Detailed Accessibility & Optimization Positioning Analyzer

04 Apr 2018

4 (1,334 )

Abstract Our application interface provides interesting and vital stats, such as the total number of backlinks (including the type: text, image, redirects, etc.), unique domains and distinct referring IPs and subnets. Software is an essential tool for in research, analysis and management. It uses its own bot and its own index, which they state is based on information from hundreds of billions website connections. SERP listings ...

Click here to read more arrow

GPU-Accelerated Impact Maximization in Professional Networks

04 Apr 2018

8 (2,987 )

GPU-Accelerated Impact Maximization in Large-Scale Professional Networks Dr. M. Rajasekhara, Babu B. V. Arunragavan   Abstract Impact Maximization means to discover the top-K fascinating people to expand the impact spread inside a professional networks, which remains important yet difficult issue. Turned out to be NP-hard, the impact expansion issue pulls in gigantic studies. In spite of the fact that there exist fundamental eager calculations which may ...

Click here to read more arrow

Analyzing of Economic Data Using Big Data

04 Apr 2018

5 (1,820 )

N.Rajanikumar, Dr.A.Suresh babu, Mr.G.Murali   Abstract: Big data can help at the e commerce data. The big-picture problems, the economic indicator many investors, business fortunate and judges are rely on are just too outdated by the time they’re out. People “pitch to the number,” but the world has often moved since it was considered and they won’t know it until the next report comes ...

Click here to read more arrow

Review on Micro-climate Changer with Sensor Broadcasted Data

04 Apr 2018

6 (2,108 )

Prof. Vikas Nandgaonkar, Prof.Prashant Dongare Pratap Madane, Priyanka Rasal,Aniket Shilimkar, Vaibhav Waghmode Abstract : micro-environment changer using sensor broadcasted data gives human centric context ( e.g indoor, outdoor, at home/in office, driving/walking)have been extensively researched, few attempts have studied from phones perspective(e.g. on table/sofa, in pocket/bag/hand). We refer to such immediate surroundings as micro-environment, usually several to a dozen of centimeters, around a phone ...

Click here to read more arrow

Mobile Computing with WirelessLAN and its Modes

04 Apr 2018

6 (2,362 )

Mobile computing with WirelessLAN And its modes Ad hoc network with challenges Pallavi D. Dudhe, Prof. P. L. Ramteke   Abstract - In this paper, we summarized Mobile computing with WirelessLAN and its modes Ad hoc network and infrastructure. We define the operational model of our mobile computing environment, where we plan to demonstrate our proposed solutions. Mobile cloud computing is the combination of ...

Click here to read more arrow

Process of Embedding Fuzzy Logic Methodology In Racing Game

04 Apr 2018

4 (1,544 )

Alamin Hussain Key words: fuzzy logic, XNA, AI, racing game ABSTRACT Fuzzy Logic has many opinions and understanding from people to people. In its simplest understanding Fuzzy Logic outputs truth(s) based on approximation for reasoning. In essence compared to traditional binary sets, which outputs absolute truths or false values, Fuzzy Logic may have a false or truth-value which ranges in degrees from 0 to ...

Click here to read more arrow

Evolution of Server-side Technologies

04 Apr 2018

9 (3,425 )

Chris Avgerinos Introduction A fundamental change has been occurring for the last fifteen years in the way people write computer programs. Scripting languages such as Perl and Tcl replaced the system programming languages such as C and C++. There are tremendous differences between the languages due to the fact that scripting languages were designed for completely different tasks than system programming languages. The main ...

Click here to read more arrow

Control on Remote Sensing Network Using Cloud Computing

04 Apr 2018

10 (3,775 )

CHAPTER 3 SYSTEM REQUIREMENTS The system requirements usually specify the needs of the system to accomplish the project successfully and the requirements can be classified as software and hardware requirements and hence the requirement specification of this project is as mentioned below. 3.1 Software Requirements Express PCB and express schematic Keil micro-vision 3 real view IDE Flash utility software for programming Embedded C JDK Visual ...

Click here to read more arrow

Design of an Interactive Graphics Framework

04 Apr 2018

7 (2,431 )

Design of an Interactive Graphics Framework to Instruct Students on Computer Architecture & Hardware Literature Review: The curriculum recommended by the ACM/IEEE-CS joint task force and documented in the computing curricula (ACM, 2013) defines a body of knowledge incorporating a wide variety of core topics one of which is computer architecture. Many of the topic areas within the body of knowledge are abstracted from a specific ...

Click here to read more arrow

Development of an Online Crime Management System (OCMS)

04 Apr 2018

7 (2,736 )

Case study of the Nigerian Police Force OYEKUNLE OYEBOLA COMFORT   Abstract The aim of this project and implementation is to develop interactive online crime management system which is easily accessible to the public taking a cognizance of the Nigeria Police Force crime management approach. The accessibility of the public is to complain or even report a crime to the police stations is relatively ...

Click here to read more arrow

Real Time Motion Detection Using Dynamic Camera

04 Apr 2018

5 (1,811 )

Abstract— nowadays, security of valuable and secret assets is very important for large organisation companies. Due to limitation of human resources and man power we need an efficient and reliable security system. To overcome this limitations and errors we will implement high level surveillance system for security. In our system, we will use dynamic camera for video surveillance which will feed video stream to system. System ...

Click here to read more arrow

Subscriber System using Identity-Based Encryption

04 Apr 2018

5 (1,683 )

Secure Message Transmission to the Publisher   Vivek Sharma INTRODUCTION The major mechanism regarding to the Publish-Subscribe based system are security, confidentiality, scalability and authentication. Publish-Subscribe system can be classified into two groups like as Type based and Content based message transmission. The publish-subscribe system is facing difficulties regarding Authentication just because of their Loose coupling nature. Content based routing face the difficulties in ...

