Making Renewable Energy SMART using Internet of Things (IOT)

18 Apr 2018

6 (2,023 )

Manuj Darbar, Kripa Shankar Pathak, Rajesh Goel   Abstract: The paper highlights the cooperative behaviour of Multi agent systems by combining various renewal energy sources and then feeding the power to the grid. The process uses 6LoWPAN protocol to communicate with each other and C-ARTAGO's interface control with Guarde properties to intelligently manage the demand and supply. Keywords: SMART Grids, Renewal Energy sources, IoT. ...

Click here to read more arrow

Impact of Computer Technology on Modern Society and Culture

18 Apr 2018

8 (2,810 )

Establishing the Foundations of Modern Computer Systems In 1812, mathematics professor Charles Babbage laid the foundations of modern computing when he recognised the relation between machines and mathematics, machines performed tasks repeatedly without making mistakes, while mathematics often requires the repetition of particular tasks or steps. Ten years after making his discovery Babbage began the development of a machine that would have been the first general-purpose ...

Click here to read more arrow

Pinpoint Colluding Attackers for Software-as-a-Service Cloud

18 Apr 2018

8 (2,848 )

Abstract- Software as a Service (SaaS) is a distribution model of software in which service provider or vendor develops applications and these are accessible by the customers over a network. SaaS clouds are vulnerable to malicious attacks because of their sharing nature. IntTest, service integrity attestation framework has been anticipated and it uses a novel integrated attestation graph analysis scheme to pinpoint attackers. But IntTest has ...

Click here to read more arrow

Adaptive User Interface Framework: Android Mobile Platform

18 Apr 2018

8 (2,915 )

Mr. Tulip Das Abstract—Adapting a graphical interface (GUI) to a range of resources with completely different capabilities is exciting topic of mobile computer. The user interface created for an application ought to modification its layout and parts to the user need and changes for every user. We propose a framework for mobile applications to form the user interfaces adaptable for user. This identifies an ...

Click here to read more arrow

Strategies of Privacy: Managing Constant Query Evaluation

10 Apr 2018

4 (1,477 )

STRATEGIES OF PRIVACY FOR MANAGING CONSTANT EVALUATION OF QUERIES ABSTRACT: The problems of data confidentiality are fetching more and more significant and not easy to handle. While preserving database confidentiality or else privacy of the individuals concerned, we require assuring that database makes available as informative answers to needy. The design as well as functioning of a database would be constructed in an approach that will ...

Click here to read more arrow

Secure Data Retrieval Based on Hybrid Encryption

09 Apr 2018

7 (2,691 )

SECURE DATA RETRIEVAL BASED ON HYBRID ENCRYPTION FOR DISRUPTION-TOLERANT NETWORK Kollipara Durgesh, Dr.P. Sriramya   I. ABSTRACT Military network is one of the most important network in any country but this network mostly suffers from intermittent network connectivity because of the hostile region and the battlefield. To solve the network problem faced by the military network we use Disruption-tolerant network (DTN) technologies which is widely becoming ...

Click here to read more arrow

Optimizing Cloud Resources Implementation of IPTV Service

09 Apr 2018

8 (2,984 )

Optimizing Cloud Resources Implementation of IPTV service delivery through Virtualization MOHAMMAD ISMAIL Abstract- The Internet Protocol Television is a system over which Internet television services are delivered using the networking and architecture methods of the Internet Protocol Suite through a packet-switched network infrastructure, e.g., the Internet and broadband Internet access networks, rather of being delivered over traditional radio frequency broadcast, satellite signal, and cable ...

Click here to read more arrow

Review of Binding Updates Security in MIPv6

09 Apr 2018

8 (2,965 )

Avishek Dutta & Vikram Raju R.   Abstract— Mobile Nodes (MN) in Mobile IPv6 (MIPv6) are given the opportunity to eliminate triangle routing that is inefficient with their own corresponding node (CN) using Route Optimization (RO). This greatly improves the performance of the network. Unfortunately, using this method allows several security vulnerabilities to manifest itself with the MIPv6. Among those, common issues are those concerns the verification ...

Click here to read more arrow

Cache Manager to Reduce the Workload of MapReduce Framework

09 Apr 2018

8 (3,091 )

Provision of Cache Manager to Reduce the Workload of MapReduce Framework for Bigdata application Ms.S.Rengalakshmi, Mr.S.Alaudeen Basha Abstract: The term big-data refers to the large-scale distributed data processing applications that operate on large amounts of data. MapReduce and Apache’s Hadoop of Google, are the essential software systems for big-data applications. A large amount of intermediate data are generated by MapReduce framework. After the completion of the task ...

Click here to read more arrow

Nucleus Real Time Operating System

09 Apr 2018

5 (1,724 )

What is Real Time OS? An ongoing working framework (RTOS) is a working framework (OS) proposed to serve constant application process information as it comes in, ordinarily without buffering postponements. Preparing time necessities (counting any OS deferral) are measured in tenths of seconds or shorter. NUCLEUS RTOS: INTRODUCTON: The Nucleus RTOS is conveyed in more than 3 billion gadgets and gives a profoundly versatile small scale ...

Click here to read more arrow

Cells Breaks the Tor’s Anonymity: Onion Router

09 Apr 2018

8 (2,941 )

Ms. S.SIVARANJANI   Ms. R.BACKIYALAKSHMI B.E, M.Tech.,   Abstract - To hide the communication of users, the anonymity systems pack the application data into equal – sized cells. The size of IP packets in the Tor network can be very dynamic and the IP layer may be repack cells. A new cell-counting attack against Tor allows the attacker to confirm anonymous communication relationship among users very ...

Click here to read more arrow

Overview of Cryptography and Encryption Techniques

09 Apr 2018

5 (1,687 )

What is cryptography Cryptography is the discipline of cryptography and cryptanalysis and of their interaction. The word “cryptography” is derived from the Greek words “Kryptos” means concealed, and “graphien” means to inscribe. It is the science of keeping secrets secret. One objective of cryptography is protecting a secret from adversaries. Professional cryptography protects not only the plain text, but also the key and more generally tries ...

