Current Issues

To view Current Issues Click Here

A Novel Security Protocol for VANET
Authors : B. Divya, Dr. Ch. Mallikarjuna Rao,
Affiliations : Department of Computer Science and Engineering Gokaraju Rangaraju Institute of Engineering and Technology, Hyderabad, India
Abstract :

af

Vehicular ad-hoc network (VANET) has recently received signi?cant considerations to enhance traf?c security and ef?ciency. Notwithstanding, correspondence trust, and client protection still present useful worries to the sending of VANET, either suffer from the substantial workload of downloading the latest denial list from a remote authority or can't enable drivers made a beeline to choose the dependability of a message when the verification on messages is unknown. In this paper, to cope with these challenging concerns, we propose a new verification convention for VANET in a decentralized group model by using a new group signature scheme. In the assistance of the new group signature scheme, the proposed verification convention is featured with threshold authentication, ef?cient revocation, unforgeability, anonymity, and traceability. Also, the assisting group signature scheme may also be of independent interest, as it is characterized by ef?cient traceability and message-linkability at the same time. Broad investigations show that our proposed edge mysterious validation convention is secure, and the veri?cation of messages among vehicles can be quickened by utilizing batch message preparing methods.
Citation :

af

B. Divya, & Dr. Ch. Mallikarjuna Rao. (2017). A Novel Security Protocol for VANET. International Journal of Computer Engineering In Research Trends, 4(8), 330-335. Retrieved from http://ijcert.org/ems/ijcert_papers/V4I8003.pdf
Keywords : Vehicular ad-hoc networks (VANETs), conditional privacy, threshold authentication, group signature
References :

af

[1] Jun Shao, Xiaodong Lin, A threshold anonymous authentication protocol for valet
[2] S. Dietzel, E. Schoch, B. Konings, M. Weber, and F. Kargl, Resilient, secure aggregation for vehicular networks, IEEE Network, vol. 24, no. 1, pp. 2631, 2010. [Online]. Available: http://dx.doi.org/10.1109/ MNET.2010.5395780
 [3] The car two car communication consortium, http://www.car-to-car.org/.
[4] P. Papadimitratos, L. Buttyan, T. Holczer, E. Schoch, J. Freudiger, M. Raya, Z. Ma, F. Kargl, A. Kung, and J. Hubaux, Secure vehicular communication systems: Design and architecture, CoRR, vol. abs/0912.5391, 2009. [Online]. Available: http://arxiv.org/abs/0912.5391
 [5] G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik, A practical and provably secure coalition-resistant group signature scheme, in Advances in Cryptology - CRYPTO 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings, 2000, pp. 255270. [Online]. Available: http://dx.doi.org/10.1007/3-540-44598-6 16
 [6] J. Hubaux, S. Capkun, and J. Luo, The security and privacy of smart vehicles, IEEE Security & Privacy, vol. 2, no. 3, pp. 4955, 2004. [Online]. Available: http://doi.ieeecomputersociety.org/10.1109/ MSP.2004.26
 [7] M. Raya and J. Hubaux, Securing vehicular ad hoc networks, Journal of Computer Security, vol. 15, no. 1, pp. 3968, 2007. [Online]. Available: http://iospress.metapress.com/openurl.asp?genre= article&issn=0926-227X&volume=15&issue=1&spage=39
 [8] Y. Sun, R. Lu, X. Lin, X. Shen, and J. Su, An ef?cient pseudonymous authentication scheme with strong privacy preservation for vehicular communications, IEEE T. Vehicular Technology, vol. 59, no. 7, pp. 35893603, 2010. [Online]. Available: http: //dx.doi.org/10.1109/TVT.2010.2051468
 [9] X. Lin and X. Li, Achieving ef?cient cooperative message authentication in vehicular ad hoc networks, IEEE T. Vehicular Technology, vol. 62, no. 7, pp. 33393348, 2013. [Online]. Available: http://dx.doi.org/10.1109/TVT.2013.2257188 
[10] L. Wischhof, A. Ebner, and H. Rohling, Information dissemination in self-organizing intervehicle networks, IEEE Transactions on Intelligent Transportation Systems, vol. 6, no. 1, pp. 90101, 2005. [Online]. Available: http://dx.doi.org/10.1109/TITS.2004.842407
 [11] P. Golle, D. H. Greene, and J. Staddon, Detecting and correcting malicious data in vanets, in Proceedings of the First International Workshop on Vehicular Ad Hoc Networks, 2004, Philadelphia, PA, USA, October 1, 2004, 2004, pp. 2937. [Online]. Available: http://doi.acm.org/10.1145/1023875.1023881
 [12] L. Zhang, Q. Wu, A. Solanas, and J. Domingo-Ferrer, A scalable robust authentication protocol for secure vehicular communications, IEEE T. Vehicular Technology, vol. 59, no. 4, pp. 16061617, 2010. [Online]. Available: http://dx.doi.org/10.1109/TVT.2009.2038222
[13] L. Chen, S. Ng, and G. Wang, Threshold anonymous announcement in vanets, IEEE Journal on Selected Areas in Communications, vol. 29, no. 3, pp. 605615, 2011. [Online]. Available: http: //dx.doi.org/10.1109/JSAC.2011.110310
[14] U. S. D. of Transportation, Dedicated short range communications, http://www.its.dot.gov/DSRC/.
[15] D. Chaum and E. van Heyst, Group signatures, in Advances in Cryptology - EUROCRYPT 91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings, 1991, pp. 257265. [Online]. Available: http://dx.doi.org/10.1007/3-540-46416-6 22
[16] D. Boneh, X. Boyen, and H. Shacham, Short group signatures, in Advances in Cryptology - CRYPTO 2004, 24th Annual International CryptologyConference, Santa Barbara, California, USA, August 1519, 2004, Proceedings, 2004, pp. 4155. [Online]. Available: http://dx.doi.org/10.1007/978-3-540-28628-8 3
[17] Anusha.V,K.Sumalatha, Mobile Social Networks for Flattering Unsigned Profile Matching , International Journal of Computer Engineering In Research Trends.,vol.1,no.6,pp. 384-390,2014.
[18] D.Ramanjaneyulu ,U.Usha Rani, In Service-Oriented MSN Providing Trustworthy Service Evaluation, International Journal of Computer Engineering In Research Trends.,vol.2,no.12,pp. 1192-1197,2015.
[19] Komal Patil, Geeta Mahajan, Disha Patil and Chitra Mahajan, Implementation of Motion Model Using Vanet, International Journal of Computer Engineering In Research Trends.,vol.3,no.4,pp. 179-182,2016.
[20] Pocha Nageswara Reddy, I.S.Raghuram, Dr.S.Prem Kumar, Advance EMAP for Vehicular Ad Hoc Networks. International Journal of Computer Engineering In Research Trends.,vol.1,no.4,pp. 253-258,2016. 
:10.22362/ijcert/2017/v4/i8/xxxx [UNDER PROCESS]
DOI Link : Not Yet Assigned
Download :
  V4I8003.pdf
Refbacks : There are currently no refbacks
File Sharing System between P2P
Authors : Ashayyagari Geyasri, Dr. S. Govinda Rao,
Affiliations : 1,2Department of Computer Science and Engineering Gokaraju Rangaraju Institute of Engineering and Technology Hyderabad, India
Abstract :

af

In this paper, making a framework which will share the record from one hub to another hub with high recurrence. Record sharing applications in portable impromptu systems (MANETs) have pulled in more consideration lately. The effectiveness of document questioning experiences the properties of systems including hub portability and restricted correspondence range and asset. An instinctive technique to reduce this issue is to make document reproductions in the system, however, despite the endeavors on record replication, no exploration has concentrated on the worldwide ideal copy creation with least normal questioning deferral. To begin with, do not have a run to designate limited assets to various documents to limit the normal questioning postponement. Second, they consider capacity as available assets for copies, however, disregard the way that the record holders' recurrence of meeting different hubs likewise assumes a critical part in deciding document accessibility. Hypothetically examine the impact of asset assignment on the regular questioning postponement and infer an asset allotment administer to limit the normal questioning deferral. In this paper present another idea of an asset for record replication, which considers both hubs are stockpiling and meeting recurrence. In this paper additionally, propose an appropriated record replication convention to understand the proposed run the show. Broad follow driven examinations with blended follows and genuine follows demonstrate that our convention can accomplish shorter normal questioning postponement at a lower cost than current replication agreements.
Citation :

af

Ashayyagari Geyasri, & Dr. S. Govinda Rao. (2017). File Sharing System between P2P. International Journal of Computer Engineering In Research Trends, 4(8), 325-329. Retrieved from http://ijcert.org/ems/ijcert_papers/V4I8002.pdf
Keywords : MANETs, querying delay, sparsely distributed MANETs.
References :

af

[1]   Qik, http://qik.com/, 2014. 
[2]    Flixwagon, http://www.flixwagon.com/, 2014. 
[3]	C. Palazzi and A. Bujari, A Delay/Disruption Tolerant Solution for Mobile to Mobile File Sharing, Proc. IFIP/IEEE Wireless Days, 2010. 
[4]    Y. Tseng, S. Ni, and E. Shih, Adaptive Approaches to Relieving Broadcast Storms in a Wireless Multihop Mobile Ad Hoc Network, Proc. 21st Intl Conf. Distributed Computing Systems (ICDCS), pp. 481-488, 2001. 
[5]	B. Chiara et al., HiBOp: A History Based Routing Protocol for Opportunistic Networks, Proc. IEEE Intl Symp. World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2007. 
[6]	A. Lindgren, A. Doria, and O. Schelen, Probabilistic Routing in Intermittently Connected Networks, ACM SIGMOBILE Mobile Computing and Comm. Rev., vol. 7, no. 3, pp. 19-20, 2003. 
[7]	F. Li and J. Wu, MOPS: Providing Content-Based Service in Disruption-Tolerant Networks, Proc. IEEE 29th Intl Conf. Distributed Computing Systems (ICDCS), 2009. 
[8]	      S. Moussaoui, M. Guerroumi, and N. Badache, Data Replication in Mobile Ad Hoc Networks, Proc. Second Intl Conf. Mobile Ad-hoc and Sensor Networks (MSN), pp. 685-697, 2006. 
[9]	L. Yin and G. Cao, Supporting Cooperative Caching in Ad Hoc Networks, IEEE Trans. Mobile Computing, vol. 5, no. 1, pp. 77-89, Jan. 2006. 
[10]		C.V.Anchugam,Dr.K.Thangadurai, Link quality based Ant based Routing Algorithm (LARA) in MANETs, International Journal of Computer Engineering In Research Trends.,vol.4,no.1,pp.52-60,2017.
[11]  Nilima N. Patil, Kuldeep K. Vartha, Ashwini W. Wankhade, Sagar A. Patil, Secure Routing for MANET in Adversarial Environment, International Journal of Computer Engineering In Research Trends.,vol.3,no.4,pp.199-203,2016.
[12]   Priya Manwani, Deepty Dubey, Hybrid Protocol for Security Peril Black Hole Attack in MANET, International Journal of Computer Engineering In Research Trends.,vol.3,no.3,pp. 92-97,2016.
[13]   N.Asha Jyothi, G.Ramya, G.Mounika, R.Sandeep Kumar, Enhance the QoS capability of Hybrid Networks using QoS-Oriented Distributed Routing Protocol, International Journal of Computer Engineering In Research Trends.,vol.1,no.4,pp. 178-82,2014.
[14]   Jalagam Nagamani,K.Sumalatha, EAACK: Secure IDS for Wireless Sensor Networks, International Journal of Computer Engineering In Research Trends.,vol.1,no.6,pp. 461-469,2014.
[15]   Komal Patil, Geeta Mahajan, Disha Patil, Chitra Mahajan, Implementation of Motion Model Using Vanet, International Journal of Computer Engineering In Research Trends.,vol.3,no.4,pp. 179-1,2014.
:10.22362/ijcert/2017/v4/i8/xxxx [UNDER PROCESS]
DOI Link : Not Yet Assigned
Download :
  V4I8002.pdf
Refbacks : There are currently no refbacks
A Honeypot for a Small Network using Raspberry pi
Authors : Rodney Anthony Raj, Chayapathi A R ,
Affiliations : Information science and engineering, Acharya Institute of Technology, Doctor Sarvepalli Radhakrishnan Rd, Bengaluru, Karnataka 560107, India.
Abstract :

af

The security is the biggest worry around the world let it be in any field or life. It is nothing different in cyber or network where the security is the biggest concern thinking about attacks which could happen anytime. So, this project is upon security, cyber security. Where a forensic device is built to monitor the network, and find the details of attackers1. This device does not act as an antivirus rather pulls the attacker to run some exploits and make them fall into the trap, a honeypot device which will perform all this when connected to a network. This device can also be used in forensics during crime scene to identify if any attacker is trying to steal any data. This device will not completely screen off the attacker or the attack but rather will notify and keep us on the tab by telling us there’s attack which may happen or happening. Attacks will never be stopped if we are connected to the internet. Hence, the solution provided here is to find out the attackers.
Citation :

af

Rodney Anthony Raj, Chayapathi A R . (2017).A Honeypot for a Small Network using Raspberry pi. International Journal of Computer Engineering In Research Trends, 4(8), 319-324. Retrieved from http://ijcert.org/ems/ijcert_papers/V4I8001.pdf
Keywords : Malware, Raspberry pi, Honeypot, Cybercrime, Rootkits, Attacker, network, PUTTY, Nmap and Hacker.
References :

af

1.	2016: Current State of Cybercrime, RSA    whitepaper.
2.	Basic survey on Malware Analysis, Tools, and Techniques. Dolly Uppall, Vishaka Mehra, and Vinod Verma, 2013.
3.	A survey of cybercrime. Zhicheng Yang., 2012.
4.	Detecting and Classifying Morphed Malware: A Survey Sanjam Singla, 2012.
5.	Evolution, Detection, and Analysis of Malware for Smart Devices Guillermo Suarez-Tangil, Juan E. Tapiador, Pedro Peris-Lopez, and Arturo Ribagorda, 2012.
6.	A Survey on Techniques in Detection and Analyzing Malware Executables Kirti Mathur, 2012.
7.	Malware Analysis and Classification: A Survey Ekta Gandotra, Divya Bansal, Sanjeev Sofat, 2012.
8.	Malware and cyber crime. House of Commons, Science and Technology Committee. 2012.
9.	Malware and Malware Detection Techniques: A Survey. Jyoti Landage, 2011.
10.	A Survey on Malware Attacks on Smartphones Kireet, Dr.Meda, and Sreenivasa Rao, 2011.
11.	Cybercrime and it’s types, analysis, and prevention techniques, Alpna, Sona Malhotra 2016.
12.	Web based Forensic Systems, srivathsa rao, vinaya hegde, jyothi Prasad, ijsrt, 2011.
13.	Y. Li and A. Nosratinia, “Security in cyber forensics,” Wireless Communications, IEEE Transactions on, vol. 11, no. 1, pp. 328–337, 2011.
14.	Cyber Black Box: Network intrusion forensics system for collecting and preserving evidence of attack, Jong Hyun Kim, Australian Fornsics, 2015
15.	Cybersecurity:risks, vulnerabilities and countermeasures to prevent social engineering attacks Conteh, Schmick, 2016
:10.22362/ijcert/2017/v4/i8/xxxx [UNDER PROCESS]
DOI Link : Not yet assigned
Download :
  V4I8001.pdf
Refbacks : Currently there are no refbacks

 

Non-Stationary Signal Analysis A Modified Time Frequency Approach
Authors : Devika, Monalisa Nayak, Kodanda Dhar Sa, Dillip Dash
Affiliations : Department of Electronics and Tele Communication, Indira Gandhi Institute of Technology, Odisha, India
Abstract :

af

Fourier investigation becomes invaluable when the signal contains non-stationary characteristics or transitory characteristics like transients and patterns that vary with time. As time domain and frequency domain representations are inadequate to give all the information possessed by the non-stationary signal. Therefore time-Frequency methods (TFMs) are used to analyze a signal in time and frequency domains simultaneously. This paper deals with the analysis of non-stationary signals by using short time Fourier transform; fractional Fourier transform to analyze the time frequency behavior of the non-stationary signal. A combination method is known as Short time fractional Fourier transform (STFRFT) also proposed here, which provides unique properties of the non-stationary signal. By using different windows like the rectangular window, Hamming window, Hanning window and Blackman window, the fractional Fourier transform of the chirp signal has been plotted. The MATLAB simulations were made to show the STFRFT of the signal.
Citation :

af

Devika, Monalisa Nayak,Kodanda Dhar Sa, Dillip Dash. (2017).Non-Stationary Signal Analysis A Modified Time Frequency Approach. International Journal of Computer Engineering In Research Trends, 4(7), 313-318. Retrieved from http://ijcert.org/ems/ijcert_papers/V4I7006.pdf
Keywords : Fourier Transform, FRFT, Non-Stationary signals, STFT, Window function
References :

af

[1] Qi L, Tao R, Zhou S, Wang Y., Detection and parameter estimation of multicomponent LFM signal based on the fractional Fourier transform. Science in China series F: information sciences, 2004, 47(2), pp. 184-98.
[2] Claasen T, Mecklenbräuker W., TIME-FREQUENCY SIGNAL ANALYSIS. Philips Journal of Research. 1980, 35(4/5), pp. 276-300.
[3] Rao P, Taylor F. Estimation of instantaneous frequency using the discrete Wigner distribution. Electronics letters, 1990,126 (4), pp. 246-8.
[4] Choi H, Williams W., Improved time-frequency representation of multicomponent signals using exponential kernels. IEEE Transactions on Acoustics, Speech, and Signal  Processing, 1989, 37(6), pp. 862-71.
[5] Hossen AN, Heute U, Shentov OV, Mitra SK. Subband DFT—part II: accuracy, complexity and applications. Signal Processing, 1995,41(3), pp. 279-94.
[6] Hammond JK, White PR., The analysis of non-stationary signals using time-frequency methods. Journal of Sound and Vibration. 1996, 190(3), pp. 419-47.
[7] Chen VC, Ling H., Time-frequency transforms for radar imaging and signal analysis.  Artech House, 2002.
[8] Narayanan VA, Prabhu KM.,  The fractional Fourier transform: theory, implementation and error analysis. Microprocessors and Microsystems, 2003, 27(10), pp. 511-21.
[9] Qu H, Wang R, Qu W, Zhao P.,  Research on DOA Estimation of Multi-Component LFM Signals Based on the FRFT. Wireless Sensor Network, 2009, 1(3), pp. 171-81.
[10] Sun HB, Liu GS, Gu H, Su WM, Application of the fractional Fourier transform to  moving target detection in airborne SAR, IEEE Transactions on Aerospace and  Electronic Systems, 2002, 38(4), pp. 1416-24.
[11] Tao R, Zhang F, Wang Y., Fractional power spectrum. IEEE Transactions on Signal Processing. 2008, 56(9), pp. 4199-206.
[12] Podder P, Khan TZ, Khan MH, Rahman MM. Comparative performance analysis of hamming, hanning and blackman window. International Journal of Computer  Applications, 2014,96(18), pp. 2001-2006.
:10.22362/ijcert/2017/v4/i7/xxxx [UNDER PROCESS]
DOI Link : Not yet assigned
Download :
  V4I7006.pdf
Refbacks : There are currently no refbacks
Enabling Secure and Effective Spatial Query Processing on the Cloud using Forward Spatial Transformation
Authors : V. Swathi, D. Saidulu, B. Chandrakala
Affiliations : Assistant Professor, Department of Computer Science and Engineering, Guru Nanak Institutions Technical Campus-Hyderabad, India.
Abstract :

af

Data outsourcing is a common cloud computing model that allows data owners to takings advantage of its on-demand storage and computational resources. The main challenge is maintaining data confidentiality regarding intruders. Presented methodologies either conciliation the undisclosed of the data or undergo from high communication cost between the server and the user. To overcome this problem, we suggest a dual transformation and encryption scheme for spatial data, where encrypted queries are executed entirely by the service provider on the encrypted database, and encrypted results are returned to the user.The user issues encrypted spatial range queries to the service provider and then use the encryption key to decrypt the query response returned which establishments a balance between the security of data and efficient query response as the queries be processed on encrypted data at the cloud server finally our proposed method moderates the unique query communication cost between the authorized user and service provider.
Citation :

af

V. Swathi, D. Saidulu, B. Chandrakala. (2017).Enabling Secure and Effective Spatial Query Processing on the Cloud using Forward Spatial Transformation. International Journal of Computer Engineering In Research Trends, 4(7), 301-307. Retrieved from http://ijcert.org/ems/ijcert_papers/V4I7004.pdf
Keywords : Data Encryption, Forward Spatial Transformation, Security, Query Processing, Database Outsourcing, Spatial Databases.
References :

af

[1] Z. Xiao and Y. Xiao, “Security and privacy in cloud computing,” IEEE Communications Surveys & Tutorials,, vol. 15, no. 2, pp. 843–859, 2013.
[2] M. L. Yiu, G. Ghinita, C. S. Jensen, and P. Kalnis, “Enabling search services on outsourced private spatial data,” The VLDB Journal, vol. 19, no. 3, pp. 363–384, 2010.
 [3] P. Wang and C. V. Ravishankar, “Secure and efficient range queries on outsourced databases using r-trees,” in 2013 IEEE 29th International Conference on Data Engineering (ICDE). IEEE, 2013, pp. 314–325.
 [4] A. M. Talha, I. Kamel, and Z. A. Aghbari, “Enhancing confidentiality and privacy of outsourced spatial data,” in 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud). IEEE, 2015, pp. 13–18. 
 [5] S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure, scalable, and fine-grained data access control in cloud computing,” in IEEE Infocom, 2010 proceedings. IEEE, 2010, pp. 1–9. 
[6] H. Xu, S. Guo, and K. Chen, “Building confidential and efficient query services in the cloud with rasp data perturbation,” IEEE transactions on knowledge and data engineering, vol. 26, no. 2, pp. 322–335, 2014. 
[7] H. Hu, J. Xu, C. Ren, and B. Choi, “Processing private queries over untrusted data cloud through privacy homomorphism,” in IEEE 27th International Conference on Data Engineering. IEEE, 2011, pp. 601– 612.
 [8] G. Zhao, C. Rong, J. Li, F. Zhang, and Y. Tang, “Trusted data sharing over untrusted cloud storage providers,” in IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom). IEEE, 2010, pp. 97–103.
[9] H. Hacigum¨ us, B. Iyer, and S. Mehrotra, “Providing database as a ¨ service,” in 18th International Conference on Data Engineering, 2002. Proceedings. IEEE, 2002, pp. 29–38. [10] E. Damiani, S. Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati, “Balancing confidentiality and efficiency in untrusted relational dbmss,” in Proceedings of the 10th ACM conference on Computer and Communications Security. ACM, 2003, pp. 93–102. 
 [11] W.-S. Ku, L. Hu, C. Shahabi, and H. Wang, “Query integrity assurance of location-based services accessing outsourced spatial databases,” in Advances in Spatial and Temporal Databases. Springer, 2009, pp. 80– 97.
 [12] A. Khoshgozaran and C. Shahabi, “Private buddy search: Enabling private spatial queries in social networks,” in International Conference on Computational Science and Engineering, 2009 (CSE’09)., vol. 4. IEEE, 2009, pp. 166–173.
[13] Anil Kumar Uppula , Srinivasulu Tadisetty ,” Achieving better Authentication and Copyright protection Using DWT and SVD Based Watermarking Scheme,”International Journal of Computer Engineering In Research Trends.,vol.3,no.9,pp.487-491,September 2016.
[14] Venkata Srinivasu Veesam, Bandaru Satish Babu,” Evaluation of Captcha Technologies towards Graphical Password Scheme,” International Journal of Computer Engineering In Research Trends.,vol.2,no.1,pp.98-106,February 2015.
[15] D.J. Ashpin Pabi, N.Puviarasan, P.Aruna,” Fast Singular value decomposition based image compression using butterfly particle swarm optimization technique (SVD-BPSO),” International Journal of Computer Engineering In Research Trends.,vol.4,no.4,pp.128-135,April 2017.
:10.22362/ijcert/2017/v4/i7/xxxx [UNDER PROCESS]
DOI Link : Not yet assigned
Download :
  V4I7004.pdf
Refbacks : There are currently no refbacks
Effective Key Management In Dynamic Wireless Sensor Networks
Authors : Uma Vasala , Dr. G. R. Sakthidharan ,
Affiliations : M.Tech [CSE],Gokaraju Rangaraju Institute of Engineering and Technology
Abstract :

af

Recently, wireless detector networks (WSNs) have been deployed for a good form of applications, including military sensing, and pursuit, patient standing watching, traffic flow watching, wherever sensory devices typically move between different locations. Securing knowledge and communications need suitable encoding key protocols. In this paper, we tend to propose a certificate less efficient key management (CL-EKM) protocol for secure communication in dynamic WSNs characterized by node mobility. The CL-EKM supports economic key updates once a node leaves or joins a cluster and ensures forward and backward key secrecy. The protocol conjointly supports economic key revocation for compromised nodes and minimizes the impact of a node compromise on the protection of alternative communication links. A security analysis of our theme shows that our protocol is effective in defensive against separate attacks. We implement CL-EKMin Contiki OS and simulate it mistreatment Cooja machine to assess its time, energy, communication, and memory performance.
Citation :

af

Uma Vasala , Dr. G. R. Sakthidharan . (2017).Effective Key Management In Dynamic Wireless Sensor Networks . International Journal of Computer Engineering In Research Trends , 4(7), 308-312. Retrieved from http://ijcert.org/ems/ijcert_papers/V4I7005.pdf
Keywords : Wireless sensor networks, certificate less public key cryptography, key management scheme.
References :

af

[1] H. Chan, A. Perrig, and D. Song, “Random key predistribution schemes for sensor networks,” in Proc. IEEE Symp. SP, May 2003, pp. 197–213.
[2] W. Du, J. Deng, Y. S. Han, and P. K. Varshney, “A key predistribution scheme for sensor networks using deployment knowledge,” IEEE Trans. Dependable Secure Comput., vol. 3, no. 1, pp. 62–77, Jan./Mar. 2006.
[3] W. Du, J. Deng, Y. S. Han, P. Varshney, J. Katz, and A. Khalili, “A pairwise key predistribution scheme for wireless sensor networks,” ACM Trans. Inf. Syst. Secur., vol. 8, no. 2, pp. 228–258, 2005.
[4] M. Rahman and K. El-Khatib, “Private key agreement and secure communication for heterogeneous sensor networks,” J. Parallel Distrib. Comput., vol. 70, no. 8, pp. 858–870, 2010.
[5] M. R. Alagheband and M. R. Aref, “Dynamic and secure key management model for hierarchical heterogeneous sensor networks,” IET Inf. Secur., vol. 6, no. 4, pp. 271–280, Dec. 2012.
[6] D. S. Sanchez and H. Baldus, “A deterministic pairwise key predistribution scheme for mobile sensor networks,” in Proc. 1st Int. Conf. SecureComm, Sep. 2005, pp. 277–288.
[7] I.-H. Chuang, W.-T. Su, C.-Y. Wu, J.-P. Hsu, and Y.-H. Kuo, “Two-layered dynamic key management in mobile and long-lived cluster-based wireless sensor networks,” in Proc. IEEE WCNC, Mar. 2007, pp. 4145–4150.
[8] S. Agrawal, R. Roman, M. L. Das, A. Mathuria, and J. Lopez, “A novel key update protocol in mobile sensor networks,” in Proc. 8th Int. Conf. ICISS, vol. 7671. 2012, pp. 194–207.
[9] S. U. Khan, C. Pastrone, L. Lavagno, and M. A. Spirito, “An energy and memory-efficient key management scheme for mobile heterogeneous sensor networks,” in Proc. 6th Int. Conf. CRiSIS, Sep. 2011, pp. 1–8.
[10] X. Zhang, J. He, and Q. Wei, “EDDK: Energy-efficient distributed deterministic key management for wireless sensor networks,” EURASIP J. Wireless Commun. Netw., vol. 2011, pp. 1–11, Jan. 2011.
[11] N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz, “Comparing elliptic curve cryptography and RSA on 8-bit CPUs,” in Proc. 6th Int. Workshop Cryptograph. Hardw. Embedded Syst., 2004, pp. 119–132.
[12] S. S. Al-Riyami and K. G. Paterson, “Certificateless public key cryptography,” in Proc. 9th Int. Conf. ASIACRYPT, vol. 2894. 2013, pp. 452–473.
[13] S. Seo and E. Bertino, “Elliptic curve cryptography based certificateless hybrid signcryption scheme without pairing,” CERIAS, West Lafayette, IN, USA, Tech. Rep. CERIAS TR 2013-10, 2013. [Online]. Available: https://www.cerias.purdue.edu/apps/reports_and_papers/.Seung-Hyun
[14] S. H. Seo, J. Won, and E. Bertino, “POSTER: A pairing-free certificateless hybrid sign cryption scheme for advanced metering infrastructures,” in Proc. 4th ACM CODASPY, 2014, pp. 143–146.
[15] Q. Huang, J. Cukier, H. Kobayashi, B. Liu, and J. Zhang, “Fast authenticated key establishment protocols for self-organizing sensor networks,” in Proc. 2nd ACM Int. Conf. WSNA, 2003, pp. 141–150.
[16] J.David Sukeerthi Kumar,” Investigation on Secondary Memory Management in Wireless Sensor Network,” International Journal of Computer Engineering In Research Trends.,vol .2,no.6,pp.387-391,June 2015.
[17] Kuruva Laxmanna, N.Poorna Chandra Rao, Dr.S.Prem Kumar,” Moderating vampire attacks in Wireless Sensor Network,” International Journal of Computer Engineering In Research Trends.,vol.1,no.3,pp.143-151,September 2014.
[18].P.G.V.SureshKumar,Seelam Sowjanya,”Developing an Enterpriseenvironment By Using Wireless Sensor Network System Architecture,” International Journal of Computer Engineering In Research Trends.,vol .2,no.10,pp.902-908,October 2015.
[19] Dr. C. Gulzar,AmeenaYasmeen," Maximum network lifetime with load balance and connectivity by clustering process for wireless sensor networks,”International Journal of Computer Engineering In Research Trends.,vol.3,no.7,pp.375-383,July 2016.
[20] A.Yogananda ,Chepuri Sai Teja ," A Multi-level Self-Controllable Authentication in Distributed m-Healthcare Cloud Environments, ” International Journal of Computer Engineering In Research Trends.,vol.3,no.8,pp.436-440,August 2016. 

:10.22362/ijcert/2017/v4/i7/xxxx [UNDER PROCESS]
DOI Link : Not yet assigned
Download :
  V4I7005.pdf
Refbacks : There are currently no refbacks
Searching of Web Data Using Ontological Matching
Authors : Shweta Shrivastava, Dr. Sanjay Agrawal,
Affiliations : AISECT University , Bhopal Ph.D. scholar Computer Sc. Department,
Abstract :

af

While phenomenally successful regarding size and number of users, today's World Wide Web is fundamentally a relatively straightforward artifact. Web content consists mainly of distributed hypertext and hypermedia and is accessed via a combination of keyword based search and link navigation. The explosion in both the range and quantity of web content has, however, highlighted some serious shortcomings in the hypertext paradigm. Every year, the number of documents on the Internet is increasing, presenting the correct information at the right time in the most appropriate form is important, and it results in better browsing experience for users. To deal with this issue, ontologys are proposed for knowledge representation, which is nowadays the backbone of semantic web applications. This is a challenging task as it requires complex queries to be answered with only a few keywords. Furthermore, it should allow the inferred knowledge to be retrieved easily and provide a ranking mechanism to reflect semantics and ontological importance. Proposed paper gives. A technique to improve the efficiency of matching web data with background knowledge.It finds correspondences between semantically related entities of ontology.
Citation :

af

Shweta Shrivastava , Dr. Sanjay Agrawal. (2017). Searching of Web Data Using Ontological Matching. International Journal of Computer Engineering In Research Trends , 4(7), 296-300. Retrieved from http://ijcert.org/ems/ijcert_papers/V4I7003.pdf
Keywords : Semantic Web, Ontology, Information Retrieval, inferred knowledge, ranking mechanism, Web Search.
References :

af

[1]  P Shvaiko, J Euzenat Ontology Matching: State of the Art and Future Challenges IEEE Transaction on Knowledge and Data Engineering, Vol. 25, No1. January 2013 Page(s): 158-176
[2]  Farrag, Tamer Ahmed, Saleh, Ahmed Ibrahim; Ali, Hesham Arafat Toward SWSs Discovery: Mapping from WSDL to OWL-S Based on Ontology Search and Standardization Engine IEEE Transaction on Knowledge and Data Engineering, Vol. 25, No5.  May 2013pages 1135-1147.
[3] A Telang, C Li, S Chakravarthy One Size Does Not Fit All: Toward User- and Query-Dependent Ranking for Web Databases IEEE transaction on knowledge and data engineering, vol 24, no9, September 2012 pages 1671 - 1685.
[4]  P Kremen, Z Kouba Ontology-Driven Information System Design IEEE Transaction on System, Man and Cybernetics-PartC: Applications and Reviewes, Vol. 42, No. 3, May 2012 pages 334  344.
[5] V Milea, F Frasincar, U Kaymak town: A Temporal Web Ontology Language IEEE Transaction on System, Man, and Cybernetics-PartB: Cybernetics, Vol. 42, No. 1, February 2012 pages 268 - 281.
[6] P Panov, S Dzeroski, L Soldatova OntoDM: An Ontology of Data Mining 2008 IEEE International Conference on Data Mining Workshops Page(s): 752 - 760.
  [7]  Wong, W Liu, M Bennamoun Ontology Learning from Text: A Look-Back and into the Future ACM Computing Surveys, Vol. 44, No. 4, Article 20, Publication date: August 2012.
[8]  Dimitrios A. Koutsomitropoulos, Ricardo Borillo Domenech, Georgia D. SolomouA Structured Semantic Query Interface for Reasoning Based Search and Retrieval The Semantic Web: Research and Applications Lecture Notes in Computer Sc. Volume 6643,2011,pp17-31.
[9]  J Zhai, K Zhou - Information Science and Management Semantic Retrieval for Sports Information Based on Ontology and SPARQL Published in:Information Science and Management Engineering (ISME), 2010 International Conference of  (Volume:1 )Date of Conference:7-8 Aug. 2010 Page(s): 395 - 398 .
[10]  Z Li, YL Zheng, SN Li, WW Liang  A Knowledge Sharing Convergence Platform Based on OWL-S and Semantic         Relations Published in Software Engineering (WCSE), 2010 Second World Congress on  (Volume:1 ) 19-20 Dec.  2010 Page(s): 65 - 68 .
[11]G. Shiva Prasad , N.V. Subba Reddy, U,Dinesh Acharya Knowledge Discovery from Web Usage Data: A Survey of Web Usage Pre processing Techniques  Information Processing and Management Communications in Computer and Information Science Volume 70, 2010, pp 505-507. 
[12]J. Euzenat and P. Shvaiko, Ontology Matching. Springer, 2007.
[13]F. Giunchiglia, M. Yatskevich, and P. Shvaiko, Semantic Matching: Algorithms and Implementation, J. on Data Semantics, vol. 9, pp. 1-38, 2007.
[14] J. Cardoso, Semantic Web Services: Theory, Tools, and Applications Idea Group, Inc., 2007.Web Services Description Language (WSDL), W3C Note, HTTP:// www.w3.org/TR/wsdl, 2001.
[15]Web Ontology Language for Services (OWL-S), W3C Member Submission, http://www.w3.org/Submission/OWL-S/, 2004.
[16]D. Martin, M. Burstein, D. Mcdermott, S.Mcilraith, M. Paolucci, K.Sycara, D.L. Mcguinness, E. Sirin, and N. Srinivasan, Bringing Semantics to Web Services with OWL-S World Wide Web, vol. 10, no. 3, pp. 243-277, Sept. 2007.
[17] T.A. Farrag and H.A. Ali, A Cluster-Based Semantic Web Services Discovery and Classification, Proc. ACME Second Intl Conf. Advanced Computer Theory and Eng., pp. 1825-1834, 2009.
[18]B. Di Martino, Semantic Web Services Discovery Based on Structural Ontology Matching, Intl J. Web and Grid Services, vol. 5, no. 1, pp. 46-65, 2009.
[19]OWL, http://www.w3.org/2004/OWL/, 2004.
[20]S Bhattacharjee, A Dwivedi, RR Prasad Ontology based spatial clustering framework for implicit knowledge discovery India Conference (INDICON), 2012 Annual IEEE 9 Dec. 2012 Page(s): 561 - 566 
[21]S. Chaudhuri, G. Das, V. Hristidis, and G. Weikum, Probabilistic Ranking of Database Query Results, Proc. 30th Intl Conf. Very Large Data Bases (VLDB), pp. 888-899, 2004.
[22[C. Dwork, R. Kumar, M. Naor, and D. Sivakumar, Rank Aggregation Methods for the Web, Proc. Intl Conf. World Wide Web (WWW), pp. 613-622, 2001.
[23]Yiyao Lu, Hai He, Hongkun Zhao, Weiyi Meng, Member, IEEE, and Clement Yu, Senior Member, IEEE Annotating Search Results from Web Databases IEEE Transaction on Knowledge and Data Engineering , Vol 25, No 3, March 2013.
[24] G Singh, V Jain, M Singh Ontology development using Hozo and Semantic analysis for information retrieval in Semantic Web  Image Information Processing (ICIIP), 2013 IEEE Second International Conference on 9-11 Dec. 2013 Page(s): 113 - 118 .
[25] Z Yun, S Huayou, Q Hengnian A Semantic Web Services discovery mechanism design and implementation based on OWL Ontology  Educational and Network Technology (ICENT), 2010 International Conference on 25-27 June 2010 Page(s): 139 - 143.
[26] Myint Myint Thein , Soe Lai Phyue , Mie Mie Su Thw, Semantic Web Information Retrieval in XML by mapping to RDF schema  Published in Networking and Information Technology (ICNIT), 2010 International Conference on 11-12 June 2010 Page(s): 500 - 503.
[27]T Bhatia  IJCST  Link Analysis Algorithms For Web Mining IJCT  vol 2 issue 2 June 2011
 [28]G Kumar, N Duhan, AK Sharma  Page ranking based on a number of visits of links of Web page  Computer and Communication Technology (ICCCT), 2011 2nd International Conference on 15-17 Sept. 2011 Page(s): 11 - 14 .
[29]J.R.G. Pulido a, M.A.G. Ruiz b, R. Herrera c, E. Cabello d, S. Legrand e, D. Elliman Ontology languages for the semantic web: A never completely updated review 0950-7051/$ - see front matter  2006 Elsevier B.V.
[30]. B.ASWINI, B.RANJITH, Robust Model-Based Data Management, International Journal of Computer Engineering in Research Trends, Volume 1, December 2014, pp 453-460. 
:10.22362/ijcert/2017/v4/i7/xxxx [UNDER PROCESS]
DOI Link : not yet updated
Download :
  V4I7003.pdf
Refbacks : There are currently no refbacks
Energy Consumption on Smartphone Web Browsing in 3G Network
Authors : Shital M Kuwarkar , Prof. U.A.Nuli,
Affiliations : Department of Computer Science and Engineering, D.K.T.E. Society’s Textile and Engineering Institute, Ichalkaranji, Shivaji University, Kolhapur, Maharashtra, India.
Abstract :

af

Nowadays usage of smartphone application has been reached great height. Web browsing on a smartphone takes a significant amount of power as it uses the features of 3G radio interface for downloading web pages. In this paper, two techniques are used to resolve this power consumption issue. In leading technologies, process computation sequence while loading a web page. Web browser first runs the computation that will generate new data transmission and put radio interface into low power state and release radio resource. Remaining computation is executed later. In the second technique, prediction of user reading time is performed using data mining techniques.
Citation :

af

Shital M Kuwarkar , Prof. U.A.Nuli. (2017). Energy Consumption on Smartphone Web Browsing in 3G Network. International Journal of Computer Engineering In Research Trends , 4(7), 290-295. Retrieved from http://ijcert.org/ems/ijcert_papers/V4I7001.pdf
Keywords : Radio Resource Control (RRC) protocol, DOM tree, Gradient Boosted Regression Tree (GBRT)
References :

af

[1] J. Flinn and M. Satyanarayanan, “Managing battery lifetime with energy-aware adaptation,” ACM Trans. Comput. Syst., pp. 137–179, May 2004.
[2] Virendrakumar Dhotre , Namdev Sawant , Pallavi Pawar, Rajshree Salgar  , Gitanjalee Hulwan,” Automatic Bus Enquiry System using Android”,International Journal of Computer Engineering In Research Trends, pp. 123-127, April-2017.
[3] J. Sorber, N. Banerjee, M. D. Corner, and S. Rollins, “Turducken: Hierarchical power management for mobile devices,” in Proc.ACM 3rd Int. Conf. Mobile Syst., Appl., Serv., 2005, pp. 261–274.
[4] M. Dong and L. Zhong, “Chameleon: A color-adaptive web browser for mobile OLED displays,” in Proc. ACM 9th Int. Conf. Mobile Syst., Appl., Serv., 2011, pp. 85–98.
[5] E. Shih, P. Bahl, and M. J. Sinclair, “Wake on Wireless: An event-driven energy saving strategy for battery operated devices,” in Proc. ACM 8th Annu. Int. Conf. Mobile Comput. Netw., 2002,pp. 160–171.
[6] F. R. Dogar, P. Steenkiste, and K. Papagiannaki, “Catnap: Exploiting high bandwidth wireless interfaces to save energy for mobile devices,” in Proc. ACM 8th Int. Conf. Mobile Syst., Appl., Serv., 2010, pp. 107–122.
[7] E. Rozner, V. Navda, R. Ramjee, and S. Rayanchu, “NAPman: network-assisted power management for wifi devices,” in Proc. ACM 8th Int. Conf. Mobile Syst., Appl., Serv., 2010, pp. 91–106.
[8] H. Zhu and G. Cao, “On supporting power-efficient streaming applications in wireless environments,” IEEE Trans. Mobile Comput., vol. 4, no. 4, pp. 391–403, Jul. 2005.
 [9] W. Hu, G. Cao, S. V. Krishanamurthy, and P. Mohapatra, “Mobility-assisted energy-aware user contact detection in mobile social networks,” in Proc. IEEE 33rd Int. Conf. Distrib. Comput Syst., 2013, pp. 155–164.
[10] A. Schulman, V. Navda, R. Ramjee, N. Spring, P. Deshpande, C. Grunewald, K. Jain, and V. N. Padmanabhan, “Bartendr: a practical approach to energy-aware cellular data scheduling,” in Proc. ACM 16th Annu. Int. Conf. Mobile Comput. Netw., 2010, pp. 85–96.
[11] A. J. Pyles, Z. Ren, G. Zhou, and X. Liu, “SiFii: Exploiting VoIP silence for WiFi energy savings insmart phones,” in Proc. ACM 13th Int. Conf. Ubiquitous Comput., 2011, pp. 325–334.
 [12] F. Qian, K. S. Quah, J. Huang, J. Erman, A. Gerber, Z. Mao, S. Sen, and O. Spatscheck, “Web caching on smartphones: Ideal vs. reality,” in Proc. ACM 10th Int. Conf. Mobile Syst., Appl., Services, 2012, pp. 127–140.
[13] B. Zhao, B. C. Tak, and G. Cao, “Reducing the delay and power consumption of web browsing on smartphones in 3G networks,” in Proc. IEEE 31st Int. Conf. Distrib. Comput. Syst., 2011, pp. 413– 422.
[14] N. Balasubramanian, A. Balasubramanian, and A. Venkataramani, “Energy consumption in mobile phones: A measurement study and implications for network applications,” in Proc. ACM 9th SIGCOMM Conf. Internet Meas. Conf., 2009, pp. 280–293.
[15] Configuration of Fast Dormancy, Std., Rev. Rel. 8, 2010. [Online]. Available: http://www.3gpp.org
[16] (2011) webkit’s speculative parsing, [Online]. Available: http://gent.ilcore.com/2011/01/webkitr.html
[17] (2012) Google SPDY, [Online]. Available: http://en.wikipedia.org/wiki/SPDY
[18] K. Zhang, L. Wang, A. Pan, and B. B. Zhu, “Smart caching for web browsers,” in Proc. 19th Int. World-Wide Web Conf., 2010, pp. 491–500.
[19] W. Hu and G. Cao, “Energy optimization through traffic aggregation in wireless networks,” in Proc. IEEE 33rd Annu. Int. Conf. Comput. Comm., 2014, pp. 916–924.

:10.22362/ijcert/2017/v4/i7/xxxx [UNDER PROCESS]
DOI Link : Not yet assigned
Download :
  V4I7001.pdf
Refbacks : There are currently no refbacks
Design a Fuzzy Logic Controller for Controlling Position of D.C. Motor
Authors : Zain-Aldeen S. A.Rahman, ,
Affiliations : Dept. of Electrical Techniques, Technical Institute / Qurna, Southern Technical University, Basra, Iraq
Abstract :

af

Fuzzy logic provides an accurate controller for controlling the systems when compared to the classical controllers such as a PID controller. In this work, a fuzzy logic controller (FLC) designed to control the position of a D.C. motor. The motor model is developed and transformed in subsystem by using the Matlab/ Simulink and its parameters taken from a datasheet for a real motor. The control signal adjusted in real time using proper fuzzy membership functions depending upon the armature voltage applied to the D.C. motor. Here tow inputs and one output are used. The fuzzy input variable (error) has seven membership functions, the fuzzy input variable (change of error) has five membership functions, and the fuzzy output variable represented by applied voltage has five membership functions. Important study parameters include input voltage of DC motor and its response for achieving accurate position and high efficiency of the motor. The results of the control achieved a suitable response for applications.
Citation :

af

Zain-Aldeen S. A.Rahman. (2017). Design a Fuzzy Logic Controller for Controlling Position of D.C. Motor. International Journal of Computer Engineering In Research Trends , 4(7), 285-289. Retrieved from http://ijcert.org/ems/ijcert_papers/V4I7002.pdf
Keywords : D.C. motor, Control, Position, System, Fuzzy, FLC
References :

af

1	Aisha Jilani et. al., “Controlling Speed of DC Motor with Fuzzy Controller in Comparison with ANFIS Controller”, Intelligent Control and Automation, 6, February 2015, pp. 64-47.

2	Rekha kushwah & Sulochana Wadhwani, “ Speed Control of Separately Excited Dc Motor Using Fuzzy Logic Controller”, International Journal of Engineering Trends and Technology (IJETT), Vol. 4, Issue 6, June 2013, pp. 2518-2523.

3	Md Akram Ahmad, et. al., “Speed control of a DC motor using Controllers”, Automation, Control and Intelligent Systems, 20, November, 2014; 2(6-1), pp. 1-9.

4	 AA Bature, et. al., “Design And Real Time Implementation Of Fuzzy Controller For DC Motor Position Control”, INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH Vol.2, Issue 11, November, 2013, pp. 254-256.

5	Ravinder Kumar $ Vineet Girdhar, “ High Performance Fuzzy Adaptive Control for D.C. Motor”,  International Archive of Applied Sciences and Technology
IAAST; Vol 3 [3], Society of Education, India, September 2012, pp. 1- 10.

6	Ahmed El-Bakly, et. al., “ A Proposed DC Motor Sliding Mode Position Controller Design using Fuzzy Logic and PID Techniques” , 13th International Conference on AEROSPACE SCIENCES & AVIATION TECHNOLOGY, Military Technical College, Kobry Elkobbah, Cairo, Egypt, May 26 – 28, 2009, pp. 1-9.

7	Nirmala Ashok Dange & Ashwini Pawar, “ Position Control of Servo Motor Using Fuzzy Logic Controller”, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol. 5, Issue 6, June, 2016, pp. 5541- 5552.

8	SALIM, JYOTI OHRI, “FUZZY Based PID Controller for Speed Control of D.C. Motor Using LabVIEW” Vol. 10, 2015, pp. 154-159.

9	Umesh Kumar Bansal $ Rakesh Narvey, “Speed Control of DC Motor Using Fuzzy PID Controller”, Advance in Electronic and Electric Engineering, Vol. 3, No. 9,  Research India Publications, 2013, pp. 1209-1220.

10	 Miss. Vaishali Munde  & Prof. Mrs. V. S. Jape, “ Fuzzy Logic For Controlling Speed Of DC Motor”, The International Journal Of Engineering And Science (IJES), Vol. 2, Issue 5, 2013, pp. 33-39.
:10.22362/ijcert/2017/v4/i7/xxxx [UNDER PROCESS]
DOI Link : Not yet assigned
Download :
  V4I7002.pdf
Refbacks : There are currently no refbacks

 

Enhancing Load Balancing in Cloud Computing by Ant Colony Optimization Method
Authors : Prachi Verma, Sonika Shrivastava, R.K. Pateriya
Affiliations : Department of Computer Science & Engineering, MANIT, Bhopal, 462003, India
Abstract :

af

Cloud computing is an evolving technology which provides users “pay as you go” services on demand. Nowadays there is a tremendous increase in the use of the cloud by the clients due to its attractive features which results in a rapid growth of load on servers. Hence, load balancing has become a matter of concern in the domain of cloud computing. Load balancing is required to distribute the workload equally amongst all nodes in a network so that none of a node is overloaded or underloaded and each node does a similar amount of work in equal time. It minimizes the cost and time involved in the major computational models and helps to improve proper utilization of resources and system performance. Many approaches and algorithms are recommended by various researchers from all over the world to solve the problem of load balancing. In this paper, we present a technique built on Ant Colony optimization to address the issue of load balancing in a cloud environment.
Citation :

af

Prachi Verma, Sonika Shrivastava, & R.K. Pateriya. (2017). Enhancing Load Balancing in Cloud Computing by Ant Colony Optimization Method. International Journal of Computer Engineering In Research Trends, 4(6), 269-276. Retrieved from http://ijcert.org/ems/ijcert_papers/V4I6012.pdf
Keywords : Cloud Computing; Ant colony optimization, Swarm intelligence; Load Balancing;
References :

af

1 D. Saranya et.al, "Load Balancing Algorithms in Cloud Computing: A Review," International Journal of Advanced Research in Computer Science and Software Engineering, vol. 5, Issue 7, July 2015.
2 S. Sethi et.al, "Efficient Load Balancing in Cloud Computing using Fuzzy Logic," IOSR Journal of Engineering (IOSRJEN) ISSN: 2250-3021 vol. 2, pp. 65-71, July 2012.
3 T. Desai et.al, "A Survey of Various Load Balancing Techniques and Challenges in Cloud Computing," International Journal of Scientific & Technology Research, vol. 2, Issue 11, November 2013.
4 S. Rajoriya et.al, "Load Balancing Techniques in Cloud Computing: An Overview," International Journal of Science and Research (IJSR), vol. 3, Issue 7, July 2014
5 Sharma S. et.al, “Performance Analysis of Load Balancing Algorithms,” World Academy of Science, Engineering and Technology, 38, 2008.
6 Gross D. et.al, “Noncooperative load balancing in distributed systems”, Elsevier, Journal of Parallel and Distributed Computing, No. 65, pp. 1022-1034, 2005.
7 Nikravan M. et.al, “A Genetic Algorithm for Process Scheduling in Distributed Operating Systems Considering Load Balancing”, Proceedings 21st European Conference on Modelling and Simulation (ECMS), 2007.
8 M. Amar et.al, “SLA Driven Load Balancing for Web Applications in Cloud Computing Environment”, Information and Knowledge Management, 1(1), pp. 5-13, 2011.
9 Ekta Gupta et.al, “A Technique Based on Ant Colony Optimization for Load Balancing in Cloud Data Center”, 13th International Conference on Information Technology, 2014 IEEE.
10 M. Katyal et.al, “A Comparative Study of Load Balancing Algorithms in Cloud Computing Environment”, International Journal of Distributed and Cloud Computing Volume 1 Issue 2 December 2013 
11 S. Khan et.al, “Effective Scheduling Algorithm for Load Balancing using Ant Colony Optimization in Cloud Computing”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 2, February 2014..
12 Kun Li et.al, “Cloud Task scheduling based on Load Balancing Ant Colony Optimization”, 2011 Sixth Annual ChinaGrid Conference, 2011 IEEE.
13 D. Kashyap et.al, “A Survey Of Various Load BalancingAlgorithms In Cloud Computing”, INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 3, ISSUE 11, NOVEMBER 2014. 
14 Book: Ant colony optimization by Macro Dorigo and Thomas Stutzle.
15 R. Rastogi et.al, "Load Balancing of Nodes in Cloud Using Ant Colony Optimization." Proceedings of the 14th International Conference on Computer Modelling and Simulation (UKSim), March 2012, IEEE, pp: 3-8.
16 Calheiros, R.N.; Ranjan, R.; Beloglazov, A.; de Rose, C.A.F.; Buyya, R. CloudSim: A toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms. Software 2011, 41, 23–50.
17. T.Deepa, & S Sharon Amulya Joshi. (2016). A Survey on Load Balancing Algorithms in Cloud.
International Journal of Computer Engineering In Research Trends, 3(7), 371-374. Retrieved from http://ijcert.org/ems/ijcert_papers/3703.pdf
:10.22362/ijcert/2017/v4/i6/xxxx [UNDER PROCESS]
DOI Link : Not yet assigned
Download :
  V4I6012.pdf
Refbacks : Currently There are no refbacks
CloudSim Framework for Federation of identity management in Cloud Computing
Authors : Rohit Shere, Sonika Shrivastava, R.K. Pateriya
Affiliations : Department of Computer Science & Engineering, MANIT, Bhopal, 462003, India
Abstract :

af

Cloud computing is built on several components for managing and making provision of abundant resources to business, on demand. Identity management is the essential element in cloud computing, and it is an inevitable standard security module that keeps away unauthorized users with unintentional interference to the system. The majority of work is being done to enhance this identity management component to overcome current limitations in authentication mechanisms. Federation among different clouds can be helpful in minimizing overhead and cost in overall identity management. Many cloud service providers are present in the industry with their independent identity management, but very few of them supports the federation among themselves to tackle the whole business collapse situation due to any disaster caused by nature. The Federation among these vendors can bring healthy competition in business markets that will lead to boost the confidence of cloud user in cloud computing. In this paper, our research work addresses a framework for researchers in identity management in cloud computing. The framework takes minimal effort and time for creating and simulating test environment for the generalized cloud environment.
Citation :

af

Rohit Shere, Sonika Shrivastava, & R.K. Pateriya. (2017). CloudSim Framework for Federation of identity management in Cloud Computing. International Journal of Computer Engineering In Research Trends, 4(6), 269-276. Retrieved from http://ijcert.org/ems/ijcert_papers/V4I6011.pdf
Keywords : FID, ECC algorithm, Hashing technique, CloudSim, Sign up Authentication.
References :

af

1.	Hong Liu, Student Member, IEEE, Huansheng Ning, Senior Member, IEEE, Qingxu Xiong, Member,IEEE, and Laurence T. Yang, Member, IEEE2014, “Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing.”
2.	Adleman, L., “A subexponential algorithm for the discrete logarithm problem with application to cryptography”, Proc. 20th IEEE Found. Comp. Sci. Symp., 1979, 55-60. 
3.	Ganeshan R. et.al, “Performance analysis of Hyper-Elliptic Curve Cryptosystems over Finite Fields Fp for Genus 2 & 4”, IJCSNS Vol. 8 No. 12, Dec 2008
4.	“The Notorious Nine - Cloud Computing Top Threats in 2013,” https://downloads.cloudsecurityalliance.org/initiatives/top_threats“Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud,” IEEE Transactions on Services Computing, VOL. X, NO. X, XXXX 2014, accepted.
5.	Jin Li, Yan Kit Li, Xiaofeng Chen, Patrick P. C. Lee, Wenjing Lou, “A Hybrid Cloud Approach for Secure Authorized Deduplication”, IEEE Transactions on Parallel and Distributed Systems, 2014.
6.	Lluis Pamies-Juarez, Pedro Garcia-Lopez, Marc Sanchez-Artigas, Blas Herrera, “Towards the Design of Optimal Data Redundancy Schemes for Heterogeneous Cloud Storage Infrastructures” ,” Computer Networks, Vol.55, 1100-1113, 2011.
7.	Deyan Chen, Hong Zhao, “Data Security and Privacy Protection Issues in Cloud Computing”, International Conference on Computer Science and Electronics Engineering 2012.
8.	K. Ren, C. Wang, and Q. Wang, “Security Challenges for the Public Cloud,” IEEE Internet Computing, vol. 16, no. 1, pp. 69–73,2012.
9.	Qian Wang, Cong Wang, Kui Ren, Wenjing Lou, Jin Li, ”Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing”, Proc. IEEE transactions on parallel and distributed systems, vol. 22, no. 5, may 2011 .
10.	OASIS: Assertions and Protocol for the OASIS Security Assertion Markup Language (SAML) V2.0. OASIS Standard (2005) 
11.	Benjain Ertl, "Identity Harmonization for Federated HPC, Grid and Cloud Services", IEEE, pp. 621-627, 2016.
12.	Jaweher Zouari, "An Identity as a service framework for the cloud", IEEE, pp. 1-5, 2016.
13.	Yong Yu, "Identity based Remote Data Integrity hacking with perfect data privacy preserving for cloud storage", IEEE, pp. 1-11, 2016.
:10.22362/ijcert/2017/v4/i6/xxxx [UNDER PROCESS]
DOI Link : Not yet assigned
Download :
  V4I6011.pdf
Refbacks : There are currently no refbacks
Optimization of the 3rd Stage Rocket Trajectory Using Genetic Algorithm
Authors : K GOPINATH, P VIKRAM, N PRASHANTH
Affiliations : AERONAUTICAL DEPARTMENT,VEL TECH Dr.RR & Dr.SR UNIVERSITY
Abstract :

af

To optimize the third stage of a space launch vehicle, powered by Liquid Rocket Engine (LRE) and also to optimize the fuel efficiency by varying injection pressure and gravity turn. The space launch vehicle trajectory is designed analytically by using the general governing equations of the rocket. These trajectories are solved with the implementation of the genetic algorithm. The trajectories are designed and simulated with the commercial software MATLAB, furthermore the relation between parameters and generate MATLAB Coding to simulate the trajectory of the vehicle at 3rd stage. The governing equations are solved using Chebyshev polynomials subroutine and Lagrange polynomial equation available in MATLAB software. The variation of velocity, specific impulse, time is plotted for different parameter (injection pressure) values of the spacecraft
Citation :

af

K GOPINATH. (2017). Optimization of the 3rd Stage Rocket Trajectory Using Genetic Algorithm. International Journal of Computer Engineering In Research Trends, 4(6), 263-268. Retrieved from http://ijcert.org/ems/ijcert_papers/V4I6010.pdf
Keywords : 3rd Stage Rocket Trajectory Using Genetic Algorithm
References :

af

and space craft propulsion by
Martin J.L.Turner, states the information
about the above parameters1.
Trajectory Optimization for Target
Localization,Sameera S. Ponda
A simplified ascent trajectory optimization
procedure has been developed with
application of Ares I launch vehicle2.
Direct Trajectory Optimization by a
ChebyshevPseudospectral Method, journal
ofguidance, control, and dynamics Vol. 25,
No. 1, January–February 20023.
Fahroo, F., and Ross, I. M., “Costate
Estimation by a Legendre Pseudospectral
Method,” Journal of Guidance, Control, and
Dynamics, Vol. 24,No. 2, 2001, pp. 270–277.
Survey of Numerical Methods for
Trajectory Optimizationby John T. Betts
journal of guidance, control, and dynamics,
Vol. 21, No. 2, March–April 1998.
A chebyshev polynomial method for
optimal control with state
constraints,jacquesvlassenbroeckt,automatic
a, vol. 24, no. 4, pp. 499-506, 19884.
Space trajectory optimization and l1-
optimalcontrol problems, michael ross,
modern astrodynamics, pp. 155-
188,elsevierastrodynamics series, 20065.
A genetic algorithm approach to solving
optimal control problems with linearly
appearingcontrolsh. Seywaldr.r.kumarts.m.
deshpande,aiaa
:10.22362/ijcert/2017/v4/i6/xxxx [UNDER PROCESS]
DOI Link : Not yet assigned
Download :
  V4I6010.pdf
Refbacks : There are currently no refbacks
Biometrics based Cryptographic Key Generation using Finger Print
Authors : Mrs. A. Ruba, Dr. G. Rajkumar, Dr. K. Parimala
Affiliations : N.M.S.S.Vellaichamy Nadar College, Madurai – 625019, Tamilnadu, India.
Abstract :

af

Accurate and automatic identification and verification of users are essential in all system. Shared secrets like Personal Identification Numbers or Passwords and key devices such as Smart Cards are not presently adequate in few situations. What is necessary is a system that could authenticate that the person is the person. The biometrics is improving the capability to recognize the persons. The usage of biometrics system permits the identification of a living person according to the physiological or behavioral features to be accepted without human involvement. The construction of cryptographic key from biometrics is used to make safe our system. To implement this concept, sender’s recent fingerprint would be used to construct key by combining it with the information. For key decryption, the sender’s Database fingerprint images, which are previously kept by receiver’s end, would be used.
Citation :

af

Mrs. A. Ruba, Dr. G. Rajkumar, & Dr. K. Parimala. (2017). Biometrics based Cryptographic Key Generation using Finger Print. International Journal of Computer Engineering In Research Trends, 4(6), 259-262. Retrieved from http://ijcert.org/ems/ijcert_papers/V4I6009.pdf
Keywords : Information Security, Biometrics, Cryptography, Encryption, Decryption, Cryptographic Key Generation
References :

af

[1]	B. Raja Rao, Dr. E.V.V. Krishna Rao et al., “Finger Print Parameter based Cryptographic Key Generation”, International Journal of Engineering Research and Applications (IJERA), Vol. 2, Issue 6, Nov – Dec, 2012, pp. 1598 – 1604.
[2]	Dr. G. Rajkumar, Dr. K. Parimala and Mrs. A. Ruba, “An Innovative Approach to Genetic Algorithm based Cryptography”, International Jouranl of Computer Science, Vol. 5, Issue 1, No 9, 2017,  Page No. 1199 – 1202.
[3]	N. Ratha and J. Connell et al. Cancelable biometrics: A case study in fingerprints. Intl. Conf. on Pattern Recognition, page 370C373, 2006 
[4]	N. Ratha, J. Connell, and R. Bolle. Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal, 40(3):614C634, 2001. 
[5]	Nanavati, S. Thieme, M. and Nanavati, R. Biometrics: Identity Verification in a Networked World. Wiley Computer Publishing, New York, 2002 
[6]	Saad Abuguba, Milan M. Milosavljevic, and Nemanja Macek, “An Efficient Approach to Generating Cryptographic keys from the face and Iris Biometrics fused at the feature level,” International Journal of Computer Science and Network Security, Vol. 15, No. 6, June 2015.
[7]	Sanjukta Pal, Sucharita Pal, Dr. Pranam Paul “Fingerprint Geometry matching by Divide and Conquer Strategy” accepted and published in International Journal of Advanced Research in Computer Science(IJARCS), ISSN No. 0976-5697, Volume 4, No. 4, March-April 2013.
[8]	T. Connie, A. Teoh, M. Goh, and D. Ngo, “ Palm hashing: A novel approach for cancellable biometrics," Information processing letters, vol. 93, no. 1, pp. 1-5, 2005
[9]	Cryptography and Network Security Principles and Practices by William Stalling, Prentice Hall, 2005.
[10]	M.Sathya, & Dr.K.Thangadurai. (2017). Implementation of Optimization Using Eclat and PSO for Efficient Association Rule Mining. International Journal of Computer Engineering In Research Trends, 4(1), 4-8. Retrieved from http://ijcert.org/ems/ijcert_papers/V4I0102.pdf.