Click here to read more arrow

Analysis Diabetes Mellitus on Complications with Data Mining

04 Apr 2018

7 (2,477 )

M. Mayilvaganan T.Sivaranjani Abstract: Diabetes mellitus is incredible growing and seems to be emerging as a main public health problem for our country.The prevalence of diabetes is rapidly increasing all over the world. Data mining provides more no of tools and techniques that can be applied to this processed data to discover hidden patterns. It is used to provide healthcare professionals an additional ...

Click here to read more arrow

Adopting MapReduce and Hummingbird for Information Retrieval

03 Apr 2018

8 (3,043 )

Adopting MapReduce and Hummingbird for Information Retrieval in dedicated cloud Environment Dr. Piyush Gupta Chandelkar Kashinath K.   Abstract: Data collected in section 3 indicated the number of active internet users across the globe. The collected chunks of information termed as Big Data not only utilizes physical resources into the network, ...

Click here to read more arrow

Enhancements of IC Engines in Real-world Conditions

03 Apr 2018

5 (1,915 )

 Aatif Shaik, Aditya Upadhyaya R, Gowtham, K N, & Sachin B N Abstract – Optimizing engine performance of IC Engines is a very shady field. Other than reputed companies & Original Equipment Manufacturers (OEMs), who publish their reports, the rest of the industry does not throw much light into aftermarket modification field. As an end-user, a customer wanting to optimize his vehicle in terms of power, mileage ...

Click here to read more arrow

Secure Encounter-based Mobile Social Networks

03 Apr 2018

3 (1,165 )

ABSTRACT: Encounter-based social networks and encounter-based systems link users who share a location at the same time, as opposed to the traditional social network paradigm of linking users who have an offline friendship. This new approach presents challenges that are fundamentally different from those tackled by previous social network designs. In this paper, we explore the functional and security requirements for these new systems, such as ...

Click here to read more arrow

A Multi OBS: Framework for Cloud Brokerage Services

03 Apr 2018

6 (2,187 )

Dr. J. Akilandeswari C.Sushanth ABSTRACT Cloud computing is one of major dynamically evolving area which provides business agencies to extend their process across the globe. Cloud broker mediates between cloud service provider and cloud consumers through API. Initially, cloud user submits the specification to the cloud broker and desires for the best cloud provider. Request from cloud users are processed by the cloud broker ...

Click here to read more arrow

Network Management System: Light Weight SNMP Implementation

03 Apr 2018

9 (3,206 )

Chapter 6 Implementation Initially the Java (JDK 1.6) and Netbeans IDE 5.4 should be installed in a system. Then the SNMP4J API should be added to the Netbeans library. The Mysql-JDBC sever should be added to the library for using the database purpose. Then the SNMP is tested in the same system for working condition, afterwards the destination devices are enabled with SNMP agent ...

Click here to read more arrow

A Review on Client Side Load Balancing

03 Apr 2018

7 (2,632 )

Prof. Vikas Nandgaonkar, Prof.Prashant Dongare Harshal Mahajan, Awadhoot Lele, Akshay Gaikwad Abstract : Load balancing is an important issue while managing server resources in a cloud environment. The concept behind load balancing is to manage server load which includes number of resources like avaliable RAM,CPU bandwisth, etc as well as to manage incoming request on the server. In cloud environment, it is important that ...

Click here to read more arrow

VDEC Based Data Extraction and Clustering Approach

03 Apr 2018

14 (5,282 )

This chapter describes in details the proposed VDEC Approach. It discusses the two phases of the VDEC process for Data Extraction and clustering. Experimental performance evaluation results are shown in the last section in comparing the GDS and SDS datasets. INTRODUCTION Extracting data records on the response pages returned from web databases or search engines is a challenge posed in information retrieval. Traditional web ...

Click here to read more arrow

Secure Barcode Authentication using Genetic Algorithm

03 Apr 2018

11 (4,376 )

Dr. Poornima G. Naik Mr. Girish R. Naik   Abstract— Genetic Algorithm (GA) is an invaluable tool for solving optimization problems due to its robustness. It does not break even if the inputs are changed slightly or in the presence of a reasonable noise. GA offers significant benefits over other optimization techniques in searching a large state space or n-dimensional surface. In todays information ...

Click here to read more arrow

Information Filtering System Based on Clustering Approach

03 Apr 2018

8 (3,015 )

A PRIVATE NEIGHBOURHOOD BASED INFORMATION FILTERING SYSTEM BASED ON CLUSTERING APPROACH ABSTRACT The quantity of web information has been increased day by day due to fast development of internet. Now-a-days people make their decision based on the available information from the internet. But the problem is how the people successfully choose or filter the useful information from the enormous amount of information. This problem is referred ...

Click here to read more arrow

Review Paper on Fault Tolerance in Cloud Computing

03 Apr 2018

11 (4,284 )

A REVIEW PAPER ON FAULT TOLERANCE IN CLOUD COMPUTING Deepali Mittal Ms. Neha Agarwal   Abstract— Cloud computing demand is increasing due to which it is important to provide correct services in the presence of faults also. The Resources in cloud computing can be dynamically scaled that too in a cost effective manner. Fault Tolerance is the process of finding faults and failures in ...

Click here to read more arrow

Authentication Mechanism for Fast Handover PMIPv6 Networks

03 Apr 2018

7 (2,749 )

N.S.Nandhinee S.Kayalvizhi   Abstract—The Internet Engineering Task Force (IETF) proposed a host-based mobility management protocol, called Mobile IPv6 (MIPv6) protocol for mobile nodes (MNs) to maintain continuous service when they move among different foreign networks. However, Mobile IPv6 does not provide good service for real-time applications because it causes longer disruptions when the handoff takes place. Recently, the IETF NETLMM working group developed a ...