Click here to read more arrow

E-Business Distribution Systems and Value Strategies

09 Apr 2018

5 (1,919 )

Srishti Mittal   What is a "business portal?" Ans. The term business portal is used to describe a feature on a company website that allows authorized users to access restricted content or information. This tool is growing in popularity, as it provides a single gateway for staff to access different applications. Some of the most common features of a business portal include ...

Click here to read more arrow

Modified Insertion Sort Algorithm: Binary Search Technique

09 Apr 2018

11 (4,075 )

Modified Insertion Sort Algorithm with Binary Search Technique: Application to Ranking of Images Retrieved by CBIR M. K. I. Rahmani M. A. Ansari Abstract—Due to the abundance of the high quality digital images in image repositories of very huge size on the ever growing Internet by enterprise houses, research institutions, medical & healthcare organizations and academic institutions etc., finding a set of useful images ...

Click here to read more arrow

Ethical Analysis of Children on the Internet

09 Apr 2018

10 (3,682 )

Children on the Internet Abeer AlSouly Ghada AlFantookh  Naima AlRashed Overview: Many people may consider the Internet as the greatest invention ever created by man. No doubt about that if we talked about how fast knowledge exchanging has become today, or how easy can people communicate with each other globally. Also children nowadays practice many activities on the Internet; the most popular ones are schoolwork, social networking ...

Click here to read more arrow

User Interface: Complexity, Types and Performance

09 Apr 2018

4 (1,552 )

User interface complexity A user interface is the means in which a person controls a software application. A user interface should provide the user with an easy experience, allowing them to interact with the software in a stress-free and natural way. The GUI (graphical user interface) is a program that contains graphical controls which the user can select with a keyboard or mouse. “The GUI complexity ...

Click here to read more arrow

Reengineering and Code Migration Strategies

09 Apr 2018

6 (2,019 )

GENERAL The most important quality of software reengineering is to improve or transformation of an existing software system so that it can be understood, controlled and user-friendly. Software is used to replace high software maintenance cost of the legacy systems. So software reengineering is more beneficial for recovering and reusing existing software assets, putting high software maintenance costs under control. It also establishes a base for ...

Click here to read more arrow

Concepts and Applications of Deep Learning

09 Apr 2018

5 (1,619 )

Abstract: Since 2006, Deep Learning, also known as Hierarchal Leaning has been evolved as a new field of Machine Learning Research. The deep learning model deals with problems on which shallow architectures (e.g. Regression) are affected by the curse of dimensionality. As part of a two-stage learning scheme involving multiple layers of nonlinear processing a set of statistically robust features is automatically extracted from the data. ...

Click here to read more arrow

Development of App for Gaming

09 Apr 2018

10 (3,893 )

Chapter 4 RESULTS AND DISCUSSION This section will demonstrate the after effects of distinctive devices utilized as a part of presentation, investigation and understanding of the outcome in assessment. Tables are likewise included in the section for effortlessly comprehension of the contrast between the current and the proposed programming. 1. Entities used in the proposed software An entity is a thing of enthusiasm to an association ...

Click here to read more arrow

Healthcare Technology and Big Data

09 Apr 2018

5 (1,714 )

Introduction As technology advances, medical devices are able to record increasing amounts of information. These devices are also becoming much more assessable to consumers than in the past. In Adam Tanner’s article “Health Entrepreneur Debates Going To Data’s Dark Side,” he discusses the company Safe Heart. Safe Heart is developing medical devices for consumer use. These devices are able to measure values like blood oxygen saturation, ...

Click here to read more arrow

Water Meter Data Management System Analysis

09 Apr 2018

4 (1,486 )

SYSTEM ANALYSIS EXISTING SYSTEM The conventional billing system for water usage involves person visits each residential and read the meter data manually. The collected data are used for billing purpose. Manual readings can cause error and can lead to corruption. Thus the billing system can become inaccurate and inefficient. There are chances of leaks and theft which could not be identified. ...

Click here to read more arrow

Google Drive: Functions, Security and Applications

09 Apr 2018

6 (2,385 )

Table of Contents (Jump to) Introduction What is Google Drive and its function? How to start with Google Drive? How secure is Google Drive? How do people use Google Drive? What is the maximum upload limit of Google Drive and supported files? What is Google Drive’s storage plan pricing? What are Google Drive’s compatible Operating Systems? Conclusion References Introduction In addition to the development velocity of ...

Click here to read more arrow

Improving Structure and Links for User Navigation Session

09 Apr 2018

6 (2,314 )

Improving Structure and Links for Analysis of User Navigation Sessions Bhagyashri Biranje, Priti Harpale, Dushyant Singh, Meenal Jadhav, Sindhu M.R.   ABSTRACT In this paper, we are designing a well-structured website to facilitate effective user navigation to relink webpages to improve navigability using user navigation data. We will completely reorganized new structure of a website, which can be highly unpredictable. It will also illustrate how ...

Click here to read more arrow

Overview of Crawlers and Search Optimization Methods

09 Apr 2018

7 (2,477 )

With the explosive growth of knowledge sources out there on the planet Wide internet, it's become progressively necessary for users to utilize automatic tools in the notice the specified data resources, and to trace and analyze their usage patterns. Clustering is worn out some ways and by researchers in several disciplines, like clump is done on the premise of queries submitted to look engine. This paper provides an ...

Click here to read more arrow

Automated Protocol to Restrict Password Guessing Attacks

09 Apr 2018

9 (3,397 )

D.Ganesh Dr.V.V.RamaPrasad   ABSTRACT- Password login services are now widespread and ever increasing. Attacks that take place on password-only remote login services are brute force and dictionary attack. Providing convenient login for legitimate user.In the proposed system we use Password Guessing Resistant Protocol (PGRP) which improves more security by restricting the number ...