:10.22362/ijcert/2017/v4/i6/xxxx [UNDER PROCESS]
DOI Link : Not yet assigned
Download :
  V4I6009.pdf
Refbacks : There are currently no refbacks
Twitter Sentiment Analysis on Demonetization tweets in India Using R language
Authors : K.Arun , A.Srinagesh , M.Ramesh
Affiliations : Department of Computer Science, Acharya Nagarjuna University, Guntur, India,Dept of CSE, RVR & JC College of Engineering, Guntur , India
Abstract :

af

In this global village social media is in the front row to interact with people, Twitter is the ninth largest social networking website in the world, only because of microblogging people can share information by way of the short message up to 140 characters called tweets, It allows the registered users to search for the latest news on the topics they have an interest, Lakhs of tweets shared daily on a real-time basis by the members, it has more than 328 million active users per month , Twitter is the best source for the sentiment and opinion analysis on product reviews, movie reviews, and current issues in the world. In this paper, we present the sentiment analysis on the current twitters like Demonetization, Indians and all over the world people are sharing their opinions on Twitter about current news in the country. The sentiment analysis extracts positive and negative opinions from the twitter data set, R Studio provides the best environment for this Twitter sentiment analysis. Access Twitter data from Twitter API, data is written into txt files as the input dataset. Sentiment analysis is performed on the input dataset that initially performs data cleaning by removing the stop words, followed by classifying the tweets as positive and negative by polarity of the words. Generate the word cloud. Finally, that generates positive and negative word cloud, comparison of positive and negative scores to get the current public pulse and opinion
Citation :

af

K.Arun, A.Srinagesh, & M.Ramesh. (2017). Twitter Sentiment Analysis on Demonetization tweets in India Using R language. International Journal of Computer Engineering In Research Trends, 4(6), 252-258. Retrieved from http://ijcert.org/ems/ijcert_papers/V4I6008.pdf
Keywords : Twitter Data, Text Mining, Sentiment Analysis, NLP, R-Studio.
References :

af

1)	 Efthymios Kouloumpis. Theresa Wilson, Johanna Moore “Twitter Sentiment Analysis: The Good the Bad and the OMG!” In the Proceedings of Fifth International AAAI Conference on Weblogs and Social Media ,2011.
2)	Thelwall, M., Buckley, K., Paltoglou, G., Cai, D., & Kappas, “A Sentiment strength detection in short text”, Journal of the American Society for Information Science and Technology, 61(12), 2544–2558, 2010
3)	https://apps.twitter.com/app/13647643, Date accessed:12/04/2017
4)	https://about.twitter.com/company,Date  accessed:12/04/2017
5)	http://blog.revolutionanalytics.com/2017/01/cran-10000.html
6)	Yu.H and Hatzivassiloglou.V “Towards answering opinion questions: separating facts from opinions and identifying the polarity of opinion sentences” In the Proceedings of the Conference on Empirical Methods in Natural Language Processing (EMNLP-03),NOV 2003.
7)	M De Choudhury, YR Lin, H Sundaram, KS Candan, L Xie, A Kelliher  “Authoritative Sources in a Hyperlinked Environment” International AAAI Conference on Weblogs and Social Media 2010, ed. Conference Program Committee, AAAI Press, New York., MAY 2010, pp-34-41.
8)	 Hu, M., & Liu, B. (2004). Mining opinion features in customer reviews. National Conference on Artificial Intelligence.
9)	https://lagunita.stanford.edu/c4x/Engineering/CS-224N/asset/slp4.pdf, Date accessed:21/04/2017
10)	Jockers, M. L. (2017). Syuzhet: Extract sentiment and plot arcs from text. Retrieved from  https://github.com/mjockers/syuzhet.
11)	Sunil B. Mane, Kruti Assar, Priyanka Sawant, & Monika Shinde. (2017). Product Rating using Opinion Mining. International Journal of Computer Engineering in Research Trends, 4(5), 161-168. Retrieved from http://ijcert.org/ems/ijcert_papers/V4I503.pdf. 
:10.22362/ijcert/2017/v4/i6/xxxx [UNDER PROCESS]
DOI Link : Not yet assigned
Download :
  V4I6008.pdf
Refbacks : There are currently no refbacks
RULE OF LAW-AN OVERVIEW
Authors : Deepti Monga, ,
Affiliations : Panjab University, Chandigarh, India
Abstract :

af

Background/Objectives: The concept of rule of law opposed to arbitrary use of discretionary power of administrative authorities. It says that rule should be according to law and not according to man. It is the basic structure of our Constitution. Equality before law is corollary of rule of law. Methods/Statistical analysis: The methodology which is going to be adopted for the present research work will mainly be based on doctrinal analysis, i.e., the theoretical sources. The theoretical work will relate to administrative action of public body; their policies; Constitutional, Legislative, Executive and judicial control of administrative action through doctrine of legitimate expectation. It is proposed to collect material from various discipline of administrative and Constitutional law. It is also pertinent to mention that research will heavily reply on various journals, reviews and national & international judicial pronouncements. Findings: the modern concept of rule of law implies that the function of government in the free society should be executed in such a way so that civil and political rights of individual are recognized. Rule of law opposed to arbitrary power. It is corollary to Article 14 as it requires fairness in administrative actions. To enable or to compete with each other on equal planes it is necessary to take positive steps to equip the disadvantaged to bring to the level of fortunate advantage.
Citation :

af

Deepti Monga .(2017).RULE OF LAW-AN OVERVIEW.International Journal of Computer Engineering In Research Trends,4(6),248-251.Retrieved from http://ijcert.org/ems/ijcert_papers/V4I6006.pdf
Keywords : Rule of law, right to equality, judicial review.
References :

af

  J.J.R. Upadhyaya, Administrative Law, 27 (2004).  
  I.P.Massy, Administrative Law, 20 (1998). 
  Upadhyaya, Supra note 1 at 27.
  Available at www.lexisnexis.co.uk accessed on October 27, 2016.
  Ram Prasaed Narayan Sahi v. State of Bihar, AIR 1953 SC 215 at 217.
  Available at plato.stanford.edu accessed on October 27, 2016.
  Upadhyaya, Supra note 1 at 27.
 Quoted in Jagdish Swarup, L. M. Singhvi, Constitution of India-II, 236-237(2006).
  Massy, Supra note 2 at 20.
  Jagdish Swarup, L. M. Singhvi, Supra note 8 at 236.
  Upadhyaya, Supra note 1 at 27.
  U.P.D. Kesari, Lectures on Administrative Law, 24 (14th Ed).
  M.P.Jain, Indian Constitutional Law, 6 (2006). 
  Upadhyaya, supra note 1 at 29-30.
  I.P.Massy, Administrative Law, 2 (1999). 
  (1976) 2 SCC 521.
  A.I.R. 1970 SC 150
  H.W.R. Wade, Administrative Law, 25-26 (1977).
  Upadhyaya, Supra note 1 at 30.
  (1990) 2 SCC 653 at 658-59.
  AIR 1988 SC 1768 at 1769.
  AIR 1982 SC 1325.
  AIR 1987 SC 579.
  1999 SCC (cri) 577.
  AIR 1975 SC 2299.
:10.22362/ijcert/2017/v4/i6/xxxx [UNDER PROCESS]
DOI Link : Not yet assigned
Download :
  V4I6006.pdf
Refbacks : There are Currently no refbacks
ESTOPPEL AND LEGITIMATE EXPECTATION
Authors : Deepti Monga, ,
Affiliations : Panjab University, Chandigarh, India
Abstract :

af

Background/Objectives: Estoppels is a rule of evidence which prevents a party from denying the fact which he has already been asserted. The doctrine of legitimate expectation is closely related to the principle of estoppel as both the doctrines are based upon a clear and unambiguous promise. Methods/Statistical Analysis: The methodology which is going to be adopted for the present research work will mainly be based on doctrinal analysis, i.e., the theoretical sources. The theoretical work will relate to the administrative action of the public body; their policies; Constitutional, Legislative, Executive and judicial control of administrative action through the doctrine of legitimate expectation. It is proposed to collect material from the various discipline of Administrative and Constitutional law. It is also pertinent to mention that research will heavily rely on different journals, reviews, and national & international judicial pronouncements. Findings: Legitimate expectation has an important place in the realm of administrative law. It is an integral component of the principle of the rule of law that power should not be exercised arbitrarily. One of the safeguards is provided through judicial interpretation in a long list of cases that this administration discretion is subject to legitimate expectation vested in the people. It cannot be expected that there can be judicial intervention in the policy framing by the executive as it is an essential function belonging to the executive.
Citation :

af

Deepti Monga .(2017).ESTOPPEL AND LEGITIMATE EXPECTATION.International Journal of Computer Engineering In Research Trends,4(6),242-247.Retrieved from http://ijcert.org/ems/ijcert_papers/V4I6005.pdf
Keywords : Legitimate expectation, estoppels, judicial review, natural justice, the rule of law.
References :

af

  	H.K. Saharay (Ed.), M. Monir’s Law of Evidence, volume 2, 1863 (2006).
  	C.D. Field’s (Revised by Gopats Chaturvedi), C.D. Field’s Law of Evidence in India, Pakistan, Bangladesh, Burma, Ceylon, Malaysia and Singapore, vol. 5 at 4249 (12th Edition, 2007).
  	Batuk Lal, The Law Of Evidence, 375 (2004).
  	(1851) 1 SIM (N.3.) 205 at 207 quoted in Denis Browne, Ashburner’s Principles of Equity, 445 (1933).
  	H.W.R. Wade, Administrative law, 64 (1988). 
  	Cited from Sharma Transport v. Govt. of A.P., (2002) 2 SCC 188 at 201.
  	Available at: http://www.cili.in/article/viewFile/1544/1130 accessed on February 16, 2009.

  	1880 ILR 5 Cal 669.
  	1905 ILR 29 Bom 580; (1904) 29 Bom 580.
  	Available at: https://indiankanoon.org/doc/1880129/ accessed on May 2, 2016.
  	AIR 1968 SC 718. 
  	Id. at 718.
  	AIR 1954 Cal 151.
  	Id. at 156.
  	Hira Industries Ltd. v. State of C.G. and Ors., AIR 2007 Chh 7 at 17.
  	(1969) 1 All ER 904.
  	Available at: http://www.supremeCourtofindia.nic.in/speeches/speeches_2009/Jud cial_Review_of_Administrative_Action at 8 accessed on August 24, 2009. 
  	C.F. Forsyth, “The Provenance and Protection of Legitimate Expectations”, The Cambridge Law Journal, vol. 47, No. 2, 238-260 at 238 (July, 1988). 
  	Bugalo Maripe, “Legitimate Expectations and the Right to a Hearing: Lessons from the George Arbi Case”, Journal of African Law, vol. 42, No. 1 94-100 at 97 (1998).
  	Civil Appeal No. 15/93 (unreported). 
  	Bugalo Maripe, supra note 80 at 96-97.
  	(1985) AC 375: (1985) AC 374 (408-409).
  	(1990) 170 CLR 1.
  	M.A. Ikhariale, “The Doctrine of Legitimate Expectations: Prospects and Problems in Constitutional Litigation in South Africa”, Journal of African Law, vol. 45, No. 1, 1-12 at 4 (2001).
.
  	Available at: https://www.quora.com/What-are-the-similarities-and-differences between-the-doctrine-of-legitimate-expectation-and-the-doctrine-of estoppel accessed on November 18, 2015.
  	R (Bibi) v. Newham, LBC (2002) 1 WLR 237 at 55 available at supra note 4 at 6.
  	Councils of Civil Service Unions v. Minister for Civil Services, (1984) 3 All ER 935 cited from   Navjyoti Co-Group Housing Society v. Union of India, AIR 1993 SC 155 at 165.
  	AIR 1993 SC 155. 
  	Id. at 155.
  	Haoucher v. Min., (1991) L.R.C. (Const.) 819 (836’) – Australia quoted in Durga Das Basu, Constitutional Remedies and Writs, 367 (1994).
  	Official Liquidator v. Dayanand, (2008) 10 SCC 1 at 66.
  	MANU/SC/0392/2003.
  	MANU /SC/0219/1994.
  	Supra note 31.
  	Id. at 223. 
  	AIR 1999 SC 1801.
  	Id. at 1801-1802.
  	(1979) 2 SCC 409.
  	Id. at 452.
  	(1998) 2 SCC 502.
  	Id. at 509.
:10.22362/ijcert/2017/v4/i6/xxxx [UNDER PROCESS]
DOI Link : Not yet assigned
Download :
  V4I6005.pdf
Refbacks : There are currently no refbacks
GST- Present and Future
Authors : Ms. BHAWNA MUKARIA , ,
Affiliations : Former Assistant Professor Hindu College (Commerce Department), Sonipat -131001, Haryana, India
Abstract :

af

This paper is an analysis of the impact of GST (Goods and Services Tax) on Indian Taxation System. Here, we will study with a brief description of the historical scenario of Indian Taxation and its tax structure. Here, we are going to study about the present tax system and the impact of implementing GST in Indian Economy. The changed indirect tax system GST- Goods and Service Tax is planned to execute in India. Govt does not yet declare the GST implementation. And the implementation of GST law is under process. It is going to be implemented on 1st July 2017. The objective will be to maintain a common point between the basic structure and design of CGST, SGST, and SGST between states. In this article, I have started with the history of taxation in India after that I have included various opportunities and challenges, proposed work and various impacts of GST on Economy that GST brings before us to strengthen our free market economy.
Citation :

af

BHAWNA MUKARIA .(2017).GST- Present and Future.International Journal of Computer Engineering In Research Trends,4(6),236-242.Retrieved from http://ijcert.org/ems/ijcert_papers/V4I6004.pdf
Keywords : GST (Goods ad Service Tax), VAT (Value Added Tax), CGST (Central Goods and Service Tax), SGST (State Goods and Service Tax), I-GST (Integrated Goods and Service Tax)
References :

af

1)	GST to hit consumers, unorganized jobs. The Tribune, 2016.
2)	M. Economics.com
3)	Indian Express.com>business>Economy
4)	www.relakhs.com
5)	www.mapsofindia.com
6)	http://en.m.wikipedia.org
:10.22362/ijcert/2017/v4/i6/xxxx [UNDER PROCESS]
DOI Link : Not yet assigned
Download :
  V4I6004.pdf
Refbacks : Currently there are no refbacks
Content-Based Image Retrieval in Cloud Using Watermark Protocol and Searchable Encryption
Authors : R.Santhi , Dr.D.Yuvaraj,
Affiliations : Computer Science and Engineering, M.I.E.T Engineering College, Trichy
Abstract :

af

With the development of the imaging devices, such as digital cameras, smartphones, and medical imaging equipments, our world has been witnessing a tremendous growth in quantity, availability, and importance of images. The needs of efficient image storage and retrieval services are reinforced by the increase of large-scale image databases among all kinds of areas. Compared with text documents, images consume much more storage space. Hence, its maintenance is considered to be a typical example for cloud storage outsourcing. For privacy-preserving purposes, sensitive images, such as medical and personal images, need to be encrypted before outsourcing, which makes the CBIR technologies in plaintext domain to be unusable. In order to secure the data in cloud, the proposed system supports CBIR over encrypted images without leaking the sensitive information to the cloud server. Firstly, feature vectors are extracted to represent the corresponding images. After that, the pre-filter tables are constructed by locality-sensitive hashing to increase search efficiency. Moreover, the feature vectors are protected by the secure kNN algorithm, and image pixels are encrypted by a standard stream cipher. In addition, considering the case that the authorized query users may illegally copy and distribute the retrieved images to someone unauthorized, a watermark-based protocol is used to deter such illegal distributions. In watermark-based protocol, a unique watermark is directly embedded into the encrypted images by the cloud server before images are sent to the query user. Hence, when an illegal image copy is found, the unlawful query user who distributed the image can be traced by the watermark extraction.
Citation :

af

R.Santhi,Dr.D.Yuvaraj.(2017).Content-Based Image Retrieval in Cloud Using Watermark Protocol and Searchable Encryption.International Journal of Computer Engineering In Research Trends,4(6),231-235.Retrieved from http://ijcert.org/ems/ijcert_papers/V4I6003.pdf
Keywords : CBIR (Content-Based Image Retrieval), kNN algorithm, watermark, encrypted image.
References :

af

1.	Zhihua Xia, Xinhui Wang, Liangao Zhang, Zhan Qin, Xingming Sun, Kui Ren, “A Privacy-preserving and Copy-deterrence Content-based Image Retrieval Scheme in Cloud Computing” IEEE TRANSCATION ON INFORMATION FORENSIC AND SECURITY, VOL.11, NO. 11, NOVEMBER 2016.

2.	B. Ferreira, J. Rodrigues, J. Leit˜ao, and H. Domingos, “Privacypreserving content-based image retrieval in the cloud,” arXiv preprint arXiv:1411.4862, 2014.

3.	A. Rial, M. Deng, T. Bianchi, A. Piva, and B. Preneel, “A provably secure anonymous buyer–seller watermarking protocol,” Information Forensics and Security, IEEE Transactions on, vol. 5, no. 4, pp. 920– 931, 2010.

4.	Carson, C., Thomas, M., Belongie, S.,   Hellerstein, J. M. and Malik, J. 1999. Blobworld: A system for region-based image indexing and retrieval. In Proceedings of the Third International Conference on Visual Information and Information Systems, Springer-Verlag, London, UK. 509-516. 
5.	C. Wang, K. Ren, S. Yu, and K. M. R. Urs, “Achieving usable and privacy-assured similarity search over outsourced cloud data,” in Proc. of INFOCOM. IEEE, 2012, pp. 451–459.

6.	D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, “Public key encryption with keyword search,” in Advances in Cryptology-Eurocrypt. Springer, 2004, pp. 506–522.

7.	S. Anto, S. Chandramathi,” An Expert System based on SVM and Hybrid GA-SA Optimization for Hepatitis Diagnosis,”, International Journal of Computer Engineering In Research Trends, 2(7):437-443, 2015.

8.	F. Long, H. J. Zhang, and D. D. Feng, "Fundamentals of Content-based Image Retrieval," in Multimedia Information Retrieval and Management, D. Feng Eds,Springer, 2003.

9.	Shivangi Jindal, Harkiran Kaur, “Intensification of Resolution in the Realm of
Digital Imaging,” International Journal of Computer Engineering In Research Trends, 3(6):343-346,2016.
10.	J. C. Bezdek, “Pattern Recognition with Fuzzy Objective Function Algorithms”, New York: Plenum Press, 1981. 

11.	Ma, W. and Manjunath, B.S. (1999) NeTra: a toolbox for navigating large image databases. Multimedia Systems, Springer-Verlag, Berlin, Germany. 7(3), 184-198. 

12.	Nbhan D. Salih , David Chek Ling Ngo, “ A novel method for shape representation,”  GVIP 05 Conference, 19-21 December 2005.

13.	Ravichandran K. and Ananthi B., “Color Skin Segmentation Using K-Means Cluster,  ” International Journal of Computational and Applied Mathematics, vol.4, no.2, pp. 153-157 , 2009.

14.	Rui, Y., Huang, T. S. and Mehrotra, S. 1997. Content-based image retrieval with relevance feedback in MARS. In Proceedings of International Conference on Image Processing. 2, 815-818. 

15.	S. Lian, Z. Liu, R. Zhen, and H. Wang, “Commutative watermarking and encryption for media data,” Optical Engineering, vol. 45, no. 8, pp. 080 510–080 510, 2006.

16.	W. Sun, B. Wang, N. Cao, M. Li, W. Lou, Y. T. Hou, and H. Li, “Privacypreserving multi-keyword text search in the cloud supporting similaritybased ranking,” in Proc. of 8th ACM SIGSAC symposium on Information, computer and communications security.
17.	Y. Ren, J. Shen, J. Wang, J. Han, and S. Lee, “Mutual verifiable provable   data auditing in public cloud storage,” Journal of Internet Technology, vol. 16, no. 2, pp. 317–323, 2015.

18.	Z. Fu, K. Ren, J. Shu, X. Sun, and F. Huang, “Enabling personalized search over encrypted outsourced data with efficiency improvement,” IEEE Transactions on Parallel & Distributed Systems, vol. PP, no. Online, pp. 1–1, 2015.
:10.22362/ijcert/2017/v4/i6/xxxx [UNDER PROCESS]
DOI Link : Not yet assigned
Download :
  V4I6003.pdf
Refbacks : Currently There are no refbacks
Enhancement in Crawling and Searching (Using Extended Weighted Page Rank Algorithm based on VOL)
Authors : Ms.Isha Mahajan, Ms. Harjinder Kaur, Dr. Darshan Kumar
Affiliations : Department of Computer Science & Engineering SSIET, Dinanagar - 143531, Distt. Gurdaspur, Punjab (India)
Abstract :

af

As the World Wide Web is becoming gigantic day by day, the number of web pages is increasing into billions around the world. To make searching much easier for users, search engines came into existence. Search engines are used to find specific information on the WWW. Without search engines, it would be almost impossible for us to locate anything on the Web unless or until we know a specific URL address. Every search engine maintains a central repository or databases of HTML documents in indexed form. Whenever a user query comes, searching is performed within that database of indexed web pages. The size of a repository of every search engine cannot keep each page available on the WWW. So it is desired that only the most relevant and important pages be stored in the database to increase the efficiency of search engines. This search engine database is maintained by special software called “Crawler.” A Crawler is a software that traverses the web and downloads web pages. Web Crawlers are also known as “Web Spiders,” “Robots,” “Internet Bots,” “Agents” and automatic Indexers” etc. Broad search engines, as well as many more specialized search tools, rely on web crawlers to acquire large collections of pages for indexing and analysis. Since the Web is a distributed, dynamic and rapidly growing information resource, a crawler cannot download all pages. It is almost impossible for crawlers to crawl the whole web pages from World Wide Web. Crawlers crawl the only fraction of web pages from World Wide Web. So a crawler should observe that the fraction of pages crawled must be most relevant and the most important ones, not just random pages. The crawler is an important module of a search engine. The quality of a crawler directly affects the searching quality of search engines. In our Work, we propose to improve the crawling of a web crawler, to crawl only relevant and important pages from WWW, which will lead to reduced server overheads. With our proposed architecture we will also be optimizing the crawled data by removing least used or never browsed pages. The crawler needs a huge memory space or database for storing page content etc, by not storing irrelevant and unimportant pages and never removing accessed pages, we will be saving a lot of memory space that will eventually speed up the queries to the database. In our approach, we propose to use Extended Weighted page rank based on visits of links algorithm to sort the search results, which will reduce the search space for users, by providing mostly visited pages and most time devoted pages by the user on the top of search results list. Hence reducing search space for the user.
Citation :

af

Isha Mahajan et.al, “Enhancement in Crawling and Searching(Using Extended Weighted Page Rank Algorithm based on VOL)”, International Journal of Computer Engineering In Research Trends, 4(6):pp:202-230,June-2017.
Keywords : Web Crawler, Extended Weighted Page Rank based on Visits of links, Weighted Page Rank, Page Rank, Page Rank based on visit of links, Search Engine, Crawling, bot, Information Retrieval Engine, Page Reading Time, User Attention Time, World Wide Web, Inlinks, Outlines, Web informational retrieval, online search.
References :

af

[1]	Internet World Stats survey  report available at - << http://www.internetworldstats.com/stats.htm >>.
[2]	Pew Research center’s Internet and American Life Project Survey  report available at  - << http://www.pewinternet.org/2012/03/09/main-findings-11/ >>.
[3]	Average Traffic a website receives from a Search Engine is << http://moz.com/community/q/what-is-the-average-percentage-of-traffic-from-search-engines-that-a-website-receives >>
[4]	Size of World Wide Web is available at  << http://www.worldwidewebsize.com/ >>
[5]	Carlos Castillo, Mauricio Marin, Andrea Rodrigue and Ricardo Baeza-Yates, “Scheduling Algorithms for Web Crawling” Proceedings of the Web Media & LA-Web 2004, 0-7695-2237-8 ©2004 IEEE, Pages 10-17.
[6]	S. Lawrence and C. L. Giles. Searching the World Wide Web. Science, 280 (5360) : 98–100, 1998.
[7]	Introduction to Web Crawler is available at - << http://en.wikipedia.org/wiki/Web_crawler >>
[8]	Introduction to Web Crawler is available at - << http://searchsoa.techtarget.com/definition/crawler >>
[9]	Amit Chawla and Rupali Ahuja, “Crawling the Web : Discovery and Maintenance of Large-Scale Web Data”, International Journal of Advances in Engineering Science (IJAES), ISSN: 2231- 0347, Volume-3, Pages 62-66, July 2013.
[10]	Sachin Gupta, Sashi Tarun and Pankaj Sharma, “Controlling access of Bots and Spamming Bots”, International Journal of Computer and Electronics Research (IJCER), ISSN: 2278-5795, vol. 3,issue 2, April 2014.
[11]	Sonal Tuteja, “Enhancement in Weighted PageRank Algorithm Using VOL”, IOSR Journal of Computer Engineering (IOSR-JCE), ISSN: 2278-0661, vol. 2, issue 6, pp. 135-141, Sept-Oct 2013.
[12]	Shweta Agarwal and Bharat Bhushan Agarwal, “An Improvement on Page Ranking Based on Visits of Links”, International Journal of Science and Research (IJSR), ISSN: 2319-7064, vol. 2, issue 6, pp. 265-268, June 2013.
[13]	S. Brin, and Page L., “The Anatomy of a Large Scale Hypertextual Web Search Engine”, Computer Network and ISDN Systems, vol. 30, issue 1-7, pp. 107-117, 1998. 
[14]	Wenpu Xing and Ali Ghorbani, “Weighted PageRank Algorithm”, Proceedings of the Second Annual Conference on Communication Networks and Services Research (CNSR ’04), IEEE, 2004.
[15]	Gyanendra Kumar, Neelam Duahn, and Sharma A. K., “Page Ranking Based on Number of Visits of Web Pages”, International Conference on Computer & Communication Technology (ICCCT)-2011, 978-1-4577-1385-9. 
[16]	Neelam Tyagi and Simple Sharma, “Weighted Page Rank Algorithm Based on Number of Visits of Links of Web Page”, International Journal of Soft Computing and Engineering (IJSCE), ISSN: 2231-2307, vol. 2, issue 3, pp. 441–446, July 2012.
[17]	Animesh Tripathy and Prashanta K Patra, “A Web Mining Architectural Model of Distributed Crawler for Internet Searches Using PageRank Algorithm”, Asia-Pacific Services Computing Conference, 978-0-7695-3473-2/08 © 2008 IEEE, Pages 513-518.
[18]	Lay-Ki Soon, Yee-Ern Ku  and Sang Ho Lee, “Web Crawler with URL Signature – A Performance Study”, 4th Conference on Data Mining and Optimization (DMO) 978-1-4673-2718-3/12 ©2012 IEEE,  Pages 127-130.
[19]	Farha R. Qureshi and Amer Ahmed Khan, “URL Signature with body text normalization in a web crawler”, International Journal of Societal Applications of Computer Science (IJSACS), ISSN 2319 – 8443, vol. 2, issue 3, Pages 309-312, March 2013.
[20]	Saurabh Pakhidde , Jaya Rajurkar and Prashant Dahiwale,  “Content Relevance Prediction Algorithm in Web Crawlers to Enhance Web Search”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), ISSN: 2278 – 1323, vol 3, issue 3, March 2014.
[21]	Prashant Dahiwale, Pritam Bhowmik, Tejaswini Bhorkar and Shraddha Shahare, “Rank Crawler : A Web Crawler with Relevance Prediction Mechanism for True Web Analysis”, International Journal of Advance Foundation and Research in Computer (IJAFRC), ISSN: 2348-4853, vol. 1,issue 4, April 2014.
[22]	Information on HTTP_Referer is available at - << http://en.wikipedia.org/wiki/HTTP_referer >>.
[23]	Information on Url Normalization is available at - << http://en.wikipedia.org/wiki/Url_normalization >>.
[24]	Information on MD5 Hashing Algorithm is available at - << http://en.wikipedia.org/wiki/MD5 >>.
[25]	Introduction to WHOIS is available at - << http://en.wikipedia.org/wiki/Whois >>.
[26]	Sachin Gupta and Pallvi Mahajan, “Improvement in Weighted Page Rank based on Visits of Links (VOL) Algorithm”, International Journal of Computer and Communications Engineering Research (IJCCER), ISSN: 2321-4198, Vol. 2, Issue 3, Pages 119-124, May 2014.
[27]	Sachin Gupta and Sashi Tarun, “Extended Architecture of Web Crawler”, International Journal Of Computer & Electronics Research (IJCER), ISSN: 2278-5795, Vol. 3, Issue 3, Pages 147-169, June 2014.
[28]	Isha Mahajan, Harjinder Kaur and Dr. Darshan Kumar, “Extended Weighted Page Rank based on VOL by finding User Activities Time and Page Reading Time”, International Journal of Engineering Works (IJEW), ISSN: 2409-2770, Vol. 7, Issue 2, Pages 41-48, Feb 2017.
[29]	Introduction to Code Minification is available at - << https://developers.google.com/speed/docs/insights/MinifyResources >>.
[30]	Javascript Code Minification Api is available at - << https://javascript-minifier.com/ >>.
[31]	Introduction to Cron Jobs is available at - << https://code.tutsplus.com/tutorials/scheduling-tasks-with-cron-jobs--net-8800 >>.
[32]	Domain age calculating Api is available at - << https://github.com/99webtools/PHP-Domain-Age >>.
[33]	Mubasheera Tazeen, Shasikala.Ch, Dr.S.Prem Kumar,” Ontology Based PMSE with Manifold Preference”, International Journal of Computer Engineering In Research Trends (IJCERT),ISSN:2349-7084,Vol 1,Issue 1,Pages 15-21,July 2014.
[34]	Sachin Desale, Akhtar Rasool, Sushil Andhale, Priti Rane,” Heuristic and Meta-Heuristic Algorithms and Their Relevance to the Real World: A Survey”, International Journal of Computer Engineering In Research Trends (IJCERT),ISSN:2349-7084,Vol  2,Issue  5,Pages 296-304,May  2015.
:10.22362/ijcert/2017/v4/i6/xxxx [UNDER PROCESS]
DOI Link : Not yet assigned
Download :
  V4I6002.pdf
Refbacks : There are currently no refbacks
Survey on Big Data using Apache Hadoop and Spark
Authors : Priya Dahiya , Chaitra.B , Usha Kumari
Affiliations : Information Science Dept. , Acharya Doctor Sarvepalli Radhakrishnan Rd, Bengaluru, Karnataka 560107, India.
Abstract :

af

Big data is growing rapidly regarding volume, variability, and velocity which make it difficult to process, capture and analyze the data. Hadoop uses MapReduce which has two parts Map and Reduce whereas Spark uses Resilient Distributed Datasets (RDD) and Directed Acyclic Graph (DAG) for processing of large datasets. To store data both of them uses Hadoop Distributed File System (HDFS).This paper shows the architecture and working of Hadoop and Spark and brings out the differences between them and the challenges faced by MapReduce during processing of large datasets and how Spark works on Hadoop YARN.
Citation :

af

Priya Dahiya et.al, “Survey on Big Data using Apache Hadoop and Spark”, International Journal of Computer Engineering In Research Trends, 4(6):pp:195-201,June -2017.
Keywords : Big data, Spark, Hadoop, HDFS, MapReduce, YARN
References :

af

1. Varsha B.Bobade, “Survey Paper on Big Data and Hadoop”, International Research Journal of Engineering and Technology (IRJET) , Volume: 03 Issue: 01 | Jan-2016, e-ISSN: 2395-0056  p-ISSN: 2395-0072.

2. S. Justin Samuel, Koundinya RVP, Kotha Sashidhar and C.R. Bharathi,  “A SURVEY ON BIG DATA AND ITS RESEARCH CHALLENGES”, VOL. 10, NO. 8, MAY 2015 ISSN 1819-6608, ARPN Journal of Engineering and Applied Sciences.

3.Ms. Vibhavari Chavan, Prof. Rajesh. N. Pursue “Survey Paper On Big Data”, Vibhavari 
Chavan et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (6) , 2014, 7932-7939.

4. Ankush Verma ,Ashik Hussain Mansuri ,Dr. Neelesh Jain “Big Data Management Processing with Hadoop MapReduce and Spark Technology: A Comparison” 2016 Symposium on Colossal Data Analysis and Networking (CDAN) , 978-1- 5090-0669-4/16/$31.00 © 2016 IEEE. 

5. Wei Huang, Lingkui Meng, Dongying Zhang, and Wen Zhang, “In-Memory Parallel Processing of Massive Remotely Sensed Data Using an Apache Spark on Hadoop YARN Model” , IEEE JOURNAL OF SELECTED TOPICS IN APPLIED EARTH OBSERVATIONS AND REMOTE SENSING, VOL. 10, NO. 1, DECEMBER 2016.

6. Katarina Grolinger, Michael Hayes, Wilson A. Higashino, Alexandra L'Heureux1 David S.Allison ,Miriam A.M. Capretz, “Challenges for MapReduce in Big Data ”, 978-1- 4799-5069-0/14 $31.00©2014IEEEDOI10.1109/SERVICES.2014.4.

7. Xiuqin LIN, Peng WANG, Bin WU, “LOG ANALYSIS IN CLOUD COMPUTING ENVIRONMENT WITH HADOOP AND SPARK”, 978-1-4799-0094-7/13/$31.00©2013

8. K..Naga Maha Lakshmi et al., International Journal of Computer Engineering In Research Trends ,Volume 3, Issue 3, March-2016, pp. 134-142.

9. Sunil B. Mane et.al, “Product Rating using Opinion Mining”, International Journal of Computer Engineering In Research Trends, 4(5):161-168 ,May -2017.
:10.22362/ijcert/2017/v4/i6/xxxx [UNDER PROCESS]
DOI Link : Not yet assigned
Download :
  V4I6001.pdf
Refbacks : There are Currently no refbacks

 

DESIGN OF AN UNMANNED HOVERCRAFT
Authors : A.M Anushree Kirthika , Jagan Raj,
Affiliations : Aeronautical Department, Vel Tech Dr. RR& Dr.SR Technical University, Chennai, 600 062 India
Abstract :

af

This paper deals with the design of hovercraft where the hovercraft can travel on land as well as on water which is an unmanned aerial vehicle with a maximum take-off weight are 0.8 kg. The design of this hovercraft which is capable of hovering and forward motion. The hovercraft design criteria involve the stability and power to weight ratio. The air intake in a hovercraft plays a major role in the flow of air into the skirt. This design involves a multi-propeller hovercraft. There are holes designed for optimizing the design. The hover height is 15 cm. An open plenum type of hovercraft with a bag skirt configuration opts. The design of hovercraft is done via CATIA.
Citation :

af

A.M Anushree Kirthika et.al, “DESIGN OF AN UNMANNED HOVERCRAFT”, International Journal of Computer Engineering In Research Trends, 4(5):pp:190-194 ,May -2017.
Keywords : Hovercraft, hover, Open Plenum, Multipropeller hovercraft
References :

af

1)	A.K. Amiruddin, S.M. Sapuan and A.A. Jaafar “Development of a hovercraft prototype with an aluminum hull base”, International Journal of the Physics Sciences vol.6(17), pp.4185-4194, 2 September 2011
2)	Grant Wagner, Michael Butler, Derek Smith, Kyle Palmer, “Design and fabrication of a model hovercraft”, Final Report, Rose – Hulman Institute of Technology, Terre Haute, Indiana, 2 July 2008.
3)	C. Fitzergerald and R. Wilson, “Light Hovercraft Design”, 3rd Hoverclub of America Inc, 1995, 37-38.
4)	Grant Wagner “Universal Hovercraft, The World Leader in Hovercraft
5)	Introduction to RC Modeling -Module 4 Make a Hovercraft
6)	Kofi Anguah, Nick Szapiro “Design and construction of a Passenger Hovercraft”, E90 Final Report, 05/08/2009
7)	S.V. Uma Maheswara Rao, V.S. Surya Prakash (Professor, M.E Student, Department of Marine Engineering, AUCE (A), Visakhapatnam-5300003) Development of An Integrated Air Cushioned Vehicle (Hovercraft), International Journal of Modern Engineering Research (IJMER), 4(5),2014, 21.
8)	Edwin Chan Hanjiang, “Design of a working Model Hovercraft”, University Malaysia Pahang.
9)	S.H. Mohamed Noor, K.Syam, A.A Jaafar, M.F.Mohamad Sharif, IOP Publishing, Proceedings of i-MEC-APCOMS 2015.
:10.22362/ijcert/2017/v4/i5/xxxx [UNDER PROCESS]
DOI Link : Not yet assigned
Download :
  V4I509.pdf
Refbacks : There are no currently ref backs
An Ultra Wideband Bandpass Filter using Stepped Impedance Resonators and DGS Structures
Authors : Intekhab Hussain, M.G.Tiary,
Affiliations : Assistant Professor, AEIE Department, Asansol Engg. College, Asansol, WB, India.
Abstract :

af

In this paper, a compact ultra wideband (UWB) bandpass filter (BPF) with a passband covering 4.73 GHz to 10.43GHz with a bandwidth of 5.7 GHz and a fractional bandwidth of 75.2% is proposed. The filter has three transmission poles in the passband and has a wide stop band. The design and the performance of the proposed UWB BPF are characterized by using full-wave electromagnetic simulator IE3D.
Citation :

af

Intekhab Hussain et.al, “An Ultra Wideband Bandpass Filter using Stepped Impedance Resonators and DGS Structures”, International Journal of Computer Engineering In Research Trends, 4(5):185-189 ,May -2017.
Keywords : Bandpass filter, Stepped Impedance Resonator, Ultra-wideband, Defected Ground Structure.
References :

af

[1]  Federal Communications Commission (FCC), Revision of Part 15 of the Commission’s Rules Regarding Ultra-Wideband Transmission Systems, First Report and Order, FCC 02-48, 2002.
[2]   L.H. Hsieh, K. Chang, “Compact, low insertion-loss sharp-rejection, and wide-band microstrip bandpass filters,” IEEE Trans. Microwave Theory Tech., vol. 51, no. 4, pp. 1241-1246, 2003.
[3] H. Ishida, and K. Araki, “Design and analysis of UWB bandpass filter with ring filter,” IEEE Trans. MTT-S Int. Dig., vol.3, pp.1307-1310, 2004.
[4]  L. Zhu, H. Bu and K. Wu, “Broadband and compact multi-pole microstrip bandpass filters using ground plane aperture technique,” IEEE Trans. Microwave Theory Tech., vol.49, no.1, pp.71-77, Feb. 2002.
[5] L. Zhu, S. Sun and W. Menzel, “Ultra-wideband (UWB) bandpass filters using multiple-mode resonator,” IEEE Microw. Wireless Compon. Lett., vol.15, no.11, pp. 796-798, Nov. 2005.
[6]  P. Cai, Z. Ma, X. Guan, Y. Kobayashi, T. Anada and Gen Hagiwara,“A Novel compact ultra-wideband bandpass filter using a microstrip stepped-impedance four-modes resonator,” 2007 IEEE MTT-S International Microwave Symposium Digest, pp.751-754.
[7] Zhewang Ma, Wenqing He, Chun-Ping Chen, Yoshio Kobayashi, and Tetsuo Anada, “A Novel Compact Ultra-Wideband Bandpass Filter Using Microstrip Stub-Loaded Dual-Mode Resonator oublets,” 978-1-4244-1780-3/08 © 2008 IEEE
[8]  He, Z. N., X. L. Wang, S. H. Han, T. Lin, and Z. Liu, “The synthesis and design for new classic dual-band waveguide band-stop filters," Journal of Electromagnetic Waves and Applications, Vol. 22, No. 1, 119-130, 2008.
[9]  Dai, X.-W., C.-H. Liang, B.Wu, and J.-W. Fan, “Novel dual-band bandpass ¯lter design using microstrip open-loop resonators," Journal of Electromagnetic Waves and Applications, Vol. 22, No. 2/3, 219-225, 2008.
[10] Li, G., B. Wu, X.-W. Dai, and C.-H. Liang, “Design techniques for asymmetric dual-passband filters," Journal of Electromagnetic Waves and Applications, Vol. 22, No. 2/3, 375-383, 2008.
[11] Wang, J. P., B. Z. Wang, Y. X. Wang, and Y. X. Guo, “Dual-band microstrip stepped-impedance bandpass filter with defected ground structure," Journal of Electromagnetic Waves and Applications, Vol. 22, No. 4, 463-470, 2008.
[12] Dai, X.-W., C.-H. Liang, G. Li, and Z.-X. Chen, “Novel dual-mode dual-band bandpass ¯lter using microstrip meander-loop resonators," Journal of Electromagnetic Waves and Applications, Vol. 22, No. 4, 573-580, 2008.
[13] Hsu, C.Y., H.-R. Chuang, and C.-Y. Chen, “Compact microstrip UWB dual-band bandpass with tunable rejection band," Journal of Electromagnetic Waves and Applications, Vol. 23, No. 5/6, 617-626, 2009.
[14] Abu-Hudrouss, A. M. and M. J. Lancaster, “Design of multiple-band microwave filters using cascaded ¯lter elements," Journal of Electromagnetic Waves and Applications, Vol. 23, No. 10, 2109-2118, 2009.
[15] Weng, R. M. and P. Y. Hsiao, “Double-layered quad-band bandpass filter for multi-band wireless systems," Journal of Electromagnetic Waves and Applications, Vol. 23, No. 3, 2153-2161, No. 16, 2009.
[16] Alkanhal, M. A. S., “Dual-band bandpass filters using inverted stepped-impedance resonators," Journal of Electromagnetic Waves and Applications, Vol. 23, No. 8/9, 1211-1220, 2009.
[17] Progress In Electromagnetics Research, PIER 102, 2010 123 Myyake, H., S. Kitazawa, T. Ishizaki, T. Yamada, and Y. Nagatomi, “A miniaturized monolithic dual band filter using ceramic lamination technique for dual mode portable telephones," IEEE-MTT-S International Microw. Symp. Dig, Vol. 2, 789-792, 1997.
[18] Tsai, L. C. and C. W. Huse, “Dual-band bandpass filters using equal length coupled-serial-shunted lines and Z-transform techniques," IEEE Trans. on Microwave Theory and Tech., Vol. 52, No. 4, 1111-1117, Apr. 2004.
[19] Chen, C. Y. and C. Y. Hsu, “A simple and e®ective method for microstrip dual band design," IEEE Microw. Wireless Compon. Lett., Vol. 16, No. 3, 246-258, May 2006.
[20] Garca-Lamperez, A. and M. Salazar-Palma, “Dual band filter with split-ring resonators," IEEE MTT-S International Microw. Symp. Dig., 519-522, 2006.
[21] Quendo, C., E. Rius, and C. Person, “An original topology of dual-band filter with transmission zeros," IEEE-MTT-S International Microw. Symp. Dig., Vol. 2, 1093-1096, 2003.
[22] Tsai, C. M., H. M. Lee, and C. C. Tsai, “Planar filter design with fully controllable second passband," IEEE Trans. on Microwave Theory and Tech., Vol. 53, No. 11, 3429-3439, Nov. 2005.
[23] Chin, K. S., J. H. Yeh, and S. H. Chao, “Compact dual-Band bandstop filters using stepped-impedance resonators," IEEE Microw. Wireless Compon. Lett., Vol. 17, No. 12, 849-851, Dec. 2007.
[24] Kuo, J. T. and H. S. Cheng, “Design of quasi-elliptic function filters with a dual-passband response," IEEE Microw. Wireless Compon. Lett., Vol. 14, No. 10, 472-475, Oct. 2004.
[25] Kuo, J. T., T. H. Yeh, and C. C. Yeh, “Design of microstrip bandpass filters with a dual-passband responds," IEEE Trans. on Microwave Theory and Tech., Vol. 53, No. 4, 1331-1337, Apr. 2005.
[26] Sun, S. and L. Zhu, “Compact dualband microstrip bandpass filter without external feed," IEEE Microw. Wireless Compon. Lett., Vol. 15, No. 10, 644-646, Oct. 2005.
[27] Zhang, Y. P. and M. Sun, “Dual-band microstrip passband filter using stepped-impedance resonators with new coupling scheme,"IEEE Trans. on Microwave Theory and Tech., Vol. 54, No. 10, 3779-3785, Oct. 2006.
[28] Weng, M. H., H. W. Wu, and Y. K. Su, “Compact and low loss dual-band bandpass filter using pseudo-interdigital stepped lazquez-Ahumada et al. impedance resonators for WLANs," IEEE Microw. Wireless Compon. Lett., Vol. 17, No. 3, 187-189, Mar. 2007.
[29] Velazquez-Ahumada, M. C., J. Martel, F. Medina, and F. Mesa, “Design of a dual band-pass filter using modified folded stepped-impedance resonators," IEEE-MTT-S International Microw. Symp. Dig., 857-860, 2009.
[30] Hong, J.-S. and W. Tang, “Dual-band filter based on non-degenerate dual-mode slow-wave open-loop resonators," IEEE-MTT-S International Microw. Symp. Dig., 861-864, 2009.
:10.22362/ijcert/2017/v4/i5/xxxx [UNDER PROCESS]
DOI Link : Not yet assigned
Download :
  V4I508.pdf
Refbacks : There are currently no refbacks
Survey on current Digital forensic practices
Authors : Divith Devaiah M.M , Prakash B Metre ,
Affiliations : Acharya Doctor Sarvepalli Radhakrishnan Rd, Bengaluru, Karnataka 560107,
Abstract :

af

Cyber-crimes are taking over the world like a breeze. For every crimes committed around the globe, one or the other form of computer or any electronic device is used. So every crime can be linked as cyber-crime. To investigate these crimes, a cost friendly and easily available forensic device is required, which helps in collecting, analyzing and preserving data from which results can be extracted. This paper illuminates all the practices that are currently in place and also clarifies the effects of vulnerabilities.
Citation :

af

Divith Devaiah M.M et.al, “Survey on current Digital forensic practices”, International Journal of Computer Engineering In Research Trends, 4(5):180-184 ,May -2017
Keywords : : Cyber Crimes, Cyber Criminal, Forensic, Forensic tools, Vulnerability, Criminology, agile tool.
References :

af

1.	Malek Harbawi and Asaf Varol, “The Role of Digital Forensics in Combating Cybercrimes”.
2.	M. Al Fahdi, N.L. Clarke and S.M. Furnell, “Challenges to Digital Forensics: A survey of researchers & practitioners attitudes and opinions.
3.	B.Skaggs, B. Blackburn, G. Manes, S. Shenoi, “Network Vulnerability Analysis”.
4.	Prashant S. Shinde and Prof. Shrikant B. Ardhapurkar, “Cyber Security Analysis using Vulnerability Assessment and penetration Testing”.
5.	Abirami Sivaprasad and Smita Jangale, “A Complete study on Tools and Techniques for digital Forensic Analysis”.
6.	Andrw Jones and Stilianos Vidalis and Nasser Abouzakhar, “Information Security and digital forensics in the world of cyber physical systems”.
7.	Arun V. Sathanur and David J. Haglin, “A novel centrality Measure for network-wide cyber vulnerability assessment”.
8.	Arni Ariani, John Lewis and Pradeep K. Ray, “The vulnerability assessment for Emergency response Plans”.
9.	C.Balan, Dija S, Divya S, VIdyadharan, “The need to adopt agile methodology in the development of cyber forensic tools”.
10.	S.Al Sharif, F.Iqbal,T.Baker and A. Marrington, “Magec:An image searching tool for detecting forged images in forensic investigation”.
11.	Noble Kumari and A.K Mohapatra, “An insight into digital forensics branches and tools”.
12.	Simson L Garfinkel and Nicole Beebe, Lishu liu, “Detecting Threatening insiders with lightweight media forensics”.
:10.22362/ijcert/2017/v4/i5/xxxx [UNDER PROCESS]
DOI Link : Not yet assigned
Download :
  V4I507.pdf
Refbacks : There are currently no refbacks
Malware as a Component in Cybercrime: A Survey
Authors : Rodney Anthony Raj, Chayapathi A R ,
Affiliations : Information science and engineering, Acharya institute of technolgy, Doctor Sarvepalli Radhakrishnan Rd, Bengaluru, Karnataka 560107, India.
Abstract :

af

In today’s world we face lot of trouble by cybercrimes where every individual by some mean is a victim towards cybercrime knowingly or unknowingly. One of the main components in the cybercrime is malware and it really comes handy to wage an attack. This paper is a survey on what kind of malwares are used and how effectively they use malware to exploit the world through cybercrime.
Citation :

af

Rodney Anthony Raj et.al, “Malware as a component in cybercrime: A survey”, International Journal of Computer Engineering In Research Trends, 4(5):176-179 ,May -2017.
Keywords : Malware, Ransomware, Virus, Cybercrime, Rootkits, Attacker, and Hacker
References :

af

1.	2016: Current State of Cybercrime, RSA whitepaper.

2.	Basic survey on Malware Analysis, Tools, and Techniques. Dolly Uppall, Vishaka Mehra, and Vinod Verma.

3.	A survey of cybercrime. Zhicheng Yang.

4.	Detecting and Classifying Morphed Malwares: A Survey, Sanjam Singla.

5.	Evolution, Detection and Analysis of Malware for Smart Devices Guillermo Suarez-Tangil, Juan E. Tapiador, Pedro Peris-Lopez, and Arturo Ribagorda.

6.	A Survey on Techniques in Detection and Analyzing Malware Executables, Kirti Mathur.

7.	Malware Analysis and Classification: A Survey Ekta Gandotra, Divya Bansal, Sanjeev Sofat.

8.	Malware and cyber crime. House of Commons, Science and Technology Committee.

9.	Malware and Malware Detection Techniques: A Survey. Jyoti Landage.

10.	A Survey on Malware Attacks on Smartphones Kireet, Dr.Meda, and Sreenivasa Rao

11.	https://www.theguardian.com/technology/2016/oct/22/cyber-attack-hackers-weaponised-everyday-devices-with-malware-to-mount-assault

12.	https://securelist.com/analysis/quarterly-malware-reports/75640/it-threat-evolution-in-q2-2016-statistics/

13.	https://www.av-test.org/en/statistics/malware/

14.	https://blog.barkly.com/cyber-security-statistics-2017.

:10.22362/ijcert/2017/v4/i5/xxxx [UNDER PROCESS]
DOI Link : Not yet assigned
Download :
  V4I506.pdf
Refbacks : there are currently no refbacks
Secret Data Transmission Using Combination of Cryptography &Steganography
Authors : Ajin P Thomas, Sruthi P.S, Jerry Rachel Jacob, Vandana V Nair , Reeba R
Affiliations : Sreebuddha College Of Engineering, Alappuzha , India
Abstract :

af

Secure communication is when two entities are communicating and do not want a third party to listen in. For that, they need to communicate in a way not susceptible to eavesdropping or interception. Two varieties of security mechanism, cryptography and steganography are being applied. At the preceding stage, encryption is being provided to secret plain text using Vernam cipher (One-Time Pad) transposition technique. At the later stage, it transforms ciphertext into bytes and divides each byte into pairs of bits and assigns the decimal values to each pair, which is known as a master variable. Master variable value range will vary between 0 to 3. Depending upon the master patchy value, add that cipher text in the career image at Least Significant Bit (LSB) 6 th and 7 th bit location or 7 th and 8 th bit location or 7 th and 6 th or 8 th and 7 th bit location. Vernam cipher show good performance metrics regarding less CPU running time, fIle size same after Encryption and strong avalanche effect compare with all transposition cipher. After completion of embedding and sending the stego image to the receiver side, retrieving process of the cipher text from the said locations will be done. Moreover, then decryption process to get the secret plain text back will be performed using the Vernam cipher transposition algorithms.
Citation :

af

Ajin P Thomas et.al, “Secret Data Transmission Using Combination of Cryptography &Steganography”, International Journal of Computer Engineering In Research Trends, 4(5):171-175 ,May -2017.
Keywords : Cryptography &Steganography
References :

af

[I] R. J. Anderson and F. A.P. Petitcolas, "On The Limits of Steganography", IEEE Journal of selected Areas in communication, 16(4), pp. 474-481,Special Issue on Copyright & Privacy protection. ISSN 0733-8716, May 1998.
 [2] M. A. B. Younes and A. Jantan, "A New Steganography Approach for Image Encryption Exchange by using the LSB insertion", IJCSNS International Journal of Computer Science & Network Security, Vol 8, No 6 , pp. 247-254, June 2008.
 [3] G. Swain and S .. K .. Lenka, "Steganography-Using a Double Substitution Cipher", International Journal of Wireless Communications and Networking, Volume 2, Number I, pp.35-39. ISSN: 0975-7163, June 2010. 
[4] G. Swain and S. K. Lenka, " A Technique for Secure Communication using Message Dependent Steganography",Special issue of IJCCT, Vol. 2,No. 12,2010.
 [5] G. Swain and S. K. Lenka, "Steganography using the Twelve Square Substitution Cipher and Index Variable" ,IEEE transactions on Image Processing, pp. 84-88, 2011.
 [6] A. Nag, J. P. Singh, S. Khan and S. Ghosh," A Weighted Location Based LSB Image Steganography Technique", Springer ACC 2011, Part II, CCIS 191, pp. 620-627, 20 II.
 [7] C. Maiti, D. Baksi, I. Zamider, P. Gorai and D. R. Kisku," Data Hiding in Images Using Some Efficient Steganography Techniques",Springer SIP 2011, CCIS 260, pp. 195-203, 20 II. 
[8] B. Li,.,et al. "A survey on image steganography and steganalysis", Journal of Information Hiding and Multimedia Signal Processing, Vol. 2, No. 2, pp. 142172, 2011. 
[9]G. Swain and S . .K .. Lenka, "A Dynamic Approach to Image Steganography Using the Three Least Significant Bits and Extended Hill Cipher" Advanced Materials Research, voI.403-408, pp.842-849,2012. 
[10] S. Padmapriya, S. Saravanapriya and D. Jayachitra," Performance Analysis of Various Encryption Algorithms for Data Communication", International Journal of Computer 
:10.22362/ijcert/2017/v4/i5/xxxx [UNDER PROCESS]
DOI Link : Not yet assigned
Download :
  V4I505.pdf
Refbacks : There are Currently No refback
Survey on Mining Partially Ordered Sequential Rules
Authors : Mr. Sandipkumar Sagare, Prof. Suresh Shirgave,
Affiliations : M.E.C.S.E Student, C.S.E Department, D.K.T.E. Society’s Textile and Engineering Institute,Ichalkaranji, 416115
Abstract :

af

Nowadays in various applications such as stock market analysis, e-commerce sequential rule mining is used to extract important data. It majorly includes identification of common multiple sequential rules from given sequence database. One of the general forms of sequential rule mining is Partially Ordered Sequential rules in which listed items in left and right side of rule does not need to be ordered. These partially ordered sequential rules are identified using RuleGrowth Algorithm, TRuleGrowth Algorithm. These algorithms identify partially ordered sequential rules for more generalized decision making. In this paper we are focusing on such algorithms.
Citation :

af

Sandipkumar Sagare et.al, “Survey on Mining Partially Ordered Sequential Rules”, International Journal of Computer Engineering In Research Trends, 4(5):169-170 ,May -2017.
Keywords : Sequential rules, sequential patterns, temporal patterns, pattern mining, sequence, data mining.
References :

af

1. J. Pei, J. Han, B. Mortazavi-Asl, H. Pinto, Q.
Chen, U. Dayal, and M. Hsu, ―Mining sequential
patterns by pattern-growth: The pre-fixspan
approach,‖ IEEE Trans. Knowl. Data Eng., vol. 16,
no. 10, pp. 1–17, Oct. 2004.
2. R. Agrawal and R. Srikant, ―Mining sequential
patterns,‖ in Proc. 11th Int. Conf. Data Eng., 1995,
pp. 3–14.
3. J. Pei, J. Han, B. Mortazavi-Asl, H. Pinto, Q.
Chen, U. Dayal, and M. Hsu, ―Mining sequential
patterns by pattern-growth: The pre-fixspan
approach,‖ IEEE Trans. Knowl. Data Eng., vol. 16,
no. 10, pp. 1–17, Oct. 2004.
4. M. J. Zaki, ―SPADE: An efficient algorithm for
mining frequent sequences,‖ Mach. Learning, vol. 42,
no. 1–2, pp. 31–60, 2001.pp. 1–17, Oct. 2004.
5. D. Lo, S.-.C. Khoo, and L. Wong, ―Non-redundant
sequential rules—Theory and algorithm,‖ Inf. Syst.,
vol. 34, no. 4/ 5, pp. 438–453, 2009.
6. Y. Zhao, H. Zhang, L. Cao, C. Zhang, and H.
Bohlscheid, ―Mining both positive and negative
impact-oriented sequential rules from transactional
data,‖ in Proc. 13th Pacific-Asia Conf.
:10.22362/ijcert/2017/v4/i5/xxxx [UNDER PROCESS]
DOI Link : Not yet assigned
Download :
  V4I504.pdf
Refbacks : Currently there are no ref backs
Product Rating using Opinion Mining
Authors : Sunil B. Mane, Kruti Assar, Priyanka Sawant and Monika Shinde
Affiliations : Assistant Professor, Department of Computer Engineering and Information Technology, College of Engineering Pune Pune - 411005, Maharashtra, India.
Abstract :

af

Amazon.com is one of the largest electronic commerce website in the world which allows users to purchase different products and submit reviews on each one of them. The reviews allow the first-time buyers to understand the quality of the products and decide whether to make a purchase or not. The reviews result in unstructured big data which can be analyzed and used for recommendation of a product on the website. However, it is possible that some customers write fake reviews to promote or defame a particular brand. So it is important to detect and remove the fake reviews for providing the correct rating to the product. Also, it is necessary to create a fast and efficient system for analyzing big data. The present systems used for big data analysis are quite slow. So here, we use the Apache Spark framework for increasing the speed of processing the Amazon reviews. This paper provides a new implementation for analyzing Amazon reviews which involve detection of fake reviews, processing the genuine reviews using Apache Spark and finally rating the products.
Citation :

af

Sunil B. Mane et.al, “Product Rating using Opinion Mining”, International Journal of Computer Engineering In Research Trends, 4(5):161-168 ,May -2017.
Keywords : Opinion Mining, Apache Spark, Product Rating, Fake Review Detection, Natural Language Processing, Sentiment Analysis.
References :

af

[1] N. Nodarakis, S. Sioutas, A. Tsakalidis, and G. Tzimas. Large-Scale Sentiment Analysis On Twitter with Spark. Mar 15, 2016.
[2] Enock Kanyesigye , Sumitra Menerea," Sentiment Analysis Of Reviews Using Hadoop". 2016.
[3] J. McAuley, R. Pandey, J. Leskovec Knowledge Discovery and Data Mining, 2015.
[4] J. McAuley, C. Targett, J. Shi, A. van den Hengel SIGIR, 2015
[5] Eman M.G. Younis, Faculty of Computer and Information Minia University, Egypt, "Sentiment Analysis and Text Mining for Social Media Microblogs using Open Source Tools: An Empirical Study".February 2015
[6] Poobana S, Sashi Rekha k, "Opinion Mining From Text Reviews Using Machine Learning Algorithm ".3, March 2015
[7] Mrs. Uma Gurav, Prof. Dr. Nandini sidnal, "Opinion mining for reputation evaluation on unstructured Big Data " . 4, April 2015
[8] Spark. The apache software foundation: Spark homepage. http://spark.apache.org/, 2015. [Online; accessed 27-December-2015]
[9] Sunil B. Mane, Y. Sawant, S. Kazi, and V. ShindeReal.Time Sentiment Analysis of Twitter Data Using Hadoop,College of Engineering, Pune. 2014
[10] Anju Gahlawat. Big Data Analysis using R and Hadoop. September 2014
[11] Pravesh Kumar Singh, Mohd Shahid Husain, "METHODOLOGICALSTUDY OFOPINION MINING AND SENTIMENT ANALYSIS TECHNIQUES".  February 2014
[12] Kalyankumar B Waddar, K Srinivasa, "OPINION MINING IN PRODUCT REVIEW SYSTEM USING BIG DATA TECHNOLOGY HADOOP".Jul 5,2014
[13] Julia Kreutzer And Neele Witte, Opinion Mining Using SentiWordNet, Semantic Analysis, Uppsala University. 2013/14
[14] Arjun Mukherjee, Vivek Venkataraman, Bing Liu, Natalie Glance, "Fake Review Detection: Classification and Analysis of Real and Pseudo Reviews" .2013
[15] Nitin Jindal and Bing.Opinion Spam and Analysis.Department of Computer Science, University of Illinois at Chicago.Feb 12, 2008
[16] Bo Pang, Lillian Lee, “Opinion Mining and Sentiment Analysis” . 2008
[17] Bing Liu, Minquing hu, “Mining and summarizing Customer Reviews”. 2004
[18] K. Waddar and K. Srinivasa. OPINION MINING IN PRODUCT REVIEW SYSTEM USING BIG DATA TECHNOLOGY HADOOP
[19] B. Pang, L. Lee, and S. Vaithyanathan. Sentiment classification using machine learning techniques.
[20] Maria Soledad Elli, Yi-Fan Wang, Amazon Reviews, business analytics with sentiment analysis

:10.22362/ijcert/2017/v4/i5/xxxx [UNDER PROCESS]
DOI Link : Not yet assigned
Download :
  V4I503.pdf
Refbacks : There are no refback
A Relative Study on the Segmentation Techniques of Image Processing
Authors : Venkata Srinivasu Veesam, Bandaru Satish Babu,
Affiliations : Assistant Professor, R.V.R & JC College of Engineering. Andhra Pradesh, India.
Abstract :

af

Citation :

af

Venkata Srinivasu Veesam et.al, “A Relative Study on the Segmentation Techniques of Image Processing”, International Journal of Computer Engineering In Research Trends, 4(5):155-160,May -2017.
Keywords : Image Segmentation, Thresholding, Feature-based clustering, Region based segmentation, Model-based Segmentation, Graph-based Segmentation.
References :

af

[1] Waseem Khan, ”Image Segmentation Techniques: A Survey,” Journal of Image and Graphics, Vol. 1, No. 4, December 2013, available at, http://www.joig.org/uploadfile/2013/1226/20131226051740869.pdf  
[2] Sujata Saini and Komal Arora, ” A Study Analysis on the Different Image Segmentation Techniques,” International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, pp. 1445-1452, 2014, available at, http://www.ripublication.com/irph/ijict_spl/ijictv4n14spl_13.pdf
[3] Rajeshwar Dass, Priyanka, and Swapna Devi,” Image Segmentation Techniques,” EJECT Vol. 3, Issue 1, ISSN: 2230-7109 (Online) |  ISSN: 2230-9543 (Print), Jan-March 2012.
[4] Rafael C. Gonzalez and Richard E. Woods, “Digital Image Processing,” 2nd ed., Beijing: Publishing House of Electronics Industry, 2007, 
[5] H. G. Kagami and Z. Beige, “Region-Based Detection versus Edge Detection,” IEEE Transactions on Intelligent information hiding and multimedia signal processing, pp. 1217-1221, 2009.
[6] K. K. Singh and A. Singh, “A Study of Image Segmentation Algorithms for Different Types of Images,” International Journal of Computer Science Issues, Vol. 7, Issue 5, 2010.
[7] Hassan Grema Kagami and Zou Beijing, “Region-Based Segmentation versus Edge Detection,” Intelligent Information Hiding and Multimedia Signal Processing, 2009. IIH-MSP '09. Fifth International Conference, pp. 1217 – 1221, DOI: 10.1109/IIH-MSP.2009.13, 2009.
[8] Nikita Sharma, Mahendra Mishra and Manish Shrivastava, “ Colour Image Segmentation Techniques and Issues: An Approach,” International, W. X. Kang, Q. Q. Yang, R. R. Liang, “The Comparative Research on Image Segmentation Algorithms,” IEEE Conference on ETCS, pp. 703-707, 2009.
[9] Muthukrishnan and Radha, “Edge Detection Techniques For Image Segmentation”, International Journal of Computer Science & Information Technology (IJCSIT), Vol 3, No 6, Dec 2011, available at  http://airccse.org/journal/jcsit/1211csit20.pdf
[10]http://homepages.inf.ed.ac.uk/rbf/CVonline/LOCAL_COPIES/MORSE/threshold.pdf
[11]http://www.ancient-asia-journal.com/articles/10.5334/aa.06113/
[12] Salem Saleh Al-Amri, N.V. Kalyankar and Khamitkar, ” Image Segmentation by Using Threshold Techniques,” Journal Of Computing, Volume 2, Issue 5, ISSN 2151-9617, May 2010, available at https://arxiv.org/ftp/arxiv/papers/1005/1005.4020.pdf 
[13] Santanu Bhowmik and Viki Datta,” A Survey on Clustering Based Image Segmentation,” International Journal of Advanced Research in Computer Engineering & Technology, Volume 1, ISSN: 2278 – 1323, Issue 5, July 2012, available at, http://ijarcet.org/wp-content/uploads/IJARCET-VOL-1-ISSUE-5-280-284.pdf
[14]Sriparna Saha and Sanghamitra Bandyopadhyay”, A new symmetry-based multiobjective clustering technique for the automatic evolution of clusters,” Journal Pattern Recognition, Volume 43, Issue 3, pp 738-751, March 2010.
[15] Lehmann,”Turbo segmentation of textured images,” on Pattern Analysis and Machine Intelligence, Vol: 33, pp: 16 – 29, 2011.
[16] J. Luo, R. T. Cray and Lee, “Incorporation of derivative priors in adaptive Bayesian color image segmentation’’, Proc. ICIP’97, Vol. 3, pp. 58-61, Oct 26-29, 1997.
[17] J. Gao and J. Zhang M. G. Fleming, ”A Novel Multiresolution Color Image Segmentation Technique and its application to Dermatoscopic Image Segmentation,” Image Processing, vol.3, pp.408-411, 2000.  
[18] Tamas Sziranyi, Josiane Zerubia, Laszlo Czuni, David Goldreich and Zoltan Kato, “Image Segmentation Using Markov Random Field Model in Fully Parallel Cellular Network Architectures”, Real-Time Imaging 6, DOI:10.1006/rtim.1998.0159, pp. 195-211 (2000), available at, https://www.inf.u-szeged.hu/~kato/papers/rti2000.pdf
[19] Pedro F. Felzenszwalb and Daniel P. Huttenlocher, “Efficient Graph-Based Image Segmentation,” International Journal of Computer Vision 59(2), pp. 167–181, 2004.
:10.22362/ijcert/2017/v4/i5/xxxx [UNDER PROCESS]
DOI Link : Not yet assigned
Download :
  V4I502.pdf
Refbacks : There are currently no refbacks
ACCELEROMETER–BASED HUMAN FALL DETECTION AND RESPONSE USING SMARTPHONES
Authors : Monisha Mohan, Arun P.S ,
Affiliations : Computer Science and Engineering, Sree Buddha College of Engineering, Pattoor P.O., Alappuzha Dist., Kerala, Pin code:690529, India,
Abstract :

af

Unobserved human falls can be dangerous and can badly affect health. Falls can cause loss of independence and fear among the older people. In most fall events external support is essential to avoid major consequences. Thus, the ability to automatically detect these fall events could help minimising the response time and therefore prevents the victim from having serious injuries. This paper presents a smartphone based fall detection and response sending application which is based on the built-in accelerometer sensor and GPS module in the smartphones. The data from the accelerometer is continuously screened when the phone is in the user’s belt or pocket. When a fall event is detected, the user’s location is tracked and SMS and email notifications are sent to a set of contacts.
Citation :

af

Monisha Mohan et.al, “Accelerometer–Based Human Fall Detection And Response Using Smartphones”, International Journal of Computer Engineering In Research Trends, 4(5):150-154, May -2017.
Keywords : Fall Detection, Smartphone, ADL, Accelerometer Sensor.
References :

af

[1] WHO, “Who global report on falls prevention in older age,” tech. rep., 2007.

[2] R. JM, B. DW, and L. LL, “Preventable medical injuries in older patients,” Archives of                                     Internal Medicine, vol. 160, no. 18, pp. 2717–2728, 2000.

[3] T. Masud and R. O. Morris, “Epidemiology of falls,” Age and Ageing, vol. 30, no. suppl 4, pp. 3–7, 2001.

[4] Friedman, S.M., Munoz, B., West, S.K., BandeenRoche, K. and Fried, L.P., 1997, September. Falls and fear of falling: Which comes first?. In JOURNAL OF THE AMERICAN GERIATRICS SOCIETY (Vol. 45, No. 9, pp. P186-P186). 351 WEST CAMDEN ST, BALTIMORE, MD 21201-2436: WILLIAMS & WILKINS.

[5] Brownsell, S. and Hawley, M.S., 2004. Automatic fall detectors and the fear of falling. Journal of telemedicine and telecare, 10(5), pp.262-266.

[6] Rubenstein, L.Z. and Josephson, K.R., 2002. The epidemiology of falls and syncope. Clinics in geriatric medicine, 18(2), pp.141-158.

