nodes that which were abandon and exchange the nodes which are designed by integrating both grade diffusion algorithm, genetic algorithm which are used to scrutinize resource depletion attacks at the routing protocol layer, which enduringly paralyze networks by rapidly exhausting nodes due to low battery power. It can results in fewer replacements of failure nodes in the network and reuses the routing path. I can also asset that all the examined protocols are susceptible to Vampire attacks, which are devastating and troublesome to detect and also easy to carry out using as few as one malicious insider sending through only protocol-compliant messages. In this replica, the recommended algorithm is used to increases the number of active nodes, reduces the rate of data loss, energy consumption and also reduces the effect of vampire in the network. Through this algorithm we are providing efficient battery usage in the network when compared to the existing system.
S.No.: 394
Title : WEB DATA EXTRACTION USING PARTIAL TREE ALIGNMENT
Authors Name: M.Mangala Nachar1 B.Vinitha Subhasini2
Authors Affilation: Akshaya College of Engineering & Technology,Kinathukadavu,Coimbatore
Volume & Issue No.: Volume4Issue3
Abstract: As a huge data source the internet contains a large number of worthless information, and the data of information is usually in the form of semi-structured in HTML web pages. This paper uses a new methodology to perform the task automatically. It consists of two steps, the foremost one is identifying individual data records in a page, and the next is aligning and extracting data items from the identified information data records. For the foremost process, A method based on visual information to segment of data records, which is more relevant to past methods. The next process, uses a novel partial alignment is a technique based on hierarchical parent child matching method. Partial alignment means we aligning only those data fields in a pair of data records that can be aligned (or matched) , and make none relevant information on the rest of the data fields. This approach does enables more reliable alignment in the multiple data records. The results are using a large number of Web pages from diverse domains show that the proposed two-step technique is able to segment information data history, align and retrieved data from the very well matched with relevant result. The parameters used are precision, recall and f-measure is used for evaluating the performance of the existing and proposed methods of web data extraction method. The process results prove that the proposed method is better than the existing method.
S.No.: 395
Title : Scrutinize Evolution Of Adaptive Routing Approach In Mobile Adhoc Network
Authors Name: Samina Anjum, Priyanka Fulare, Sapna Khapre
Authors Affilation: G. H. Raisoni For Womens
Volume & Issue No.: Volume4Issue3
Abstract: In the last few decades have tremendously increased the use of mobile communication systems. The playing area of mobile communication networks has thus been a neat area of research in the last ten. Ace of the important parameters for efficient performance of any mobile adhoc network is the routing algorithm. Yet the choice of the routing algorithm depends not just on the physical topology and geography of the network but also along the application. . In routing, hosts need to preserve up-to-date status of their immediate neighbors for making effective forwarding decisions. The periodic broadcasting of beacon packets that contain the geographical location coordinates of the nodes is a popular method used by most routing protocols to maintain neighbor status. The project offers the Adaptive Status Update strategy for routing, which dynamically adjusts the frequency of status updates based on the mobility dynamics of the guests and the forwarding patterns in the network based on nodes whose actions are harder to predict update their status more frequently, and nodes closer to forwarding paths update their Status more frequently.
S.No.: 396
Title : Implementation of Enhanced and Adaptive Intrusion Detection System for MANET
Authors Name: Trupti G.Ghongade,Avinash P.Wadhe
Authors Affilation: G.H.Raisoni,Amravati
Volume & Issue No.: Volume4Issue3
Abstract: Mobile Ad hoc network has become one of the most wireless communication mechanisms. Mobile Ad-hoc Networks (MANETS) is a collection of wireless nodes without any infrastructure support, every single node works as both transmitter and receiver .Nodes communicates directly with each other when they are in a same communication range. The self-configuring ability of nodes in MANET makes them popular among vital mission applications like military use or emergency recovery. However the open medium allows MANET vulnerable to attacks. Because of MANET’s distributed architecture and changing topology a traditional centralized monitoring system is no longer feasible in MANET .In this case detection should be focused as another part before an attacker can damage the structure of the system. So, this work presents various intrusion detection system named as TWOACK, AACK, ACK and Enhanced Adaptive Acknowledgement (EAACK).Enhanced intrusion detection system use digital signature technique to digitally sign packets before they are transmitted to ensure integrity and confidentiality. Keywords: Mobile Ad hoc Network (MANET), Digital Signature, Enhanced Adaptive Acknowledgement (EAACK),IDS..
S.No.: 397
Title : COMPARATIVE ANALYSIS OF PCA,DWT & Hybrid(PCA_DWT) based IMAGE FUSION TECHNIQUES
Authors Name: Jyothi, Dr. Lalitha Y. S
Authors Affilation: M.Tech Student, Digital Electronics AIET, Kalabaragi Kalaburagi, Karanataka, India
Volume & Issue No.: Volume4Issue3
Abstract: Image fusion can be defined as a combination of images from different sources aimed to obtain more informative or a more precise knowledge of the image. The main requirement of the fusion process is to identify the most significant feature in the input images and to transfer them without loss of detail in to the fused image. Depending on different fields of the applications, we have different objectives and goals for using image fusion.This paper discusses about the Formulation, Process Flow Diagrams and algorithms of PRINCIPAL COMPONENT ANALYSIS(PCA), DWT (Discrete Wavelet Transform and Hybrid (PCA_DWT) Transform based image fusion techniques. The results are also furnished in picture and table format. Paper concludes that DWT and Hybrid (PCA_DWT) is the best approach for image fusion.
S.No.: 398
Title : Modelling of Adaptable Voltage Controller and its Stability Analysis in Distributed generation System
Authors Name: Snehashish, Roshan Nayak
Authors Affilation: PG student, Department of Electrical Engineering, SHIATS-DU Naini, Allahabad, India1
Volume & Issue No.: Volume4Issue3
Abstract: A Development of Electrical Power System with increase the demand of energy creates many problems in electrical power system which causes interruption of power supply. Hence to ensure uninterrupted power supply during the load shedding or on occurrence of fault in power system a standalone generation system is used. This paper proposes a robust and reliable adaptive voltage control for a distributed generation system in a standalone operation. A stability analysis is performed to ensure the better power quality and stable operation of the system. The proposed model provides excellent voltage regulation performance, fast transient response, zero steady state error and low THD.
S.No.: 399
Title : Implementation of Enhanced & Adaptive Intrusion Detection System for MANET
Authors Name: Trupti G.Ghongade, Avinash P.Wadhe
Authors Affilation: ME Second Year Department of CSE, G.H.Raisoni College of Engg and Management, Amravati (MS),India
Volume & Issue No.: Volume4Issue3
Abstract: Mobile Ad hoc network has become one of the most wireless communication mechanisms. Mobile Ad-hoc Networks (MANETS) is a collection of wireless nodes without any infrastructure support, every single node works as both transmitter and receiver .Nodes communicates directly with each other when they are in a same communication range. The self-configuring ability of nodes in MANET makes them popular among vital mission applications like military use or emergency recovery. However the open medium allows MANET vulnerable to attacks. Because of MANET’s distributed architecture and changing topology a traditional centralized monitoring system is no longer feasible in MANET .In this case detection should be focused as another part before an attacker can damage the structure of the system. So, this work presents various intrusion detection system named as TWOACK, AACK, ACK and Enhanced Adaptive Acknowledgement (EAACK).Enhanced intrusion detection system use digital signature technique to digitally sign packets before they are transmitted to ensure integrity and confidentiality.
S.No.: 400
Title : Group Identification Based Classification Technique for Aggregated Common Data to save Memory space in Digital Forensic Investigation (DFI)
Authors Name: Amit Pratap Singh, Dr. R. C. Jain
Authors Affilation: Samrat Ashok Technical Institute, Vidisha, M.P.,India
Volume & Issue No.: Volume4Issue3
Abstract: The problem of assigning pre-defined class labels to incoming, unclassified data is called as classification. This is the domain which could be well used in forensic digital investigation. Sample of pre-classified data is the base for the class labels. There are a number of approaches that have been proposed for classification like probabilistic, information retrieval based and machine learning. And these classification methods play very vital role for forensic digital investigation. This data within a group bind to a set of patterns, and that these patterns closely correspond to, and are derived from the data of the particular group which would be very useful while handling forensic digital investigation. Proposed work shows that the effectiveness of the proposed forensic digital investigation method. This forensic digital investigation based on classification method produces the same results of forensic digital investigation while improving the memory utilization. The proposed work is implemented in MATLAB.
S.No.: 401
Title : Analytical and Experimental Investigation of Contribution of Burnished Parameters on Roughness and Micro Hardness of AA6351
Authors Name: Arvind Ghodake, Prof. Bhamre V.G. and Prof. Londhe B.C.
Authors Affilation: SND COLLEGE OF ENGINEERING & RC YEOLA (MAHARASHTRA)
Volume & Issue No.: Volume4Issue3
Abstract: Burnishing is a surface enhancement process in which plastic deformation of surface induces compressive residual stresses. It is a cold working chip less process in which material is pressed against burnishing force or pressure. By imparting compressive stresses in the surface layer, the tensile range on the component surface was reduced. From the literature it is viewed that several methods are available for inducing compressive residual stresses on component surface layer to improve mechanical properties of metal and alloys. Ball burnishing is one of the method for surface enhancement and with the effective burnishing parameter the surface finish and micro hardness of the metals or alloys gets improved. The test will carried out for AA6351 alloy material, 0.10 % Cu,0.4-1.0% Mn , 0.6 % Fe , 0.4-1.2 % Mg, 0.6-1.3 % Si and reminder is Al. The material having mechanical properties as T.S. =150-160Mpa.This AA6351 alloy is widely used in aerospace industry as well as marine industry. In this work attention is given toward a design such a tool which is suitable for burnishing operation of conventional lathe machine. The ball burnishing tool is manufactured with hard steel ball. The experimental work has been carried out considering suitable burnishing parameters as feed (mm/rev), speed (rpm), depth of penetration (mm) and number of tool passes. Keeping rest parameters constant. The kerosene is used as coolant. In this work ball burnishing process will carried out on specimens as per experimental matrix with burnishing input parameters as feed, speed, depth and number of tool passes on conventional lathe machine. After experimentation the results will be obtained for surface roughness and micro hardness for each specimen. From the experimental results as per experimental matrix the ANOVA and regression analysis will carried out to find out contribution of burnishing parameter for surface roughness and improvement in micro hardness properties of AA6351 alloy. The maximum contribution of burnishing parameter will be investigated for further burnishing operation which will give best mechanical properties for alloys.