Click here to read more arrow

Risks and Challenges to Young People on the Internet

09 Apr 2018

7 (2,797 )

Children on the Internet   Dalia Alhejji Nada Alzahrani   Overview: Nowadays, the internet has become a fundamental facial expression of our lives over recent epoch years and it's becoming integral part of our life also it's considered as an increasing role of today's culture , especially for children and ...

Click here to read more arrow

Security Issues of Social Networking Sites

09 Apr 2018

7 (2,513 )

C. Divya Gowri, K. Rajalakshmi, PG Scholar, S.Suresh Abstract--Social Networking Sites (SNS) are a platform to build social relationship or social networks among people. It is web-based service which allows people to create public profiles; it is similar to online community. The only difference is social network service is individual centred whereas online community is group centred. It groups the individuals into specific groups ...

Click here to read more arrow

CRM Implementation in SME Sector: Case Study of Mobile Use

09 Apr 2018

8 (2,996 )

CRM Implementation in SME Sector: Case Study of Mobile Usage in INDIA Prof. (Dr.) Subhash Desai A B S T R A C T Through 2004/05, enterprise CRM has re-emerged as a non-discretionary initiative, focused on business transformation and revenue attainment. CRM business processes and the CRM technology are to achieve value-based customer life-cycle patterns. The efforts needed for a successful CRM are iterative in nature. ...

Click here to read more arrow

Development of Online eResume with Job Portal

09 Apr 2018

12 (4,722 )

7.3.3 Sequence diagram for Employer Figure No. 7.3.2: Sequence diagram for Employer This sequence starts with Employer authenticating into the system. After successful authenticating, Employer will login to Job Portal. Employer can post jobs in job portal and display in main page. And Employer can view the user profile who applied for that job. 7.4 ACTIVITY DIAGRAM An activity diagram represents the work flow of ...

Click here to read more arrow

AIS-MACA- Z: MACA based Clonal Classifier for Splicing Site

09 Apr 2018

5 (1,996 )

AIS-MACA- Z: MACA based Clonal Classifier for Splicing Site, Protein Coding and Promoter Region Identification in Eukaryotes Pokkuluri Kiran Sree, Inampudi Ramesh Babu, SSSN Usha Devi N    Abstract Bioinformatics incorporates information regarding biological data storage, accessing mechanisms and presentation of characteristics within this data. Most of the problems in bioinformatics and be addressed efficiently by computer techniques. This paper aims at building a classifier based ...

Click here to read more arrow

Emotion Recognition From Text-a Survey

09 Apr 2018

10 (3,769 )

Ms. Pallavi D. Phalke , Dr. Emmanuel M. ABSTRACT Emotion is a very important facet of human behaviour which affect on the way people interact in the society. In recent year many methods on human emotions recognition have been published such as recognizing emotion from facial expression and gestures, speech and by written text. This paper focuses on classification of emotion expressed by the online ...

Click here to read more arrow

Ant Colony Optimization Algorithm

09 Apr 2018

4 (1,486 )

To solve the planning problem, we proposed an ACO algorithm with further designed. ACO builds solutions in a step-by-step manner and enables the use of problem-based heuristics to guide the ants to search the way; it is possible to design heuristics are useful to direct the ants to schedule the critical tasks as early as possible and to assign the project tasks to suitable employees with ...

Click here to read more arrow

Improving Effectiveness and Efficiency of Sentiment Analysis

09 Apr 2018

4 (1,409 )

Modha Jalaj S. Chapter – 1 1. Introduction: Big Data has been created lot of buzz in Information Technology word. Big Data contain large amount of data from various sources like Social Media, News Articles, Blogs, Web, Sensor Data and Medical Records etc. Big Data includes Structured, Semi-Structured and Unstructured data. All these data are very useful to extract the important information for analytics. 1.1 Introduction ...

Click here to read more arrow

GDI Security Policy Document

09 Apr 2018

7 (2,408 )

  1.0 Introduction This security policy document offers a sufficient summary of the state of security concerns with the herein mention corporation and no alteration of the information contained herein is allowed without the consent of the Global Distribution Inc. The document offers a brief outlay of the corporation and the structures of its state of security as well as propositions set in order to ensure ...

Click here to read more arrow

How to Write a Research Dissertation/Thesis

09 Apr 2018

6 (2,225 )

How Research is to be written and presented Research writing Research writing is a major factor of success for any student, scholar or anyone interested in the pursuit of knowledge as a research paper can be used to identify and explore scientific, historical, technical, political, social, and any other issues that affects man and his society. It presents the information and indicates where the information is ...

Click here to read more arrow

Determining Attributes to Maximize Visibility of Objects

09 Apr 2018

7 (2,686 )

A Critique on Determining Attributes to Maximize Visibility of Objects Muhammed Miah Gautam Das Vagelis Hristidis Heikki Mannila Vidisha H. Shah 1. Summary of the published work Das, Hristidis, and Mannila (2009, p. 959) discussed about the ranking function and top k retrieval algorithms that helps user (potential buyers to search for the required product from the available catalog. The problem is how a user (potential ...

Click here to read more arrow

Database System Development Exam

09 Apr 2018

9 (3,548 )

Adam Warsame Course: FDSc Computing Module Title: Database Systems Assignment Title: Database Systems Assessment     Introduction The task for this assignment is to develop a database for a local garden centre. To understand the system better and what way it should operate; it was a good idea to review other examples of databases online. From these reviewed examples, was able to gather a rough understanding ...

Click here to read more arrow

Winds of Change: From Vendor Lock-in to the Meta Cloud

09 Apr 2018

4 (1,394 )

Introduction: A software requirement specification is a complete explanation of the system that is to be created. Software requirement specification includes non-functional and functional requirements. Use case technique can be used in prepared to identify the functional requirements of the software inventions. Non-functional requirements are requirements which force constraints on the implementation and design. As systems grew more complex, it becomes more apparent that the goal ...