[7] Tinetti, M.E., Liu, W.L. and Claus, E.B., 1993. Predictors and prognosis of inability to get up after falls among elderly persons. Jama, 269(1), pp.65-70.

[8] Fu Z, Delbruck T, Lichtsteiner P, Culurciello E: An address-event fall detector for assisted living applications. IEEE Trans Biomed Circuits Syst 2008, 2:88–96.

[9] Zhang C, Tian Y, Capezuti E: Privacy preserving automatic fall detection for elderly using RGBD cameras. In Proceedings of the 13th International Conference on Computers Helping People with Special Needs. Edited by Miesenberger K, Karshmer A, Penaz P, Zagler W. Linz: Springer-Verlag Berlin;2012:625–633. doi:10.1109/ICSSE.2010.5551751.http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=5551751&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D5551751.

[10] Bourke A, O’Brien J, Lyons G: Evaluation of a threshold-based triaxial accelerometer fall detection algorithm. Gait Posture 2007, 26:194–199.

[11] Li Q, Stankovic JA, Hanson M, Barth A, Lach J: Accurate, fast fall detection using gyroscopes and accelerometer derived posture information. In Proceedings of the 6th International Workshop on Wearable and Implantable Body Sensor Networks. Edited by Lo B, Mitcheson P. Berkeley; 2009:138–143. doi:10.1109/BSN.2009.46.

[12] Shan S, Yuan T: A wearable pre-impact fall detector using feature selection and support vector machine. In Proceedings of the IEEE 10th International Conference on Signal Processing. Beijing: Institute of Electrical and Electronics Engineers; 2010:1686–1689. doi:10.1109/ICOSP.2010.5656840. 

[13] Lee RYW, Carlisle AJ: Detection of falls using accelerometers and mobile phone technology. Age Ageing 2011, 0:1–7.
:10.22362/ijcert/2017/v4/i5/xxxx [UNDER PROCESS]
DOI Link : Not yet assigned
Download :
  V4I501.pdf
Refbacks : There are currently no refbacks

 

Performance Analysis of Existing Beam forming Methods for Various Antenna Elements and Interference Sources
Authors : Yashoda B.S , Dr. K.R. Nataraj,
Affiliations : Ph.D. Research Scholar, Jain University, Bangalore, India.
Abstract :

af

Antenna Arrays make use of techniques like Maximal Ratio Combining or Diversity is combining to achieve high Signal to Noise Ratio (SNR). The two kinds of the major algorithms used are Direction of Arrival (DOA) and Beam forming. This paper studies and performs the performance analysis of existing beam forming algorithms, namely Least Mean Square (LMS), Recursive Least Mean Square (RLS), Griffiths and Variable Step Size Griffiths (VSSG). The algorithms are simulated for various cases Low RF Sources and Single Interference, Large RF Source and Single Interference, Low RF Sources and Multiple Interference angles and finally in the case of Large RF sources and multiple interference angles.
Citation :

af

Yashoda B.S et.al, “Performance Analysis of Existing Beam forming Methods for Various Antenna Elements and Interference Sources”, International Journal Of Computer Engineering In Research Trends, 4(4):142-149, April-2017.
Keywords : DOA, SNR, LMS, RLS
References :

af

[1]” Robust adaptive beamforming based on the Kalman filter”, A. El-Keyi ;  T. Kirubarajan ; A.B. Gershman,  IEEE Transactions on Signal Processing ( Volume: 53, Issue: 8, Aug. 2005.
[2] “Different adaptive beamforming algorithms for performance investigation of smart antenna system”, Ashraf A. M. Khalaf ;  Abdel-Rahman B. M. El-Daly ;  Hesham F. A. Hamed, Software, Telecommunications and Computer Networks (SoftCOM), 2016 24th International Conference .
[3] Comparative analysis of adaptive beamforming algorithm LMS, SMI and RLS for ULA smart antenna”, Dhaval N. Patel ;  B. J. Makwana ;  P. B. Parmar,  Communication and Signal Processing (ICCSP), 2016 International Conference on
[4] Griffiths L.J.: A simple adaptive algorithm for real time processing of in antenna arrays. Proc. IEEE 57, 1696–1704. 
[5] S. V. Narasimhan, S. Veena, H. Lokesha Variable step-size Griffiths’ algorithm for improved performance of feedforward/feedback active noise control, Signal, Image and Video Processing, 2010, Volume 4, Number 3, Page 309.
 [6] Kim, I.-S., Na, H.-S., Kim, K.-J., Park, Y.: Constraint filtered-X and filtered-U LMS algorithms for the active control of noise in ducts. J. Acoust. Soc. Am. 95(6) (1994)
[7]Kuo S.M., Morgan D.R.: Active noise control systems, algorithms and dsp implementations. Wiley, New York (1996)Google Scholar
[8] Kuo, S.M., Vijayan, D.: A secondary path modeling technique for active noise control. IEEE Trans. Speech Audio 5(4) (1997).
[9]Kwong R.H., Johnston E.W.: A variable step-size LMS algorithm. IEEE Trans. Signal Process. 40(7), 1633–1642 (1992).
:10.22362/ijcert/2017/v4/i4/xxxx [UNDER PROCESS]
DOI Link : Not yet assigned
Download :
  V4I404.pdf
Refbacks : There are currently no refbacks
Dynamic and Public Auditing with Fair Arbitration for Cloud Data
Authors : SAJJA SUNEEL, MANDAVILLI KAVYA ,
Affiliations : Asst.Professor, KG Reddy Engineering College, Hyderabad, Telangana
Abstract :

af

Storage outsourcing turned into a rising trend with the advent of the cloud computing, advancing the secure remote data auditing to be the future research area. Other than this research considers the problem of data dynamics support, public verifiability and dispute arbitration simultaneously. The data dynamics problem in auditing is solved by presenting an index switcher to preserve a mapping between block indices and tag indices and eradicate the passive outcome of block indices in the tag computation without incurring much overhead. We provide fairness guarantee and dispute arbitration in our scheme, which ensures that both the data owner and the cloud cannot misbehave in the auditing process or else it is easy for a third-party arbitrator to find out the cheating party. The framework is reaching out by executing the data dynamically and reasonable discretion on gatherings in the future.
Citation :

af

Sajja Suneel et.al, “Dynamic and Public Auditing with Fair Arbitration for Cloud Data”, International Journal Of Computer Engineering In Research Trends, 4(4):136-141, April-2017.
Keywords : Third Party Auditor (TPA), CSP, Proof Of Retrievability (POR).
References :

af

1. Y. Deswarte, J. J. Quisquater, and A. Saïdane, “Remote integrity checking,” In Integrity and internal control in information systems VI, Springer US, 1-11 (2004).
2. D. L. Gazzoni Filho, and P. S. L. M. Barreto, “Demonstrating data possession and uncheatable data transfer,” IACR Cryptology ePrint Archive 2006, 150 (2006).
3. A. Juels, and B. S. Kaliski Jr, “PORs: Proofs of retrievability for large files,” In Proceedings of the 14th ACM conference on Computer and communications security, Acm, 584-597 (2007).
4. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” In Proceedings of the 14th ACM conference on Computer and communications security, Acm, 598-609 (2007).
5. H. Shacham, and B. Waters, “Compact proofs of retrievability,” In International Conference on the Theory and Application of Cryptology and Information Security, Springer Berlin Heidelberg, 90-107 (2008).
6. Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling public verifiability and data dynamics for storage security in cloud computing,” In European symposium on research in computer security, Springer Berlin Heidelberg, 355-370 (2009).
7. M. A. Shah, R. Swaminathan, and M. Baker, “Privacy-Preserving Audit and Extraction of Digital Contents,” IACR Cryptology EPrint Archive 186 (2008).
8. C. Wang, K. Ren, W. Lou, and J. Li, “Toward publicly auditable secure cloud data storage services,” IEEE network 24, (2010).
9. C. C.  Erway, A. Küpçü, C. Papamanthou, and R. Tamassia, “Dynamic provable data possession,” ACM Transactions on Information and System Security (TISSEC) 17, (2015).
10. Y. Zhu, H. Wang, Z. Hu, G. J. Ahn, H. Hu, and S. S. Yau, “Dynamic audit services for integrity verification of outsourced storages in clouds,” In Proceedings of the 2011 ACM Symposium on Applied Computing, ACM, 1550-1557 (2011).
11. Q. Zheng, and S. Xu, “Fair and dynamic proofs of retrievability,” In Proceedings of the first ACM conference on Data and application security and privacy, ACM, 237-248 (2011).
12. A. Küpçü, “Official arbitration with secure cloud storage application,” The Computer Journal 58, 831-852 (2015).
13. N. Asokan, V. Shoup, and M. Waidner, “Optimistic fair exchange of digital signatures,” IEEE Journal on Selected Areas in communications 18, 593-610 (2000).
14. C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for data storage security in cloud computing,” In Infocom, 2010 proceedings ieee, 1-9 (2010).
15. C. Wang, S. S. M Chow, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for secure cloud storage,” IEEE transactions on computers 62, 362-375 (2013).
16. B. Wang, B. Li, and H. Li, “Oruta: Privacy-preserving public auditing for shared data in the cloud,” In Cloud Computing (CLOUD), 2012 IEEE 5th International Conference on, 295-302 (2012).
17. J. Yuan, and S. Yu, “Proofs of retrievability with public verifiability and constant communication cost in cloud,” In Proceedings of the 2013 international workshop on Security in cloud computing, ACM, 19-26 (2013).
18. A. F. Barsoum, and M. A. Hasan, “Provable multicopy dynamic data possession in cloud computing systems,” IEEE Transactions on Information Forensics and Security 10, 485-497 (2015).
:NA
DOI Link : NA
Download :
  V4I43.pdf
Refbacks : There are currently no refbacks
Fast Singular value decomposition based image compression using butterfly particle swarm optimization technique (SVD-BPSO)
Authors : D.J. Ashpin Pabi, N.Puviarasan, P.Aruna
Affiliations : Research Scholar, Department of Computer Science and Engineering, Annamalai University, 608 002, India
Abstract :

af

Image compression is an important research area in an image processing system. Due to the compression of data rates, this finds crucial in applications of information security for the fast transmission. Singular Value Decomposition (SVD) is a compression technique which performs compression by using a smaller rank to approximate the original matrix of an image. SVD offers good PSNR values with low compression ratios. Compression using SVD for different singular values (Sv) with an acceptable PSNR increases the encoding time (ET). To minimize the encoding time, in this paper a fast compression technique SVD-BPSO is proposed using singular value decomposition and butterfly particle swarm optimization (BPSO). Application of the concept of BPSO towards singular value decomposition reduces the encoding time and improves the transmission speed. The performance of the proposed SVD-BPSO compression method is compared with SVD without optimization technique. The simulation results showed that the method achieves good PSNR with the minimum encoding time.
Citation :

af

D.J. Ashpin Pabi et.al, “Fast Singular value decomposition based image compression using butterfly particle swarm optimization technique (SVD-BPSO)”, International Journal Of Computer Engineering In Research Trends, 4(4):128-135, April-2017.
Keywords : Image Compression, Singular Value Decomposition (SVD), Butterfly Particle Swarm Optimization (BPSO), Encoding.
References :

af

1.	Moonen M et.al,” Singular value decomposition updating algorithm for subspace tracking”, SIAM Journal on Matrix Analysis and Applications, 13(4):1015-38,October-1992. 

2.	Konda  et.al, ”A new algorithm for singular value decomposition and its parallelization”, Parallel Comput., 35(6):331-344,June-2009.

3.	Julie Kamm L, SVD-Based Methods for Signal and Image Restoration, PhD Thesis, 1998.

4.	Yang J F et.al, “Combined Techniques of Singular Value Decomposition and Vector Quantization for Image Coding”, IEEE Trans. Image Processing, 4(8):1141 – 1146,August-1995.

5.	Awwal Mohammed Rufai et.al, “Lossy Image Compression using singular value decomposition and wavelet difference reduction”, Digital signal Processing, 24:117- 123,January-2014.

6.	Manoj Kumar, Ankita Vaish, An efficient encryption-then-compression technique for encrypted images using SVD, Digital Signal Processing, 60:81-89,January-2017.

7.	Jin Wang, Zhensen Wu et.al, “An efficient spatial deblocking of images with DCT compression”, Digital Signal Processing, 42:80-88,July-2015.

8.	Saiprasad Ravishankar, “Learning Sparsifying Transforms", IEEE Transactions on Signal Processing, 61(5):1072-1086,March-2013.

9.	K.M.M. Prabhu et.al, “3-D warped discrete cosine transform for MRI image compression”, Biomedical Signal Processing and Control, 8(1):50-58,January-2013.

10.	Kaveh Ahmadi et.al, “An efficient compression scheme based on adaptive thresholding in wavelet domain using particle swarm optimization”, Signal Processing: Image Communication, 32:33-39,March-2015.

11.	Fouzi Douak et.al, “Color image compression algorithm based on the DCT transform combined to an adaptive block scanning”, Int. J. Electron. Commun. (AEU), 65(1):16-26,January-2011.

12.	Lige Wang et.al, “Interpretation of Particle Breakage under Compression using X-ray”, Computed Tomography and Digital Image Correlation, Procedia Engineering, 102:240 – 248, 2015.

13.	Milan S. Savic et.al, “Coding algorithm for grayscale images based on Linear Prediction and dual mode quantization”, Expert Systems with Applications, 42(21):7285–7291,November-2015.

:10.22362/ijcert/2017/v4/i4/xxxx [UNDER PROCESS]
DOI Link : Not yet assigned
Download :
  V4I402.pdf
Refbacks : There are currently no refbacks
Automatic Bus Enquiry System using Android
Authors : Virendrakumar Dhotre, Namdev Sawant , Pallavi Pawar, Rajshree Salgar , Gitanjalee Hulwan
Affiliations : Assistant Professor, Computer Science & Engineering, SKN Sinhgad College of Engineering, 413304, India
Abstract :

af

Now people are not interested to carry systems along with them so we introduced mobile application “ABES” (Automatic bus enquiry system). Previously if we want to know any information about bus we should make a call to the enquiry system or by searching through internet. But now we can get all information about bus through this “ABES” app. In this application we are providing the all services related to the bus stand. We also provide the information about the bus time table and possible paths the all buses can travel. In this application user wants to find out the bus time from one place to another place. User needs to give the details of source and destination. Accordingly it will display the details of the bus going in that route .It is a time saving application to user. We are also providing the information about the source in which user are aware about the all the things related to that place. Number of time what happened passengers are going to the bus stand at that time bus may be late or passengers are late so that they are miss that bus they going to wait for next bus and time is also wasted , so to saving the time we will make this application. Most important benefit of this application is that, this application is not location restricted. User can use this application at any place. Because of that user can access all information related to bus at any time anywhere. This is an android based application
Citation :

af

Virendrakumar Dhotre et.al, “Automatic Bus Enquiry System using Android”, International Journal Of Computer Engineering In Research Trends, 4(4):123-127, April-2017.
Keywords : Automatic Bus Enquiry System using Android
References :

af

[1] Unity3D, Unity - Game Engine, http://unity3d.com/, downloaded: May 5th 2014. (Witte, 2008) Witte, C.; Armbruster, W.; Jäger, K. Au-tomatic generation of 3D models from real multisensor data. In Proceedings of the 11th International Conference on Information Fusion, pages 1823-1828, Cologne, Germany, 2008.
[2]VirtualWorldReview,http://www.virtualworldsreview.com/info/whatis.shtml
[3]. “A Comparison of Three Virtual World Platforms for the Purposes of Learning Support in Virtual Life”.
[4] “Network collaborative environment for human tissues 3D modeling”
[5] Virendrakumar Dhotre, “Personalized Web Search Using Browsing History and Domain Knowledge”, International Journal of Recent and Innovations Trends in Computing and Communication, ISSN: 2321-8169, Volume 3, Issue 3, March 2015. 
 [6]https://docs.unity3d.com/Manual/HOWTO-importObject.html
[7] Virendra A. Dhotre, “Image Authentication Using Stochastic Diffusino”, International Journal of Engineering Research and Technology, ISSN: 2278-0181, Volume 4, Issue 4, April-2015.
 [8] “he design and research of the somatosensory interaction system based on kinect and unity 3D”, Yanke Ci; Jinli Yao 2015 10th International Conference on Computer Science & Education (ICCSE) Year: 2015 Pages: 983 - 986, DOI: 10.1109/ICCSE.2015.7250394
[9] “The simulation of building escape system based on Unity3D” Qiyun Sun; Wanggen Wan; Xiaoqing Yu 2016 International Conference on Audio, Language and Image Processing (ICALIP) Year: 2016 Pages: 156 - 160, DOI: 10.1109/ICALIP.2016.7846656
[10] “Immersive VR for natural interaction with a haptic interface for Shape Rendering” Mario Covarrubias; Monica Bordegoni 2015 IEEE 1st International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow (RTSI) Year: 2015 Pages: 82 - 89, DOI: 10.1109/RTSI.2015.7325075
[11] A 3D Simulation System for Emergency Evacuation in Offshore Platforms Guilherme Bezerra Zampronio; Alberto Barbosa Raposo; Marcelo Gattass 2015 XVII Symposium on Virtual and Augmented Reality Year: 2015, Pages: 99 - 106, DOI: 10.1109/SVR.2015.21
[12] Virendrakumar Dhotre, Dr. K. j. karande “Refinement of Data Streams using Minimum  variance principle”, 978-1-4799-6629-5/14/$31.00_c 2014 IEEE.
[13] Virendrakumar Dhotre “Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud”, International Journal of Trend in Research and Development, ISSN: 2394-9333, Volume 2, Issue 2, March-April, 2015.
 [14] ”3D Virtual Client Center and its Service Oriented Modeling”
.[15] Dhotre V. A. “Meet you – Social Networking on Android”, International Journal of Innovations and Advancement in Computer Science, ISSN: 2347-8616, Volume 4, Issue 4, April 2015.
[16] http://tf3dm.com/3d-models/electronics
[17] Virendrakumar A. Dhotre, “Integrity and Confidentiality for the Files in Cloud Storage”, International Journal of Trend in Research and Development, ISSN: 2394-9333, Volume 2, Issue 2, March-April 2015.
[18] Dhotre Virendrakumar, “A New Method of Image Compression and Decompression Using Huffman Coding Technic” International Engineering Research Journal, ISSN: 2395-1621, Volume 1, Issue 4, April 2015.
[19] Virendrakumar Dhotre, “Secure Data Transmission Using Wireless Data Transmission and Face Detection”, International Journal of Recent and Innovations Trends in Computing and Communication, ISSN: 2321-8169, Volume 2, Issue 4, April 2014.
:10.22362/ijcert/2017/v4/i4/xxxx [UNDER PROCESS]
DOI Link : Not yet assigned
Download :
  V4I401.pdf
Refbacks : There are currently no refbacks

 

To Increase Endurance and Durability of Battery Powered RC Hovercraft
Authors : Ajay Kumar Yadav, Dinesh M, Surendar Ganesan
Affiliations : Department of Aeronautical Engineering, Vel Tech Dr. RR & Dr. SR Technical University, Chennai
Abstract :

af

Yogendra P Jahagirdar, M Parvez Alam
Citation :

af

Ajay Kumar Yadav et.al, “To Increase Endurance and Durability of Battery Powered RC Hovercraft”, International Journal Of Computer Engineering In Research Trends, 4(3):119-122, March-2017.
Keywords : HOVERCRAFT,Battery Powered RC Hovercraft
References :

af

1.	http://www.antonine-education.co.uk/Pages/Physics_2/Mechanics/MEC_09/Mechanics_Page_9.htm
2.	http://www.scielo.br/scielo.php?script=sci_arttext&pid=S1516-14392006000300002
3.	http://chinafrp.en.made-in-china.com/product/ySpQrwdAfchW/China-Supply-High-Strength-Carbon-Fiber-Tube.html
4.	Akshay Balachandran, Divyesh Karelia, Dr. Jayaramulu Challa, “Material selection for unmanned aerial vehicle”, In: International Journal of Mechanical Engineering and Technology.
5.	Aumkar Rane and Raghav Kabra, “Fabrication of Carbon Fiber Fuselage for Unmanned Aerial Vehicle”, In: International Journal of Research – Granthalayah
6.	Amit tiwari, “To study and fabrication of air cushion vehicle”, In: International Journal of Research – Granthalayah
7.	Okafor, B.E., “Development of Hovercraft prototype”, In: International Journal of Engineering and Technology (March 2013).
8.	Prof. P. S. Shirsath, Prof. M. S. Hajare, Prof. G. D. Sonawane, Mr. Atul Kumar, Mr. S. U. Gunjal, “A review on design and analysis of amphibious vehicle”, In: International journal of Science, Technology and Management (January 2015).
9.	Rakesh Chandmal Sharma, Manish Dhingra, Rajeev Kumar Pathak, Manish Kumar, “Air Cushion Vehicles: Configuration, Resistance and Control”, In: Journal of Science (2014).
10.	Anandhakumar, S. Ganeshan, S. Goutham, K. Pasupathi, “Design and fabrication of Hovercraft”, In: International Journal of Innovative Research in Science, Engineering and Technology (2015).
:10.22362/ijcert/2017/v4/i3/xxxx [UNDER PROCESS]
DOI Link : Not yet assigned
Download :
  V4I309.pdf
Refbacks : There are currently no refbacks
Spoken Keyword Spotting System Design Using Various Wavelet Transformation Techniques with BPNN Classifier
Authors : Senthil Devi K. A., Dr. B. Srinivasan ,
Affiliations : Assistant Professor, Gobi Arts & Science College, Tamil Nadu, India. 2 Associate Professor, Gobi Arts & Science College, Tamil Nadu, India.
Abstract :

af

SpokenKeyword spotting is a speech data mining task which is used to search audio signals for finding occurrences of a specified spoken word in the given speech file.It is essential to identify the occurrences of specified keywords expertly from lots of hours of speech contents such as meetings, lectures, etc. In this paper, keyword spotting system designed with various wavelet transformation techniques and BackpropagationNeural Network (BPNN). Back Propagation Neural Network (BPNN) is trained with two predefined spoken keywords based on known features, and finally, input speech features are compared with keyword features in the trained BPNN for spotting the occurrences of the specified keyword.The method of this paper tested with ten speech content often different speakers. Various statistical features extraction techniques with wavelet transformation are used. Performance comparison is done among these methods with Haar, Daubechies2 and Simlet 4 wavelets.
Citation :

af

Senthil Devi K. A et.al, “Spoken Keyword Spotting System Design Using Various Wavelet Transformation Techniques with BPNN Classifier”, International Journal Of Computer Engineering In Research Trends, 4(3):111-118, March-2017.
Keywords : Spoken keyword spotting, Speech data mining, MFCC, Wavelet Packet Decomposition, Discrete Wavelet Transformation, BPN neural network, wavelet families.
References :

af

1. Bahi, H., and Benati, N., [2009], “A new keyword
spotting approach”, IEEE International
Conference on Multimedia Computing and
Systems, pp. 77-80.
2. Chui CK, [1992], “An introduction to wavelets”.
Academic, New York.
3. P. Flandrin. Representation temps-fréquence.
Hermes, 1993
4. Fourier J, [1822], “The analytical theory of heat.
(trans: Freeman A)”, Cambridge University Press,
London, pp. 1878
5. Heerman P.D. and N.Khazenie, “Classification of
multispedtral remote sensing data using a bach
propagation neural network,” IEEE Trans, Geosci.
Remote Sensing, vol.GE_30,no.1,1992, pp.81-88.
6. Jo Yew Tham, Lixin Shen, Seng Luan Lee and
Hwee Huat Tan (2000) “A General Approach for
analysis and application of Discrete Multiwavelet
Transforms”, IEEE Transaction on Signal
Processing ,48(2), 457- 464.
7. Jothilakshmi, S., Spoken keyword detection using
autoassociative neural networks, International
Journal Speech Technology, Springer, 2013, pp.
83-89.
8. Khan, W. and Holton, R., Word spotting in
continuous speech using wavelet transform, IEEE
International Conference on Electro/Information
Technology, 2014, pp.275-279
9. Mallat S., [1999], “A wavelet Tour of Signal
Processing”, Academic Press, New York, 1999.
10. Qian S, [2002], “Time-frequency and wavelet
transforms”, Prentice Hall PTR, Upper Saddle,
River, NJ.
11. Rama Kishore, Taranjit Kaur, “Backpropagation
Algorithm: An Artificial Neural Network
Approach for Pattern Recognition”, International
Journal of Scientific & Engineering Research,
Volume 3, Issue 6, June-2012 1 ISSN 2229-5518.
12. Sangeetha, J. and Jothilakshmi, S., “A novel
spoken keyword spotting system using support
vector machine”, Engineering Applications of
Artificial Intelligence, Springer, 2014, pp. 287–
293.
13. Senthil devi K.A., Dr.Srinivasan B., “A novel
Keyword Spotting Algorithm in speech mining
using wavelet”, International Journal of Current
Research Vol. 8, Issue, 08, pp.36943-36946,
August, 2016.
14. Senthil devi K A., Dr.Srinivasan B., “Wavelet –
Neural Network Approach for keyword spotting in
Speech Mining”, International Journal of Trends
and Technologies”, Vol 43, Issue 3, pp 160-165,
2017.
15. Tao Li, Sheng Ma, Mitsunori Ogihara, ” Wavelet
methods in data mining”, Chapter 27 Data Mining
and Knowledge Discovery Handbook ,Springer,
2005, pp 603-626.
:10.22362/ijcert/2017/v4/i3/xxxx [UNDER PROCESS]
DOI Link : Not yet assigned
Download :
  V4I308.pdf
Refbacks : There are currently no refbacks
A Survey on RFID Based Vehicle Authentication Using A Smart Card
Authors : Ms.LITTY RAJAN , Ms.ALPANA GOPI , Ms. DIVYA P R ,Mr. SURYA RAJAN
Affiliations :
Abstract :

af

Now a day's every system is automated in order to face new challenges. In the present days Automated systems have less manual operations, flexibility, reliability and accuracy. Due to this demand for less manual controlling, every one prefers automated control systems. Especially in the home and industries of electronics, automated systems are giving good performance and flexibility to get controlling without your involvement. We are conducting a survey in this paper based on RFID applications. In this paper, we discussed about the vehicle authentication with RFID.RFID used for the automatic tracking and detection of tagged objects through radio waves. It requires RFID tag stores digital information when it comes in the visibility of reader and reader reads the digital information and send to the server.
Citation :

af

LITTY RAJAN et.al, “A Survey on RFID Based Vehicle Authentication Using A Smart Card”, International Journal Of Computer Engineering In Research Trends, 4(3):106-110, March-2017.
Keywords : RFID, tag , reader, rfid card, identification
References :

af

[1] RFID Technology Application in Container Transportation Wei Wang, Shidong Fan lShanghai Maritime Academy, China and Schoot of Energy and Power Engineering, Wuhan University of Technology, China.
[2] Automatic Vehicle Identification with Sensor-Integrated RFID System 1 J. Wisanmongkol, T.Sanpechuda and U.Ketprom Proceedings of ECTI-CON 2008.
[3] The Research and Application of RFID Technologies in Highway’s Electronic Toll Collection System Xu Guangxian Department of Electronic Information Engineering, Liaoning Technical University  HuLuDao, China.
[4] Aware and Smart Member Card: RFID and License Plate Recognition Systems Integrated Applications at Parking Guidance in Shopping Mall Cheng-kung Chung and Yu-kuang Hsieh, Yung-hau Wang   and Ching-ter Chang 8th International Conference on Advanced Computational Intelligence Chiang Mai, Thailand; February 14-16, 2016.
[5] RFID-BASED INFORMATION SHARING PLATFORM Ning Li, Zhongliang Deng, Feng Wan, Shibo Zhu, Xiao Liu Proceedings of ICCTA2009.
 [6] Design of an RFID Vehicle Authentication System: A Case Study for Al-Nahrain University Campus Fawzi M. Al-Naima, Haider S. Hatem International Journal of Scientific and Technological Research www.iiste.org ISSN 2422-8702 (Online) Vol 1, No.7, 2015.
[7] Security System for Vehicle using Number Plate Detection and RFID Paras Goyal, Iqbal Singh International Journal of Computer Applications (0975 – 8887) Volume 97– No.8, July 2014.
[8] Vehicle Tracking Using RFID Jayalakshmi J, Ambily O A International Journal of Engineering Research and General Science Volume 4, Issue 2, March-April, 2016 ISSN 2091-2730
[9] Vehicle Fitted Driving License Based Security and Road Safety System M. Rajesh , K. Vignesh Ramanathan , R. Jagadish  , S. Dhayalan International Journal of Innovative Research in Science, Engineering and Technology An ISO 3297: 2007 Certified Organization, Volume 4, Special Issue 4, April 2015.
[10] Embedded Based Conveyance Authentication and Notification System S. Dharanya , A. Umamakeswari  International Journal of Engineering and Technology (IJET) ISSN : 0975-4024 Vol 5 No 1 Feb-Mar 2013.
:10.22362/ijcert/2017/v4/i3/xxxx [UNDER PROCESS]
DOI Link : Not yet assigned
Download :
  V4I307.pdf
Refbacks : There are currently no refbacks
Internet level Traceback System for Identifying the Locations of IP Spoofers from Path Backscatter
Authors : Sharada K. Shiaragudikar, Nagaraj M. Benakanahalli, Pavana Baligar , Arunakumar Joshii, JagadeeshMeti
Affiliations : Asst.Prof,Department of Computer/Information Science and Engineering, S. K. S. V. M. Agadi College of Engineering and Technology, Laxmeshwar582116,India
Abstract :

af

It is normal that the attackers over the network may use the fake source IP address to conceal their actual locations. This paper proposes a framework that bypasses the deployment challenges of IP Traceback techniques [1]. This system researches Internet Control Message Protocol error messages (named path backscatter) activated by spoofing traffic, and tracks the Spoofers based on the information available by the public(e.g., topology). Along these, the proposed framework can discover the Spoofers with no deployment prerequisite. Despite the fact that the proposed framework can't work in all the spoofing attacks, it might be the most helpful mechanism to trace Spoofers before an Internet-level traceback framework has been deployed in real. The results are got by implementing in the form of simulation using Java platform for understanding the system over the networks.
Citation :

af

Sharada K. Shiaragudikar et.al, “Internet level Traceback System for Identifying the Locations of IP Spoofers from Path Backscatter”, International Journal Of Computer Engineering In Research Trends, 4(3):98-105, March-2017.
Keywords : Internet, IPaddress ,traceback mechanism,Spoofer,protocol.
References :

af

[1].Passive IP Traceback: Disclosing the Locations of IP Spoofers From Path Backscatter Guang Yao, Jun Bi, Senior Member, IEEE, and Athanasios V. Vasilakos, Senior Member.

[2] S. M. Bellovin, “Security problems in the TCP/IP protocol suite,”ACM SIGCOMM Comput.Commun. Rev., vol. 19, no. 2, pp. 32–48,Apr. 1989.

[3] ICANN Security and Stability Advisory Committee, “Distributed denial of service (DDOS) attacks,” SSAC, Tech. Rep. SSAC Advisory SAC008,Mar. 2006.

[4] C. Labovitz, “Bots, DDoS and ground truth,” presented at the 50thNANOG, Oct. 2010.

[5] The UCSD Network Telescope. [Online]. Available: http://www.caida.org/projects/network_telescope/

[6] S. Savage, D. Wetherall, A. Karlin, and T. Anderson, “Practical network support for IP traceback,” in Proc. Conf. Appl., Technol., Archit., Protocols Comput. Commun. (SIGCOMM), 2000, pp. 295–306.

[7] S. Bellovin. ICMP Traceback Messages.[Online]. Available: http://tools.ietf.org/html/draft-ietf-itrace-04, accessed Feb. 2003.

[8] A. C. Snoeren et al., “Hash-based IP traceback,” SIGCOMM Comput. Commun. Rev., vol. 31, no. 4, pp. 3–14, Aug. 2001. [8] D. Moore, C. Shannon, D. J. Brown, G. M. Voelker, and S. Savage,“Inferring internet denial-of-service activity,” ACM Trans. Comput. Syst., vol. 24, no. 2, pp. 115–139, May 2006. [Online]. Available: http://doi.acm.org/10.1145/1132026.1132027

[9] M. T. Goodrich, “Efficient packet marking for large-scale IP traceback,”in Proc. 9th ACM Conf. Comput. Commun.Secur. (CCS), 2002,pp. 117–126.

[10] D. X. Song and A. Perrig, “Advanced and authenticated marking schemes for IP traceback,” in Proc. IEEE 20th Annu. Joint Conf. IEEE Comput.Commun.Soc. (INFOCOM), vol. 2. Apr. 2001, pp. 878–886.

[11] A. Yaar, A. Perrig, and D. Song, “FIT: Fast internet traceback,” in Proc. IEEE 24th Annu. Joint Conf. IEEE Comput.Commun.Soc. (INFOCOM), vol. 2. Mar. 2005, pp. 1395–1406.

[12] J. Liu, Z.-J.Lee, and Y.-C. Chung, “Dynamic probabilistic packet marking for efficient IP traceback,” Comput.Netw., vol. 51, no. 3, pp. 866–882, 2007.

[13] K. Park and H. Lee, “On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack,” in Proc. IEEE 20th Annu. Joint Conf. IEEE Comput.Commun.Soc. (INFOCOM), vol. 1. Apr. 2001, pp. 338–347
:10.22362/ijcert/2017/v4/i3/xxxx [UNDER PROCESS]
DOI Link : Not yet assigned
Download :
  V4I306.pdf
Refbacks : There are currently no refbacks
Various Obstruction Removal Techniques from a Sequence of Images
Authors : Miss Ashwini Gat, Mr. Uday Nuli, Mr. Sandip Murchite
Affiliations : Computer Science & Engineering, TEI’s DKTE, Ichakaranji, 416115/416115, India
Abstract :

af

Reflection or obstruction from images is a major reason for quality degradation of images in image processing. Camera Flash is frequently used to capture a good photograph of a scene under low light conditions. However, flash images have many problems: The flash can often be blinding and too strong, leading to blown out images. This report presents separate algorithms described in the literature that attempts to remove obstructions computationally. The strengths and weaknesses of each algorithm outlined.
Citation :

af

Ashwini Gat et.al, “Various Obstruction Removal Techniques from a Sequence of Images”, International Journal Of Computer Engineering In Research Trends, 4(3):86-88, March-2017.
Keywords : flash, reflection removal, obstruction, SPBSM, SID, GPSR.
References :

af

[1]	K. Gai, Z. Shi, and C. Zhang. Blind separation of superimposed moving images using image statistics. IEEE Transactions on Pattern Analysis and Machine Intelligence, 34(1):19–32, Jan 2012.

[2]	X. Guo, X. Cao, and Y. Ma. Robust separation of reflection from multiple images. In Computer Vision and Pattern Recognition (CVPR), 2014 IEEE Conference on, pages 2195–2202, June 2014.

[3]	Levin, A. Zomet, and Y.Weiss. Separating reflections from a single image using local features. In Computer Vision and Pattern Recognition, 2004. CVPR 2004. Proceedings of the 2004 IEEE Computer Society Conference on, Volume 1, pages I–306–I–313 Vol.1, June 2004

[4]	Y. Shih, D. Krishnan, F. Durand, and W. Freeman. Reflection removal using ghosting cues. In Computer Vision and Pattern Recognition (CVPR), 2015 IEEE Conference on, pages 3193– 3201, June 2015.

[5]	S. N. Sinha, J. Kopf, M. Goesele, D. Scharstein, and R. Szeliski. Image-based rendering for scenes with reflections. In ACM Trans. Graph. (August 2012). ACM SIGGRAPH, August 2012.

[6]	A. K. Jain, “Fundamentals of Digital Image Processing” Prentice-Hall, 1986, p 384.

[7]	Amit Agrawal Ramesh Raskar Shree K. Nayar† Yuanzhen Li Mitsubishi “Removing Photography Artifacts using Gradient Projection and Flash-Exposure Sampling” Electric Research Labs (MERL), Cambridge, MA_ †Columbia University

[8]	Li Michael S. Brown “Exploiting Reflection Change for Automatic Reflection Removal” Yu School of Computing, National University of Singapore liyu@nus.edu.sg | brown@comp.nus.edu.sg

[9]	B.himabindu (Asst. professor, Department of E.C.E, Chalapathi Institute of Technology, Guntur, A.P, India). “Removal of Shadows and Reflections in the Images By Using Cross-Projection Tensors” IOSR Journal of Engineering (IOSRJEN) ISSN: 2250-3021 Volume 2, Issue 8 (August 2012), PP 34-40 www.iosrjen.org www.iosrjen.org 34|Page 

[10]	 Mário A. T. Figueiredo, Senior Member IEEE, Robert D. Nowak, Senior Member, IEEE, and Stephen J. Wright “Gradient Projection for Sparse Reconstruction: Application to Compressed Sensing and Other Inverse Problems” IEEE journal of selected topics in signal processing, vol. 1, no. 4, december 2007.
[11]	A. Levin, A. Zomet, and Y. Weiss. “Separating reflections from a single image using local features”. In CVPR, 2004. [7]Song,Bo; Gong,shenwen; Ren,chunjian “Removing artifacts using gradient projection from a single image”. MIPPR 2011: Pattern Recognition and Computer Vision. Edited by Roberts, Jonathan; Ma, Jie. Proceedings of the SPIE, Volume 8004, article id. 80041C, 6 pp. (2011). (SPIE homepage). 
:10.22362/ijcert/2017/v4/i3/xxxx [UNDER PROCESS]
DOI Link : Not yet assigned
Download :
  V4I304.pdf
Refbacks : There are currently no refbacks
Youth Involvement in the Social Media for Discussing Social Problems
Authors : Dr.Basayya M Hosurmath, ,
Affiliations : Lecturer, Department of Journalism and Mass Communication Davangere University, Davangere
Abstract :

af

We can’t assume the society without the communication. As we know presently we all are very near, we are not alone, we all can share our thoughts, experience, ideas, information from anywhere, anytime and with anyone. That is all only possible from the inventions of new communication technologies. In every field we are using different tools for the communication as per the requirements.Hence, the impact of new technology is much in day to day life. As we know man is a Social Animal. He can not live without the society.To live in the society he defended on the society one or the other reason. Hence, to have good relation with the society he needs to communication to express his needs. In the beginning from the body language and verbal symbols man was expressing his feelings and needs. Later, after the invention of the language, communication became very easy. The later invention given extra feather to the communication. Invention of Print, Radio, TV. and New Media made it possible to communicate with mass people at the same time. In the latest technology the invention of computer and internet have given more opportunities for the communication.And it converged all media in one network. Internet technology has became the platform for the Social Network. The introduction of www(World Wide Web) concept by Tim Burners Lee in 1989 Social Network has became the place where society is involved in one network for sharing thoughts, ideas, expressions, information etc. about political, economical, social issues or subjects as per their requirements. In 1990 classmates.com has made to get in touch with the similar kind of people. With these Asian Avenue Black, Planet and Gente Profile also have started its service. The recent and most used social networks are Facebook and twitter. Facebook is on of the social network which has highest number of user in the world. And Twitter is in the second place.These social networks not only remained as the tool of sharing pictures, videos, text or a personal information. It is also used as the tool for creating social awareness in the society. Social awareness subjects like corruption, food wastage, new plans, social behaviour, good governance etc. are discussed in these networks and attracting many people towards this type of subjects.
Citation :

af

Dr.Basayya M Hosurmath et.al, “Youth Involvement in the Social Media for Discussing Social Problems”, International Journal Of Computer Engineering In Research Trends, 4(3):81-85, March-2017.
Keywords : Scoial Media , Facebook and twitter, Questionnaire and analyse.
References :

af

[1]	Donna L. Hoffman, Thomas P. Novak, April 1999/Vol. 42, No. 4 COMMUNICATIONS OF THEACM( Google scholar) 
[2]	www.nielsen.com
[3]	http://en.wikipedia.org/wiki/Social Media 
[4]	Kipp Bodnar – “Social Media Book” - Wiley Publication – 2012
[5]	Dave Awl – “Facebook Me” – Peachpit Press - 2009 
[6]	Joel Comm – “Twitter Power” – Wiley Publication – 2009.
:10.22362/ijcert/2017/v4/i3/xxxx [UNDER PROCESS]
DOI Link : Not yet assigned
Download :
  V4I303.pdf
Refbacks : There are currently no refbacks
Wide Band 3-D Novel flange Microstrip Patch Antenna Design employing Flexible Teflon Substrate
Authors : Avneet Kaur , Ekambir Sidhu,
Affiliations : Department of Electronics and Communication Engineering, Punjabi University Patiala, India
Abstract :

af

This paper encapsulates a novel microstrip patch antenna design over flexible Teflon substrate having dielectric constant εr= 2.1. The designed antenna exploits a rectangular patch (0.05mm thick) on the radiating patch along with microstrip feed line and defected ground plane on the other side of the substrate. The radiating element of the flexible flanged antenna design has a finite ground plane to accomplish an excellent impedance matching for maximum power transfer. The proposed antenna has an operating bandwidth of 2.9226 GHz which ranges from 15.197GHz-18.12GHz with a resonant frequency of 15.72GHz. This flexible flanged microstrip patch antenna design covers various applications including Radio Astronomy (15.35GHz-15.4GHz), Radiolocation/Airborne Doppler navigation aids (15.4GHz-15.43Hz), Radiolocation(civil)/Airborne Doppler navigation (15.43GHz-15.63GHz), Radiolocation(military) (15.7GHz-17.7GHz), FSS Earth Stations (17.7GHz-20.2GHz), Weather Satellite(18.1GHz-18.3GHz), Broadcasting(Satellite) (21.4GHz-22GHz). The proposed antenna operates for acceptable voltage standing wave ratio (VSWR) less than two. The characteristics of the proposed antenna fabricated on a flexible PVC and analyzed its performance at different antenna parameters like Return loss (dB), Impedance Bandwidth, Gain(dB), Directivity(dBi), VSWR and antenna impedance. The antenna has been designed in CST Microwave Studio 2014. The proposed antenna has been fabricated and tested using an E5071C Network analyser and an anechoic chamber. It has been observed that the simulated results, legitimately match with the experimental results.
Citation :

af

Avneet Kaur et.al, “Wide Band 3-D Novel flange Microstrip Patch Antenna Design employing Flexible Teflon Substrate”, International Journal Of Computer Engineering In Research Trends, 4(3):76-80, March-2017.
Keywords : Defected ground plane, Flexible antenna, PVC, Reduced shaped patch, Teflon
References :

af

[1]	B. D. Patel, Tanisha Narang1, Shubhangi Jain,”Microstrip Patch Antenna- A Historical Perspective of the Development,” Conference on Advances in Communication and Control Systems 2013 (CAC2S 2013) 
[2]	Indrasen Singh, Dr. V.S. Tripathi, “Micro strip Patch Antenna and its Applications: a Survey,” International Journal of Circuit Theory and Applications, vol. 2, no. 5, ISSN:2229-6093, Sept-Oct 2011.
[3]	Pavan Kumar Sharma, Veerendra Singh Jadaun,” Multi-Band Rectangular Microstrip Patch Antenna with Defected Ground Structure and a Metallic Stripe” International Journal of Technological Exploration and Learning (IJTEL) vol. 1, Issue 1, ISSN: 2319-2135, August 2012.
[4]	Stephyjohn, Manoj k c,” Microstrip Patch Antennas for Uwb Applications: A Review,” IOSR Journal of Electronics and Communication Engineering (IOSR-JECE), vol. 9, Issue 2, pp- 34-37, Mar - Apr. 2014.
[5]	M. T. Islam, M. Habib Ullah, J.S. Mandeep, N. Misran, and M.B.I Reaz,” A Low Profile High Gain Dual Band Patch Antenna for Satellite Application,”International Conference on Electrical, Electronics and Instrumentation Engineering (EEIE'2013), Nov. 27-28, 2013, Johannesburg (South Africa)
[6]	Jobin Kurian, UpamaRajan M.N, Shinoj K. Sukumaran, “Flexible Microstrip Patch Antenna using Rubber Substrate for WBAN Applications,” International Conference on Contemporary Computing and Informatics (IC3I), 2014.
[7]	C. Balanis, Antenna Theory Analysis and Design. New York: Wiley Interscience, 2005.
[8]	RameezShamalik, SushamaShelke, “Design and Simulation of Flexible Antenna for ISM band,” International Journal of Engineering Research and Applications (IJERA), ISSN: 2248-9622, Vol. 2, Issue 3, pp.2168-2170, 2012.
[9]	Shailesh Kumar, GajanandJagrawal and Deepak Billore,” E–Shaped Coaxial Feed Microstrip Patch Antenna for WLAN and WIMAX Applications,” International Journal of Current Engineering and Technology,vol.5, No.2, April 2015.
[10]	Hirohide Serizawa and KoheiHongo,”Radiation from a Flanged Rectangular Waveguide,” IEEE Transactions on Antennas and Propagation, vol. 53, no. 12, December 2005.
[11]	A. Zvyagintsev, A. Ivanov,”Radiation pattern calculation of Flanged Reflector antennas,” 12th International Conference on Mathematical Methods in Electromagnetic Theory, June 29 – July 02, 2008, Odesa, Ukraine.
[12]	Avneet Kaur, Gurnoor Singh, Ekambir Sidhu,”Novel Microstrip Patch Antenna Design employing Flexible PVC Substrate suitable for defence and Radio-determination Applications,” Progress in theproceedings of International conference on automatic control and dynamic optimization techniques, 9 september 2016, Pune, India.
[13]	T. Durga Prasad, K. V. Satya Kumar, MD KhwajaMuinuddin, ChistiB.Kanthamma, V.SantoshKumar,” Comparisons of Circular and Rectangular Microstrip Patch Antennas,” International Journal of Communication Engineering Applications-IJCEA, vol. 02, Issue 04; July 2011.
:10.22362/ijcert/2017/v4/i3/xxxx [UNDER PROCESS]
DOI Link : Not yet assigned
Download :
  V4I302.pdf
Refbacks : There are currently no refbacks
Texture Image Segmentation Based on threshold Techniques
Authors : Dodla. Likhith Reddy, Dr. D Prathyusha Reddi,
Affiliations : Professor, Dept.of ECE, PBR VITS, KAVALI
Abstract :

af

Image segmentation is the process of partitioning a digital image into multiple segments. The goal of segmentation is to simplify change the representation of an image into something that is more meaningful and easier to analyze. Image segmentation is used to give the values of objects and boundaries of a selected image like lines, curves. The image segmentation plays a critical role in a variety of pattern recognition applications such as robot vision, cartography, criminal investigation, remote sensing, object identification and recognition, military surveillance, quality assurance in industries, facial recognition and medical imaging, etc. The main aim of this paper is to propose methods are improving image segmentation and give the clear object about the image by using different techniques. This article presents a brief outline of some of the most commonly used segmentation techniques like Thresholding, Region based and Edge detection methods. The proposed methods implemented in MATLAB.
Citation :

af

Dodla. Likhith Reddy et.al, “Texture Image Segmentation Based on threshold Techniques”, International Journal Of Computer Engineering In Research Trends, 4(3):69-75, March-2017.
Keywords : Segmentation, Edge Detection, Region Based, threshold-based segmentation techniques.
References :

af

[1]	A. Bovik, M. Clark, W.S. Geisler, Multichannel texture analysis using localized spatial filters, IEEE Trans. Pattern Anal. and Machine Intelligence 12 (1990), 55-73
[2]	A. Khotanzad, A. Bouarfa, A parallel non-parametric clustering algorithm with application to image segmentation, Proc. 22nd Asilomar Conf. on Signals, Systems, and Computers, Pacific Grove, CA,( 1988)305-309
[3]	A. Laine, J. Fan, Frame representations for texture segmentation, IEEE Trans. Image Processing,  5 (1996) 771-780
[4]	A.K. Jain, F. Farrokhnia, Unsupervised texture segmentation using Gabor filters, Pattern Recognition, 24 (1991) 1167-1186
[5]	A.K. Jain, K. Karu, Learning texture discrimination masks, IEEE Trans. Pattern Anal. Machine Intelligence 18 (1996) 195-205.
[6]	Ahmed R. Khalifa et al.,Evaluating The Effectiveness Of Region Growing And Edge Detection Segmentation Algorithms,. Journal of American Science,6(10), (2010) , 580-587
[7]	Arbelaez, P., Maire, M., Fowlkes, C., Malik, J.: ‘Contour detection and hierarchical image segmentation’, IEEE Trans. Patt. Anal. Mach. Intell., 33, (5), (2010) 898–916
[8]	Arifin, A.Z., Asano, A.: ‘Image segmentation by histogram thresholding using hierarchical cluster analysis’, Patt. Recogn.Lett., 27, (13), (2006)1515–1521
[9]	AshwiniKunte, Anjali Bhalchandra, Efficient DIS Based Region Growing Segmentation Technique for VHR Satellite Images , ICGST-GVIP Journal, Volume 10, Issue 3, (2010)
[10]	B.B. Chaudhuri, N. Sarkar, Texture segmentation using fractal dimension, IEEE Trans. Pattern Anal. Machine Intelligence, 17 (1995) 72-77
[11]	B.S. Manjunath, R. Chellappa, Unsupervised texture segmentation using Markov random field models, IEEE Trans. on Pattern Anal. Machine Intelligence 13 (1991) 478-482
[12]	C. Bouman, B. Liu, Multiple resolution segmentation of textured images, IEEE Trans. Pattern Anal. Machine Intelligence 13 (1991) 99-113
[13]	Canny, J.: ‘A computational approach to edge detection’, IEEE Trans. Patt. Anal. Mach. Intell., 8, (6), (1986) 679–698
[14]	Carreira-Perpinan, M.A.: Acceleration strategies for Gaussian mean-shift image segmentation. Proc. IEEE Conf. on Computer Vision Pattern Recognition,  vol. 1, (2006)1160–1167
[15]	Carreira-Perpinan, M.A.: Acceleration strategies for Gaussian mean-shift image segmentation. Proc. IEEE Conf. on Computer Vision Pattern Recognition,  vol. 1, (2006) 1160–1167
[16]	Chen, T.W., Chen, Y.L., Chien, S.Y.: Fast image segmentation based on K-means clustering with histograms in HSV color space. Proc. IEEE Int. Workshop on Multimedia Signal Processing, October (2008) 322–325
[17]	Cheng, Y.: ‘Mean shift, mode seeking, and clustering’, IEEE Trans.Patt. Anal. Mach. Intell., 1995, 17, (8),  (1995) 790–799
[18]	Comaniciu, D., Meer, P.: ‘Mean shift: a robust approach toward feature space analysis’, IEEE Trans. Patt. Anal. Mach. Intell., 24, (5),  (2002) 603–619
[19]	Cour, T., Benezit, F., Shi, J.: ‘‘Spectral segmentation with Multiscale graph decomposition’‘. Proc. IEEE Conf. on Computer Vision Pattern Recognition, vol. 2, (2005) 1124–1131
[20]	Cui.Y, Dong.H, Zhou.E.Z, “An Early Fire Detection Method Based on Smoke Texture Analysis and Discrimination”, Journal Congress on Image and Sig. Proc., (2008), 95–99.
[21]	Cula.O.G and Dana.K.J, 3D texture recognition using bidirectional feature histograms, in Int. Journal Comp. Vis., vol.59, (2004 )33–60
[22]	D.K. Panjwani, G. Healey, “Markov random field models for unsupervised segmentation of textured color images”, IEEE Trans. Pattern Anal. Machine Intelligence, 17 (1995), 939-954
[23]	Delon, J., Desolneux, A., Lisani, J.L., Petro, A.B.: ‘A nonparametric approach for histogram segmentation’, IEEE Trans. Image Process., 16, (1),  (2007) 253–261.
[24]	Donald.A, Adjeroh and UmasankarKandaswamy, “Texton-based segmentation of retinal vessels”, Journal of Optical Society of America , vol. 24, no. 5,(2007)  1384–1393
[25]	Duda, R.O., Hart, P.E.: ‘Pattern classification and scene analysis’, (Wiley, 1973).
[26]	F.S. Cohen, Z. Fan, Maximum likelihood unsupervised textured image segmentation, CVGIP: Graphical Models and Image Processing 54 (1992) 239-251
[27]	Ghamisi, P., Couceiro, M.S., Benediktsson, J.A., Ferreira, N.M.: ‘‘An efficient method for segmentation of images based on fractional calculus and natural selection’‘, Expert Syst. 39, (16), (2012)12407–12417.
[28]	Glasbey, C.A.: ‘An analysis of histogram-based thresholding algorithms’, Comput. Vis. Graph. Image Process., 55, (6),  (1993) 532–537
[29]	H. D. Cheng and Y. Sun, “A hierarchical approach to color image segmentation using homogeneity”, IEEE Transaction on Image Processing, vol. 9, no. 12, 2000 (2071- 2082)
[30]	H. Greenspan, R. Goodman, R. Chellappa, C.H. Anderson, “Learning texture discrimination rules in a multiresolution system”, IEEE Trans. Pattern Anal. Machine Intelligence 16 (1994) 894-901
[31]	H. Seddik and E. Ben Braiek “Color Medical Images Watermarking, Based Neural Network Segmentation “GVIP Journal Special Special Issue on (Medical Image Processing), (2006) 81-86
[32]	http://wang.ist.psu.edu/docs/related/
[33]	http://www.imageprocessingplace.com/root_files_V3/image_databases.html.
[34]	http://www.ux.uis.no/~tranden/brodatz.html
[35]	Huang, S.H., Chu, Y.H., Lai, S.H., Novak, C.L.: ‘‘Learning-based vertebra detection and iterative normalized-cut segmentation for spinal MRI’‘, IEEE Trans. Med. Imag., 28, (8), (2009) 1595–1605
[36]	Idrissisidiyassine, Samir belfkih, "Texture image segmentation using a new descriptor and mathematical morphology”, in Int. Arab Journal of Information Technology, Vol.10, No.2, (2013)  204-208
[37]	J. Mao, A.K. Jain, “Texture classification and segmentation using multi resolution simultaneous autoregressive models”, Pattern Recognition 25 (1992) 173-188
[38]	. Serra, Image Analysis and Mathematical Morphology. London, U.K.: Academic, 1982
[39]	J.F. Silverman, D.B. Cooper, Bayesian clustering for un-supervised estimation of surface and texture models, IEEE Trans. Pattern Anal. Machine Intelligence 10 (1988) 482-495
[40]	J.H.Jaseema Yasmin1, D. Muhammad Noorul Mubarak2 , M.MohamedSathik 3, Border Detection of Noisy Skin Lesions by Improved Iterative Se]gmentation Algorithm using LOG Edge Detector ,  ICGST-GVIP Journal, Vol. 12 ( 2),  (2012) 56-64
[41]	J.L. Chen, A. Kundu, Unsupervised texture segmentation using multichannel decomposition and hidden Markov models, IEEE Trans. Image Processing, 4 (1995), 603-619
[42]	.Y. Hsiao, A.A. Sawchuk, “Unsupervised texture image segmentation using feature smoothing and probabilistic relaxation techniques”, Computer Vision Graphics Image Processing 48 (1989) 1-21
[43]	Jähne, B.: ‘Practical handbook on image processing for scientific and technical applications’ (CRC Press, 2004, 2nd Ed.), Ch. 15
[44]	Kekre.H.B,  SayleeGharge, "Texture Based Segmentation using Statistical Properties for Mammographic Images”, Int. Journal of Advanced Computer Science and Applications(IJACSA),  Vol. 1, No. 5, (2010) 102-107
[45]	Otsu, N.: ‘A threshold selection method from gray-level histograms’, IEEE Trans. Syst., Man, Cybern., 9, (1), (1979) 62–66. 
:10.22362/ijcert/2017/v4/i3/xxxx [UNDER PROCESS]
DOI Link : Not yet assigned
Download :
  V4I301.pdf
Refbacks : There are currently no refbacks

 

Secure Data Deduplication over Distributed Cloud Server Framework with Effective User Revocation and Load Balancing
Authors : D.Jayanarayana Reddy, M.Janardhan , U.Veeresh
Affiliations : Assistant Professor, Department of CSE, GPCET, Kurnool.
Abstract :

af

Nowadays Cloud Computing is an emerging Technology which leads various primitive services like SaaS, IaaS, and PaaS. Data deduplication mechanism is widely used to improve the bandwidth and storage space by removing duplicate copies of data from distributed cloud server.In Multi-owner manner data is stored and shared on distributed cloud server architecture, we have noticed some of the challenging issues, i.e., Users Privacy, Data Integrity, Load Balancing and Dynamic Ownership changes in attributes I,e User revocation Issues. To address the above challenges, we suggested a novel framework for Secure Data Deduplication over Distributed Cloud Server Framework with Effective User Revocation and Load Balancing Management. In our proposed framework, Block level hashing is pragmatic for every outsourced data and distributed into chunks and stored on distributed cloud servers, PoW protocol trappings Secured data deduplication and also provide an optimized solution for user revocation and load balancing issues , our projected approach is effective as the previous schemes while the added computational in the clouds is negligible.
Citation :

af

D.Jayanarayana Reddy et.al, “Secure Data Deduplication over Distributed Cloud Server Framework with Effective User Revocation and Load Balancing.”, International Journal Of Computer Engineering In Research Trends, 4(2):57-62, February-2017.
Keywords : Cloud Computing, Secure DataDeduplication, Load balancing, distributed cloud server, PoW Protocol.
References :

af

[1] M. Mulazzani, S. Schrittwieser, M. Leithner, and M. Huber, “Dark clouds on the horizon: using cloud storage as an attack vector and online slack space,” Proc. USENIX Conference on Security, 2011.
[2] Meister, D., Brinkmann, A.: Multi-level comparison of data deduplication in a backup scenario. In: SYSTOR ’09, New York, NY, USA, ACM (2009) 8:1–8:12 
[3] Mandagere, N., Zhou, P., Smith, M.A., Uttamchandani, S.: Demystifying data deduplication. In: Middleware ’08, New York, NY, USA, ACM (2008) 12–17 
[4] Aronovich, L., Asher, R., Bachmat, E., Bitner, H., Hirsch, M., Klein, S.T.: The design of a similarity based deduplication system. In: SYSTOR ’09. (2009) 6:1–6:14 
[5] Dutch, M., Freeman, L.: Understanding data de-duplication ratios. SNIA forum (2008) http://www.snia.org/sites/default/files/Understanding_Data_ Deduplication_Ratios-20080718.pdf. 
[6] Harnik, D., Margalit, O., Naor, D., Sotnikov, D., Vernik, G.: Estimation of deduplication ratios in large data sets. In: IEEE MSST ’12. (april 2012) 1 –11 
[7] Harnik, D., Pinkas, B., Shulman-Peleg, A.: Side channels in cloud services: Deduplication in cloud storage. Security Privacy, IEEE 8(6) (nov.-dec. 2010) 40 –47 
[8] Halevi, S., Harnik, D., Pinkas, B., Shulman-Peleg, A.: Proofs of ownership in remote storage systems. In: CCS ’11, New York, NY, USA, ACM (2011) 491–500 
[9] Di Pietro, R., Sorniotti, A.: Boosting efficiency and security in proof of ownership for deduplication. In: ASIACCS ’12, New York, NY, USA, ACM (2012) 81–82 
[10] Douceur, J.R., Adya, A., Bolosky, W.J., Simon, D., Theimer, M.: Reclaiming space from duplicate files in a serverless distributed file system. In: ICDCS ’02, Washington, DC, USA, IEEE Computer Society (2002) 617–632 
[11] Storer, M.W., Greenan, K., Long, D.D., Miller, E.L.: Secure data deduplication. In: StorageSS ’08, New York, NY, USA, ACM (2008) 1–10 
[12] Bellare, M., Keelveedhi, S., Ristenpart, T.: Message-locked encryption and secure deduplication. In: Advances in Cryptology–EUROCRYPT 2013. Springer 296–312 
[13]  Xu, J., Chang, E.C., Zhou, J.: Weak leakage-resilient client-side deduplication of encrypted data in cloud storage. In: 8th ACM SIGSAC symposium. 195–206 14. Bellare, M., Keelveedhi, S., Ristenpart, T.: DupLESS: server-aided encryption for deduplicated storage. In: 22nd USENIX conference on Security. (2013) 179–194
:10.22362/ijcert/2017/v4/i2/xxxx [UNDER PROCESS]
DOI Link : Not yet assigned
Download :
  V4I209.pdf
Refbacks : There are currently no refbacks
Analysis of Computational Time on DREAD Model
Authors : Didit Suprihanto, Retantyo Wardoyo,
Affiliations : Department of Electrical Engineering,Universitas Mulawarman, Kalimantan Timur, Indonesia, 75123
Abstract :

af

In identifying the risks, there are several factors needed to consider, such as the extent to which these risks are exploited and how much damage will occur. Considerations for choosing the most appropriate risk reduction that is fast and safe to perform a good calculation. Calculation complexity is one thing that should be considered in selecting an algorithm to be applied to the decision support system. This paper uses DREAD model by discussing the complexity testing and implement DREAD model into a program. Complexity is used to find out the computation time and its ratio completed with the result that the computation time of the final data is affected by the data addition. Therefore, the addition of data greatly affects to the computation time which is required the ratio of computing time, even though it has a bunch of similar data computation time and in fact these have different results that the ratio of computation time does not give any effect (stable). Computation ratio changes from the initial data group until the end of data group are not significantly compared with the value of computing time for each additional 100 tested data.
Citation :

af

Didit Suprihanto et.al, “Analysis of Computational Time on DREAD Model”, International Journal Of Computer Engineering In Research Trends, 4(2):53-56, February-2017.
Keywords : Complexity, Computing, DREAD
References :

af

[1] McEvoy, N., Whitcombe, A.,. Structured Risk Analysis. International conference on infrastructure security, vol. 2437, Bristol , October 1-3, 88-103. 2002
[2] Elky, S., An Introduction to Information System Risk Management. SANS Institute InfoSec Reading Room.copyright©SANS Institute. 2006.
[3] Hamdani., Wardoyo, R., The Complexity Calculation for Group Decision Making Using TOPSIS Algorithm. Advances of Science and Technology for Society AIP Conf. Proc. 1755, 070007-1–070007-7; doi: 10.1063/1.4958502 Published by AIP Publishing. 978-0-7354-1413-6: 2016.
[4] M. Ölmez and U. Lindemann, Procedia Comput. Sci. 28, 130 :2014.
[5] I. Wegener, Complexity Theory (Exploring the Limits of Efficient Algorithms) (Springer-Verlag, Dortmund), pp. 1–380: 2005
[6] Sipser, Michael, Introduction to the Theory of Computation – Second Edition, Thomson Course Technology, Massachusetts : 2006.
[7] Meier, J.D., Mackman, A., Vasireddy, S., Dunner,M., Escamilla, S., Murukan, A.,. Improving web application security: Threats and Countermeasures. Microsoft Corporation.2003..
:10.22362/ijcert/2017/v4/i2/xxxx [UNDER PROCESS]
DOI Link : Not yet assigned
Download :
  V4I208.pdf
Refbacks : There are currently no refbacks
K-Anonymous Privacy Preserving Technique for Participatory Sensing With Multimedia Data Over Cloud Computing
Authors : K.Lakshmi, J.Hemalatha, Farooq Basha
Affiliations : Asst.Prof, G.Pullaiah College of Engineering and Technology, Kurnool.
Abstract :

af

Nowadays distinctions of sensing facilities equipped with mobile wireless devices. Likewise, different service provider named participatory sensing system made available which gives outstanding life experience to users. Nevertheless, there are many challenges like privacy and multimedia data quality. There is no any earlier system that can resolve problems of confidentiality and quality, preserving participatory sensing system with multimedia data. Slicer is a K-anonymous privacy preservation scheme for participatory sensing with multimedia data over cloud framework. It combines data coding methods and message transfer strategies. To get the secure protection of user’s high data quality and also maintains privacy. Minimal Cost Transfer and Transfer On Meet-up, these are two data transfer strategies. For Minimal Cost Transfer, two parallel algorithms used. i.e., approximation algorithm and Heuristic algorithm. Slicer provides data quality with low communication.
Citation :

af

K.Lakshmi et.al, “K-Anonymous Privacy Preserving Technique for Participatory Sensing With Multimedia Data Over Cloud Computing”, International Journal Of Computer Engineering In Research Trends, 4(2):48-52, February-2017.
Keywords : Cloud mobile sensing, privacy preservation, anonymity, data aggregation
References :

af

1.	J. Burke, D. Estrin, M. Hansen, A. Parker, N.Ramanathan, S. Reddy, and M. B. Srivastava,“Participatory sensing,” presented at the First Workshop World-Sensor-Web 4th ACM Conf.Embedded Netw. Sen. Syst., Boulder, CO, USA, Oct.2006.
2.	”The world in 2013: ICT Facts and Figures,” International Telecommunication Union. [Online]. Available: http://www.itu.int,2013. 
3.	 R. K. Ganti, N. Pham, H. Ahmadi, S. Nangia, and T. F.Abdelzaher, “GreenGPS: A participatory sensing fuelefficient maps application,” presented at the 8th Int.Conf. Mobile Syst., Appl. Serv., San Francisco, CA,USA, Jun. 2010.  
4.	 X. O. Wang, W. Cheng, P. Mohapatra, and T. Abdelzaher,”Adsense: Anonymous reputation and trust in participatory sensing,” presented at the 32nd IEEE Int. Conf. Comput. Commun., Turin, Italy, Apr. 2013.
5.	E. D. Cristofaro and C. Soriente,”Participatory privacy: Enabling privacy in participatory sensing,” IEEE Netw., vol. 27, no. 1, pp. 3236, Jan./Feb. 2013.
6.	R. Chen, I. E. Akkus, and P. Francis, ”SplitX: High-performance private analytics,” presented at the ACM Special Interest Group Data Commun., Hong Kong, China, Aug. 2013.
7.	 N. Xia, H. H. Song, Y. Liao, M. Iliofotou, A. Nucci, Z.-L. Zhang, and A. Kuzmanovic,”Mosaic: Quantifying privacy leakage in mobile networks,” presented at the ACM Special Interest Group on Data Commun., Hong Kong, China, Aug. 2013.
8.	S. Han, V. Liu, Q. Pu, S. Peter, T. Anderson, A. Krishnamurthy,and D. Wetherall, ”Expressive privacy control with pseudonyms”presented at the ACM Special Interest Group Data Commun., Hong Kong, China, Aug. 2013.
9.	N. Kumar, N. Chilamkurti, and J. J. Rodrigues,”Learning automatabasedopportunistic data aggregation and forwarding scheme for alert generation in vehicular ad hoc networks,”Comput. Commun., vol. 39, pp. 2232, 2014.
10.	N. Kumar, N. Chilamkurti, and J. J. Rodrigues,”Privacy-aware message exchanges for HumaNets,”Comput. Commun., vol. 39, pp. 2232, 2014.

