Determining Attributes to Maximize Visibility of Objects

09 Apr 2018

7 (2,686 )

A Critique on Determining Attributes to Maximize Visibility of Objects Muhammed Miah Gautam Das Vagelis Hristidis Heikki Mannila Vidisha H. Shah 1. Summary of the published work Das, Hristidis, and Mannila (2009, p. 959) discussed about the ranking function and top k retrieval algorithms that helps user (potential buyers to search for the required product from the available catalog. The problem is how a user (potential ...

Click here to read more arrow

Database System Development Exam

09 Apr 2018

9 (3,548 )

Adam Warsame Course: FDSc Computing Module Title: Database Systems Assignment Title: Database Systems Assessment     Introduction The task for this assignment is to develop a database for a local garden centre. To understand the system better and what way it should operate; it was a good idea to review other examples of databases online. From these reviewed examples, was able to gather a rough understanding ...

Click here to read more arrow

Winds of Change: From Vendor Lock-in to the Meta Cloud

09 Apr 2018

4 (1,394 )

Introduction: A software requirement specification is a complete explanation of the system that is to be created. Software requirement specification includes non-functional and functional requirements. Use case technique can be used in prepared to identify the functional requirements of the software inventions. Non-functional requirements are requirements which force constraints on the implementation and design. As systems grew more complex, it becomes more apparent that the goal ...

Click here to read more arrow

Survey on Spatial Database Systems

09 Apr 2018

4 (1,525 )

 Abstract—In this survey, the term of “spatial database”, its data models, its data types with implementations, and its management techniques are described with providing at least spatial join methods. Also the storage and query processing algorithms for such databases are surveyed. (Abstract section will be updated with final report) 1.Introduction Various fields need various data types such as character, number, date, time, and image ...

Click here to read more arrow

Reducing Communication and Processing Overhead

09 Apr 2018

7 (2,792 )

RACE: Reducing Communication And Processing Overhead And Ensuring Security Milu Sayed Liyamol Aliyar   Abstract— RACE, Report based payment scheme for multi-hop wireless network. Race is a secure incentive protocol which used for the multi-hop wireless network, helps packet transmission and enforce fairness. The protocol uses the concept of evidences and the regularity of the nodes. The trusted party evaluates the nodes competence and ...

Click here to read more arrow

OpenMP Based Fast Data Searching with Multithreading

09 Apr 2018

8 (2,826 )

V.Karthikeyan, Dr. S.Ravi and S.Flora Magdalene   Abstract The multiprocessor cores with multithreaded capability are continuing to gain a significant share and offer high performance. The use of OpenMP applications on two parallel architectures can identify architectural bottlenecks and introduces high level of resource sharing in multithreading performance complications. An adaptive run-time mechanism provides additional but limited performance improvements on multithreading and is maximized the efficiency of ...

Click here to read more arrow

Email Protocol: SMTP, POP, and MIME

05 Apr 2018

6 (2,386 )

Email protocol governs the interactions between email clients and servers. An Email protocol is a standard method which is used at each end of a communication channel either server side or client side, in order to transmit information properly. User is required to use a mail client to access to the mail server, by using variety of email protocols, the mail client and server can only ...

Click here to read more arrow

Analysis of Tools for Data Cleaning and Quality Management

05 Apr 2018

5 (1,604 )

Data cleaning is needed in process of combining heterogeneous data sources with relation or tables in databases. Data cleaning or data cleansing or data scrubbing is defined as removing and detecting errors along with ambiguities existing in files, log tables. It is done with the aim to improve quality of data. Data quality and data cleaning are both related terms. Both are directly proportional to each ...

Click here to read more arrow

Improving Resource Allocation for Data Center Overbooking

05 Apr 2018

7 (2,637 )

M.Ponmani Bharathi, C.Sindhuja, S.Vaishnavi, Ms.A.Judith Arockia Gladies Abstract Overbooking becomes feasible because user applications tend to overestimate their resources and requirements, that tends to utilize only a fraction of the allocated resources. Overbooking has to be carefully planned in order not to impact application performance. Resource utilization and Data centres utilization can be used in this overbooking scheduler. Data send can send from ...

Click here to read more arrow

System to Filter Unwanted Messages from OSN User Walls

05 Apr 2018

9 (3,247 )

M.Renuga Devi, G.Seetha lakshmi, M.Sarmila Abstract—One fundamental issue in today’s Online Social Networks (OSNs) is to give users the ability to control the messages posted on their own private space to avoid that unwanted content is displayed. Up to now, OSNs provide little support to this requirement. To fill the gap, in this paper, we propose a system allowing OSN users to have a ...

Click here to read more arrow

Acoustic Cryptanalysis of RSA and Its Counter Measure

05 Apr 2018

6 (2,362 )

Prof. J P Agrawal Saurabh Sharma Siddharth Gupta ABSTRACT Acoustics has come up as a new vulnerability in the field of information security. The RSA encryption algorithm, although h very hard to break mathematically, has been broken recently by using acoustics and power analysis of emanations. Acoustic Cryptanalysis is the side-channel attack which targets implementations of cryptographic algorithms. The cryptographic algorithms are quite secure ...

Click here to read more arrow

Smart Prepaid Energy Meter Using GSM Module

05 Apr 2018

8 (2,810 )

KISHORE KUMAR K   GAYATHRI N   RAJESH KUMAR V T   Abstract This paper aims at proposing a system that reduces the power loss and power theft due to illegal activities. This framework embraces another strategy known as "prepaid power". The GSM module is utilized so that ...

Click here to read more arrow

Techniques for Understanding Human Walking Motion

05 Apr 2018

5 (1,636 )

  Introduction Multimedia is a term that collectively describes a variety of media content available in various forms of text, speech, audio, still images, video, animation, graphics, 3D models and combinations of them used to capture real time moments. Over the recent years the technological advances have enabled wide availability and easy access of multimedia content and much research was dedicated to perform automated computational tasks ...