Click here to read more arrow

Survey on Spatial Database Systems

09 Apr 2018

4 (1,525 )

 Abstract—In this survey, the term of “spatial database”, its data models, its data types with implementations, and its management techniques are described with providing at least spatial join methods. Also the storage and query processing algorithms for such databases are surveyed. (Abstract section will be updated with final report) 1.Introduction Various fields need various data types such as character, number, date, time, and image ...

Click here to read more arrow

Reducing Communication and Processing Overhead

09 Apr 2018

7 (2,792 )

RACE: Reducing Communication And Processing Overhead And Ensuring Security Milu Sayed Liyamol Aliyar   Abstract— RACE, Report based payment scheme for multi-hop wireless network. Race is a secure incentive protocol which used for the multi-hop wireless network, helps packet transmission and enforce fairness. The protocol uses the concept of evidences and the regularity of the nodes. The trusted party evaluates the nodes competence and ...

Click here to read more arrow

OpenMP Based Fast Data Searching with Multithreading

09 Apr 2018

8 (2,826 )

V.Karthikeyan, Dr. S.Ravi and S.Flora Magdalene   Abstract The multiprocessor cores with multithreaded capability are continuing to gain a significant share and offer high performance. The use of OpenMP applications on two parallel architectures can identify architectural bottlenecks and introduces high level of resource sharing in multithreading performance complications. An adaptive run-time mechanism provides additional but limited performance improvements on multithreading and is maximized the efficiency of ...

Click here to read more arrow

Email Protocol: SMTP, POP, and MIME

05 Apr 2018

6 (2,386 )

Email protocol governs the interactions between email clients and servers. An Email protocol is a standard method which is used at each end of a communication channel either server side or client side, in order to transmit information properly. User is required to use a mail client to access to the mail server, by using variety of email protocols, the mail client and server can only ...

Click here to read more arrow

Analysis of Tools for Data Cleaning and Quality Management

05 Apr 2018

5 (1,604 )

Data cleaning is needed in process of combining heterogeneous data sources with relation or tables in databases. Data cleaning or data cleansing or data scrubbing is defined as removing and detecting errors along with ambiguities existing in files, log tables. It is done with the aim to improve quality of data. Data quality and data cleaning are both related terms. Both are directly proportional to each ...

Click here to read more arrow

Improving Resource Allocation for Data Center Overbooking

05 Apr 2018

7 (2,637 )

M.Ponmani Bharathi, C.Sindhuja, S.Vaishnavi, Ms.A.Judith Arockia Gladies Abstract Overbooking becomes feasible because user applications tend to overestimate their resources and requirements, that tends to utilize only a fraction of the allocated resources. Overbooking has to be carefully planned in order not to impact application performance. Resource utilization and Data centres utilization can be used in this overbooking scheduler. Data send can send from ...

Click here to read more arrow

System to Filter Unwanted Messages from OSN User Walls

05 Apr 2018

9 (3,247 )

M.Renuga Devi, G.Seetha lakshmi, M.Sarmila Abstract—One fundamental issue in today’s Online Social Networks (OSNs) is to give users the ability to control the messages posted on their own private space to avoid that unwanted content is displayed. Up to now, OSNs provide little support to this requirement. To fill the gap, in this paper, we propose a system allowing OSN users to have a ...

Click here to read more arrow

Acoustic Cryptanalysis of RSA and Its Counter Measure

05 Apr 2018

6 (2,362 )

Prof. J P Agrawal Saurabh Sharma Siddharth Gupta ABSTRACT Acoustics has come up as a new vulnerability in the field of information security. The RSA encryption algorithm, although h very hard to break mathematically, has been broken recently by using acoustics and power analysis of emanations. Acoustic Cryptanalysis is the side-channel attack which targets implementations of cryptographic algorithms. The cryptographic algorithms are quite secure ...

Click here to read more arrow

Smart Prepaid Energy Meter Using GSM Module

05 Apr 2018

8 (2,810 )

KISHORE KUMAR K   GAYATHRI N   RAJESH KUMAR V T   Abstract This paper aims at proposing a system that reduces the power loss and power theft due to illegal activities. This framework embraces another strategy known as "prepaid power". The GSM module is utilized so that ...

Click here to read more arrow

Techniques for Understanding Human Walking Motion

05 Apr 2018

5 (1,636 )

  Introduction Multimedia is a term that collectively describes a variety of media content available in various forms of text, speech, audio, still images, video, animation, graphics, 3D models and combinations of them used to capture real time moments. Over the recent years the technological advances have enabled wide availability and easy access of multimedia content and much research was dedicated to perform automated computational tasks ...

Click here to read more arrow

Vulnerability Assessment and Penetration Testing Comparison

05 Apr 2018

6 (2,061 )

Jignesh C Doshi Bhushan Trivedi ABSTRACT Business using internet has grown drastically in past decade. Attacks on web application have increased. Web application security is a big challenge for any organizations as result of increasing attacks. There exists different approaches to mitigate various security risks are defensive coding, hardening (Firewall), Monitoring and auditing. This solutions found more towards prevention of attacks or of monitoring types ...

Click here to read more arrow

Smartphone Operating Systems: Evaluation & Enhancements

05 Apr 2018

10 (3,688 )

Muneer Ahmad Dar Javed Parvez Abstract—The increasing number of mobile operating systems that operates the small hand held devices called the Smartphone, has become integral part of our lives. The openness of these new environments has lead to new domain of apps and markets and has enabled greater integration with existing online services like e-banking etc. Smartphone makers are competing in turns to trump ...

Click here to read more arrow

Concepts and Research into Green Networking

05 Apr 2018

6 (2,263 )

Green Networking Abstract: Saving of excessive energy consumption is becoming a key concern in networking, because of theprobable economical benefits. These concerns, usually argued to as “green networking”, relate to inserting energy-awareness in the strategy, in the devicesand in the protocols of networks. In this work, I first formulate a more precise definition of the “green” attribute. I further more classify a few standards that are ...