11.	Participatory Sensing: Applications and Architecture Deborah Estrin University of California, Los Angeles  : http://www.cs.cornell.edu/~destrin/resources/conferences/2010-Estrin-participatory-sensing-mobisys.pdf

:10.22362/ijcert/2017/v4/i2/xxxx [UNDER PROCESS]
DOI Link : Not yet assigned
Download :
  V4I207.pdf
Refbacks : There are currently no refbacks
Music Genre Classification Using MFCC, K-NN and SVM Classifier
Authors : Nilesh M. Patil, Dr. Milind U. Nemade,
Affiliations : Ph.D Research Scholar1, Pacific Academy of Higher Education and Research University, Udaipur, India.
Abstract :

af

The audio corpus available today on Internet and Digital Libraries is increasing rapidly in huge volume. We need to properly index them if we want to have access to these audio data. The search engines available in market also find it challenging to classify and retrieve the audio files relevant to the user’s interest. In this paper, we describe an automated classification system model for music genres. We firstly found good feature for each music genre. To obtain feature vectors for the classifiers from the GTZAN genre dataset, features like MFCC vector, chroma frequencies, spectral roll-off, spectral centroid, zero-crossing rate were used. Different classifiers were trained and used to classify, each yielding varying degrees of accuracy in prediction.
Citation :

af

Nilesh M. Patil et.al, “Music Genre Classification Using MFCC, K-NN and SVM Classifier”, International Journal Of Computer Engineering In Research Trends, 4(2):43-47, February-2017.
Keywords : Music, MFCC, K-NN, SVM, GTZAN dataset.
References :

af

[1]	G. Tzanetakis, P. Cook, “Musical genre classification of audio signals”, IEEE Transactions on Speech and Audio Processing, Vol. 10, Issue 5, July 2002.
[2]	Chandsheng Xu, Mc Maddage, Xi Shao, Fang Cao, and Qi Tan, “Musical genre classification using support vector machines”, IEEE Proceedings of International Conference of Acoustics, Speech, and Signal Processing, Vol. 5, pp. V-429-32, 2003.
[3]	N. Scaringella, G. Zoia, and D. Mlynek, “Automatic genre classification of music content: a survey”, IEEE Signal Processing Magazine, Vol. 23, Issue 2, pp. 133–141, 2006.
[4]	Jan Wülfing and Martin Riedmiller, “Unsupervised learning of local features for music classification” ISMIR, pp. 139–144, 2012.
[5]	Sox.sourceforge.net. Sox - sound exchange— homepage, 2015.
[6]	http://marsyas.info/downloads/datasets.html
:10.22362/ijcert/2017/v4/i2/xxxx [UNDER PROCESS]
DOI Link : Not yet assigned
Download :
  V4I206.pdf
Refbacks : There are currently no refbacks
Application of Computer in Production Planning and Control for SME’s
Authors : Dr Porag Kalita, ,
Affiliations : Head: Automobile Engineering Department, Govt. of Assam,Vocational Education (+2), M R S Higher Secondary School, Titabor, Assam.
Abstract :

af

The success of any enterprise largely depends upon its planning. Without planning become random and results are meaningless and no enterprises can avail success to its maximum satisfaction. Therefore, computerized planning for SME’s, paper work the clerks in the department must bring out every day on regular basis to bring interrelationship and ensure coordination between different work centers. There is again an important necessity that these documents are prepared in time and the communication is fast enough to reach the receiver before it becomes state with change of situation and directly or indirectly , it will be help for zero defect programme for SME’s in terms of re-engineering process.
Citation :

af

Dr Porag Kalita, “Application of Computer in Production Planning and Control for SME’s”, International Journal Of Computer Engineering In Research Trends, 4(2):38-42, February-2017.
Keywords : Computerized planning, Re-Engineering Process, Zero Defect programme
References :

af

[1] Course materials in Post graduate Diploma in Business Management, New Delhi, 1993.
[2] Course materials, Executive Development programme, IIM Bangalore, 1995, course director Prof L Prasad.
[3] Course materials Management Development programme, XLRI, Jamshedpur and course director Prof Madan. 
[4] Course materials in Fellow Management Research Programme in Business Administration, MSPI, New Delhi, 1999.  
[5] Paper by Dr. Porag Kalita, UGC sponsored National in Nalbari commerce College Assam,
[6] Course material by National Council of Labours Management, Chennai.1993.
[7] Paper by Dr. Porag Kalita, NAAC sponsored national seminar, J B College, Assam, India
[8] Course materials in IIPM, Kolkata in workshop on Total Productive Maintenance, 1997.                                                        
:10.22362/ijcert/2016/v3/i12/xxxx [Under Process]
DOI Link : Not yet assigned
Download :
  V4I205.pdf
Refbacks : There are currently no refbacks
Performance Analysis of Existing Direction of Arrival Algorithms for Various Mobile Sources and Antenna Elements
Authors : Yashoda B.S, Dr. K.R. Nataraj,
Affiliations : Ph.D Research Scholar1 Jain University, Bangalore, India.
Abstract :

af

In today’s world the number of mobile users is increasing day by day with the limited capacity there is a need for intelligent techniques that can provide same QOS (Quality of Service) across mobile users. In this paper existing methods namely Bartlett Method, Maximum Likelihood and MUSIC (Multiple Signal Classification) Method are described and simulated for various combinations of antenna elements and mobile separation configurations.
Citation :

af

Yashoda B.S et.al, “Performance Analysis of Existing Direction of Arrival Algorithms for Various Mobile Sources and Antenna Elements”, International Journal Of Computer Engineering In Research Trends, 4(2):33-37, February-2017.
Keywords : MUSIC, QOS, DOA
References :

af

[1] P. Laxmikanth, Mr. L. Surendra, Dr. D. Venkata Ratnam, S. Susrutha babu, Suparshya babu “ Enhancing the performance of AOA  estimation  in wireless communication using the MUSIC algorithm” SPACES-2015, Dept of ECE, K L UNIVERSITY.

[2] AndyVesa,Arpad lozsa “Direction of Arrival estimation for uniform sensor arrays” Electronics and Telecommunications(ISETC),  9th International Symposium on Electronics and Telecommunications 2010.

[3] Wing-KinMa, Tsung-HanHseih, Chong-Yung Chi “DOA estimation of quasi-stationary signals via Khatri-Rao subspace”, 2009, IEEE International Conference on Accoustics,speech and signal processing.

 [4] Yue Ivan Wu, Gerald Pacaba Arada, Kainam Thomas Wong “Electromagnetic coupling matrix modeling and ESPRIT-based direction finding –A case study using a uniform linear array of identical dipoles” 2009, IEEE International Conference on Acoustics, speech and signal processing.

 [5] H. L. Van Trees, Optimum Array Processing – Part IV of Detection, Estimation and Modulation Theory. Wiley-Interscience, 2002.

[6] D. T. Vu, A. Renaux, R. Boyer, and S. Marcos, “Some results on the weiss–weinstein bound for conditional and unconditional signal models in array processing,” Elsevier Signal Processing, vol. 95, no. 0, pp. 126 – 148, 2014.

[7] A. Renaux, P. Forster, P. Larzabal, C. D. Richmond, and A. Nehorai,“A fresh look at the bayesian bounds of the weiss-weinstein family,”Signal Processing, IEEE Transactions on, vol. 56, no. 11, pp. 5334 – 5352, November 2008.


[8] P. Stoica and B. Ng, “On the cramer-rao bound under parametric constraints,” IEEE Signal Processing Letters, vol. 5, no. 7, pp. 177 – 179, July 1998.

[9] T. J. Moore Jr., “A theory of cram´er-rao bounds for constrained parametric model,” Ph.D. dissertation, University of Maryland, College Park,Department of Mathematics, College Park, Maryland, USA, 2010.

[10] Y.-H. Li and P.-C. Yeh, “An interpretation of the moore-penrose generalized inverse of a singular fisher information matrix,” IEEE Transactions on Signal Processing, vol. 60, no. 10, pp. 5532 – 5536, October 2012.

[11] F. R¨omer and M. Haardt, “Deterministic cram´er-rao bounds for strict sense non-circular sources,” in International ITG/IEEE Workshop on Smart Antennas (WSA), February 2007.

[12] D. Schulz and R. S. Thom¨a, “Search-based MUSIC techniques for2D DoA estimation using EADF and real antenna arrays,” in 17th International ITG Workshop on Smart Antennas 2013 (WSA 2013), Stuttgart, Germany, 03 2013.

[13] M. Landmann, “Limitations of experimental channel characterisation,”Ph.D. dissertation, Ilmenau University of Technology, Electronic Measurement Research Laboratory, Ilmenau, Germany, 2007.

[14] M. Landmann, M. K¨aske, and R. Thom¨a, “Impact of incomplete and inaccurate data models on high resolution parameter estimation in multidimensional channel sounding,” IEEE Transactions on Antennas and Propagation, vol. 60, no. 2, pp. 557 – 573, February 2012.

[15] M. Landmann, A. Richter, and R. Thom¨a, “DoA resolution limits in MIMO channel sounding,” in IEEE Antennas and Propagation Society International Symposium, vol. 2, June 2004, pp. 1708 – 1711.

[16] Y. Tian and Y. Takane, “More on generalized inverses of partitioned matrices with banachiewicz–schur forms,” Linear Algebra and its Applications,vol. 7430, no. 5–6, pp. 1641 – 1655, 2009.

[17] Foutz, Jeffrey, Andreas Spanias, and Mahesh K. Banavar. ”Narrowbanddirection of arrival estimation for antenna arrays.” Synthesis Lectures on Antennas 3.1 (2008): 1-76.

 [18] Lau, C.K.E.; Adve, R.S.; Sarkar, T.K., ”Combined CDMA and matrix pencil direction of arrival estimation,” Vehicular Technology Conference, 2002. Proceedings. VTC 2002-Fall. 2002 IEEE 56th , vol.1, no.,pp.496,499 vol.1, 2002.

[19] Marot, J.; Fossati, C.; Bourennane, S., ”Fast subspace-based source localization methods,” Sensor Array and Multichannel Signal Processing Workshop, 2008. SAM 2008. 5th IEEE , vol., no., pp.203,206, 21-23 July 2008.
[20] Khmou, Y.; Safi, S., ”DOA estimation with fourth order propagator,”Multimedia Computing and Systems (ICMCS), 2014 International Conference on , vol., no., pp.1295,1300, 14-16 April 2014.

:10.22362/ijcert/2016/v3/i12/xxxx [Under Process]
DOI Link : Not yet assigned
Download :
  V4I204.pdf
Refbacks : There are currently no refbacks
Designing siRNA for Silencing Polo-Like Kinase 1 (Plk1) Gene of Prostate Cancer
Authors : JAYAPRAKASH. P, SIVAKUMARI. K, ASHOK. K AND RAJESH. S
Affiliations : PG AND RESEARCH DEPARTMENT OF ZOOLOGY, PRESIDENCY COLLEGE, CHENNAI- 600 005, TAMIL NADU, INDIA
Abstract :

af

Prostate cancer is the most commonly occurring cancer in American men, next to skin cancer. Existing treatment options and surgical intervention are unable to manage this cancer effectively. Therefore, continuing efforts are ongoing to establish a novel mechanism based targets and strategies for its management. PLK1 plays a key role in the mitotic entry of proliferating cells and regulates many aspects of mitosis which are necessary for successful cytokinesis. PLK1 is overexpressed in many tumour types with aberrant elevation frequently constituting a prognostic indicator of poor disease outcome and our study indicate that PLK1 could be an excellent target for the treatment as well as chemoprevention of prostate cancer.
Citation :

af

Jayaprakash. P et.al, “Designing siRNA for Silencing Polo-Like Kinase 1 (Plk1) Gene of Prostate Cancer”, International Journal Of Computer Engineering In Research Trends, 4(2):25-32, February-2017.
Keywords : Prostate cancer, PLK1 gene and siRNA
References :

af

1)	Landis, SH., Murray, T., Bolden, S. and Wing, P.A., (1998). Cancer statistics, 1998. CA. Cancer J. Clin. 48: 6-29.
2)	Jemal, A., Tiwari, R.C., Murray, T., Ghafoor, A., Samuels, A., Ward, E., Feuer, E. J. and Thun, M. J. (2004). Cancer statistics. CA. Cancer J. Clin. 54: 8-29.
3)	Reagan-Shaw, S. and Ahmad, N., (2005). Silencing of polo-like kinase (Plk) 1 via siRNA causes induction of apoptosis and impairment of mitosis machinery in human prostate cancer cells: implications for the treatment of prostate cancer. FASEB. J. 19: 611-613.
4)	Talcott, J.A., Rieker, P., Clark, J.A., Propert, K.J., Weeks, J.C., Beard, C.J., Wishnow, K.I., Kaplan, I., Loughlin, K.R., Richie, J.P. and Kantoff, P.W. (1998). Patient-reported symptoms after primary therapy for early prostate cancer: Results of a prospective cohort study. J. Clin. Oncol. 16: 275-283.
5)	Quinn, M. and Babb, P. (2002). Patterns and trends in prostate cancer incidence, survival, prevalence and mortality. Part I: International comparisons. BJU. Int. 90: 162-164.
6)	Herbert, J.R., Ghumare, S.S. and Gupta, P.C. (2006). Stage at diagnosis and relative differences in breast and prostrate cancer incidence in India: Comparison with the United States. Asian. Pac. J. Cancer. Prev. 7: 547-555.
7)	Daskivich, T.J. and Oh, W.K. (2006). Failure of gonadotropin-releasing hormone agonists with and without sterile abscess formation at depot sites: insight into mechanisms? Urology 67: 15-17.
8)	Gallagher, E. and Gapstur, R. (2006). Hormone-refractory prostrate cancer : A shifting paradigm in treatment. Clin. J. Oncol. Nurs. 10: 233-240.
9)	Golsteyn, R.M., Schultz, S.J., Bartek, J., Ziemiecki, A., Ried, T. and Nigg, E.A. (1994). Cell cycle analysis and chromosomal localization of human Plk1, a putative homologue of the mitotic kinases Drosophila polo and Saccharomyces cerevisiae Cdc5. J. Cell Sci. 107: 1509-1517.
10)	Glover, D.M., Hagan, I.M. and Tavares, A.A. (1998). Polo-like kinases: A team that plays throughout mitosis. Genes Dev. 12: 3777-3787.
11)	Donaldson, M.M., Tavares, A.A., Ohkura, H., Deak, P. and Glover, D.M., (2001b). Metaphase arrest with centromere separation in polo mutants of Drosophila. J. Cell Biol. 153: 663-676.
12)	Lane, H.A. and Nigg, E.A. (1996). Antibody microinjection reveals an essential role for human polo-like kinase 1 (Plk1) in the functional maturation of mitotic centrosomes. J. Cell Biol. 135(6 Pt 2): 1701-1713.
13)	Alexandru, G., Uhlmann, F., Mechtler, K., Poupart, M. A. and Nasmyth, K. (2001). Phosphorylation of the cohesin subunit Scc1 by Polo/Cdc5 kinase regulates sister chromatid separation in yeast. Cell. 105:  459-472.
14)	Sumara, I., Vorlaufer, E., Stukenberg, P.T., Kelm, O., Redemann, N., Nigg, E.A. and Peters, J.M. (2002). The dissociation of cohesin from chromosomes in prophase is regulated by polo-like kinase. Mol. Cell 9: 515-525.
15)	Lansing,T.J., McConnell, R.T., Duckett, D.R., Spehar, G.M., Knick, V.B., Hassler, D.F., Noro, N., Furuta, M., Emmitte, K.A. and Gilmer, T.M. (2007). In vitro biological activity of a novel small-molecule inhibitor of polo-like kinase 1. Mol. Cancer Ther.  6: 450-459.
16)	van Vugt, M.A., Bras, A. and Medema, R.H. (2004a). Polo-like kinase-1 controls recovery from a G2 DNA damage-induced arrest in mammalian cells. Mol. Cell. 15: 799-811.
17)	van Vugt, M.A., van de Weerdt, B.C., Vader, G., Janssen, H., Calafat, J., Klompmaker, R., Wolthuis, R.M. and Medema, R.H. (2004b). Polo-like kinase-1 is required for bipolar spindle formation but is dispensable for anaphase promoting complex/Cdc20 activation and initiation of cytokinesis. J. Biol. Chem. 279: 36841-36854.
18)	McInnes, C., Mezna, M. and Fischer, P.M. (2005). Progress in the discoveryof polo-like kinase inhibitors. Curr. Top. Med. Chem. 5: 181-197. 
19)	McInnes, C., Mazumdar, A., Mezna, M., Meades, C., Midgley, C., Scaerou, F., Carpenter, L., Mackenzie, M., Taylor, P. and Walkinshaw, M. (2006). Inhibitors of Polo-like kinase reveal roles in spindle-pole maintenance. Nat. Chem. Biol. 2(11): 608-617.
20)	Seong, Y.S., Kamijo, K., Lee, J.S., Fernandez, E., Kuriyama, R., Miki, T. and Lee, K.S. (2002). A spindle checkpoint arrest and a cytokinesis failure by the dominant-negative polo-box domain of Plk1 in U-2 OS cells. J. Biol. Chem. 277(35): 32282-32293.
21)	Leung, G.C., Hudson, J.W., Kozarova, A., Davidson, A., Dennis, J.W. and Sicheri, F. (2002). The Sak polo-box comprises a structural domain sufficient for mitotic subcellular localization. Nat. Struct. Biol. 9: 719-724.
22)	Golsteyn, R.M., Mundt, K.E., Fry, A.M. and Nigg, E.A. (1995). Cell cycle regulation of the activity and subcellular localization of Plk1, a human protein kinase implicated in mitotic spindle function. J. Cell Biol. 129(6): 1617-1628.
23)	Hamanaka, R., Smith, M.R., O'Connor, P.M., Maloid, S., Mihalic, K., Spivak, J.L., Longo, D.L. and Ferris, D.K. (1995). Polo-like kinase is a cell cycle-regulated kinase activated during mitosis. J. Biol. Chem. 270(36): 21086-21091.
24)	Hamanaka, R., Maloid, S., Smith, M.R., O'Connell, C.D., Longo, D.L. Ferris, D.K. (1994). Cloning and characterization of human and murine homologues of the Drosophila polo serine-threonine kinase. Cell. Growth. Differ. 5(3): 249-257.
25)	Holtrich, U., Wolf, G., Brauninger, A., Karn, T., Bohme, B., Rubsamen-Waigmann, H. and Strebhardt, K. (1994). Induction and down-regulation of PLK, a human serine/threonine kinase expressed in proliferating cells and tumors. Proc. Natl. Acad. Sci. USA. 91: 1736- 1740.
26)	Smith, M.R., Wilson, M.L. and Hamanaka, R. (1997). Malignant transformation of mammalian cells initiated by constitutive expression of the polo-like kinase. Biochem. Biophys. Res. Commun. 234: 397-405.
27)	Zhang, C., Pei, J., Kumar, D., Sakabe, I., Boudreau, H.E., Gokhale, P.C. and Kasid, U.N. (2007). Antisense oligonucleotides: target validation and development of systemically delivered therapeutic nanoparticles. Methods. Mol. Biol. 361:163-185.
28)	Spänkuch, B., Steinhauser, I., Wartlick, H., Kurunci-Csacsko, E., Strebhardt, K.I., Langer, K. (2008). Downregulation of Plk1 expression by receptor mediated uptake of antisense oligonucleotide-loaded nanoparticles. Neoplasia 10(3): 223-234.
29)	Sui, G., Soohoo, C., Affar, B., Gay, F., Shi, Y. and Forrester, W.C. (2002). A DNA vector-based RNAi technology to suppress gene expression in mammalian cells. Proc. Natl. Acad. Sci. USA. 99: 5515-5520. 
:10.22362/ijcert/2017/v4/i2/xxxx [UNDER PROCESS]
DOI Link : Not yet assigned
Download :
  V4I203.pdf
Refbacks : There are currently no refbacks
An Enforcement of Guaranteed Client Level Defensive Mechanism in Public Cloud Services
Authors : Prof. R. Poorvadevi, S.Keerthana, V.S. Ghethalaxmipriya, K. Venkatasailokesh
Affiliations : Assistant Professor1, Department of computer science and engineering, SCSVMV University, Kanchipuram, India
Abstract :

af

In the current era of cloud computing, the distinct enterprise information technology (IT) and business decision makers analyze the security implications of cloud computing to their business for the benefit of improving the business agility. Cloud has been playing a major role in the various multidisciplinary domains. Recent survey stated that 70% research issues are focusing on cloud security domain. Although, cloud is providing the huge amount of services to the users, still the client end level security problem is not completely eradicated. So, there is a major focus on improving and finding the solution for cloud security to know the various potential risks in the customer end. Several large cloud vendors have signaled practical implementations of the security mechanism, primarily to protect the cloud infrastructure from insider threats and advanced persistent threats. So, the proposed model brings the solution for giving the guaranteed type of cloud services in an attack free manner to the web clients. This could be achieved through the technique of client level guaranteed security system defensive approach. This mechanism will majorly operates on how to protect the user authentication procedures, security,policies, security layered approach from the client level transactions. The proposed work will be simulated on the cloud sim tool, through which end-users will obtain the better security solution in the public cloud environment.
Citation :

af

Prof. R. Poorvadevi et.al, “An Enforcement of Guaranteed Client Level Defensive Mechanism in Public Cloud Services”, International Journal Of Computer Engineering In Research Trends, 4(1):20-24, February-2017.
Keywords : Cloud vendor, public cloud security, cloud service provider, cloud customer, defensive model, cloud sim, data centre, and virtual machine
References :

af

1)	Miyoung jang; Min Yoon; Jae-Woo chang, paper entitled as “A Privacy-aware query authentication index for database outsourcing” IEEE conference publications 2014. 

2)	Wenjun Lu ; Google, Mountain View, CA, USA; Varna, A.L. ; Min Wu,”Confidentiality-Preserving Image Search: A Comparative Study between Homomorphic Encryption and Distance-Preserving Randomization”, IEEE transactions on volume 2 – 2014.

3)	Velciu, M.-A. ; Comput. Sci. Dept, Mil. Tech. Acad., Bucharest, Romania; Patrascu, A. ; Patriciu, V.-V, “Bio-cryptographic authentication in cloud storage sharing”, Applied Computational Intelligence and Informatics (SACI), 2014 IEEE 9th International Symposium on – 2014.

4)	Poornima, B. ; Rajendran, T, “Improving Cloud Security by Enhanced HASBE Using Hybrid Encryption Scheme”, Computing and Communication Technologies (WCCCT), 2014 World Congress on march-14.

5)	Durrani, A, “Analysis and prevention of vulnerabilities in cloud applications”, Information Assurance and Cyber Security (CIACS), 2014 IEEE Conference on 2014.

6)	Chang Liu ; Fac. of Eng. & IT, Univ. of Tech., Sydney, NSW, Australia and  more authors “Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates Parallel and Distributed Systems”, IEEE Transactions on  cloud computing - 2014.

7)	Hussain, M. ; Dept. of Interdiscipl. Studies, Zayed Univ. Dubai, “Effective Third Party Auditing in Cloud Computing”, Advanced Information Networking and Applications Workshops (WAINA), 28th International Conference on  13-16 May 2014.

8)	Vikas Saxena, et al “Implementation of a secure genome sequence search platform on public cloud-leveraging open source solutions”, Journal of Cloud Computing: Advances, Systems and Applications 2014.
:10.22362/ijcert/2017/v4/i2/xxxx
DOI Link : Not yet assigned
Download :
  V4I202.pdf
Refbacks : There are currently no refbacks
Survey on Different Applications of Image Processing
Authors : Ajin P Thomas, Sruthi P.S, Jerry Rachel Jacob ,Vandana V Nair, Reeba R
Affiliations : Sree Buddha College Of Engineering, Alappuzha ,India
Abstract :

af

In Imaging Science, Image processing is processing of images using mathematical operations by using any form of signal processing for which the input is an image, a series of images, or a video, such as a photograph or video frame; the output of image processing may be either an image or a set of characteristics or parameters related to the image. These image processing techniques can be used to perform applications in real-world. This image processing technique helps to improve various aspects related in the real- world. Some of these applications are in the field of health science, security assurance and augmented reality and also this can be applied in real-time applications. All these applications are performed by using image processing as its basic platform.
Citation :

af

Ajin P Thomas et.al, “Survey on Different Applications of Image Processing”, International Journal Of Computer Engineering In Research Trends, 4(1):13-19, February-2017.
Keywords : Image Processing
References :

af

[1] Dalton, John, ―Extraordinary Facts Relating to the Vision of Colour‖, London: Cadel and Davins,. 1798, pp. 28–45. 
[2] G. M. Machodo, ―A Physiologically-based Model for Simulation of Color Vision Deficiency‖ IEEE Transaction on Visual and Computer Graphics Vol. 15. No 6. 2009, pp. 1291-1298 
 [3] G. M. Machodo, Manuel. M. Oliveira.―A Model for Simulation of Color Vision Deficiency and A Color Contrast Enhancement Technique for Dichromats‖, pp. 74, 2010
[4] V.Kanhangad, A.Kumar,and D.Zhang, "Contactless and pose invariant biometric identification using hand surface,"IEEE Trans, Image Process,, vol. 6, no. 3, pp. 1415-1424, May 2011
[5] The Hong Kong Polytechnic University (2015), Implementation Codes for 3D Palmprint Matching.
[6] W.L Li, L. Zhang, and D. Zhang, "Three dimensional palmprint recognition,"in Proc, IEEE Int.Conf.Syst., Main Cybern..,  Oct 2009, pp. 4847-4852.
[7] P. Rajavel, “Image Dependent Brightness Preserving Histogram Equalization”, IEEE Transactions on Consumer Electronics, Vol. 56, No. 2, May 2010
[8]. Yeong-Taeg Kim, “Contrast enhancement using brightness preserving bi-histogram equalization,” IEEE Transactions on Consumer Electronics, vol. 43, no. 1, pp. 1-8, Feb. 1997.
[9]. Soong-Der Chen and Abd. Rahman Ramli, “Contrast enhancement using recursive mean-separate histogram equalization for scalable brightness preservation,” IEEE Transactions on Consumer Electronics, vol. 49, no. 4, pp. 1301- 1309, Nov. 2003.
[10] Ronald Azuma, Yohan Baillot, Reinhold Behringer, "Recent Advances in Augmented Reality" , Computers & Graphics, November 2001.
 [11] Avery, B., Thomas, B., and Piekarski, W, "User Evaluation of See-Through Vision for Mobile Outdoor Augmented Reality.", In 7th Int'l Symposium on Mixed and Augmented Reality. pp 69-72. Cambridge, UK. Sep 2008. 
[12] Feng Zhou ; Duh,H.B.-L. ; Billinghurst, M. "Trends in augmented reality tracking, interaction and display" A review of ten years of ISMAR  Mixed and Augmented  Reality 2008. ISMAR 2008. 7th IEEE/ACM International. 
:10.22362/ijcert/2017/v4/i2/xxxx
DOI Link : Not yet assigned
Download :
  V4I201.pdf
Refbacks : There are currently no refbacks

 

Optimized control of Induction Heating System
Authors : Mrs. Asawari Dudwadkar , Dr. (Mrs.) Sayle Gha,
Affiliations : JJT University, Rajasthan, Asst. Prof., VESIT,Mumbai, India
Abstract :

af

In this paper a simple power and frequency control scheme is proposed for high power/high frequency Induction heating for Typical Heavy Industrial Applications like Induction Welding & Annealing which require operating on 100 kW / 100 kHz. The Proposed PI controller controls the load parameter values of R and L and thereby controls the resonance frequency of the whole model. The control scheme has the advantages of not only wide power regulation range but also ease of control output power. Also, it can achieve the stable and efficient Zero-Voltage-Switching in whole load range. The proposed method is described in detail and its validity is verified through simulink model. The model achieves proper power control for load ranging from 80 kW to 100kw.
Citation :

af

Mrs. Asawari Dudwadkar , Dr. (Mrs.) Sayle Gharge, “Optimized control of Induction Heating System”, International Journal Of Computer Engineering In Research Trends, 4(1):67-71, January-2017. [InnoSpace-2017:Special Edition]
Keywords : Induction heating, power control, PI controller
References :

af

[1] N. Mohan, T.M.Undeland, W.P.Robbins, “Power Electronic-Converters, Applications and Design", Second edition, John Wiley & Sons Inc., 1995.

[2]   O. Lucía, O. Jiménez, L. A. Barragán, I. Urriza, J. M
Burdío and D. Navarro, "System-on-programmable-           chip-based versatile modulation architecture applied to domestic induction heating," Industrial electronics, 2009. IECON '09. 35th Annual Conference of IEEE, Porto, 2009, pp. 2880-2885

[3] N. S. Bayindir, O. Kukrer and M. Yakup, "DSP-based PLL-controlled 50-100 kHz 20 kW high-frequency induction heating system for surface hardening and  welding applications," in IEE Proceedings – Electric Power Applications, vol. 150, no. 3, pp. 365-371,May 2003.

[4] J. Martis and P. Vorel, "Apparatus for induction heating 2.5 kW using a series resonant circuit," Mechatronics - Mechatronika (ME), 2014 16th International Conference on, Brno, 2014, pp. 130-135.

[5] T. Mishima, C. Takami and M. Nakaoka, "A New          Current Phasor-Controlled ZVS Twin Half-Bridge High-Frequency Resonant Inverter for Induction  Heating," in IEEE Transactions on Industrial Electronics, vol. 61, no. 5, pp. 2531-2545,May2014.

[6]   A. Amrhein and J. S. J. Lai, "A transformer-coupled,          Series-resonant topology for the induction heating of          aluminum cookware," 2015 9th International          Conference on Power Electronics and ECCE Asia          (ICPE-ECCE Asia), Seoul, 2015, pp. 1234-1239.

[7]   B. Saha and R. Y. Kim, "High Power Density Series          Resonant Inverter Using an Auxiliary Switched           Capacitor Cell for Induction Heating Applications,” In IEEE Transactions on Power Electronics, vol. 29   No. 4, pp. 1909-1918,April2014.

 [8] V. Esteveet al., "Improving the Reliability of             Series Resonant Inverters for Induction Heating             Applications," in IEEE Transactions on Industrial             Electronics, vol. 61, no. 5, pp. 2564-2572, May 2014. 
:-NA-
DOI Link : NA
Download :
  20170122.pdf
Refbacks : There are currently no refbacks
Bike Rider’s Safety Measures Using Helmet as a Key
Authors : Sanjeev Sahu, Lokesh Yadav, K Diwakar, Vibhor William
Affiliations : Mechatronics Engineering Department Chhatrapati Shivaji Institute of Technology Durg-491001, Chhattisgarh, India
Abstract :

af

Background/Objectives: The basic idea of the project is to make the helmet so smart that without wearing it the driver won’t be able to start the bike, so that it can ensure the safety of the riders. The main purpose of the project is to encourage wearing helmet. Method: The system design will be such that without wearing the helmet the rider cannot start two wheelers. The helmet will be connected to vehicle key ignition systems which will be electronically controlled. The smart helmet will be having micro switches fitted inside it, which will act as our switch for on/off ignition. It consist of a RF transmitter and an RF receiver system, the bike will not get started without wearing helmet by the driver, as the rider wear helmet an RF signals radiate from the transmitter and once these RF signals get sensed by the receiver placed in the ignition switch on the bike, bike will get started. Findings: People prefer motorcycles over the car as it is much cheaper to run, easier to repair, easier to park and flexible in traffic. In India more than 37 million people are using two wheelers. Since usage is high accident percentage of two wheelers are also high compared to four wheelers. Motorcycles have a higher rate of fatal accidents than trucks and buses. According to Ministry of Road Transport and Highways, Government of India there are around 1,44,391 bike accidents occurred in 2015 due to which 1,35,343 were injured and 36,803 were killed. Fatal injuries to the brain are an important reason behind deaths due to the road accidents. Therefore, a person riding a two wheeler must wear a helmet in order to protect his skull. Studies show that usage of helmet can save accident death by 30 to 40 percent. The risk of death is 2.5 times more among riders not wearing a helmet compared with those wearing a helmet. Riders wearing a helmet have a greater probability of survival during an accident. This project aims for accident avoidance, safety and security of bike riders. Applications: This can be used to minimize the accidents and casualties during riding can be used in broadcasting a message among the youth about the road safety and also a number of cases of violating traffic rules can be reduced.
Citation :

af

Sanjeev Sahu, Lokesh Yadav, K Diwakar, Vibhor William, “Bike Rider’s Safety Measures Using Helmet as a Key”, International Journal Of Computer Engineering In Research Trends, 4(1):61-66, January-2017. [InnoSpace-2017:Special Edition]
Keywords : Smart Helmet, RF Module, Encoder/Decoder IC, Bike Authentication, Micro Switches, Keyless Bike, Relay Operation, Motor Driver IC, Bike Theft Prevention.
References :

af

1.	Annual Report on ‘Road Accidents in India – 2015’, Transport Research Wing, Ministry of Road Transport and Highways, Government of India, New Delhi.

2.	Status Report on ‘Road Safety in India – 2015’, Transportation Research & Injury Prevention Programme (TRIPP), Indian Institute of Technology, New Delhi.

3.	Nitin Agarwal, Anshul Kumar Singh, Pushpendra Pratap Singh, Rajesh Sahani, Smart Helmet, International Journal of Engg. & Technology (IRJET) Vol. 2 Issue 2 ISSN (Online): 2395‐0056 (Print): 2395-0072 (May 2015).

4.	Manjesh N, Prof. 	Sudarshan Raju C H, Safety measures for two wheelers by Smart Helmet, International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 National Conference on Developments, Advances & Trends in Engineering Sciences (NCDATES), 09th & 10th January 2015.

5.	Amitava Das, Priti Das, Soumitra Goswami, Smart Helmet For Indian Bike Riders, Eleventh IRF International Conference, ISBN: 978-93-84209-47-6, 17th August 2014, Chennai, India.

6.	Ravi Nandu and Kuldeep Singh, Smart Helmet For Two-Wheelers, Advances in Automobile Engineering, ISSN: 2167-7670, Vol. 3 Issue 2, Department of Automobile Engineering, SRM University, Kattankulathur, Chennai, India.

7.	Manasi Penta, Monali Jadhav and Priyanka Girme, Bike Rider’s Safety Using Helmet, International Journal of Electrical Electronic Engineering and Telecommunications (IJEETC) ISSN: 2319-2518, Vol. 4, No. 2, Department of Electronics and Telecommunication, Dr. D Y Patil Technical Campus, Charoli (BK), Pune, India. 
:-NA-
DOI Link : NA
Download :
  20170114.pdf
Refbacks : There are currently no refbacks
Link quality based Ant based Routing Algorithm (LARA) in MANETs
Authors : C.V.Anchugam, Dr.K.Thangadurai,
Affiliations : Link quality based Ant based Routing Algorithm (LARA) in MANETs
Abstract :

af

Recently a new method is developed to handle the problem of routing in ad hoc network and overcomes the shortcomings of the classical methods; these methods are based on swarm intelligence inspired from biological swarms, such as ants in order to solve some complex problems such as finding food or optimizing route to food in real insect swarms. One of the most known routing algorithms for MANETs, as described Ant based Routing Algorithm (ARA) suffers from some limitations within the pheromone computing since it has not taken the necessary consideration to the characteristics of MANETs such as mobility and the medium constraint. Therefore, in our proposed enhancement to ARA called Link quality based ARA (LARA), it can be included the link quality in route selection and probability computing which have considerably improved the network performance and the system lifetime.
Citation :

af

C.V.Anchugam, Dr.K.Thangadurai, “Link quality based Ant based Routing Algorithm (LARA) in MANETs”, International Journal Of Computer Engineering In Research Trends, 4(1):52-60, January-2017. [InnoSpace-2017:Special Edition]
Keywords : MANETs, LARA, Routing, Link quality, Swarm Intelligence, Cross-layer.
References :

af

[1].	Al Agha K., Pujolle G., Vivier G., “Reseaux de mobiles et reseaux sans fil“, 2nd edition, Eyrolles, 2005. 
[2].	Basagni S., Chlamtac I., Syrotiuk V. R., Woodward B. A., “A Distance Routing Effect Algorithm for Mobility (DREAM)”, In Proceedings ACM/IEEE Mobicom, pages 76-84, October 1998.   
[3].	Camp, T., Boleng, J., Williams, B., Wilcox, L., Navidi, W.,  “Performance comparison of two location based routing protocols for ad hoc networks”, INFOCOM 2002, Twenty-First Annual joint conference of the IEEE Computer and Communications Societies, Proceedings, IEEE, Volume. 3, 2002,  pp. 1678 –168. 
[4].	Clausen T., Jacquet P., Viennot L., “Comparative Study of Routing Protocols for Mobile Ad hoc Networks”, Med-Hoc-Net’02, Sardegna, Italy, September 2002. 

[5].	Daniel Camara, Antonio Alfredo F. Loureiro, “A Novel Routing Algorithm for Hoc Networks”, Baltzer Journal of Telecommunications Systems, 18:1-3, Kluwer Academic Publishers, 2001, pp. 85-100.    
[6].	DiCaro G., Dorigo M., “Ant Colonies for Adaptive Routing in Packet-Switched Communications Networks”, Proceedings PPSN V - Fifth International Conference on Parallel Problem Solving from Nature, Amsterdam, Holland, September 27-30, 1998, pp. 673-682.    
[7].	Gerharz M.L, De Waal C., Frank M., Martini P., “Link Stability in Mobile Wireless Ad Hoc Networks”, Proceedings of the 27th Annual IEEE Conference on Local Computer Networks (LCN), Tampa, Florida, November 2002.  
[8].	Gunes M., Sorges U., Bouazisi I., “ARA - the Ant Colony Based routing Algorithm for MANETs”, Proceedings ICPP Workshop on Ad hoc Networks, Vancouver, Canada, 2002, pp. 7985.  
[9].	Heusse M., Snyers D., Guérin S., Kuntz P., "Adaptive agent-driven routing and load balancing in communication network", Proceedings ANTS'98,First International Workshop on Ant Colony Optimization, Brussels, Belgium, October 15-16, 1998.   
[10].	Iwata A., Chiang C.-C., Pei G., Gerla M., Chen T.-W., "Scalable Routing Strategies for Ad Hoc Wireless Networks", IEEE Journal on Selected Areas in Communications, Special Issue on Ad-Hoc Networks, Aug. 1999, pp.1369-1379.   
[11].	Jacquet, Paul Muhlethaler, Amir Qayyum, Anis Laouiti, Laurent Viennot, Thomas Clausen, “Optimized Link State Routing Protocol”, Internet Draft, draft-ietf-manet-olsr-04.txt, work in progress, June 2001.   
[12].	Jagannathan Sarangapani, “Wireless Ad Hoc and Sensor Networks Protocols”, Performance, and Control”, Taylor & Francis Group, LLC, 2007. 
[13].	Jiang M., Li J., Tay Y. C., “Cluster Based Routing Protocol (CBRP)”, Functional Specification Internet Draft, draft-ietf-manet-cbrp.txt, work in progress, June 1999. 
[14].	Jinyang Li, John Janotti, Douglas S. J. De Coutu, David R. Karger, Robert Morris. “A Scalable Location Service for Geographic Ad Hoc Routing”, M.I.T. Laboratory for Computer Science.   
[15].	Johnson D., Maltz D., Y-C. Hu, Jetcheva J., “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks”, Internet Draft, draft-ietf-manet-dsr-09.txt, work in progress, April 2003. 
[16].	Ko Y.-B., V. N. H. “Location-Aided Routing in mobile Ad hoc networks”, In Proceeding ACM/IEEE Mobicom, October 1998, pp. 66-75. 
[17].	Mesut Gunes et. al, “ARA - the ant-colony based routing algorithm for MANETs”, In Stephan Olariu, Proceedings of the 2002 ICPP Workshop on Ad Hoc Networks (IWAHN 2002), IEEE Computer Society Press, August 2002, pp. 79-85. 
[18].	Navid Nikaein, Christian Bonnet, Neda Nikaein. “Hybrid Ad Hoc Routing Protocol – HARP”, proceeding of IST 2001: International Symposium on Telecommunications.  
[19].	Park V., Corson S., ”TORA (Temporally-Ordered Routing Algorithm routing protocol)”,  Internet Draft, draft-IETF-MANET-TORA-spec- 03.txt, work in progress, June 2001. 
[20].	Perkins C., Royer E., Das S., “Ad hoc On-demand Distance Vector (AODV) Routing”, Internet Draft, draft-ietf-manet-aodv-11.txt, work in progress, Aug 2002. 
[21].	Perkins C. E., Bhagwat P., “Highly Dynamic Destination-Sequenced Distance Vector (DSDV) for Mobile Computers”, Proceedings of the SIGCOMM 1994 Conference on Communications Architectures, Protocols and Applications, Aug 1994, pp 234-244.  
[22].	Siva Ram Nurthy C.,  Manoj B.S., “Ad hoc wireless networks Architectures and Protocols”, le Prentice Hall, 2004. 
[23].	Sridhar K. N., Lillykutty J., Rajeev S., “Performance Evaluation and Enhancement of Link Stability Based Routing for MANETs”, lst International Workshop on Mobile and Wireless Networking (MWN 2004), Montreal, Quebec, Canada, August 15, 2004.    
[24].	Tsu-Wei Chen, Mario Gerla, "Global State Routing: A New Routing Scheme for Ad hoc Wireless Networks", Proceedings IEEE ICC'98.   
[25].	White T., "Swarm intelligence and problem solving in telecommunications", Canadian Artificial Intelligence Magazine, Spring, 1997.    
[26].	White T., "Routing with swarm intelligence", Technical Report SCE-97-15, Systems and Computer Engineering Department, Carleton University, September, 1997.    
[27].	Zygmunt J. Haas, Marc R. Pearlman, Prince Samar, “The Bordercast Resolution Protocol (BRP)”, Internet Draft, draft- ietf-manet-zone-zrp-04.txt, work in progress, July 2002. 
:-NA-
DOI Link : NA
Download :
  20170108.pdf
Refbacks : There are currently no refbacks
A Comparative Study of Discovering Frequent Subgraphs – Approaches and Techniques
Authors : B.Senthilkumaran, Dr.K.Thangadurai,
Affiliations : P.G. and Research,Department of Computer Science, Government Arts College (Autonomous), Karur-05.
Abstract :

af

Graph mining is an important research vertical and recently the usage of graphs has become increasingly imperative in modeling problematic complex structures such as electrical circuits, chemical compounds, protein structures, bioinformatics, social networks, workflow diagrams, and XML documents. Plethora of graph mining algorithms has been developed and the primary objective of this paper is to present a detailed survey regarding the approaches and techniques employed to find the issues and complexities involved.
Citation :

af

B.Senthilkumaran, Dr.K.Thangadurai, “A Comparative Study of Discovering Frequent Subgraphs – Approaches and Techniques”, International Journal Of Computer Engineering In Research Trends, 4(1):41-45, January-2017. [InnoSpace-2017:Special Edition]
Keywords : Graph, Mining, complex structure, techniques, modelling
References :

af

1] Chen, M.S., Han,J.and Yu,P.S. 1996 Data mining – An overview from database perspective, IEEE Transaction on knowledge and data engineering 8 , 866-883
[2] Alm, E. and Arkin, A.P. 2003. Biological Networks, Current Opinion in Structural Biology 13(2), 193– 202.
[3] Nijssen, S. and Kok, J., Faster association rules for multiple relations. In IJCAI’01:  Seventeenth International Joint Conference on Artificial Intelligence, 2001, vol. 2, pp. 891–896.
[4] Chuntao Jiang, Frans Coenen and Michele Zito, A Survey of Frequent Sub-graph Mining Algorithms:The Knowledge Engineering Review, Vol. 00:0, 1–31.c 2004.
[5] A. Inokuchi, T.Washio, and H. Motoda. An apriori-based algorithm for mining frequent substructures from graph data. In PKDD’00.
[6] J. Huan, W.Wang, and J. Prins. Efficient mining of frequent subgraph in the presence of isomorphism. UNC computer science technique report TR03-021, 2003.  
[7] J. Huan, W. Wang, J. Prins, and J. Yang. Spin: Mining maximal frequent sub-graphs from graph databases. UNC Technical Report TR04-018, 2004.  
[8] M. Kuramochi and G. Karypis. Grew-a scalable frequent subgraph discovery algorithm. In ICDM, pages 439–442,2004.
[9] ZhaonianZou, Jianzhong Li, Hong Gao, and Shuo Zhang : Frequent Subgraph Patterns from Uncertain Graph Data. IEEE Transactions On Knowledge And Data Engineering, Vol. 22, No. 9, September 2010.
[10] L. T. Thomas, S. R. Valluri, and K. Karlapalem. Margin:Maximal frequent subgraph mining. Proc. 6th IEEE Int’l Conf. Data mining (ICDM ’06), pp. 1097-1101, 2006.
[11] Inokuchi, A., Washio, T., Nishimura, K. and Motoda, H. 2002. A Fast Algorithm for Mining Frequent Connected Subgraphs, Technical Report RT0448, IBM Research, Tokyo Research Laboratory, Japan.
[12] Huan, J., Wang, W. and Prins, J. 2003. Efficient Mining of Frequent Subgraph in the Presence of Isomorphism, In Proceedings of the 2003 International Conference on Data Mining, 549-552.

:-NA-
DOI Link : NA
Download :
  20170109.pdf
Refbacks : There are currently no refbacks
Detection and area calculation of brain tumour from MRI images using MATLAB
Authors : Suman Das, Nashra Nazim Siddiqui, Nehal Kriti and Surya Prakash Tamang
Affiliations : Sikkim Manipal Institute of Technology, Sikkim-737132, India
Abstract :

af

The main objective of our task is to recognize a tumour and its quantifications from a particular MRI scan of a brain image using digital image processing techniques. The motivation of our work is to provide an efficient algorithm for detecting the brain tumour and calculating its growth. This research describes the proposed strategy to detect & extraction of brain tumour from patient’s MRI scan images of the brain. This method incorporates with some noise removal functions, segmentation and morphological operations which are the basic concepts of image processing. Detection and extraction of tumour from MRI scan images of the brain is done by using MATLAB software.
Citation :

af

Suman Das, Nashra Nazim Siddiqui, Nehal Kriti, Surya Prakash Tamang, “Detection and area calculation of brain tumour from MRI images using MATLAB”, International Journal Of Computer Engineering In Research Trends, 4(1):37-40, January-2017. [InnoSpace-2017:Special Edition]
Keywords : MRI, Brain Tumour, digital image processing, segmentation, morphology, MATLAB.
References :

af

[1]	 Dou, W., Ruan, S., Chen, Y., Bloyet, D., and Constans, J. M. (2007), “A framework of fuzzy information fusion for segmentation of brain tumor tissues on MR images”, Image and Vision Computing, 25:164–171. 
[2]	 T.Logeswari and M.Karnan, “An Improved Implementation of Brain Tumor Detection Using Segmentation Based on Hierarchical Self Organizing Map”, International Journal of Computer Theory and Engineering, Vol. 2, No. 4, August, 2010,pp.1793-8201. 
[3]	 R. Rajeswari and P. Anandhakumar, “Segmentation and Identification of Brain Tumor MRI Image with Radix4 FFT Techniques”, European Journal of Scientific Research, Vol.52 No.1 (2011), pp.100-109.
[4]	 S.Murugavalli, V.Rajamani, “A high speed parallel fuzzy c-mean algorithm for brain tumor segmentation”, ”BIME Journal”, Vol no: 06, Issue(1), Dec.,2006.
[5]	 Oelze, M.L,Zachary, J.F. , O'Brien, W.D., Jr., Differentiation of tumor types in vivo by scatterer property estimates and parametric images using ultrasound backscatter , on page(s) :1014 - 1017 Vol.1, 5-8 Oct. 2003. 
[6]	 T. Logeswari and M. Karnan, An improved implementation of brain tumor detection using segmentation based on soft computing, Second International Conference on Communication Software and Networks, 2010. ICCSN‟10.Page(s): 147-151. 
[7]	Devos, A, Lukas, L.,Does the combination of magnetic resonance imaging and spectroscopic imaging improve the classification of brain tumours?? On Page(s): 407 – 410, Engineering in Medicine and Biology Society, 2004. IEMBS '04. 26th Annual International Conference of the IEEE, 1-5 Sept. 2004.
[8]	Mohammad Shajib Khadem, “MRI Brain image segmentation using graph cuts”, Master of Science Thesis in Communication Engineering, Department of Signals and Systems, Chalmers University Of Technology, Goteborg, Sweden, 2010. 

:-NA-
DOI Link : NA
Download :
  20170111.pdf
Refbacks : There are currently no refbacks
Design of a System to Import Common Information of an Applicant from a Centralized Database While Filling Online Recruitment Application Form
Authors : Govind Prasad Arya, Devendra Prasad,
Affiliations : Uttarakhand Technical University, Dehradun, Assistant Professor in Computer Science & Engineering Department, Shivalik College of Engineering, Dehradun, India
Abstract :

af

In the past recruitment application forms were filled on papers by the candidates and then the filled forms were sent to the recruitment organization through postal services. But in current scenario most of the recruitment organizations are providing the facility of filling application forms online to the candidates. The candidate fills various application forms on regular basis due to higher degree of unemployment. It takes quite long to fill an application form as so many information like name, father’s name, mother’s name, date of birth, gender, addresses, qualification details, work experience has to be filled by candidate every time while filling the application forms of each recruitment organization. Sometimes the candidate has to fill the same information multiple times due to improper internet connectivity. It is also difficult to fill an application form using mobile because of the complex application interface. The applicants who have good computer knowledge may be comfortable with the filling of such complex forms online but it is very tedious task for a candidate having little knowledge of computer. In this research paper we propose a system that will import the common information of an applicant from a centralized database while filling recruitment application forms of various organizations. It will minimize the overheads of filling online application form. The applicants will be able to fill application form by a single click on import button available on the GUI interface of an online application form. The applicants who have basic knowledge of computer system will also be able to fill their recruitment application forms using proposed system. Methods/Statistical analysis: We feel the problem personally while filling online recruitment application forms. Every time the candidates have to fill the same set of information which is time consuming. Findings: The common information of the candidates can be stored in a centralized database from which the candidate can import his/her data while filling online application forms. Improvements/Applications: We have proposed a system for filling of common information of candidates in online application form using a centralized database which contains common information of candidates. Using the system we can save our time by importing of common information from the centralized database
Citation :

af

Govind Prasad Arya, Devendra Prasad, “Design of a System to Import Common Information of an Applicant from a Centralized Database While Filling Online Recruitment Application Form ”, International Journal Of Computer Engineering In Research Trends, 4(1):30-32, January-2017. [InnoSpace-2017:Special Edition]
Keywords : Online Services, IT Professionals, Software Engineering, Online Application Form, Import Information, Centralized Database, Online Application form from centralized database.
References :

af

-NA-
:-NA-
DOI Link : NA
Download :
  20170103.pdf
Refbacks : There are currently no refbacks
Felicitation of cloths for poor & needy people of villages in India
Authors : Govind Prasad Arya, Deepa Arya, Devendra Prasad
Affiliations : Uttarakhand Technical University, Dehradun, Assistant Professor in Computer Science & Engineering Department, Shivalik College of Engineering, Dehradun, India
Abstract :

af

The food, cloths & houses are the basic needs of pupils. There are a number of people in the world were those living below poverty lines. They have not proper food to eat, clothes to cover their bodies and homes to live. The government is felicitating the poor and needy peoples in a number of ways. Indian government provides different types of RASHAN CARDS to the Indian families on the basis of various annual incomes i.e BPL, APL, KhadyaSuraksha cards to avail them basic foods. There are so many schemes to provide economic help to construct their homes like Indira AawasYogana. Besides these there are various schemes to provide employments to the poor people for their survival. In this research paper, we proposed a scheme/system that felicitates the need of cloth, shoes to the poor & needy peoples of any age of uttarakhand in initial stage & for the other states in further stages. Using the proposed system we collect unused/old cloth, shoes from capable (rich) peoples as a donation and after processing (tailoring, washing & packaging) distribute them to the needy peoples on a regular basis. The system will specially concentrate on children, woman of villages & be free from caste, region, religion. Methods/Statistical analysis: We collect the data from the villages of uttarakhand. A lot of poor people are not capable to buy sufficient cloths for them or for their children. We find the same situation in the rural area of Uttar Pradesh (U.P) also. Findings: Although the government is facilitating food, houses to the poor & needy peoples still there is a need of cloths to the poor peoples of the India, especially in the rural area. The proposed scheme will contribute to the betterment of society. Improvements/Applications: We have proposed a scheme for felicitation of cloth. The model is shown in below mentioned figure.
Citation :

af

Govind Prasad Arya, Deepa Arya, Devendra Prasad, “Felicitation of cloths for poor & needy people of villages in India”, International Journal Of Computer Engineering In Research Trends, 4(1):33-36, January-2017. [InnoSpace-2017:Special Edition]
Keywords : Felicitation of cloth, Poor & needy people, Problems in rural areas, Donation of cloth, Help for poor children, Social work.
References :

af

[1]https://en.wikipedia.org/wiki/List_of_government_schemes_in_India, Wikipedia Portal.
[2]http://india.gov.in/my-government/schemes, A government of India Portal.
[3]http://blogs.reuters.com/india/2013/07/23/a-look-at-some-of-indias-cheap-food-schemes/
byAdityaKalra, July, 2013.
:-NA-
DOI Link : NA
Download :
  20170102.pdf
Refbacks : There are currently no refbacks
New Method for Automatic Detection of Brain Tumor in Multimodal Brain Magnetic Resonance Images
Authors : Bhima K, Jagan A,
Affiliations : BVRIT Narsapur, Telangana, India.
Abstract :

af

Brain tumor is a one of the severe life altering disease and analysis of brain imaging is a most important task of visualizing the brain inner anatomical structures, analyzing brain tumor and surgical planning. Magnetic Resonance Imaging is used to diagnose a variety of diseases in the brain and it is found to be much superior to other techniques especially for brain tissues. The main advantage is that the soft tissue differentiation is extremely high for MRI. Image processing plays vital role in medical image analysis and Image segmentation is a most conman technique for analysis of MR imaging in many clinical applications. The parallel segmentation methods and techniques are expressed for the automatic detection of tumor in multimodal brain MR Image by existing state-of-art methods. However the specific results are not being projected and established in the similar researches. Hence, this proposed work tackles about automatic segmentation and detection of tumor in multimodal brain MR images. The main aim of the proposed work to achieve high segmentation accuracy and detection of tumor in the multimodal brain MR images and it was demonstrated in multimodal brain MR Images, viz. FLAIR MRI, T1 MRI, MRI and T2 MRI. The relative performance of the Proposed Method is demonstrated over existing methods using real brain MRI and open brain MRI data sets.
Citation :

af

Bhima K, Jagan A, “New Method for Automatic Detection of Brain Tumor in Multimodal Brain Magnetic Resonance Images ”, International Journal Of Computer Engineering In Research Trends, 4(1):26-29, January-2017. [InnoSpace-2017:Special Edition]
Keywords : Brain Tumor, Watershed Method, FCMC method, Proposed Method, Bilateral Filter, Brain MR Image.
References :

af

1)	N Van . Porz, "Multi-modalodal glioblastoma segmentation: Man versus machine", PLOS ONE, vol. 9, pp. e96873, 2014.
2)	S. Bauer, R. Wiest, L.-P. Nolte and M. Reyes, "A survey of MRI-based medical image analysis for brain tumor studies", Phys. Med. Biol., vol. 58, no. 13, pp. R97-R129, 2013.
3)	L. Weizman, "Automatic segmentation, internal classification, and follow-up of optic pathway gliomas in MRI", Med. Image Anal., vol. 16, no. 1, pp. 177-188, 2012.
4)	S. Ahmed, K. M. Iftekharuddin and A. Vossough, "Efficacy of texture, shape, and intensity feature fusion for posterior-fossa tumor segmentation in MRI", IEEE Trans. Inf. Technol. Biomed., vol. 15, no. 2, pp. 206-213, 2011.
5)	Jin Liu, Min Li, Jianxin Wang, Fangxiang Wu, Tianming Liu, and Yi Pan,A Survey of MRI-Based Brain Tumor Segmentation Methods, TSINGHUA SCIENCE AND TECHNOLOGY, Volume 19, Number 6, December 2014.
6)	J. B. T. M. Roerdink and A. Meijster, “The watershed transform: Definitions, lgorithms and parallelization strategies,” Fundamenta Informaticae,vol. 41, pp. 187–228, 2000.
7)	Gang Li , Improved watershed segmentation with optimal scale based on ordered dither halftone and mutual information, Page(s) 296 - 300, Computer Science and Information Technology (ICCSIT), 2010, 3rd IEEE International Conference, 9-11 July 2011.
8)	Benson. C. C, Deepa V, Lajish V. L and Kumar Rajamani, "Brain Tumor Segmentation from MR Brain Images using Improved Fuzzy c-Means Clustering and Watershed Algorithm",  Intl. Conference on Advances in Computing, Communications and Informatics (ICACCI), Sept. 21-24, 2016, Jaipur, India.
9)	L´aszl´o Szil´agyi,L´aszl´o Lefkovits and Bal´azs Beny´o, "Automatic Brain Tumor Segmentation in Multispectral MRI Volumes Using a Fuzzy c-Means Cascade Algorithm",  12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD),2015.
10)	G.-C. Lin, W.-J. Wang, C.-C. Kang and C.-M. Wang, Multispectral mr images segmentation based on fuzzy knowledge and modified seeded region growing, Magnetic Resonance Imaging, vol. 30, no. 2, pp. 230-246, 2012.
11)	NageswaraReddy P, C.P.V.N.J.Mohan Rao, Ch.Satyanarayana, Optimal Segmentation Framework for Detection of Brain Anomalies, I.J. Engineering and Manufacturing, 2016, 6, 26-37.
:-NA-
DOI Link : NA
Download :
  20170115.pdf
Refbacks : There are currently no refbacks
A Study on Online Chatting and Blogging among Teens Age in Southwest Part of Nigeria and Its Impact: A Digital Dividend
Authors : Oyebola Blessed Olalekan, Ajayi Adeola,
Affiliations : Department of Computer Engineering Technology, Gateway (ICT) Polytechnic Saapade, Nigeria, 2Institute for Entrepreneurship and Development Studies Obafemi Awolowo University, Nigeria
Abstract :

af

The study surveyed the use of the Internet and social networking media as digital dividend among undergraduate students in Nigerian Polytechnic. A total of 700 questionnaires were distributed using a frequency count and percentage to select the respondents. A total of 527 questionnaires was retrieved were used for the survey. The findings revealed a high percentage use Internet and social networking media. The access point for them is mobile phones. The institution, though linked to the Internet is yet to provide access to students. Respondents subscribed for the access time through their pocket money. The use of the Internet among the students has affected the use of the school library because they claimed they got everything they needed to get in the library from the internet. Some problems they face in their use of the Internet include slowness of the server, electricity for charging their mobile phones and payment for the access time. The study recommends that the polytechnic should provide good access points for students and make it available in the library too.
Citation :

af

Oyebola Blessed Olalekan, Ajayi Adeola, “A Study on Online Chatting and Blogging among Teens Age in Southwest Part of Nigeria and Its Impact: A Digital Dividend”, International Journal Of Computer Engineering In Research Trends, 4(1):21-25, January-2017. [InnoSpace-2017:Special Edition]
Keywords : Access, Internet, Networking;, Social, Student, Telecommunication.
References :

af

 [1]  L. A. Ogunsola Hezekiah, (2005) Information and Communication Technologies and the Effects of lobalization: Twenty-First Century "Digital Slavery" for Developing Countries--Myth or Reality? Electronic Journal of Academic and Special Librarianship, v.6 no.1-2 (Summer 2005).
 [2] Social networking service. https://en.wikipedia.org/wiki/Social_networking_service
[3]  Audu C, Internet availability and use by postgraduate students of University of Nigeria, Nsukka, Global Review of Library & Information Science 2: 3443. 2003
[4] Oketunji, L., Computer application to libraries. Compendium of papers. presented at the 39th National Annual Conference and AGM of Nigerian Library Association held at Concord Hotel, Owerri from 17th 22nd June: 812,. 2001.
:-NA-
DOI Link : NA
Download :
  20170106.pdf
Refbacks : There are currently no refbacks
Development of a Sim800l Based Reprogrammable Household Smart Security System with Recipient Phone Call Alert
Authors : Oyebola Blessed Olalekan, ,
Affiliations : Department of Computer Engineering Technology, Gateway (ICT) Polytechnic Saapade, Nigeria
Abstract :

af

Security has become a major issue everywhere. Home security is becoming necessary nowadays as the possibilities of intrusion are increasing day by day. A traditional home security system gives the signals regarding alarm or text alert through GSM. However, this paper proffers, also, a reprogrammable system that puts forward phone call straightway to the recipient anywhere in the world with GSM network coverage SIM800L (GSM Module) with PIC12F1840 Microcontroller and a motion sensor or detector.
Citation :

af

Oyebola Blessed Olalekan, “Development of a Sim800l Based Reprogrammable Household Smart Security System with Recipient Phone Call Alert”, International Journal Of Computer Engineering In Research Trends, 4(1):15-20, January-2017. [InnoSpace-2017:Special Edition]
Keywords : Microcontroller, SMS, Call, Security
References :

af

1.	T.K Hareedran (2015) GSM home security system  with Arduino using GSM technology – An theft system http://www.electroschematics.com
2.	Ahmed, B.I, Yakubu, F.G Bagiwa, M.H and Abdullahi,U.I ( 2011), Remote Home management: An alternative for working cut home while way. World of computer science and information Technology Journal (WCSIT); 14144.147
3.	Jawarkar, N.P, M Ahmed, V Ladhake, S.A and Thakare, R.D (2008). Microcontroller based Remote monitoring using mobile through spoken commands. Journal of networks,3,2,58.63. Retrieved from http:// www. Academic publisher.com/ jnm/vol031/n002/jnw03025863.pdf
4.	Gwenael, L.Bodic (2005). Mobile messaging:SMS, EMS AND MMS
5.	Marie and Albert (1996) invention patent for a closed cicuit television security system.
6.	Sabudin, E.N., Zarina, M., Mohd, M.M., Abd Wahab, H., Johari, A. and Ghani, N.B. (2008). GSM based Notification speed Detection for Monitoring purposes. Proceeding of IEEE International Symposium of Information Technology. 
:-NA-
DOI Link : NA
Download :
  20170105.pdf
Refbacks : There are currently no refbacks
Distant Mission UAV capability with on-path charging to Increase Endurance, On-board Obstacle Avoidance and Route Re-planning facility
Authors : Pandya Garvit Kalpesh , ,
Affiliations : Department of Aeronautical Engg, Veltech Dr. RR & Dr. SR University, Chennai-600 062, India.
Abstract :

af

UAVs (Unmanned Aerial Vehicles), especially Quad copters is facing challenges in their mission due to its lower endurance. As such, the missions having long distances are not achievable through Quad copters. The performance of any vehicle, while testing, is one of the most important factors. This performance is based on range, endurance, altitude, attitude control, VTOL (Vertical Take-Off and Landing), battery life, and other autonomous functionalities. The major problem we are facing in the field of UAVs is battery life. The use of higher mAh battery is not a perfect solution as the weight also increases with the size of the battery and that will then require once level higher mAh battery and this may not end soon. Several different techniques can be applied to eliminate or reduce the above drawback. One can be, in the mission path itself, take the drone down to the ground, change its battery and continue the mission, which is a kind of out of logic things. The other solution which we can find is the use of a charging dock. In this case, no need to follow the vehicle, everything can be automatic with the help of a sensor and communication system. The above solution ends the endurance problem but, if the endurance is higher and mission is longer, it necessary to put on necessary sensors for the safety of the vehicle.
Citation :

af

Pandya Garvit Kalpesh, “Distant Mission UAV capability with on-path charging to Increase Endurance, On-board Obstacle Avoidance and Route Re-planning facility”, International Journal Of Computer Engineering In Research Trends, 4(1):10-14, January-2017. [InnoSpace-2017:Special Edition]
Keywords : UAV, charging facility, endurance, collision avoidance, route re-plan.
References :

af

1.	Skysense Company - Charging Pad Datasheet 201601 
2.	Victor H. L. Cheng: Concept Development of Automatic Guidance for Rotorcraft Obstacle Avoidance. In: IEEE transactions on Robotics and Automation 6(2):252-257, (1990)
3.	George Vachtsevanos, Ben Ludington, Johan Reimann, Panos Antsaklis, Kimon Valavanis: Modeling and Control of Unmanned Aerial Vehicles– Current Status and Future Directions. In: Workshop on Modeling and Control of Complex Systems (MCCS), Ayia Napa, Cyprus, (2005)
4.	Ryan W. Proud, Jeremy J. Hart, Richard B. Mrozinski: Methods for Determining the Level of Autonomy to Design into a Human Spaceflight Vehicle: A Function Specific Approach. In: NASA Johnson Space Center. (2013)
5.	Pulkit Goyal, Ewoud Smeur and Guido de Croon: Mission Planning for Sensor Network Deployment using a Fleet of Drones. In: Delft University of Technology, Delft, Zuid-Holland, 2629 HS, The Netherlands. (2016)
6.	www.erlerobotics.com
7.	Erick Camacho, Marco Robaina, Alessandro Tasca, Pedre Cuberos, Ibrahim Tansel, Sabri Tosungolu: Collision Avoidance Protocol for package Delivering Quadcopters. In: Florida Conference on Recent Advances in Robotics (2015).
8.	https://oscarliang.com/how-to-choose-battery-for-quadcopter-multicopter/
9.	Video – drone wireless charging system (Youtube.com)
10.	Video – World's first home w_ drone charging station (Youtube.com).   
:-NA-
DOI Link : NA
Download :
  20170107.pdf
Refbacks : There are currently no refbacks
A Review on Different Techniques of Solar Food Cooking
Authors : Usha.C.Pawar, S. J. Shankargouda, Dr. Pravin V.Honguntiker, ,
Affiliations : Department of Mechanical Engineering, DattaMeghe College of Engineering, Navi Mumbai, MS, India
Abstract :

af

Energy consumption for cooking is unavoidable, though there is continuously increasing the fuel price as well as scarcity of exhausting fossil fuels. Because cooking is the prime priority of human life all over the world. Cooking contributes a major part in sharing of total primary energy consumption in India. Hence it needs an alternative energy source for this purpose. Solar cookers are the best substitute for, heating, cooking and pasteurizing applications. In this paper a review has been made to study the existing literature in the field of solar cookers with the latent heat storage system using PCM.
Citation :

af

Usha.C.Pawar, S. J. Shankargouda, Dr. Pravin V.Honguntiker, “A Review on Different Techniques of Solar Food Cooking”, International Journal Of Computer Engineering In Research Trends, 4(1):5-9, January-2017. [InnoSpace-2017:Special Edition]
Keywords : Solar Energy, Thermal Energy Store, Phase Change Material.
References :

af

1.	Klemens Schwarzera , Maria Eugenia Vieira da Silva, ―Solar cooking system with or without heat storage for families and institutions, Solar energy 75 2003, 35–41
2.	Kassem, Talal K. and Youssef, M. S. Solar 
Cookers And Its Application For Food cooking In Remote Areas: Review
3.	Sharma, C. R. Chen, V. V. S. Murty, and A. Shukla― Solar cooker with Latent heat storage systems: a review, Renewable and Sustainable Reviews,Vol. 9, pp. 1599-1605, 2009. 
4.	Mohammadreza Sedighi1, Mostafa Zakariapour, ―A Review of Direct and Indirect Solar Cookers, Sustainable Energy, 2014, Vol. 2, No. 2, 44-51,2014.
5.	Lof GOG. Recent investigation in the use of solar energy for cooking. Solar Energy 1963;7:125–33
6.	R.M. Muthusivagami, R. Velraj , R. Sethumadhavan,―Solar cookers with And without thermal storage—A reviews , Renewable and Sustainable Energy Reviews 14, 691–701, 2010  
7.	Domanski R, El-Sebaii AA, Jaworski M. Cooking during off-sunshine hours using PCMs as storage media. Energy 1995;20:607–16
8.	Buddhi D, Sahoo LK. Solar cooker with latent heat storage: design and experimental testing. Energy Conversion and Management 1997;38:493–8 
9.	Sharma, S.D., Buddhi, D., Sawhney, R.L., Sharma, A., 2000. Design development and evaluation of a Latent heat unit for evening cooking in a solar cooker. Energy Conversion and Management 41, 1497– 1508.
10.	Sharma SD, Iwata T, Kitano H, Sagara K. Thermal performance of solar cooker based on an evacuated tube solar collector with a PCM storage unit. Solar Energy 2005;78:416–26
11.	Hussein HMS, El-Ghetany HH, Nada SA. Experimental investigation of novel indirect solar cooker with indoor PCM thermal storage and cooking unit. Energy Conversion and Management 2008; 49:2237– 46.
12.	R.M. Muthusivagami, R. Velraj and R. Sethumadhavan.“Solar cookers with and without thermal storage—A Review”, Renewable and Sustainable Energy Reviews, Vol. 14, pp. 691-701, 2009.
13.	Kedare et al. Solar Cooking through ARUN Solar Boiler and Solar Thermal. Ministry of New & Renewable Energy Government of India. ARUN®100 November 2014.
14.	Rane M V, Rane M M, Meena P M, Shankargouda S J, Bhave D P, Rane A M, Akshay P, 2014, Solar Collector with Absorber Integrated Heat Storage, Patent Application Number-2088-MUM-2014, 2014
15.	Rane M V, Rane M M, Meena P M, Shankargouda S J, Bhave D P, Rane A M, Akshay P, 2015, Solar Collector with Absorber Integrated Heat Storage, PCT Application Number-PCT-IN2015-0000269, PCT Filing Date: 29-06-2015, 2015a
:-NA-
DOI Link : NA
Download :
  20170113.pdf
Refbacks : There are currently no refbacks
Study of the effects of orientation and deformation of Sn on fusion cross sections using proximity potentials
Authors : Nabendu Kumar Deb , ,
Affiliations : Department of Physics, Gauhati University, Guwahati-781014, India
Abstract :

af

Background: The deformed targets and its orientation with collision axis of the projectile and the target in the nuclear fusion reaction influence the fusion cross-section. Statistical Analysis: The effects of static quadrupole and hexadecapole deformation of target are studied using various proximity potentials in the literature. Accordingly, the height and the position of the Coulomb interaction barrier for 18O+118Sn (deformed target) system is studied in this paper. Findings: The nucleus-nucleus potential was found to depend strongly on the deformation parameters as well as the orientation of the deformed target. The fusion cross section of the mentioned system was found out by applying parameters of the various proximity potential on the Wong’s formula. Also the result of a multi dimensional barrier penetration model (BPM) was assessed using CCFULL code. The fusion cross sections of approx 00, Prox 00DP, pro 77, Prox 88, modProx 88, Prox 10 over estimates the results obtained using BPM and the rest of the potentials under-estimates the result obtained using BPM technique.
Citation :

af

Nabendu Kumar Deb, “Study of the effects of orientation and deformation of Sn on fusion cross sections using proximity potentials”, International Journal Of Computer Engineering In Research Trends, 4(1):1-4, January-2017. [InnoSpace-2017:Special Edition]
Keywords : fusion cross-section, effects of deformation, effects of orientation, proximity potentials.
References :

af

1)	M. Dasgupta, D. J. Hinde, N. Rowley, A. M. Stefanini, Annu. Rev. Nucl. Part. Sci. 48, 401 (1998).
2)	P. D. Shildling et al., Physics Letter B 670, 99 (2008).
3)	E. Prasad et al., Physics Review C 81, 054608 (2010).
4)	J. O. Fernandez Niello et al., Physics Review C 43, 2303 (1991).
5)	M. J. Rhoades Brown, V. E. Oberacker, Physics Review Letter 50, 1435 (1983)
6)	I. Dutt, R. K. Puri, Physics Review C 81, 064608 (2010)
7)	I. Dutt, R. K. Puri, Physics Review C 81, 044615 (2010)
8)	I. Dutt, R. K. Puri, Physics Review C 81, 064609 (2010)
9)	C. J. Lin, J. C. Xu, H. Q. Zhang, Z. H. Liu, F. Yang, L.X. Lu, Physics Review C 63, 064606 (2001)
10)	P. Moller et al., Atomic Data and Nuclear Data Tables 59, 185 – 381 (1995)
11)	C. Y. Wong, Physics Review Letter 31, 766 (1973)
12)	N. Takigawa, T. Rumin, N. Ihara, Physics Review C 61, 044607 (2000)
13)	K. Hagino, N. Rowley, A. T. Kruppa, Comp. Physics Comm. 123, 143 (1999).