S.No.: 402
Title : Detection And Mitigation of Distributed Denial of Service Attack by Signature based Intrusion Detection System
Authors Name: Hardik M Shingala, Mukesh Sakle
Authors Affilation: Parul Institute of Engineering and Technology, Ta.Waghodia, Limdi, Baroda.
Volume & Issue No.: Volume4Issue3
Abstract: Distributed Denial of Service (DDoS) attack is the most effective and comparatively easy to create. This attack has a terrible effect on the network. This attack can be carried out easily. But as the problem is the solutions are also for the attack. Here we propose an idea of IDS which is inside router and can protect it much better than any other protocol change. Because as we see that all protocol must need to coordinate with each other and that is not possible because not all router uses same security as ours. So to solve this problem we need to have a standalone system that can handle this kind of attack. The Intrusion Detection System (IDS) is one solution that we proposed here which will help us to identify that when the attack is going on and after that to protect our router form that attack. Here we proposed a signature based host IDS so that all the signatures of the attack is inside the IDS from the beginning and thus we can identify the packets as quickly as possible.
S.No.: 403
Title : Image Authentication by Detecting Demosaicing
Authors Name: Mr. Vinayak K. Shingote , Prof. Ruhi Kabara
Authors Affilation: Department of Computer Engineering. G.H.Raisoni College of Engineering and Management, Ahmednagar.
Volume & Issue No.: Volume4Issue3
Abstract: In this digital world we come across many image processing software that produce doctored Images with high sophistication, which are manipulated in such a way that the tampering is not easily visible to naked eye. The authenticity of a digital image has become a challenging task due to the various tools present in the photo editing software packages. There are number of ways of tampering an Image, such as splicing two different images together, removal of objects from the image, addition of objects in the image, change of appearance of objects in the image or resizing the image. This Image authentication technique detects traces of demosaicing in the complete absence of any form of digital watermark or signature and is therefore referred as passive. So there is a need for developing techniques to distinguish the photographic image from the Photorealistic Computer Generated Image, the genuine ones from the doctored ones. Estimation of demosaicing parameters is not necessary ;rather ,detection of the demosaicing is important.
S.No.: 404
Title : INSIGHTS-HAND GESTURE RECOGNITION SYSTEM AND FUTURE ASPECTS
Authors Name: NITIKA KHERA
Authors Affilation: WORLD COLLEGE OF TECHNOLOGY & MANAGEMENT, GURGAON
Volume & Issue No.: Volume4Issue3
Abstract: Now a day’s researchers around the world are actively engaged in development of robust and efficient gesture recognition system, more specially, hand gesture recognition based man-machine interface for various applications. No matter how strong and powerful , we need to be close to machines and working along with them. And that is the prime reason hand gesture has become integral part of non-verbal communication for human beings. Recognition of Gestures helps and enables the humans to interact and communicate with computers and IT devices in a natural way. Hand Gesture can be termed as interactive process of interaction without physical connectivity. The main goal is to interpret and understand Hand gestures through process of Algorithms. Gesture recognition helps in the environment known to be HMI (humans communication with the machine and interact) and that does not include touch of mechanical devices. Techniques such as Image process are at prime and sometimes use of hard ware devices become redundant as moving towards hand gesture recognition. The Literature works include working, types of Gesture Recognition, applications involved and Technology adopted with inclusion of insights on the Future Aspects of Hand Gesture Recognition Systems
S.No.: 405
Title : INSIGHTS-HAND GESTURE RECOGNITION SYSTEM AND FUTURE ASPECTS
Authors Name: NITIKA KHERA
Authors Affilation: World College of Technology & Management,Gurgaon
Volume & Issue No.: Volume4Issue3
Abstract: Now a day’s researchers around the world are actively engaged in development of robust and efficient gesture recognition system, more specially, hand gesture recognition based man-machine interface for various applications. No matter how strong and powerful, we need to be close to machines and working along with them. And that is the prime reason hand gesture has become integral part of non-verbal communication for human beings. Recognition of Gestures helps and enables the humans to interact and communicate with computers and IT devices in a natural way. Hand Gesture can be termed as interactive process of interaction without physical connectivity. The main goal is to interpret and understand Hand gestures through process of Algorithms. Gesture recognition helps in the environment known to be HMI (humans communication with the machine and interact) and that does not include touch of mechanical devices. Techniques such as Image process are at prime and sometimes use of hard ware devices become redundant as moving towards hand gesture recognition. The Literature works include working, types of Gesture Recognition, applications involved and Technology adopted with inclusion of insights on the Future Aspects of Hand Gesture Recognition Systems
S.No.: 406
Title : Bayesian Inference approach for Energy efficient Wireless Sensor Networks using Game Theory.
Authors Name: V.Vinoba and S.M.CHITHRA
Authors Affilation: R.M.K COLLEGE OF ENGINEERING AND TECHNOLOGY
Volume & Issue No.: Volume4Issue3
Abstract: Abstract: In this paper, we propose a different approach for efficiently conserving energy in wireless sensor networks. Our approach towards energy consuming in sensor networks is fully distributed to consume very low energy for finding the path along with data transmission. We use two protocols LEACH and ELEACH-M to find the route for data transmission and make its performance by comparing the route discovery of those two protocols. Bayesian inference is used to inference the missing data from the nodes that were not active during each sensing. Game theory offers mode for distributed allocation of energy resources and thus provides a way of expecting the characteristics of wireless sensor networks. We make game approach to obtain the optimal probabilities of sleep and wake up states that were used for energy conservation.
S.No.: 407
Title : Distributed Sensor Networks: A review of Optimized method of Router node Placement
Authors Name: Abhishek Kinhekar
Authors Affilation: PCST Bhopal
Volume & Issue No.: Volume4Issue3
Abstract: The recent advancements in Distributed Wireless Sensor Network has stimulated the need for the newer and enhanced version of algorithms, which will not only reduce the delay in the processing but also consumes much less power. Distributed Sensor networks are most employed and has much scope for their optimization in working. In this paper we explore to find and compare about wireless sensor network, router placement, synthesis algorithm and simulation tools of DWSN i.e Distributed Wireless Sensor networks. Keywords— wireless sensor network; router placement; synthesis algorithm; Simulation Tools
S.No.: 408
Title : Enhancing Image Security by prediction error clustering and Random Permutation methodology
Authors Name: MAHESHA.S
Authors Affilation: SJB INSTITUTE OF TECHNOLOGY
Volume & Issue No.: Volume4Issue3
Abstract: In practical scenarios,encryption should be performed before the image compression. If encryption is not performed then there may be the chances of stealing the information. Therefore we have proposed a system where encryption is done prior to the image compression. Here we have considered both the types of compression -Lossless and Lossy compression. Compression is done in the prediction domain where experts find out the prediction error of each pixel then encryption is applied on them by random permutation. Prediction domain provides the high level of security.Most of the existing ETC solutions induce significant penalty on the compression efficiency. In this paper we are proposing a new approach named as “Enhancing image security by prediction error clustering and random permutation.” where compression is applied on the clusters of encrypted image . So image received at the receiver end has all the characteristics of original image.
S.No.: 409
Title : A NOVEL CONVERTER FOR SWITCHED RELUCTANCE MOTOR
Authors Name: ALEX JOY
Authors Affilation: ADI SHANKARA INSTITUTE OF ENGNEERING AND TECHNOLOGY
Volume & Issue No.: Volume4Issue3
Abstract: Switched reluctance motor has become competitive among many application recently due its relatively simple in construction of salient pole stator and rotor. It has both salient pole stator and rotor. They use different stator constructions, including the commonly use stator with concentrated coils. . Rotor has no windings and hence it is rugged in construction. It possess the advantages of high starting torque without high inrush current. It has simple structure together with recent advances in power electronic equipment.SRM works based on this principle; when stator is excited, the reluctance torque makes rotor to move towards the minimum reluctance position. When the rotor reaches the minimum reluctance position the next phase is switched on, thus required rotating torque is produced. The ongoing research for the effective controlling mechanism for the switched reluctance motor contributed many converter topologies such as asymmetric converter, bifilar converter. A new converter topology with reduced number of switches and reduced heat loss is capable to meet the today’s existing deficiency together with property inheritance of asymmetric converter. The converter mainly concentrates to control the freewheeling time so as to minimize the magnetic saturation. Minimization of the magnetic saturation reduces the nonlinear losses, which in turn reduces the non-linearity of magnetic flux and current flown.
S.No.: 410
Title : Boost-in-Boost, Buck-in-Buck Inverters – A Review
Authors Name: ASHOK KUMAR
Authors Affilation: amity university
Volume & Issue No.: Volume4Issue3
Abstract: Abstract: There are large varieties of inverters called conventional inverters which occurs more switching loss, so these are facing much more time delay in switching. This could be minimized upto a certain limit by introduction of a new version of inverters or meaning that new generation of inverters. This paper presents a new family of high efficiency dc/ac grid-tied inverter with a wide variation of input dc voltage is called a “boost in boost, buck in buck” inverter. That means that only one power stage works at high frequency in order to achieve minimum switching loss. The minimum voltage drop of the filtering inductor in the power loop is achieved to reduce the conduction power loss in both “boost” and “buck” mode. The principle of operation explained under the equivalent circuits of a “half-bridge” single-phase inverter in both modes. Simulations show that it has a good control and system performance.
S.No.: 411
Title : IMPLEMENTATION OF RANDOM GRID VISUAL CRYPTORAPHY FOR COLOR IMAGES
Authors Name: Miss. Snehal N. Meshram1, Prof. Sneha U. Bohra2
Authors Affilation: GHRCEM, Amravat, Maharashtra, India
Volume & Issue No.: Volume4Issue3
Abstract: Visual Cryptography is a special encryption technique that encrypts the secrect image into n numbers of shares to hide information in images in such a way that it can be decrypted by the human visual system. It is imperceptible to reveal the secret information unless a certain number of shares(K) or more are superimposed. Simple Visual Cryptography is very insecure.Variable length key based Visual Cryptography for color image uses a varible length Symmetric key based Visual Cryptography scheme for color images where a secrect key is used to encrypt the image and division of the encrypted image is done useing Random Number. Unless the secrect key is known, the original image will not be decrypted. Here secrect key ensures the security of images. The proposed method introduces the concept of above scheme. Encryption process encrypts Original Image using variable length Symmetric key, gives encrypted image. Share generation process divides the encrypted images into n number of shares using random number. Decryption process stacks k number of shares out of n to reconstruct encrypted image and uses the same key for decryption. Keyword: Visual Cryptography (VS),Random Numbers, Secret Sharing, Symmetric key.