Click here to read more arrow

Load Balancing as an Optimization Problem: GSO Solution

05 Apr 2018

6 (2,358 )

METHODOLOGY INTRODUCTION In this chapter, we presented a novel methodology which considers load balancing as an optimization problem. A stochastic approach, Glowworm swarm optimization (GSO) is employed to solve the above mentioned optimization problem. In the proposed method, excellent features of various existing load balancing algorithms as discussed chapter 2 are also integrated. PROPOSED METHODOLOGY There are numerous cloud computing categories. ...

Click here to read more arrow

Automatic Metadata Harvesting From Digital Content

05 Apr 2018

5 (1,614 )

MR. RUSHABH D. DOSHI, MR. GIRISH H MULCHANDANI Abstract: Metadata Extraction is one of the predominant research fields in information retrieval. Metadata is used to references information resources. Most metadata extraction systems are still human intensive since they require expert decision to recognize relevant metadata but this is time consuming. However automatic metadata extraction techniques are developed but mostly works with structured format. We proposed ...

Click here to read more arrow

Proficient Key Tree Structure for Secure Dynamic Groups

05 Apr 2018

6 (2,400 )

Secure Group Communication ensures forward secrecy and backward secrecy of the data. It is the responsibility of the Group Center (GC) to disallow new members to have access to previous data called backward secrecy and existing members who have left the group to have further access to data called forward secrecy. Forward and backward secrecy can be ensured by updating the keys whenever a join/leave request ...

Click here to read more arrow

Information Security Management Plan

05 Apr 2018

4 (1,456 )

Cyber security is about protecting your computer-based equipment and information from unintended or unauthorised access, change, theft or destruction HM Governement (2015), you can manage the risks by Planning, Implementing and Reviewing your Information Security Management System. The following are the key points of Information and Security Management Plan. Risk Assessment and Analysis - The company should assess the security risks or damages that could be ...

Click here to read more arrow

Stages of Alzheimer's Utilizing Machine Learning Techniques

05 Apr 2018

5 (1,835 )

Abstract: Alzheimer’s disease (AD) is the general type of dementia that affects the elderly population globally. An accurate and early diagnosis of Alzheimer is crucial for the treatment of patients suffering from AD. In this paper, two different classifiers, SVM (Support Vector Machine) and an ANFIS (Adaptive Neuro Fuzzy Inference System) have been employed to classify patients between AD control, mild control and normal control. The ...

Click here to read more arrow

Symmetric Key Utilized for EasySMS Convention

05 Apr 2018

4 (1,552 )

Conceptual SMS (Short Message Service) is a generally utilized correspondence between the end clients. SMS is being utilized as a part of our diverse applications. The Short Message Service (SMS) normally whatever we trade the first configuration, now and then we used to send the some mystery message like our email secret word, pass code and bank watchword. We send SMS is in unique organization, our customary SMS ...

Click here to read more arrow

Mutation Testing by Using Formal Method

04 Apr 2018

9 (3,575 )

Jaspreet Singh Abstract Mutation testing was introduced in 1970’s in the field of software testing as a process of testing the test suites by intentionally seeding errors i.e. mutation operators, into the original program’s source code. Its main purpose is to verify the functionality of the test cases which are executed with the aim of catching the variations between the program and the mutants. ...

Click here to read more arrow

Heterogeneous Wireless Sensor Networks (HWSN) Management

04 Apr 2018

9 (3,482 )

A Key Management & Establishment Scheme in Heterogeneous Wireless Sensor Networks (HWSN) Premamayudu B, Venkata rao K, and Suresh Varma P   Abstract: Key management is the one of the fundamental requirement for securing the hierarchical wireless sensor networks (HWSN) and also prevents adversarial activities. This paper presents a new pairwise key management scheme using matrix for HWSNs. In HWSN, cluster headers are more ...

Click here to read more arrow

Skew Detection of Devanagari Script Using Pixels

04 Apr 2018

9 (3,372 )

Skew Detection of Devanagari Script Using Pixels of Axes-Parallel Rectangle and Linear Regression Trupti A. Jundale Ravindra S. Hegadi   Abstract—Skew detection and correction of handwritten data is one of the difficult tasks in pattern recognition area. Here we illustrate the method for skew detection and correction of Devanagari handwritten script. The proposed approach works for single skew. The input images for this research ...

Click here to read more arrow

Efficient Database Driven Reverse Mapping Dictionary

04 Apr 2018

6 (2,312 )

Building an Efficient Database Driven Reverse Mapping Dictionary ABSTRACT With the enormous availability of words in usage it is always being a challenge to find the meaning. Even the versatile speaker may thrash about finding a meaning for certain unheard words. In such cases they need some source for reference like dictionary. In traditional model for using dictionary, forward concept is implemented where it result in ...

Click here to read more arrow

Asynchronous JavaScript and XML (AJAX)

04 Apr 2018

8 (3,049 )

Anjan Thapaliya Abstract AJAX stands for Asynchronous JavaScript and XML. It is a web technology that evolved in early 2000 and uses a mix of technology like JavaScript and XML. This paper discusses about how AJAX technology works in modern web application and various advantages and disadvantages. This paper also discusses about various frameworks available for AJAX that can be used on different platforms. ...

Click here to read more arrow

Emotion Recognition System for Affective Text

04 Apr 2018

9 (3,474 )

K.Thendral, Dr.S.Chitrakala, S.P.Surendernath   ABSTRACT: Mining social emotions deals with a new aspect for categorizing the document based on the emotions such as happy, sad, sympathy, etc., theyhelp online users to select related documents based on their emotional preferences. Aiming to find the connections between social emotions and affect terms and thus predict the social feeling from text content mechanically. Joint emotion-topic model by ...