Click here to read more arrow

Intrusion Detection System Using Node-Predictive Attack

03 Apr 2018

7 (2,691 )

Intrusion Detection System Using Node-Predictive Attack Graph Model for Cloud Ambikavathi C Dr.S.K.Srivatsa Abstract- The role of Intrusion Detection System (IDS) in security world is considered as a key requirement for any computing model. This traditional methodology can add its own contribution of security to the distributed Cloud environment. The purpose of this paper is to clarify the steps that are needed to be ...

Click here to read more arrow

Speaker Recognition System & Pattern Classification

03 Apr 2018

8 (3,046 )

A Study on Speaker Recognition System and Pattern classification Techniques Dr E.Chandra, K.Manikandan, M.S.Kalaivani   Abstract Speaker Recognition is the process of identifying a person through his/her voice signals or speech waves. Pattern classification plays a vital role in speaker recognition. Pattern classification is the process of grouping the patterns, which are sharing the same set of properties. This paper deals with speaker recognition system and over view ...

Click here to read more arrow

Resource Sharing Platform for Collaborative Cloud Computing

03 Apr 2018

8 (2,975 )

Harmonious resource sharing platform for collaborative cloud computing System Design SYSTEM DESIGN The system design is the architecture definition process, components, modules, interfaces and data to a system to meet the specified requirements. The system design could be considered the application of systems theory to product development . 4.1 Functional Design Utilitarian outline is utilized to streamline the configuration of equipment gadgets and programming useful configuration ...

Click here to read more arrow

PL/SQL Code Restructure With Structural Resemblance Measure

03 Apr 2018

7 (2,679 )

Abstract Database design is a challenging and complex task due to its importance in the overall performance of the database system. Recently, various techniques have been under use across different stages of database application modelling, design and implementation and they have been under continuous study and improvements by various researchers. However, the existing techniques are not providing effective guidelines for optimal database design. Hence, this research ...

Click here to read more arrow

Implementation Factor Affecting E-governance in Uttarakhan

03 Apr 2018

11 (4,314 )

Jitender Kumar Sehgal, Dr. Priti Dimri, Krishna Nand Rastogi   Abstract e-Governance is the utilization of Internet and the world wide web for delivering government Information and services to the citizens and the other organizations. Uttarakhand is one of the leading states in implementation of e-Governance but still there are lot of challenges in effective and efficient implementation at rural level or hilly ...

Click here to read more arrow

Context Inference from Social Networks

03 Apr 2018

8 (2,816 )

Context Inference from Social Networks: A Tie Strength Based Approach Sneha Kamal Reshmi.S   Abstract— All online sharing systems gather data that reflects user’s behavior and their shared activities. Relationship degree between two users is varying continuously. Static friend list in the social network is unable to express it completely. Tie strength is used to quantitatively describe real social relations. It is based on ...

Click here to read more arrow

Cloud Computing with Machine Learning for Cancer Diagnosis

03 Apr 2018

8 (2,843 )

Cloud computing with Machine Learning could help us in the early diagnosis of breast cancer Junaid Ahmad Bhat, Prof. Vinai George and Dr. Bilal Malik   Abstract— The purpose of this study is to develop tools which could help the clinicians in the primary care hospitals with the early diagnosis of breast cancer diagnosis. Breast cancer is one of the leading forms of cancer ...

Click here to read more arrow

Code-based Plagiarism Detection Techniques

03 Apr 2018

7 (2,514 )

Biraj Upadhyaya and Dr. Samarjeet Borah   Abstract- The copying of programming assignments by students specially at the undergraduate as well as postgraduate level is a common practice. Efficient mechanisms for detecting plagiarised code is therefore needed. Text based plagiarism detection techniques do not work well with source codes. In this paper we are going to analyse a code- based plagiarism detection technique which ...

Click here to read more arrow

Big Data: Map Reduce Based Outlier Identification for Fraud

03 Apr 2018

9 (3,359 )

Big Data: Fast, Parallel Map Reduce based outlier identification for Fraud and Intrusion Detection Pooja Vijay Pawar Ann Marie Joy   Abstract One of the most challenging aspect of Big Data analytics is real time monitoring of data. Larger and larger amount of data is being collected and stored on a daily basis, thus increasing the need for quick, effective and efficient way of analysing the ...

Click here to read more arrow

Cross Layered Approach for Network Selection

03 Apr 2018

7 (2,669 )

A Cross Layered Approach for Network Selection in Heterogeneous Wireless Networks M. Deva Priya, Dr. M. L Valarmathi, D.Prithviraj   Abstract: Service delivery in a heterogeneous wireless network environment requires the selection of an optimal access network. Selection of a non-optimal network can result in undesirable effects such as higher costs or poor service experience. Consequently, network selection techniques play a vital role in ...

Click here to read more arrow

Systematisation of Catalogue Integration

03 Apr 2018

5 (1,707 )

MALATHI V   GAYATHRI N   DHARANYA P   ABSTRACT: Catalogue integration is a very essential and difficult job which needs to be carried out by various commercial portals and commerce search engines to built and consolidate the products gathered from various data providers. In this paper we ...

Click here to read more arrow

Allocation of Resources in Cloud Server Using Lopsidedness

03 Apr 2018

8 (2,819 )

B. Selvi, C. Vinola, Dr. R. Ravi Abstract– Cloud computing plays a vital role in the organizations resource management. Cloud server allows dynamic resource usage based on the customer needs. Cloud server achieves efficient allocation of resources through virtualization technology. It addresses the system that uses the virtualization technology to allocate the resources dynamically based on the demands and saves energy by optimizing the ...

Click here to read more arrow

Comprehensive Study on Big Data Technologies and Challenges

03 Apr 2018

9 (3,202 )

Abstract: Big Data is at the heart of modern science and business. Big Data has recently emerged as a new paradigm for hosting and delivering services over the Internet. It offers huge opportunities to the IT industry. Big Data has become a valuable source and mechanism for researchers to explore the value of data sets in all kinds of business scenarios and scientific investigations. New computing ...