:-NA-
DOI Link : not applicable
Download :
  20170121.pdf
Refbacks : There are currently no refbacks

 

Dynamic and Public Auditing with Fair Arbitration for Cloud Data
Authors : SAJJA SUNEEL, MANDAVILLI KAVYA ,
Affiliations : Asst.Professor, KG Reddy Engineering College, Hyderabad, Telangana
Abstract :

af

Storage outsourcing turned into a rising trend with the advent of the cloud computing, advancing the secure remote data auditing to be the future research area. Other than this research considers the problem of data dynamics support, public verifiability and dispute arbitration simultaneously. The data dynamics problem in auditing is solved by presenting an index switcher to preserve a mapping between block indices and tag indices and eradicate the passive outcome of block indices in the tag computation without incurring much overhead. We provide fairness guarantee and dispute arbitration in our scheme, which ensures that both the data owner and the cloud cannot misbehave in the auditing process or else it is easy for a third-party arbitrator to find out the cheating party. The framework is reaching out by executing the data dynamically and reasonable discretion on gatherings in the future.
Citation :

af

Sajja Suneel et.al, “Dynamic and Public Auditing with Fair Arbitration for Cloud Data”, International Journal Of Computer Engineering In Research Trends, 4(4):136-141, April-2017.
Keywords : Third Party Auditor (TPA), CSP, Proof Of Retrievability (POR).
References :

af

1. Y. Deswarte, J. J. Quisquater, and A. Saïdane, “Remote integrity checking,” In Integrity and internal control in information systems VI, Springer US, 1-11 (2004).
2. D. L. Gazzoni Filho, and P. S. L. M. Barreto, “Demonstrating data possession and uncheatable data transfer,” IACR Cryptology ePrint Archive 2006, 150 (2006).
3. A. Juels, and B. S. Kaliski Jr, “PORs: Proofs of retrievability for large files,” In Proceedings of the 14th ACM conference on Computer and communications security, Acm, 584-597 (2007).
4. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” In Proceedings of the 14th ACM conference on Computer and communications security, Acm, 598-609 (2007).
5. H. Shacham, and B. Waters, “Compact proofs of retrievability,” In International Conference on the Theory and Application of Cryptology and Information Security, Springer Berlin Heidelberg, 90-107 (2008).
6. Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling public verifiability and data dynamics for storage security in cloud computing,” In European symposium on research in computer security, Springer Berlin Heidelberg, 355-370 (2009).
7. M. A. Shah, R. Swaminathan, and M. Baker, “Privacy-Preserving Audit and Extraction of Digital Contents,” IACR Cryptology EPrint Archive 186 (2008).
8. C. Wang, K. Ren, W. Lou, and J. Li, “Toward publicly auditable secure cloud data storage services,” IEEE network 24, (2010).
9. C. C.  Erway, A. Küpçü, C. Papamanthou, and R. Tamassia, “Dynamic provable data possession,” ACM Transactions on Information and System Security (TISSEC) 17, (2015).
10. Y. Zhu, H. Wang, Z. Hu, G. J. Ahn, H. Hu, and S. S. Yau, “Dynamic audit services for integrity verification of outsourced storages in clouds,” In Proceedings of the 2011 ACM Symposium on Applied Computing, ACM, 1550-1557 (2011).
11. Q. Zheng, and S. Xu, “Fair and dynamic proofs of retrievability,” In Proceedings of the first ACM conference on Data and application security and privacy, ACM, 237-248 (2011).
:NA
DOI Link : NA
Download :
  V4I403.pdf
Refbacks : There are currently no refbacks

 

IoT Based Smart Parking System Using RFID
Authors : Prof.S.S.Thorat, Ashwini M , Akanksha Kelshikar , Sneha Londhe , Mamta Choudhary
Affiliations : Assistant Professor, Information Technology, JSPM’S Jayawantrao Sawant College Of Engineering Hadapsar Pune,411028,India
Abstract :

af

With the exponential increase in the number of vehicles and world population day by day, vehicle availability and usage on the road in recent years, finding a space for parking the bike is becoming more and more difficult with resulting in the number of conflicts such as traffic problems. This is about creating a reliable system that takes over the task of identifying free slots in a parking area and keeping the record of vehicles parked very systematic manner.This project lessens human effort at the parking area to a great extent such as in case of searching of free slots by the driver and calculating the payment for each vehicle using parking area. The various steps involved in this operation are vehicle identification using RFID tags, free slot detection using IR sensors and payment calculation is done on the basis of period of parking and this is done with the help of real time clock.
Citation :

af

Prof.S.S.Thorat et.al, “IoT Based Smart Parking System Using RFID”, International Journal Of Computer Engineering In Research Trends, 4(1):9-12, January-2017.
Keywords : IoT, RFID, IR sensors.
References :

af

1. Thanh Nam Pham1, Ming-Fong Tsai1, Duc Bing Nguyen1, Chyi-Ren Dow1 and Der- Jiunn Deng2. “A Cloud Based Smart-Parking System Based on Internet-of-Things Technologies”. IEEE Access, volume 3,pp. 1581 1591, september 2015.

2. Renuka R. and S. Dhanalakshmi. “Android Based Smart Parking System Using slot Allocation reservations”. ARPN Journal of Engineering and Applied Sciences. VOL. 10, NO. 7, APRIL 2015.

3. ElMouatezbillah Karbab,Djamel Djenouri, Sahar Boulkaboul, Antoine Bagula, CERIST Research Center, Algiers, Algeria University of the Western Cape, Cape town, South Africa ,”Car Park Management with Networked WirelessSensors and Active RFID” ‘,978-1-4799-8802-0/15
©2015 IEEE

4. Harmeet Singh, Chetan Anand, Vinay Kumar, Ankit Sharma, “Automated Parking System With Bluetooth
Access”, International Journal Of Engineering And Computer Science ISSN:2319-7242,Volume 3 Issue 5, May 2014, Page No. 5773-5775

5. ThanhNamPham1,Ming-FongTsai1,Duc Bing Nguyen1, Chyi-Ren Dow1 and Der- Jiunn Deng2. “A Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies”. IEEE Access, volume 3,
pp. 1581 1591, september2015.

6. Renuka R .and S.Dhanalakshmi.“ Android Based Smart Parking System Using slot Allocation reservations”.ARPN Journal of Engineering and Applied Sciences.VOL.10, NO. 7,APRIL2015.
7. SushilPalande, Surekha Gangurde, AkshayPote. “Automatic Pay And Park System”. International Journal
of Scientific and Research Publications, Volume5, Issue5, May

8. GGYU Gunasekara, ADAI Gunasekara and RPS Kathriarachchi General Sir John Kotelawala Defence University, Ratmalana ,SriLanka. “ A Smart Vehicle Parking Management Solution”. Proceedings of 8th International ResearchConference, KDU, Published November2015.

9. Baratam MKumar Gandhi and M.Kameswara Rao. .“A Prototype for IoT based Car Parking Management
System for  martCities”.IndianJournalofScienceandTechnology,Vol9(17),DOI:10.17485/ijst/2016/v9i17/92973,May201

10. Pooja Sanjay Pagar, Tabassum Jalal Khan, P. R. Ghodekar , M. R. Bhadange, V. Salve . “Smart Car Management System Using Raspberry Pi ”.International Journal Of Advanced Research in Engineering Management (IJAREM).

11. Zeyd in Pala , Nihat Inanc. “Utilizing Rfid For Smart Parking Applications”.FactaUniversitatisSeries:Mechanical EngineeringVol.7,No1, 2009, pp. 101118.


12. RakhiKalantri, AnandParekar, Akshay Mohite, Rohan Kankapurkar. “RFID Based Toll Collection System ” Rakhi Kalantri et al,/(IJCSIT)International Journal ofComputer Science and Information Technologies, Vol. 5 (2) , 2014,2582-2585.

13. VishwanathY, AishwaryaDKuchalli, DebarupaRakshit. “Survey paperonSmartParking System based on
Internet of Things”.Information Science, New HorizonCollegeof Engineering, Bengaluru, India.

14. Ahmed Yaseen Mjhool, Ali Abbas Al-Sabbagh, Ruaa A. Saeed Alsabah. “Smart Parking Techniques Based on Internet of things”.Journal of Networks and Telecommunication Systems, Vol.1 (1), 1-10, August, 2015.
:10.22362/ijcert/2017/v4/i1/xxxx
DOI Link : Not yet assigned
Download :
  V4I0103.pdf
Refbacks : There are currently no refbacks
Implementation of Optimization Using Eclat and PSO for Efficient Association Rule Mining
Authors : M.Sathya, Dr.K.Thangadurai,
Affiliations : PG and Research Department of Computer Science, Government Arts College (Autonomous), Karur, India,
Abstract :

af

In this paper, the IEPSO-ARM technique used Eclat algorithm for generating the association rules. With help of Eclat algorithm, IEPSO-ARM technique initially estimates the support value to find the frequent items in the dataset and then determines correlation value to generate the association rules. Finally, the IEPSO-ARM technique designed an Eclat based Particle Swarm Optimization (E-PSO) algorithm for generating the optimized association rule to analyze the frequently buying products by customer in supermarkets and to improve sales growth maintenance of supermarkets. The performance of IEPSO-ARM technique is tested with the metrics such as running time for frequent itemset generation, memory for association rule generation and number of rules generated.
Citation :

af

M.Sathya, Dr.K.Thangadurai, “Implementation of Optimization Using Eclat and PSO for Efficient Association Rule Mining”, International Journal Of Computer Engineering In Research Trends, 4(1):4-8, January-2017.
Keywords : frequent item set, Eclat, PSO, association rule mining, supermarkets
References :

af

[1] Zhi-Hong Deng, Sheng-Long Lv, “Fast mining frequent itemsets using Nodesets”, Expert Systems with Applications, Elsevier, Expert Systems with Applications, Elsevier, Volume 41, Pages 4505–4512, 2014

[2] Zhi-Hong Deng, Sheng-Long Lv, “PrePost+: An efficient N-lists-based algorithm for mining frequent itemsets via Children–Parent Equivalence pruning”, Expert Systems with Applications, Elsevier, Volume 42, Pages 5424–5432, 2015
[3] Meera Narvekara, Shafaque Fatma Syed, “An optimized algorithm for association rule mining using FP tree”, Procedia Computer Science, Elsevier, Volume 45, Pages 101 – 110,  2015 

[4] Anil Vasoya, Dr. Nitin Koli, “Mining of association rules on large database using distributed and parallel computing”, Procedia Computer Science, Elsevier, Volume 79, Pages 221 – 230, 2016 

[5] Ish Nath Jha, Samarjeet Borah, “Efficient Association Rule Mining Using Improved Apriori Algorithm”, International Journal of Scientific & Engineering Research, Volume 3, Issue 11, Pages 1-4, November-2012

[6] Manali Rajeev Raut, Hemlata Dakhore, “An Approach to Mining Association Rules in Horizontally Distributed Databases with Anonymous ID Assignment”, IEEE 2015 Global Conference on Communication Technologies (GCCT), Pages 23-24, April 2015

[7] M. Krishnamurthy, E. Rajalakshmi, R. Baskaran, A. Kannan, “Prediction of customer buying nature from frequent itemsets generation using Quine-McCluskey method”, IET Chennai Fourth International Conference on Sustainable Energy and Intelligent Systems (SEISCON 2013), Pages 12-14, 2013

[8] Jesmin Nahar, Tasadduq Imama, Kevin S. Tickle, Yi-Ping Phoebe Chen, “Association rule mining to detect factors which contribute to heart disease in males and females”, Expert Systems with Applications, Elsevier, Volume 40, Pages 1086–1093, 2013

[9] Bay VO, Frans Coenen, Bac Le, “new method for mining Frequent Weighted Itemsets based on WIT-trees”, Expert Systems with Applications, Elsevier, Expert Systems with Applications, Elsevier, Volume 40, Pages 1256–1264, 2013

[10] D. Magdalene Delighta Angeline, “Association Rule Generation for Student Performance Analysis using Apriori Algorithm”, The SIJ Transactions on Computer Science Engineering & its Applications (CSEA), Volume 1, Issue 1, Pages 12-16, March-April 2013

[11] Dr. S. Vijayarani and Ms. R. Prasannalakshmi, “Comparative Analysis of Association Rule Generation Algorithms in Data Streams”, International Journal on Cybernetics & Informatics (IJCI), Volume 4, Issue 1, Pages 15-25, February 2015  
[12] J.Suresh, P.Rushyanth,Ch.Trinath, “Generating associations rule mining using Apriori and FPGrowth Algorithms”, International Journal of Computer Trends and Technology (IJCTT), volume4, Issue4, Pages 887-892, April 2013 
[13] Ruchi Bhargava, Prof. Shrikant Lade, “Effective Positive Negative Association Rule Mining Using Improved Frequent Pattern”, International Journal of Modern Engineering Research (IJMER), Volume 3, Issue 2, Pages 1256-1262, March-April. 2013 
[14] Sample Dataset for Market Basket Analysis:http://recsyswiki.com/wiki/Grocery_shoppi  
:10.22362/ijcert/2017/v4/i1/xxxx
DOI Link : Not yet assigned
Download :
  V4I0102.pdf
Refbacks : There are currently no refbacks
A Survey on Virtual Classroom System for Online Training
Authors : Maram Adil Ali Alaziz, ,
Affiliations : Osmania University. India
Abstract :

af

Developing a virtual classroom system to promote a more preponderant count of students to splurge into the field of inculcation. It integrates the benefits of a physical classroom with the accommodation of a ‘no-physical-bar’ virtual learning environment, minus the commuting hazards and expenses. It will usher in the immense flexibility and sophistication in the subsisting learning platform structures, with the impeccable coalescence of synchronous and asynchronous interaction. It provides an expedient of collaborative learning for the students.
Citation :

af

Maram Adil Ali Alaziz, “A Survey on Virtual Classroom System for Online Training”, International Journal Of Computer Engineering In Research Trends, 4(1):1-3, January-2017.
Keywords : Head of the Department (H.O.D), Faculties, Students, Shared learning environment.
References :

af

[1] M. Armbrust et al., “Above the clouds: A Berkeley view of cloud computing,” University of California, Berkeley, Tech. Rep., Feb 2009.
[2]L. Siegel, “Let it rise: A special report on corporate IT,” in TheEconomist, Oct. 2008.
[3]  P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield, “Xen and the art of virtualization,” in Proc. of the ACM Symposium on Operating Systems Principles (SOSP’03), Oct. 2003.
[4] “Amazon elastic compute cloud (Amazon EC2),http://aws.amazon.com/ec2/.”
[5] C. Clark, K. Fraser, S. Hand, J. G. Hansen, E. Jul, C. Limpach, I. Pratt, and A. Warfield, “Live Migration of virtual machines,” in Proc. of the Symposium on Networked Systems Design and Implementation (NSDI’05), May 2005.
[6] M. Nelson, B.-H. Lim, and G. Hutchins, “Fast, transparent migration for virtual machines,” in Proc. of the USENIX Annual Technical Conference, 2005.
[7] M. McNett, D. Gupta, A. Vahdat, and G. M. Voelker, “Usher: An extensible framework for managing clusters of virtual machines,” in Proc. of the Large Installation System Administration Conference (LISA’07), Nov. 2007. 
[8] T. Wood, P. Shenoy, A. Venkataramani, and M. Yousif, “Black-box and Gray-box strategies for virtual machine migration,” in Proc. Of the Symposium on Networked Systems Design and Implementation (NSDI’07), Apr. 2007.
[9] C. A. Waldspurger, “Memory Resource Management in VMware ESX Server,” in Proc. of the symposium on Operating systems design and implementation (OSDI’02), Aug. 2002.
[10] G. Chen, H. Wenbo, J. Liu, S. Nath, L. Rigas, L. Xiao, and F. Zhao, “Energy-aware server provisioning and load dispatching for connection-intensive Internet services,” in Proc. of the USENIX Symposium on Networked Systems Design and Implementation (NSDI’08), Apr. 2008.

:10.22362/ijcert/2016/v4/i1/xxxx
DOI Link : Not yet assigned
Download :
  V4I101.pdf
Refbacks : There are currently no Ref backs

 

Cloud Centric loT Based Farmer’s Virtual Market place
Authors : Lalchand G. Titare, Prof. Riya Qureshi,
Affiliations : Department of Computer Science and Engg, BIT, Ballarpur, India
Abstract :

af

Cloud computing is aimed at providing IT as a service to the cloud users on-demand basis with greater flexibility, scalability, reliability and availability with utility computing model. This new ideal model of computing has a tremendous potential in it to be utilized as a part of the agriculture furthermore in rural improvement viewpoint in creating nations like India. The fragmented supply chain and inadequate health, safety and quality mechanisms (means the quantity and quality of fruits and vegetables) often do not meet the demands of high-end or international markets. Moreover, Indian farmers receive less than a fifth of the end price for the fruits and vegetables they produce, while a long line of middlemen, transporters, wholesalers and retailers get the rest. So, the aim behind developing this app is to give India’s huge farming community a fair and consistent price for their produce. Using this android based app “Cloud centric IoT based platform for Farmer’s virtual marketplace”, this paper concentrates on how Cloud Computing idea improves virtualization of supply chains in agribusiness segment which will help some of the farmers to overcome this problem. Using these app farmers can directly connect with the end users and supply the product directly to them. Farmers can get most advance grade cultivating and virtualization of supply chains systems, additionally track and check the entire methodology from production, distribution to consumption
Citation :

af

Lalchand G. Titare, Prof. Riya Qureshi, “Cloud Centric loT Based Farmer’s Virtual Market place”, International Journal Of Computer Engineering In Research Trends, 3(12):654-658,December-2016.
Keywords : Android, Cloud of things, Internet of Things, Virtual Commerce, Agriculture.
References :

af

1)	Reto Meier, “Professional android 4 application        development”. John Wiley & Sons, Inc. 10475 Cross point Boulevard Indianapolis, 2012
2)	K.B.Priya Iyer. Intelligent Path Finder for Goal Directed Queries in Spatial Networks. International Conference on Advances in Mobile Network, Communication and Its Application 2012 
3)	Kerry Taylor, Colin Griffith, David Lamb, Greg Falzon, and Mark Trotter, “Farming the Web of Things”, IEEE INTELLIGENT SYSTEMS Published by the IEEE Computer Society. 
4)	C.N. Verdouw, A.J.M. Beulens, J.G.A.J. van der Vorst, ‘’ Virtualisation of floricultural supply chains: A review from an Internet of Things perspective”, Computers and Electronics in Agriculture 99 ,Elsevier (2013) 160–175 
5)	Acharya, S.S. (2005), “Agriculture marketing and rural credit: Status, Issues and Reform agenda, Area, Production and Yield of Principal Crops in India”, Directorate of Economics and Statistics, Ministry of Agriculture.
6)	Global Positioning System Open Courseware from MIT, 2012
7)	van der Lans, Rick F. (September 7, 2009). The SQL Guide to SQLite (!st ed.)
8)	Newman, Chris (November 9, 2004), SQLite (Developer’s Library)(1st ed.).
9)	G. Suciu et al., “Smart cities built on resilient cloud computing and secure Internet of Things,” in Proc. 19th Int. Conf. Control Syst. Comput. Sci. (CSCS), May 2013, pp. 513–518.
10)	X. Yu, F. Sun, and X. Cheng, “Intelligent urban traffic management system based on cloud computing and Internet of Things,” in Proc. Int. Conf. Comput. Sci. Service Syst. (CSSS), Aug. 2012, pp. 2169–2172. 
11)	Mentzer, John T., William DeWitt, James S. Keebler, Soonhoong Min, Nancy W. Nix, Carlo D. Smith, & Zach G. Zacharia (2001): “Defining Supply Chain Management”, Journal of Business Logistics, Vol. 22, No. 2, pp. 1–25. 
12)	C. Perera, P. Jayaraman, A. Zaslavsky, P. Christen, and D. Georgakopoulos, “Dynamic configuration of sensors using mobile sensor hub in Internet of Things paradigm,” in Proc. IEEE Int. Conf. Intell. Sensors, Sensor Netw. Inf. Process., Apr. 2013, pp. 473–478.
13)	A. E. Al-Fagih, F. M. Al-Turjman, W. M. Alsalih, and H. S. Hassanein, “A priced public sensing framework for heterogeneous IoT architectures,” IEEE Trans. Emerging Topics Comput., vol. 1, no. 1, pp. 133–147, Jun. 2013.
:10.22362/ijcert/2016/v3/i12/xxxx
DOI Link : Not yet assigned
Download :
  V3I1209.pdf
Refbacks : There are currently no refbacks
Employee Rewards and Employee Work Motivation: An Indispensable Linkage
Authors : Dr. H S. ABZAL BASHA, ,
Affiliations : Assistant Professor, Department of Management Studies, G. Pullaiah College of Engineering & Technology, Pasupala (V), Kurnool -518452, A.P.
Abstract :

af

“People work for money, But go an extra mile for recognition, praise and rewards” - Dale Carnegie Today Indian banking sector is being considered as one of the most glorious, innovative service industry that has witnessed constant growth over the past three decades. Indian banking industry has a vital role in promoting public lending and public savings, and is widely recognized as a significant factor for the economic development of the country. The Indian banking industry is expected to be among the top 10 global markets in terms of value by 2025, strengthen by increasing domestic demand. Now-a-days managing talent in the banking sector is the most crucial Human Resource challenge all over the world, and it becomes as the main agenda of top management in every aspect in the predictable future. Employees who are pleased with rewards are more motivated to contribute and can do more effectively. This also converts into better customer experience and in turn, leads to stronger financial performance by the firm and overall economic growth. The present paper aims to decisively study and understand the role of Employee Reward System in SBI and ICICI bank and its impact on Employee Motivation and Organizational Performance.
Citation :

af

Dr. H S.ABZAL BASHA, “Employee Rewards and Employee Work Motivation: An Indispensable Linkage”, International Journal Of Computer Engineering In Research Trends, 3(12):645-653,December-2016.
Keywords : Employee Reward, Economic Development, Organizational Performance.
References :

af

1.	Broad, M., “Rewarding staff is simply good manners”, Personnel Today, 26 October, 2001. 
2.	Edward E Lawler, “Treat people right”. San Francisco: Jossey-Bass Inc., 2003. 
3.	Deeprose Donna, “How to recognise and reward employees”. Broadway,      New York: American Management Association, 1994. 
4.	Aniruddha Limaye and Ralsi Sharma; “Rewards and Recognition: Make a difference to the talent in your organization”, 2013.
5.	Maslow Abraham., “Motivation and Personality”, Harper and Row Publications: New York, First Edition, 1954.
6.	Report of the National Commission on Labour: Government of India Ministry of Labour and Employment and Rehabilitation, 1969. 
7.	Gurvinder Kaur;“A Thesis on Employee Empowerment and Organizational Effectiveness: A Comparative Study of Public, Private and Foreign banks in Some North Indian States, submitted to Thapar University, Punjab, November, 2013.
8.	Chandra Mohan Patnaik& Ashok Kumar Sahoo; “Empowerment of award staff in regional rural banks through training system: an analysis” Asian Journal of Multidimensional Research Vol.2 Issue 1, January 2013, ISSN 2278-4853.
9.	Zorah Abu Kassim et al., “Job Empowerment and Customer Orientation of Bank Employees in Kuching, Malaysia”, Contemporary Mgt Research, 131-140, Vol. 8, 2012.
10.	Quratul-AinManzoor; Impact of Employees Motivation on Organizational Effectiveness, ISSN 2157-60682012, Vol. 3, No-1.
11.	PreetiS.Rawat; Effect of Psychological Empowerment on Commitment of Employees: An Empirical Study, IPEDR vol.17 (2011), IACSIT Press, Singapore.
12.	Angwenyi Callen Nyanchama; Employee Empowerment Practices in Commercial Banks in Kenya, School Of Business, University Of Nairobi, 2009.
13.	Peters Silvia Chigozirim and ElhamMazdarani; The impact of employee empowerment on service quality and customer satisfaction in service organizations-A Case study of Lansforsakringar Bank AB, 2008,Malardalen University, Vasteras.
14.	David E Bowen and Edward Lawler; The Employment Approach to Service, Center for Effective Organizations, January, 1994. 
15.	GbalahamGbadmosi: “Employee Commitment An overview”, Management Review, 1995, vol. 12. pp. 87- 93 
16.	Decotics and summers; “A Path Analysis of a Model of the Antecodents and Consequences of Organisational Commitment”, Human Relations, 1987, pp. 445-470.
17.	O.R Krishnaswami and M. Ranganatham: Methodology of Research in Social Sciences, 2005, ISBN 81-8318-454-5. 
****

:10.22362/ijcert/2016/v3/i12/xxxx
DOI Link : Not yet assigned
Download :
  V3I1207.pdf
Refbacks : There are currently no refbacks
Intellectual Property Rights Issues and Challenges of Academic Libraries in Digital Environment
Authors : Firdous Maqbool Mir, ,
Affiliations : Library Assistant, Govt Degree College, Baramulla, Jammu & Kashmir ,India ,193101
Abstract :

af

Intellectual property (IP) has emerged as a key driver in knowledge economy. In the present scenario, IPR awareness is the key to technological innovations and in the emerging knowledge-based economy; the awareness among the creators of information and knowledge about IPR has become essential in the digital environment because in the digital environment it is becoming difficult to prove rights violation whenever they occur. This paper gives an overview of intellectual property rights (IPR) issues & challenges in digital environment and the paper deals with the copyright law as well as the role of librarians in the protection of copyright literature. Study also focused on patrons need towards understanding IPR laws in using library services without infringement. With the advancement of technology, Intellectual Property Rights have added new dimensions and there is a strong need for awareness and understanding on Intellectual Property Rights for library patrons.
Citation :

af

Firdous Maqbool Mir, “Intellectual Property Rights Issues and Challenges of Academic Libraries in Digital Environment”, International Journal Of Computer Engineering In Research Trends, 3(12):639-644-,December-2016.
Keywords : : Intellectual Property Rights, IPR, Digital Technology, Copyright.
References :

af

1.	Copyright Office. (2016). About Copyright Government of India. Retrieved November 17th,2016 from
 http://copyright.gov.in/Default.aspx
2.	Dolli, Manoj. (2012). Intellectual property rights: Regulations and trends in India. International Journal of Engineering Research, 3(12), 15-27 Retrieved November 15th , 2016 from
http://www.ijeronline.com/documents/volumes/Vol%203%20issue%202/ijer20120301MA(2).pdf      
3.	Malwad,N.M &Anjanappa,M.(1994). IPR in digital environment: Issues of concern to library community. Retrieved  November 20th , 2016 from
http://ir.inflibnet.ac.in/bitstream/1944/130/1/cali_37.pdf   
4.	Kannan, N. (2010). Importance of Intellectual property rights. International Journal of Intellectual Property Rights, 1(1), 1-5 Retrieved November 16th ,2016 from
http://iaeme.com/MasterAdmin/UploadFolder/IJIPR%20%20Importance%20of%20Intellectual%20Property%20Rights.pdf
5.	Kore, Sayali. C, Jadhav, Shital.T, Kadam, Amruta. S & Chavan, S. ushila. D. (2015). Introduction to Intellectual Property Right. Asian Journal of Pharmacy and Technology,5(4), 222-230.Retrieved November 16th,2016 from
http://www.asianpharmaonline.org/pdf.php?j=2231-5713&vol=5&issue=4&ab=ab176
6.	Sinha, Abhijeet & Bhardwaj, R.K. (2010). Digital Libraries and Intellectual Property Rights. International Conference on Digital Libraries. Retrieved November 15th , 2016 from
https://rajkbhardwaj.files.wordpress.com/2014/02/art-9.pdf    
7.	Rachchh, Manish.A.(2013). Module I- Basics of IPR; Gujarat Technological University. Retrieved November 15th ,2016 from
http://www.gtu.ac.in/circulars/13Aug/Module-1-BasicsofIPR_3rdAug2013.pdf
8.	Sinha, Abhijeet & Bhardwaj, R.K. (2010). Digital Libraries and Intellectual Property Rights. International Conference on Digital Libraries. Retrieved November 15th , 2016 from https://rajkbhardwaj.files.wordpress.com/2014/02/art-9.pdf    
:10.22362/ijcert/2016/v3/i12/xxxx
DOI Link : Not yet assigned
Download :
  V3I1206.pdf
Refbacks : There are currently no refbacks
A Survey of Big Data Analytics in Banking and Health Care today
Authors : P.Siva Kumar, B.Murthujavali, Surya Pogu Jayanna
Affiliations : Asst.Professor,Department of Computer Science and Engineering.,G.Pullaiah College of Engineering & Technology (GPCET), Kurnool
Abstract :

af

This paper gives an perception of how we can disclose added value from the data generated by healthcare and banking sector where Health care Organizations and Financial institutions are making use of Big Data in big ways, from boosting cyber security to reducing customer or Patient churn, cultivating customer or Patient loyalty, and more through innovative and personalized offerings that make effective services. Large amount of heterogeneous data is generated by these organizations. But without proper data analytics methods these data became useless. Big Data Analytics using Hadoop plays an effective role in performing meaningful real-time analysis on the huge volume of data and able to predict the emergency situations before it happens. It describes about the big data use cases in healthcare and banking sectors.
Citation :

af

P.Siva Kumar,B.Murthujavali,Surya Pogu Jayanna”, A Survey of Big Data Analytics in Banking and Health Care today”, International Journal Of Computer Engineering In Research Trends, 3(12):632-638,December-2016.
Keywords : Big Data, Hadoop, Healthcare,Banking, Map-Reduce.
References :

af

1. Yanglin Ren, Monitoring patients via a secure and mobile healthcare system, IEEE Symposium on wireless communication,2011
2. Dai Yuefa, Wu Bo, GuYaqiang ,Data Security Model for Cloud Computing, International Workshop on Information Security and Application,2009
3. Jeffrey Dean and Sanjay Ghemawat,MapReduce: Simplified Data Processing on Large Clusters,ACM,2008
4.Kayyali B, Knott D, Van Kuiken S. The big-data revolution in US health care: accelerating value and innovation. McKinsey & Company. 2013 Apr.   URL: https://digitalstrategy.nl/wp-content/uploads/E2-2013.04-The-big-data-revolution-in-US-health-care-Accelerating-value-and-innovation.pdf [accessed 2016-11-11] [WebCite Cache]
5. Cong Wang, Privacy-Preserving Public Auditing for Secure Cloud Storage,IEEE,2010
6. Konstantin Shvachko, HairongKuang, Sanjay Radia, Robert Chansler ,The Hadoop Distributed File System,IEEE,2010
7. Bill Hamilton, Big Data Is the Future of Healthcare, Cognizant white paper, 2010.
8. White Paper by SAS, How Government are using the Power of High Performance Analytics, 2013.
9. Michael Cooper &Peter Mell, Tackling Big Data Problems, NSIT Computer Security Workshop
10. Jean Yean, Big Data Bigger Opportunities, White Paper, U.S.General Services Administration.
11. Kruse CS, Goswamy R, Raval YJ, Marawi S Challenges and Opportunities of Big Data in Health Care: A Systematic Review JMIR Med Inform 2016;4(4):e38 URL: https://medinform.jmir.org/2016/4/e38 DOI: 10.2196/medinform.5359,   PMID: 27872036  ,PMCID: 5138448.
:10.22362/ijcert/2016/v3/i12/xxxx
DOI Link : Not Yet Assigned
Download :
  V3I1205.pdf
Refbacks : There are currently no refbacks
Selection and Maintenance of Materialized View using Genetic Algorithm
Authors : Ramesh S Gawali, Prof. Mrunali G. Vaidya,
Affiliations : BIT Ballarpur Gondwana University ,India
Abstract :

af

Data warehouse is a repository of large amount of data collected from multiple heterogeneous and distributed data sources. Quick response time and accuracy are the key points for success of any database. Performance of query can be improved by different approaches like query optimization, use of proper data structure etc. But leaving all these alternatives we are planning to use materialized view approach
Citation :

af

Ramesh S Gawali, ,Prof. Mrunali G. Vaidya," Selection and Maintenance of Materialized View using Genetic Algorithm”, International Journal Of Computer Engineering In Research Trends, 3(12):629-631,December-2016.
Keywords : data ware house, materialized view, optimization Query.
References :

af

 [1]Dr.T.Nalini, Dr.A.Kumaravel , Dr.K.Rangarajan,”A Novel Algorithm with IM-LSI Index For Incremental Maintenance of Materialized View” JCS&T Vol. 12 No. 1 April 2012 
[2] B.Ashadevi, R.Balasubramanian,” Cost Effective Approach for Materialized Views Selection in Data Warehousing Environment”, IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.10, October 2008 
[3] Gupta, H. & Mumick, I., Selection of Views to Ma-terialize in a Data Warehouse. IEEE Transactions on Knowledge and Data Engineering, 17(1), 24-43, 2005. 
[4] Yang, J., Karlapalem. K., and Li. Q. (1997). A framework for designing materialized views in a data warehousing environment. Proceedings of the Seven-tieth IEEE International Conference on Distributed Computing systems, USA, pp:458
[5] V.Harinarayan, A. Rajaraman, and J. Ullman.“Implementing data cubes efficiently”. Pro-ceedings of ACM SIGMOD 1996 International Confer-ence on Management of Data, Montreal, Canada, pages 205--216, 1996. 
[6] A. Shukla, P. Deshpande, and J. F. Naughton, “Ma-terialized view selection for the multidimensional da-tasets,” in Proc. 24th Int. Conf. Very Large Data Bases, 1998, pp. 488–499. 
[7] Y.D. Choudhari and Dr. S. K. Shrivastava, “Cluster Based Approach for Selection of Materialized Views”, International Journal of Advanced Research in Com-puter Science and Software Engineering ,Volume 2, Issue 7, July 2012 

:10.22362/ijcert/2016/v3/i12/xxxx
DOI Link : Not yet assigned
Download :
  V3I1204.pdf
Refbacks : There are currently no refbacks
Secure Data Communication Using IDEA for Decentralized Disruption-Tolerant Military Networks
Authors : Atish D.  Buddhe , Prof. Hirendra R. Hajare,
Affiliations : BIT Ballarpur Gondwana University ,India
Abstract :

af

Nowadays Disruption tolerant network technologies are getting to be distinctly well known that permit wireless devices supported by soldiers to communicate with each other and access the confidential information or command consistently by abusing external storage nodes. The absolute most challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data retrieval. Ciphertext-policy attribute-based encryption is a promising cryptographic solution to the access control issues. However, the problem of applying CP-ABE in decentralized DTNs introduces several security and privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued from different authorities. We propose a secure data retrieval scheme using IDEA for decentralized DTNs where multiple key authorities manage their attributes independently. We demonstrate how to apply the proposed mechanism to productively deal with the classified information conveyed in the distributed in the disruption-tolerant military network.
Citation :

af

Atish Budhhe, Prof. Hirendra R. Hajare ," Secure Data Communication Using IDEA for Decentralized Disruption-Tolerant MilitaryNetworks”, International Journal Of Computer Engineering In Research Trends, 3(12):625-628,December-2016.
Keywords : — CP-ABE, Access control, attribute-based encryption (ABE), Dsruption-tolerant network (DTN), IDEA, multiauthority, secure data retrieval.
References :

af

[1] J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine, “Maxprop: outing for vehicle-based disruption tolerant networks,” in Proc.IEEE INFOCOM, 2006, pp. 1–11.
[2] M. Chuah and P. Yang, “Node density-based adap-tive routing scheme for disruption tolerant networks,” in Proc. IEEE MILCOM, 2006, pp.1,6.
[3] M. M. B. Tariq, M. Ammar, and E. Zequra, “Mesage ferry route design for sparse ad hoc networks with mobile nodes,” in Proc. ACM MobiHoc, 2006, pp. 37–48.
[4] S. Roy andM. Chuah, “Secure data retrieval based on ciphertext policy attribute-based encryption () system for the DTNs,” Lehigh CSE Tech. Rep., 2009.
[5] M. Chuah and P. Yang, “Performance evaluation of content-based information retrieval schemes for DTNs,” in Proc. IEEE MILCOM,2007, pp. 1–7.
[6] M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, “Plutus: Scalable secure file sharing on un-trusted storage,” in Proc. Conf. File Storage Technol., 2003, pp. 29–42.
:DOI:10.22362/ijcert/2016/v3/i12/xxxx
DOI Link : Not Yet Assigned
Download :
  V3I1203.pdf
Refbacks : There are currently no refbacks
Intelligent XML Query-Answering Support with Efficiently Updating XML Data in Data Mining
Authors : Parag Zaware, Prabhudev.I,
Affiliations : Vishwabharati Academy College of Engineering, Ahmednagar
Abstract :

af

Data is present in various unstructured format. Extracting information from non structured documents is a very difficult task and it is become more and more critical when the amount of digital information available over the internet increases. This paper is based on design of Branch Organization Rule (BOR) results in approximate answer of queries for mining. XML is popular portable language best suitable for many web technologies hence we prefer XML. While implementing XML Query Answering we are going to implement Naïve Bayes as Machine learning algorithm which we will use specially for Query Classification. We are also implementing same concept for rules classifications by using which the trees are generated after applying queries. Due to creating classification of queries our accuracy of results will increase.
Citation :

af

Parag Zaware,Prabhudev.I," Intelligent XML Query-Answering Support with Efficiently Updating XML Data in Data Mining”, International Journal Of Computer Engineering In Research Trends, 3(12):613-619,December-2016.
Keywords : XML, Mining, query answer, Machine Learning.
References :

af

[1] Mirjana Mazuran, Elisa Quintarelli, and Letizia Tanca “Data Mining for XML Query-Answering Support”, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 24, NO. 8, AUGUST 2012


[2]A. Evfimievski, R. Srikant, R. Agrawal, and J. Gehrke, 
“Privacy Preserving Mining of Association Rules,” Proc. Eighth ACM Int’l Conf. Knowledge Discovery and Data Mining, pp. 217-228, 2002.
 
[3]C. Combi, B. Oliboni, and R. Rossato, “Querying XML 

Documents by Using Association Rules,” Proc. 16th Int’l Conf. Database and Expert Systems Applications, pp. 1020-1024, 2005

[4]D. Braga, A. Campi, S. Ceri, M. Klemettinen, and P. Lanzi, “Discovering Interesting Information in XML Data with Asso-ciation Rules,” Proc. ACM Symp. Applied Computing, pp. 450-454, 2003. 


[5]D. Barbosa, L. Mignet, and P. Veltri, “Studying the XML 
Web: Gathering Statistics from an XML Sample,” World Wide Web, vol. 8, no. 4, pp. 413-438, 2005.



[6]E. Baralis, P. Garza, E. Quintarelli, and L. Tanca, “Answer-ingXMLQueries	by Means of Data Summaries,” ACM Trans.InformationSystems, vol. 25, no. 3, p. 10, 2007.


[7]L. Feng, T.S. Dillon, H. Weigand, and E. Chang, “An 
XMLEnabled Association Rule Framework,” Proc. 14th Int’l Conf. Database and Expert Systems Applications, pp. 88-97, 2003. 

[8] World Wide Web Consortium, XML Schema, http://
www.w3C.org/TR/xmlschema-1/, 2001.

[9]Chai, K.; H. T. Hn, H. L. Chieu; “Bayesian Online Classifiers for Text Classification and Filtering”, Proceedings of the 25th annual international ACM SIGIR conference on Research and Development in Information Retrieval, August 2002.

[10] DATA MINING Concepts and Techniques, Jiawei Han, Micheline Kamber Morgan Kaufman Publishers, 2003
:10.22362/ijcert/2016/v3/i12/xxxx
DOI Link : Not Yet Assigned
Download :
  V3I1202.pdf
Refbacks : There are currently no refbacks
Indoor Environment Navigation for Blind with Voice Feedback
Authors : Parimal A. Itankar, Prof. Hirendra R. Hajare ,
Affiliations : BIT Ballarpur Gondwana University ,India
Abstract :

af

this paper presents assistive system for visually impaired with voice feedback which focuses on independent movement of blind people who suffer in an unknown environment with no assistance. This system has Radio Frequency Identification (RFID) for the path guidance identifying certain paths for the navigation which give features such as location identification. This proposed system on the user side include a RFID reader module with an integrated microcontroller, zigbee transceiver for transmitting the tag’s information and for playing information to the blind person were on the server side zigbee transceiver for communication. For the direction identification technique, RFID passive tag is employed on the path and for location recognition required tools and r building will be embedded with passive RFID tags. A data unique to each object and path location is on the server. The RFID reader reads the RFID tags and transmits the data by Zigbee to the server PC which in turn locates for the received Tag ID in the database and gives respond to the user with its identification data which is played at the blind person side by converting it from text to speech with the help of SAPI module.
Citation :

af

Parimal A. Itankar, Prof. Hirendra R. Hajare ," Indoor Environment Navigation for Blind with Voice Feedback”, International Journal Of Computer Engineering In Research Trends, 3(12):609-612,December-2016.
Keywords : Radio frequency identification (RFID), zigbee, Tag ID, server PC, wireless, database, SAPI module. .
References :

af

[1]. Abdullah Rehman, MohsinMurad, Arif Ali Shah, Sal-imUllah, Muhammad Fahad, Khawaja M. Yahya , ''RFAIDE--An RFID Based Navigation and Object Recogni-tion Assistant for Visually Impaired People'', University of Engineering and Technology, Peshawar, Pakistan, 978-1-4577-0768-1/11/2011 IEEE. 
[2]. Andreas Hub, Joachim Diepstraten, Thomas Ertl, ''De-sign and Development of an Indoor Navigation and Object Identification System for the Blind'', Visualization and Interactive Systems Institute University of Stuttgart. 
[3]. Abdelsalam (Sumi) Helal, Steven Edwin Moore, Balaji Ramachandran, ''Drishti: An Integrated Navigation System for Visually Impaired and Disabled'', University of Florida,Gainesville, FL-32611. 
[4]. Guth, D.A.; Rieser, J.J. ''Perception and the control of locomotion by blind and visually impaired pedestrians''. Foundations of Orientation and Mobility, (Second Edition), AFB Press, pp. 9-38, 1997. 
[5]. H. Mori, S. Totani, ''Robotic Travel Aid for the Blind: HARUNOBU-6''. In Proceedings of the Second European Conference On Disability, Virtual Reality, and Assistive Technology, Sövde, Sweden, 1998. 
[6]. Jenny Crave, Research Fellow, ''Access to electronic resources by visually impaired people'', CERLIM, Manchester Metropolitan University, UK, Information Research, Vol. 8 No. 4, July 2003. 
[7]. Jinying Chen, Xuben Wang, Zhi Li, Min Dong, ''Blind Path Identification System Design Base on RFID'', 2010 International Conference on Electrical and Control Engineering. 
[8]. L. W. Alonzi, D. C. Smith, G. J. Burlak, M. Mirowski, (1992). ''Radio frequency message apparatus for aiding ambulatory travel of visually impaired persons'', U.S. Patent 5,144,294 issued Sept. 1, 1992. 
[9]. M.B. Hancock, ''Electronic auto routing navigation system for visually impaired persons''. U.S. Patent 5,806,017 issued September 8, 1998. 
[10]. P.Bahl andV.Padmanabhan, “Radar: An In-Building RF–Based User Location andTracking system”, InProceed-ingsofthe IEEE INFOCOM 2000, MARCH 2000, PP775-784.
:DOI:10.22362/ijcert/2016/v3/i12/xxxx
DOI Link : Not yet assigned
Download :
  V3I1201.pdf
Refbacks : There are currently no refbacks

 

A Multilevel Scoring Mechanism to Compute Top - K Routing Plans for a Keyword Query
Authors : Mr Bharath Reddy, Mr. Manas Kumar Yogi, Grandhi Satya Suneetha
Affiliations : Dept of CSE, Pragati Engineering College, Kakinada. Andhra Pradesh, India
Abstract :

af

In recent years Keyword search over database is explored. For information retrieval keyword query used, but due to ambiguity of multiple queries over database should be explored. while getting multiple result to keyword query we need effective crawlers, if search engine might be give multiple result to the single query then computation of all the these results and suggesting best one among all result defined as problem statement. In this paper, the label ranking system over unpredictable is presented. The Keyword directing strategy is utilized to course the catchphrases to significant source. In this methodology two techniques are incorporated. If user gives a keyword query to the search engine then the search engine should process the query and returns the appropriate result based rank. The result construction done based on R-Tree and it allows NN queries should be computed and based on I-Index we will construct the score for each NN query result.
Citation :

af

Bharath Reddy et.al," A Multilevel Scoring Mechanism to Compute Top - K Routing Plans for a Keyword Query”, International Journal of Computer Engineering In Research Trends, 3(11):602-608,November-2016.
Keywords : Keyword searching, Uncertain graph, algorithm, Keyword routing, graph data, Keyword query
References :

af

[1] Wangchao Le, Feifei Li, Anastasios Kementsietsidis, Songyun Duan, Scalable Keyword Search on Large RDF Data", IEEE2013.
 [2] George Kollios, Michalis Potamias, and EvimariaTerzi, Clustering Large Probabilistic Graphs, IEEE vol. 25, NO. 2, February 2013
 [3] Ye Yuan, Guoren Wang, Lei Chen, and HaixunWang, Efficient Keyword Search on Uncertain Graph Data, IEEE vol. 25, no. 12, December 2013.
 [4] Jun Gao, Jiashuai Zhou, Jeffrey Xu Yu, and TengjiaoWang, Shortest Path Computing in Relational DBMSs, IEEE vol. 26, no. 4, April 2014.
 [5] ZhaonianZou, Jianzhong Li, Member, IEEE, Hong Gao, and Shuo Zhang, Mining Frequent Subgraph Patterns from Uncertain Graph Data‖, IEEE vol. 22, no. 9, September 2010.
 [6] Lifang Qiao, Yu Wang, A Keyword Query Method for Uncertain Database‖, 2nd International Conference on Computer Science and Network Technology, IEEE, 2012.
 [7] Bolin Ding, Jeffrey Xu Yu, Shan Wang, Lu Qin, Xiao Zhang, Xuemin Lin,‖ Finding Top-k Min-Cost Connected Trees in Databases‖, IEEE 1- 4244-0803-2/07/2007.
 [8] Thanh Tran and Lei Zhang, ‖ Keyword Query Routing‖, IEEE vol. 26, no. 2, February2014.
 [9] Ye Yuan, Guoren Wang, Haixun Wang, Lei Chen,‖ Efficient Subgraph Search over Large Uncertain Graphs‖. In Proceedings of the VLDB Endowment, Vol. 4,pp. 876-886, 2011.
 [10] Hao He, Haixun Wang, Jun Yang, Philip S. Yu,‖ BLINKS: Ranked Keyword Searches on Graphs‖, SIGMOD'07, June 2007. 
[11]Haoliang Jiang, HaixunWang, Philip S. Yu, and Shuigeng Zhou GString: A novel approach for efficient search in graph databases. In ICDE, 2007.
 [12] DennisShasha, Jason T.L.Wang, and RosalbaGiugno. Algorithmics and applications of tree and graph searching. In PODS, pages 39–52, 2002.
[13] Xifeng Yan, Philip S. Yu, and Jiawei Han. Substructure similarity search in graph databases. In SIGMOD, pages 766–777, 2005.
 [14] Branimir T. Todorovic, Svetozar R. Rancic, Ivica M. Markovic, Eden H. Mulalic, Velimir M. Ilic, ―Named Entity Recognition and Classification using Context Hidden Markov Model,‖ 9th Symposium on Neural Network Application in Electrical Engineering, NEUREL, pp. 43-46, 2008.
 [15] Dekai Wu, Weifeng Su and Marine Carpuat, ―A Kernel PCA Method for Superior Word Sense Disambiguation,‖ Proceedings of the 42nd Meeting of the Association for Computational Linguistics, pp. 637-644, 2004.
 [16]AbdelazizZitouni, AsmaDamankesh, ForooghBarakati, Maha Atari, Mohamed Watfa, FarhadOroumchian, ―Corpus-based Arabic Stemming Using N-grams,‖ Asia Information Retrieval Symposium - AIRS, vol. 6458, pp. 280-289, 2010.
 [17] Hassan Mohamed, Nazlia Omar, MohdJuzaidinAb Aziz, ―Statistical Malay Part-of-Speech (POS) Tagger using Hidden Markov Approach,‖ International Conference on Semantic Technology and Information Retrieval, pp. 231-236, June 2011.
:10.22362/ijcert/2016/v3/i11/1212
DOI Link : NA
Download :
  V3I1107.pdf
Refbacks : There are currently no refbacks
Parametric Optimization of Rectangular Beam Type Load Cell Using Taguchi Method
Authors : D.M. Kalai, V.A.Kamble, A.M.Rathod and B. K. Khot
Affiliations : Department. Of Mechanical Engineering DKTE’s TEI, Ichalkaranji, Maharashtra, India
Abstract :

af

In this work, Rectangular beam type load cell is considered for stress and strain analysis by using finite element method. The stress analysis is carried out to minimize the weight of Rectangular beam- type load cell without exceeding allowable stress. The intention of the work is to create the geometry of Rectangular beam-type load cell to find out the optimum solution. FEM software HyperWorks11.0.0.39 is using for parametric optimization of Rectangular beam type load cell. If the stress value is within the permissible range, then certain dimensions will be modified to reduce the amount of material needed. The procedure will be repeated until design changes satisfying all the criteria. Experimental verification will be carried out by photo-elasticity technique with the help of suitable instrumentation like Polariscope. Using Photo-elasticity technique, results are crosschecked which gives results very close to FEM technique. Experimental results will be compared with FEM results. With the aid of these tools the designer can develop and modify the design parameters from initial design stage to finalize basic geometry of load cell.
Citation :

af

D.M. Kalai et.al," Parametric Optimization of Rectangular Beam Type Load Cell Using Taguchi Method”, International Journal of Computer Engineering In Research Trends, 3(11):596-601,November-2016.
Keywords : Strain gauge, Load cell, Sensitivity, optimization, Volume, Taguchi, FEM.
References :

af

[1]	“Use of FEM and Photo elasticity for shape optimization of ‘S’ type load cell”; Mr. V. A. Kamble, Mr. P. N. Gore; International Journal of Science and Technology, Volume 5, Issue 3; March 2012.
[2]	“Shape Optimization of ‘S’ Type Load Cell Using Finite Element Method”; Mr. S. M Ghanvat, Prof. S. G. Patil; International Journal of Engineering Innovation & Research Volume 1, Issue 3; 2012.
[3]	“Stress Analysis of Crane Hook and Validation by Photo-Elasticity”; Rashmi Uddanwadiker; Scientific Research Engineering; Sept.2011.
[4]	“Finite Element Analysis and Optimization of a Beam Type Load Cell for an External Balance Design”; Ankit Soni, Pankaj Priyadarshi; Indian Institute of Space Science and Technology, Trivandrum; 2010.
[5]	“Performance Evaluation of Strain Gauge Based Load Cell to Improve Weighing Accuracy”; Prof. Kamlesh H. Thakkar, Prof. Vipul. M. Prajapati, Prof. Bipin D. Patel; International Journal of Latest Trends in Engineering and Technology (IJLTET), vol. 2; 2013.
[6]	“Measurement Systems, Application and Design”; Earnest Doebelin; Tata McGraw Hill, Page 438-446; 2009.

B.  BOOKS
[1]	“Experimental Stress Analysis”; James W. Dally, William F. Riley; Tata McGraw Hill; 1991.
[2]	“Experimental Stress Analysis”; Dr. Sadhu Singh; Khanna Publications; Fourth edition; 2009.

C. MANUALS
[1]	ADI ARTECH Transducers Pvt. Ltd.
 

:under process
DOI Link : Not yet assigned
Download :
  V3I1106.pdf
Refbacks : There are currently no refbacks
Robust Resource Allocation in Relay Node Networks for Optimization Process
Authors : G.Lalitha, Lakshmi Viveka K, Leelavathy Narkedamilly
Affiliations : Dept of CSE, Pragati Engineering College, Kakinada
Abstract :

af

Overlay steering has risen as a promising way to deal with enhances unwavering quality and effectiveness of the Internet. For one-jump overlay source steering, when a given essential way experiences the connection disappointment or execution debasement, the source can reroute the movement to the destination by means of a deliberately set transfer hub. Be that as it may, the over-substantial activity going through the same transfer hub may bring about incessant bundle misfortune and postponement jitter, which can corrupt the throughput and usage of the system. To defeat this issue, we propose a Load-Balanced One-jump Overlay Multipath Routing calculation (LB-OOMR), in which the activity is first part at the source edge hubs and afterward transmitted along numerous one-bounce overlay ways. So as to decide an ideal split proportion for the activity, we plan the issue as a direct programming (LP) definition, whose objective is to minimize the more regrettable case system blockage proportion. Since it is hard to take care of this LP issue in commonsense time, a heuristic calculation is acquainted with select the transfer hubs for building the disjoint one-jump overlay ways, which enormously lessens the computational multifaceted nature of the LP calculation. Reproductions in light of a genuine ISP system and an engineered Internet topology demonstrate that our proposed calculation can diminish the system clog proportion significantly, and accomplish top notch overlay directing administration.
Citation :

af

G.Lalitha et.al," Robust Resource Allocation in Relay Node Networks for Optimization Process”, International Journal of Computer Engineering In Research Trends, 3(11):589-595,November-2016.
Keywords : Relay Node Networks ,One-jump Overlay Multipath Routing ,OVERLAY ROUTING
References :

af

[1] D. G. Andersen, H. Balakrishnan, M. F. Kaashoek, and R. Morris, “Resilient overlay networks,” Proceedings of SOSP 2001, Oct. 2001.
 [2] S. Banerjee, C. Kommareddy, K. Kar, B. Bhattacharjee, and S. Khuller, “Construction of an efficient overlay multicast infrastructure for real-time applications,” Proceedings of INFOCOM 2003, April 2003.
 [3] D. G. Andersen, A. C. Snoeren, and H. Balakrishnan, “Best-path vs. multi-path overlay routing,” Proceedings of IMC 2003, Oct. 2003.
 [4] C.L.T. Man, G. Hasegawa, and M. Murata, “Monitoring overlay path bandwidth using an inline measurement technique,” IARIA International Journal on Advances in Systems and Measurements, vol.1, no.1, pp.50–60, Feb. 2008. 
[5] P. Rodriguez, S.M. Tan, and C. Gkantsidis, “On the feasibility of commercial, legal P2P content distribution,” SIGCOMM Computer Communication Review, vol.36, no.1, pp.75–78, Jan. 2006.
[6] S. Seetharaman and M. Ammar, “Characterizing and mitigating inter-domain policy violations in overlay routes,” Proceedings of ICNP 2006, pp.259–268, Nov. 2006.
 [7] T. Karagiannis, P. Rodriguez, and K. Papagiannaki, “Should Internet service providers fear peer-assisted content distribution?,” Proceedings of IMC 2005, pp.6–6, Oct. 2005. 
[8] IETF ALTO Working Group web site. available at http:// datatracker.ietf.org/wg/alto/.
 [9] H. Xie, Y. R. Yang, A. Krishnamurthy, Y. G. Liu, and A. Silberschatz, “P4P: Provider portal for applications,” SIGCOMM Computer Communication Review, vol.38, no.4, pp.351–362, Oct. 2008. 
[10] Planet Lab web site. available at http://www.planet-lab.org/. 
[11] G. Hasegawa, Y. Hiraoka, and M. Murata, “Effectiveness of overlay routing based on delay and bandwidth information,”  
[12] S. J. Lee, S. Banerjee, P. Sharma, P. Yalagandula, and S. Basu, “Bandwidth-aware routing in overlay networks,” Proceedings of INFOCOM 2008, pp.1732–1740, April 2008. 
[13] G. Smaragdakis, V. Lekakis, N. Laoutaris, A. Bestavros, J.W. Byers, and M. Roussopoulos, “EGOIST: overlay routing using selfish neighbor selection,” Proceedings of CoNEXT 2008, pp.1–12, Dec. 2008.
 [14] Z. Li and P. Mohapatra, “QRON: QoS-aware routing in overlay networks,” IEEE Journal on Selected Areas in Communications, vol.22, no.1, pp.29–40, Jan. 2004.
[15] M. Kamel, C. Scoglio, and T. Easton, “Optimal topology design for overlay networks,” Proceedings of NETWORKING 2007, pp.714– 725, May 2007.
[16] R. Cohen and D. Raz, “Cost effective resource allocation of overlay routing relay nodes,” Proceedings of INFOCOM 2011, 2011.
:under process
DOI Link : Not yet assigned
Download :
  V3I1105.pdf
Refbacks :
A Survey on: Sound Source Separation Methods
Authors : Ms. Monali R. Pimpale, Prof. Shanthi Therese , Prof. Vinayak Shinde,
Affiliations : Department of Computer Engineering, Mumbai University, Shree L.R. Tiwari College of Engineering and Technology,Mira Road, India.
Abstract :

af

now a day’s multimedia databases are growing rapidly on large scale. For the effective management and exploration of large amount of music data the technology of singer identification is developed. With the help of this technology songs performed by particular singer can be clustered automatically. To improve the Performance of singer identification the technologies are emerged that can separate the singing voice from music accompaniment. One of the methods used for separating the singing voice from music accompaniment is non-negative matrix partial co factorization. This paper studies the different techniques for separation of singing voice from music accompaniment.
Citation :

af

Monali R. Pimpale," A Survey on: Sound Source Separation Methods”, International Journal of Computer Engineering In Research Trends, 3(11):580-584,November-2016
Keywords : singer identification, non-negative matrix partial co factorization
References :

af

[1] Tuomas Virtanen ,”Unsupervised Learning Methods for Source Separation in Monaural Music Signals” Tuomas Virtanen

[2] T. Virtanen, “Monaural sound source separation by nonnegative matrix factorization with temporal continuity and sparseness criteria,” IEEE Trans. Audio, Speech, Lang. Process., vol. 15, no. 3, pp. 1066–1074,Mar. 2007.

[3] J. Yoo et al., “Nonnegative matrix partial co-factorization for drum source separation,” in Proc. IEEE Int. Conf. Acoust. Speech, Signal Process., 2010, pp. 1942 1945.

[4] M. Kim et al., “Nonnegative matrix partial co-factorization for spectral and temporal drum source separation,” IEEE J. Sel. Topics Signal Process., vol. 5, no. 6, pp. 1192–1204, Dec. 2011.

[5] Y. Hu and G. Z. Liu, “Singer identification based on computational auditory scene analysis and missing feature methods,” J. Intell. Inf. Syst., pp. 1–20, 2013.

[6] McAulay, Robert J., and Thomas F. Quatieri. "Pitch estimation and voicing detection based on a sinusoidal speech model." Acoustics, Speech, and Signal Processing, 1990. ICASSP-90., 1990 International Conference on. IEEE, 1990.

 [7] T. Virtanen, A. Mesaros, and M. Ryynanen, “Combining pitch-based inferenceandnon-negative spectrogram factorization in separating vocals from polyphonic music,” in Proc. ISCA Tutorial Res. Workshop Statist. Percept. Audit. (SAPA), 2008

[8] Zafar Rafii and Bryan Pardo, “REpeating Pattern Extraction Technique (REPET): A Simple Method for Music/Voice Separation”, IEEE Transactions on Audio, Speech, and Language Processing, vol. 21, no. 1, pp. 71 – 82, January 2013.

[9] Ying Hu and Guizhong Liu, “Separation of Singing Voice Using Nonnegative Matrix Partial CoFactorization for Singer Identification”, IEEE/ACM Transactions on Audio, Speech, and Language Processing, vol. 23, no. 4, pp. 643 – 653, April 2015.   
[10] Yipeng Li, DeLiang Wang, Separation of Singing Voice from Music Accompaniment for Monaural Recordings, IEEE Transactions on Audio, Speech, and Language Processing,v.15 n.4, p.1475-1487, May 2007.