Click here to read more arrow

Literature Review of the Industrial Wireless

04 Apr 2018

8 (2,850 )

Industrial wireless infrastructure goes beyond a hand full of WSN in the field sending back information to a localised host system, the broader picture of a truly industrial wireless infrastructure envisages a system where the entire oil and gas facility is integrated wirelessly and all arms of the organisation can wirelessly access data from approved wireless devices from any location in the world. This provides a ...

Click here to read more arrow

Optimization of Benchmark Functions using VTS-ABC Algorithm

04 Apr 2018

9 (3,575 )

Performance Optimization of Benchmark Functions using VTS-ABC Algorithm Twinkle Gupta and Dharmender Kumar Abstract- A new variant based on tournament selection called VTS-ABC algorithm is provided in this paper. Its performance is compared with standard ABC algorithm with different size of data on several Benchmark functions and results show that VTS-ABC provides better quality of solution than original ABC algorithm in every case. Keywords— Artificial Bee Colony ...

Click here to read more arrow

Performance Analysis of Reusable Software Systems

04 Apr 2018

9 (3,383 )

Monika Kalotra Dr. Kuljit Kaur   Abstract: To improve the quality of software system, there is a need to eliminate or reduce the rework. Software reuse is one of the solution proposed for it. Software reuse involves reuse of existing software modules, also called reusable software components, while creating new software systems. In the context of software reuse, it is important to evaluate the ...

Click here to read more arrow

Ensuring All Stages Pipelining and Accuracy in PASQUAL

04 Apr 2018

7 (2,642 )

Nachiket D. More Abstract GENOME is term used for genetic material of organism. It is used to encode DNA of organisms, or RNA of various kinds of viruses. Ii contains both coding and non coding parts of DNA/RNA. Now a day’s GENOME is constructed for mostly all animals, viruses, and bacteria’s. These data is mostly used in medical research and as well as to predict disease ...

Click here to read more arrow

Comparative Study of 6T and 8T SRAM Using Tanner Tool

04 Apr 2018

6 (2,069 )

Rajnarayan Sharma, Ravi Antil, Jonish Abstract— in this paper we focus on the dynamic power dissipation during the Write operation in CMOS SRAM cell. The charging and discharging of bit lines consume more power during the Write “1” and Write “0” operation. 8T SRAM cell includes two more trail transistors in the pull down path for proper charging and discharging the bit lines. ...

Click here to read more arrow

Increasing Time Efficiency of Insertion Sort

04 Apr 2018

9 (3,238 )

Increasing Time Efficiency of Insertion Sort for the Worst Case Scenario Surabhi Patel, Moirangthem Dennis Singh   Abstract. Insertion sort gives us a time complexity of O(n) for the best case. In the worst case where the input is in the descending order fashion, the time complexity is O(n2). In the case of arrays, shifting is taking O(n2) while in the case of linked ...

Click here to read more arrow

Review on Video Steganography Technique

04 Apr 2018

8 (3,009 )

Kamred Udham Singh Abstract In the era of information security, Steganography is a most secure method, used for concealing existence of secret data in any digital cover object such as image, audio, video and text files. In the last several decades broad research has been done on image steganography technique due to their easiness of data embedding and data extraction. Hide the existence of ...

Click here to read more arrow

Detailed Accessibility & Optimization Positioning Analyzer

04 Apr 2018

4 (1,334 )

Abstract Our application interface provides interesting and vital stats, such as the total number of backlinks (including the type: text, image, redirects, etc.), unique domains and distinct referring IPs and subnets. Software is an essential tool for in research, analysis and management. It uses its own bot and its own index, which they state is based on information from hundreds of billions website connections. SERP listings ...

Click here to read more arrow

GPU-Accelerated Impact Maximization in Professional Networks

04 Apr 2018

8 (2,987 )

GPU-Accelerated Impact Maximization in Large-Scale Professional Networks Dr. M. Rajasekhara, Babu B. V. Arunragavan   Abstract Impact Maximization means to discover the top-K fascinating people to expand the impact spread inside a professional networks, which remains important yet difficult issue. Turned out to be NP-hard, the impact expansion issue pulls in gigantic studies. In spite of the fact that there exist fundamental eager calculations which may ...

Click here to read more arrow

Analyzing of Economic Data Using Big Data

04 Apr 2018

5 (1,820 )

N.Rajanikumar, Dr.A.Suresh babu, Mr.G.Murali   Abstract: Big data can help at the e commerce data. The big-picture problems, the economic indicator many investors, business fortunate and judges are rely on are just too outdated by the time they’re out. People “pitch to the number,” but the world has often moved since it was considered and they won’t know it until the next report comes ...

Click here to read more arrow

Review on Micro-climate Changer with Sensor Broadcasted Data

04 Apr 2018

6 (2,108 )

Prof. Vikas Nandgaonkar, Prof.Prashant Dongare Pratap Madane, Priyanka Rasal,Aniket Shilimkar, Vaibhav Waghmode Abstract : micro-environment changer using sensor broadcasted data gives human centric context ( e.g indoor, outdoor, at home/in office, driving/walking)have been extensively researched, few attempts have studied from phones perspective(e.g. on table/sofa, in pocket/bag/hand). We refer to such immediate surroundings as micro-environment, usually several to a dozen of centimeters, around a phone ...

Click here to read more arrow

Mobile Computing with WirelessLAN and its Modes

04 Apr 2018

6 (2,362 )

Mobile computing with WirelessLAN And its modes Ad hoc network with challenges Pallavi D. Dudhe, Prof. P. L. Ramteke   Abstract - In this paper, we summarized Mobile computing with WirelessLAN and its modes Ad hoc network and infrastructure. We define the operational model of our mobile computing environment, where we plan to demonstrate our proposed solutions. Mobile cloud computing is the combination of ...