Click here to read more arrow

Vulnerability Assessment and Penetration Testing Comparison

05 Apr 2018

6 (2,061 )

Jignesh C Doshi Bhushan Trivedi ABSTRACT Business using internet has grown drastically in past decade. Attacks on web application have increased. Web application security is a big challenge for any organizations as result of increasing attacks. There exists different approaches to mitigate various security risks are defensive coding, hardening (Firewall), Monitoring and auditing. This solutions found more towards prevention of attacks or of monitoring types ...

Click here to read more arrow

Smartphone Operating Systems: Evaluation & Enhancements

05 Apr 2018

10 (3,688 )

Muneer Ahmad Dar Javed Parvez Abstract—The increasing number of mobile operating systems that operates the small hand held devices called the Smartphone, has become integral part of our lives. The openness of these new environments has lead to new domain of apps and markets and has enabled greater integration with existing online services like e-banking etc. Smartphone makers are competing in turns to trump ...

Click here to read more arrow

Concepts and Research into Green Networking

05 Apr 2018

6 (2,263 )

Green Networking Abstract: Saving of excessive energy consumption is becoming a key concern in networking, because of theprobable economical benefits. These concerns, usually argued to as “green networking”, relate to inserting energy-awareness in the strategy, in the devicesand in the protocols of networks. In this work, I first formulate a more precise definition of the “green” attribute. I further more classify a few standards that are ...

Click here to read more arrow

Load Balancing as an Optimization Problem: GSO Solution

05 Apr 2018

6 (2,358 )

METHODOLOGY INTRODUCTION In this chapter, we presented a novel methodology which considers load balancing as an optimization problem. A stochastic approach, Glowworm swarm optimization (GSO) is employed to solve the above mentioned optimization problem. In the proposed method, excellent features of various existing load balancing algorithms as discussed chapter 2 are also integrated. PROPOSED METHODOLOGY There are numerous cloud computing categories. ...

Click here to read more arrow

Automatic Metadata Harvesting From Digital Content

05 Apr 2018

5 (1,614 )

MR. RUSHABH D. DOSHI, MR. GIRISH H MULCHANDANI Abstract: Metadata Extraction is one of the predominant research fields in information retrieval. Metadata is used to references information resources. Most metadata extraction systems are still human intensive since they require expert decision to recognize relevant metadata but this is time consuming. However automatic metadata extraction techniques are developed but mostly works with structured format. We proposed ...

Click here to read more arrow

Proficient Key Tree Structure for Secure Dynamic Groups

05 Apr 2018

6 (2,400 )

Secure Group Communication ensures forward secrecy and backward secrecy of the data. It is the responsibility of the Group Center (GC) to disallow new members to have access to previous data called backward secrecy and existing members who have left the group to have further access to data called forward secrecy. Forward and backward secrecy can be ensured by updating the keys whenever a join/leave request ...

Click here to read more arrow

Information Security Management Plan

05 Apr 2018

4 (1,456 )

Cyber security is about protecting your computer-based equipment and information from unintended or unauthorised access, change, theft or destruction HM Governement (2015), you can manage the risks by Planning, Implementing and Reviewing your Information Security Management System. The following are the key points of Information and Security Management Plan. Risk Assessment and Analysis - The company should assess the security risks or damages that could be ...

Click here to read more arrow

Stages of Alzheimer's Utilizing Machine Learning Techniques

05 Apr 2018

5 (1,835 )

Abstract: Alzheimer’s disease (AD) is the general type of dementia that affects the elderly population globally. An accurate and early diagnosis of Alzheimer is crucial for the treatment of patients suffering from AD. In this paper, two different classifiers, SVM (Support Vector Machine) and an ANFIS (Adaptive Neuro Fuzzy Inference System) have been employed to classify patients between AD control, mild control and normal control. The ...

Click here to read more arrow

Symmetric Key Utilized for EasySMS Convention

05 Apr 2018

4 (1,552 )

Conceptual SMS (Short Message Service) is a generally utilized correspondence between the end clients. SMS is being utilized as a part of our diverse applications. The Short Message Service (SMS) normally whatever we trade the first configuration, now and then we used to send the some mystery message like our email secret word, pass code and bank watchword. We send SMS is in unique organization, our customary SMS ...

Click here to read more arrow

Mutation Testing by Using Formal Method

04 Apr 2018

9 (3,575 )

Jaspreet Singh Abstract Mutation testing was introduced in 1970’s in the field of software testing as a process of testing the test suites by intentionally seeding errors i.e. mutation operators, into the original program’s source code. Its main purpose is to verify the functionality of the test cases which are executed with the aim of catching the variations between the program and the mutants. ...

Click here to read more arrow

Heterogeneous Wireless Sensor Networks (HWSN) Management

04 Apr 2018

9 (3,482 )

A Key Management & Establishment Scheme in Heterogeneous Wireless Sensor Networks (HWSN) Premamayudu B, Venkata rao K, and Suresh Varma P   Abstract: Key management is the one of the fundamental requirement for securing the hierarchical wireless sensor networks (HWSN) and also prevents adversarial activities. This paper presents a new pairwise key management scheme using matrix for HWSNs. In HWSN, cluster headers are more ...

Click here to read more arrow

Skew Detection of Devanagari Script Using Pixels

04 Apr 2018

9 (3,372 )

Skew Detection of Devanagari Script Using Pixels of Axes-Parallel Rectangle and Linear Regression Trupti A. Jundale Ravindra S. Hegadi   Abstract—Skew detection and correction of handwritten data is one of the difficult tasks in pattern recognition area. Here we illustrate the method for skew detection and correction of Devanagari handwritten script. The proposed approach works for single skew. The input images for this research ...