S.No.: 412
Title : Content and Query Based value for document searching Techniques
Authors Name: Ifat Shaikh
Authors Affilation: Department of computer engineering, SITRC College of engineering, Mahiravani, Nasik
Volume & Issue No.: Volume4Issue3
Abstract: Now a day, there are so many organizations today who create and share textual details of their productions, creations, and services, Such textual data contains different collection of structured information, which should be reside inside the unstructured text. Many people are wanted to search it from data sources either in educational field or industrial fields or scientific and engineering application domain. but sometimes it is so costly, expensive and some time inaccurate, when top of textual data that does not contain any required the targeted structured information. We present a novel contains some different approach which uses the query based searching data from unstructured text files that provides the generation of the structured metadata files by identifying documents that are used to contain information of required data and sometimes this information is very useful for searching data from database. As using Information Extraction algorithms which are used to extract the selected data matching with attributes from structured data relations, Our main approach is based on searching the useful information that humans are more likely to use and we will more number of attributes in our proposed system so that human gets the required data easily, efficiently and quickly but if sometimes user want to need some attributes which are present in database then we can provide facility to give suggestion for related attribute again we are adding one more approach to add more number of necessary metadata during creation time so one document can be searched by multiple attributes, if it implemented by the interface; then it is much easier for humans to identify the actual data then such information which exactly contains in the document, we make our implementation user friendly so instead of naively prompting users who can extract information that are not available in the document. As a most important part of this paper, we are presenting such algorithms which can identify structured attributes that should be appear within the document, plus we are utilizing the content of the text to search the documents and the query workload which will be implemented on unstructured data. Our experimental evaluation tells this approach generates superior results as compared to other approaches which based on the textual content or based on only the query wise, to identify selected attributes of users interest.
S.No.: 413
Title : A Survey On Importance Of Cloud Computing In E-Learning
Authors Name: Mr Dinesh Umale
Authors Affilation: Dept of Computer Science Saraswati college of shegaon
Volume & Issue No.: Volume4Issue3
Abstract: Cloud Computing Technology that have been connected strongly to our daily work and life. Cloud computing, a rapidly developing information technology has brought new change & opportunities to IT industry and in the field of education. Education plays an important role in maintaining the economic growth of a country. Now a days the classroom teaching is changing and students are becoming more technology oriented and Therefore in his changing environment, it’s important that we think about the latest technologies to incorporate in the teaching and learning process. One of the latest technologies prevailing now days is Cloud Computing. By sharing IT services in the cloud, educational institution can outsource noncore services and better concentrate on offering students, teachers, faculty, and staff the essential tools to help them succeed.. E-learning is the use of computer, electronic device, mobile and communication devices in some way to provide training, just-in-time-information, guidance from experts, and educational or learning material among learners. E-learning facilitates and enables learners to learn anytime and anywhere.
S.No.: 414
Title : A Novel Approach to network security situational awareness methods and models
Authors Name: CHINTADA SRINIVASARAO, J UDAY KUMAR
Authors Affilation: Asst.Prof, Dept of IT, AITAM, Tekkali, Srikakulam, Andhra Pradesh, India
Volume & Issue No.: Volume4Issue3
Abstract: Network is a combination of nodes (a node may be a computer, a mobile, a sensor, and any other communicating devices) in an ordered manner in which they can communicate with each other. Security threats are very often in any kind of network due to many reasons, we developed a system which can detect these threats and provide us hassle free go. But even though by having security systems like intrusion detection system, Firewalls and security scanners etc are give raise to high false positive ratio due to many reasons with them just like malfunctioning of the device, Wrong Event judgment. Due to this network security situation becomes malicious and complete vulnerable and they may rise false to NSSA. We try to solve these kinds of problems by using Knowledge based Discovery to develop an enriched Framework [2][9][11[12].
S.No.: 415
Title : Mathematical models for movement bubble in the water based on the capture images using FUJIFILM camera
Authors Name: Fatma I.Abbas , Ali Abid Dawood Al – Zuky , Anwar H.Mahdy
Authors Affilation: 1Department of Physics, College of Education, AL-Mustansiriyah University, Iraq.
Volume & Issue No.: Volume4Issue3
Abstract: Bubbles and foams are important features of liquid surface phenomena, this research Provides, the study of the movement of air bubble in the water and rising through the channel (water hose) tight, with different diameters (0.4, 0.5,0.7,1,and 1.2)cm, by using image processing technology build a computer algorithms to analysis the motion in image planes for the successive frames for extract images of video clip using FUJIFILM camera, considering the number of snapshot represents function of the time, and determine the rising bubble location, speed and Acceleration . By using suitable processing for a software package, such as programs (Ulead Studio 2011, Matlab 2012b and Table Curve(TC) version 5.01). After that using fitting processing to estimate the best fitting model for the motion parameters. Then comparing between the real motion parameter deter as a function of times and the estimated values from the estimated model. Where have been found high a agreement between them.
S.No.: 416
Title : Multi-person tracking using SG-CRF Algorithm
Authors Name: H C Sateesh Kumar, Veerendra Kumar K N, Purushottam Kumar, Rakshith D P, Sanidhya Bhardwaj
Authors Affilation: Dayananda sagar college of engineering
Volume & Issue No.: Volume4Issue3
Abstract: We present a general approach of detection between pairs of moving objects/person through long term connectivity that is achieved through extracting the features of the object in focus, based on different parameters such as motion, position, color and also the visual motion pictures that formulates the similarities and dissimilarities between the different nodes. This implements a set of feature-specific response that weighs feature contributions based on its reliability. Pair wise potential parameters are labeled and defined to overcome its complexity such as the location of exit and entry areas. We use combination of both CRF and MRF that results into SG-CRF which combines both the region and edge information to image driven terms. However the probabilistic shape and internal smoothness use presentations likewise level-set based methods. Discriminative SG-CRF is implemented in two scales, patches and pixels based, in order to obtain smooth fields based on initial image features.
S.No.: 417
Title : Blood Cell Segmentation: A Review
Authors Name: K. Mahima, Dr. Mahesh Kumar Porwal
Authors Affilation: 1M. Tech Scholar, 2Professor Department of Electronics and Communication Engineering Shrinathji Institute of Technology and Engineering, Nathdwara
Volume & Issue No.: Volume4Issue3
Abstract: The analysis of blood cells in microscope images can provide useful information concerning the health of patients; however, manual classification of blood cells is time-consuming and susceptible to error due to the different morphological features of the cells. Therefore, a fast and automated method for identifying the different blood cells is required. In this paper, we propose different methods to segment Red Blood Cell (RBC), White Blood Cell (WBC) and Platelets. Image segmentation is the most important step and a key technology in image processing which directly affect the next processing. In human blood cell segmentation cases, many methods were applied for obtaining better results. It is basically an improved visualization to observe blood cell under blood smear process. In this paper, we review some of the general segmentation methods that have found application in classification in biomedical-image processing especially in blood cell image processing. Basically, segmentation of the image divides the whole image into some unique disjoint regions. The fact that the segmented image should retain maximum useful information and discard unwanted information makes the whole process critical.
S.No.: 418
Title : New Approach to Reduce Mutation Testing Cost
Authors Name: Bouchaib Falah and Salwa Bouriat
Authors Affilation: Al Akhawayn University
Volume & Issue No.: Volume4Issue3
Abstract: Mutation testing has been neglected by researchers because of the high cost associated with the technique. To manage this issue, researchers have developed cost reduction strategies that aim to reduce the overall cost of mutation, while maintaining the effectiveness and the efficiency of testing. The purpose of this research paper is to present a new cost reduction strategy that cuts the cost of mutation testing through reducing the number of mutation operators used. The experimental part of the paper will try to implement this strategy on five different java applications. The results of the experiment will be used to evaluate the efficiency and quantify the savings of our approach compared to two other existing mutation testing strategies.
S.No.: 419
Title : A Privacy Preserving Access Control Model for Personal Health Record System
Authors Name: Grace Omole, Adekunle Y.A
Authors Affilation: Babcock University
Volume & Issue No.: Volume4Issue3
Abstract: Personal Health Record (PHR) is an evolving patient-centric model for health information exchange and for storing patients’ e-record in a centralized place. It permits patients to create, manage, control and share their health information with other users. Privacy and security in cloud computing is an important concern for both public and private sector. Cloud computing has the advantage of reducing cost by sharing computing and storage resources, combined with an on-demand provisioning mechanism relying on a pay-per-use business model. While it offers these resources, it likewise poses risks for privacy preservation and the level of assurance required to sustain assurance in would-be users. The challenges in privacy protection are sharing data while protecting personal information. The confidentiality of the medical records is a major problem when patients use commercial cloud servers to store their medical records. In order to assure the patients’ control over their own medical records, these records/ files should be preserved with high privacy and security and be encrypted before outsourcing them. In this dissertation, we propose a framework for privacy in a PHR of a patient; the design of a privacy-preserving that enables patients to keep their health information without disclosing their sensitive information to an unauthorized third party. The PHR was designed using Apache server, MySQL as the database in conjunction with PHPMyAdmin, CSS, HTML and JavaScript. The purpose of privacy is to anticipate privacy risks prior to the development of the system and assess its impact on individuals’ privacy. This helps to prevent privacy intrusion events before they occur. Keywords: Attribute Based Encryption, Cloud Computing, Privacy and PHR.
S.No.: 420
Title : A high secure symmetric encryption system based on 4D tesseract
Authors Name: ALI M. ALSHAHRANI
Authors Affilation: Computer Science and Electronic Engineering, University of Essex, Wivenhoe Park, Colchester, Essex, UK, C04 3SQ
Volume & Issue No.: Volume4Issue3
Abstract: Security issues are a major concern, especially with real-time applications that are very time-sensitive because of file size. Cryptography is one of the main techniques used to provide the necessary data security. As is well known, the concept of the cryptography is to convert the plaintext into an unreadable version on the sender side by using an encryption key. At the receiver side, the cipher-text is returned into its original situation. Of particular relevance is key space viz. the number of possible keys that can be used to generate the key from the keys container. This is very important against brute force attacks. Many algorithms have been published; however, they feature limitations pertaining to security level, encryption key size, performance speed or incompatibility with the real-time applications. In this paper, innovative 4D tesseract-based solutions (T-key) are suggested, implemented, tested and shown to overcome the drawbacks of most existing algorithms. They are based on a symmetric block cipher technique and have a large key-space (e.g. 384-bit). In this paper, three key size are suggested as examples, which are tested and evaluated: T-{0,1}128, T-{0,1}256 and T-{0.1}512. Moreover, four lightweight coding rounds are applied to create these keys from the 4D tesseract key containers. The execution speed of the T-key was compared with the AES cipher , and the results indicated that the first two encryption key sizes suggested here are faster than the first two encryption keys of AES. Furthermore, the security evaluations carried out on the suggested algorithm showed fully resistance the statistical attacks and pass the correlation coefficient test.