Click here to read more arrow

Content-based Image Retrieval With Ant Colony Optimization

03 Apr 2018

5 (1,668 )

Content-based image retrieval with skin tones and shapes using Ant colony optimization Introduction: Due to the enormous pool of image data, a plenty of data to be sort out has lead the way for analyzing and dig up the data to acquire likely worthwhile information. Heterogeneous fields cover from commercial to military desire to inspect data in a systematic and quick manner. Outstandingly in the area ...

Click here to read more arrow

Optimizing Cash Management Model With Computer Intelligence

03 Apr 2018

11 (4,173 )

Alli and M.M. Ramya   Abstract In today’s technical era, the financial organizations have great challenges to optimize the cash management process. Maintaining minimum cash leads to customer frustration. At the same time, upholding excess cash is a loss to the organization. Hence, soft computing based cash management solutions are required to maintain optimal cash balance. An Artificial Neural Network (ANN) is one such technique ...

Click here to read more arrow

Comparison of Join algorithms in MapReduce Framework

03 Apr 2018

4 (1,373 )

Mani Bhushan, Balaraj J, Oinam Martina Devi   Abstract: In the current technological world, there is generation of enormous data each and every day by different media and social networks. The MapReduce framework is increasingly being used widely to analyse large volumes of data. One of the techniques that framework is join algorithm. Join algorithms can be divided into two groups: Reduce-side join and ...

Click here to read more arrow

Efficient Streaming Protocol for Transmitting Video Files

03 Apr 2018

7 (2,527 )

Chapter one Introduction Chapter One Introduction 1.1 Motivation Information in computer science might be represented in multiple forms. In the beginning the first used forms of information were text and images, after the huge increase of using computers and internet another type of information appears, it is the hyper text which is the combination of text and images. Hyper text is text pages that ...

Click here to read more arrow

Analysis of Online Recruitment Process With TAM

03 Apr 2018

8 (3,042 )

ANALYSIS OF ONLINE RECRUITMENT PROCESS FOR JOBSEEKERS USING TECHNOLOGY ACCEPTANCE MODEL(TAM) 1) S.Munzarin, 2) A. Manimegalai 3) G. Latha, 4) B. Sindhuja ABSTRACT I.INTRODUCTION Today, online recruitment has become a major tool for many organizations. However, little is known about jobseekers' reactions to this new technology. This article is aimed at developing a web-based and central recruitment Process system for the HR Group of the company. ...

Click here to read more arrow

Retrieval of User Interesting and Rank Oriented Results

29 Mar 2018

6 (2,365 )

Abstract: Retrieval of user interesting and rank oriented results is always an important research issue in information retrieval and search engine optimization. The main problem with traditional approaches is, they gives redundant results based relevance score of the search results. In this paper we are proposing sink points based redundant removal approach with rank oriented results for user input query. Here our proposed approach follows the ...

Click here to read more arrow

Development of Dental Billing System

29 Mar 2018

15 (5,945 )

ABSTRACT The application is developed for billing and stocks management for a wholesale dental material seller. The seller mostly sells operational tools, his clients include other retailers, legitimate Doctors, hospitals and medical colleges. As the a result of rapid growth in business, the data to be stored, managed and processed is increasing day by day making it very difficult to manually maintain everything. To fix this ...

Click here to read more arrow

Modified Biogeography Based Optimization

29 Mar 2018

7 (2,545 )

Modified Biogeography Based Optimization and enhanced simulated annealing on Travelling Tournament problem. Abstract: This paper shows the implementation of Modified BBO and Extended BBO on Travelling Tournament Problem. We modified the migration step of BBO by using probabilistic measures into it. Conventional BBO is used to solve deterministic problems but when we are dealing with real world problems which are non deterministic Conventional BBO failed to ...

Click here to read more arrow

Comparative Study of Advanced Classification Methods

29 Mar 2018

12 (4,689 )

CHAPTER 7 TESTING AND RESULTS 7.0 Introduction to Software Testing Software testing is the process of executing a program or system with the intent of finding errors or termed as bugs or, it involves any activity aimed at evaluating an attribute or capability of programming system and determining that it meets its required results. Software bugs will almost always exist in any software module with moderate ...

Click here to read more arrow

Adaptive Block Steganography Based Crypting Technique

29 Mar 2018

17 (6,733 )

A Novel Approach on Adaptive Block Steganography Based Crypting Technique for Secure Message Passing AbhipsaKundu, Sudipta Sahana   Abstract The enhancement of using internet system has increased the ease of information communication which throws challenge in data security. Now in current days safe and sound data transfer become more essential and significant. Cryptography and Steganography are two significant areas of research that involve a number ...

Click here to read more arrow

Theory of Automata: Construction of Symbolic Language

29 Mar 2018

15 (5,860 )

Rubina Naz & M Arslan Riaz ABSTRACT: Conventions for translating ordinary language statements into symbolic notation and many of places are use symbolic language for communication. And alphabet is a finite set of discriminatable and irreducible symbols that can be used either as such, or as representations of some other such set for communication. This abstracts and refines the linguistically idea of alphabet where the ...

Click here to read more arrow

Stack Sequential Algorithm to Analyse Adverse Drug Reaction

29 Mar 2018

10 (3,728 )

Amiya Kumar Tripathy, Nilakshi Joshi, Aslesha More, Divyadev Pillai, Amruni Waingankar   Abstract— An adverse drug reaction (ADR) is ‘a response to a medicine which is noxious and unintended, and which occurs at doses normally used in human beings’. During the last decades it has been estimated that such adverse drug reactions (ADRs) are the 4th to 6th largest cause for mortality in different countries. They ...