Click here to read more arrow

Efficient Database Driven Reverse Mapping Dictionary

04 Apr 2018

6 (2,312 )

Building an Efficient Database Driven Reverse Mapping Dictionary ABSTRACT With the enormous availability of words in usage it is always being a challenge to find the meaning. Even the versatile speaker may thrash about finding a meaning for certain unheard words. In such cases they need some source for reference like dictionary. In traditional model for using dictionary, forward concept is implemented where it result in ...

Click here to read more arrow

Asynchronous JavaScript and XML (AJAX)

04 Apr 2018

8 (3,049 )

Anjan Thapaliya Abstract AJAX stands for Asynchronous JavaScript and XML. It is a web technology that evolved in early 2000 and uses a mix of technology like JavaScript and XML. This paper discusses about how AJAX technology works in modern web application and various advantages and disadvantages. This paper also discusses about various frameworks available for AJAX that can be used on different platforms. ...

Click here to read more arrow

Emotion Recognition System for Affective Text

04 Apr 2018

9 (3,474 )

K.Thendral, Dr.S.Chitrakala, S.P.Surendernath   ABSTRACT: Mining social emotions deals with a new aspect for categorizing the document based on the emotions such as happy, sad, sympathy, etc., theyhelp online users to select related documents based on their emotional preferences. Aiming to find the connections between social emotions and affect terms and thus predict the social feeling from text content mechanically. Joint emotion-topic model by ...

Click here to read more arrow

Literature Review of the Industrial Wireless

04 Apr 2018

8 (2,850 )

Industrial wireless infrastructure goes beyond a hand full of WSN in the field sending back information to a localised host system, the broader picture of a truly industrial wireless infrastructure envisages a system where the entire oil and gas facility is integrated wirelessly and all arms of the organisation can wirelessly access data from approved wireless devices from any location in the world. This provides a ...

Click here to read more arrow

Optimization of Benchmark Functions using VTS-ABC Algorithm

04 Apr 2018

9 (3,575 )

Performance Optimization of Benchmark Functions using VTS-ABC Algorithm Twinkle Gupta and Dharmender Kumar Abstract- A new variant based on tournament selection called VTS-ABC algorithm is provided in this paper. Its performance is compared with standard ABC algorithm with different size of data on several Benchmark functions and results show that VTS-ABC provides better quality of solution than original ABC algorithm in every case. Keywords— Artificial Bee Colony ...

Click here to read more arrow

Performance Analysis of Reusable Software Systems

04 Apr 2018

9 (3,383 )

Monika Kalotra Dr. Kuljit Kaur   Abstract: To improve the quality of software system, there is a need to eliminate or reduce the rework. Software reuse is one of the solution proposed for it. Software reuse involves reuse of existing software modules, also called reusable software components, while creating new software systems. In the context of software reuse, it is important to evaluate the ...

Click here to read more arrow

Ensuring All Stages Pipelining and Accuracy in PASQUAL

04 Apr 2018

7 (2,642 )

Nachiket D. More Abstract GENOME is term used for genetic material of organism. It is used to encode DNA of organisms, or RNA of various kinds of viruses. Ii contains both coding and non coding parts of DNA/RNA. Now a day’s GENOME is constructed for mostly all animals, viruses, and bacteria’s. These data is mostly used in medical research and as well as to predict disease ...

Click here to read more arrow

Comparative Study of 6T and 8T SRAM Using Tanner Tool

04 Apr 2018

6 (2,069 )

Rajnarayan Sharma, Ravi Antil, Jonish Abstract— in this paper we focus on the dynamic power dissipation during the Write operation in CMOS SRAM cell. The charging and discharging of bit lines consume more power during the Write “1” and Write “0” operation. 8T SRAM cell includes two more trail transistors in the pull down path for proper charging and discharging the bit lines. ...

Click here to read more arrow

Increasing Time Efficiency of Insertion Sort

04 Apr 2018

9 (3,238 )

Increasing Time Efficiency of Insertion Sort for the Worst Case Scenario Surabhi Patel, Moirangthem Dennis Singh   Abstract. Insertion sort gives us a time complexity of O(n) for the best case. In the worst case where the input is in the descending order fashion, the time complexity is O(n2). In the case of arrays, shifting is taking O(n2) while in the case of linked ...

Click here to read more arrow

Review on Video Steganography Technique

04 Apr 2018

8 (3,009 )

Kamred Udham Singh Abstract In the era of information security, Steganography is a most secure method, used for concealing existence of secret data in any digital cover object such as image, audio, video and text files. In the last several decades broad research has been done on image steganography technique due to their easiness of data embedding and data extraction. Hide the existence of ...

Click here to read more arrow

Detailed Accessibility & Optimization Positioning Analyzer

04 Apr 2018

4 (1,334 )

Abstract Our application interface provides interesting and vital stats, such as the total number of backlinks (including the type: text, image, redirects, etc.), unique domains and distinct referring IPs and subnets. Software is an essential tool for in research, analysis and management. It uses its own bot and its own index, which they state is based on information from hundreds of billions website connections. SERP listings ...

Click here to read more arrow

GPU-Accelerated Impact Maximization in Professional Networks

04 Apr 2018

8 (2,987 )

GPU-Accelerated Impact Maximization in Large-Scale Professional Networks Dr. M. Rajasekhara, Babu B. V. Arunragavan   Abstract Impact Maximization means to discover the top-K fascinating people to expand the impact spread inside a professional networks, which remains important yet difficult issue. Turned out to be NP-hard, the impact expansion issue pulls in gigantic studies. In spite of the fact that there exist fundamental eager calculations which may ...

Click here to read more arrow

Analyzing of Economic Data Using Big Data

04 Apr 2018

5 (1,820 )

N.Rajanikumar, Dr.A.Suresh babu, Mr.G.Murali   Abstract: Big data can help at the e commerce data. The big-picture problems, the economic indicator many investors, business fortunate and judges are rely on are just too outdated by the time they’re out. People “pitch to the number,” but the world has often moved since it was considered and they won’t know it until the next report comes ...