S.No.: 421
Title : Sentiment analysis with Radial basis function Hyperparameter apply in data classification
Authors Name: Nikita M. Kakdiya, Prof.Kamlesh M. Patel and Prof. Maulik V. Dhamecha
Authors Affilation: R.K.University
Volume & Issue No.: Volume4Issue3
Abstract: : Sentiment analysis determining the evaluation of a piece of text, that natural language processing and information extraction task that identifies the user’s views or opinions explain in the form of positive, negative or may be neutral comments of the text.In this paper, present of the Radial basis function(Rbf) as the support vector machine in data classification application. In perform hyperparameters and kernel, in hyperparameters of radial basis function in change the sigma parameters and become increase the accuracy to changes in parameters.We improve the results using hyperparameter using sigma values, Radial basis function and SVM kernel approach, Our present work uses the sentiment analysis standard datasets. These are two standard dataset gold and movie review datasets V1.0 and V2.0 of Cornell University [10] are selected, which are used by many of the researchers in the field of sentiment analysis.Movie database in 2% accuracy increase during change the hyperparameters value In their change the sigma parameters of rbf in kernel svm. And gold dataset in accuracy is increase is 1.20% and compares Naïve Bayes and kernel svm in accuracy is 5% increase.
S.No.: 422
Title : Wolf Routing to Detect Vampire Attacks in Wireless Sensor Networks
Authors Name: Prof Besty Haris
Authors Affilation: MV Jayaraman College of Engineering, Bangalore
Volume & Issue No.: Volume4Issue3
Abstract: Ad-hoc low-power wireless networks are a high price research direction in sensing and pervasive computing. Prior security work in this area has focused primarily on denial of communication at the routing or medium access control levels. This paper proposes a scheme to detect resource depletion attacks, called Vampire Attacks at the routing protocol layer, which permanently disable networks by quickly draining nodes’ battery power. The scheme is based on the preying behaviour of wolves. These “Vampire” attacks are not specific to any specific protocol, but rather rely on the properties of many popular classes of routing protocols. Most of the general protocols are susceptible to Vampire attacks, which are devastating, difficult to detect, and are easy to carry out using as few as one malicious insider sending only protocol compliant messages. In the worst case, a single Vampire can increase network-wide energy usage by a factor of O(N), where N in the number of network nodes. In this paper the author discusses about a bio-inspired Vampire attack detection method in Wireless Sensor Network using Wolf-Routing Algorithm.
S.No.: 423
Title : The Different Technologies for LDMOS device: A Review Paper
Authors Name: suman chahar
Authors Affilation: NIT Srinagar
Volume & Issue No.: Volume4Issue3
Abstract: To design a high voltage lateral double diffused metal oxide semiconductor field effect (LDMOS) device with high breakdown voltage and low on resistance, the different technologies have been used. These approaches give the best trade off between the breakdown voltage and on resistance of lateral devices. This paper gives a technical review of all these technologies concepts used for LDMOS and also discuss about applications in which lateral devices used.
S.No.: 424
Title : TO INVESTIGATE COMBINED INFLUENCE OF STEEL FIBER AND SILICA FUME ON HIGH STRENGTH CONCRETE RIGID PAVEMENT
Authors Name: Mohammed Yusuf Sagri
Authors Affilation: SKN Sinhgad College of engineering,Korti,Pandharpur,District Solapur
Volume & Issue No.: Volume4Issue3
Abstract: Fibres are generally mixed with concrete to enhance the resistance of cracking and strengthening of concrete. In this project, tests were carried out on steel fibre reinforced concrete to check the influence of fibres and silica fume on flexural strength of concrete. According to various research papers, it has been found that addition of steel fibres and silica fume enhances the strength of the concrete. In this project practical tests were carried out to find out optimum quantity of steel fibres required to achieve the maximum flexural strength for higher grades of concrete. Tests were also carried out on the concrete by placing the steel fibres in layers within the concrete at different depths. From the exhaustive and extensive experimental work it was found that with increase in steel fibre content (by weight of concrete) there was tremendous increase in Flexural strength. The minimum fibre content tested against different percentage of silica fume (5%, 10%, and 15%) and flexure strength is obtained. The experimental results were checked using linear regression technique. The results obtained by this test were used to design pavements to determine the advantages of mixing steel fibre and silica fume in high strength concrete.
S.No.: 425
Title : An Expert submission tool for criminal tracking and crime recording
Authors Name: Ritu Singh Chandel ,Tanveer Kaur Bhatia, Sagar Sharma,Shubham Mishra, Ajay Jaiswal
Authors Affilation: Student, Department of Computer Science & Engineering, CDSE, Indore (MP)-452020, India.
Volume & Issue No.: Volume4Issue3
Abstract: This paper describes a content enabling system that provides a controlled and secure mechanism for both victims and witnesses to report crimes to police. The criminal tracking and crime recording system is aimed to bridge the gap between the citizen and sheriff. Millions of crimes go unreported in our country as demonstrated by national surveys. In this paper, we aim to address the several issues and reasons that contribute to lack of reporting of crimes. We are trying to develop an online police station in order to help the citizens to report any crime without any hesitations. The online police station would provide an interface based on virtual reality to give online assistance and general information. This virtual Police station will be monitored by the on duty officer who has the rights to view new reports and also forward them to the concerned officer. The citizens would be required to register themselves to prevent any spam or fake report. During any registration the citizen is also required to submit some authentic documents like Licence, by uploading them. Citizens would have to login prior to reporting any crime whereas activities like downloading forms, checking status can be performed without a login. Each member citizen would have a unique profile where he can logon to make reports, check status of licence etc. Crimes reported by the citizen would be monitored by the Police Officers, who ensure that responses are appropriately focused, and that scarce resources are more effectively employed. This would not only assist the citizens in many ways, but the police officers will be benefited too. All the cases now can be viewed, updated and forwarded to any other police station by respective officers. Our portal would provide mechanism to store large registers that contain criminal records and other important data which may be transmitted between police stations for knowledge. This would thereby bring all the Police stations onto a common platform to share information.
S.No.: 426
Title : Vision Based Algorithm for Automatic Landing System of Unmanned Aerial Vehicles: A Review
Authors Name: Anu James, Amrutha V., Priya Haridasan
Authors Affilation: ACSP Lab, Dept. of ECE GCEK, Kannur Kerala, India
Volume & Issue No.: Volume4Issue3
Abstract: Unmanned Areial Vehicles(UAV)can be automatically landed on airbag using Vision based algorithm. This paper proposes a review on the novel algorithm based on the color and shape detection of airbag. Color- and shape-based detection vision algorithms are applied for robust detection under varying lighting conditions.It discuss about the various landing techniques used for aircrafts and Unmanned Aerial Vehicles.
S.No.: 427
Title : A Novel Data Hiding Scheme Based On Fused Adaptive and Non-adaptive Technique
Authors Name: Palak V. Keshwani, Rakesh K. Khare
Authors Affilation: 1M.Tech Scholar , Computer Science & Engineering, RIT Raipur, CSVTU Bhilai, India
Volume & Issue No.: Volume4Issue3
Abstract: Steganography is a technique of hiding the secret information. Steganography hides the existence of the secret data and make the communication undetectable. Secret data can be communicated in an appropriate multimedia carrier such as image, audio or video. Image steganography is extensively used technique. In this technique secret data is embedded within the image. Steganography techniques can be categorized into two groups - adaptive and non-adaptive. Each of these have its strengths and weaknesses. Adaptive steganography embeds the secret information in the image by adapting some of the local features of the image. Non-adaptive steganography embeds secret data equally in each and every pixel of the image. Several techniques have been proposed for hiding the secret data. Least significant bit replacement is the most common method. This is because it is simple and easy to implement. Discrete wavelet transform is also a widely used technique for embedding secret information. This paper propose a novel steganographic approach for hiding the secret data by fusing both adaptive and non-adaptive methods of steganography. This will give a more secure approach for hiding the secret information as the secret embedded image is almost same and totally indistinguishable from the original image by the human eye. Also the retrieved secret image is same as the original secret image.This is proved by means of high values for PSNR and very little values for MSE.
S.No.: 428
Title : Multi-Objective Optimization of gear design
Authors Name: Eng. Ahmad Al Sayegh
Authors Affilation: Department of Industrial Engineering, Zagazig University, Egypt
Volume & Issue No.: Volume4Issue3
Abstract: Gears not only transmit the motion and power satisfactorily but also can do so with uniform motion. The design of gears requires an iterative approach to optimize the design parameters that take care of kinematics aspects as well as strength aspects. Moreover, the choice of materials available for gears is limited. Owing to the complex combinations of the above facts, manual design of gears is complicated and time consuming. In this paper, the volume and load carrying capacity are optimized. Three different methodologies (i) MATLAB optimization toolbox, and (ii) multi objective optimization (NSGA-II) technique are used to solve the problem. In the first two methods, volume is minimized in the first step and then the load carrying capacities of both shafts are calculated. In the third method, the problem is treated as a multi objective problem. For the optimization purpose, face width, module, and number of teeth are taken as design variables. Constraints are imposed on bending strength, surface fatigue strength, and interference.
S.No.: 429
Title : Survey on Worm Spreading and Worm Detection
Authors Name: Binny Chelziah M, Aiswarya Francie Challat
Authors Affilation: Karunya University
Volume & Issue No.: Volume4Issue3
Abstract: Worms are the virulent form of abuse that have become an increasing threat to a network over a long period of time. In this paper, we analyse insecurity caused by various types of worms and by spreading, scanning and detecting those worms across the network. In spreading phase, we use the mechanism of spreading the worms from one host to another. While scanning, we perform two types of scans as quick scan and full scan. While scanning, the worms are detected and removed. This ensures security for the files in the system.
S.No.: 430
Title : A Novel Data Mining Approach for Brain Tumour Detection
Authors Name: B.V.Kiranmayee
Authors Affilation: VNRVJIET
Volume & Issue No.: Volume4Issue3
Abstract: Data mining techniques are used for mining useful trends or patterns from textual and image data sets. Medical data mining is very important field as it has significant utility in healthcare domain in the real world. The mining techniques can help the healthcare industry to improve quality of services and grow faster with state-of-the-art technologies. Technology usage is not limited to decision making in enterprises, but spread to every walk of life in all fields. This paper is focused on brain tumour detection which is an essential decision making feature and is a part of healthcare application. This paper proposed a methodology for brain tumour detection which has both training and testing phases. A prototype application has been built to demonstrate the usefulness of the proposed algorithm. The experimental results reveal that the application can be integrated with decision support systems in healthcare domain for improving quality of services.