 [11] Virtanen, Tuomas. "Sound source separation using sparse coding with temporal continuity objective." Proc. ICMC. Vol. 3. 2003.

 [12] ICASSP 2007 Tutorial - Audio Source Separation based on Independent Component Analysis Shoji Makino and Hiroshi Sawada (NTT Communication Science Laboratories, NTT Corporation)

[13] Makino, Shoji, et al. "Audio source separation based on independent component analysis." Circuits and Systems, 2004. ISCAS'04. Proceedings of the 2004 International Symposium on. Vol. 5. IEEE, 2004.

[14] Virtanen, Tuomas. "Separation of sound sources by convolutive sparse coding." ISCA Tutorial and Researc Workshop (ITRW) on Statistical and Perceptual Audio Processing. 2004.

[15] Non-negative matrix factorization based compensation of music for automatic speech recognition, Bhiksha Raj, T. Virtanen, Sourish Chaudhure, Rita Singh, 2010.

[16] Reynolds, Douglas A., Thomas F. Quatieri, and Robert B. Dunn. "Speaker verification using adapted Gaussian mixture models." Digital signal processing 10.1 (2000): 19-41.

[17] Hochreiter, Sepp, and Michael C. Mozer. "Monaural separation and classification of mixed signals: A support-vector regression perspective." 3rd International Conference on Independent Component Analysis and Blind Signal Separation, San Diego, CA. 2001.
:under process
DOI Link : Not yet assigned
Download :
  V3I1103.pdf
Refbacks : There are currently no refbacks
Software Engineering Domain Knowledge to Identify Duplicate Bug Reports
Authors : Dr.J.KEZIYA RANI, ,
Affiliations : ASST.PROFESSOR, DEPT.OF.CS&T, S.K.UNIVERSITY, ANANTHAPURAMU.
Abstract :

af

Earlier, many methodologies was proposed for detecting duplicate bug reports by comparing the textual content of bug reports to subject-specific contextual material, namely lists of software-engineering terms, such as non-functional requirements and architecture keywords. When a bug report includes a word in these word-list contexts, the bug report is measured to be linked with that context and this information is likely to improve bug-deduplication methods. Here, we recommend a technique to partially automate the extraction of contextual word lists from software-engineering literature. Evaluating this software-literature context technique on real-world bug reports creates useful consequences that indicate this semi-automated method has the potential to significantly decrease the manual attempt used in contextual bug deduplication while suffering only a minor loss in accuracy.
Citation :

af

Dr.J.KEZIYA RANI," Software Engineering Domain Knowledge to Identify Duplicate Bug Reports”, International Journal of Computer Engineering In Research Trends, 3(11):585-588,November-2016.
Keywords : software literature; duplicate bug reports; information retrieval; machine learning; documentation.
References :

af

[1]	P. Runeson, M. Alexandersson, and O. Nyholm, “Detection of duplicate defect reports using natural language processing,” in Software Engineer-ing, 2007. ICSE 2007. 29th International Conference on. IEEE, 2007, pp. 499–510.

[2]	C. Sun, D. Lo, X. Wang, J. Jiang, and S.-C. Khoo, “A discriminative model approach for accurate duplicate bug report retrieval,” in Pro-ceedings of the 32nd ACM/IEEE International Conference on Software Engineering-Volume 1. ACM, 2010, pp. 45–54.

[3]	C. Sun, D. Lo, S.-C. Khoo, and J. Jiang, “Towards more accurate retrieval of duplicate bug reports,” in Proceedings of the 2011 26th IEEE/ACM International Conference on Automated Software Engineering. IEEE Computer Society, 2011, pp. 253–262.

[4]	A. Alipour, A. Hindle, and E. Stroulia, “A contextual approach towards more accurate duplicate bug report detection,” in Proceedings of the Tenth International Workshop on Mining Software Repositories. IEEE Press, 2013, pp. 183–192.

[5]	A. Alipour, “A contextual approach towards more accurate duplicate bug report detection,” Master’s thesis, University of Alberta, Fall 2013.

[6]	D. Han, C. Zhang, X. Fan, A. Hindle, K. Wong, and E. Stroulia, “Understanding android fragmentation with topic analysis of vendor-specific bugs,” in Reverse Engineering (WCRE), 2012 19th Working Conference on. IEEE, 2012, pp. 83–92.

[7]	R. S. Pressman and W. S. Jawadekar, “Software engineering,” New York 1992, 1987.

[8]	M. L. Murphy, The Busy Coder’s Guide to Advanced Android Develop-ment. CommonsWare, LLC, 2009.

[9]	N. Klein, C. S. Corley, and N. A. Kraft, “New features for duplicate bug detection.” in MSR, 2014, pp. 324–327.

[10]	N. Bettenburg, R. Premraj, T. Zimmermann, and S. Kim, “Duplicate bug reports considered harmful. . . really?” in Software Maintenance, 2008. ICSM 2008. IEEE International Conference on. IEEE, 2008, pp. 337–345.

[11]	N. Jalbert and W. Weimer, “Automated duplicate detection for bug tracking systems,” in Dependable Systems and Networks With FTCS and DCC, 2008. DSN 2008. IEEE International Conference on. IEEE, 2008, pp. 52–61.

[12]	Y. Dang, R. Wu, H. Zhang, D. Zhang, and P. Nobel, “Rebucket: A method for clustering duplicate crash reports based on call stack similarity,” in Proceedings of the 2012 International Conference on Software Engineering. IEEE Press, 2012, pp. 1084–1093.

[13]	A. Sureka and P. Jalote, “Detecting duplicate bug report using character n-gram-based features,” in Software Engineering Conference (APSEC), 2010 17th Asia Pacific. IEEE, 2010, pp. 366–374.

[14]	A. Lazar, S. Ritchey, and B. Sharif, “Improving the accuracy of duplicate bug report detection using textual similarity measures,” in Proceedings of the 11th Working Conference on Mining Software Repositories. ACM, 2014, pp. 308–311.

[15] A. Kiezun. Basic tutorial eclipse 3.1. [On-line]. Available: http://archive.eclipse.org/eclipse/downloads/drops/R-3. 1-200506271435/org.eclipse.jdt.doc.user.3.1.pdf.zip
[16] Sun Microsystems. (2008) Openoffice.org 3.0 developer’s guide. [Online]. Available:        https://wiki.openoffice.org/w/images/3/34/DevelopersGuide_ OOo3.0.0.odt 
[17]	Mozilla Developer Network and individual contributors. Mozilla developer guide. [Online]. Available: https://developer.mozilla.org/enUS/docs/Mozilla/Developer_guide
:under process
DOI Link : Not yet assigned
Download :
  V3I1104.pdf
Refbacks : There are currently no refbacks
An Image representation using Compressive Sensing and Arithmetic Coding
Authors : Dr. Renuka Devi S M , ,
Affiliations : ECE Dept, GNITS, Hyderbad-500008
Abstract :

af

The demand for graphics and multimedia communication over intenet is growing day by day. Generally the coding efficiency achieved by CS measurements is below the widely used wavelet coding schemes (e.g., JPEG 2000). In the existing wavelet-based CS schemes, DWT is mainly applied for sparse representation and the correlation of DWT coefficients has not been fully exploited yet. To improve the coding efficiency, the statistics of DWT coefficients has been investigated. A novel CS-based image representation scheme has been proposed by considering the intra- and inter-similarity among DWT coefficients. Multi-scale DWT is first applied. The low- and high-frequency subbands of Multi-scale DWT are coded separately due to the fact that scaling coefficients capture most of the image energy. At the decoder side, two different recovery algorithms have been presented to exploit the correlation of scaling and wavelet coefficients well. In essence, the proposed CS-based coding method can be viewed as a hybrid compressed sensing schemes which gives better coding efficiency compared to other CS based coding methods.
Citation :

af

Dr. Renuka Devi S M ," An Image representation using Compressive Sensing and Arithmetic Coding”, International Journal of Computer Engineering In Research Trends, 3(11):573-579,November-2016.
Keywords : Compressive sensing, Discrete wavelet tansform, Tree Structured wavelet CS, Basis Pursuit
References :

af

[1]	Donoho D.L., “Compressed sensing,” IEEE Transac-tions on Information Theory, vol. 52, pp. 1289–1306, 2006.
[2]	Cand`es E. J.  and Wakin M. B. , “An introduction to compressive sampling,” IEEE Signal Processing Magazine, vol. 25, pp. 21–30, 2008.
[3]	Tropp, Joel A., and Stephen J. Wright. "Computational methods for sparse solution of linear inverse problems." Proceedings of the IEEE 98.6 (2010): 948-958. 
[4]	Candès E., Romberg J. and Tao T., “Robust uncertainty principles: Exact signal   reconstruction from highly incomplete frequency information,” IEEE Trans. Inform. Theory, vol. 52,no. 2, pp. 489–509, Feb. 2006.
[5]	J. A. Tropp and A. C. Gilbert, “Signal recovery from random measurements via orthogonal matching pur-suit,” IEEE Transactions on Information Theory, vol. 53, pp. 4655–4666, 2007.
[6]	D. L. Donoho, Y. Tsaig, I. Drori, and J.-L. Starck, “Sparse solution of underdetermined linear equations by stagewise orthogonal matching pursuit,” March 2006, preprint.
[7]	B. Efron, T. Hastie, I. Johnstone, and R. Tibshirani, “Least angle regression,” Annals of Statistics (with discussion), vol. 32,pp. 407–499, 2004.
[8]	[Online]. Available: http://www.cs.ubc.ca/~mpf/spgl1/
[9]	Deng C.W., Lin W. S., Lee B. S. and Lau C. T., “Robust image compression based upon compressive sensing,” in Proc. IEEE Int. Conf. Multimedia and Expo. (IC-ME’10), Jul. 2010, pp. 462–467.
[10]	Ji S. , Xue Y. , and  Carin L., “Bayesian compressive sensing,” IEEE Transactions on Signal Processing, vol. 56, 2008,  pp. 2346–2356.
[11]	Said A. and Pearlman W. A., “A new, fast, and efficient image codec based on set partitioning in hierarchical trees,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 6, 1996,  pp. 243–250.
[12]	Pavithra V, Renuka Devi SMand Ganapathy Reddy Ch , "A survey of robust image coding techniques", IJCA (0975-8887),Volume No 71, No 5,May 2013,pp. 41-51
[13]	Pavithra V, Renuka Devi SM ‘An image representa-tion scheme by hybrid compressive sensing’ IEEE Asia Pacific Conference on Postgraduate Research in Microelectronics and Electronics (PrimeAsia),   19-21 December 2013
:10.22362/ijcert/2016/v3/i11/48908
DOI Link : http://www.dx.doi.org/10.22362/ijcert/2016/v3/i11/48908
Download :
  V3I1102.pdf
Refbacks : There are currently no refbacks
Multiple Encryption using ECC and Its Time Complexity Analysis
Authors : Vishal Kumar, Ratnesh Kumar, Mashud A. Barbhuiya and Monjul Saikia
Affiliations : Department of Computer Science and Engineering North Eastern Regional Institute of Science and Technology Arunachal Pradesh, INDIA
Abstract :

af

Rapid growth of information technology in present era, secure communication, strong data encryption technique and trusted third party are considered to be major topics of study. Robust encryption algorithm development to secure sensitive data is of great significance among researchers at present. The conventional methods of encryption used as of today may not sufficient and therefore new ideas for the purpose are to be design, analyze and need to be fit into the existing system of security to provide protection of our data from unauthorized access. An effective encryption/ decryption algorithm design to enhance data security is a challenging task while computation, complexity, robustness etc. are concerned. The multiple encryption technique is a process of applying encryption over a single encryption process in a number of iteration. Elliptic Curve Cryptography (ECC) is well known and well accepted cryptographic algorithm and used in many application as of today. In this paper, we discuss multiple encryptions and analyze the computation overhead in the process and study the feasibility of practical application. In the process we use ECC as a multiple-ECC algorithm and try to analyze degree of security, encryption/decryption computation time and complexity of the algorithm. Performance measure of the algorithm is evaluated by analyzing encryption time as well as decryption time in single ECC as well as multiple-ECC are compared with the help of various examples.
Citation :

af

Vishal Kumar et al. ," Multiple Encryption using ECC and Its Time Complexity Analysis”, International Journal of Computer Engineering In Research Trends, 3(11):568-572,November-2016.
Keywords : ECC, Koblitz Method, Multiple Encryption, Message Encoding, Decryption etc
References :

af

[1]	Anoop MS “Elliptic Curve Cryptography-An Implementation Guide” anoopms@tataelxsi.co.in.
[2]	Himanshu Gupta and Vinod Kumar Sharma "Multiphase Encryption: A New Concept in Modern Cryptography" IJCTE 2013 Vol.5(4): 638-640 ISSN: 1793-8201 DOI: 10.7763/IJCTE.2013.V5.765 is referred. 
[3]	William Stalling “Cryptography and Network Security” book (fourth edition).
[4]	N. Koblitz. “A Course in Number Theory and Cryptography”, Springer-Verlag, second edition, 1994.
[5]	W. Diffie and M. Hellman, “Exhaustive Cryptanalysis of the NBS Data Encryption Standard”, June 1977, pp. 74-84.
[6]	NIST Special Publication 800-78-2, “Cryptographic Algorithms and Key Sizes for Personal Identity Verification”, February 2010. 
[7]	Darrel Hankerson, Julio Lopez Hernandez, Alfred Menezes, “Software Implementation of Elliptic Curve Cryptography over Binary Fields”, 2000 
[8]	M. Brown, D. Hankerson, J. Lopez, A. Menezes, “Software Implementation of the NIST Elliptic Curves Over Prime Fields”, 2001
[9]	Certicom, “Standards for Efficient Cryptography, SEC 1: Elliptic Curve Cryptography”, Version 1.0, September 2000
[10]	Certicom, “Standards for Efficient Cryptography, SEC 2: Recommended Elliptic Curve Domain Parameters”, Version 1.0, September 2000, 
[11]	Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone, “Handbook of Applied Cryptography”, CRC Press, 1996
[12]	Data Security for e-Transaction. Retrieved on April 12th 2008, from Weblink: http://www.comp.nus.edu.sg/~jervis /cs3235/set.html
[13]	Ralph C. Merkle, Martin E. Hellman, “On the Security of Multiple Encryption, A technical note on Programming Technique & Data Structure” published in ACM, 1981, Volume 24, Number 7.
[14]	M. Saikia, S.J. Bora, Md. A. Hussain “A Review on Applications of Multimedia Encryption” in ISBN: 987-81-8487-088-6 in national conference on Network Security- issues 2010, Tezpur University
[15]	Vandana Thakur, Monjul Saikia "Comprehensive Survey of Multimedia Encryption Techniques" 26th National Conv. of Comp. Eng. held at the IEI (India), Assam February 4, 2012
[16]	Boruah, Debabrat; Saikia, Monjul, "Implementation of ElGamal Elliptic Curve Cryptography over prime field using C," International Conference on Information Communication and Embedded Systems (ICICES), 2014, vol., no., pp.1,7, 27-28 Feb. 2014
[17]	Kapoor, Vivek, Vivek Sonny Abraham, and Ramesh Singh. "Elliptic curve cryptography." Ubiquity 2008.May (2008): 7.
[18]	Merkle, Ralph C., and Martin E. Hellman. "On the security of multiple encryption." Communications of the ACM 24.7 (1981): 465-467.
[19]	Dahl, Ulf. "Data security system for a database having multiple encryption levels applicable on a data element value level." U.S. Patent No. 6,321,201. 20 Nov. 2001.
[20]	Zhang, Linhua. "Cryptanalysis of the public key encryption based on multiple chaotic systems." Chaos, Solitons & Fractals 37.3 (2008): 669-674.
[21]	Raju, G. V. S., and Rehan Akbani. "Elliptic curve cryptosystem and its applications." Systems, Man and Cybernetics, 2003. IEEE International Conference on. Vol. 2. IEEE, 2003.
[22]	Önen, Melek, and Refik Molva. "Secure data aggregation with multiple encryption." European Conference on Wireless Sensor Networks. Springer Berlin Heidelberg, 2007.
[23]	Bhati, Sunita, Anita Bhati, and S. K. Sharma. "A New Approach towards Encryption Schemes: Byte–Rotation Encryption Algorithm." Proceedings of the World Congress on Engineering and Computer Science. Vol. 2. 2012.
:10.22362/ijcert/2016/v3/i11/48907
DOI Link : http://www.dx.doi.org/10.22362/ijcert/2016/v3/i11/48907
Download :
  V3I1101.pdf
Refbacks : There are currently no refbacks

 

Locating Common Styles Based Totally On Quantitative Binary Attributes Using FP-Growth Algorithm
Authors : RAVULA KARTHEEK, B. SAMPATH BABU, CH. HARI KRISHNA
Affiliations : Assistant professor, Rise Krishna Sai Gandhi Group of Institutions: Ongole,
Abstract :

af

Discovery of frequent patterns from outsized information is taken into account as a crucial facet of data mining. There is always associate degree ever increasing demand to search out the frequent patterns. This paper introduces a technique to handle the categorical attributes associate degree numerical attributes in an economical means. Within the planned methodology, the ordinary database is reborn into quantitative information and thus it's reborn into binary values reckoning on the condition of the coed information. From the binary patterns of all attributes bestowed within the student information, the frequent patterns are known exploitation FP-growth; the conversion reveals all the frequent patterns within the student database.
Citation :

af

RAVULA KARTHEEK et al. ," Locating Common Styles Based Totally On Quantitative Binary Attributes Using FP-Growth Algorithm”, International Journal of Computer Engineering In Research Trends, 3(10):561-567,October-2016.
Keywords : Quantitative attributes, Data mining, FP-growth algorithm, frequent patterns.
References :

af

[1] Bo Wu, Defu Zhang, Qihua Lan, Jiemin Zheng ,An Efficient Frequent Patterns Mining Algorithm based on Apriori Algorithm and the FP-tree Structure Department of Computer Science, Xiamen University, Xiamen 
[2] Lei Want, Xing-Juan Fan2, Xing-Long Lot, Huan Zha Mining data association based on a revised FP-growth Algorithm Proceedings of the 2012 International Conference on Machine Learning and Cybernetics, Xian, 15- 17 July,
[3] R. Agrawal and R. Srikant. Fast algorithms for mining association rules. In VLDBY94, pp. 487-499.
[4] R. Agrawal, T. Imielinski, and A. Swami. Mining association rules between sets of items in large databases. In Proc.1993 ACM-SIGMOD Int. Conf. Management of Data, Washington, D.C., May 1993, pp 207216
[5] A. Savasere, E. Omiecinski, and S. Navathe. An efficient algorithm for mining association rules in large databases. Proceedings of the 21st International Conference on Very large Database,1995.
[6] J.S .Park ,M.S.Chen and P.S.Yu.An effective hash-based algorithm for mining association rules. In SIGMOD1995, pp 175-186.
[7] J. Han, J. Pei, and Y. Yin. Mining Frequent Patterns without Candidate Generation(PDF), (Slides), Proc. 2000 ACM-SIGMOD Int. May 2000.
[8] A.B.M.Rezbaul Islam, Tae-Sun Chung An Improved Frequent Pattern Tree Based Association Rule Mining Techniques Department of Computer Engineering Ajou University Suwon, Republic of Korea
[9] Agarwal R,Aggarwal C,Prasad V V V.A tree projection algorithm for generation of frequent item sets. In Journal of Parallel and Distributed Computing (Special Issue on High-Performance Data Mining),2000
[10] E. Ramaraj and N. Venkatesan, ― Bit Stream Mask Search Algorithm in Frequent Itemset Mining,‖ European Journal of Scientific Research,‖ Vol. 27 No.2 (2009).
[11] Qihua Lan, Defu Zhang, Bo Wu ,A New Algorithm For Frequent Itemsets Mining Based On Apriori And FP-Tree,Department of Computer Science, Xiamen University, Xiamen China 2009 IEEE
:under process
DOI Link : Not yet assigned
Download :
  V3I1005.pdf
Refbacks : There are currently no refbacks
Design of DC-DC Boost Converter in CMOS 0.18µm Technology
Authors : M.RAMA DEVI, R.SUNIL KUMAR, M.MADHAVA KUMAR
Affiliations : Gayatri Vidya Parishad College of Engineering for Women, Visakhapatnam, Andhra Pradesh, India.
Abstract :

af

A CMOS DC-DC boost converter with fastest settling time and less quiescent current with a feedback control is implemented. An extra path is introduced because of an error amplifier (OTA) which has an effective control for fast response. Efficient compensation with soft-start is used to make the quiescent current low. An on-chip current sensing circuit is introduced with less number of I/O pins for current mode control. In this project, the DC-DC boost converter is designed in Cadence virtuoso 0.18µm technology with a 5V supply. With a wide range of loads, it provides 25V at the output, 50mA load current with 90% efficiency. The circuit is operated at 500 KHz clock frequency with output ripple voltage of 20mV by using 4.7µF off-chip capacitor and 75µH off-chip inductor.
Citation :

af

M.Rama Devi et al. ," Design of DC-DC Boost Converter in CMOS 0.18µm Technology”, International Journal of Computer Engineering In Research Trends, 3(10):554-560,October-2016.
Keywords : DC-DC Boost converter, operational Tran’s conductance amplifier (OTA), comparator, pulse width generator, compensator, current sensing circuit, oscillator and ramp generator circuit
References :

af

[1]	Ned Mohan, Tore M. Undeland, William P. Robbins, “Power Electronics: Converters, Applications, and Design”, 3rd Edition, Wiley.
[2]	Robert W Erickson, Fundamentals of Power Electronics, International Thomson Publishing (1997)
[3]	C. F. Lee and P. K. T. Mok, “A monolithic current-mode CMOS DC-DC converter with on-chip current-sensing technique,” IEEE J. Solid-state Circuits, vol. 39, no. 1, pp. 3–14, Jan. 2004.
[4]	Yushan Li, Kevin R. Vannorsdel, Art J. Zirger, Mark Norris, and DraganMaksimovi´c, “Current Mode Control for Boost Converters with Constant Power Loads,” in IEEE Transactions on Circuits and Systems-I: Regular Papers, vol. 59, no. 1, pp. 198-206, January 2012.
[5]	Weiwei Huang,Xiao Yang,Chaodong Ling,”Novel current sensing circuit for boost DC-DC converter”
[6]	Kalpesh B. Pandya, Kehul A. shah “Performance Evaluation of Different Types of CMOS Operational Transconductance Amplifier” International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064.
[7]	HyunseokNam,InseokKim,YoungkookAhn,andJeongjinRoh,”A High efficiency Boost converter for TFT-LCD bias supply”, THE 23rd  international Technical conference on circuits/systems, computers and communications (ITC-CSCC 2008).
:10.22362/ijcert/2016/v3/i10/48905
DOI Link : http://www.dx.doi.org/10.22362/ijcert/2016/v3/i10/48905
Download :
  V3I1004.pdf
Refbacks : There are currently no refbacks
Human Activity Recognition Using Smartphone and Smartwatch
Authors : Hamid M. Ali, Ali M. Muslim,
Affiliations : Computer Engineering Dept., Baghdad University, Iraq
Abstract :

af

Human activity recognition is influential subject in different fields of human daily life especially in the mobile health. As the smartphone becomes an integrated part of human daily life which has the ability of complex computation, internet connection and also contains a large number of hardware sensors, encourage implementation of the human activity recognition system. Most of the works done in this field imposed the restriction of firmly fixing the smartphone in a certain position on the human body, together with machine learning mechanism, to facilitate the process of classifying human activities from the smartphone sensors raw data. To overcome this restriction, the proposed approach incorporated a smartwatch, fixed on the human ankle, together with smartphone freely carried by the user. The use of smartwatch assisted in providing distinct separable signal variation from the smartwatch accelerometer and gyroscope sensors raw data which in turn facilitated the use of a threshold-based mechanism to classify 20 various human activities. Furthermore, this work provides a service for remotely real-time monitoring of the user human activities. The system is tested with different subjects and achieved an accuracy of 97.5%.
Citation :

af

Hamid M. Ali et al. ," Human Activity Recognition Using Smartphone and Smartwatch”, International Journal of Computer Engineering In Research Trends, 3(10):568-576,October-2016. DOI:10.22362/ijcert/2016/v3/i10/48906
Keywords : Real-time monitoring, human activity recognition, threshold-based mechanism, mHealth, smartphone, and smartwatch.
References :

af

[1] 	S. Adibi, "Introduction," in Mobile Health A Technology Road Map, Springer International Publishing Switzerland, 2015, p. 1.
[2] 	R. Amin, C. Chien-An and L. Yan, "Human Activity Recognition using Smartphone," CSCE666, 2011.
[3] 	K. Mustafa, I. Ozlem Durmaz and E. Cem, "Online Human Activity Recognition on Smart Phones," in 2nd International Workshop on Mobile Sensing, Beijing, China, 2012. 
[4] 	H. Yi and L. Ye, "Physical Activity Recognition Utilizing the Built-In Kinematic Sensors of a Smartphone," International Journal of Distributed Sensor Networks, vol. 9, no. 1550-1477, p. 10, 2013. 
[5] 	A. Davide, G. Alessandro, O. Luca, P. Xavier and L. R.-O. Jorge, "A Public Domain Dataset for Human Activity Recognition Using Smartphones," in European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning, Bruges Belgium, ESANN, 2013, pp. 437-442.
[6] 	Y. Bingchuan, H. John and E. Yalda, "Smartphone-based Activity Recognition Using Hybrid Classifier-Utilizing Cloud Infrastructure for Data Analysis," in Proceedings of the 4th International Conference on Pervasive and Embedded Computing and Communication Systems, Lisbon, Portugal, 2014. 
[7] 	T. H. Cesar and A. L. Andres, "Accelerometer-Based Human Activity Recognition in Smartphones for Healthcare Services," in Mobile Health A Technology Road Map, Springer International Publishing Switzerland, 2015, p. 147.
[8] 	D. Natarajasivan and M. Govindarajan, "Filter Based Sensor Fusion for Activity Recognition using Smartphone," International Journal of Computer Science and Telecommunications, vol. 7, no. 5, pp. 26-31, 2016. 
:10.22362/ijcert/2016/v3/i10/48906
DOI Link : http://www.dx.doi.org/10.22362/ijcert/2016/v3/i10/48906
Download :
  V3I1006.pdf
Refbacks : There are currently no refbacks
Secure data hiding Using Robust Firefly Algorithm
Authors : Ms.Ankita Kadu, Prof.Arun Kulkarni, Prof.Deepali Patil
Affiliations : Computer Engineering Department ,Shree L.R.Tiwari College of Engineering,Mumbai,India
Abstract :

af

In recent times a lot of work has been carried out in the field of reversible data hiding (RDH) to prevent the secret data from theft, illegal copying and to provide copyright protection. In RDH the cover image will be recovered after extracting the secret data which was inserted in that image. This paper presents a new technique in reversible data hiding technique based on robust Firefly algorithm. The optimal location to hide the secret data will be found by firefly algorithm. The image scrambling is applied by Framelet Transform to prevent perceptual visibility of embedded secret image signal which increase the security level.2D bilateral filter is used to filter the image after hidden the secret information. The decomposition is done with Haar which is humble, symmetric and orthogonal wavelet and the direct weighting factor is used in secret embedding and extraction process.
Citation :

af

Ankita Kadu et al. ," Secure data hiding Using Robust Firefly Algorithm”, International Journal of Computer Engineering In Research Trends, 3(10):550-553,October-2016.
Keywords : Reversible data hiding techniques, Robust Firefly algorithm ,DWT, image denoising.
References :

af

[1]	A. Amsaveni and C. Arun kumar,”An Efficient Data Hiding Scheme Using Firefly                            Algorithm in Spatial Domain”, IEEE sponsored 2nd international conference on electronics and communication system, 2015.

[2]	M. Manju and Dr.V.Kavitha,” Survey on Reversi-ble Data Hiding Techniques”, International Journal of Security and Its Applications Vol.8, No.4 (2014), pp.297-306.

[3]	Princy Raj and Sreekumar K,” A Survey on Re-versible Data Hiding in Encrypted Image”, Inter-national Journal of Computer Science and Infor-mation Technologies, Vol. 5 (6), 2014, 7748-7751.

[4]	Ya-Fen Chang and Wei-Liang Tai, ”Histogram-based Reversible Data Hiding Based on Pixel Differences with Prediction and Sorting”, Ksii Transactions On Internet And Information Systems Vol. 6, No. 12, Dec 2012.

[5]	Kede Ma, Weiming Zhang and Xianfeng Zhao,” Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption”, IEEE Transactions on Information Forensics and Security, Vol. 8, No. 3, March 2013.

[6]	Shruti Goel , V. K. Panchal,” Performance Evaluation of a New Modified Firefly Algorithm” IEEE 978-1-4799-6896-1/14,2014.

[7]	Jiantao Zhou, Xianming Liu,” Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation”, IEEE Transactions on Circuits And Systems for Video Technology, 2015.

[8]	S.Sulochana and R.Vidhya, ”Texture Based Image Retrieval Using FrameletTransform–Gray Level Co-occurrence Matrix(GLCM)”, International Journal of Advanced Research in Artificial Intelligence, Vol. 2, No. 2, 2013.

[9]	Ming Zhang and Bahadir K. Gunturk,” Multiresolution Bilateral Filtering for ImageDenoising”, IEEE Transactions on Image Processing, Vol. 17, No. 12, December 2008.

[10]	Shivani Sharma and Gursharanjeet Singh Kalra,”An Image Denoising Framework with Multi-resolution Bilateral Filtering and Normal Shrink Approach” Research Journal of Applied Sciences, Engineering and Technology 7(6): 1054-1060, 2014 ISSN: 2040-7459, e-ISSN: 2040-7467.

[11]	Sushil Kumar,”A Comparative Study of Trans-form Based on Secure Imag Steganography”, ijc-ce.2015.v4.389, December 16, 2014.

:
DOI Link : Not yet assigned
Download :
  V3I1003.pdf
Refbacks : There are currently no refbacks.
Accident Tracking and Visual Sharing Using RFID and SDN
Authors : Ms.Alpana Gopi , Ms.Litty Rajan , Ms.Surya Rajan ,Ms.Divya P R and Mrs.Shini Renjith
Affiliations : Department of Computer Science and Engineering, SBCE, Pattoor
Abstract :

af

In this era, many situations request tracking systems. GPS can be used for location tracking, but it has some limitations. By analyzing the problems of using GPS for location tracking, RFID technology integrated with SDN for vehicle tracking has put forward in this paper. In case of road accidents RFID can be used to track the vehicle thereby the authority get information about the vehicle and its owner. With the help of SDN visual sharing is also possible which is useful in case of getting accident claims. This system overcomes the limitations of vehicle tracking using GPS. The main goal of this paper is complete solution architecture for locating, tracking and informing the authority in the right time when accidents are detected.
Citation :

af

Alpana Gopi et al. ," Accident Tracking and Visual Sharing Using RFID and SDN”, International Journal of Computer Engineering In Research Trends, 3(10):544-549, October-2016.
Keywords : IoT, RFID, SDN, Tracking, Visual Sharing.
References :

af

[1]	Tracking and localization system using android mobile phones by AdellePuscasium, Alexander Fanca, HonoriuValean, IEEE journal on mobile computing, 2016 

[2]	   Smart Sensing Material for low cost chip less RFID sensor by EmranMd Amin, Student Member, IEEE, Jhantu Kumar Saha, and Nemai Chandra Karmakar, Senior Member, IEEE sensor journal on IoT,July 2014. 

[3]	 Cyber physical vehicle tracking system: Requirements for using Radio Frequency Identification Technique, Dietmar P.F. Möller,Tatiana Deriyenko, Hamid Vakilzadian, IEEE Conference paper on IoT 

[4]	  Software defined Home Networking Devices for Multi-home Visual Sharingfor Multi-home Visual Sharing.Jinyong Jo, Soyeon Lee, and JongWon Kim, Senior Member, IEEE transaction on Consumer Electronics 2014 

[5]	  H. Kim and N. Feamster, “Improving network management with software defined networking,” IEEE Communications Magazine, vol. 51,no. 2, pp. 114-119, Feb. 2013. 

[6]	   J. Jo, S. Lee, and J. Kim, “Programmable IP service  gateway for software defined networking: assisting easy composition of service overlays,” IEICETrans. Comms., vol. 96-B, no. 7, pp. 1918-1929, July 2013.   
                                                                                                                                                                                                                                                   
[7]	R. Mortier, T. Rodden, T. Lodge, D. McAuley, C. Rotsos, A.W. Moore,A. Koliousis, and J. Sventek, “Control and understanding: owning yourhome network,” in Proc. IEEE International Conference onCommunication System and Networks, pp. 1-10, Jan. 2012.

[8]	B.A. Miller, T. Nixon, C. Tai, and M.D. Wood, “Home networking withuniversal plug and play,”IEEE Communications Magazine, vol. 39, no.12, pp. 104-109, Dec. 2001.

[9]	N.Randolph, D.Gardner, C.Anderson,    M.Minutilloe, Proffessional Visual Studio, Wrox Programmer to Programmer, 2010.

[10]	 R. Meyer, Proffessional Android Development (Wrox Programmer to Programmer), John Wiley & Sons,2008.

[11]	 F. Xia, J: Ma: Building Smart Communities with Cyber-Physical Systems. In: 13th ACM International Conference onUbiquitous Computing Symposium on Social andCommunity Intelligence, Beijing, China, pp: 1-6, September 2011.
 
[12]	Cyber-Physical Systems Summit Report, http://varma.ece.cmu-edu/summit/, 2008.
 
[13]	Development of a Low Cost Printable Chipless RFID Humidity Sensor by Emran Md. Amin, Student Member, IEEE, Md. ShakilBhuiyan, Student Member, IEEE, Nemai C. Karmakar, Senior Member, IEEE, and BjørnWinther-Jensen 2014.
 
[14]	Metamaterial-inspired passive chipless radio-frequency identification and wireless sensing,C.Mandel, B. Kubina, M. Schüßler, and R. Jako, Ann. Telecommun., vol. 68, nos. 7–8, pp. 385–399, 2013. [15] Chipless RFID: Bar code of the future,S. Preradovic and N. C. Karmakar, IEEE Microw. Mag., vol. 11, no. 12, pp. 87–97, Dec. 2010

:Not Yet Assigned
DOI Link : Not Yet Assigned
Download :
  V3I1002.pdf
Refbacks : There are currently no refbacks.
Computer Science Technology: Tutor, Tool and to explore Language Teaching
Authors : Dr.G. Mohana Charyulu, Prof. S. Venkateswarlu, Dr. DBK Kamesh and Ms.S.Sreelekha
Affiliations : Associate Professor & RPAC Chairman, Dept. of English K L University, A.P
Abstract :

af

Computer Technology is now being used in all facets of Teaching in English language classroom. It gives wide range of scope for discussions on usage of Computer Technology in Language class room. The application of Technology on Language study raises questions like what role should these technology plays in Teaching and Learning. This paper discusses the Application of Computer Technology in Language Class room with different roles. As there are many roles to play, this paper limits only to Computer Technology as Tutor, Tool and Ways to explore language.
Citation :

af

Dr.G. Mohana Charyulu et al. ," Computer Science Technology: Tutor, Tool and to explore Language Teaching”, International Journal of Computer Engineering In Research Trends, 3(10):540-543, October-2016.
Keywords : Computer Technology, Language Class room, applications, roles and limits
References :

af

1. Turkle, S. (1984). The second self: Computers and the human spirit. New York: Simon & Schuster

2. Knapp, L. R. (1986). The word processor and the writing teacher. Englewood Cliffs, NJ: Prentice-Hall.

3. Warren, B., & Rosebery, A. S. (1988). Theory and practice: Uses of the computer in reading. Remedial and Special Education, 9, 29-38.

4. McConkie, G. W., & Zola, D. (1985). Computer aided reading: An environment for developmental research. Paper presented at the Society for Research on Child Development, Toronto, Canada.

5. Marcus, S., & Blau, S. (1983, April). Not seeing is relieving: Invisible writing with computers.Educational Technology, 11, 12-15.
:10.22362/ijcert/2016/v3/i10/48903
DOI Link : http://www.dx.doi.org/10.22362/ijcert/2016/v3/i10/48903
Download :
  V3I1001.pdf
Refbacks : There are currently no refbacks.

 

GSM Based Patient Monitoring System using biomedical sensors
Authors : S.Ummay Atiya, K.Swarna Madhuri,
Affiliations : Assistant professor in the dept. of ECE, RECW, Kurnool ,Assistant professor in the dept. of ECE, RECW, Kurnool
Abstract :

af

The main theme of the paper is to continuously monitor the patient health parameters like ECG, Heartbeat, Blood Pressure, Temperature etc. by using different sensors and also used to track the location of the patient. The message regarding the condition of the patient is received by the doctor or any other person who takes care of the patient. Sensors like heart beat sensor, temperature sensor are interfaced with the microcontroller (ARDUINO). The location of the patient can be identified by using GPS(Global Position System) which is space -based navigation system that provides data in all the climate conditions. In the event that the parameters of the patient vary abnormally, the message is being sent to the doctor through the GSM module, indicating the patient’s condition along with his location. All the parameter data of the patient are visualized by using LCD display.
Citation :

af

S.Ummay Atiya,K.Swarna Madhuri," GSM Based Patient Monitoring System using biomedical sensors”, International Journal Of Computer Engineering In Research Trends, 3(9):620-624,September-2016.
Keywords : Arduino, Biomedical sensors: Temperature, Heartbeat, Blood pressure, GSM, GPS modules.
References :

af

•	www.national.com
•	www.atmel.com
•	www.microsoftsearch.com
REFERENCE PAPERS
[1] Chaya Khandelwal S. and Manish Patil M., Implementation of Patient Monitoring System Using GSM Technology, International Journal of Electronics and Communication technology, 4(1) 18-24 (2013). 
[2] Qun Hou, Research and Implementation of Remote Heart Rate Monitoring System Based on GSM and MCU, Institute of Electrical and Electronics Engineers, 978-1-4244- 7618-3 (2010). 
[3] Edwards S., Heart rate Monitor Book”, Leisure systems international, 1(3), 122-134 (1993) 
[4] Chiranjeevini Kumari B. and Rajasekar K., Implementation of SMS based Heartbeat monitoring system using PSoC Microcontroller, 2230-7109, International Journal of Electronics and Communication technology, 2(1), (2011) 
[5] Mohammad Ari Mazidi and Janci Gillispie, the 8051 Microcontroller and Embedded Systems, (2), 5-17 (2007) [6] Lee. W.C.Y, Mobile Cellular Telecommunications, (2), 463-467 (1995) .
:10.22362/ijcert/2016/v3/i09/3914
DOI Link :
Download :
  V3I914.pdf
Refbacks : There are currently no refbacks
Mining Opinion Features in Customer Reviews
Authors : Havinash P.H, Jeril Johnson N, Glen Thomas and Emily Stephen P
Affiliations :
Abstract :

af

Now days, E-commerce systems have become extremely important. Large numbers of customers are choosing online shopping because of its convenience, reliability, and cost. Client generated information and especially item reviews are significant sources of data for consumers to make informed buy choices and for makers to keep track of customer’s opinions. It is difficult for customers to make purchasing decisions based on only pictures and short product descriptions. On the other hand, mining product reviews has become a hot research topic and prior researches are mostly based on pre-specified product features to analyse the opinions. Natural Language Processing (NLP) techniques such as NLTK for Python can be applied to raw customer reviews and keywords can be extracted. This paper presents a survey on the techniques used for designing software to mine opinion features in reviews. Elven IEEE papers are selected and a comparison is made between them. These papers are representative of the significant improvements in opinion mining in the past decade.
Citation :

af

Havinash P.H et al. ," Mining Opinion Features in Customer Reviews”, International Journal of Computer Engineering In Research Trends, 3(9):535-539, September-2016.
Keywords :
References :

af

 
:10.22362/ijcert/2016/v3/i9/48875
DOI Link :
Download :
  V3I913.pdf
Refbacks :
Light Dimmer with Implementation of Data Abstraction While Crashing
Authors : Ansa Babu, Anu Joseph, Filiya Francis and Krishnadas J
Affiliations :
Abstract :

af

The paper proposes a system to automatically dim the headlight of opposite vehicles by changing from high beam to low beam. The system envisioned is automatic collision avoidance and detection. Many methods are available to dim the headlight of vehicles. In the earlier days dip mechanism was used. Similarly there are several mechanisms for automatic accident detection. An automatic alarm gadget for traffic accidents is presented. It can consequently discover a car crash; hunt down the spot and after that send the essential data to hospitals. This system will highly aid the search and rescue of vehicles that have met with an accident.
Citation :

af

Ansa Babu et al. ," Light Dimmer with Implementation of Data Abstraction While Crashing”, International Journal of Computer Engineering In Research Trends, 3(9):530-534, September-2016.
Keywords :
References :

af

 
:10.22362/ijcert/2016/v3/i9/48874
DOI Link :
Download :
  V3I912.pdf
Refbacks :
Customer Behavior towards Purchasing Mutual Fund- A Study of Dehradun City
Authors : Monirul Islam , ,
Affiliations : --
Abstract :

af

Mutual Fund is a retail product designed to target small investors, salaried people and others who are intimidated by the mysteries of stock market but, nevertheless, like to reap the benefits of stock market investing. At the retail level, investors are unique and are a highly heterogeneous group. Hence, their fund/scheme selection also widely differs. Investors demand inter-temporal wealth shifting as he or she progresses through the life cycle. This necessitates the Asset Management Companies (AMCs) to understand the fund/scheme selection/switching behavior of the investors to design suitable products to meet the changing financial needs of the investors. With this background a survey was conducted among 200 Mutual Fund Investors in Dehradun city to study the factors influencing the fund/scheme selection behavior of Retail Investors. This paper discusses the survey findings. It is hoped that it will have some useful managerial implication for the AMCs in their product designing and marketing. Now mutual fund industry is facing competition not only from within the industry but also from other financial products that may provide many of the same economic functions as mutual funds but are not strictly MFs, and in this research project it is discussed which financial product customer like most and the reason why an investor wants that financial product and the reason found with the help of the survey conducted.
Citation :

af

Monirul Islam," Customer Behavior towards Purchasing Mutual Fund- A Study of Dehradun City”, International Journal of Computer Engineering In Research Trends, Volume 3, Issue 9, September-2016, pp. 521-529
Keywords : Mutual Fund, Asset Management Companies (AMCs), financial institutions, investment portfolio
References :

af

[1] Anjan Chakrabarti and Harsh Rungta, 2000,
“Mutual Funds Industry in India: An indepth look
into the problems of credibility, Risk and Brand”,
The ICFAI Journal of Applied Finance, Vol.6, No.2,
April, 27-45.
[2] De Bondt, W.F.M. and Thaler, R, 1985, “Does the
stock market over react?” Journal of Finance, 40,
793-805
[3] Gupta, L.C., 1994, Mutual Funds and Asset
Preference, Society for Capital Market Research and
Development, Delhi.
[4] Helena Agnes S. Valderrama and Carlos C. Bautista
University of the Philippines December 2003, “The
Development and Performance of the Philippine Mutual Funds Industry” in the context of
Philippines.
[5] Ippolito, R., 1992, “Consumer reaction to measures
of poor quality : Evidence from Mutual Funds”,
Journal of Law and Economics, 35, 45-70.
[6] Kavitha Ranganathan (M.Phil- Commerce),
Maduri Kamaraj University, “A study of fund
selection behavior of individual investor towards
Mutual Fund”, in context of Mumbai City.
[7] Madhusudan V. Jambodekar, 1996, Marketing
Strategies of Mutual Funds – Current Practices
and Future Directions, Working Paper, UTI – IIMB
Centre for Capital Markets Education and
Research, Bangalore.
[8] Raju, September 2006, “Mutual Fund Investment
Preferred or Induced?” Portfolio Organizer Vol. ..
No. , 33-40.
[9] Shankar, V., 1996, “Retailing Mutual Funds: A
consumer product model”, The Hindu, July 24, 26.
[10] Shanmugham, R., 2000, “Factors Influencing
Investment Decisions”, Indian Capital Markets –
Trends and Dimensions (ed.), Tata McGraw-Hill
Publishing Company Limited, New Delhi, 2000.
[11] Sujit Sikidar and Amrit Pal Singh, 1996, Financial
Services : Investment in Equity and Mutual Funds
– A Behavioural Study, in Bhatia B.S., and Batra
G.S., ed., Management of Financial Services, Deep
and Deep Publications, New Delhi, Chapter 10,
136-145.
[12] Syama Sundar, P.V., 1998, “Growth Prospects of
Mutual Funds and Investor perception with
special reference to Kothari Pioneer Mutual
Fund”, Project Report, Sri Srinivas Vidya Parishad,
Andhra University, Visakhapatnam.
[13] T.R. Rajeswari (Ms. T.R. Rajeswari & Prof. V.E.
Rama Moorthy), “ An Empirical Study On Factor
Influencing The Mutual Fund/ Scheme Selection
By Retail Investor”
WEBSITES
I. www.amfiindia.com
II. www.capitalmarket.com
III. www.mutualfundindia.com
IV. www.valueresearch.com
:10.22362/ijcert/2016/v3/i9/48902
DOI Link : http://www.dx.doi.org/10.22362/ijcert/2016/v3/i9/48902
Download :
  V3I911.pdf
Refbacks : There are currently no refbacks.
Classification of Concept Drifting Data Streams Using Adaptive Novel-Class Detection
Authors : Ms. Aparna Yeshwantrao Ladekar, Dr. M.Y. Joshi,
Affiliations : MGM’s College of Engineering, SRTMUN University, Nanded
Abstract :

af

In data stream classification there are many problems observed by the data mining community. Four major problems are addressed, such as, concept-drift, infinite length, feature-evolution and concept-evolution. Concept-drift occurs when underlying concept changes which is common in data streams. Practically it is not possible to store and use all data for training purpose whenever required due to infinite length of data streams. Feature evolution frequently occurs in many text streams. In text streams new features like words or phrases may occur when stream progresses. New classes evolving in the data stream which occurs concept-evolution as a result. Most existing classification techniques of data stream consider only the first two challenges, and ignore the latter two. Classification of concept-drifting data stream using adaptive novel-class detection approach is used to solve concept-drift and concept-evolution problem where novel-class detector is maintained with classifier. Novel-class detector is more adaptive to the dynamic and evolving data streams. It enables to detect more than one novel-class simultaneously. This approach solves feature-evolution problem by using feature set homogenization technique. Experiments done on Twitter data set and got reduced ERR rate and increased detection rate as a result. This approach is very effective as compared with existing data stream classification techniques
Citation :

af

Aparna Yeshwantrao Ladekar et.al ," Classification of Concept Drifting Data Streams Using Adaptive Novel-Class Detection”, International Journal of Computer Engineering In Research Trends, Volume 3, Issue 9, September-2016, pp. 514-520
Keywords : — Concept-drift, concept-evolution, data streams, novel-class, outlier
References :

af

[1] Mohammad M. Masud, Member, IEEE, Qing Chen, Member, IEEE,
Latifur Khan, Senior Member, IEEE, Charu C. Aggarwal, Fellow,
IEEE, Jing Gao, Member, IEEE, Jiawei Han, Fellow, IEEE, Ashok
Srivastava, Senior Member, IEEE, and Nikunj C. Oza, Member,
IEEE,” Classification and Adaptive Novel-class Detection of Feature-Evolving
Data Streams,” IEEE Transactions on Knowledge
and Data Engineering, vol. 25, no. 7, July 2013.
[2] M.M. Masud, Q. Chen, J. Gao, L. Khan, J. Han, and B.M.
Thuraisingham, “Classification and Novel-class Detection of Data
Streams in a Dynamic Feature Space,” Proc. European
Conf.Machine Learning and Knowledge Discovery in Databases
(ECML PKDD), pp. 337-352, 2010.
[3] M.M. Masud, J. Gao, L. Khan, J. Han, and B.M. Thuraisingham,
“Integrating Novel-class Detection with Classification for ConceptDrifting
Data Streams,” Proc. European Conf. Machine Learning
and Knowledge Discovery in Databases (ECML PKDD), pp. 79-94,
2009.
[4] A. Bifet and R. Kirkby. Data stream mining − a practical approach.
 http://moa.cs.waikato.ac.nz/downloads/.
[5] M.M. Masud, Q. Chen, L. Khan, C. Aggarwal, J. Gao, J. Han, and
B.M. Thuraisingham, “Addressing Concept-Evolution in ConceptDrifting
Data Streams,” Proc. IEEE Int’l Conf. Data Mining (ICDM),
pp. 929-934, 2010.
[6] G. Hulten, L. Spencer, and P. Domingos, “Mining Time-Changing
Data Streams,” Proc. ACM SIGKDD Seventh Int’l Conf. Knowledge
Discovery and Data Mining, pp. 97-106, 2001.
[7] Christopher D. Manning, Prabhakar Raghavan & Hinrich Schütz,
“Introduction to Information Retrieval,” e, 2008.
[8] “Stemming”, http://en.wikipedia.org/wiki/Stemming.
[9] M.F.Porter, “An algorithm for suffix stripping,” Computer Laboratory,
Cambridge.
[10] E.J.Spinosa, A.P. de Leon F. de Carvalho, and J. Gama, “ClusterBased
Novel Concept Detection in Data Streams Applied to Intrusion
Detection in Computer Networks,”Proc. ACM Symp. Applied
Computing (SAC), pp. 976-980, 2008.
[11] I. Katakis, G. Tsoumakas, and I. Vlahavas, “Dynamic Feature Space
and Incremental Feature Selection for the Classification of Textual
Data Streams, ” Proc. IntlWorkshop Knowledge Discovery from
Data Streams (ECML/PKDD), pp. 102-116, 2006.
[12] M.M. Masud, J. Gao, L. Khan, J. Han, and B.M. Thuraisingham,
“Classification and Novel-class Detection in Concept-Drifting Data
Streams under Time Constraints,” IEEE Trans. Knowledge and Data
Eng., vol. 23, no. 6, pp. 859-874, June 2011.
[13] B.Wenerstrom and C.Giraud-Carrier, “Temporal Data Mining in
Dynamic Feature Spaces,” Proc. Sixth Int’l Conf. Data Mining
(ICDM), pp. 1141-1145, 2006.
[14] W. Fan, “Systematic Data Selection to Mine Concept-Drifting Data
Streams,” Proc. ACM SIGKDD 10th Int’l Conf. Knowledge Discovery
and Data Mining, pp. 128-137, 2004. 
:10.22362/ijcert/2016/v3/i9/48901
DOI Link : http://www.dx.doi.org/10.22362/ijcert/2016/v3/i9/48901
Download :
  V3I910.pdf
Refbacks : There are no ref
Relational Database to NoSQL Conversion by Schema Migration and Mapping
Authors : Neelima Kuderu, Dr. Vijaya Kumari,
Affiliations : JNTUH, Hyderabad
Abstract :

af

In pc software development, migration from a Data Base Management System (DBMS) to NOSQL, specifically applications like material administration systems with distinct attributes is a challenge for coders and database directors. Changes in the application rule in purchase to comply with new DBMS tend to be generally vast, causing migrations infeasible. In order to tackle this problem that is nagging we present RDBDMS-to-NoSQL by schema migration and query mapping to help conveniently migrating from relational DBMS to NoSQL DBMS. This framework is presented in two components: (1) schema mapping by reverting the forms that are regular, (2) mapping SQL query to NoSQL. Initial one is a set of practices enabling migration that is smooth relational DBMS to NOSQL DBMS. The latter provides a persistence layer to process database needs, becoming capable to translate and execute these demands in any DBMS, going back the information in a format that is suitable really. Experiments shown that the proposed design is scalable and robust to manage volume that is huge of of applications such CMS that contrasted to conventional relational DBMS techniques.
Citation :

af

Neelima Kuderu et.al ," Relational Database to NoSQL Conversion by Schema Migration and Mapping”, International Journal of Computer Engineering In Research Trends, Volume 3, Issue 9, September-2016, pp. 506-513
Keywords : Big Data, RDBMS, NoSQL, SQL, Schema Migration, SQL Mapping, CMS, Denormalization
References :

af

[1] S. Lombardo, E. Di Nitto, and D. Ardagna, "Issues in Handling
Complex Data Structures with NoSQL Databases,"
Proceedings of the 14th International Symposium on
Symbolic and Numeric Algorithms for Scientific Computing
(SYNASC), pp. 443-448, Sept. 2012
[2] Yishan Li and S. Manoharan, "A performance comparison of
SQL and NoSQL databases," Proceedings of IEEE Pacific Rim
Conference on Communications, Computers and Signal
Processing (PACRIM), pp. 15- 19, Aug. 2013.
[3] A. Boicea, F. Radulescu, and L.I. Agapin, "MongoDB vs Oracle -
- Database Comparison," Proceedings of The 3rd International
Conference on Emerging Intelligent Data and Web
Technologies (EIDWT), pp.330- 335, Sept. 2012.
[4] K. Grolinger, M. Hayes, W.A. Higashino, A. L'Heureux, D.S.
Allison, and M.A.M. Capretz, "Challenges for MapReduce in
Big Data," Proceedings of IEEE World Congress on Services
(SERVICES), pp.182- 189, Jun. 2014.
[5] W. Naheman and Jianxin Wei, "Review of NoSQL databases
and performance testing on HBase," Proceedings of
International Conference on Mechatronic Sciences, Electric
Engineering and Computer (MEC), pp. 2304-2309, Dec. 2013.
[6] M. Scavuzzo, E. Di Nitto, and S. Ceri, "Interoperable Data
Migration between NoSQL Columnar Databases,"
Proceedings of IEEE 18th International Enterprise Distributed
Object Computing Conference Workshops and
Demonstrations (EDOCW), pp.154-162, Sept. 2014.
[7] Jen-Chun Hsu, Ching-Hsien Hsu, Shih-Chang Chen, and YehChing
Chung, "Correlation Aware Technique for SQL to
NoSQL Transformation," Proceedings of the 7th International
Conference on Ubi-Media Computing and Workshops
(UMEDIA), pp. 43-46, Jul. 2014.
[8] Gansen Zhao, Libo Li, Zijing Li, and Qiaoying Lin, "Multiple
Nested Schema of HBase for Migration from SQL,"
Proceedings of 9th International Conference on P2P, Parallel,
Grid, Cloud and Internet Computing (3PGCIC), pp.338-343,
Nov. 2014.
[9] Gansen Zhao, Qiaoying Lin, Libo Li, and Zijing Li, "Schema
Conversion Model of SQL Database to NoSQL," Proceedings
of 9th International Conference on P2P, Parallel, Grid, Cloud
and Internet Computing (3PGCIC), pp.355-362, Nov. 2014. 
[10] R. Sellami, S. Bhiri, and B. Defude, "ODBAPI: A Unified REST
API for Relational and NoSQL Data Stores," Proceedings of
IEEE International Congress on Big Data (BigData Congress),
pp.653-660, Jun. 2014.
[11] Xiang Li, Zhiyi Ma, and Hongjie Chen, "QODM: A queryoriented
data modeling approach for NoSQL databases,"
Proceedings of IEEE Workshop on Advanced Research and
Technology in Industry Applications (WARTIA), pp.338-345,
Sept. 2014.
[12] A. Gadkari, V.B. Nikam, and B.B. Meshram, "Implementing
Joins over HBase on Cloud Platform," Proceedings of IEEE
International Conference on Computer and Information
Technology (CIT), pp. 547- 554, Sept. 2014.
[13] Zhou Wei, G. Pierre, and Chi-Hung Chi, "Scalable Join Queries
in Cloud Data Stores," Proceedings of the 12th IEEE/ACM
International Symposium on Cluster, Cloud and Grid
Computing (CCGrid), pp.547- 555, May 2012.
[14] R. Lawrence, "Integration and Virtualization of Relational SQL
and NoSQL Systems Including MySQL and MongoDB,"
Proceedings of International Conference on Computational
Science and Computational Intelligence (CSCI), pp.285-290,
Mar. 2014.
[15] D. Van Hieu, S. Smanchat, and P. Meesad, "MapReduce join
strategies for key-value storage," Proceedings of the 11th
International Joint Conference on Computer Science and
Software Engineering (JCSSE), pp.164-169, May 2014.
[16] Mysql proxy. http://dev.mysql.com/refman /5.6/en/mysqlproxy.html.
Accessed:2014-09-24.
[17] Roberto Ierusalimschy, Luiz Henrique de Figueiredo, and
Waldemar Celes Filho. Lua—an: Ex-tensible extension
language. Softw. Pract. Exper., 26(6):635–652, June 1996.
[18] Jsql parser. http://jsqlparser.sourceforge.net/. Accessed:2014-
09-24.
[19] Mongodb mapping chart. http://docs.mongodb.org/
manual/reference/sql-comparison. Accessed:2014-09-24.
:10.22362/ijcert/2016/v3/i9/48900
DOI Link : http://www.dx.doi.org/10.22362/ijcert/2016/v3/i9/48900
Download :
  V3I909.pdf
Refbacks : There is no refbacks
Cryptographic Protocol Based Laurel System for Multi agent Distributed Communication
Authors : Sreedhar Jyothi, Dr. A. Damodar,
Affiliations : JNTU, Ananthapur 2VC, SVU
Abstract :

af

In order to expedite detection of unfaithful and malicious agents, an agent recognition mechanism is proposed for multi agent communication, which is based on a laurel model and a cryptographic protocol. A laurel system for multi agent communication can be let down by a set of malicious agents. Such a group can maliciously raise the laurel of one or more agents of the group. There is no known method to protect a laurel system against swindler agent groups. So there is a need for false proof laurel management mechanism to avoid malicious agents providing false state of laurel. The modern systems that entertain multi-agent communication are more vulnerable to agents who behaves maliciously or simply do not cooperate. The lack of core level trusted third party in multi agent communication strategy postures distinctive issues for laurel management. These issues feature agent recognition strategy, dependable laurel maintenance. The disadvantage of the existing system is the laurel of the agent that responds to a request is considered but the credibility of the agent that attempts to update the laurel of the other agent is ignored. This proposal aims to devise a model to encapsulate the laurel of both the agent that respond and the agent that request. The proposed protocol reduces the number of malicious transactions. It also manages the issue of highly inconsistent accessibility pattern of the agents in multi agent communication based systems.
Citation :

af

Sreedhar Jyothi et.al ," Cryptographic Protocol Based Laurel System for Multi agent Distributed Communication”, International Journal of Computer Engineering In Research Trends, Volume 3, Issue 9, September-2016, pp. 500-505
Keywords : Cryptography, Reputation Models, E-commerce, Trusted Models, Distributed Communication, Blind fold strategy, quality of service
References :

af

[1] J.M. Vidal and E.H. Durfee, ‚The impact of Nested Agent
Models in an Information Economy‛, Second Int. Conf. on
Multi-Agent Systems, 377-384, 1996.
[2] J. Sabater, ‚Trust and Reputation for Agent Societies‛, Phd
Thesis, Universitat Autnoma de Barcelona, 2003.
[3] S. Sen and N. Sajja, ‚Robustness of Reputation-based Trust:
Boolean Case‛, Proc. of the First Int. Joint Conf. on
Autonomous Agents and Multiagent Systems (AAMAS-02),
Bologna, Italy, 288–293, 2002.
[4] M. Wooldridge, An Introduction to MultiAgent Systems,
Chichester: John Wiley and Sons, 2002.
[5] T. Tran and R. Cohen, ‚Learning Algorithms for Software
Agents in Uncertain and Untrusted Market Environments‛,
Proc. of the Eighteenth Int. Joint Conf. on Artificial
Intelligence, 2003.
[6] B. Krulwich, ‚The Bargainfinder Agent: Comparision Price
Shopping on the Internet‛, Bots, and other Internet Beasties, J.
Williams (Ed.), 257-263, Macmillan Computer Publishing,
1996.
[7] R. Till, ‚Transforming the way we do business‛, In: Electronic
Commerce, T.Nash, editor, 9-12, Kogan Page, London, UK,
1998 
[8] M. He, N. R. Jennings, and H. Leun. "On Agent-Mediated
Electronic Commerce" IEEE Trans on Knowledge and Data
Engineering, Vol. 15(4) 985-1003, 2003.
[9] S. D. Ramchurn, T. D. Huynh, and N. R. Jennings, ‚Trust in
Multi-Agent systems‛, The Knowledge Engineering Review,
Vol. 19(1), 1-25, 2004.
[10] K. Regan, T. Tran, and R. Cohen, ‚Sharing Models of Sellers
amongst Buying Agents in Electronic Marketplaces‛,
Decentralized Agent Based and Social Approaches to User
Modelling (DASUM), July 2005.
[11] R. Jurca, and Faltings, B. (2003). ‚Towards IncentiveCompatible
Reputation Management‛, In: Trust, reputation
and security: theories and practice, Lecture Notes in AI, R.
Falcone, S. Barber, L. Korba, & M. Singh, (Eds.), SpringerVerlag,
Vol. 2631, 138–147, 2003.
[12] T. Tran, ‚Reputation-Oriented Reinforcement Learning
Strategies for Economically-Motivated Agents in Electronic
Market Environment‛, Ph.D. Dissertation, University of
Waterloo, 2003.
[13] K. Regan, and R. Cohen, ‚A Model of Indirect Reputation
Assessment for Adaptive Buying Agents in Electronic
Markets‛, Business Agents and the Semantic Web
(BASeWEB), May 2005.
[14] R.H. Guttman and P. Maes, ‚Agent-mediated Electronic
Commerce: A Survey‛, The Knowledge Engineering Review,
Vol. 13(2), 147-159, 1998.
[15] P. Maes, "Artificial Life Meets Entertainment: Life like
Autonomous Agents," Communications of the ACM, Vol.
38(11), 108-114, 1995.
[16] A. Abdul-Rahman and S. Hailes, ‚Supporting Trust in Virtual
Communities‛, Proc. Hawaii International Conference on
System Sciences, Maui, Hawaii, 2000.
[17] C. Dellarocas, ‚Towards Incentive-compatible Reputation
Management‛, Workshop on Deception, Fraud and Trust in
Agent Societies, Bologna, Italy, 26–40, 2002.
[18] M. Wooldridge and N. Jennings, ‚Intelligent Agents: Theory
and Practice‛, The Knowledge Engineering Review, Vol.
10(2), 115-152, 1995.
[19] EBay, www.ebay.com .
[20] R.B Doorenbos, O. Etzioni, and D. Weld, ‚A Scalable
Comparison-Shopping Agent for the World Wide Web‛, First
Int. Conf. on Autonomous Agents, 39- 48, 1997.
[21] P. Maes, R.H. Guttman, and A.G. Moukas, ‚Agents that Buy
and Sell‛, Communications of the ACM, Vol. 42(3), 81-91,
1999.
[22] B. Esfandiari and S. Chandrasekharan, ‚On How Agents
Make Friends: Mechanisms for Trust Acquisition‛, Proc. of
the Fifth Int. Conf. on Autonomous Agents Workshop on
Deception, Fraud and Trust in Agent Societies, 27-34, 2001.
[23] J. Carbo, J. Molina, and J. Davila, ‚Comparing Predictions of
SPORAS vs. a Fuzzy Reputation Agent System‛, Third Int .l
Conf. on Fuzzy Sets and Fuzzy Systems, Interlaken, 147–153,
2002.
[24] D. Huynh, N.R. Jennings, and N.R. Shadbolt, ‚Developing an
Integrated Trust and Reputation Model for Open Multi-Agent
Systems‛, Proc. of 7th Int. Workshop on Trust in Agent
Societies, 65-74, New York, USA, 2004.
[25] Amazon, www.amazon.com .
[26] C. Goldman, S. Kraus, and O. Shehory, ‚Equilibria Strategies
for Selecting Sellers and Satisfying Buyers,‛ In: Lecture Notes
in Artificial Intelligence, M. Klusch and F. Zambonelli (Eds.),
Springer, Vol. 2182, 166-177, 2001.
[27] J. Carter, E. Bitting, and A. Ghorbani, ‚Reputation
Formalization for an Information-Sharing Multi-Agent
System‛, Computational Intelligence, Vol. 18(2), 515–534,
2002.
[28] T.D. Huynh, N.R. Jennings, and N.R. Shadbolt, ‚An
Integrated Trust and Reputation Model for Open Multi-Agent
Systems‛, Autonomous Agents and Multi-Agent Systems,
Vol. 13(2), 119-154, Sep. 2006.
[29] S. Marsh, ‚Formalizing Trust as a Computational Concept‛,
Ph.D. Thesis, Department of Mathematics and Computer
Science, University of Stirling, 1994.
[30] B. Yu and M.P. Singh, ‚A Social Mechanism of Reputation
Management in Electronic Communities‛, Cooperative
Information Agents (CIA), Vol. 24, 154-165, Boston, USA,
2000.
[31] T. Grandison, and M. Sloman, ‚A Survey of Trust in Internet
Application‛, IEEE Communications Surveys, Vol. 4(4), 2-16,
2000.
[32] Y. Mass, and O. Shehory, ‚ Distributed Trust in Open MultiAgent
Systems‛, In: Trust in cyber-societies, R. Falcone, M.
Singh, & Y. Tan, (Eds.), Springer-Verlag, 159–173, 2001.
[33] C. Castelfranchi, and R. Falcone, ‚Principles of Trust for MAS:
Cognitive Anatomy, Social Importance, and Quantification‛,
Proc. of the Intel Conf. on Multi-Agent Systems (ICMAS’98),
Paris, France, 72–79, 1998.
[34] A. Greenwald and J. Kephart, ‚Shopbots and Pricebots‛, Proc.
of the Sixteenth Int. Joint Conf . on Artificial Intelligence, Vol.
1, 506-511, 1999
[35] G. Zacharia and P. Maes, ‚Trust Management through
Reputation Mechanisms‛, Applied Artificial Intelligence, Vol.
14(9), 881-907, 2000
[36] A. Chavez and P. Maes, ‚Kasbah: An Agent Marketplace for
Buying and Selling Goods‛, First Int. Conf. on the Practical
Application of Intelligent Agents and Multi-Agent
Technology, London, UK, 1996.
[37] J. Sabater and C. Sierra ‚ REGRET: A Reputation Model for
Gregarious Societies‛, Proc. of the Fifth Int. Conf. on
Autonomous Agents, Montreal, Canada, 194-195, 2001.
[38] T. Sandholm, ‚Distributed Rational Decision Making‛, In:
Multi-Agent Systems: A Modern Approach to Distributed
Artificial Intelligence, Weiss, G. (ed.), MIT Press, 1999.
[39] J. Sabater and C. Sierra, ‚Review on Computational Trust and
Reputation Models‛, Artificial Intelligence Review, Vol. 24(1),
33-60, 2005
[40] M. Schillo, M. Rovatsos, and P. Funk, ‚ Using Trust for
Detecting Deceitful Agents in Artificial Societies‛, Special
Issue of the Applied Artificial Intelligence Journal on
Deception, Fraud and Trust in Agent Societies, Vol.14(8), 825–
848, 2000.
:10.22362/ijcert/2016/v3/i9/48899
DOI Link : http://www.dx.doi.org/10.22362/ijcert/2016/v3/i9/48899
Download :
  V3I908.pdf
Refbacks : There are currently no refbacks.
Optimization of Resistance Spot Welding of 304 Steel Using GRA
Authors : M.R. Rawal, R.R. Kolhapure, S.S. Sutar and V.D. Shinde
Affiliations : Department of Mechanical Engineering, DKTE Society’s Textile and Engineering Institute, Ichalkaranji, -416115(India)
Abstract :