Click here to read more arrow

Review on Micro-climate Changer with Sensor Broadcasted Data

04 Apr 2018

6 (2,108 )

Prof. Vikas Nandgaonkar, Prof.Prashant Dongare Pratap Madane, Priyanka Rasal,Aniket Shilimkar, Vaibhav Waghmode Abstract : micro-environment changer using sensor broadcasted data gives human centric context ( e.g indoor, outdoor, at home/in office, driving/walking)have been extensively researched, few attempts have studied from phones perspective(e.g. on table/sofa, in pocket/bag/hand). We refer to such immediate surroundings as micro-environment, usually several to a dozen of centimeters, around a phone ...

Click here to read more arrow

Mobile Computing with WirelessLAN and its Modes

04 Apr 2018

6 (2,362 )

Mobile computing with WirelessLAN And its modes Ad hoc network with challenges Pallavi D. Dudhe, Prof. P. L. Ramteke   Abstract - In this paper, we summarized Mobile computing with WirelessLAN and its modes Ad hoc network and infrastructure. We define the operational model of our mobile computing environment, where we plan to demonstrate our proposed solutions. Mobile cloud computing is the combination of ...

Click here to read more arrow

Process of Embedding Fuzzy Logic Methodology In Racing Game

04 Apr 2018

4 (1,544 )

Alamin Hussain Key words: fuzzy logic, XNA, AI, racing game ABSTRACT Fuzzy Logic has many opinions and understanding from people to people. In its simplest understanding Fuzzy Logic outputs truth(s) based on approximation for reasoning. In essence compared to traditional binary sets, which outputs absolute truths or false values, Fuzzy Logic may have a false or truth-value which ranges in degrees from 0 to ...

Click here to read more arrow

Evolution of Server-side Technologies

04 Apr 2018

9 (3,425 )

Chris Avgerinos Introduction A fundamental change has been occurring for the last fifteen years in the way people write computer programs. Scripting languages such as Perl and Tcl replaced the system programming languages such as C and C++. There are tremendous differences between the languages due to the fact that scripting languages were designed for completely different tasks than system programming languages. The main ...

Click here to read more arrow

Control on Remote Sensing Network Using Cloud Computing

04 Apr 2018

10 (3,775 )

CHAPTER 3 SYSTEM REQUIREMENTS The system requirements usually specify the needs of the system to accomplish the project successfully and the requirements can be classified as software and hardware requirements and hence the requirement specification of this project is as mentioned below. 3.1 Software Requirements Express PCB and express schematic Keil micro-vision 3 real view IDE Flash utility software for programming Embedded C JDK Visual ...

Click here to read more arrow

Design of an Interactive Graphics Framework

04 Apr 2018

7 (2,431 )

Design of an Interactive Graphics Framework to Instruct Students on Computer Architecture & Hardware Literature Review: The curriculum recommended by the ACM/IEEE-CS joint task force and documented in the computing curricula (ACM, 2013) defines a body of knowledge incorporating a wide variety of core topics one of which is computer architecture. Many of the topic areas within the body of knowledge are abstracted from a specific ...

Click here to read more arrow

Development of an Online Crime Management System (OCMS)

04 Apr 2018

7 (2,736 )

Case study of the Nigerian Police Force OYEKUNLE OYEBOLA COMFORT   Abstract The aim of this project and implementation is to develop interactive online crime management system which is easily accessible to the public taking a cognizance of the Nigeria Police Force crime management approach. The accessibility of the public is to complain or even report a crime to the police stations is relatively ...

Click here to read more arrow

Real Time Motion Detection Using Dynamic Camera

04 Apr 2018

5 (1,811 )

Abstract— nowadays, security of valuable and secret assets is very important for large organisation companies. Due to limitation of human resources and man power we need an efficient and reliable security system. To overcome this limitations and errors we will implement high level surveillance system for security. In our system, we will use dynamic camera for video surveillance which will feed video stream to system. System ...

Click here to read more arrow

Subscriber System using Identity-Based Encryption

04 Apr 2018

5 (1,683 )

Secure Message Transmission to the Publisher   Vivek Sharma INTRODUCTION The major mechanism regarding to the Publish-Subscribe based system are security, confidentiality, scalability and authentication. Publish-Subscribe system can be classified into two groups like as Type based and Content based message transmission. The publish-subscribe system is facing difficulties regarding Authentication just because of their Loose coupling nature. Content based routing face the difficulties in ...

Click here to read more arrow

Analysis Diabetes Mellitus on Complications with Data Mining

04 Apr 2018

7 (2,477 )

M. Mayilvaganan T.Sivaranjani Abstract: Diabetes mellitus is incredible growing and seems to be emerging as a main public health problem for our country.The prevalence of diabetes is rapidly increasing all over the world. Data mining provides more no of tools and techniques that can be applied to this processed data to discover hidden patterns. It is used to provide healthcare professionals an additional ...

Click here to read more arrow

Adopting MapReduce and Hummingbird for Information Retrieval

03 Apr 2018

8 (3,043 )

Adopting MapReduce and Hummingbird for Information Retrieval in dedicated cloud Environment Dr. Piyush Gupta Chandelkar Kashinath K.   Abstract: Data collected in section 3 indicated the number of active internet users across the globe. The collected chunks of information termed as Big Data not only utilizes physical resources into the network, ...

Click here to read more arrow

Enhancements of IC Engines in Real-world Conditions

03 Apr 2018

5 (1,915 )

 Aatif Shaik, Aditya Upadhyaya R, Gowtham, K N, & Sachin B N Abstract – Optimizing engine performance of IC Engines is a very shady field. Other than reputed companies & Original Equipment Manufacturers (OEMs), who publish their reports, the rest of the industry does not throw much light into aftermarket modification field. As an end-user, a customer wanting to optimize his vehicle in terms of power, mileage ...