S.No.: 431
Title : A SURVEY ON DETECTION OF SELFISH NODES IN MOBILE ADHOC NETWORKS
Authors Name: Prof.Nitin Shukla, Prof Samar Upadhaya
Authors Affilation: Anuradha Patel,MTech IVth sem,SRIT Jabalpur
Volume & Issue No.: Volume4Issue3
Abstract: Abstract- A MANET is a remote system in which hubs can go about as sender/collector or even as delegates prefer switches. Hubs in a MANET may act up with an aim to preserve assets. This happens due to restricted assets accessible for every hub. This causes an incredible effect on the whole system execution. In this paper we examine about MANET as zones and groups with a Static Agent as a focal hub and a Zonal Agent for every zone. It is a change over Mobile Agent based building design which is made conceivable in light of the fact that by presenting Zonal Agents. In this way, the framework has the capacity distinguish Selfish and Malicious Nodes with lessened measure of data trade between the hubs furthermore talk about the approaches for better after-effects of self cantered hubs and grouping approaches for hub classification.
S.No.: 432
Title : Experimental Study of SIP and Customized Satellite SIP (CSS) Protocol over Satellite Network
Authors Name: Nidhi Raja, Raju Das, Sudhir Agrawal
Authors Affilation: LJIET, ISRO/SAC , ISRO/SAC
Volume & Issue No.: Volume4Issue3
Abstract: IP datagram became de-facto standard for all most all types of communication. Satellite communication is power and bandwidth limited. IP communication protocol (like – VoIP) is not optimized for satellite network. Performance is affected by mainly three factors - long delay, limited bandwidth and channel error. To get optimum performance of VoIP standards over satellite network we need to customize or modify the existing protocols to suits the channel characteristics of satellite network. The paper presents an analysis and comparison of SIP protocol and new Designed Protocol in terms of call loss, call setup time and bandwidth utilization.
S.No.: 433
Title : Wireless Sensor Network: A Survey Article
Authors Name: Shubhi, Akhilesh Kumar Singh
Authors Affilation: United Institute of Technology, Allahabad
Volume & Issue No.: Volume4Issue3
Abstract: Wireless sensor networks (WSNs) is a distributed real time system. It plays an important role in today’s research area also provides several advantages over networks .There are various challenges in WSNs i.e. energy consumption, communication between the nodes, scalability, utilization of sensors, large scale co-ordination and so on. Many researches take place to overcome such limitations. Various protocols and algorithms are exist and also some are proposed for efficient routing in Wireless sensor network. The protocols are classified on the basis of location, mobility, quality of service (QOS), multipath, and heterogeneity and so on. In this paper we surveyed different routing protocols and also provide a comparative analysis of that protocols on the basis of some key points like scalability, mobility, localization, aggregation, load balancing, lifetime, delay etc. The goal of routing protocols is to provide the better way for transmitting the data between sensors and also source node to destination node. Here we discuss about fundamentals of wireless sensor networks, routing, and application and design objectives.
S.No.: 434
Title : An Approach to Analyze Quality of Service
Authors Name: Attiuttama, Akhilesh Kumar Singh
Authors Affilation: United Institute of Technology, Allahabad
Volume & Issue No.: Volume4Issue3
Abstract: In this paper, we review the basic of Quality of Service. The key idea is to decouple congestion measure from performance measures such as loss, queue length or delay. The resources that network needs to manage are buffer and bandwidth. Specifically, paper starts by introducing the services in QoS, buffer management scheme and scheduling. Scheduling mainly used to distinguish between the packets that selected by the scheduler for further processing. Its main goal is to improve the QoS. Buffer management used to control traffic fairly and efficiently. Also, includes two QoS framework. Integrated services (intserv) and differentiated services (diffserv). IntServ uses RSVP to reserve resources whereas DiffServ controls network traffic. Congestion in network occurs due to exceed in demand as compared to the capacity of the resources. At the end, an effort has been made to judge the performance of Drop Tail and RED. The RED introduces randomness to overcome the problem of global synchronization.
S.No.: 435
Title : Finite Element Analysis of Truck Chassis Frame
Authors Name: Monika S.Agrawal
Authors Affilation: M.E.(CAD/CAM),Lecturer Mechanical Engineering, Department, TRINITY COLLEGE OF ENGINEERING PUNE, India.
Volume & Issue No.: Volume4Issue3
Abstract: Chassis is one of the important part that used in automobile industry. it is a rigid structure that forms a skeleton to hold all the major parts together. Chassis frames are made of “steel section” so that they are strong enough to withstand the load and shock. Chassis must be light in weight to reduce dead weight on the vehicles. Major challenge in today’s automobile vehicle industry is to overcome the increasing demands for higher performance, lower weight in order to satisfy fuel economy requirements, and longer life of components, all this at a reasonable cost and in a short period of time. The study is to produce results to rectify problems associated with structures of a commercial vehicle such as strength, stiffness and fatigue properties along with stress, bending moment and vibrations. This can be achieved by static and dynamic analysis, combining existing theoretical knowledge and advanced analytical methods. Design of a Chassis is carried by using CATIA .And finite element analysis will be carried out by using ANSYS.
S.No.: 436
Title : comparative analysis of VANET routing protocols
Authors Name: sonal varshney
Authors Affilation: galgotias university
Volume & Issue No.: Volume4Issue3
Abstract: Vehicular Ad hoc Network (VANET) is a new communication paradigm that enables the communication between vehicles moving at high speeds on the roads. The main aim of our study was to identify which ad hoc routing method has better performance in highly mobile environment of VANET. Routing protocols were selected carefully after carrying out literature review. The selected protocols were then evaluated through simulation in terms of performance metrics i.e. path optimality, packet delivery ratio and transmission ratio. After simulation results, we used MATLAB to plot the graph to compare the results of selected routing protocols with each other. Based on the results of performance metrics in different environments of VANET, we realized that position based routing method of VANET outperformed the traditional ad hoc topology based routing. The selection of a single routing protocol is hard in VANET because the protocol performance depends on vehicle speed, driving environment etc. That may vary from one environment of network to another.
S.No.: 437
Title : Security in Mobile Ad-Hoc Networks-Problems & Solutions
Authors Name: Nidhi
Authors Affilation: RN College of Engineering & Technology Kurukshetra University
Volume & Issue No.: Volume4Issue3
Abstract: This paper discusses about the security issues and the current solutions in a mobile ad hoc network. Generally, mobile ad hoc netwoks are more vulnerable & are easily likely to be attacked by malicious & selfish nodes which are generally present outside the network.Due to numerous security threats,the network tend to lack authenticity & confidentiality of data routing within the network. We first analyze the main vulnerabilities in the mobile ad hoc networks, which have made it much easier to suffer from attacks than the traditional wired network. Then we discuss the security criteria of the mobile ad hoc network and present the main attack types that exist in it. Finally we survey the current security solutions for the mobile ad hoc network.
S.No.: 438
Title : Measuring Code Quality to Improve Specification Mining
Authors Name: Roshan Deshmukh, Prof. Umesh Kulkarni
Authors Affilation: A.R.M.I.E.T
Volume & Issue No.: Volume4Issue3
Abstract: Every software Industry requires the quality of code. Formal specifications are mathematically based techniques whose purposes are to help with the implementation of systems and software. They are used to describe a system, to analyze its behavior, and to aid in its design by verifying key properties of interest through rigorous and effective reasoning tools. These specifications are formal in the sense that they have syntax, their semantics fall within one domain, and they are able to be used to infer useful information. Formal specifications can help with program testing, optimization, refactoring. However, they are difficult to write manually, and automatic mining techniques suffer from 90–99% false positive rates. To address this problem, we propose to augment a temporal-property miner by incorporating code quality metrics. We measure code quality by extracting additional information from the software engineering process, and using information from code that is more likely to be correct as well as code that is less likely to be correct.
S.No.: 439
Title : Ameliorated Methodology for the Design of Sugarcane Yield Prediction Using Decision Tree
Authors Name: Ashwinirani, Dr. B. M. Vidyavathi
Authors Affilation: Professor Department of Computer Science & Engineering BITM Bellary
Volume & Issue No.: Volume4Issue3
Abstract: The productivity and quality of a Crop depends upon several parameters including but not limited to environment parameters like temperature, humidity, rainfall, wind, the quality and quantity of the pesticide, type, quantity and quality of fertilizer and so on. High productivity and yield is of utmost essentiality in a country like India where the growing population demands more grains that the field produces right now. Thus there is an urgent need to bring in more scientific studies in this direction. As amount of agricultural fields is limited and cannot be increased, it is important to get maximum productivity out of each crop. Past records of yield of a crop in different months, the known crop diseases and the weather plays a good indication as to what should be the ideal condition for high yield of a crop. However the dependencies among the parameters are so fuzzy that it is difficult to estimate the exact yield and need for exact quantity of pesticides and fertilizer to minimize the risk of crop disease, crop failure and to improve the yield. In this work a Framework is proposed that can be used to provide guidance to the farmer to detect the fault at the earlier stage to reduce losses. Decision tree, an efficient, globally competitive and vibrant classifier is used to predict sugarcane yield.