Click here to read more arrow

Process of Embedding Fuzzy Logic Methodology In Racing Game

04 Apr 2018

4 (1,544 )

Alamin Hussain Key words: fuzzy logic, XNA, AI, racing game ABSTRACT Fuzzy Logic has many opinions and understanding from people to people. In its simplest understanding Fuzzy Logic outputs truth(s) based on approximation for reasoning. In essence compared to traditional binary sets, which outputs absolute truths or false values, Fuzzy Logic may have a false or truth-value which ranges in degrees from 0 to ...

Click here to read more arrow

Evolution of Server-side Technologies

04 Apr 2018

9 (3,425 )

Chris Avgerinos Introduction A fundamental change has been occurring for the last fifteen years in the way people write computer programs. Scripting languages such as Perl and Tcl replaced the system programming languages such as C and C++. There are tremendous differences between the languages due to the fact that scripting languages were designed for completely different tasks than system programming languages. The main ...

Click here to read more arrow

Control on Remote Sensing Network Using Cloud Computing

04 Apr 2018

10 (3,775 )

CHAPTER 3 SYSTEM REQUIREMENTS The system requirements usually specify the needs of the system to accomplish the project successfully and the requirements can be classified as software and hardware requirements and hence the requirement specification of this project is as mentioned below. 3.1 Software Requirements Express PCB and express schematic Keil micro-vision 3 real view IDE Flash utility software for programming Embedded C JDK Visual ...

Click here to read more arrow

Design of an Interactive Graphics Framework

04 Apr 2018

7 (2,431 )

Design of an Interactive Graphics Framework to Instruct Students on Computer Architecture & Hardware Literature Review: The curriculum recommended by the ACM/IEEE-CS joint task force and documented in the computing curricula (ACM, 2013) defines a body of knowledge incorporating a wide variety of core topics one of which is computer architecture. Many of the topic areas within the body of knowledge are abstracted from a specific ...

Click here to read more arrow

Development of an Online Crime Management System (OCMS)

04 Apr 2018

7 (2,736 )

Case study of the Nigerian Police Force OYEKUNLE OYEBOLA COMFORT   Abstract The aim of this project and implementation is to develop interactive online crime management system which is easily accessible to the public taking a cognizance of the Nigeria Police Force crime management approach. The accessibility of the public is to complain or even report a crime to the police stations is relatively ...

Click here to read more arrow

Real Time Motion Detection Using Dynamic Camera

04 Apr 2018

5 (1,811 )

Abstract— nowadays, security of valuable and secret assets is very important for large organisation companies. Due to limitation of human resources and man power we need an efficient and reliable security system. To overcome this limitations and errors we will implement high level surveillance system for security. In our system, we will use dynamic camera for video surveillance which will feed video stream to system. System ...

Click here to read more arrow

Subscriber System using Identity-Based Encryption

04 Apr 2018

5 (1,683 )

Secure Message Transmission to the Publisher   Vivek Sharma INTRODUCTION The major mechanism regarding to the Publish-Subscribe based system are security, confidentiality, scalability and authentication. Publish-Subscribe system can be classified into two groups like as Type based and Content based message transmission. The publish-subscribe system is facing difficulties regarding Authentication just because of their Loose coupling nature. Content based routing face the difficulties in ...

Click here to read more arrow

Analysis Diabetes Mellitus on Complications with Data Mining

04 Apr 2018

7 (2,477 )

M. Mayilvaganan T.Sivaranjani Abstract: Diabetes mellitus is incredible growing and seems to be emerging as a main public health problem for our country.The prevalence of diabetes is rapidly increasing all over the world. Data mining provides more no of tools and techniques that can be applied to this processed data to discover hidden patterns. It is used to provide healthcare professionals an additional ...

Click here to read more arrow

Adopting MapReduce and Hummingbird for Information Retrieval

03 Apr 2018

8 (3,043 )

Adopting MapReduce and Hummingbird for Information Retrieval in dedicated cloud Environment Dr. Piyush Gupta Chandelkar Kashinath K.   Abstract: Data collected in section 3 indicated the number of active internet users across the globe. The collected chunks of information termed as Big Data not only utilizes physical resources into the network, ...

Click here to read more arrow

Enhancements of IC Engines in Real-world Conditions

03 Apr 2018

5 (1,915 )

 Aatif Shaik, Aditya Upadhyaya R, Gowtham, K N, & Sachin B N Abstract – Optimizing engine performance of IC Engines is a very shady field. Other than reputed companies & Original Equipment Manufacturers (OEMs), who publish their reports, the rest of the industry does not throw much light into aftermarket modification field. As an end-user, a customer wanting to optimize his vehicle in terms of power, mileage ...

Click here to read more arrow

Secure Encounter-based Mobile Social Networks

03 Apr 2018

3 (1,165 )

ABSTRACT: Encounter-based social networks and encounter-based systems link users who share a location at the same time, as opposed to the traditional social network paradigm of linking users who have an offline friendship. This new approach presents challenges that are fundamentally different from those tackled by previous social network designs. In this paper, we explore the functional and security requirements for these new systems, such as ...

Click here to read more arrow

A Multi OBS: Framework for Cloud Brokerage Services

03 Apr 2018

6 (2,187 )

Dr. J. Akilandeswari C.Sushanth ABSTRACT Cloud computing is one of major dynamically evolving area which provides business agencies to extend their process across the globe. Cloud broker mediates between cloud service provider and cloud consumers through API. Initially, cloud user submits the specification to the cloud broker and desires for the best cloud provider. Request from cloud users are processed by the cloud broker ...

Click here to read more arrow

Network Management System: Light Weight SNMP Implementation

03 Apr 2018

9 (3,206 )

Chapter 6 Implementation Initially the Java (JDK 1.6) and Netbeans IDE 5.4 should be installed in a system. Then the SNMP4J API should be added to the Netbeans library. The Mysql-JDBC sever should be added to the library for using the database purpose. Then the SNMP is tested in the same system for working condition, afterwards the destination devices are enabled with SNMP agent ...