Click here to read more arrow

Performance Analysis of Algorithms on Shared Memory

29 Mar 2018

4 (1,216 )

Performance analysis of algorithms on shared memory, message passing and hybrid models for stand-alone and clustered SMPs INTRODUCTION INTRODUCTION Parallel computing is a form of computation that allows many instructions to be run simultaneously, in parallel in a program. This can be achieved by splitting up a program into independent parts so that each processor can execute its part of the program simultaneously with ...

Click here to read more arrow

Wearable Motion Detection Technology to Detect Falls

29 Mar 2018

8 (3,133 )

Louise Patterson 1. Project Title The development of a fully working model using wearable motion detection technology to detect and alert to falls within the home. 2. Abstract The focus of this document concerns the research and methodology into the problem of people with care needs being able to live independently within their own homes with minimum intervention. Elderly people particularly tend to have ...

Click here to read more arrow

Novel Approaches to DoS Impact Measurement

29 Mar 2018

8 (2,863 )

J.Anto Sylverster Jeyaraj, C.Suriya, R.Sudha Abstract Over the past few years Denial of service (DoS) Attacks have emerged as serious vulnerability for almost every internet Services. Existing approach to DoS impact measurement in Deter Testbeds equate service denial with slow communication low throughput, high resource utilization, and high loss rate. These approaches are not versatile, not quantitative, not accurate because they fail to specify exact ...

Click here to read more arrow

Proposed System for Plagiarism Detection

29 Mar 2018

6 (2,094 )

Chapter 3 The Proposed System Introduction This chapter introduces ZPLAG as proposed system, and its most important design issues are explained in details. It is very easy for the student to find the documents and magazines using advanced search engines, so the problem of electronic thefts is no longer local or regional, but has become a global problem occurring in many areas. Due to ...

Click here to read more arrow

Delay Aware Multipath Switching Zone Traversal (MSZT)

29 Mar 2018

9 (3,374 )

Delay Aware Multipath Switching Zone Traversal (MSZT) Approach for MANET Abstract Route discovery and data transmission in Mobile Ad-Hoc networks (MANETs) are the key procedures which influence the performance of the network. The data transmission through the discovered route with in minimum delay is considered as a major problem in the MANET. Hence this paper proposed an approach called Multipath Switching Zone Traversal (MSZT) approach to ...

Click here to read more arrow

Survey on the WIFI Positioning Technology

29 Mar 2018

9 (3,275 )

A quick survey on the WIFI positioning technology Abstract Wireless location estimation technology is applied largely into many fields such as in the military communication, Internet of things and social networks. Meanwhile, with the growing need of WIFI technology, access points of WIFI networks have been deployed in large-scale department stores, cafes, schools and general hospitals. WIFI location positioning can not only offset the drawbacks of ...

Click here to read more arrow

Proposed Roadmap for Cloud Adoption

29 Mar 2018

6 (2,393 )

1. Chapter 8: Case Study based on the roadmap 1.1. Introduction This chapter focuses on the case study done by a privately owned company based in India. They were willing to adopt cloud for their IT Department. The proposed roadmap is being tested for the process they followed for the cloud adoption. This was done to know the significance of the proposed steps to be followed ...

Click here to read more arrow

Strategies for the Analysis of Big Data

29 Mar 2018

7 (2,717 )

CHAPTER: 1 INRODUCTION General Day by day amount of data generation is increasing in drastic manner. Wherein to describe the data which is in the amount of zetta byte popular term used is “Big data”. Government, companies and many organizations try to obtain and store data about their citizens and customers in order to know them better and predict the customer behavior. The big ...

Click here to read more arrow

Automation in IT Industry: Uses and Benefits

29 Mar 2018

7 (2,620 )

Automate IT processes Abstract Here is the procedure to analyzing the errors or bugs related to the Project in the IT industry using the automation tools. From this analysis we are able to find the processes of errors caused due to soundness or for syntactical errors Due to this errors the organization is non profitable or losing its profit sales it also lead to downfall of ...

Click here to read more arrow

IDE for Satellite ODL

29 Mar 2018

7 (2,682 )

An Integrated Development Environment for Satellite Operations Definition Language Rachana M C Sajiv Kumar   Abstract— The satellite system has to be maintained in proper operations conditions for optimal throughput and satisfying the mission requirements. This is achievable by monitoring the satellite health parameters, analyse the behavioural characteristics and control the parameters accordingly based on the behavioural patterns. The subsystem experts define the behavioural ...

Click here to read more arrow

Solution of a System of Linear Equations for INTELx64

29 Mar 2018

8 (3,106 )

A multi core hyper-threaded solution of a system of linear equations for INTELx64 architecture Richa Singhal ABSTRACT. A system of linear equations forms a very fundamental principal of linear algebra with very wide spread applications involving fields such as physics, chemistry and even electronics. With systems growing in complexity and demand of ever increasing precision for results it becomes the need of the hour ...

Click here to read more arrow

Manuscript Submission and Peer- review System

29 Mar 2018

4 (1,297 )

World’s First Manuscript Submission and Peer- review System Integrated with Social Networking Dr. Antony Raj*, Balaji Jagadeesan, Muthumariappan M and Bhuvaneswari Ranganathan   Abstract: Any major change in the way people communicate is bound to have major implications for education. Today, in the fast paced life, promoting self written research article/publications is very important to improve the citation of the article and credit to the author’s ...

Click here to read more arrow

Computer Vision In Bad Weather.

29 Mar 2018

7 (2,716 )

Saswati Rakshit     Aim: To take advantage of bad weather in estimation of depth of a scene from its image. As in bad weather atmosphere modulates original information of an image to the observer so based on observation,we develop model & methods for recovering scene properties(e.g. 3D structure,depth etc). Scope/Application: Computer Vision is widely used in various fields now a days. It is used in ...