S.No.: 440
Title : Document Processing By Automatic Color Form Dropout
Authors Name: Ankush kadu , P.R. Deshmukh
Authors Affilation: sipna coet , amravati
Volume & Issue No.: Volume4Issue3
Abstract: Color dropout refer as dropping out of color form backgrounds from images of completed forms to Obtain color form dropout images retaining only the respondent information. The successful color dropout simplifies the task of extracting textual information from the image for the reader. At least one non-dropout color is selected and transformed to RGB or a Luminance-Chrominance space. Color dropout process includes scanning of image, conversion to RGB or a Luminance-Chrominance space, pixel analysis, dropout threshold detection, finally storing output ie dropout image. Processing may be performed in RGB or a Luminance-Chrominance space, such as YCBCR. Color dropout is obtained by converting pixels that have color within threshold range of dropout colors to white and all others to will keep as it is in RGB or a Luminance-Chrominance space. This approach uses a FPGA platform which lends itself to high speed hardware implementation with low memory requirements. This is done using VHDL coding. Color dropout processing result may be either represented in RGB or YCBCR. Index Terms— Color dropout, Color space conversion, FPGA, MATLAB, Threshold detection, VHDL
S.No.: 441
Title : Models for MATLAB and XSG Simulink based Edge Detection Operations
Authors Name: dushyant mankar
Authors Affilation: sipna coet amravati
Volume & Issue No.: Volume4Issue3
Abstract: Edge detection is necessary tool for extraction of information for further image processing operation. Many computer vision application use edge detectors as primary operators before high level image processing. Several algorithms are available for edge detection which makes use of derivative approach. Roberts, Prewitt , sobel, canny are some of the examples of edge detection methods. In this paper edge detection techniques are implemented using MATLAB based Simulink model and then using XSG based model. Prototype of Application Specific Integrated Circuit [ASIC] can be obtained by FPGA based implementation of edge detection algorithm for XSG based Simulink model. Comparative analysis using software and hardware is to be done. Instead of using traditional approach of programming FPGA, Xilinx System Generator [XSG] is used for programming and modeling FPGA. XSG has an integrated design flow to move directly to the bit stream file from simulink design environment which is necessary for programming the FPGA.
S.No.: 442
Title : COMPREHENSIVE SURVEY OF SECURITY ISSUES IN ROUTING PROTOCOLS OF MANETS
Authors Name: Nisha Yadav, Ritu Taneja
Authors Affilation: M.Tech, Computer Science Institute of Technology and Management University Gurgaon, Haryana
Volume & Issue No.: Volume4Issue3
Abstract: a network which consists of a number of free mobile nodes competent to move in any direction and allied from end to end through wireless links is termed as Mobile Ad hoc Networks (MANETS). MANET is basically the self-configured network supporting various modernistic applications. MANET’s security is important because of wide range of multimedia programs and software running in an infrastructure-less environment, limited power and vibrant topology making it highly susceptible to severe security issues. This paper presents a review of security threats such as dynamic and reflexive attacks, threats such as black hole and wormhole, eavesdropping, spoofing, denial of service, flooding and rushing attack etc. and summarizes the proposed solutions for handling these security liabilities by debating about various routing protocols that deliver security in MANETs.
S.No.: 443
Title : A SURVEY ON SYNCHRONOUS AND ASYNCHRONOUS PARALLEL DISTRIBUTED ALGORITHMS
Authors Name: Ajitesh S. Baghel , Rakesh Kumar Katare
Authors Affilation: Dept. of Computer Science A.P.S.Univesity, Rewa (M.P.)
Volume & Issue No.: Volume4Issue3
Abstract: In a parallel hereditary calculation (PGA) a few conveying nodal GAs advance in parallel to tackle the same issue. PGAs have been customarily used to amplify the force of serial GAs since they frequently can be customized to give a bigger effectiveness on complex hunt undertakings. This has prompted a significant number of distinctive models and executions that block direct correlations and learning trade. To fill this crevice we start by giving a typical system to mulling over PGAs. This permits us to examine the significance of the synchronism in the movement venture of parallel circulated GAs. We will demonstrate how this usage issue influences the assessment exertion and in addition the pursuit time and the speedup. Likewise, we consider prevalent development plans of panmictic (relentless state) and organized populace (cell) GAs for the islands. The assessed PGAs show direct and even super-straight speedup when keep running in a group of workstations. They likewise indicate essential numerical advantages when contrasted and their successive partners. Moreover, we generally report lower quest times for the nonconcurrent forms.
S.No.: 444
Title : Personalized Hybrid Recommendations in Tourist Guide System
Authors Name: Omkar S. Revankar, Dr.Mrs. Y.V.Haribhakta
Authors Affilation: Department of Computer Engineering College of Engineering Pune, Pune, India
Volume & Issue No.: Volume4Issue3
Abstract: Our goal is to build recommender system which takes into account tourists’ personal interests and their context; so that they can get related travel information with minimum amount of effort .This recommender system follows an ontology based approach. Ontology consists of a set of concepts related to a specific domain and the relationships among them. This ontology structure can do reasoning depending upon the preferences of a user. User profile maintains interest degrees of a user on different concepts by using a membership function. Every ontology concept is a fuzzy set and any user can fit into this fuzzy set to a specific degree. When preliminary assignment of user choices is completed, we made a downward propagation of user’s interest degrees which utilizes the taxonomical information of the ontology. The information regarding the user’s choices is propagated all over the complete set of concepts. We have also used collaborative filtering approach for recommendations. This recommender system has been successfully applied for a Tourism domain and is based on user context. This system is built on an Android platform and has produced successful results.
S.No.: 445
Title : Quality Improvement of Fingerprint Recognition System
Authors Name: Chandana, Dr. Surendra Yadav, Manish Mathuria
Authors Affilation: M.Tech. Student, Dept. of CSE, MACERC, Sirsi Jaipur
Volume & Issue No.: Volume4Issue3
Abstract: Every human in the world have unique fingerprint impressions and these unique fingerprints pattern do not change until the end of life. Due to this special property the fingerprints most usable to identify the humans and known for the most popular bio-metric identifications. But sometimes the quality of fingerprint image may be affected by some environmental or Physical factors. FRS gives the unsatisfactory results from poor quality images. Therefore Fingerprint Enhancement is a crucial part in FRS. Because most of the digital image contains the unwanted informations. These informations or noise can be removed using the enhancement techniques such as filtering. Filtering techniques also used for some other operations such as image sharpening, smoothing etc. In this paper our proposed methodology the original image is filtered using unsharp filter and the prepossessing and post processing applied. Our proposed approach is also compared to some other filters. The comparative and experimental results show that the Unsharp filter gives the better image quality.
S.No.: 446
Title : An Extended Architecture of Domain-specific Hidden Web Crawler
Authors Name: Sweety Mangla
Authors Affilation: B.S.A.I.T.M
Volume & Issue No.: Volume4Issue3
Abstract: Abstract:-The hidden web carries the high quality data and has a wide coverage. So hidden web always stand hot topic for researcher. A huge amount of data is hidden in the databases behind the search interfaces which need to be indexed so in order to serve user’s query. To index these documents appropriate, the search engine requires new indexing technique that optimizes speed and performance for finding relevant documents for a search query. Efficient index structures need to build to maintain the Hidden web data, which are then accessed to provide proper answers to many types of user’s query. In this paper, a new technique to index hidden web crawled documents is being proposed that not only indexes the documents more efficiently but also gives a classification of documents. In the technique, attributes of a query interface and their value sets are employed to index the documents. Keywords: - WWW, Surface Web, Hidden Web, Crawler, Indexing, Clustering.
S.No.: 447
Title : HADOOP -Multiple JobTrackers with master-slave replication mode
Authors Name: Dr Shubhra Saggar, Dr Nidhi Khurana
Authors Affilation: Dean Associate Professor Guru Nanak Institute of Management, (AICTE Approved) (Affiliated to GGSS IP University) Road No.-75 West Punjabi Bagh, New Delhi
Volume & Issue No.: Volume4Issue3
Abstract: The Hadoop framework has been designed, in an effort to enhance performances, with a single jobTracker (master node). Its responsibilities varies from managing job submission process, compute the input splits, schedule the tasks to the slave nodes (Task Trackers) and monitor their health .In some environments, like the IBM and Googles Internet-scale computing initiative, there is the need for high-availability, and performances becomes a secondary issue. In this environment, having a system with a Single Point of Failure (such as Hadoops single Job Tracker) is a major concern. This paper describes the concept of Hodoop and provides a redundant version of Hadoop by adding support for multiple replicated Job Trackers.
S.No.: 448
Title : Review of Exposure of Black Hole attack AODV
Authors Name: Amreen Sharif
Authors Affilation: Truba Institute of Science and Technology
Volume & Issue No.: Volume4Issue4
Abstract: Black hole attack is a category of denial of service attack in mobile ad hoc network (MANET) which broadcast itself as having the freshest or optimal route to deliver the packet from source to destination and all these kind of attacks happen due to the dynamic behavior of the wireless network. It is self configuring and infrastructure less network and uses different routing protocols to deliver the packet from one to another end such as AODV, DSR, DSDV and ZRP etc. In this paper, literature study of detection techniques of black hole attack in AODV based routing protocol is explained, also discussed are some counter measures for the analysis of black hole attack in mobile ad hoc network.
S.No.: 449
Title : Performance improvement in MANET in presence of Selfish node
Authors Name: Nirali Gondalia,Akanksha Jain
Authors Affilation: Technocrats Institute of Technology
Volume & Issue No.: Volume4Issue4
Abstract: An Ad Hoc does not have any fixed infrastructure and its node is self-configuring. Its each node works as system and router both. Generally Routing protocol of Ad Hoc designed on assumption that every node forwards each and every packet but its not true in some cases. Some node acts as selfish nodes, they uses network resources but does not co operate with other node to save resources for itself. Aim of this report is to determine the types of availability attack, malicious activity of selfish node, a Survey of techniques used to detect selfishness attack and some approach to detect selfishness attack. Here, first selfishness attack is developed and analyze its effect on packet delivery ratio, throughput and end to end delay. Then I have also developed credit based algorithm to detect and overcome the activity of selfish nodes.
S.No.: 450
Title : SURVEY ON SECURITY AND USABILITY OF KNOWLEDGE BASED AUTHENTICATION MECHANISM
Authors Name: Neha Singh
Authors Affilation: VJTI
Volume & Issue No.: Volume4Issue4
Abstract: In today’s Security Mechanism Authentication plays a vital role. Well known text-based password authentication system that have various flaws in terms of is security and usability issues which in turn create problems to users .This lead to emergence of an alternative mechanism to overcome these drawbacks. Rather than typing textual characters , graphical password involves dragging or clicking on the pictures, are considered as alternative to prevent the problems that arise from textual passwords . In this paper, a comparative study of the Knowledge based system is performed specifying the pros and cons of each of them .We have also specified various usability and security features for further research perspectives in this area..