Click here to read more arrow

A Review on Client Side Load Balancing

03 Apr 2018

7 (2,632 )

Prof. Vikas Nandgaonkar, Prof.Prashant Dongare Harshal Mahajan, Awadhoot Lele, Akshay Gaikwad Abstract : Load balancing is an important issue while managing server resources in a cloud environment. The concept behind load balancing is to manage server load which includes number of resources like avaliable RAM,CPU bandwisth, etc as well as to manage incoming request on the server. In cloud environment, it is important that ...

Click here to read more arrow

VDEC Based Data Extraction and Clustering Approach

03 Apr 2018

14 (5,282 )

This chapter describes in details the proposed VDEC Approach. It discusses the two phases of the VDEC process for Data Extraction and clustering. Experimental performance evaluation results are shown in the last section in comparing the GDS and SDS datasets. INTRODUCTION Extracting data records on the response pages returned from web databases or search engines is a challenge posed in information retrieval. Traditional web ...

Click here to read more arrow

Secure Barcode Authentication using Genetic Algorithm

03 Apr 2018

11 (4,376 )

Dr. Poornima G. Naik Mr. Girish R. Naik   Abstract— Genetic Algorithm (GA) is an invaluable tool for solving optimization problems due to its robustness. It does not break even if the inputs are changed slightly or in the presence of a reasonable noise. GA offers significant benefits over other optimization techniques in searching a large state space or n-dimensional surface. In todays information ...

Click here to read more arrow

Information Filtering System Based on Clustering Approach

03 Apr 2018

8 (3,015 )

A PRIVATE NEIGHBOURHOOD BASED INFORMATION FILTERING SYSTEM BASED ON CLUSTERING APPROACH ABSTRACT The quantity of web information has been increased day by day due to fast development of internet. Now-a-days people make their decision based on the available information from the internet. But the problem is how the people successfully choose or filter the useful information from the enormous amount of information. This problem is referred ...

Click here to read more arrow

Review Paper on Fault Tolerance in Cloud Computing

03 Apr 2018

11 (4,284 )

A REVIEW PAPER ON FAULT TOLERANCE IN CLOUD COMPUTING Deepali Mittal Ms. Neha Agarwal   Abstract— Cloud computing demand is increasing due to which it is important to provide correct services in the presence of faults also. The Resources in cloud computing can be dynamically scaled that too in a cost effective manner. Fault Tolerance is the process of finding faults and failures in ...

Click here to read more arrow

Authentication Mechanism for Fast Handover PMIPv6 Networks

03 Apr 2018

7 (2,749 )

N.S.Nandhinee S.Kayalvizhi   Abstract—The Internet Engineering Task Force (IETF) proposed a host-based mobility management protocol, called Mobile IPv6 (MIPv6) protocol for mobile nodes (MNs) to maintain continuous service when they move among different foreign networks. However, Mobile IPv6 does not provide good service for real-time applications because it causes longer disruptions when the handoff takes place. Recently, the IETF NETLMM working group developed a ...

Click here to read more arrow

Intrusion Detection System Using Node-Predictive Attack

03 Apr 2018

7 (2,691 )

Intrusion Detection System Using Node-Predictive Attack Graph Model for Cloud Ambikavathi C Dr.S.K.Srivatsa Abstract- The role of Intrusion Detection System (IDS) in security world is considered as a key requirement for any computing model. This traditional methodology can add its own contribution of security to the distributed Cloud environment. The purpose of this paper is to clarify the steps that are needed to be ...

Click here to read more arrow

Speaker Recognition System & Pattern Classification

03 Apr 2018

8 (3,046 )

A Study on Speaker Recognition System and Pattern classification Techniques Dr E.Chandra, K.Manikandan, M.S.Kalaivani   Abstract Speaker Recognition is the process of identifying a person through his/her voice signals or speech waves. Pattern classification plays a vital role in speaker recognition. Pattern classification is the process of grouping the patterns, which are sharing the same set of properties. This paper deals with speaker recognition system and over view ...

Click here to read more arrow

Resource Sharing Platform for Collaborative Cloud Computing

03 Apr 2018

8 (2,975 )

Harmonious resource sharing platform for collaborative cloud computing System Design SYSTEM DESIGN The system design is the architecture definition process, components, modules, interfaces and data to a system to meet the specified requirements. The system design could be considered the application of systems theory to product development . 4.1 Functional Design Utilitarian outline is utilized to streamline the configuration of equipment gadgets and programming useful configuration ...

Click here to read more arrow

PL/SQL Code Restructure With Structural Resemblance Measure

03 Apr 2018

7 (2,679 )

Abstract Database design is a challenging and complex task due to its importance in the overall performance of the database system. Recently, various techniques have been under use across different stages of database application modelling, design and implementation and they have been under continuous study and improvements by various researchers. However, the existing techniques are not providing effective guidelines for optimal database design. Hence, this research ...

Click here to read more arrow

Implementation Factor Affecting E-governance in Uttarakhan

03 Apr 2018

11 (4,314 )

Jitender Kumar Sehgal, Dr. Priti Dimri, Krishna Nand Rastogi   Abstract e-Governance is the utilization of Internet and the world wide web for delivering government Information and services to the citizens and the other organizations. Uttarakhand is one of the leading states in implementation of e-Governance but still there are lot of challenges in effective and efficient implementation at rural level or hilly ...

Click here to read more arrow

Context Inference from Social Networks

03 Apr 2018

8 (2,816 )

Context Inference from Social Networks: A Tie Strength Based Approach Sneha Kamal Reshmi.S   Abstract— All online sharing systems gather data that reflects user’s behavior and their shared activities. Relationship degree between two users is varying continuously. Static friend list in the social network is unable to express it completely. Tie strength is used to quantitatively describe real social relations. It is based on ...

Click here to read more arrow
Get in Touch With us

Get in touch with our dedicated team to discuss about your requirements in detail. We are here to help you our best in any way. If you are unsure about what you exactly need, please complete the short enquiry form below and we will get back to you with quote as soon as possible.