Click here to read more arrow

Secure Encounter-based Mobile Social Networks

03 Apr 2018

3 (1,165 )

ABSTRACT: Encounter-based social networks and encounter-based systems link users who share a location at the same time, as opposed to the traditional social network paradigm of linking users who have an offline friendship. This new approach presents challenges that are fundamentally different from those tackled by previous social network designs. In this paper, we explore the functional and security requirements for these new systems, such as ...

Click here to read more arrow

A Multi OBS: Framework for Cloud Brokerage Services

03 Apr 2018

6 (2,187 )

Dr. J. Akilandeswari C.Sushanth ABSTRACT Cloud computing is one of major dynamically evolving area which provides business agencies to extend their process across the globe. Cloud broker mediates between cloud service provider and cloud consumers through API. Initially, cloud user submits the specification to the cloud broker and desires for the best cloud provider. Request from cloud users are processed by the cloud broker ...

Click here to read more arrow

Network Management System: Light Weight SNMP Implementation

03 Apr 2018

9 (3,206 )

Chapter 6 Implementation Initially the Java (JDK 1.6) and Netbeans IDE 5.4 should be installed in a system. Then the SNMP4J API should be added to the Netbeans library. The Mysql-JDBC sever should be added to the library for using the database purpose. Then the SNMP is tested in the same system for working condition, afterwards the destination devices are enabled with SNMP agent ...

Click here to read more arrow

A Review on Client Side Load Balancing

03 Apr 2018

7 (2,632 )

Prof. Vikas Nandgaonkar, Prof.Prashant Dongare Harshal Mahajan, Awadhoot Lele, Akshay Gaikwad Abstract : Load balancing is an important issue while managing server resources in a cloud environment. The concept behind load balancing is to manage server load which includes number of resources like avaliable RAM,CPU bandwisth, etc as well as to manage incoming request on the server. In cloud environment, it is important that ...

Click here to read more arrow

VDEC Based Data Extraction and Clustering Approach

03 Apr 2018

14 (5,282 )

This chapter describes in details the proposed VDEC Approach. It discusses the two phases of the VDEC process for Data Extraction and clustering. Experimental performance evaluation results are shown in the last section in comparing the GDS and SDS datasets. INTRODUCTION Extracting data records on the response pages returned from web databases or search engines is a challenge posed in information retrieval. Traditional web ...

Click here to read more arrow

Secure Barcode Authentication using Genetic Algorithm

03 Apr 2018

11 (4,376 )

Dr. Poornima G. Naik Mr. Girish R. Naik   Abstract— Genetic Algorithm (GA) is an invaluable tool for solving optimization problems due to its robustness. It does not break even if the inputs are changed slightly or in the presence of a reasonable noise. GA offers significant benefits over other optimization techniques in searching a large state space or n-dimensional surface. In todays information ...

Click here to read more arrow

Information Filtering System Based on Clustering Approach

03 Apr 2018

8 (3,015 )

A PRIVATE NEIGHBOURHOOD BASED INFORMATION FILTERING SYSTEM BASED ON CLUSTERING APPROACH ABSTRACT The quantity of web information has been increased day by day due to fast development of internet. Now-a-days people make their decision based on the available information from the internet. But the problem is how the people successfully choose or filter the useful information from the enormous amount of information. This problem is referred ...

Click here to read more arrow

Review Paper on Fault Tolerance in Cloud Computing

03 Apr 2018

11 (4,284 )

A REVIEW PAPER ON FAULT TOLERANCE IN CLOUD COMPUTING Deepali Mittal Ms. Neha Agarwal   Abstract— Cloud computing demand is increasing due to which it is important to provide correct services in the presence of faults also. The Resources in cloud computing can be dynamically scaled that too in a cost effective manner. Fault Tolerance is the process of finding faults and failures in ...

Click here to read more arrow

Authentication Mechanism for Fast Handover PMIPv6 Networks

03 Apr 2018

7 (2,749 )

N.S.Nandhinee S.Kayalvizhi   Abstract—The Internet Engineering Task Force (IETF) proposed a host-based mobility management protocol, called Mobile IPv6 (MIPv6) protocol for mobile nodes (MNs) to maintain continuous service when they move among different foreign networks. However, Mobile IPv6 does not provide good service for real-time applications because it causes longer disruptions when the handoff takes place. Recently, the IETF NETLMM working group developed a ...

Click here to read more arrow

Intrusion Detection System Using Node-Predictive Attack

03 Apr 2018

7 (2,691 )

Intrusion Detection System Using Node-Predictive Attack Graph Model for Cloud Ambikavathi C Dr.S.K.Srivatsa Abstract- The role of Intrusion Detection System (IDS) in security world is considered as a key requirement for any computing model. This traditional methodology can add its own contribution of security to the distributed Cloud environment. The purpose of this paper is to clarify the steps that are needed to be ...

Click here to read more arrow

Speaker Recognition System & Pattern Classification

03 Apr 2018

8 (3,046 )

A Study on Speaker Recognition System and Pattern classification Techniques Dr E.Chandra, K.Manikandan, M.S.Kalaivani   Abstract Speaker Recognition is the process of identifying a person through his/her voice signals or speech waves. Pattern classification plays a vital role in speaker recognition. Pattern classification is the process of grouping the patterns, which are sharing the same set of properties. This paper deals with speaker recognition system and over view ...

Click here to read more arrow

Resource Sharing Platform for Collaborative Cloud Computing

03 Apr 2018

8 (2,975 )

Harmonious resource sharing platform for collaborative cloud computing System Design SYSTEM DESIGN The system design is the architecture definition process, components, modules, interfaces and data to a system to meet the specified requirements. The system design could be considered the application of systems theory to product development . 4.1 Functional Design Utilitarian outline is utilized to streamline the configuration of equipment gadgets and programming useful configuration ...