af

Resistance spot welding (RSW) quality is mainly depends upon the parameters and their levels selected, like welding current, electrode force and welding time etc. So selection of optimal parameter levels plays an important role. Therefore, optimization of weld tensile strength and nugget diameter is selected for study. In this paper, use of Taguchi with Grey relational analysis (GRA) method to determine significant process parameters and their levels for optimal tensile shear strength (T-S) and nugget diameter (N-D) is reported. Taguchi based L27 (33) orthogonal array is selected for experimentation. Experiments are carried out on Stainless Steel 304. The level of importance of the welding parameters on the tensile shear strength and nugget diameter is determined by using analysis of variance (ANOVA) using Minitab 16 software. To improve the spot weld quality (i.e. T-S and N-D) multi objective process parameter optimization is performed using grey relational analysis.
Citation :

af

M.R. Rawal et.al ," Optimization of Resistance Spot Welding of 304 Steel Using GRA”, International Journal of Computer Engineering In Research Trends, Volume 3, Issue 9, September-2016, pp. 492-499
Keywords : —Resistance Spot Welding (RSW), Tensile shear strength, Nugget diameter, Taguchi Method, Grey Relational Analysis
References :

af

[1] A. V. Dennison, D. J. Toncich, and S. Masood, Control and Process-Based
Optimization of Spot-Welding in Manufacturing Systems,
International Journal of Advance Manufacturing Technology,
1997, 13, p 256-263.
[2] U. Esme, Application of Taguchi Method for the Optimization of
Resistance Spot Welding Process, The Arabian Journal for Science
and Engineering, 2008, 34, p 519-528.
[3] A. G. Thakur, and V. M. Nandedkar, Application of Taguchi
Method to Determine Resistance Spot Welding Condition of
Austenitic Stainless Steel AISI 304, Journal of Scientific and Industrial
Research, 2010, 69, p 680-683.
[4] N. Muhammad, and H. P. Manurung, Design Parameters Selection
and Optimization of Weld Zone Development in Resistance
Spot Welding, World Academy of Science, Engineering and
Technology, 2012, 72, p 1220-1225.
[5] D. Das., A. Sahoo, R. Das, and B. Routara, Investigations on Hard
Turning Using Coated Carbide Insert: Grey based Taguchi and
Regression Methodology, Procedia Material Science, 2014, 6, p
1351-1358.
[6] M. Durairaj , D. Sudharsun , and N. Swamynathan , Analysis of
Process Parameters in Wire EDM with Stainless Steel using Single
Objective Taguchi Method and Multi Objective Grey Relational
Grade, Procedia Engineering, 2013, 64 , p 868-877.
[7] J.L. Lin, and C. L. Lin, The Use of The Orthogonal Array With
Grey Relational Analysis to Optimize the Electrical Discharge
Machining Process With Multiple Performance Characteristics,”
International Journal of Machine Tools and Manufacture, 2002,
42, p 237- 244.
[8] C. L. Lin, J. L. Lin, and T. C. Ko, Optimization of the EDM Process
Based on the Orthogonal Array with Fuzzy Logic and Grey
Relational Analysis Method, International Journal of Advanced
Manufacturing Technology, 2002, 19, p 271-277.
[9] N. Tosun, Determination of Optimal Parameter for MultiPerformance
Characteristics in Drilling by Using Grey Relational
Analysis, International Journal of Advanced Manufacturing
Technology, 2006, 28, p 450-455.
[10] U. A. Dabade, Multi-objective Process Optimization to Improve
Surface Integrity on Turned Surface of Al/SiCp Metal Matrix
Composites Using Grey Relational Analysis, Procedia CIRP,
2013, 7, p 299-304.
[11] A.S Shivade, and V.D Shinde, Multi-objective Optimization in
WEDM of D3 Tool Steel Using Integrated Approach of Taguchi
Method and Grey Relational Analysis, Journal of Industrial Engineering
international, 2014, 10, p 149-162.
[12] R. Kolhapure, V. D. Shinde and V. A. Kamble, Optimization of
Strain Gauge Transducer for Weighing Application Using GRA
Method, Asian Journal of Engineering and Applied Technology,
2015, 4, p 1-7
:10.22362/ijcert/2016/v3/i9/48869
DOI Link : http://www.dx.doi.org/10.22362/ijcert/2016/v3/i9/48869
Download :
  V3I907.pdf
Refbacks : There are currently no refbacks.
Achieving better Authentication and Copyright protection Using DWT and SVD Based Watermarking Scheme
Authors : Anil Kumar Uppula, Srinivasulu Tadisetty ,
Affiliations : Dept of ECE, KU College of Engineering and Technology, Warangal, Telangana, (506132), INDIA
Abstract :

af

Digital watermark has created ample solutions for securing hidden information in digital images. Incidental hacking and accidental hacking has increased in modern world which paves way for copying the legal information in illegal way. Although digital image processing has registered enormous growth in last few years but providing proper security to privacy information is still unresolved issue and watermarking is considered as accurate solution to all authentication and copyright protection issues in optimized way. DWT-SVD combinational watermarking scheme is proposed in this work for effective performance to provide good authentication and copyright protection and both techniques solves the technical issues related to embedding and ext raction of information in three planes R (Red), G (Green) and B (Blue). Finally simulation results shows that the proposed method provides good performance over traditional state of art methods in effective way.
Citation :

af

Anil Kumar Uppula and Dr.Srinivasulu Tadishetty," Achieving better Authentication and Copyright protection Using DWT and SVD Based Watermarking Scheme”, International Journal of Computer Engineering In Research Trends, Volume 3, Issue 9, September- 2016, pp. 487-491
Keywords : SVD, DWT, Watermarking, Authentication, Copyright protection
References :

af

[1] Wang Hui-Qin; Zhao Min; , “A Blind Watermarking
Algorithm for Color Image Based on Singular Value
Quantization” 6th International Conference on Digital
Content, Multimedia Technology and its Applications (IDC),
2010 ,PP 59 – 62,IEEE.
[2] Yan Xing and Jieqing Tan, A Color Watermarking
Scheme Based on Block-SVD and Arnold Transformation,
Second Workshop on Digital Media and its Application in
Museum & Heritages, PP 3 – 8,IEEE 2007.
[3] Jianyong Huang and Changsheng Yang , Image Digital
Watermarking Algorithm Using Multiresolution Wavelet
Transform, IEEE International Conference on Systems, Man
and Cybernetics,PP 2977 - 2982 ,vol.3,IEEE 2004 .
[4] Chaokun Wang; Jianmin Wang; Ming Zhou; Guisheng
Chen; Deyi Li; ATBaM: An Arnold Transform Based
Method onWatermarking Relational Data, . International
Conference on Multimedia and Ubiquitous Engineering,
2008. MUE 2008,PP 263 – 270,IEEE 2008
[5] Mabtoul, S.; Hassan, E.; Elhaj, I.; Aboutajdine, D.;”
Robust color image watermarking based on singular value
decomposition and Dual tree complex wavelet transform”
14th IEEE International Conference on Electronics, Circuits
and Systems, 2007. ICECS 2007.,PP 534 – 537,IEEE [6] Deng Jianghua ,”Color Image Digital Watermarking
Algorithm Based on Singular Value Decomposition”,
International Conference on Multimedia Information
Networking and Security, 2009. MINES '09. PP 130 –
133,IEEE
[7] Wang Hui-qin; HaoJi-chao; Cui Fu-ming; Color Image
Watermarking Algorithm Based on the Arnold Transform,
2010 International Conference on Communications and
Mobile Computing,PP 66 – 69,IEEE 2010
[8] Liu Fang; Wang YuKai; “ Restoring Of The
Watermarking Image In Arnold Scrambling”, 2nd
International Conference on Signal Processing Systems
(ICSPS),PP V1-771 - V1-774,IEEE 2010
[9] Chih-Chin Lai; Cheng-Chih Tsai; Digital Image
Watermarking Using Discrete Wavelet Transform and
Singular Value Decomposition , IEEE TRANSACTIONS
ON INSTRUMENTATION AND MEASUREMENT, VOL.
59, NO. 11, NOVEMBER 2010
[10]. Fanzhi Kong; YizhunPeng; “Color Image
Watermarking Algorithm Based On HSI Color Space” , 2nd
International Conference on Industrial and Information
Systems (IIS), PP 464 – 467,IEEE 2010
:10.22362/ijcert/2016/v3/i9/48868
DOI Link : http://www.dx.doi.org/10.22362/ijcert/2016/v3/i9/48868
Download :
  V3I906.pdf
Refbacks : There are currently no refbacks.
Mitigation of ICI Through Optimized SSR ICI Self Cancellation Scheme in OFDM
Authors : Shyam Sunder Kongonda , Dr.Srinivasulu Tadishetty,
Affiliations : Kakatiya University College of Engineering and Technology, Warangal, India
Abstract :

af

Orthogonal frequency division multiplexing (OFDM) is extensively used in wireless communication systems because it offers high data rates and provides a better solution to inter symbol interference (ISI) caused by a multipath channel. A well known problem of OFDM system is sensitive to carrier frequency offset (δ) between the transmitted and received signals. The Frequency offset in wireless communication systems ruins the Orthogonality between subcarriers resulting in Inter Carrier Interference (ICI).Which is a severe problem in OFDM system and eventually decrease the performance of the system. There are numerous techniques are in existence to mitigate the effect of ICI caused by CFO (carrier frequency offset). This paper investigates an innovative ICI cancellation method termed as optimized SSR (symmetric symbol repeat) ICI self cancellation scheme. The proposed method utilizes an optimum data allocation (1,-λ) and combining (1,-µ) scheme to improve CIR performance for an estimated normalized frequency offset δ. However, this requires continuous CFO estimation and feedback circuitry. To avoid the requirement of CFO, sub optimal values (λso, µso) are considered for combating the effect of ICI. This paper mainly focus on comparison of proposed method with the previous reduction methods and standard OFDM system in terms of CIR (carrier to interference) & BER (bit error rate) performance.
Citation :

af

Shyam Sunder Kongonda and Dr.Srinivasulu Tadishetty," Mitigation of ICI Through Optimized SSR ICI Self Cancellation Scheme in OFDM”, International Journal of Computer Engineering In Research Trends, Volume 3, Issue 9, September-2016, pp. 482-486
Keywords : OFDM, ICI, ISI, CFO, CIR, BER, QAM
References :

af

[1] Y.Wu and W. Y. Zou, “Orthogonal frequency division multiplexing:
A multicarrier modulation scheme”, IEEE Transaction
on Consumer Electronics, vol. 41, no. 3,pp 392-399, Aug.
1995
[2] R. van Nee and R. Prasad, OFDM for Wireless Multimedia
Communications. Norwood, MA: Artech House, 2000
[3] P.H.Moose, “A Technique for orthogonal frequency division
multiplexing frequency offset correction,’’, IEEE Trans.
Commun., vol.42, pp2908-2914, Oct. 1994.
[4] Zhao Y, Haggman SG. “Inter carrier Interference SelfCancellation
Scheme for OFDM Mobile Communication Systems”,
IEEE Trans.Commun 2001; 49(7): 1185-1191
[5] Yeh HG, Chang YK, Hassibi B. “A scheme for cancelling
inter carrier interference using conjugate transmission in multicarrier
communication systems”, IEEE Trans. Wireless Communication 2007; 6(1): 3-7.
[6] Wang C-L, Huang Y-C. “Inter carrier Interference Cancellation
Using General Phase Rotated Conjugate Transmission
for OFDM Systems”, IEEE Transactions on Communications
2010; 58(3): 812-819.
[7] K.Sathanantham, R.M.A.P.Rajatheva and Slimane Ben
Slimane “Analysis of OFDM in the Presence of Frequency
Offset and a Method to Reduce Performance Degradation”
Global Tele communications Conference, 2000. GLOBECOM
'00. IEEE,vol. 1,pp. 72-76, 2000
[8] Ashish goel, ankit nagpal and jasmeet kaur, "Optimized
data allocation and combining scheme for ICI self cancellation
in OFDM system" IEEE 978-1-4673-1989-8/12, Aug 2012.
[9] J. H. Mathews, K. K. Fink, “Numerical Methods using
Mat lab’, 4thedition, Prentice-Hall Inc. , 2004.
:10.22362/ijcert/2016/v3/i9/48867
DOI Link : http://www.dx.doi.org/10.22362/ijcert/2016/v3/i9/48867
Download :
  V3I905.pdf
Refbacks : There are currently no refbacks.
Agile Methodology in Theory and Practice an Indian Perspective
Authors : Dr. Himanshu Aggarwal , Ms.Khushdeep Sharma,
Affiliations : Department of Computer Engineering Punjabi University, Patiala India
Abstract :

af

During the past years, many new software development methodologies were introduced to develop the high quality software in short period of time with minimal costs and within unpredictable changing environment and Agile Methodology is one of them. This paper presents the difference between the agile methodology concepts in reality and in theory. For this data is collected from four small scale industries that are using Agile methodologies concepts during software development and analysis about the practical adoption level of Agile is framed out.
Citation :

af

Dr. Himanshu Aggarwal ,Ms.Khushdeep Sharma," Agile Methodology in Theory and Practice an Indian Perspective”, International Journal of Computer Engineering In Research Trends, Volume 3, Issue 9, September-2016, pp. 476-481
Keywords : Agile Software Development, Heavyweight Software Development
References :

af

[1] Beck, Kent; et al. (2001). "Manifesto for Agile
 Software Development" Agile Alliance
 retrieved 14 June, 2010
[2] Manish et al, “A Detail Study of Agile Software
Development with Extreme
Programming”.International Journal of Advanced
Research in Computer Science and Software
Engineering 5(10), October- 2015, pp. 719-725.
[3] Leo R. Vijayasarathy, “AGILE SOFTWARE
DEVELOPMENT: A SURVEY OF EARLY
ADOPTERS”. Journal of Information Technology
Management, 2008.
[4] Nayab Zya, “AGILE METHODOLOGIES IN
SOFTWARE DEVELOPMENT”. International
Journal of Engineering Technology, Management
and Applied Sciences, 2014.
[5] Sakshi Sachdeva, “Agile Methodologies”, 2016",
International Journal of Computer Science and
Information Technologies, Vol. 7 (1) , 2016, 40-44.
[6] MALIK HNEIFe, “Review of Agile Methodologies
in Software Development”. International Journal of
Research and Reviews in Applied Sciences, 2009.
[7] Dan Turk, “Limitations of Agile Software
Processes”, Third International Conference on
Extreme Programming and Flexible processes in
Software Engineering, XP 2002, May 26-30,
Alghero, Italy, pg 43-46, 2002.
[8] Richard Downs, "Challanges of Migration to Agile
Methodologies”, COMMUNICATIONS OF THE
ACM May 2005/Vol. 48, No. 5
[9] Bjørnar Tessem, "Experiences in Learning XP
Practices”. Springer-Verlag Berlin Heidelberg 2003.
[10] Sonia Thakur, "Role of Agile Methodology in
Software Development." IJCSMC, Vol. 2, Issue. 10,
October 2013, pg.86 – 90[11] IEEE Standards Collection: Software Engineering, I.
S. 610.12-1990, 1993.
[12] W. W. Royce, "Managing the development of large
software systems: concepts and techniques,"
presented at the Proceedings of the 9th international
conference on Software Engineering, Monterey,
California, United States, 1987.
[13] B. W. Boehm, "A Spiral Model of Software
Development and Enhancement," Computer, vol. 21,
pp. 61-72, 1988.
[14] R. S. Pressman, Software Engineering: A
Practitioner's Approach, 6 ed.: McGraw - Hill
International Edition, 2005.
[15] (2001). Manifesto for Agile Software Development.
Available: www.agilemanifesto.org
:10.22362/ijcert/2016/v3/i9/48866
DOI Link : http://www.dx.doi.org/10.22362/ijcert/2016/v3/i9/48866
Download :
  V3I904.pdf
Refbacks : There are currently no refbacks.
Investigate the effectt of approaching angle on cutting force during EN 8 steel turning
Authors : V. B. Magdum, ,
Affiliations : Dept., of CS&E, JNTU, Ananthapur,
Abstract :

af

This paper deals ith the measurement of cutting force generated in turning for different cutting parameters and diferrent tools having various approaching angles while machining EN 8 steel. The approaching angles of the cutting tool were changed using selected parameters; and cutting force components were measured. The selected cutting variables and tools with diferrent approaching angles were tested practically under workshop conditions. During the experimentation, cutting speed and depth of cut were kept constant and each experiment was conducted with new sharp tools. Finally, the effects of cutting parameters and approaching angles on cutting force were analyzed. A cylindrical EN 8 workpiece was turned using carbide tools for three diferrent approaching angles (60̊, 75̊ and 90̊). A total 9 experiments were carried out with three feed rates (0.065, 0.13 and 0.26 mm/rev) for each approaching angle, keeping the cutting speed (384 rpm) and depth of cut (1 mm) constant. During the experimentation forces were measured using dynamometer. The experimental result show that the thrust force were decreased by increasing approaching angles and feed force were increased by increasing approaching angles
Citation :

af

V. B. Magdum," Investigate the effectt of approaching angle on cutting force during EN 8 steel turning”, International Journal of Computer Engineering In Research Trends, Volume 3, Issue 9, September-2016, pp. 471-475
Keywords : Big Data, RDBMS, NoSQL, SQL, Schema Migration, SQL Mapping, CMS, Denormalization
References :

af

[1] S. Lombardo, E. Di Nitto, and D. Ardagna, "Issues in Handling
Complex Data Structures with NoSQL Databases,"
Proceedings of the 14th International Symposium on
Symbolic and Numeric Algorithms for Scientific Computing
(SYNASC), pp. 443-448, Sept. 2012
[2] Yishan Li and S. Manoharan, "A performance comparison of
SQL and NoSQL databases," Proceedings of IEEE Pacific Rim
Conference on Communications, Computers and Signal
Processing (PACRIM), pp. 15- 19, Aug. 2013.
[3] A. Boicea, F. Radulescu, and L.I. Agapin, "MongoDB vs Oracle -
- Database Comparison," Proceedings of The 3rd International
Conference on Emerging Intelligent Data and Web
Technologies (EIDWT), pp.330- 335, Sept. 2012.
[4] K. Grolinger, M. Hayes, W.A. Higashino, A. L'Heureux, D.S.
Allison, and M.A.M. Capretz, "Challenges for MapReduce in
Big Data," Proceedings of IEEE World Congress on Services
(SERVICES), pp.182- 189, Jun. 2014.
[5] W. Naheman and Jianxin Wei, "Review of NoSQL databases
and performance testing on HBase," Proceedings of
International Conference on Mechatronic Sciences, Electric
Engineering and Computer (MEC), pp. 2304-2309, Dec. 2013.
[6] M. Scavuzzo, E. Di Nitto, and S. Ceri, "Interoperable Data
Migration between NoSQL Columnar Databases,"
Proceedings of IEEE 18th International Enterprise Distributed
Object Computing Conference Workshops and
Demonstrations (EDOCW), pp.154-162, Sept. 2014.
[7] Jen-Chun Hsu, Ching-Hsien Hsu, Shih-Chang Chen, and YehChing
Chung, "Correlation Aware Technique for SQL to
NoSQL Transformation," Proceedings of the 7th International
Conference on Ubi-Media Computing and Workshops
(UMEDIA), pp. 43-46, Jul. 2014.
[8] Gansen Zhao, Libo Li, Zijing Li, and Qiaoying Lin, "Multiple
Nested Schema of HBase for Migration from SQL,"
Proceedings of 9th International Conference on P2P, Parallel,
Grid, Cloud and Internet Computing (3PGCIC), pp.338-343,
Nov. 2014.
[9] Gansen Zhao, Qiaoying Lin, Libo Li, and Zijing Li, "Schema
Conversion Model of SQL Database to NoSQL," Proceedings
of 9th International Conference on P2P, Parallel, Grid, Cloud
and Internet Computing (3PGCIC), pp.355-362, Nov. 2014. [10] R. Sellami, S. Bhiri, and B. Defude, "ODBAPI: A Unified REST
API for Relational and NoSQL Data Stores," Proceedings of
IEEE International Congress on Big Data (BigData Congress),
pp.653-660, Jun. 2014.
[11] Xiang Li, Zhiyi Ma, and Hongjie Chen, "QODM: A queryoriented
data modeling approach for NoSQL databases,"
Proceedings of IEEE Workshop on Advanced Research and
Technology in Industry Applications (WARTIA), pp.338-345,
Sept. 2014.
[12] A. Gadkari, V.B. Nikam, and B.B. Meshram, "Implementing
Joins over HBase on Cloud Platform," Proceedings of IEEE
International Conference on Computer and Information
Technology (CIT), pp. 547- 554, Sept. 2014.
[13] Zhou Wei, G. Pierre, and Chi-Hung Chi, "Scalable Join Queries
in Cloud Data Stores," Proceedings of the 12th IEEE/ACM
International Symposium on Cluster, Cloud and Grid
Computing (CCGrid), pp.547- 555, May 2012.
[14] R. Lawrence, "Integration and Virtualization of Relational SQL
and NoSQL Systems Including MySQL and MongoDB,"
Proceedings of International Conference on Computational
Science and Computational Intelligence (CSCI), pp.285-290,
Mar. 2014.
[15] D. Van Hieu, S. Smanchat, and P. Meesad, "MapReduce join
strategies for key-value storage," Proceedings of the 11th
International Joint Conference on Computer Science and
Software Engineering (JCSSE), pp.164-169, May 2014.
[16] Mysql proxy. http://dev.mysql.com/refman /5.6/en/mysqlproxy.html.
Accessed:2014-09-24.
[17] Roberto Ierusalimschy, Luiz Henrique de Figueiredo, and
Waldemar Celes Filho. Lua—an: Ex-tensible extension
language. Softw. Pract. Exper., 26(6):635–652, June 1996.
[18] Jsql parser. http://jsqlparser.sourceforge.net/. Accessed:2014-
09-24.
[19] Mongodb mapping chart. http://docs.mongodb.org/
manual/reference/sql-comparison. Accessed:2014-09-24.
:10.22362/ijcert/2016/v3/i9/48865
DOI Link : http://www.dx.doi.org/10.22362/ijcert/2016/v3/i9/48865
Download :
  V3I903.pdf
Refbacks : There are currently no refbacks.
Analytical and Parametric Optimization of Force Transmissibility by Taguchi Method for Double Stage Engine Mountings
Authors : G.C.Mekalke, R.R.Kolhapure,
Affiliations : DKTE’S Textile and Engineering Institute, Ichalkaranji
Abstract :

af

It is essential to design a warship to avoid detection by submarines or enemy ships. One of the recent techniques used is to mount all vibrant machinery on a double stage vibration isolation system. For high structure-borne noise attenuation there is requirement of two-stage mounting system. The main goal of current research work is to reduce vibration levels from machinery to foundation, and thereby to reduce radiate noise levels from ship hull. The present work deals with the mathematical modeling and parametric optimization of force transmissibility (Ftr) for design of engine foundation system. The vertical vibrations of the system are assumed to be most predominant, and other types of vibrations are neglected. The research work is carried out for finding parameters of mounts and optimizing the same. The analysis is based on discrete system modeling. Taguchi method is used for finding optimal combination of process parameters based on S/N ratio and analysis of variance (ANOVA) is statistical technique to investigate contribution of each process parameters on the performance characteristic. The result shows that spring stiffness is most affecting process parameter.
Citation :

af

G.C.Mekalke, R.R.Kolhapure," Analytical and Parametric Optimization of Force Transmissibility by Taguchi Method for Double Stage Engine Mountings”, International Journal of Computer Engineering In Research Trends, Volume 3, Issue 9, September-2016, pp. 461-470
Keywords : Double stage vibration isolation, Two-degree freedom systems, Taguchi, ANOVA
References :

af

[1] Adigunaa, H, M Tiwaria, and H E Tsengb."Transient Response of a Hydraulic Engine Mount." Scientific Research Laboratory, Center of Automotive Research Oh43210-1107, No.Mi48124 (Dec 2002).
[2] Gaul, L N. "Substructure Behavior of Resilient Support Mounts for Single and Double Stage Mounting Systems." Mechanical Systems and Signal Processing. 5(1991).
[3] Hutton, S G. Optimization of Vibration Mounts Properties for Application to Shipboard Diesel Engines. Technical Report Drea Cr 2000-077,Defence Research Establishment Atlantic, Jan 2001.
[4] Joong, Jae Kim, and Young Kim Heon. "Shape Design of an Engine Mount by a Method of Parameter Optimization." Kwangmyungshi,Kyungki (Department of mechanical
engineering, Kwangweon national university),may 1994: 781-88.
[5] Muravyov, A, and S G Hutton. "Analysis of an Engine-Mount System with Time-Dependent and Velocity Matrices." Univercity of British Columbia, Vancouver. Canada: Department of Mechanical, 14 August 1997.Peter, J, Ran Tian, and K Chris. "A Study of Vibration and Vibration Control of Ship Structures." Marine Structures 22(4) (2009): 730-743.
[6] Ramachandran, T, And K P Padmanaban. "Review On Internal Combustion Engine Vibrations and Mountings." Psna College of Engineering and Technology, Dindigul.
Tamilnadu. 
[7] Singh, R. "Dynamic Design of Automotive Systems: Engine Mounts and Structural Loints."Department of Mechanical Engineering, Ohio State University.
[8] Tao, J S, and G R Liu. "Design optimization of marine engine mount system." journal of sound and vibration 235(3) (2000): 474-494.
[9] Vijayan, V, And T Karthikeyan. "Design and Analysis of Compliant Mechanism for Active Vibration Isolation Using Fea Technique."International Journal of Recent Trends in
Engineering 1, No.5 (May 2009).
[10] Yunhe, Yu, G Naganathan Nagi, and v Dukkipati Rao. "A literature review of automotive vehicle engine mounting systems."Mechanical, Industrial and Manufacturing
Journal (The univercity of Toledo) Ct06430, no.OH43606 (1999).
[11]Durairaj M., Sudharsun D., Swamynathan N.,(2013) “Analysis of Process Parameters in Wire EDM with Stainless Steel using Single Objective Taguchi Method and Multi Objective Grey Relational Grade,” Procedia Engineering, 64 ,868 – 877.
[12]Raghuraman S., Thiruppathi K., Panneerselvam T., Santosh S., (2013)“Optimization of EDM Parameters using  Taguchi Method and Grey Relation Analysis for Mild Steel IS 2026,” International Journal of Innovative Research in Science, Engineering and Technology,2,7,3095-3104.
[13]Dean E., (1991) “Taguchi Approach to Design Optimization for Quality and Cost: An Overview,” Annual Conference of the International Society of Parametric Analysis, 1-9.
[14] Rao R., (2011), “Advanced Modeling and optimization of Manufacturing Processes,”International Research and Development Springer, 1-380.
:10.22362/ijcert/2016/v3/i9/48864
DOI Link : http://www.dx.doi.org/10.22362/ijcert/2016/v3/i9/48864
Download :
  V3I902.pdf
Refbacks : There is no refbacks
Propeller Shaft in Automobile: Review the Allocation Procedure in Front Axle and springs
Authors : Dr Porag Kalita, ,
Affiliations : Head: Automobile Engineering Department, Govt. of Assam,Vocational Education (+2), M R S Higher Secondary School, Titabor, Assam.
Abstract :

af

While vehicle on moving position, torque is converted from the rear wheel through the propeller shaft. The propeller shaft, which is transmit full engine power from the gear box to the differential and propeller shaft one end connected to the gear box, while the other is connected to the differential in the rear axle assembly. As per study it was found that while vehicle is moving on the curve road or angle in turning moment on the road surfaces , without propeller shaft may caused accident , if vehicle rear wheel drive. Because the distance between gear box and differential changes when the vehicle encounters an uneven surface. Axles act as axis for the wheels to spin around and it is consists by Live Axles and Dead Axle. For the example, live axle which contain differential and through rotary motion is transmitted to the wheels. Dead axle, which do not contain differential and these are simply beams which support the vehicle weight and serve as axis for the wheels. A coiled piece of round or square steel wire which, when compressed exerts, a force that may be used to do some work. Leaf springs or carriage springs are used in the vehicles to cushion the shocks imparted to the wheels by road obstacles.
Citation :

af

Dr Porag Kalita," Propeller Shaft in Automobile: Review the Allocation Procedure in Front Axle and springs”, International Journal of Computer Engineering In Research Trends, Volume 3, Issue 9, September-2016, pp. 454-460
Keywords : Hotchkiss drive, Leaf springs, Propeller Shaft, Rear and Front axle, Torque.
References :

af

[1] Book on Automobile Design problem, by Mr.Agrawal, India.
[2] Book ISBN No. 81 219 0214 2 , by H.B. Singh Reyat, Punjab.
[3] Course Material, Workshop Manager Training programme, Telco, Jamshedpur, 1993.
[4] www.alibaha.com
[5]Service Manual, Maruti Udyog Ltd, N. Delhi.
[6] Training Programme in Telco, M/S Gargo Motors, Assam, 1993.
:10.22362/ijcert/2016/v3/i9/48863
DOI Link : http://www.dx.doi.org/10.22362/ijcert/2016/v3/i9/48863
Download :
  V3I901.pdf
Refbacks : There are currently no refbacks.

 

Low Voltage High Accurate Current Mode Analog Multiplier
Authors : Sushma.Devarapalli , I.Lavanya,
Affiliations :
Abstract :

af

The Low voltage high accurate current mode analog multiplier is a basic building block in analog signal processing. This proposed circuit is a four quadrant multiplier, designed using squarer circuit. The squarer circuit is designed based on the translinear loop principle. The major advantages of proposed design are low voltage (VDD=1V), high accurate, high bandwidth (122MHZ), less area, and small linearity error. The linearity error is obtained as 0.5%. The simulations of circuit are done in the pyxis schematic editor using Mentor graphics tool with 0.18µm standard CMOS technology.
Citation :

af

Sushma.Devarapalli , I.Lavanya," Low Voltage High Accurate Current Mode Analog Multiplier”, International Journal of Computer Engineering In Research Trends, Volume 3, Issue 8, August-2016, pp. 447-453
Keywords :
References :

af

 
:
DOI Link :
Download :
  V3I812.pdf
Refbacks :
Analog and Digital PLL with Single Ended Ring VCO for “Full Swing Symmetrical Even Phase Outputs”
Authors : Moulika Devi Vankala, G.P.S Prasanthi,
Affiliations :
Abstract :

af

The most versatile application of a phase locked loop (PLL) is clock generation and clock recovery in microprocessors, networking, wired and wireless communication system and frequency synthesizers. Voltage controlled oscillators (VCO) are the important and crucial building block in the PLL. This paper proposes a “Single Ended Type Ring VCO with a New Delay Cell” for Full Swing Symmetrical Even Phase outputs. To meet the requirements of high-quality performance in portable device systems at low cost, a ring VCO structures of numerous differential delay cells have been commonly implemented in recently developed VCO monolithic integrated chips (ICs). However, compared with ring VCOs of single-ended delay cells, implementing ring VCOs of differential delay cells typically require a larger area, greater power consumption and a tail current circuit. Therefore, determining a method for designing a “Single Ended Ring-type VCO” with a wide tuning range, a small layout area ((without a tail current circuit) and high Signal to Noise Ratio (SNR) is crucial. Therefore, the designed Ring VCO is placed in PLL and simulates the miscellaneous blocks of phase locked loop (PLL). In addition that the proposed VCO with a new delay cell achieved (16.6-33) MHz wide tuning range with full swing symmetrical even phase outputs, which yielded -174.28dbc/Hz phase noise at 1MHz, occupied small layout area with only 5 transistored delay cell and consumed less power approximated to 0.48Megawatts operated at only 1.2V supply voltage in TSMC 180nm deep submicron technology.
Citation :

af

Moulika Devi Vankala, G.P.S Prasanthi," Analog and Digital PLL with Single Ended Ring VCO for “Full Swing Symmetrical Even Phase Outputs””, International Journal of Computer Engineering In Research Trends, Volume 3, Issue 8, August-2016, pp. 441-446
Keywords :
References :

af

 
:
DOI Link :
Download :
  V3I811.pdf
Refbacks :
A Multi-level Self-Controllable Authentication in Distributed m-Healthcare Cloud Environments
Authors : A.Yogananda, Chepuri Sai Teja,
Affiliations :
Abstract :

af

Secrecy in the distributed m-healthcare cloud computing reflect concurrently attaining data confidentiality and identity privacy with high efficiency in this connection Cloud Computing providing several advantages to service providers and to customers, Hence it have a good preference in the technical world. The health care industries are growing in various fields over the few years. For the patients and doctors or to other physicians the communication is an important requirement for the inquiries and suggestions. The m-Healthcare cloud computing is significantly providing such type of communication for efficient patient treatment and medical consultation by sharing the personal health information to health care service providers (Hospitals, Research Centres etc. ). Even though a service is good there are some privacy breaches in the present scenario they are following. They are (1) Data Confidentiality and (2) Patient’s Identity Privacy. Much existing access and authentication schemes introduced by several types of research but they cannot be exploited in a straightforward manner. To solve this issue, in this paper we propose an Authorized Accessible Privacy Model (AAPM). By this, a patient can authorize a physician by setting a multi-level access tree of threshold predicates. According to this, we introduce a new technique called attribute-based designated verifier signature for multi-level patient self-controllable authentication in cloud computing environment realizing three levels of privacy and security requirement in distributed m-Healthcare cloud computing system. The three levels of authentication involve directly authorized a physician, indirectly authorized physician and unauthorized persons for medical consultation and decipher the personal health information and to verify the identities by satisfying the access with the help of their own set of attributes.
Citation :

af

A.Yogananda and Chepuri Sai Teja ," A Multi-level Self-Controllable Authentication in Distributed m-Healthcare Cloud Environments”, International Journal of Computer Engineering In Research Trends, Volume 3, Issue 8, August-2016, pp. 436-440
Keywords :
References :

af

 
:
DOI Link :
Download :
  V3I810.pdf
Refbacks :
A Unique Strategy for Swift Generation and Contrast of Applied Feature Vectors
Authors : N. Navya Teja , Mahender Veshala,
Affiliations :
Abstract :

af

The easiest formula for determining an example in the test set is known as the closest Neighbor method. The item of great interest is in comparison to each sample within the training set, utilizing a distance measure, a similarity measure, or a mix of measures. The conventional deviation, also is referred to as square cause of the variance, informs us something concerning the contrast. It describes multiplication within the data, so a higher contrast image has a high variance; along with a low contrast image have a low variance. Even though this techniques could be enhanced if some pre-processing steps are utilized. In content-based image retrieval systems (CBIR) the best and straightforward searches would be the color based searches. In CBIR image classification needs to be computationally fast and efficient. Within this paper a brand new approach is introduced, which works according to low-level image histogram features. The primary benefit of this process may be the extremely swift generation and comparison from the applied feature vectors. It also includes the analysis of pre-processing calculations and the look classification. We are able to result in the Nearest Neighbor method better quality by choosing not only the nearest sample within the training set, but also by thought on several close feature vectors. Using each training set, the histograms from the three color channels were produced and also the above mentioned histogram features were calculated.
Citation :

af

N. Navya Teja et.al," A Unique Strategy for Swift Generation and Contrast of Applied Feature Vectors”, International Journal of Computer Engineering In Research Trends, Volume 3, Issue 8, August-2016, pp. 431-435
Keywords :
References :

af

 
:
DOI Link :
Download :
  V3I809.pdf
Refbacks :
Department Management System Using Arduino
Authors : Ms. Mitha Raj, Ms. Niveditha K.S, Ms. Shinta Joseph K,Mr. Jose Mon Tomy and Mr.Rijo P.C
Affiliations :
Abstract :

af

In older times information were stored and conveyed by papers and other physical media. But now our world has changed and everything around us are almost digitized. The proposed Department Management System aims to replace the traditional time table management system to reduce the usage of papers and to ease the process . It displays the staffroom timetable with room temperature in an LCD screen and includes a power saving module. This can be used in institutions such as Schools , Colleges, Universities ,Offices etc. It is even possible to store multiple timetables and switch between them. Thus it becomes easier for the staff to refer to the entire departments timetable , check temperature all at the same time. The power saving module saves the energy by switching off all unwanted electrical appliances like fans and lights when there is nobody in the staffroom.
Citation :

af

Ms. Mitha Raj et.al," Department Management SystemUsing Arduino”, International Journal of Computer Engineering In Research Trends, Volume 3, Issue 8, August-2016, pp. 425-430
Keywords :
References :

af

 
:
DOI Link :
Download :
  V3I808.pdf
Refbacks :
A Study on Entrepreneurial Challenges of Floriculture in Odisha.
Authors : Dr Nishi Kanta Mishra , Mr Durga Prasad Mishra,
Affiliations :
Abstract :

af

Floriculture is the activity of planting and growing of flowers for business purpose. Odisha is a state which has rich potentiality for flower farming and marketing. Considering the demand and scope of flowers in the state the govt. has also made some policy for floriculture under the department of Horticulture. Floriculture provides ample opportunity not only for farming benefit but also vast employment to the people of the state. Flowers like rose, marigold, jasmine, lotus and champa are some of the flowers which has a large demand over the years and now it has been meant for export purpose. The agro climatic condition of the state is suitable for flower plantation and it is rising day by day to meet the domestic demand as well as the demand of the entrepreneurs of the state. Now floriculture is absolutely meant for commercial purpose where small and medium entrepreneurs depend on this farming activity.
Citation :

af

Dr Nishi Kanta Mishra , Mr Durga Prasad Mishra," A Study on Entrepreneurial Challenges of Floriculture in Odisha”, International Journal of Computer Engineering In Research Trends, Volume 3, Issue 8, August-2016, pp. 419-424
Keywords :
References :

af

 
:
DOI Link :
Download :
  V3I807.pdf
Refbacks :
Design and development of test setup to study the basic procedure of vibration analysis
Authors : G. C. Mekalke, B. B. Kabnure,
Affiliations :
Abstract :

af

In past several years Vibration monitoring and vibration diagnosis of various machines has gained enormous importance which includes smaller and medium sized machines with increasing machine frequency. For localization of defects and causes of damage to machines, vibration diagnosis is a fantastic tool, also one can used as an objective defense against unjustified warranty claims. At low speed, vibration can be ignored but at moderate and high speed this becomes larger and various parts of machines will not work properly as a result failure of machine parts. Fast Fourier transform (FFT) analyzer with 8 channel accelerometer probe are used for measuring the vibration amplitude. Accelerometer is a transducer which is used for converting mechanical vibration into electrical signal. The transducer output is proportionate to frequency and amplitude which describes what is wrong with the machine and relative severity of the problem respectively. By understanding the importance of vibration analysis, to study the different methods of vibration diagnosis we made a small setup, and all the methods are studied experimentally on that test setup.
Citation :

af

G. C. Mekalke, B. B. Kabnure," Design and development of test setup to study the basic procedure of vibration analysis”, International Journal of Computer Engineering In Research Trends, Volume 3, Issue 8, August-2016, pp. 411-418
Keywords :
References :

af

 
:
DOI Link :
Download :
  V3I806.pdf
Refbacks :
An Innovative Piecewise Linear Companding Method for PAPR Reduction and Companding Distortion in OFDM System
Authors : Sangam Sai Krishna Kumar, Mahender Veshala,
Affiliations :
Abstract :

af

Orthogonal frequency division multiplexing (OFDM) is a popular modulation/multiplexing scheme offers high dataratesIt is considered as multicarrier transmission scheme supports future generation wireless as well as wireline communication systems.OFDM frequently suffers from high Peak to Average Power Ratio (PAPR) which eventually increases the Analogue to Digital and Digital to Analogue converters complexity levels and reduces HPA (RF) efficiency. Various Peak to average power ratio (PAPR) reduction schemes have been proposed in the past and companding is the popular PAPR reduction which is inserted after modulation in the OFDM system. Although companding scheme provides better results but simultaneously its presence as extra operation increases the bit error rate. In this paper, a novel piecewise linear companding scheme is implemented to reduce the PAPR impact and control the commanding distortion in the OFDM system. The piecewise linear companding scheme reduces the peak to average power ratio by clipping the amplitudes over the compounded peak amplitude. Finally, the simulation result yields the better spectral efficiency and batters BER performance while mitigating the companding distortion better way the PAPR is reduced in an accurate way.
Citation :

af

Sangam Sai Krishna Kumar, Mahender Veshala," An Innovative Piecewise Linear Companding Method for PAPR Reduction and Companding Distortion in OFDM System”, International Journal of Computer Engineering In Research Trends, Volume 3, Issue 8, August-2016, pp. 404-410
Keywords :
References :

af

 
:
DOI Link :
Download :
  V3I805.pdf
Refbacks :
Online Java Compilers Using Cloud Computing
Authors : Gopal Krishna.A, Parimala.G, Durga Charan.K
Affiliations :
Abstract :

af

on these days it is common utilization of Internet, in this web world every one of the things are on the web. Cloud computing model is for empowering helpful and in addition as needed network access to a common pool of configurable computing assets which can be immediately provisioned and discharged with least administration endeavors. So we develop software as a service like online compiler. This research main goal is we can easily write programs, compile and debug in online. Using these cloud compilers we can reduce the storage space and movability, centralized compiler using cloud computing that helps to save the time, storage and cost using this concept. So that it’s a most appropriate tool to compile the code, remove the errors and debug it. Using these compilers will provide online compiler service, like SaaS installation of separate compiler on each machine is avoided. Once we use this application in cloud we can access the compiler from the web. So that we can obtain the common errors and analysis of time complexity of compiler.
Citation :

af

Gopal Krishna.A, Parimala.G, Durga Charan.K," Online Java Compilers Using Cloud Computing”, International Journal of Computer Engineering In Research Trends, Volume 3, Issue 8, August-2016, pp. 398-403
Keywords :
References :

af

 
:
DOI Link :
Download :
  V3I804.pdf
Refbacks :
Bio Inspired Bees Behavior Approaches for Computer Science Problems
Authors : Mr. A.S. Shelar, Mr. U. A. Nuli, Mr. V. V. Kheradkar
Affiliations :
Abstract :

af

Bio inspired algorithms plays an important role in solving complex and huge problems in computer science. It helps us in finding the optimal desired way to solve extremely dynamic, difficult and robust problems. These algorithm help us to cope with the technological need of a new era. Many researchers did enormous work in this area from the past few decades. However, bees based algorithm on its different behavior is more useful to solve such kind of problems. This paper presents a few, detailed in of some bees behavior algorithm, which was used in order to tackle various challenges faced in different problems. Bees foraging and marriage behavior is applied to solve many problem such as job scheduling, color graph, Association Rule Mining problem, etc. This paper discussed different bees behavior approaches and basic bee algorithm used to solve different computer science problems.
Citation :

af

Mr. A.S. Shelar, Mr. U. A. Nuli, Mr. V. V. Kheradkar," Bio Inspired Bees Behavior Approaches for Computer Science Problems”, International Journal of Computer Engineering In Research Trends, Volume 3, Issue 8, August-2016, pp. 394-397
Keywords :
References :

af

 
:
DOI Link :
Download :
  V3I803.pdf
Refbacks :
Bus Pass and Ticket automation System
Authors : P.Sharmila , A.Ponmalar , Skanda Gurunathan R
Affiliations :
Abstract :

af

The rapidly aging population causes long waiting times for taking bus pass. Diagnosing record of real-time data of each who are all using bus passes, Bus pass automation would be beneficial for government to implement proper and better rates for passes and also it would be useful for people who forget to renew their bus passes. Also taking tickets in an MTC bus is a tedious process now-a-days. Giving exact change for tickets to a large crowd is also a tedious process for conductors in the buses. In this paper, we propose a facility to take bus tickets and bus passes using android mobile application. This system provides a facility for taking tickets on the go, by just scanning the QR code user can book a ticket and pay online. This system also provides a facility to remind when the bus pass is about to expire. The app is also used to take print out of the pass, so that it can be shown to the conductors who are unfamiliar with android phones. The system is also provided with digital wallet where the user can load money as a whole and use it in each buses the user travels.
Citation :

af

P.Sharmila ,A.Ponmalar and Skanda Gurunathan R," Bus Pass and Ticket automation System”, International Journal of Computer Engineering In Research Trends, Volume 3, Issue 8, August-2016, pp. 389-393
Keywords :
References :

af

 
:
DOI Link :
Download :
  V3I802.pdf
Refbacks :
Engine Oil Mixing in Radiator Water: Study on I.C. Engine (Diesel) Performance
Authors : Dr. Porag Kalita, Mr. Alakesh Kalita ,
Affiliations :
Abstract :

af

A high compression internal combustion engine, in which the fuel is ignited by the heat of compression. The diesel cycle may be completed in either two or four strokes. A German Engineer, Dr. Rudolf Diesel designed on engine in 1802, which worked on a much higher compression ratio the petrol engines working on otto cycle. Diesel oil which fits the requirements for use in diesel engine. The reason that the application of an oil or grease to reduce friction between two or more moving parts. This lubricating system, in the engine that supplies moving parts with lubricating oil to prevent actual contact between any of the moving metal surface. Because as per theories of lubrication, is consisting by Hydrocarbons, Boundary and Hydrostic respectively. In automobiles engine, only 25% of the total heat produced by the combustion of fuel is actually converted into useful mechanical energy. The rest of the heat energy is used up in the cooling and exhaust systems. The main function of radiator, in the cooling system, a cooling chamber through which the water heated by the engine, passes so heat the temperature of the water can be controlled.
Citation :

af

Dr. Porag Kalita and Mr. Alakesh Kalita ," Engine Oil Mixing in Radiator Water: Study on I.C. Engine (Diesel) Performance”, International Journal of Computer Engineering In Research Trends, Volume 3, Issue 8, August-2016, pp. 384-388
Keywords :
References :

af

 
:
DOI Link :
Download :
  V3I801.pdf
Refbacks :

 

Maximum network lifetime with load balance and connectivity by clustering process for wireless sensor networks
Authors : Dr. C. Gulzar, AmeenaYasmeen,
Affiliations :
Abstract :

af

Wireless sensor networks are formed by a large number of low-power, low-cost and multifunctional wireless sensor nodes. The basic philosophy of wireless sensor network is to provide maximum coverage and connectivity of a sensing environment. Thus the network lifetime must be maximized as long as possible. As the usage of wireless sensor network has grown enormously the need for efficient management of energy has also increased. Wireless sensor networks are applied to a variety of range of applications such as home health care, battlefield surveillance, machine failure diagnosis, biological detection, home security, smart spaces, inventory tracking, machine monitoring, and environmental monitoring. These application tasks require full coverage at any time. Energy is a very scarce resource in case of wireless sensor network and it has to be managed properly to extend the life of the sensors. The nodes must be organized into maximal number of subgroups (clusters) capable of monitoring all discrete points of interest. To guarantee the connectivity of sensor nodes is also important while achieving full coverage. In this paper, thus we develop a novel Fully Clustered Energy-efficient Connected Coverage (FCECC) algorithm. The proposed (FCECC) consists of two components:
Citation :

af

Dr. C. Gulzar,AmeenaYasmeen," Maximum network lifetime with load balance and connectivity by clustering process for wireless sensor networks”, International Journal of Computer Engineering In Research Trends, Volume 3, Issue 7, July-2016, pp. 375-383
Keywords :
References :

af

 
:
DOI Link :
Download :
  3704.pdf
Refbacks :
A Survey on Load Balancing Algorithms in Cloud
Authors : T.Deepa, S Sharon Amulya Joshi,
Affiliations :
Abstract :

af

In the cloud computing environment, load balancing is one of the important issues, with great increase in the users and their requirements for different services on the cloud computing platform, efficient usage of resources in the cloud environment is very important. An efficient load balancing algorithm ensures efficient resource utilization by providing resources to users on-demand in pay-per-use manner. Load Balancing uses scheduling for prioritizing users. The performance indicators of load balancing algorithms in cloud are response time and waiting time. This paper presents various load balancing schemes in cloud environments.
Citation :

af

T.Deepa, S Sharon Amulya Joshi,"A Survey on Load Balancing Algorithms in Cloud ", International Journal of Computer Engineering In Research Trends, Volume 3, Issue 7, July-2016, pp. 371-374
Keywords :
References :

af

 
:
DOI Link :
Download :
  3703.pdf
Refbacks :
Image Compression using Vector Quantization based on MSE Approach
Authors : Ms.Sneha Rahul Mhatre, Prof.Arun Kulkarni, Prof.Madhuri Gedam
Affiliations :
Abstract :

af

Vector Quantization is an essential and fundamental technique for lossy image compression. Codebook generation is very important influence in Vector Quantization (VQ).The objective of this research is to create a new inventive Algorithm which can be used to take input image in bits and apply Haar transform to input image to create codebook for Vector Quantization. The new system in this research is used to create codebook based on MSE of input sequences which gives the better quality of image. The codebook generated will be more efficient for low frequency image.If the image size is too large then retrieval time is more so will used Fast Search algorithm can be used to reduce time and used to obtain PSNR with less mean square error (MSE).
Citation :

af

Sneha Rahul Mhatre et.al," Image Compression using Vector Quantization based on MSE Approach”, International Journal of Computer Engineering In Research Trends, Volume 3, Issue 7, July-2016, pp. 366-370
Keywords :
References :

af

 
:
DOI Link :
Download :
  3702.pdf
Refbacks :
Alternative Fuel for I.C. Engine: Review the Effect from Ethanol in Carburetor
Authors : DR. PORAG KALITA, ,
Affiliations :
Abstract :

af

We know that Ethanol as a gasoline blend has helped to reduce dependence on oil import and harmful vehicular emission. Due to the globalization impact as well as controlling the automobile exhaust emission, the automobile companies are introducing Multi Point Fuel Injector (MPFI) and Gasoline Direct Injection (GDI) respectively. However, introducing ethanol as alternative automobile fuel (E10, E85), the proper mixture ethanol and air mixture (for oxygenate compound), need of Carburetor for the function of the I C Engine combustion process. Because, it is of utmost necessity that ethanol (20% ethanol and 80% petrol) supplied to the engine should be completely vaporized before actual combustion. This is possible only when it is broken up into a fine spray, i.e. atomized. The process of atomization takes place normally in the inlet manifold. Carburetion process consists of vaporizing ethanol; mixing thoroughly with air and distributing the ethanol-air mixture evenly into the cylinder.
Citation :

af

DR. PORAG KALITA ," Alternative Fuel for I.C. Engine: Review the Effect from Ethanol in Carburetor”, International Journal of Computer Engineering In Research Trends, Volume 3, Issue 7, July-2016, pp. 371-376
Keywords :
References :

af

 
:
DOI Link :
Download :
  3701.pdf
Refbacks :

 

Information Security On eGovernment As Information-Centric Networks
Authors : Tri Kuntoro Priyambodo, Didit Suprihanto,
Affiliations :
Abstract :

af

Information security is a major factor in the service of eGovernment. The using of host to host in previous services of eGovernment is considered as lacking in security. Therefore, it needs more security to serve clients more efficiently and to obtain reliable data provided from the host. One of approach ways to solve the previous security services are based on the safety approach on the contents. The approach on content is used to improve the security which has been used. The approach offered in this paper is called Information Centric Network, this approach is one of the alternatives that is used to secure the content on eGovernment, in addition to approaches by using encryption and captcha. Human aspect is also included as one of the factors of eGovernment security itself.
Citation :

af

Tri Kuntoro Priyambodo, Didit Suprihanto," Information Security On eGovernment As Information-Centric Networks”, International Journal of Computer Engineering In Research Trends, Volume 3, Issue 6, June-2016, pp. 360-365
Keywords :
References :

af

 
:
DOI Link :
Download :
  V3I616.pdf
Refbacks :
Investigation of Various Image Steganography Techniques in Spatial Domain
Authors : Gunjan , Er. Madan Lal,
Affiliations :
Abstract :

af

In this internet era the security of information has become a big concern. People are communicating over internet. Their communication can be made secure through information hiding technique known as steganography .It is a Greek world which literally means enclosed writing. Image steganography is very popular because it exploits the weakness of human visual system and also large amount of redundant bits are present in digital representation of an image. In this paper various image steganography techniques in spatial domain are investigated.
Citation :

af

Gunjan, Er. Madan Lal. "Source Anonymity using multiple mixes in Packet Scheduling”, International Journal of Computer Engineering In Research Trends, Volume 3, Issue 6, June-2016, pp. 347-351
Keywords :
References :

af

 
:
DOI Link :
Download :
  V3I614.pdf
Refbacks :
Intensification of Resolution in the Realm of Digital Imaging
Authors : Shivangi Jindal , Harkiran Kaur,
Affiliations :
Abstract :

af

High resolution (HR) images have great importance in many areas, such as astronomy, medical, video surveillance, etc. These HR images give some additional details which are of great significance for analysis in various applications. This paper investigates mainly on various methods of super resolution that are existing, and putting it all together for a literature survey. Scope of this study mainly focuses on the different available techniques of image processing to get high resolution images.
Citation :

af

Shivangi Jindal, Harkiran Kaur,"Source Anonymity using multiple mixes in Packet Scheduling”, International Journal of Computer Engineering In Research Trends, Volume 3, Issue 6, June-2016, pp. 343-346
Keywords :
References :

af

 
:
DOI Link :
Download :
  V3I613.pdf
Refbacks :
Indian Smart Cities Programme it’s Challenges & Solutions
Authors : Mr.K.K.JAIN FIE (PhD), Dr D.P.KOTHARI, Dr J.PRAVEEN
Affiliations :
Abstract :

af

Smart city mission in India is of several major development program focused on Indian rapid growth and its challenges & opportunities. The aim is to promote economic growth, stronger governance to improve quality of life. Government of India recently pledged to create 100 new smart cities in India phased wise. On the basis of an international slandered ISO 37120. Smart cities councils of India are prime consultants for this work. There are many challenges ahead in implementation and there innovative solutions. Smart Cities Challenge is competition designed to inspire to support municipal offices as they develop smart proposals to improve resident’s lives in year 2015 JULY. 97 cities competed in 1st round with best proposals receiving funds from ministry of Urban Development. .FOR funding. Out of 97 cities 20 were selected for best proposals. They will be receiving funds remaining cities entered in fast track program to up great their proposals. And will compete in next cycle. In June –July 2016. Currently 31% Indian populations are residing in cities. And expected that it would be 50 % by 2030. Here we shall discuss the international standards and how it would be implemented?. Many countries including U.K. have expressed their desire to help India financially and technically. Bristol University is talking leading role in this matter. They are going to drive innovation *we are creating an environment. So world will look towards Bristol for future of smart cities.*.
Citation :

af

Mr.K.K.JAIN FIE (PhD), Dr D.P.KOTHARI and Dr J.PRAVEEN, et al. "Source Anonymity using multiple mixes in Packet Scheduling”, International Journal of Computer Engineering In Research Trends, Volume 3, Issue 6, June-2016, pp. 336-342
Keywords :
References :

af

 
:
DOI Link :
Download :
  V3I612.pdf
Refbacks :
Source Anonymity using multiple mixes in Packet Scheduling
Authors : Mrs.S.Suganyadevi , Mrs.Dr.V.Anuratha ,
Affiliations :
Abstract :

af

Secret communication, where users converse without revealing the personalities of communicating parties or the trails of data stream is critical in data networks. On the Internet, Chaum mixes, intermediate nodes, or proxy servers, which use coated encryption and packet shuffling techniques to hide source identities, are used to provide anonymity to network users. In this analysis, an information theoretic structure is developed to study the maximum anonymity possible by packet shuffling when the merges are memory restricted—in other words, they can store a finite number of packets. Network of mixes over receiving packet sources from an eavesdropper’s perspective as the measure of secrecy, the maximum achievable secrecy of a single mix with buffer size b (packets which contains the source and destination details of itself ) serving for achieving multiple mixes (network of mixes). By obtaining network of mixes the source anonymity is achieved successfully. For a general multiuser system, the maximum anonymity as buffer size b→∞ is shown to approach the entropy of the source arrival probabilities at a convergence rate no less significant than 1/b2. When the arrival probabilities of the general multiuser system can be expressed as a rational portion k/2n for some fixed n, this union rate is shown to be achievable. The secrecy analysis is extended to a common network of mixes linking the sources to multi destination, where the source secrecy achievable on the target link is shown to be lower enclosed by a weighted sum of the secrecy achievable by each individual mix.
Citation :

af

S.Suganyadevi, et al. "Source Anonymity using multiple mixes in Packet Scheduling”, International Journal of Computer Engineering In Research Trends, Volume 3, Issue 6, June-2016, pp. 332-335
Keywords :
References :

af

 
:
DOI Link :
Download :
  V3I611.pdf
Refbacks :
Morphometric Analysis of Kelo Basin for Environmental Impact Assessment
Authors : Bhargava K. Iyengar, ,
Affiliations :
Abstract :

af

The Chhattisgarh region is characterized by non-perennial streams, which actually are rain-fed rivers. They carry water only during and immediately after rain. During the dry season either they may cease to flow entirely, or there is hardly any water in most of the drainage channels. Clearly, watersheds with a higher proportion of area drained by non-perennial streams will tend to have lower soil moisture retention and water harvesting capability than those areas where perennial streams pre-dominate. Ceteris paribus, areas with proportionately more perennial streams should be fewer droughts vulnerable. 44 Stream Patterns Catchment areas can be described by their stream channel patterns, as viewed from maps or from the air. Each stream has its characteristic channel, based on the topographical obstacles encountered, as it seeks the `path of least resistance' in its journey towards the sea. Stream patterns may develop randomly on uniform soils, or in response to weaknesses in the underlying geology (McKnight, 1990; 1985).
Citation :

af

Bhargava K. Iyengar et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 06, June-2016, pp. 327-331
Keywords :
References :

af

 
:
DOI Link :
Download :
  V3I610.pdf
Refbacks :
Review of Agile Software Development Methodologies
Authors : Khushdeep Sharma, Dr. Himanshu Aggarwal,
Affiliations :
Abstract :

af

During the past forty years, many new software development approaches were introduced to fit the new cultures of the software development companies which aim to produce valuable software in short time period with minimal costs, and within unstable, changing environments and Agile Methodology is one of them. This paper presents a review of agile methodologies, comparison between agile methodologies, how they are divergent from the traditional process methods.
Citation :

af

Khushdeep Sharma et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 06, June-2016, pp. 321-326
Keywords :
References :

af

 
:
DOI Link :
Download :
  V3I609.pdf
Refbacks :
Context Based XML Data and Diversification for Keyword Search Queries
Authors : Mr. RAHUL HON , Mrs. N.SUJATHA,
Affiliations :
Abstract :

af

In searching process user enter particular candidate searching keyword and with the help of searching algorithm respective searching query is executed on targeted dataset and result is return as an output of that algorithm. In this case it is expected that meaningful keyword has to be entered by user to get appropriate result set. In case of confusing bunch of keywords or ambiguity in it or short and indistinctness in it causes an irrelevant searching result. Also searching algorithms works on exact result fetching which can be irrelevant in case problem in input query and keyword. This problem statement is focused in this system. By considering the keyword and its relevant context in XML data , searching should be done using automatically diversification process of XML keyword search. In this way system may satisfy user, as user gets the analytical result set based on context of searching keywords. For more efficiency and to deal with big data, HADOOP platform is used. baseline efficient algorithms are proposed to incrementally compute top-k qualified query candidates as the diversified search intentions. Compare selection criteria are targeted: the k selected query candidates are most relevant to the given query while they have to cover maximal number of distinct results on real and synthetic data sets demonstrates the effectiveness diversification model and the efficiency of algorithms
Citation :

af

RAHUL HON et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 06, June-2016, pp. 314-320
Keywords :
References :

af

 
:
DOI Link :
Download :
  V3I608.pdf
Refbacks :
A Novel Additive Multi-Keyword Search for Multiple Data Owners in Cloud Computing
Authors : Mr. M. VEERABRAHMA CHARY, Mrs.N.SUJATHA,
Affiliations :
Abstract :

af

Observing the view of cloud computing, it has become augmenting popular for data owners to outside supplier their information to public cloud servers while allowing data users to regain this data. To relate to seclusion, safe searches over encrypted cloud data have provoke more research works under the sole owner model. However, most cloud servers in practice do not just Serve unique owner; instead, they support multiple owners to share the benefits brought by cloud computing. In this paper, we suggest -To keep safe the secrecy and several owner model search several keywords and Ranked. To make possible cloud servers to execute safe to look omission knowing the real information of both keywords and trapdoors, To keep alive the privacy of related scores between keywords and files and rank the search result, we suggest a novel Additive Order and Privacy Preserving Function family and dynamic hidden key creation rule and a new data user to establish as genuine rule.
Citation :

af

M. VEERABRAHMA CHARY et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 06, June-2016, pp. 308-313
Keywords :
References :

af

 
:
DOI Link :
Download :
  V3I607.pdf
Refbacks :
Discovery of ranking fraud for Mobile Apps
Authors : Mrs. CH APPORVA, Mr. K.ASHOK KUMAR,
Affiliations :
Abstract :

af

Ranking fraud in the mobile App market refers to false or deceptive activities which have a reason of bumping up the Apps in the popularity list. Certainly, it becomes more and more frequent for App developers to use shady means, such as inflating their Apps' sales or posting phony App ratings, to commit ranking fraud. While the importance of preventing ranking fraud has been widely recognized, there is limited understanding and research in this area. A ranking fraud detection system for mobile Apps was developed. Specifically, this ranking fraud happened in leading sessions and provided a method for mining leading sessions for each App from its historical ranking records and identified ranking based evidences, rating based evidences and review based evidences for detecting ranking fraud. Moreover, we proposed an optimization based aggregation method to integrate all the evidences for evaluating the credibility of leading sessions from mobile Apps. An unique perspective of this approach is that all the evidences can be modelled by statistical hypothesis tests, In this paper we want to propose more effective fraud evidences and analyze the latent relationship among rating, review and rankings. Moreover, we will extend our ranking fraud detection approach with other mobile App related services, such as mobile Apps recommendation, for enhancing user experience.
Citation :

af

CH APPORVA et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 06, June-2016, pp. 303-307
Keywords :
References :

af

 
:
DOI Link :
Download :
  V3I606.pdf
Refbacks :
User-Defined Privacy Grid System for T-Broker: A Trust-Aware Service Brokering Scheme Multiple Cloud Collaborative Services
Authors : Mr. C.CHAITANYA, Mr. V.N.VENU GOPAL,
Affiliations :
Abstract :

af

To facilitate extensive collaborations, today’s organizations raise increasing needs for information sharing via on-demand information access. Information Brokering System (IBS) a top a peer-topeer overlay has been proposed to support information sharing among loosely federated data sources. It consists of diverse data servers and brokering components, which help client queries to locate the data servers. However, many existing IBSs adopt server side access control deployment and honest assumptions on brokers, and shed little attention on privacy of data and metadata stored and exchanged within the IBS. More importantly, T-broker uses the maximizing deviation method to compute the direct experience based on multiple key trusted attributes of service resources, which can overcome the limitations of traditional trust schemes, in which the trusted attributes are weighted manually or subjectively. Finally, T-broker uses a lightweight feedback mechanism, which can effectively reduce networking risk and improve system efficiency. The experimental results show that, compared with the existing approaches, our T-broker yields very good results in many typical cases, and the proposed system is robust to deal with various numbers of dynamic service behavior from multiple cloud sites.
Citation :

af

C.CHAITANYA et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 06, June-2016, pp. 295-302
Keywords :
References :

af

 
:
DOI Link :
Download :
  V3I605.pdf
Refbacks :
User-Defined Privacy Grid System for Continuous Location Based Services
Authors : Mr. G.SAI KUMAR, Mr. G.LAKPATHI,
Affiliations :
Abstract :

af

In this paper we have demonstrated Location-Based Services (LBSs) which has surfaced as prominent applications in mobile networks. An important challenge in the wide deployment of location-based services (LBSs) is the privacy aware management of location information, providing safeguards for location privacy of mobile clients against vulnerabilities for abuse. This paper describes a scalable architecture for protecting the location privacy from various privacy threats resulting from uncontrolled usage of LBSs. This architecture includes the development of a personalized location anonymization model and a suite of location perturbation algorithms. In particular, our algorithm makes use of a variable-sized cloaking region that increases the location privacy of the user at the cost of additional computation, but maintains the same traffic cost. Our proposal does not require the use of a trusted third-party component, and ensures that we find a good compromise between user privacy and computational efficiency. we propose a user-defined privacy grid system called dynamic grid system (DGS); the first holistic system that fulfils four essential requirements for privacy-preserving snapshot and continuous LBS. Our experiments show that the personalized location k-anonymity model, together with our location perturbation engine, can achieve high resilience to location privacy threats without introducing any significant performance penalty. Experimental results show that our DGS is more efficient than the state-of-the-art privacy preserving technique for continuous LBS.
Citation :

af

G.SAI KUMAR et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 06, June-2016, pp. 289-295
Keywords :
References :

af

 
:
DOI Link :
Download :
  V3I604.pdf
Refbacks :
PROGRESSIVE DUPLICATE DETECTION
Authors : Mr .BETKAR AKSHAY SURESH, Mrs. N.SUJATHA,
Affiliations :
Abstract :

af

One of the difficult issues confronted in a few applications with individual subtle elements administration, client alliance administration, information mining, and so on is copy location. This overview manages the different copy record identification strategies in both little and substantial datasets. To identify the deception with less time of execution furthermore without exasperating the dataset quality, strategies like Progressive Blocking and Progressive Neighborhood are utilized. Progressive sorted neighborhood method likewise called as PSNM is utilized as a part of this model for finding or recognizing the copy in a parallel methodology. Progressive Blocking calculation takes a shot at huge datasets where discovering duplication requires massive time. These calculations are utilized to improve copy location framework. The productivity can be multiplied over the ordinary copy recognition technique utilizing this calculation. A few distinct strategies for information examination are considered here with different methodologies for copy discovery.
Citation :

af

BETKAR AKSHAY SURESH et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 06, June-2016, pp. 284-288
Keywords :
References :

af

 
:
DOI Link :
Download :
  V3I603.pdf
Refbacks :
Experimental Study on Automobiles Exhaust Emission Control
Authors : Dr. Porag Kalita, ,
Affiliations :
Abstract :

af

The biggest question today before the metropolitan population of our country in particular is, “Pollution is, snuffing us out” and pollution ever be controlled? There are no doubts that the progress was achieved in the last few decades in some areas in very negligible in comparison with the overall picture. For the controlling of automobile exhaust emission, the honorable Supreme Court of India, in June 1999 ruled that vehicular emission had to be reduced at a much quicker pace than planned so far. Engine manufactures was facing the challenging task to quality find solutions that are production feasible, technological explained with Euro norms, and therefore, they have been changing the concept of IC engine design, multipoint fuel injection system, Catalytic Converter and incorporation of Exhaust Gas Re-circulation (EGR) remarkably. To reduce the automobile exhaust emission the several control equipment’s are: 1. Catalytic Converter, 2. Exhaust Gas Re-circulation (EGR), 3. Air Aspiration System, 4. Positive Crankcase Ventilation, etc. NOx control system that recycles a small part of the inert exhaust gas back through the manifold to lower the combustion temperature and this system is called Exhaust Gas Re-Circulation system. Catalytic converter converts harmful gases to harmless gases. A catalyst is a material that causes a chemical change without entering into the chemical reaction. For example, in the Catalytic converter converts harmful gases to harmless gases. A catalyst is a material that causes a chemical change without entering into the chemical reaction.
Citation :

af

DR. PORAG KALITA et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 06, June-2016, pp. 284-290
Keywords :
References :

af

 
:
DOI Link :
Download :
  V3I602.pdf
Refbacks :
Effective Analysis of Data from Remote Sensing Application
Authors : Santhosh Gowda T.R, Vijay G.R,
Affiliations :
Abstract :

af

At present applications like Internet, mobile devices, social media, geospatial devices, sensors will generate massive volume of data.Processing and extracting the useful information in an efficient manner leads a system toward a major computational challenges, such as to analyze, aggregate, and store data. For these Big data analytical architecture is proposed. The architecture comprises three main units, such as 1) remote sensing Big Data acquisition unit (RSDU); 2) data processing unit (DPU); and 3) data analysis decision unit (DADU). RSDU acquires data from the sensors and sends this data to the Base Station. DPU provides an efficient processing of Data by providing filtration, load balancing, and parallel processing. DADU is responsible for compilation, storage of the results, and generation of decision based on the results received from DPU.
Citation :

af

Santhosh Gowda T.R et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 06, June-2016, pp. 279-283
Keywords :
References :

af

 
:
DOI Link :
Download :
  V3I601.pdf
Refbacks :