Click here to read more arrow

Clone Detection in Object Oriented Systems

29 Mar 2018

7 (2,771 )

Program Slicing based Clone Detection in Object Oriented Systems Ishu Singla Rajesh Bhatia   Abstract— Program slicing is an efficient technique for understanding programs by simplifying them. It is a program analysis technique that extracts a particular set of statements relevant to any computation. For the last 25 years, the technique has found its application in a number of research areas like testing, debugging, ...

Click here to read more arrow

Macro Management Scheme in NEMO Environment

29 Mar 2018

8 (2,884 )

An enhanced Macro Management Scheme in NEMO Environment to Achieve Seamless Handoff Qoutibah AlAssi   1. Abstract In NEMO(NETWORK MOBILITY) and when they are connected to the Internet through mobile or even laptops and during the move from one place to another process occurs disconnect this process its output practically at the point of contact with SMR within the network NEMO have changed any ...

Click here to read more arrow

Overview of Cryptographic Techniques

29 Mar 2018

4 (1,529 )

Gunasekaran, Priya Dharshini   Cryptographic Techniques The backbone of many organization is the electronic communications. Most of the information are communicated online. Hence the important informations are to be maintained confidentially. To maintain the highly confidential information, a secure and robust system is required. Som and Banerjee (2013, p. 1) states that “Cryptography is the science of making communication unintelligible to everyone except the intended receiver(s).” ...

Click here to read more arrow

Alternatives to Proprietary Digital Forensics for SMEs

29 Mar 2018

9 (3,476 )

Realistic alternative to expensive Proprietary Digital Forensics and Security products for SMEs. Alan David Blais   Abstract Organisations have recently developed an awareness about the necessity of having their systems secure and protected from external as well as internal threats. This sudden awareness is believed to be due to recent major events about breaches and security issues faced by many organisations. The consequences of these breaches ...

Click here to read more arrow

Concerns in Implementing Biometric Technology

27 Mar 2018

5 (1,760 )

Though this seems to be an advantage, the integration of this system into the existing system is tedious. Some of the major concerns in implementing biometric technology are as follows, The system relies on complex data processing algorithms which consumes considerable amount of time. Lack of manufacturing and integration of special purpose hardware in the existing system. Adoption of biometric technology in the day-to-day life ...

Click here to read more arrow

Steps in System Design

27 Mar 2018

10 (3,892 )

CHAPTER 3 HIGH LEVEL DESIGN 3.0 High Level Design The high level design discusses an overview of how a system be supposed to work and how the higher stage sections to contains the suggested answer. It would be supposed to have very less information about implementation that is no clear class descriptions and during case not even details such as data base type (relational or object) ...

Click here to read more arrow

The Blocking of Viber in Saudi Arabia

27 Mar 2018

8 (2,908 )

Mansour Alaithan Ali alakalifa   INTRODUCTION What’s Viber ? Viber is a app for instant messaging also for Voice over IP (VoIP) for smart phones owned by Viber Media. Not only voice messaging but also users able send and receive images, video and audio media messages, Viber was founded by four Israeli partners and they are Talmon Marco, Igor Megzinik, Sani Maroli and Ofer Smocha. Viber Mediais ...

Click here to read more arrow

Evaluation of Code Smells Detection Using Meta-heuristics

27 Mar 2018

10 (3,690 )

Evaluation of code smells detection using Meta-heuristics Optimization algorithm Ragulraja.M   Abstract-The development of software systems over many years leads to needless complexity and inflexibility in design which leads to a large amount of effort for enhancements and maintenance. To take code smells detection as a distributed optimization problem. The intention is that to aggregates different methods in parallel way to achieve a common goal detection of code ...

Click here to read more arrow

Database Migration and Architecture: Bee Colony Optimization

27 Mar 2018

7 (2,741 )

Abstract: It is compulsory for two servers to be compatible if you have to either import or export the data. All the servers have unique protocol service through which they communicate. It is not possible for a server to directly transmit or receive the data from any other server. A live example is the developed codes at different platforms like JAVA, Visual Studio and others. This ...

Click here to read more arrow

Veracity Problem: A Review of Various PageRanking Algorithms

27 Mar 2018

8 (3,028 )

Abstract Enormous availability of web pages containing information leaves user in confusion of which webpage to trust and which link provides the right information. This paper provides a survey of the most relevant studies carried out in regard of ranking web pages. First, it introduces the problem of “Veracity” , conformity to truth. It then goes on to list the most common algorithms that have been ...

Click here to read more arrow

User Behavior Mining in Software as a Service Environment

27 Mar 2018

9 (3,335 )

Abstract—Software as a Service (SaaS) provides software application vendors a Web based delivery model to serve large number of clients with multi-tenancy based infrastructure and application sharing architecture. With the growing of the SaaS business, data mining in the environment becomes achallenging area. In this paper, we suggest a new metric along with a few existing metrics for customer analysis in a Software as a Service ...

Click here to read more arrow

Obfuscated Data Storage For Cloud Environment

27 Mar 2018

7 (2,549 )

Ravi Pandey, and Kamlesh Chandra Purohit   Abstract. Data storage service is one of the most attractive services provided by the cloud service provider. Despite the benefits of cloud computing threat to data confidentiality, integrity and availability may stop the data owner from switching to a cloud environment. Handing over the data to a third party to store and manage may generate data security ...

Click here to read more arrow

Network Aware Adaptive Media Streaming in Mobile Cloud

27 Mar 2018

6 (2,047 )

Authors Name/s per 1st Affiliation (Author) line 1 (of Affiliation): dept. name of organization line 2-name of organization, acronyms acceptable line 3-City, Country line 4-e-mail address if desired Authors Name/s per 2nd Affiliation (Author) line 1 (of Affiliation): dept. name of organization line 2-name of organization, acronyms acceptable line 3-City, Country line 4-e-mail address if desired Abstract—This electronic document is a “live” template and already defines ...