Click here to read more arrow

PL/SQL Code Restructure With Structural Resemblance Measure

03 Apr 2018

7 (2,679 )

Abstract Database design is a challenging and complex task due to its importance in the overall performance of the database system. Recently, various techniques have been under use across different stages of database application modelling, design and implementation and they have been under continuous study and improvements by various researchers. However, the existing techniques are not providing effective guidelines for optimal database design. Hence, this research ...

Click here to read more arrow

Implementation Factor Affecting E-governance in Uttarakhan

03 Apr 2018

11 (4,314 )

Jitender Kumar Sehgal, Dr. Priti Dimri, Krishna Nand Rastogi   Abstract e-Governance is the utilization of Internet and the world wide web for delivering government Information and services to the citizens and the other organizations. Uttarakhand is one of the leading states in implementation of e-Governance but still there are lot of challenges in effective and efficient implementation at rural level or hilly ...

Click here to read more arrow

Context Inference from Social Networks

03 Apr 2018

8 (2,816 )

Context Inference from Social Networks: A Tie Strength Based Approach Sneha Kamal Reshmi.S   Abstract— All online sharing systems gather data that reflects user’s behavior and their shared activities. Relationship degree between two users is varying continuously. Static friend list in the social network is unable to express it completely. Tie strength is used to quantitatively describe real social relations. It is based on ...

Click here to read more arrow

Cloud Computing with Machine Learning for Cancer Diagnosis

03 Apr 2018

8 (2,843 )

Cloud computing with Machine Learning could help us in the early diagnosis of breast cancer Junaid Ahmad Bhat, Prof. Vinai George and Dr. Bilal Malik   Abstract— The purpose of this study is to develop tools which could help the clinicians in the primary care hospitals with the early diagnosis of breast cancer diagnosis. Breast cancer is one of the leading forms of cancer ...

Click here to read more arrow

Code-based Plagiarism Detection Techniques

03 Apr 2018

7 (2,514 )

Biraj Upadhyaya and Dr. Samarjeet Borah   Abstract- The copying of programming assignments by students specially at the undergraduate as well as postgraduate level is a common practice. Efficient mechanisms for detecting plagiarised code is therefore needed. Text based plagiarism detection techniques do not work well with source codes. In this paper we are going to analyse a code- based plagiarism detection technique which ...

Click here to read more arrow

Big Data: Map Reduce Based Outlier Identification for Fraud

03 Apr 2018

9 (3,359 )

Big Data: Fast, Parallel Map Reduce based outlier identification for Fraud and Intrusion Detection Pooja Vijay Pawar Ann Marie Joy   Abstract One of the most challenging aspect of Big Data analytics is real time monitoring of data. Larger and larger amount of data is being collected and stored on a daily basis, thus increasing the need for quick, effective and efficient way of analysing the ...

Click here to read more arrow

Cross Layered Approach for Network Selection

03 Apr 2018

7 (2,669 )

A Cross Layered Approach for Network Selection in Heterogeneous Wireless Networks M. Deva Priya, Dr. M. L Valarmathi, D.Prithviraj   Abstract: Service delivery in a heterogeneous wireless network environment requires the selection of an optimal access network. Selection of a non-optimal network can result in undesirable effects such as higher costs or poor service experience. Consequently, network selection techniques play a vital role in ...

Click here to read more arrow

Systematisation of Catalogue Integration

03 Apr 2018

5 (1,707 )

MALATHI V   GAYATHRI N   DHARANYA P   ABSTRACT: Catalogue integration is a very essential and difficult job which needs to be carried out by various commercial portals and commerce search engines to built and consolidate the products gathered from various data providers. In this paper we ...

Click here to read more arrow

Allocation of Resources in Cloud Server Using Lopsidedness

03 Apr 2018

8 (2,819 )

B. Selvi, C. Vinola, Dr. R. Ravi Abstract– Cloud computing plays a vital role in the organizations resource management. Cloud server allows dynamic resource usage based on the customer needs. Cloud server achieves efficient allocation of resources through virtualization technology. It addresses the system that uses the virtualization technology to allocate the resources dynamically based on the demands and saves energy by optimizing the ...

Click here to read more arrow

Comprehensive Study on Big Data Technologies and Challenges

03 Apr 2018

9 (3,202 )

Abstract: Big Data is at the heart of modern science and business. Big Data has recently emerged as a new paradigm for hosting and delivering services over the Internet. It offers huge opportunities to the IT industry. Big Data has become a valuable source and mechanism for researchers to explore the value of data sets in all kinds of business scenarios and scientific investigations. New computing ...

Click here to read more arrow

Content-based Image Retrieval With Ant Colony Optimization

03 Apr 2018

5 (1,668 )

Content-based image retrieval with skin tones and shapes using Ant colony optimization Introduction: Due to the enormous pool of image data, a plenty of data to be sort out has lead the way for analyzing and dig up the data to acquire likely worthwhile information. Heterogeneous fields cover from commercial to military desire to inspect data in a systematic and quick manner. Outstandingly in the area ...

Click here to read more arrow

Optimizing Cash Management Model With Computer Intelligence

03 Apr 2018

11 (4,173 )

Alli and M.M. Ramya   Abstract In today’s technical era, the financial organizations have great challenges to optimize the cash management process. Maintaining minimum cash leads to customer frustration. At the same time, upholding excess cash is a loss to the organization. Hence, soft computing based cash management solutions are required to maintain optimal cash balance. An Artificial Neural Network (ANN) is one such technique ...

Click here to read more arrow

Comparison of Join algorithms in MapReduce Framework

03 Apr 2018

4 (1,373 )

Mani Bhushan, Balaraj J, Oinam Martina Devi   Abstract: In the current technological world, there is generation of enormous data each and every day by different media and social networks. The MapReduce framework is increasingly being used widely to analyse large volumes of data. One of the techniques that framework is join algorithm. Join algorithms can be divided into two groups: Reduce-side join and ...