 

Defensive Cloud Service Providers Against Stealthy Denial of Service Strategy
Authors : Mrs. P.SRILAKSHMI, Mrs. N.SUJATHA,
Affiliations :
Abstract :

af

Cloud Computing allows customers to access cloud resources and services. On-demand, self-service and pay-by-use business model are adapted for the cloud resource sharing process. Service level agreements (SLA) regulate the cost for the services that are provided for the customers. Cloud data centers are employed to share data values to the users. Denial-of-Service (DoS) attack is an attempt by attacker to prevent legitimate users from using resources. Distributed Denial of Service (DDoS) Attacks is generated in a “many to one” dimension. In DDoS attack model large number of compromised host are gathered to send useless service requests, packets at the same time .DoS and DDoS attacks initiates the service degradation, availability and cost problems under cloud service providers. Brute-force attacks are raised against through specific periodic, pulsing and low-rate traffic patterns. Rate-controlling, time-window, worst-case threshold and pattern-matching are adapted to discriminate the legitimate and attacker activities. Stealthy attack patterns are raised against applications running in the cloud. Slowly-Increasing- Polymorphic DDoS Attack Strategy (SIPDAS) can be applied to initiate application vulnerabilities. SIPDAS degrades the service provided by the target application server running in the cloud. Polymorphic attacks changes the message sequence at every successive infection to avoid signature detection process. Slowly-increasing polymorphic behavior induces enough overloads on the target system. XML-based DoS (XDoS) attacks to the web-based systems are applied as the testing environment for the attack detection process we describe both how to apply the proposed strategy, and its effects on the target system deployed in the cloud.
Citation :

af

P.SRILAKSHMI et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 05, May-2016, pp. 369-375
Keywords :
References :

af

 
:
DOI Link :
Download :
  V3I517.pdf
Refbacks :
A Scalable and Reliable Matching Service for Content-based Publish/Subscribe Systems
Authors : Mrs.B.PRATHYUSHA, K.ASHOK KUMAR,
Affiliations :
Abstract :

af

Security is one of the extensive and complicated requirements that need to be provided in order to achieve few issues like confidentiality, integrity and authentication. In a content-based publish/subscribe system, authentication is difficult to achieve since there exists no strong bonding between the end parties. Similarly, Integrity and confidentiality needs arise in published events and subscription conflicts with content-based routing. The basic tool to support confidentiality, integrity is encryption. In this paper, we propose SREM, a scalable and reliable event matching service for content-based pub/sub systems in cloud computing environment. To achieve low routing latency and reliable links among servers, we propose a distributed overlay SkipCloud to organize servers of SREM. Through a hybrid space partitioning technique HPartition, large-scale skewed subscriptions are mapped into multiple subspaces, which ensures high matching throughput and provides multiple candidate servers for each event. Moreover, a series of dynamics maintenance mechanisms are extensively studied.
Citation :

af

B.PRATHYUSHA et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 05, May-2016, pp. 361-368
Keywords :
References :

af

 
:
DOI Link :
Download :
  V3I516.pdf
Refbacks :
Location-aware and Personalized Collaborative Filtering for Web Service Recommendation
Authors : Mr.A.AVINASH, Mrs.N.SUJATHA,
Affiliations :
Abstract :

af

As the number of web services with similar functionality increases, the service users usually depend on web recommendation systems. Now a days the service users pay more importance on nonfunctional properties which are also known as Quality of Service (QoS) while finding and selecting appropriate web services. Collaborative filtering[3] approach predicts the QoS values of the web services effectively. Existing recommendation systems rarely consider the personalized influence of the users and services in determining the similarity between users and services. The proposed system is a ranking oriented hybrid approach which integrates user-based and item-based QoS predictions. Many of the non-functional properties depend on the user and the service location. The system thus employs the location information of users and services in selecting similar neighbors for the target user and service and thereby making personalized service recommendation for service users. General Terms Service computing, Recommendation
Citation :

af

A.AVINASH et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 05, May-2016, pp. 356-360
Keywords :
References :

af

 
:
DOI Link :
Download :
  V3I515.pdf
Refbacks :
Discovery of ranking fraud for Mobile Towards Optimized Fine-Grained Pricing of IaaS Cloud Platform
Authors : Mrs. S.JYOTHIREDDY, Mr. G.LAKPATHI,
Affiliations :
Abstract :

af

In Cloud many pricing schemes in IaaS platform are already proposed with pay-as-you-go and subscription/spot market policy to guarantee service level agreement, it is still inevitable to suffer from wasteful payment because of coarse grained pricing scheme. In this paper, we investigate an optimized fine-grained and fair pricing scheme. Two tough issues are addressed: (1) the profits of resource providers and customers often contradict mutually; (2) VM-maintenance overhead like startup cost is often too huge to be neglected. Not only can we derive an optimal price in the acceptable price range that satisfies both customers and providers simultaneously, but we also find a best-fit billing cycle to maximize social welfare (i.e., the sum of the cost reductions for all customers and the revenue gained by the provider). We carefully evaluate the proposed optimized fine-grained pricing scheme with two large-scale real-world production traces (one from Grid Workload Archive and the other from Google data center). We compare the new scheme to classic coarse-grained hourly pricing scheme in experiments and find that customers and providers can both benefit from our new approach. The maximum social welfare can be increased up to 72:98% and 48:15% with respect to DAS-2 trace and Google trace respectively.
Citation :

af

S.JYOTHIREDDY et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 05, May-2016, pp. 350-355
Keywords :
References :

af

 
:
DOI Link :
Download :
  V3I514.pdf
Refbacks :
A Low Voltage Tuned Colpitt’s Oscillator Using CDTA
Authors : NAWAZ SHAFI, SHREYA GUPTA,
Affiliations :
Abstract :

af

In this paper by using current differencing trans-conductance amplifier (CDTA) as an active building block COLPITT’s oscillator has been proposed. The oscillator is realized by a single block of CDTA, two capacitors and an inductor. The resistor is replaced by a NMOS transistor connected to z terminal of the CDTA. The frequency of the oscillation can be controlled by the tank circuit. The oscillator can produce oscillation of frequency ranging from 10KHz to 100MHz. The operation of the proposed Colpitt’s oscillator has been verified using SPICE. The CDTA was implemented on 350nm CMOS technology.
Citation :

af

NAWAZ SHAFI et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 05, May-2016, pp. 273-278
Keywords :
References :

af

 
:0
DOI Link :
Download :
  V3I513.pdf
Refbacks :
Implementation of H.264/AVC Video Authentication System Using Watermark
Authors : Manasa C, Pramod Sunagar,
Affiliations :
Abstract :

af

This paper presents a hybrid approach to encode and decode the data received from the video using H.264 encoder/decoder and to derive the compressed data for the given image using the compression algorithm such as DCT. The encoded data derived from the output of the Encoder part, while the decoded data reconstructed from the encoded video output. The watermarking was also done on the input video in order to increase the robustness of the overall system. The watermark is an image and it was embedded into the frames of the input video which results as the watermarked video. The watermark is embedded in to the frames using DWT algorithm. From the watermarked video, the watermark (image) is decrypted and the input video is reconstructed. Experimental results demonstrate the superiority of the proposed system compared to the former existing schemes in encoding and watermarking tasks. The H.264 Encoder/Decoder method compresses the frames of the video efficiently, and at the same time, the actual input frames of the video can be reconstructed from the corresponding compressed data stream.
Citation :

af

Manasa C et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 05, May-2016, pp. 266-272
Keywords :
References :

af

 
:0
DOI Link :
Download :
  V3I512.pdf
Refbacks :
Improving Web Services Maintenance through Regression Testing
Authors : Divya Rohatgi, Prof. (Col) Gurmit Singh,
Affiliations :
Abstract :

af

Software maintenance is considered to be the most expensive activity in software development and is used to ensure quality to the product. Regression Testing is a part of software maintainers which is done every time the software is changed. For software like Web services which represent a class of Service oriented architectures this activity is a challenging task. Since web services incorporate business functionality thus maintaining proper quality is an important concern. Due to inherent distributed, heterogeneous and dynamic in nature, regression testing is difficult and time consuming activity. Thus in order to reduce maintenance cost we have to reduce regression testing cost. Thus in this paper, we have given a comprehensive study of regression testing of web services exploring the challenges, approaches and tools used for them to ensure proper quality and inherently reducing the maintenance costs.
Citation :

af

Divya Rohatgi et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 05, May-2016, pp. 261-265
Keywords :
References :

af

 
:0
DOI Link :
Download :
  V3I511.pdf
Refbacks :
Digital Media: Role and Efficacy in developing and managing Political Campaigns
Authors : Dr. Akshat Dubey, Ms. Palak Gupta,
Affiliations :
Abstract :

af

The marketing landscape is witnessing a paradigm shift with the revolutionary effect of technology. No marketing space is left unaffected with the impact of digital media. Political marketing or campaigns run by political parties is no exception to this thunderous phenomenon. The way in the last few years political parties have adopted this new trend and benefited from it is as interesting as any general election. The traditional methods have been outshined by these new technology tools and have forever changed the way electoral campaigns are managed. The NDA and Aam Aadmi Party were highly successful through the adoption of these tools. This paper tries to identify the role and the reasons which led to the growth and immense impact of these digital marketing tools.
Citation :

af

Dr.Akshat Dubey et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 5, May-2016, pp. 255-260
Keywords :
References :

af

 
:0
DOI Link :
Download :
  V3I510.pdf
Refbacks :
Electronic Mouse for Disabled People
Authors : Shubham Pradip Navale, Prasad Suresh Tatar, Prashant Rajendra Teli and D.B.Salunke4
Affiliations :
Abstract :

af

This paper shows the design of computer mouse for disabled people using MEMS accelerometer, MIC and reflection sensor. The movement of cursor on computer is controlled by accelerometer which is mounted on the side of head with the help of rubber band. When head is tilted in some direction, in left/right/forward/backward, accelerometer will sense the tilt. To perform click operation two sensors are used. First is MIC, when air is blown on MIC which is placed in front of mouth it performs clicking operations. If there is a single air blow then it will perform left click operation and if air is blown two times then it will perform right click. Suppose the person is not able to blow air on MIC or is exhausted then second sensor is used. The second sensor is reflection sensor which is mounted in front of cheek. When cheek muscle is moved it is sensed by reflection sensor. If cheek muscle is moved one time then left click operation is performed and if it is moved twice then right click operation is performed. The equipment uses AVR microcontroller ATmega 16A as a control unit. It is used to capture the output of all three sensors and process the data. After processing microcontroller sends commands to computer through MAX232 and DB9 connector. The commands coming from serial port are decoded in the software. Then software will perform the operation of mouse on computer.
Citation :

af

Shubham Pradip Navale et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 5, May-2016, pp. 251-254
Keywords :
References :

af

 
:0
DOI Link :
Download :
  V3I509.pdf
Refbacks :
Design Optimization and Buckling Analysis of Pressure Vessel
Authors : N.Karthik, M.Jaypal Reddy, M.NagaKiran
Affiliations :
Abstract :

af

Pressure vessels like pre-water heaters essentially heat exchangers that are used in closed power cycles. These pressure vessels are used to preheat the water fed into Boilers or heat the water before entering the boiler using expanded steam to increase the efficiency of the cycle. These heavy duty pressure vessels are in working condition throughout the year. The vessel strength will be reduced with time. This can be reduced by providing a winding coil around the vessel as a strip. The strip material will not affect the boiler but increases the life. The modeling was done by using Creo 2.0. Which is an advanced modeling software used in almost all the manufacturing industries. After the modeling the model was imported into the ANSYS 14.0. The linear buckling analysis of the pressure vessel will be done before and after the winding coil was placed at different load conditions and the maximum buckling load will be estimated. By considering some different type of materials to the mod el for showing the differences. Finally the results will be tabulated and graphs will be plotted.
Citation :

af

N.KARTHIK et al.,, International Journal of Mechanical Engineering In Research Trends Volume 3, Issue 5, May-2016, pp. 246-250
Keywords :
References :

af

 
:0
DOI Link :
Download :
  V3I508.pdf
Refbacks :
Car Pooling Using Android Operating System-A Step towards Green Environment
Authors : Santhosh Kumar M, Harshavardana Doddamani,
Affiliations :
Abstract :

af

Carpooling is one of the latest technologies discovered which has made travelling convenient and efficient to the common man. It also known as car-sharing in which one can travel to their destination while sharing the vehicle and the expenses. Hence fuel costs, tolls and the stress of driving will be reduced when more people travel together in one vehicle. Carpooling is also an environment friendly app and we can save our mother nature by using this app. It also helps in reducing traffic congestion, and other poisonous gases in the air. We can save a lot of space in the Parking lot. We will make an Android based application that will allow passengers to collaborate with other like-minded people and plan out their journey using the easy UI of the app after signing in to it. People will be able to share expenses and not worry about reaching late while making new connections.
Citation :

af

Santhosh Kumar M et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 5, May-2016, pp. 241-245
Keywords :
References :

af

 
:0
DOI Link :
Download :
  V3I507.pdf
Refbacks :
SECURE DATA RETRIEVAL FOR DECENTRALIZED DISRUPTION TOLERANT MILITARY NETWORKS
Authors : SHUBHAM P. VERMA , MAMTA S. MAHAJAN, KALYANI M. ZAWAR and TIPUSULTAN S. TADAVI
Affiliations :
Abstract :

af

A battlefield or a hostile region are partitions in military environments . Intermittent network connectivity is major problem in such environment. Frequent partitions are there. A true and easy solution is Disruption-tolerant network DTN technologies. To interact with each other people in a military environment carries devices that are wireless. The confidential information is accessed by these devices and they command reliably by exploiting external storage nodes. DTN is very successful technology in these networking environments. When there is no wired connection between a source and a destination device, the information from the source node may need to wait in the middle nodes for a huge amount of time until the connection would be correctly established. ABE is one of the challenging approaches which is attribute-based encryption that satisfies the requirements for retrieving secure data in DTNs. An appropriate way of encryption of data is given by Cipher text Policy ABE (CP-ABE) .Decryption should possess an attribute set which was used during encryption in order to decrypt the cipher text. Hence, multiple users may be allowed to decrypt different parts of data according to the security policy.
Citation :

af

SHUBHAM P. VERMA et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 5, May-2016, pp. 237-240
Keywords :
References :

af

 
:0
DOI Link :
Download :
  V3I506.pdf
Refbacks :
Concurrent Access to Encrypted Cloud Database
Authors : Bhupendra G. Hatzade, Deepa Amne,
Affiliations :
Abstract :

af

Now a days “cloud computing” is a renowned technology. Most of the organizations prefer to store the data on cloud, because every user wants to access their data at any time and at anywhere. Cloud is one of the storage device used to access their data at anywhere through networks. But because of this service, users always worry about privacy and confidentiality for their personal data. This paper gives quick introduction of a new technique that provides data confidentiality and concurrent access of encrypted cloud database, and discuss about cloud computing security issues and their solutions.
Citation :

af

Bhupendra G. Hatzade et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 5, May-2016, pp. 233-236
Keywords :
References :

af

 
:0
DOI Link :
Download :
  V3I505.pdf
Refbacks :
Suggested method for hiding secret data in cover image depending on the Connected Component Labeling algorithm
Authors : Mr.Atheer Hussein Zyara, ,
Affiliations :
Abstract :

af

the encryption and concealment of important areas to maintain the confidentiality of data , Where the proposed method is working on the coordination between the confidential data and the cover image and that is through combining between the encryption process and the concealment process (Creating the appropriate environment to conceal confidential data encoded in a special way at specific locations According to certain conditions ) , Where the proposed method is divided into three phases , First stage : converting confidential data to a binary system , And then dividing them to two matrices , 1's matrix that contains 1's with 0 between each frequent two groups from 1's , and 0's matrix that contains 0's with 1 between each frequent two groups from 0's . Second stage: converting the cover image to labeled image and thus determining the locations of pixels that its value 1 and the locations of pixels that its value 0 .Third stage : hiding 1's matrix and 0's matrix in the specific locations , And thus obtaining embedded image . Then sending the embedded image, And four keys (the start storage location, and length for 1's matrix. the start storage location, and length for 0's matrix) to the recipient to compare it with original image (unembedded image) for extracting the secret data . This method is characterized by flexibility where can be applied on image types and data of different, and the durability because the concealment locations be random semi. To illustrate the proposed method has been tested on the cover image of type the gray sacle , and textual data , also using the metrics (PSNR) and (MSE) To test the efficiency of the proposed method And that by using the language of MATLAB .
Citation :

af

Atheer Hussein Zyara et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 5, May-2016, pp. 226-232
Keywords :
References :

af

 
:0
DOI Link :
Download :
  V3I504.pdf
Refbacks :
Data Security Using Elliptic Curve Cryptography
Authors : Karishma Bhirud, Dipashree Kulkarni, Renuka Pawar and Prachi Patil.
Affiliations :
Abstract :

af

Cryptography technique is used to provide data security. In existing cryptography technique the key generation takes place randomly. Key generation require shared key. If shared key is access by unauthorized user then security becomes disoriented. Hence existing problems are alleviated to give more security to data. In proposed system a algorithm called as Elliptic Curve Cryptography is used. The ECC generates the key by using the point on the curve. The ECC is used for generating the key by using point on the curve and encryption and decryption operation takes place through curve. In the proposed system the encryption and key generation process takes place rapidly.
Citation :

af

Karishma Bhirud et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 5, 2016, pp. 222-225
Keywords :
References :

af

 
:0
DOI Link :
Download :
  V3I503.pdf
Refbacks :
Hard starting every initial stage: Study on Less Engine Pulling Power
Authors : DR. PORAG KALITA, ,
Affiliations :
Abstract :

af

Automobiles engine, it is a prime mover; and a machine in which power is applied to do work, often in the form of converting heat energy into mechanical work. We know that the power unit of an automobile is called I C engine. The power developed by the engine depends upon the calorific value of the fuel used. This value is equal to the total heat produced to combustion of hydrogen and carbon. Fuel injection pump (FIP), has to supply various quantities of fuel in accordance with the different engine load and in-line pumps, which correctly positioned connects the fuel supply from gallery. Diesel engines compress pure air during compression stroke and must have some means to force fuel into the combustion chamber with a pressure higher from the compression pressure. The injection nozzle atomizes the fuel very small droplets (3 to 30 microns) and delivers it to the combustion chamber. This achieved by small orifice.
Citation :

af

DR. PORAG KALITA et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 5, May-2016, pp. 216-221
Keywords :
References :

af

 
:0
DOI Link :
Download :
  V3I502 .pdf
Refbacks :
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
Authors : Mrs. P. Rizwana khatoon, Dr.C.Mohammed Gulzar,
Affiliations :
Abstract :

af

In this paper, we show the trustworthiness evaluating and secure deduplication over cloud data utilizing imaginative secure frameworks .Usually cloud framework outsourced information at cloud storage is semi-trusted because of absence of security at cloud storage while putting away or sharing at cloud level because of weak cryptosystem information may be uncover or adjusted by the hackers keeping in mind the end goal to ensure clients information protection and security We propose novel progressed secure framework i.e SecCloudPro which empower the cloud framework secured and legitimate utilizing Verifier(TPA) benefit of Cloud Server. Additionally our framework performs data deduplication in a Secured way in requested to enhance the cloud Storage space too data transfer capacity i.e bandwidth.
Citation :

af

P. Rizwana khatoon et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 5, May-2016, pp. 210-215
Keywords :
References :

af

 
:0
DOI Link :
Download :
  V3I501.pdf
Refbacks :

 

A Survey on Web Page Recommendation and Data Preprocessing
Authors : Ms. Sonule Prashika Abasaheb, Prof. Tanveer I. Bagban,
Affiliations :
Abstract :

af

In today’s era, as we all know internet technologies are growing rapidly. Along with this, instantly, Web page recommendations are also improving. The aim of a Web page recommender system is to predict the Web page or pages, which will be visited from a given Web-page of a website. Data preprocessing is one basic and essential part of Web page recommendation. Data preprocessing consists of cleanup and constructing data to organize for extracting pattern. In this paper, we discuss and focus on Web page Recommendation and role of data preprocessing in Web page recommendation, considering how data preprocessing is related to Web page recommendation.
Citation :

af

Sonule Prashika Abasaheb et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 4, April-2016, pp. 204-209
Keywords :
References :

af

 
:0
DOI Link :
Download :
  V3I416.pdf
Refbacks :
Secure Routing for MANET in Adversarial Environment
Authors : Nilima N. Patil, Kuldeep K. Vartha, Ashwini W. Wankhade and Sagar A. Patil
Affiliations :
Abstract :

af

Collection of mobile nodes is known as ad-hoc network in which wireless communication is used to connect these mobile nodes. A major requirement on the MANET is to provide unidentifiability and unlinkability for mobile nodes. There are various secure routing protocols have been proposed, but the requirement is not satisfied. The existing protocols are unguarded to the attacks of fake routing packets or denial-of-service broadcasting, even the node identities are protected by pseudonyms. We propose a new secure routing protocol which provides anonymity named as authenticated anonymous secure routing (AASR), to satisfy the requirement of mobile networks and defend the attacks. The route request packets are authenticated by a group signature and public key infrastructure, to defend the potential attacks without exposing the node identities. The cocept of key-encrypted onion routing which provides a route secret verification message, to prevent intermediate nodes from inferring a real destination. Simulation results have demonstrated the effectiveness of the proposed AASR protocol with improved performance as compared to the existing protocols.
Citation :

af

Nilima N. Patil et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 4, April-2016, pp. 199-203
Keywords :
References :

af

 
:0
DOI Link :
Download :
  V3I415.pdf
Refbacks :
Real Time Detection System of Driver Fatigue
Authors : Pranali Shelke, Shraddha Magar, Rutuja Jawkar
Affiliations :
Abstract :

af

The leading cause of vehicle crashes and accidents is the driver distraction. With the rapid development of motorization, driver fatigue has become a very serious traffic problem. Reasons for traffic accidents are driving after alcohol consumption, driving at night, driving without taking rest, aging, sleepiness, and fatigue occurred due to continuous driving, long working hours and night shifts. So to reduce rate of accidents due to above reasons, is aim of this project. This paper presents a method for detection of early signs of fatigue using feature extraction, Haar classifier and delivering of information and whereabouts of the driver to the emergency contact numbers.
Citation :

af

Pranali Shelke et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 4, April-2016, pp. 197-198
Keywords :
References :

af

 
:0
DOI Link :
Download :
  V3I414.pdf
Refbacks :
Implementation of Motion Model Using Vanet
Authors : Komal Patil, Geeta Mahajan, Disha Patil and Chitra Mahajan
Affiliations :
Abstract :

af

A collection of mobile nodes is known as ad-hoc network in which wireless communication network is used to connect these mobile nodes. A major requirement on the MANET is to provide unidentifiability and unlinkability for mobile nodes During the last few decades, continuous progresses in wireless communications have opened new research fields in computer networking, goal of extending data networks connectivity to environments where wired solutions are impracticable. Among these, vehicular traffic is attracting a increasing attention from both academic and industry, due to the amount and importance of the related applications, ranging from road safety to traffic control, up to mobile entertainment. Vehicular Ad-hoc Network(VANETs) are self-organized networks built up from moving vehicles, and are part of the broader class of Mobile Ad-hoc Net- works(MANETs). Because of their peculiar characteristics, VANETs require the definition of specific networking techniques, whose feasibility and performance are usually tested by means of simulation. One of the main challenges posed by VANETs simulations is the faithful characterization of vehicular mobility at both macroscopic and microscopic levels, leads to realistic non-uniform distributions of cars and velocity, and unique connectivity dynamics. There are various secure routing protocols have been proposed, but the requirement is not satisfied. The existing protocols are unguarded to the attacks of fake routing packets. Simulation results have demonstrated the effectiveness of the proposed AODV protocol with improved performance as compared to the existing protocols.
Citation :

af

Patil Komal, et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 4, April-2016, pp. 179-182
Keywords :
References :

af

 
:0
DOI Link :
Download :
  V3I413.pdf
Refbacks :
Prevention of Packet Hiding Methods In Selective Jamming Attack
Authors : Shital Patil , Vishaka Patil , Rupali Warke and Priyanka Patil
Affiliations :
Abstract :

af

The sharing nature of wireless medium provides various challenging features among various set of users. It is very important in real world and it provides better transfer rate but authentication is ignored. The limitations of existing wired network are overcome by wireless network. These networks act as source for various types of jamming attacks. In analysis and detection of jamming attack various methods are available but sometime they fail. In case of external threat the analysis and reporting of jamming attack is very easy model but it is quite difficult in terms of internal threat model, these internal term uses the knowledge about network secrets and network protocols to launch various attacks with very low effort. Various cryptographic techniques are implemented to prevent these attacks. The main goal of this project is to prevent the information at the wireless physical layer and allowed the safe transmission among communicated nodes although the attacker is present.
Citation :

af

Shital Patil et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 4, April-2016, pp. 194-196
Keywords :
References :

af

 
:0
DOI Link :
Download :
  V3I411.pdf
Refbacks :
AUTOMATIC SPEECH RECOGNITION- A SURVEY
Authors : Julna Nazer, Sajeer K,
Affiliations :
Abstract :

af

Speech recognition is the next big step that the technology needs to take for general users. An Automatic Speech Recognition (ASR) will play a major role in focusing new technology to users. Applications of ASR are speech to text conversion, voice input in aircraft, data entry, voice user interfaces such as voice dialing. Speech recognition involves extracting features from the input signal and classifying them to classes using pattern matching model. This can be done using feature extraction method. This paper involves a general study of automatic speech recognition and various methods to generate an ASR system. General techniques that can be used to implement an ASR includes artificial neural networks, Hidden Markov model, acoustic –phonetic approach
Citation :

af

Julna Nazer,et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 4, April-2016, pp. 190-193
Keywords :
References :

af

 
:0
DOI Link :
Download :
  V3I410.pdf
Refbacks :
Intelligent Device TO Device Communication Using IoT
Authors : Madhuri More, Snehal Mote, Amruta Neel, Poonam Nerkar and Prof. P. S. Hanwate
Affiliations :
Abstract :

af

Internet is becoming the most intrinsic part of the human life. There are many users of the internet but the devices will be the main users in the Internet of Things (IoT). These devices communicate with each other efficiently and gather the information to transfer the data to particular device. The quality of this information depends on how smart the devices are. IoT coverage is very wide and consists of the things or devices connected in network like camera, android phones, sensors etc. Once all these devices are connected with each other, they are capable of processing smartly and satisfying basic needs of environment. Thus the communication between the devices is achieved using various technologies and devices.
Citation :

af

Madhuri More,et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 4, April-2016, pp. 187-189
Keywords :
References :

af

 
:0
DOI Link :
Download :
  V3I409.pdf
Refbacks :
A Mobile Robostick for Visually Impaired People
Authors : Chaitali M. Patil, Abhishek P. Deshmukh, Kiran K. Jadhav and Mohini S. Deshmukh
Affiliations :
Abstract :

af

God gave sense of perception to the human being is an important aspect of our life. But there are some unfortunate people have less ability of vision. The visually impaired have to face many challenges in their daily life. The problem gets bad when they visit to an unknown location. Only few of the navigation systems available for vision impaired people can provide active navigation through speech output. None of these systems work perfectly for both indoor and outdoor applications. The proposed system is very useful in blind people to indicate the alarm for avoiding accident. In system microcontroller is used to as oscillator to generate the frequency signal. Then ultrasonic transmitter gets generated frequency signal. Ultrasonic transmitter and receiver are fixed in front of the robostick. The sender transmits the ray towards receiver. The transmitting pulse has been changed according to the distance. From this, the microcontroller monitors the distance between the object and the stick and gives navigation through headphone jack to blind person.
Citation :

af

Chaitali M. Patil ,et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 4, April-2016, pp. 183-186
Keywords :
References :

af

 
:0
DOI Link :
Download :
  V3I408.pdf
Refbacks :
GSM Based Device Controlling and Fault Detection
Authors : Dr. P.V. Rama Raju, K.S.S. Phani Kumar, Y. Guna Teja, K. Bhargav and T.V.K. Prasanna
Affiliations :
Abstract :

af

The mobile communication has expanded to a great extent such that it can be applied for controlling of electrical devices. These projects make use of this capability of mobile phone to control three electrical devices with some use of embedded technology which can be extended up to eight devices. Apart from controlling it also does the sensing of the devices. Thus a user can be able to know of the status of the devices and in addition to that the user get notified if any fault is detected. Here in the project controlling and sensing is done for three electrical devices only. According to the user need both of this can be expanded.
Citation :

af

Dr. P.V. Rama Raju et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 4, April-2016, pp. 173-178
Keywords :
References :

af

 
:0
DOI Link :
Download :
  V3I406.pdf
Refbacks :
Efficient Multi Server Authentication and Hybrid Authentication Method
Authors : Priya S. Birhade, Chaitanya V. Bhirud, Sangam D. Walke and Jyoti S. Borse
Affiliations :
Abstract :

af

Password is used for authentication on many major client-server system, websites etc. Client and a server share a password using Password-authenticated key exchange to authenticate each other and establish a cryptographic key by exchanging generated exchanges. In this scenario, all the passwords are stored in a single server which will authenticate the client. If the server stopped working or compromised, for example, hacking or even insider attack, passwords stored in database will become publicly known. This system proposes that setting where multiple servers which are used to, so that the password can be split in these servers authenticate client and if one server is compromised, the attacker still cannot be able to view the client’s information from the compromised server. This system uses the Advance encryption standard algorithm encryption and for key exchange and some formulae to store the password in multiple server. This system also has the hybrid authentication as another phase to make it more secure and efficient. In the given authentication schema we also use SMS integration API for two step verification.
Citation :

af

Priya S. Birhade et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 4, April-2016, pp. 169-172
Keywords :
References :

af

 
:0
DOI Link :
Download :
  V3I405.pdf
Refbacks :
Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc Network
Authors : Laxmi R. Shinde, Trupti A. Jadhav, Prajakta R. Baviskar
Affiliations :
Abstract :

af

MANET is a collection of mobile devices that can communicate with each other without the use centralized administration. One of the interesting application of MANET is File Sharing. File Sharing in MANET is similar to that of the regular file sharing, what makes the difference is it allow user to access the data or memory of that nodes only which are connected to it. This File sharing many a times leads to Network Partitioning, i.e dividing a network into two different networks .Due to which the nodes may act selfishly. The selfishness of some of the nodes may lead in reduction of performance in terms of accessing data. The proposed system will use the SCF-tree technique for building a tree of Node which will share their data in terms of Replica, and as a result it detects the selfish node in the network. The replica insures that performance is not degraded.
Citation :

af

Laxmi R. Shinde et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 4, April-2016, pp. 165-168
Keywords :
References :

af

 
:0
DOI Link :
Download :
  V3I404.pdf
Refbacks :
Data Trend Analysis by Assigning Polynomial Function For Given Data Set
Authors : Dhaneesh T, ,
Affiliations :
Abstract :

af

This paper aims at explaining the method of creating a polynomial equation out of the given data set which can be used as a representation of the data itself and can be used to run aggregation against itself to find the results. This approach uses least-squares technique to construct a model of data and fit to a polynomial. Differential calculus technique is used on this equation to generate the aggregated results that represents the original data set.
Citation :

af

Dhaneesh T et al.,International Journal of Computer Engineering In Research Trends Volume 3, Issue 4, April-2016, pp. 162-164
Keywords :
References :

af

 
:0
DOI Link :
Download :
  V3I403.pdf
Refbacks :
Online Payment System using Steganography and Visual Cryptography
Authors : Priyanka More, Pooja Tiwari, Leena Waingankar,Vivek Kumar and A. M. Bagul
Affiliations :
Abstract :

af

In recent time there is rapid growth in E-Commerce market. Major concerns for customers in online shopping are debit card or credit card fraud and personal information security. Identity theft and phishing are common threats of online shopping. Phishing is a method of stealing personal confidential information such as username, passwords and credit card details from victims. It is a social engineering technique used to deceive users. In this paper new method is proposed that uses text based steganography and visual cryptography. It represents new approach which will provide limited information for fund transfer. This method secures the customer's data and increases customer's confidence and prevents identity theft.
Citation :

af

Priyanka More et al.,International Journal of Computer Engineering In Research Trends Volume 3, Issue 4, April-2016, pp. 157-161
Keywords :
References :

af

 
:0
DOI Link :
Download :
  V3I402.pdf
Refbacks :
Engine Sudden Stopped after the Heavy Noise: Study on Crankshaft
Authors : Dr. Porag Kalita, ,
Affiliations :
Abstract :

af

The main engine shaft driven round by the piston is called Crankshaft. Crankshaft converts reciprocating motion of the piston into rotary motion. Crankshaft rotates at high speeds and bears the stresses due to power impulse during power stroke. Counterweight balance the forces caused due to out of balance of the crank offset from shaft axis. Crankshaft of an engine has to be designed for strength and stuffiness against bending and torsion stresses due to gas loads and also to take care of stress due to vibration and provide sufficient bearing area to suit the bearing pressure. Crankshafts have drilled oil passages through which oil flows from the main to the connecting rod bearings. The power impulses tend to setup twisting vibration in the crankshaft. When a piston makes down on its power stroke, it thrusts, through the connecting rod, against a crankpin with a force that may exceed 2 tones and this motion is called torsion vibration. Experimental was conducted on Heavy Commercial Vehicle engine that excessive blow by as well as excessive engine oil consumption and as a result engine sudden stopped after the heavy noise.
Citation :

af

PORAG KALITA et al.,International Journal of Computer Engineering In Research Trends Volume 3, Issue 4, April-2016, pp. 152-156
Keywords :
References :

af

 
:0
DOI Link :
Download :
  V3I401.pdf
Refbacks :

 

A System for Denial of Service Attack Detection Based On Multivariate Corelation Analysis
Authors : Sonam Deshmukh, Shoaib Inamdar, Sachin Waghmode
Affiliations :
Abstract :

af

in computing world, a denial-of-service (DoS) or is an process to make a machine or network resource unavailable to its regular users.DoS attack minimizes the efficiency of the server, inorder to increase the efficiency of the server it is necessary to identify the dos attacks hence MULTIVARIATE CORRELATION ANALYSIS(MCA)is used, this approach employs triangle area for obtaining the correlation information between the ip address. Based on extracted data the denial of service-attack is discovered and the response to the particular user is blocked, this maximizes the efficiency. Our proposed system is examined using KDD Cup 99 data set, and the influence of data on the performance of the proposed system is examined.
Citation :

af

Sonam Deshmukh et al.,International Journal of Computer Engineering In Research Trends Volume 3, Issue 3, March-2016, pp. 149-151
Keywords :
References :

af

 
:0
DOI Link :
Download :
  V3I310.pdf
Refbacks :
Weighing Parameters and Analysis of Congestion using Markov Chain Model
Authors : Nimma Mukesh Raghavendra, Avinash Poojari,
Affiliations :
Abstract :

af

Markov chain (discrete-time Markov chain named after Andrey Markov, is a random process that undergoes transitions from one state to another on a state space. It must possess a property that is usually characterized as "memorylessness": the probability distribution of the next state depends only on the current state and not on the sequence of events that preceded it. This specific kind of "memorylessness" is called the Markov property. Here the parameters are land use, road inventory, traffic characteristic and pedestrian. These parameters are enhancing the travel time of the road user because of not reaching the standards. These parameters helps to identify the gap .Linear equation helps to quantile measure of delay and encounter by meeting the needs of the user by standards to provide LOS A.
Citation :

af

Nimma Mukesh Raghavendra et al.,International Journal of Computer Engineering In Research Trends Volume 3, Issue 3, March-2016, pp. 143-148
Keywords :
References :

af

 
:0
DOI Link :
Download :
  V3I309.pdf
Refbacks :
Clustering and Parallel Empowering Techniques for Hadoop File System
Authors : K.Naga Maha Lakshmi , A.Shiva Kumar ,
Affiliations :
Abstract :

af

In the Big Data group, Apache Hadoop and Spark are gaining prominence in handling Big Data and analytics. Similarly MapReduce has been seen as one of the key empowering methodologies for taking care of large-scale query processing. These middleware are traditionally written with sockets and do not deliver best performance on datacenters with modern high performance networks. In this paper we investigate the characterizes of two file systems that support in-memory and heterogeneous storage, and discusses the impacts of these two architectures on the performance and fault tolerance of Hadoop MapReduce and Spark applications. We present a complete methodology for evaluating MapReduce and Spark workloads on top of in-memory file systems and provide insights about the interactions of different system components while running these workloads
Citation :

af

K.Naga Maha Lakshmi et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 3, March-2016, pp. 134-142
Keywords :
References :

af

 
:0
DOI Link :
Download :
  V3I308.pdf
Refbacks :
AI & NPC IN GAMES
Authors : Kshama Tupe, Pankaj Singh, Sagar Parmar and Tushar Pandey
Affiliations :
Abstract :

af

Here we have proposed a system with better AI and NPC Behavior algorithms that improve the competition level of the non-playable characters making the game additional realistic and difficult. Additionally with more realism, it enriches the experience for the user resulting in user satisfaction and higher game play realism resulting in further growth of gaming and entertainment. The NPCs can learn from the gameplay and therefore the encompassing setting in addition as tricks methods and techniques of the player and consequently style its own set of strategies which might facilitate it to extend its possibilities of winning.
Citation :

af

Kshama Tupe et al.,International Journal of Computer Engineering In Research Trends Volume 3, Issue 3, March-2016, pp. 129-133
Keywords :
References :

af

 
:0
DOI Link :
Download :
  V3I307.pdf
Refbacks :
Smart Content Security Policy for Mozilla Firefox
Authors : Dr. Kailas R. Patil, Madhulika Jhawar, Rashida Mumin, Aashay Mokadam and Kunal Kharsadia
Affiliations :
Abstract :

af

Use of Internet is very common these days. There are a lot of websites containing different kinds of content over the internet. An average person visits atleast 8-10 web pages per day. The web page sometimes contains malicious contents or some inline scripts which the user is not aware of. The scripts try to force display contents on user’s screen or try to steal information from the user without the user’s awareness. This makes the user vulnerable. Content Security Policy is a way to defeat these types of attacks. If CSP is enforced on the web browser, content will be displayed from trusted sources only and all other contents will be blocked. UserCSP was implemented to facilitate this purpose. In UserCSP, users could specify the policies they want to enforce. However, this had a drawback too. An average user is not familiar with the concept of CSP. So, we are making SmartCSP, an add-on for Mozilla Firefox. This will facilitate the users who are not aware of CSP by inferring the policies based on the structure of HTML pages loaded.
Citation :

af

Dr. Kailas R. Patil et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 3, March-2016, pp. 123-128
Keywords :
References :

af

 
:0
DOI Link :
Download :
  V3I306.pdf
Refbacks :
Review of Various Image Processing Techniques for Currency Note Authentication
Authors : Trisha Chakraborty, Nikita Nalawade, Abhishri Manjre, Akanksha Sarawgi and Pranali P Chaudhari
Affiliations :
Abstract :

af

In cash transactions, the biggest challenge faced is counterfeit notes. This problem is only expanding due to the technology available and many fraud cases have been uncovered. Manual detection of counterfeit notes is time consuming and inefficient and hence the need of automated counterfeit detection has raised. To tackle this problem, we studied existing systems using Matlab, which used different methods to detect fake notes.
Citation :

af

Trisha Chakraborty et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 3, March-2016, pp. 119-122
Keywords :
References :

af

 
:0
DOI Link :
Download :
  V3I305.pdf
Refbacks :
Course Scheduling in University using Agent Exploration in Timetable Media
Authors : Jamaludin Hakima, Sri Hartatib,
Affiliations :
Abstract :

af

Course scheduling in University is still a study area that is interesting for researchers to explore and search its optimization [4]. Scheduling optimization still depends on the needs of a University. Manual scheduling is still the most commonly used option, but it requires a skilled and expert person or person who has been accustomed to do so. However, the result still needs a lot of corrections. Course scheduling in College/University in Indonesia using semester credit system (SKS) is a challenge in making course schedule. Some scheduling methods have been proposed in several studies such as genetic methods [10], integer programming [1] and other methods using other agents [2] [7]. In the previous studies, the generated schedules must still be adjusted and or inflexible when there are changes in the schedule or its pattern, and its model cannot be applied to all Colleges/Universities in Indonesia using semester credit system (SKS). This study offers a method which is referring to the constrains/conditions in Universities but still flexible in its formation and change. Agent will explore timetable media to locate time cell/slot corresponding to the scheduling using credit system (SKS).
Citation :

af

Jamaludin Hakim et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 3, March-2016, pp. 112-118
Keywords :
References :

af

 
:0
DOI Link :
Download :
  V3I304.pdf
Refbacks :
Generating Aggregate Key for Group Data Sharing by Means of Cloud Data Storage
Authors : Sandeep Srinivas Dwaram, 2 P.Venkateswara Rao.,
Affiliations :
Abstract :

af

Sharing of encrypted data with various kinds of users via public cloud storage always leads to greater security concerns over many types of data leaks in the cloud. To make it possible, efficient generation of keys and their management should take place in developing schemes. In the situation of sharing any class of documents to any class of users demands various numbers of encryption keys for each document used. Further, need a large number of keys for keyword query searching for each document used. This increases the complexity in generating various numbers of keys for decrypting the document and decreases the efficiency of keyword query searching. This also makes the user to store large number of keys for both encryption and search which makes the situation impractical. In this we approached, by suggesting concept of key aggregate searchable encryption (KASE) and initializing the idea through a real KASE scheme, in which the data owner will send a single aggregate key of group of documents to group of authorized users, and the user will send a single trapdoor to the cloud server for keyword query searching.
Citation :

af

Sandeep Srinivas et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 3, March-2016, pp. 106-111
Keywords :
References :

af

 
:0
DOI Link :
Download :
  V3I303.pdf
Refbacks :
OBD-II and Oxygen Sensor: Review the I.C Engine - Emissions related Performance
Authors : DR. PORAG KALITA, ,
Affiliations :
Abstract :

af

Increased awareness regarding the adverse effects of pollutants from automobile exhaust gases has been the main driving force for implementation of more and more stringent legislation on automobile exhaust emissions in many Countries. On Board Diagnostic (OBD), regulations in the USA for light and medium duty vehicles (I. C. Engines) are introducing to implement the air quality standard. California and the Federal Government used a driving cycle to certify 1966 and newer models which referred to as either California Cycle or the Federal Test Procedure (FTP). The California Air Resource Board (CARB) and the objective to reduce hydrocarbon (HC) emission caused by malfunction of the vehicles emission control systems adopted the California code of Regulations (CCR) known as OBD – II. The diagnosis is based on the oxygen sensor response time that is the amount of time to complete a switch from rich to lean or lean to rich transition that gives the ability to control the engine at stochiometric Air Fuel ratio. Typical values of lean mean voltage and rich mean voltage are 300 to 600 mill volts respectively. For post-cat O2 sensor, in particular, voltage level checks and heater systems checked and done and the failure thresholds for the post O2 sensor, diagnostic must not be set at a point beyond the failure limit where the catalyst diagnostic is affected.
Citation :

af

PORAG KALITA et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 3, March-2016, pp. 98-105
Keywords :
References :

af

 
:0
DOI Link :
Download :
  V3I302.pdf
Refbacks :
Hybrid Protocol for Security Peril Black Hole Attack in MANET
Authors : Priya Manwani, Deepty Dubey,
Affiliations :
Abstract :

af

MANETs (Mobile Ad hoc Network) is a self-governing system in which different mobile nodes are connected by wireless links. MANETs comprise of mobile nodes that are independent for moving in and out over the network. Nodes are the devices or systems that is laptops, mobile phone etc. those are participating in the network. These nodes can operate as router/host or both simultaneously. These nodes can form uninformed topologies as per their connectivity among nodes over the network. Security in MANETs is the prime anxiety for the fundamental working of network. MANETs frequently will be ill with security threats because of it having features like altering its topology dynamically, open medium, lack of central management & monitoring, cooperative algorithms and no apparent security mechanism. These factors draw an attention for the MANETs against the security intimidation. In this paper we have studied about security attack in MANET and its consequences, proposed technique for black hole detection is hybrid in nature which combines the benefit of proactive and reactive protocol and proposed technique is compared with AODV.
Citation :

af

Priya Manwani et al., International Journal of Computer Engineering In Research Trends Volume3, Issue 3, March-2016, pp. 92-97
Keywords :
References :

af

 
:0
DOI Link :
Download :
  V3I301.pdf
Refbacks :

 

Heat Transfer Analysis of Helical Tubes Using Ansys and Catia
Authors : Md Ameer Basha, Prof. K Supriya,
Affiliations :
Abstract :

af

A CFD package (ANSYS FLUENT 15.0) was used for the numerical study of heat transfer characteristics of a helical coiled double pipe heat exchanger for counter flow. The CFD results when compared with the results from different studies were well within the error limits. The study showed that the effective configuration of heat transfer performances of the counter-flow. The simulation was carried out for fluid to fluid heat transfer characteristics for different fluids, solids and different inlet temperatures were studied. Effectiveness of Helical Tube Heat Exchanger is calculated on different fluids and solid configurations. Among different fluids and solid configurations copper-water combination gives more effectiveness 16.33% than other combinations. From the velocity vector plot it was found that the fluid particles were undergoing an oscillatory motion inside both the pipes. From the pressure and velocity contours it was found that along the outer side of the pipes the velocity and pressure values were higher in comparison to the inner values.
Citation :

af

Ameer Basha et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 2, February-2016, pp. 87-91
Keywords :
References :

af

 
:0
DOI Link :
Download :
  V3I211.pdf
Refbacks :
Fatigue Life Estimation of Forged Steel and Ductile Iron Crankshaft of Single Cylinder Engine Using Fatigue assessment Techniques
Authors : Mr Md Mozaiyan Ahsan, Mr.N Amara Nageswara Rao,
Affiliations :
Abstract :

af

Crankshaft is one of the critical components of an IC engine, failure of which may result in disaster and makes engine useless unless costly repair performed. It possesses intricate geometry and while operation experiences complex loading pattern. In IC engines, the transient load of cylinder gas pressure is transmitted to crankshaft through connecting rod, which is dynamic in nature with respect to magnitude and direction. However, the piston along with connecting rod and crankshaft illustrate respective reciprocating and rotating system of components. the dynamic load and rotating system exerts repeated bending and shear stress due to torsion, which are common stresses acting on crankshaft and mostly responsible for crankshaft fatigue failure. Hence, fatigue strength and life assessment plays an important role in crankshaft development considering its safety and reliable operation. The present paper is based on comparative studies of two crankshafts of fatigue life assessment of a single cylinder diesel engine crankshaft by using High cycle fatigue (HCF) technique
Citation :

af

Md Mozaiyan Ahsan et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 2, February-2016, pp. 81-86
Keywords :
References :

af

 
:0
DOI Link :
Download :
  V3I210.pdf
Refbacks :
Design and Analysis of Engine Cylinder Fins of Varying Geometry and Materials.
Authors : Mr. Manir Alam, Mrs. M. Durga Sushmitha,
Affiliations :
Abstract :

af

The Engine cylinder is one of the major automobile components, which is subjected to high temperature variations and thermal stresses. In order to cool the cylinder, fins are provided on the cylinder to increase the rate of heat transfer. By doing thermal analysis on the engine cylinder fins, it is helpful to know the heat dissipation inside the cylinder. The principle implemented in this project is to increase the heat dissipation rate by using the invisible working fluid, nothing but air. We know that, by increasing the surface area we can increase the heat dissipation rate, so designing such a large complex engine is very difficult. The main purpose of using these cooling fins is to cool the engine cylinder by air. Presently Material used for manufacturing cylinder fin body is Cast Iron. In this thesis, using materials Copper and Aluminium alloy 6082 are also analyzed. Thermal analysis is done using all the three materials by changing geometries, distance between the fins and thickness of the fins for the actual model of the cylinder fin body.
Citation :

af

Manir Alam et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 2, February-2016, pp. 76-80
Keywords :
References :

af

 
:0
DOI Link :
Download :
  V3I209.pdf
Refbacks :
Automotive Tyres: Study on Vehicle Computerized Wheel Alignment”
Authors : Dr. Porag Kalita, ,
Affiliations :
Abstract :

af

Buying high quality tyres, buying the proper size for any automobiles, buying from a reputable tyre retailer, are of all these things are importance for tyre safety, long tyre life and driving satisfaction. While alignment is that aligning the front wheels relative to each other. Setting of castor, camber, toe-in or toe-out and king pin inclination. Computerized wheel alignment, a series of tests and adjustments to ensure that wheels and tyres are properly positioned on the vehicle. There are two types of wheel aligners, i.e. Mechanical types, which is attach to the wheel spindle and some have light beams that display the measurement on a computer screen and others are electronic that indicate the measurements on meter, display or printouts. Many vehicles today are equipped with a rear suspension design that allows adjustments for rear wheel alignment or with a design that requires a rear wheel check. When a rear suspension is not in alignment, it may create problems for the front as well as the rear wheels problems like an apparent crooked steering wheel, camber or toe induced front tyre wear and directional pull or lead. Vehicles have changed the suspension , steering and drive train design all require a total vehicle i.e. four wheels approaches to alignment for proper performance of today’s vehicles.
Citation :

af

Dr. Porag Kalita et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 2, February-2016, pp. 70-75
Keywords :
References :

af

 
:0
DOI Link :
Download :
  V3I208.pdf
Refbacks :
Power Generation by Hybrid Model
Authors : Prof .P .Y. Kumbhar, Ankita Dhanashetti, Mubeen Chitgupkar and Meghanjali Bidave
Affiliations :
Abstract :

af

As there is lack of conventional energy on the earth. One another way to generate power is by non-conventional energy. In this experiment power is generated by non-conventional energy sources like solar energy, wind energy and some another kind ofenergy that is usually get watsted by human being i.e from human energy. We are focusing mainly on pressure energy by human along with solar and wind energy. One can now experiment on other types of energy like vehicle pressure on road, train’s pressure on railway track etc. In this experiment piezoelectric crystals are used for the purpose of generating power. One step ahead we can implement it on the road so that by pressure of car and other vehicle and solar energy we can generate power and use it in many applications like road lights, traffic lights etc. We can implement the same principle on the Railway track to generate power by pressure of wheel of Trains..
Citation :

af

Kumbhar et al., International Journal of Computer Engineering In Research Trends VOLUME 3, ISSUE 2, FEBRUARY-2016, PP. 67-69
Keywords :
References :

af

 
:0
DOI Link :
Download :
  V3I207.pdf
Refbacks :
High Dimensional Data Clustering with Hub Based DEC
Authors : Ms. Ghatage Trupti B. , Prof. Takmare Sachin B.,
Affiliations :
Abstract :

af

Clustering is an important topic in various fields like machine learning and data mining. In many real applications, we often face very high dimensional data. Many dimensions are not always helpful or may even worsen the performance of the subsequent clustering algorithms. To deal with this problem one way is to employ first dimensionality reduction and then apply clustering. But if we consider the requirement of clustering in the process of dimensionality reduction and vice versus then the performance of clustering will be improved. Discriminative Embedded Clustering (DEC) is an algorithm that combines clustering and subspace learning. Hubness is the tendency of high dimensional data to have hubs. Hubs are situated near cluster centeres; therefore major hubs can be successfully used as cluster prototypes or guide during centroid based configurations. Use of hubness for clustering leads to improvement over centroid-based approaches. In this paper we propose a system for clustering high dimensional data using Discriminative Embedding Method with Hub based clustering.
Citation :

af

Ghatage Trupti et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 2, February-2016, pp. 62-66
Keywords :
References :

af

 
:0
DOI Link :
Download :
  V3I206.pdf
Refbacks :
Detection and Avoidance of Sensitive Data in Host-assisted Mechanism using Fuzzy Fingerprint Technique
Authors : Ms. Patil Deepali E., Prof. Takmare Sachin B,
Affiliations :
Abstract :

af

The Data-leak cases, human mistakes are one of the causes of data loss. Deliberately planned attacks, inadvertent and human mistakes lead to most of the data-leak incidents. The detecting solutions of inadvertent sensitive data leaks caused by human mistakes and provide alerts for organizations. A common approach is to screen content in the storage and transmission for exposed sensitive information. Such an approach requires the detection operation to be conducted in secrecy. The data-leak detection (DLD) privacy- preserving solution to solve the special set of sensitive data digests is used in detection. The advantage of data owner is safely delegate the detection operation to a semihonest provider without revealing sensitive data to the provider. Internet service providers can offer their customers DLD as an add-on service with strong privacy guarantees. Evaluation results support accurate detection with very small number of false alarms under various data-leak scenarios. Host-assisted mechanism for the complete data-leak detection for large-scale organizations. To design the Host-assisted mechanism for DLD, using data signature and fuzzy fingerprint.
Citation :

af

Patil Deepali et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 2, February-2016, pp. 57-61
Keywords :
References :

af

 
:0
DOI Link :
Download :
  V3I205.pdf
Refbacks :
Privacy-Preserving Scalar Product Computation over Personal Health Records
Authors : K.Samunnisa, Maloth Bhavsingh,
Affiliations :
Abstract :

af

Cloud computing utilizes networks of substantial gatherings of servers normally running minimal effort shopper PC innovation with particular associations with spread data-processing errands crosswise over them. This common IT framework contains extensive pools of frameworks that are connected together. Frequently, virtualization techniques are utilized to expand the force of Cloud computing. Checking and prompting patients by means of versatile social insurance framework is the present pattern in a therapeutic field that goes about as a lifeline because of its accessibility at whatever time and anyplace. This e-social insurance framework requires patient's private data to be accessible at a cloud, outsourced data stockpiling. This situation confronts privacy issues. In this paper, we concentrate on attribute-based access control and another privacy-preserving scalar product computation (PPSPC) strategy and giving a private cloud to versatile clients to guarantee less cost, compelling and secure capacity. The data entered in the versatile is exchanged to the private cloud, which thus is handled and again exchanged to people in a general cloud. The affect ability of the outsourced cloud data is kept up utilizing Attribute-based Encryption method which restricts data access based on encoding/unscramble of data with its access structures. The data privacy is guaranteed by PRF based key administration and secures indexing methodologies. Individual Health records perceptibility access control to the real data proprietor is the center thought of this venture. The undertaking isolates the access clients into Public Domain Users and Private Domain client
Citation :

af

Samunnisa et al.,"Privacy-Preserving Scalar Product Computation over Personal Health Records", International Journal of Computer Engineering In Research Trends Volume 3, Issue 2, February-2016, pp. 42-27
Keywords :
References :

af

 
:0
DOI Link :
Download :
  V3I201.pdf
Refbacks :

 

Experimental Study on Automobile Clutch Plate Juddering
Authors : Dr.Porag Kalita, ,
Affiliations :
Abstract :

af

The coupling of two working parts, for example two shaft, in such a way as to permit connection or disconnection at will without the necessity of bringing both parts to rest, and when connected to transmit the required amount of power without sign is known as Clutch and or, the friction or hydraulic actuated mechanism used for coupling two shafts or similar parts, one or which drives and the other of when is driven by the Clutch. Clutch plate assembly has three principal components i.e. Flywheel, Clutch plate and Pressure Plate. The device used is the Clutch which transmits the rotary motion of the engine to the transmission, which required by the driver and located between the engine and the gear box and which it connects and disconnects the two units smoothly without shock. As per the theory of the Clutch, first assumption is used in case of problems involving power absorption by friction. Second assumption is used in case of problems involving power transmission by friction between the surfaces.
Citation :

af

Porag Kalita et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 1, January-2016, pp. 36-41
Keywords :
References :

af

 
:0
DOI Link :
Download :
  V3I107.pdf
Refbacks :
Experimental Study on Auto- Electrical Centre (VEC)
Authors : Dr. Porag Kalita, ,
Affiliations :
Abstract :

af

With the complex electronic sensors, controls and conveniences in today’s 21st century designs , the modern vehicles has become a massive collection of electrical wiring and hardware. Consequently, the electrical wiring content in a vehicle has become a significant factor in the overall cost and major factor in vehicle safety and reliability. Quality and Reliability terms are often used in relation to each other in reference to produce quality. Because, of the numerous issue relating to wire management in complex electrical system, design must be carefully planned and developed. To eliminate, these problems in today’s power distribution systems has developed as the series 3000 Vehicle Electrical Centre or VEC. The compact series 3000 offers components density up to 32 device and is ideal for distributed power approaches n, “ add-on” situation and applications where space is at a premium. Because the VEC is modular, it can be stacked to accommodate large and more complex distributions systems.
Citation :

af

Porag Kalita et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 1, January-2016, pp. 30-35
Keywords :
References :

af

 
:0
DOI Link :
Download :
  V3I106.pdf
Refbacks :
V3I105 Efficient Technique to Optimize Cloud Storage in Multi-Tenant Environment
Authors : P Jyothi , ,
Affiliations :
Abstract :

af

With the advent of cloud computing technologies, a paradigm of migrating on-premise cloud storage management to multitenant cloud storage management is been an active challenge for the researchers. Storage management in cloud environment aims to enhance performance of the data center by efficiently optimizing the underlying storage resources. The vital concept behind the centralized multitenant storage management is defining an integrated platform for data analytics, collection and governance which in turn increases the efficiency and effectiveness of the multitenant storage environments. This paper introduces an optimized multitenant cloud storage framework that incorporates the storage data analytics that suggest the service recommendation for the storage administrator. In addition, secured cloud storage architecture is presented to assure the security of the data stored in the multitenant cloud storage system.
Citation :

af

P.Jyothi et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 1, January-2016, pp. 23-27
Keywords :
References :

af

 
:0
DOI Link :
Download :
  V3I105.pdf
Refbacks :
V3I104 Detection and Rectification of Distorted Fingerprints
Authors : S.Bindu Madhuri, Dr. V.V.V.Ramana, Dr.S.Prem Kumar
Affiliations :
Abstract :

af

Elastic distortion of fingerprints is the chief causes for fake mismatch. As this reason disturbs all fingerprint detection applications, it is particularly risk in negative identification applications, such as watch list and deduplication applications. In such applications, cruel persons may deliberately distort their fingerprints to hide recognition. In this paper, we recommended novel algorithms to identify and correct skin distortion based on a single fingerprint image. Distortion detection is demonstrated as a two-class classification problem, for which the registered ridge orientation map and period map of a fingerprint are helpful as the feature vector and a SVM classifier is educated to act the classification task. Distortion rectification (or equivalently distortion field estimation) is analyzed as a regression difficulty, where the input is a distorted fingerprint and the output is the distortion field. To simplify this problem, a database (called reference database) of various distorted reference fingerprints and matching distortion fields is built in the offline stage, and then in the online stage, the closest neighbor of the input fingerprint is planned in the reference database and the equivalent distortion field is used to change (Convert) the input fingerprint into a normal fingerprints. Capable results have been achieved on three databases having many distorted fingerprints, namely NIST SD27 latent fingerprint database, Tsinghua Distorted Fingerprint database, FVC2004 DB1,
Citation :

af

Bindu Madhuri et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 1, January-2016, pp. 19-22
Keywords :
References :

af

 
:0
DOI Link :
Download :
  V3I104.pdf
Refbacks :
V3I103 Decentralized Access Control to Secure Data Storage on Clouds
Authors : D.V. Himaja, K.Lakshmi, Dr.S.Prem Kumar
Affiliations :
Abstract :

af

Cloud computing is a growing computing standard in which the computing structure is given as a examine over the Internet. The Cloud computing tool gives ability of data storage and access for cloud users, but when outsourcing the data to a third party results in safety issue of cloud data so data are confined by restricting the data. We propose a new decentralized access control system for secure data storage in the clouds that supports anonymous authentication. In this method, the cloud checks the means of the series without knowing the user’s individuality before storing data in the clouds. Our method adds extra feature in access control for which only skilled users are able to decrypt the data stored on cloud. This method prevents repeat attacks and supports the creation, alteration, and reading data stored in the cloud. We also address, user revocation. We propose a new representation for data storage and access in clouds. Our method avoids storing multiple encrypted copies of the same data. In our structure for secure data storage, cloud stores encrypted data (without being able to decrypt them). The main innovation of this model is addition of key distribution centers (KDCs).
Citation :

af

Himaja et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 1, January-2016, pp. 13-18
Keywords :
References :

af

 
:0
DOI Link :
Download :
  V3I103.pdf
Refbacks :
V3I102 Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
Authors : R.Bindu, U.Veeresh, Dr.S.Prem Kumar
Affiliations :
Abstract :

af

Gradually more and more organizations are opting for outsourcing data to remote cloud service providers (CSPs). clients can rent the CSPs storage infrastructure to store and get back almost infinite amount of data by paying amount per month. On behalf of an improved level of scalability, availability, and durability, some clients may want their data to be virtual on multiple servers across multiple data centers. The more copies the CSP is asked to store, the more amount the clients are charged. As a result, clients need to have a strong assurance that the CSP is storing all data copies that are decided upon in the service contract, and all these copies are reliable with the most recent modifications issued by the clients. Map-based provable multicopy dynamic data possession (MB-PMDDP) method is being proposed in this paper and consists of the following features: 1) it affords an proof to the clients that the CSP is not corrupt by storing less copies; 2) it supports outsourcing of dynamic data, i.e., it supports block-level functions, such as block alteration, addition, deletion, and append; and 3) it permits official users to effortlessly access the file copies stored by the CSP. In addition, we discuss the security against colluding servers, and discuss how to recognize corrupted copies by a little revising the projected scheme.
Citation :

af

Bindu et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 1, January-2016, pp. 6-12
Keywords :
References :

af

 
:
DOI Link :
Download :
  V3I102.pdf
Refbacks :
V3I101 Secure Auditing and Deduplicating Data in Cloud
Authors : K.Sudhamani, P.Rama Rao, Dr.S.Prem Kumar
Affiliations :
Abstract :

af

The fame and extensive use of Cloud have brought huge ease for data sharing and data storage. The data sharing with a big number of participants take into account issuers like data integrity, efficiency and privacy of the owner for data. In cloud storage services one critical test is to handle rising volume of data storage in cloud. To create data management more scalable in cloud computing field, deduplication a well-known method of data compression to reduce duplicate copies of duplicate data in storage over a cloud. Even if data deduplication brings a lot of advantages in security and privacy concern occur as users’ confidential data are liable to both attacks insider and outsider. A convergent encryption method imposes data privacy while making deduplication possible. Traditional deduplication systems based on convergent encryption even though offer confidentiality but do not maintain the duplicate check on basis of differential rights. This paper present, the plan of approved data deduplication planned to guard data security by counting discrepancy privileges of users in the duplicate check. Deduplication systems, users with differential privileges are added measured in duplicate check besides the data itself. To maintain stronger security the files are encrypted with differential privilege keys. Users are only permitted to carry out the copy check for files marked with the matching privileges to access. The user can confirm their occurrence of file after deduplication in cloud with the help of a third party auditor by auditing the data. Additional auditor audits and confirms the uploaded file on time. As a result, this paper generates advantages to both the storage provider and user by deduplication system and auditing method correspondingly.
Citation :

af

K.Sudhamani et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 1, January-2016, pp. 1-5
Keywords :
References :

af

 
:
DOI Link :
Download :
  V3I101.pdf
Refbacks :

 

Quick Links


DOI:10.22362/ijcert


Science Central

Score: 13.30







Submit your paper to editorijcert@gmail.com

>