Click here to read more arrow

Input and Output Devices in Computer

27 Mar 2018

5 (1,613 )

Name: THENG WEI JUN   Question 1 A computer receives incoming data, processes them and produces an output. Hence, in a typical computer, there is An input device i.e, a key board A Central Processing Unit (CPU) I.e, a box and An output device i.e, a monitor or a Visual Display Unit (VDU). Discuss in detail how these devices work together to ...

Click here to read more arrow

Friend Recommendation System Software Design

27 Mar 2018

7 (2,787 )

CHAPTER 4 SOFTWARE DESIGN DESCRIPTION 4.1 INTRODUCTION The Software Design Document provides transcript which will be used to aid in the software development phase of this project by providing the details for how the software should be built. Within the Software Design Document are narrative and graphical documentation of the software design for the project including use case models, sequence diagrams, object behaviour models, and other supporting ...

Click here to read more arrow

Android-based English Grammar Checker with Voice Recognition

27 Mar 2018

5 (1,871 )

ABSTRACT In this paper, the Researchers describe an Android-based Voice Recognition system that acts as a grammar checker specifically geared to the needs of non-native speakers who are willing to learn and be familiarized with English language. This paper also examines how wrong usage of grammar can affect the communication of people both orally and in writing. Most commercial grammar checkers on the market today are ...

Click here to read more arrow

Result Analysis using Fast Clustering Algorithm

27 Mar 2018

8 (3,165 )

Result Analysis using Fast Clustering Algorithm and Query Processing using Localized Servers. P.Jessy Abstract—This paper identifying records that produces compatible results using Fast Clustering Selection Algorithm. A selection algorithm may be evaluated from both the efficiency and effectiveness points of view. While the efficiency concerns the time required to find a record, the effectiveness is related to the quality of the record. The selection algorithm fetches ...

Click here to read more arrow

Current Computing Research on Long Term Data Storage

27 Mar 2018

7 (2,596 )

Samuel Kahura Wachira Evaluation of Current Computing Research on Long Term Data Storage   Abstract The increasing number of digitized documents and the content explosion that has been experienced in this digital age has necessitated the research into the Long Term Data Storage. There are various methods, modes and approached to this problem. Whichever the solution, it must adhere to these principles: the media ...

Click here to read more arrow

Location Privacy in Wireless Networks

27 Mar 2018

4 (1,504 )

ARUN TEJA KANUKOLU   Introduction: In the past decade we have an enormous development of different wireless technologies a lot of wireless technologies like Wi-Fi, Bluetooth are being implemented. With the development of wireless technologies and the convenience they provide in the aspects of space and time they are being widely used and there comes numerous security issues. A lot of work has been ...

Click here to read more arrow

Overview of Ethernet Technology

27 Mar 2018

3 (1,189 )

Ethernet Network2 Research Assignment Reem Alajmi   Introduction Ethernet technology has evolved to meet new bandwidth and market requirements. In addition to computers, Ethernet is now used to interconnect appliances and other personal devices. It is used in industrial applications and is quickly replacing legacy data transmission systems in the world's telecommunications networks. In this research, we shall discuss interface options for Ethernet and ...

Click here to read more arrow

Website Quality Evaluation Based on Sitemap

27 Mar 2018

9 (3,453 )

M.Chandran A.V.Ramani   Abstract Website quality evaluation can be made based on creating site map for the WebPages for a single website which works properly. A website is taken for the analysis where we check every link under that website are checker and split it according to status code. By analyzing every status code from all those webpage links, we are ignoring every other ...

Click here to read more arrow

Pixel and Edge Based Lluminant Color Estimation

26 Mar 2018

8 (3,176 )

Pixel and Edge Based Lluminant Color Estimation for Image Forgery Detection Shahana N youseph and Dr.Rajesh Cherian Roy   ABSTRACT Digital images are one of the powerful tools for communication. So Image security is a key issue when use digital images. With the development of powerful photo-editing software, such as Adobe Photoshop Light room 4, Apple Aperture 3, Corel PaintShop Pro X5, GIMP 2.8, photo manipulation is ...

Click here to read more arrow

System Requirements for Electric System for Car Rental

26 Mar 2018

10 (3,796 )

  1. Introduction XYZ is a car rental company located in Saudi Arabia, and has branches in all major cities. XYZ main business line is to provide rental service of small civilian cars for individuals. XYZ is planning to expand its business and to approach larger customer base by allowing customers to book from online. Also XYZ needs to automate its current paperwork processes ...

Click here to read more arrow

Ontology Development Through Concept Maps Using Text Indices

26 Mar 2018

8 (2,930 )

      Abstract- Ontology acts as a platform for knowledge sharing and description to represent a particular domain in the form of customized web information gathering. While developing those ontologies for a particular domain, it emphasizes the knowledge base across the global information than the local in information. In this project represent a customized ontology system for a particular domain. Data mining is chosen ...

Click here to read more arrow

Design of Automated Biomass Gasifier

26 Mar 2018

7 (2,650 )

ABSTRACT: Biomass gasifiers have found a promising place in renewable energy resource field. Even then, these gasifiers are facing lots of practical difficulties on operational effectiveness due to shortage of man power. So small scale biomass gasifier is fabricate and further the fuel feeding system and switching functions (On/Off Operations) are also changed by means of automation. Bucket conveyors are used to feed the fuel from ...

Click here to read more arrow

Evolution of Storage Media Technology Within the Data Centre

26 Mar 2018

7 (2,632 )

AN INVESTIGATION INTO THE EVOLUTION OF STORAGE MEDIA TECHNOLOGY WITHIN THE DATA CENTRE TO SUPPORT THE I/O REQUIREMENTS OF MODERN APPLICATIONS. Chandan Chandapura Ramesh (x14111306) Abstract Technology has always played a tremendous role in evolution of data storage media from the very starting punch cards to the present flash drives and from kilobytes to terabytes. The evolution of storage included from the standardization of storage ...