Click here to read more arrow

Efficient Streaming Protocol for Transmitting Video Files

03 Apr 2018

7 (2,527 )

Chapter one Introduction Chapter One Introduction 1.1 Motivation Information in computer science might be represented in multiple forms. In the beginning the first used forms of information were text and images, after the huge increase of using computers and internet another type of information appears, it is the hyper text which is the combination of text and images. Hyper text is text pages that ...

Click here to read more arrow

Analysis of Online Recruitment Process With TAM

03 Apr 2018

8 (3,042 )

ANALYSIS OF ONLINE RECRUITMENT PROCESS FOR JOBSEEKERS USING TECHNOLOGY ACCEPTANCE MODEL(TAM) 1) S.Munzarin, 2) A. Manimegalai 3) G. Latha, 4) B. Sindhuja ABSTRACT I.INTRODUCTION Today, online recruitment has become a major tool for many organizations. However, little is known about jobseekers' reactions to this new technology. This article is aimed at developing a web-based and central recruitment Process system for the HR Group of the company. ...

Click here to read more arrow

Retrieval of User Interesting and Rank Oriented Results

29 Mar 2018

6 (2,365 )

Abstract: Retrieval of user interesting and rank oriented results is always an important research issue in information retrieval and search engine optimization. The main problem with traditional approaches is, they gives redundant results based relevance score of the search results. In this paper we are proposing sink points based redundant removal approach with rank oriented results for user input query. Here our proposed approach follows the ...

Click here to read more arrow

Development of Dental Billing System

29 Mar 2018

15 (5,945 )

ABSTRACT The application is developed for billing and stocks management for a wholesale dental material seller. The seller mostly sells operational tools, his clients include other retailers, legitimate Doctors, hospitals and medical colleges. As the a result of rapid growth in business, the data to be stored, managed and processed is increasing day by day making it very difficult to manually maintain everything. To fix this ...

Click here to read more arrow

Modified Biogeography Based Optimization

29 Mar 2018

7 (2,545 )

Modified Biogeography Based Optimization and enhanced simulated annealing on Travelling Tournament problem. Abstract: This paper shows the implementation of Modified BBO and Extended BBO on Travelling Tournament Problem. We modified the migration step of BBO by using probabilistic measures into it. Conventional BBO is used to solve deterministic problems but when we are dealing with real world problems which are non deterministic Conventional BBO failed to ...

Click here to read more arrow

Comparative Study of Advanced Classification Methods

29 Mar 2018

12 (4,689 )

CHAPTER 7 TESTING AND RESULTS 7.0 Introduction to Software Testing Software testing is the process of executing a program or system with the intent of finding errors or termed as bugs or, it involves any activity aimed at evaluating an attribute or capability of programming system and determining that it meets its required results. Software bugs will almost always exist in any software module with moderate ...

Click here to read more arrow

Adaptive Block Steganography Based Crypting Technique

29 Mar 2018

17 (6,733 )

A Novel Approach on Adaptive Block Steganography Based Crypting Technique for Secure Message Passing AbhipsaKundu, Sudipta Sahana   Abstract The enhancement of using internet system has increased the ease of information communication which throws challenge in data security. Now in current days safe and sound data transfer become more essential and significant. Cryptography and Steganography are two significant areas of research that involve a number ...

Click here to read more arrow

Theory of Automata: Construction of Symbolic Language

29 Mar 2018

15 (5,860 )

Rubina Naz & M Arslan Riaz ABSTRACT: Conventions for translating ordinary language statements into symbolic notation and many of places are use symbolic language for communication. And alphabet is a finite set of discriminatable and irreducible symbols that can be used either as such, or as representations of some other such set for communication. This abstracts and refines the linguistically idea of alphabet where the ...

Click here to read more arrow

Stack Sequential Algorithm to Analyse Adverse Drug Reaction

29 Mar 2018

10 (3,728 )

Amiya Kumar Tripathy, Nilakshi Joshi, Aslesha More, Divyadev Pillai, Amruni Waingankar   Abstract— An adverse drug reaction (ADR) is ‘a response to a medicine which is noxious and unintended, and which occurs at doses normally used in human beings’. During the last decades it has been estimated that such adverse drug reactions (ADRs) are the 4th to 6th largest cause for mortality in different countries. They ...

Click here to read more arrow

Performance Analysis of Algorithms on Shared Memory

29 Mar 2018

4 (1,216 )

Performance analysis of algorithms on shared memory, message passing and hybrid models for stand-alone and clustered SMPs INTRODUCTION INTRODUCTION Parallel computing is a form of computation that allows many instructions to be run simultaneously, in parallel in a program. This can be achieved by splitting up a program into independent parts so that each processor can execute its part of the program simultaneously with ...

Click here to read more arrow

Wearable Motion Detection Technology to Detect Falls

29 Mar 2018

8 (3,133 )

Louise Patterson 1. Project Title The development of a fully working model using wearable motion detection technology to detect and alert to falls within the home. 2. Abstract The focus of this document concerns the research and methodology into the problem of people with care needs being able to live independently within their own homes with minimum intervention. Elderly people particularly tend to have ...

Click here to read more arrow

Novel Approaches to DoS Impact Measurement

29 Mar 2018

8 (2,863 )

J.Anto Sylverster Jeyaraj, C.Suriya, R.Sudha Abstract Over the past few years Denial of service (DoS) Attacks have emerged as serious vulnerability for almost every internet Services. Existing approach to DoS impact measurement in Deter Testbeds equate service denial with slow communication low throughput, high resource utilization, and high loss rate. These approaches are not versatile, not quantitative, not accurate because they fail to specify exact ...