S.No.: 451
Title : The study of XML parsers across various applications
Authors Name: Ms. P.V.Kale
Authors Affilation: P.R. Patil COET Amravati
Volume & Issue No.: Volume4Issue4
Abstract: As XML has become a standard for data representation and exchange, XML data processing becomes more and more important for server workloads like web servers and database servers.Every application that processes information from XML documents needs an XML Parser which reads an XML document and provides interface for user to access its content and structure. Parsing is a core operation performed before an XML document can be navigated, queried or manipulated. We focus on four representative XML parsing models—DOM, SAXPull, SAXPush, XOM using real time system , seing its performance on cloud and with android mobile platform In this paper we are representing the process where multi-banking transaction table as xml file and this xml file is parsed by XML parser like SAX, DOM and XOM. In it we are analyzing which parser is more efficient with respect to time and memory space. This analysis is shown by the graph, also we are analysing the performance through the android mobile platform and with the cloud. The handful of studies has been done for comparing the XML parser performance acorss various applications using different platform.Previously we have done the comparision of various parsers through .net as a platform
S.No.: 452
Title : Multipath Routing Protocol with Selfish Node Detection by using Cluster Based Reputation Technique
Authors Name: Prashant Kumar Tripathi and Ashutosh Kumar
Authors Affilation: Department of Computer Science & Engineering, Shri Ramswaroop Memorial University, Lucknow, India
Volume & Issue No.: Volume4Issue4
Abstract: Abstract: Mobile Ad-hoc Networks (MANETs) is self configured and decentralized wireless network without any predefined infrastructure [1]. Every node acts as a router so routing may be more difficult in MANET due to freely movement of nodes. Most of the routing algorithms designed for MANET are based on the assumption that every node forwards every packet but in practice it may not possible because some of the nodes may act as the selfish nodes which use the network and its services but they do not cooperate with other nodes. This paper basically based on the concept of multipath routing in which we have evaluated the performance of a widely used on-demand multipath routing protocol called AOMDV with Selfish Node Detection (SND) using cluster based reputation technique. The selfish nodes have detected by dividing the networks into small clusters restricted within one hop distance and assuming the lowest mobility node as cluster head. The cluster head decides the selfishness of a node by monitoring the reputation value. In multipath scenario, AOMDV has been selected due to efficiency over other protocols in aspects of reducing routing load, delay, etc. The evaluation of AOMDV protocol by detecting selfish nodes is carried out in terms of data packet loss, average end to end delay and throughput.
S.No.: 453
Title : Authentication Playground for SaaS Connection: An Approach
Authors Name: Prakash Hiremath, Dr P Jayarekha
Authors Affilation: BMSCE Bangalore
Volume & Issue No.: Volume4Issue4
Abstract: The Cloud has increased the demand for integrating between services. Companies want to connect from on-premises apps to cloud services and from cloud services to cloud services and these connections need to be secure and governed for performance. In a Cloudstreams environment developing of an Enterprise connector for any service provider involves understanding of the authentication method used in order to connect and make API calls to the Software as a Service (SaaS) provider. To develop multiple connectors, it is good to have a single place to generate authentication data for standard authentication mechanism like OAuth 1.0, OAuth 2.0 so that authentication data can be generated easily without much overhead. Calculating authentication data for customized authentication, involves extra steps which will be time consuming for end user and also for connector developer to follow the steps. For REST based connector, the basic authentication mechanisms that often used are OAuth 1.0, OAuth2.0 , Customized OAuth with provider specific User Id or credentials. For SOAP based connector, the authentication schema is usually basic credentials. The credentials will be passed in the header for each operation or a Session Id( generated from the login operation) will be passed in the header information for the operation. Here a new approach has been proposed to have single authentication playground to generate authentication data in order to connect and make an API call through connector. In Cloudstreams, this playgorund helps to build the connector faster without the overhead of Authentication data. The same can be referred to customer since it eases the authentication data generation to connect and use the APIs.
S.No.: 454
Title : SUPER RESOLUTION IMAGE GENERATION USING WAVELET DOMAIN INTER POLATION WITH EDGE EXTRACTION VIA A SPARSE REPRESENTATION
Authors Name: U.RAKESH, Mrs. T.K.LAKSHMI, Mr. Dr.V.V.krishna , Mr. P RAVINDRA REDDY
Authors Affilation: Department Department of Computer Science and Engineering, S.V College of Engineering TIRUPATHI
Volume & Issue No.: Volume4Issue4
Abstract: This letter addresses the problem of generating a super-resolution (SR) image from a single low-resolution (LR) input image in the wavelet domain. To achieve a sharper image, an intermediate stage for estimating the high-frequency (HF) sub bands has been proposed. This stage includes an edge preservation procedure and mutual interpolation between the input LR image and the HF sub band images, as performed via the discrete wavelet transform (DWT). Sparse mixing weights are calculated over blocks of coefficients in an image, which provides a sparse signal representation in the LR image. The entire sub band images are used to generate the new high-resolution image using the inverse DWT. Experimental results indicated that the proposed approach outperforms existing methods in terms of resolution This stage includes an edge preservation procedure and mutual interpolation between the input LR image and the HF sub band images, as performed via the discrete wavelet transform (DWT). Sparse mixing weights are calculated over blocks of coefficients in an image, which provides a sparse signal representation in the LR image. All of the sub band images aroused to generate the new high-resolution image using the inversed. Experimental results indicated that the proposed approach outperforms existing methods in terms of objective criteria and subjective perception improving the image resolution
S.No.: 455
Title : Digital Watermarking on CameraCaptured Color Images
Authors Name: Ms. Ankita P. Deshmukh, Dr. S.R.Suralkar
Authors Affilation: Department of Electronics and Telecommunication Shram Sadhna Bombay Trust College Of Engineering and Technology ,Jalgaon , India
Volume & Issue No.: Volume4Issue4
Abstract: Digital watermarking provides secured communication. Due to vast expansion of Internet, digital data such as audio, images and videos has been used on a large scale for communication. To protect these digital media it is essential to use digital watermarking for authentication, copyrights and security purposes. This paper describes the detail concept of digital watermarking and the main contribution in the field of steganography. In image Steganography, a secret communicationis achieved to hide a message into cover image (the original image where the message is been incorporated) and generate a stenographic-image (image with the incorporated message).
S.No.: 456
Title : DESIGN AN ALGORITHM FOR SOFTWARE DEVELOPMENT IN CBSE ENVIRONMENT USING FEED FORWARD NEURAL NETWORK
Authors Name: Prof.(Dr.) Amit Verma and Er. Pardeep kaur
Authors Affilation: Chandigarh university Gharuan Punjab
Volume & Issue No.: Volume4Issue4
Abstract: In software development organizations, Component based Software engineering (CBSE) is emerging paradigm for software development and gained wide acceptance as it often results in increase quality of software product within development time and budget. In component reusability, main challenges are the right component identification from large repositories at right time. The major objective of this work is to provide efficient algorithm for storage and effective retrieval of components using neural network and parameters based on user choice through clustering. This research paper aims to propose an algorithm that provides error free and automatic process (for retrieval of the components) while reuse of the component. In this algorithm, keywords (or components) are extracted from software document, after by applying k mean clustering algorithm. Then weights assigned to those keywords based on their frequency and after assigning weights, ANN predicts whether correct weight is assigned to keywords (or components) or not, otherwise it back propagates in to initial step (re-assign the weights). In last, store those all keywords into Repositories for effective retrieval. Proposed algorithm is very effective in the error correction and detection with user base choice while choice of component for re usability for efficient retrieval is there. To check the results of our algorithm based on factors like accuracy, precision and recall compare with existing technique i.e. integrated classification scheme for retrieval of components based on keyword search and results are so encouraging.
S.No.: 457
Title : An iterative method in asynchronous system using asynchronous algorithms
Authors Name: Ajitesh S. Baghel , Rakesh Kumar Katare
Authors Affilation: Dept. of Computer Science A.P.S.Univesity, Rewa (M.P.)
Volume & Issue No.: Volume4Issue4
Abstract: In this paper, we exhibit a couple of established iterative routines for tackling straight comparisons; such systems are broadly utilized, particularly for the arrangement of vast issues, for example, those emerging from the discretization of direct fractional differential mathematical statements. We depict the iterative or aberrant strategies, which begin from a close estimation to the genuine arrangement and if joined, determine a grouping of close estimates the cycle of reckonings being rehashed till the obliged exactness is gotten. It implies that in iterative routines the measure of calculations relies on upon the exactness needed.
S.No.: 458
Title : A Review on: An approach of misclassification Detection and Correction in Optical Character Recognition
Authors Name: Aman Kumar
Authors Affilation:
Volume & Issue No.: Volume4Issue4
Abstract: This paper introduces a complete Optical Character Recognition (OCR) framework for picture/illustrations inserted literary records for handheld gadgets.. At first, we have showed the misclassification encountered in previous works. Then we have discussed our implementation where content are separated and skew rectified. At that point, these locales are binarized and segmented into lines and characters. Characters are gone into the acknowledgment module. Trying different things with an arrangement of pictures, we have accomplished a greatest acknowledgment precision.
S.No.: 459
Title : Iris Recognition System Using Circular Hough Transform
Authors Name: Mrigana walia, Dr. Shaily Jain
Authors Affilation: Computer Science Department Chitkara university (Baddi (H.P))India
Volume & Issue No.: Volume4Issue4
Abstract: Based on specific features of an individual, the biometric system identify a person automatically. There have been many developments of biometric systems especially for identification using biometrics. Typically, iris recognition uses the approach of computer vision and image processing. These methods contain different stages like image segmentation, feature extraction, image recognition and image normalization. As sound measure, Iris Biometry has been proposed. In the iris segmentation step, localization of the iris region in the image will be done. For many algorithms and assuming near-frontal representation of the pupil, the iris boundaries are shown as two circles. The inner circle is the boundary between the pupil and iris whereas the outer circle is the limbic boundary between the iris and the sclera. After that the normalization stage changes segmented image into the rectangular block to insure the removal of dimensional inconsistencies present. The feature extraction step encodes the particular iris image texture into standard bit vector code. The relative matching stage estimates the distance between converted codes and gives the rate of recognition for the systems. Biometrics is globally applicable in many fields like restricted access to secure facilities and Labs, verification of secured financial transfers, protection from welfare frauds and immigration checking while visiting other countries. An iris recognition system is proposed here having four steps. First one, image segmentation which is achieved using Canny Edge Detector then iris Circular Hough transformation (CHT) is second step to localize the pupil and iris regions. In third step segmented iris is normalized and features are extracted using standard symlet wavelet 4. Finally in last step, the comparison of iris code is done. After comparing with existing system, a high recognition rate is obtained whereas the FAR and FRR values obtained remain low for our proposed system.