Click here to read more arrow

Developing a Brain Computer Interface

26 Mar 2018

8 (2,964 )

A Seminar Report On “Brain Computer Interface” Submitted by: Name: Sachin Kumar Roll No: 1214310301 ABSTRACT Brain Computer Interface allows users to communicate with each others by using only brain activities without using any peripheral nerves and muscles of human body. On BCI research the Electroencephalogram (EEG) is used for recording the electrical activity along the scalp. EEG is used to measure the voltage ...

Click here to read more arrow

Securing MANET From Routing Attacks

26 Mar 2018

4 (1,344 )

CHAPTER 3 RESEARCH METHODOLOGY 3.1 RESEARCH PROBLEM The increasing demand and utilization of wireless technology is making the need for more secure wireless networks. From the security viewpoint MANET is one of the most interesting research fields. A MANET is generally exposed to vulnerabilities due to its open medium, rapidly varying network topology, lack of centralized control and lack of clear line protection and it suffers ...

Click here to read more arrow

Zero-Day Vulnerability Attack

26 Mar 2018

7 (2,748 )

As Forensics Expert discuss the process involve in investigating Zero-Day Vulnerability attack Introduction The Internet became essential in this 21st generation and people can’t live without Internet. As the growth of the use of Internet, new technologies are also invented to support our life. However this new technologies may also exploit to the vulnerability attack. One of the vulnerability attack is zero-day attack (0day). A zero-day ...

Click here to read more arrow

Analysis of Data Leakage Prevention Solution

26 Mar 2018

8 (3,127 )

Anuja Vasant Kale, Vishwajeet Bajpayee, Shyam P Dubey   ABSTRACT: In any organization or institution we have to deal with lots of data. Those data may contain confidential information about the customer, project related data, employee personal data etc. If such type of confidential data is leaked from the organization then it may affect on the organization health. Hence we have to enforce some policies in ...

Click here to read more arrow

Efficient Prediction System Using Artificial Neural Networks

26 Mar 2018

7 (2,655 )

Jay Patel   Abstract- Predicting is making claims about something that will happen, often based on information from past and from current state. Neural networks can be used for prediction with various levels of success. The neural network is trained from the historical data with the hope that it will discover hidden dependencies and that it will be able to use them for predicting ...

Click here to read more arrow

Trust Inference Model Proposal

26 Mar 2018

5 (1,771 )

(step1-13 in Alg. 4) in the continu-ous case. For advogato data set, we directly report the results on all the six snapshots (i.e., advogato-1, . . . , advogato-6). For PGP, we use its subsets to study the scalability. The result is shown in Fig. 6, which is consistent with the complex-ity analysis in Section 4.3. As we can see from the figure, MATRI scales linearly ...

Click here to read more arrow

Cryptography: Types, Methods and Uses

26 Mar 2018

10 (3,892 )

CHAPTER-1 INTRODUCTION 1.1 Introduction to Cryptography Cryptography is art of writing and reading the secret information. It is used to send the information between the various participants. It can be used in such a manner so that it could not be seen by the others. Cryptography is used to prevent the information from the attacker. It provides various services as : Integrity checking Authentication ...

Click here to read more arrow

Content Management Application on Cloud Platform

26 Mar 2018

11 (4,057 )

ABSTRACT The aim of the project is to develop a versatile Content Management application on cloud platform that serves common business purpose of ZTE Telecom Pvt. Ltd. With increasing numbers of orders and product enquiries, the company experiences a few problems such as difficulty in managing the content effectively and in a secure manner so that the user has a wonderful experience from purchase to payment. ...

Click here to read more arrow

Static Code Analysis

26 Mar 2018

9 (3,363 )

Jim Kielt Table of Contents (Jump to) 1.0 Analysis 1.1 Cross-Site Scripting: 239 vulnerabilities detected. 1.2 File Manipulation: 9 vulnerabilities detected. 1.3 SQL Injection: 4 vulnerabilities detected. 2.0 Bibliography Table of Figures Figure 1 - RIPS results output for bWAPP Figure 2 - Line of code from xss_json.php vulnerable to Cross-Site Scripting detected by RIPS Figure 3 - Returned message from xss_json.php Figure 4 - Returned ...

Click here to read more arrow

Performance Analysis for AD-HEED and N-HEED

26 Mar 2018

12 (4,602 )

4.1 Results and Discussion In this section, we exhibit and discuss the results of the simulation. This section shows the performance analysis for AD-HEED and N-HEED compared to the original HEED protocol. Every result presented is the average of five experiments. The following sections give a detailed description of the experiments and the results. 4.4.1 Network Lifetime The number of alive nodes for each round is ...

Click here to read more arrow

Multi Cloud Database Service Providers (MCDSP)

26 Mar 2018

9 (3,487 )

A Multi cloud service provider is expert in building the distributed database cloud and can manage those cloud storage servers also. And this multi cloud database service provider is capable of operating the cloud computing system in an interactive way. When a user wants to store the data in the multi cloud, he needs to log with his credentials. MCD service provider of the multi cloud ...

Click here to read more arrow

Link Lifetime based Border Node (LLBN) Protocol

26 Mar 2018

5 (1,673 )

Link Lifetime based Border Node (LLBN) Protocol for Vehicular Ad Hoc Networks Sanjay Batish, Manisha Chahal, Sanjeev Sofat, Amardeep Singh   Abstract Vehicular ad hoc network (VANET) attracts rising attentions of researchers for safety related and other communication applications. These networks have many challenging characteristics such as high mobility, fast changing topology and limitation of bandwidth. Under these problems, we proposed LLBN (link lifetime based ...

Click here to read more arrow
Get in Touch With us

Get in touch with our dedicated team to discuss about your requirements in detail. We are here to help you our best in any way. If you are unsure about what you exactly need, please complete the short enquiry form below and we will get back to you with quote as soon as possible.