Click here to read more arrow

Proposed System for Plagiarism Detection

29 Mar 2018

6 (2,094 )

Chapter 3 The Proposed System Introduction This chapter introduces ZPLAG as proposed system, and its most important design issues are explained in details. It is very easy for the student to find the documents and magazines using advanced search engines, so the problem of electronic thefts is no longer local or regional, but has become a global problem occurring in many areas. Due to ...

Click here to read more arrow

Delay Aware Multipath Switching Zone Traversal (MSZT)

29 Mar 2018

9 (3,374 )

Delay Aware Multipath Switching Zone Traversal (MSZT) Approach for MANET Abstract Route discovery and data transmission in Mobile Ad-Hoc networks (MANETs) are the key procedures which influence the performance of the network. The data transmission through the discovered route with in minimum delay is considered as a major problem in the MANET. Hence this paper proposed an approach called Multipath Switching Zone Traversal (MSZT) approach to ...

Click here to read more arrow

Survey on the WIFI Positioning Technology

29 Mar 2018

9 (3,275 )

A quick survey on the WIFI positioning technology Abstract Wireless location estimation technology is applied largely into many fields such as in the military communication, Internet of things and social networks. Meanwhile, with the growing need of WIFI technology, access points of WIFI networks have been deployed in large-scale department stores, cafes, schools and general hospitals. WIFI location positioning can not only offset the drawbacks of ...

Click here to read more arrow

Proposed Roadmap for Cloud Adoption

29 Mar 2018

6 (2,393 )

1. Chapter 8: Case Study based on the roadmap 1.1. Introduction This chapter focuses on the case study done by a privately owned company based in India. They were willing to adopt cloud for their IT Department. The proposed roadmap is being tested for the process they followed for the cloud adoption. This was done to know the significance of the proposed steps to be followed ...

Click here to read more arrow

Strategies for the Analysis of Big Data

29 Mar 2018

7 (2,717 )

CHAPTER: 1 INRODUCTION General Day by day amount of data generation is increasing in drastic manner. Wherein to describe the data which is in the amount of zetta byte popular term used is “Big data”. Government, companies and many organizations try to obtain and store data about their citizens and customers in order to know them better and predict the customer behavior. The big ...

Click here to read more arrow

Automation in IT Industry: Uses and Benefits

29 Mar 2018

7 (2,620 )

Automate IT processes Abstract Here is the procedure to analyzing the errors or bugs related to the Project in the IT industry using the automation tools. From this analysis we are able to find the processes of errors caused due to soundness or for syntactical errors Due to this errors the organization is non profitable or losing its profit sales it also lead to downfall of ...

Click here to read more arrow

IDE for Satellite ODL

29 Mar 2018

7 (2,682 )

An Integrated Development Environment for Satellite Operations Definition Language Rachana M C Sajiv Kumar   Abstract— The satellite system has to be maintained in proper operations conditions for optimal throughput and satisfying the mission requirements. This is achievable by monitoring the satellite health parameters, analyse the behavioural characteristics and control the parameters accordingly based on the behavioural patterns. The subsystem experts define the behavioural ...

Click here to read more arrow

Solution of a System of Linear Equations for INTELx64

29 Mar 2018

8 (3,106 )

A multi core hyper-threaded solution of a system of linear equations for INTELx64 architecture Richa Singhal ABSTRACT. A system of linear equations forms a very fundamental principal of linear algebra with very wide spread applications involving fields such as physics, chemistry and even electronics. With systems growing in complexity and demand of ever increasing precision for results it becomes the need of the hour ...

Click here to read more arrow

Manuscript Submission and Peer- review System

29 Mar 2018

4 (1,297 )

World’s First Manuscript Submission and Peer- review System Integrated with Social Networking Dr. Antony Raj*, Balaji Jagadeesan, Muthumariappan M and Bhuvaneswari Ranganathan   Abstract: Any major change in the way people communicate is bound to have major implications for education. Today, in the fast paced life, promoting self written research article/publications is very important to improve the citation of the article and credit to the author’s ...

Click here to read more arrow

Computer Vision In Bad Weather.

29 Mar 2018

7 (2,716 )

Saswati Rakshit     Aim: To take advantage of bad weather in estimation of depth of a scene from its image. As in bad weather atmosphere modulates original information of an image to the observer so based on observation,we develop model & methods for recovering scene properties(e.g. 3D structure,depth etc). Scope/Application: Computer Vision is widely used in various fields now a days. It is used in ...

Click here to read more arrow

Clone Detection in Object Oriented Systems

29 Mar 2018

7 (2,771 )

Program Slicing based Clone Detection in Object Oriented Systems Ishu Singla Rajesh Bhatia   Abstract— Program slicing is an efficient technique for understanding programs by simplifying them. It is a program analysis technique that extracts a particular set of statements relevant to any computation. For the last 25 years, the technique has found its application in a number of research areas like testing, debugging, ...

Click here to read more arrow

Macro Management Scheme in NEMO Environment

29 Mar 2018

8 (2,884 )

An enhanced Macro Management Scheme in NEMO Environment to Achieve Seamless Handoff Qoutibah AlAssi   1. Abstract In NEMO(NETWORK MOBILITY) and when they are connected to the Internet through mobile or even laptops and during the move from one place to another process occurs disconnect this process its output practically at the point of contact with SMR within the network NEMO have changed any ...

Click here to read more arrow

Overview of Cryptographic Techniques

29 Mar 2018

4 (1,529 )

Gunasekaran, Priya Dharshini   Cryptographic Techniques The backbone of many organization is the electronic communications. Most of the information are communicated online. Hence the important informations are to be maintained confidentially. To maintain the highly confidential information, a secure and robust system is required. Som and Banerjee (2013, p. 1) states that “Cryptography is the science of making communication unintelligible to everyone except the intended receiver(s).” ...

Click here to read more arrow
ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now