S.No.: 460
Title : Comparative Study of Relational Database Tampering Detection Techniques
Authors Name: Tushar Jagdish Yerne and Rajashree A. Shedge
Authors Affilation: Department of Computer Engineering Ramrao Adik Institute of Technology Nerul, Navi Mumbai,India
Volume & Issue No.: Volume4Issue4
Abstract: Database Tampering detection has important role in Database Management System. Data is the most valuable thing today from an individual to an organization. Because of its large volume and useful information database contains, it is vulnerable and are more prone to attacks. Database Forensic is a new and important field which helps to analyze, identify attacks made in the database and make provisions to prevent databases from such attacks by making use of Database Forensic tools. To provide the security to the Data Storage has become requirement of our time. In this report, we compare three different techniques used in Relational Database Tampering Detection which are B+ Tree, Forensic Scrutiny Technique and Fragile Watermarking in terms of the tampering detection rate and time complexity.
S.No.: 461
Title : NEW TRANSMISSION CODING SCHEME FOR MIMO-OFDM SYSTEM
Authors Name: Shrikant G. Vaidya, Sonal Honale
Authors Affilation: Department of Computer and wireless communication & computing Abha Gaikwad Patil college of engineering, Nagpur University, India
Volume & Issue No.: Volume4Issue4
Abstract: In this paper presentation on pilot data coding in channel for MIMO-OFDM (Multiple Input Multiple Output- Orthogonal Frequency Division Multiplexing) combination of both are increases the bit error rate performance for mobile wireless cellular system. We developed a new transmission coding scheme for MIMO-OFDM system for inter sub channel interference (ICI) self cancellation over high mobility fading channels between transmission and receiving processing .We transmit pilot data through the transmitting antennas signal via encoding system through the channel at receiver end this encoding data are decoding by decoding system than it use by the user.
S.No.: 462
Title : Data Hiding MPEG-4/AVC Video Streams
Authors Name: T.R Pavan kumar, C.H.Lawrence Dheeraj, S.Narasimhulu
Authors Affilation: Assistant Professor Dept of CSE, S.V College of Engineering, Tirupati, AP, India
Volume & Issue No.: Volume4Issue4
Abstract: In this paper, a novel scheme of data hiding directly in the encrypted version of MPEG-4/AVC video stream is proposed, which includes the following three parts, i.e., MPEG-4/AVC video encryption, data embedding, and data extraction. By analysing the property of MPEG-4/AVC codec, the code words of intraprediction modes, the code words of motion vector differences, and the code words of residual coefficients are encrypted with stream ciphers. Then, a data hider may embed additional data in the encrypted domain by using codeword substitution technique, without knowing the original video con- tent. In order to adapt to different application scenarios, data extraction can be done either in the encrypted domain or in the decrypted domain. Furthermore, video file size is strictly pre- served even after encryption and data embedding. Experimental results have demonstrated the feasibility and efficiency of the proposed scheme
S.No.: 463
Title : Improved Authentication Scheme using Password enabled Persuasive Cued Click Points (IPCCP)
Authors Name: Neha Singh, Swaomya Raksha
Authors Affilation: Software Engineering Veermata Jijabai Institute Of Technology Mumbai, Maharashtra
Volume & Issue No.: Volume4Issue4
Abstract: In Todays world Authentication plays a vital role. Traditionally text based passwords are used for authentication which have several drawbacks. The study shows that graphical pictures could be used for authentication which have advantages over text based password. Shoulder surfing and hotspot are the two main issues in Graphical passwords. Sonia Chiasson et. al. proposed the method of a persuasive cued click-point which reduces the hotspot problem, but provides no security mechanism for shoulder surfing attack [1]. In order to address these issues, the proposed work enhances the persuasive cued click point based method with a major change, having a additional invisible password input for each points. Moreover concept of fingerprinting is used to ensure that the system is securely used by users.
S.No.: 464
Title : Recent Trends comprehensive survey of Asynchronous Network and its Significant
Authors Name: Ajitesh S. Baghel, Rakesh Kumar Katare
Authors Affilation: Dept of Computer Science A.P.S. University, Rewa, India
Volume & Issue No.: Volume4Issue4
Abstract: Advancement in electronics and computer architecture has opened new domains of the parallel and distributed computing. The advent of the Multi Core CPU’s with the blending of the open MPI techniques has give the wings to the distributed computing with assurance of the parallelism. In this proposal, various important aspects of asynchronous algorithms and its data structures for parallel and distributed architecture will be investigated. This article has proposed and will examine networks of processor for asynchronous system to compute faster for more iteration. The complexity of interprocessor communication will be investigated. Hence efficient asynchronous algorithm is main concerned of the study for MPI systems.
S.No.: 465
Title : DESIGN & SIMULATION PARALLEL PIPELINED RADIX -2^2 FFT ARCHITECTURE FOR REAL VALUED SIGNALS
Authors Name: Madhavi Suresh Kapale
Authors Affilation: Vidarbha Institute if Technology
Volume & Issue No.: Volume4Issue4
Abstract: ABSTRACT- The efficient implementation of FFT/IFFT processor for OFDM applications is presented. Indeed, the proposed radix-2^k feed-forward architectures require fewer hardware resources than parallel feedback ones, also called multi-path delay feedback (MDF), when several samples in parallel must be processed. Multiplier make a parallel connection will give output in one clock cycle ,independent of the number cases form bit multiplier it requires n clock cycle which makes it slow so, for 16 clock cycle while in our case output will come in one clock cycle, when several samples in parallel must be processed. Multiplier make a parallel connection will give output in one clock cycle ,independent of the number cases form bit multiplier it requires n clock cycle which makes it slow so, for 16 clock cycle while in our case output will come in one clock cycle. Keywords: Parallel, Radix-22 ,FFT, IFFT, OFDM, Modified FFT/IFFT, OFDM, Pipeline, spectral efficiency.
S.No.: 466
Title : Optimizing Object Design Model in Software Engineering
Authors Name: Zeynab Rashidi
Authors Affilation: Department of Mathematics and Computer Science, AmirKabir University of Technology
Volume & Issue No.: Volume4Issue4
Abstract: One of the modern paradigms to develop a system is object oriented analysis and design. The analysis model focuses on the functionality of the system and does not take into account system design decisions. During object design, we transform the object model to meet the design goals identified during system design. A major challenge, here, is that the direct translation of a design model into source code is often inefficient. In this paper, we make a survey on optimizations used in software design and architecture. Then, we present several techniques that can be used in optimizations of design, consisting of revising class design, maximizing inheritance, adding associations to optimize access paths, collapsing objects into attributes, delaying expensive computations, and caching the results of expensive computations. These techniques certainly improve efficiency in software design.
S.No.: 467
Title : Scalable and Secure Sharing in Cloud Computing Using Data Manipulation & Encryption
Authors Name: Aakanksha maliye
Authors Affilation: GHRCEM PUNE
Volume & Issue No.: Volume4Issue4
Abstract: Personal health record is using for maintaining the patient’s personal and diagnoses information using one centralize server. Under the health information exchange server PHR is an emerging patient centric data model which is supposed to be outsources on the third party servers like cloud servers. The security scheme are mostly used for provide security of personal health record form public access at online. In this paper used encryption method is a promising method to assure patient’s control over their own PHR’s before outsourcing. Few such issues like privacy concern, scalability, flexibility and efficient user revocation are remained the most important challenges. To achieve secured and scalable data access control for PHRs, in this paper leverage attribute based encryption technique to encrypt each patient’s PHR file. Different from existing system in secure data outsourcing , in this paper focus on the multiple data owner scenario in PHR system into multiple security domain that greatly reduce the key management complexity for owners & users. The paper is also enables user revocation on dynamic modification of access policies or file attribute.
S.No.: 468
Title : A SURVEY ON GRAPHIC PASSWORD AUTHENTICATION SCHEME
Authors Name: Shiksha Saxena
Authors Affilation: m.tech student
Volume & Issue No.: Volume4Issue4
Abstract: A graphical password is an authentication system that works by having the user select from images, in a specific order, presented in a graphical user interface (GUI). For this reason, the graphical-password approach is sometimes called graphical user authentication (GUA).A graphical password is easier than a text-based password for most people to remember. Graphical passwords may offer better security than text-based passwords because many people, in an attempt to memorize text-based passwords, use plain words (rather than the recommended jumble of characters).
S.No.: 469
Title : PREVENTING SYBIL ATTACK USING ANTI-IMAGE SPAMMING TECHNIQUE
Authors Name: Salil Puri, MUKESH KUMAR
Authors Affilation: AISECT UNIVERSITY Bhopal, M.P.
Volume & Issue No.: Volume4Issue4
Abstract: Sybil Attack as of multiple identities for malicious intent named after the famous multiple personality disorder patient "Sybil”. This particular attack has been used by spammers to create multiple websites or id’s with identical domain names with junk and duplicate content. These pages have no quality content and are created just with the intention to create spam and drive traffic .All these webpages are interlinked to each other in order to boost their search engine traffic. In Sybil attack each node can be preferred to as a separate webpage that the spammer creates, and each of these webpages interlink to each other thus forming a network similar to link farms. The spamming webpages link to other nodes and thus create a huge linked for improving popularity. In this paper we are introduce anti-image spamming technique for preventing to Sybil attack to attackers .Our objective is to work on to the real time research desired scenario where the work is needed to be done. Sybil attack is one of the scenario where a work has been done to deal with Sybil attack efficiently in some of the field but still there are more has to be done which we want to carry forward with the help of spamming image detection and prevention technique with the help of image anti-spamming technique. In our main objective is to remove or block unwanted Sybil attack on the basis of images.
S.No.: 470
Title : HEAD CONTROLLED MOUSE AND KEYBOARD
Authors Name: Siddhant Wadhwani
Authors Affilation: V.E.S Institute of Technology, Mumbai
Volume & Issue No.: Volume4Issue4
Abstract: This paper is about an improved design of human computer interface using wireless and accelerometer technology, for comfortable interaction with computer and will be of great use to physically challenged people. A Wireless Gesture Controlled Human Computer Interface enables us to use a computer by intuitive head and eye motions in the air. While using this we can move the cursor by forming a gesture and click by blinking the eye. These functions are implemented by using 3-axis accelerometer and our device wirelessly communicates with the PC and we use a ps/2 to USB interface. Unlike normal mouse we don’t require a flat surface, anyone can use this and can use it from anywhere by not just being fixed to a particular place.
S.No.: 471
Title : EFFECTIVE ASSESSMENT OF SOFTWARE RELIABILITY BY USING NEURO-FUZZY SYSTEM
Authors Name: Bonthu Kotaiah, R.A. Khan
Authors Affilation: Assistant Professor, Maulana Azad National Urdu University, Hyderabad, India
Volume & Issue No.: Volume4Issue4
Abstract: Quality is neither visible nor tangible and it is immeasurable. This is a physical feeling of the user which causes happiness or comfort with respect to a particular aspect. For instance if a user experience a