Author Archives: admincom

An Aproach of Design and Training of Artificial Neural Networks by Applying Stochastic Search Method

Kostantin P. Nikolic

View:    Abstract |  HTML Full Text |  PDF |  XML|

Although vast research works have been paid (throughout some 20 years back) regarding formal synthesis of an ANN it is somehow still open issue. This paper does not consider the mentioned formal synthesis aspects but intends to introduce an original engineering approach offering some advantages whenever training and designing of artificial neurel networks are under consideration. In that sense the author uses powerful combined method of stochastic direct search, the univerzal approximator and simulation method. Author has created specific stochastic serch algorithm wich in some cases having advantages over numerous known methods wich are based on the application of the gradient. The said algorithm incorporates universal approximation and simulation during designing and training neurel networks. The offered approach is applicable for wide range of artificial neural networks  types icluding recurrent ones in real time. The presented numerical examples illustrate applicability of the offered advanced approach.

Hide Abstract

Comparative Evaluation of WOFOST and CERES-Rice Models in Simulating Yield of Rice Cultivars at Navsari

Nilesh J. Hadiya1, Neeraj Kumar1, B. M. Mote2, Chiragkumar. M. Thumar1 and D. D. Patil2

View:    Abstract |  HTML Full Text |  PDF |  XML|

A field experiment was conducted during kharif season of 2015 to assess the prediction performance of CERES-Rice and WOFOST model for grain and straw yield of three rice cultivars viz., (V1:Jaya, V2: Gurjari and V3: GNR-2) sown under four different environments viz., (D1: 10/07/2015, D2: 25/07/2015, D3: 09/08/2015 and D4: 24/08/2015) with two nitrogen levels N1:75 and N2:100 kg NPK/ha-1.Results showed that the prediction of WOFOST model forgrain yield of rice cultivars under different treatments more close to the corresponding observed value with percent error PE between (18.66%)as camper to CERES-rice model with PE (28.56%), but for straw yield CERES-rice model give more close prediction than WOFOST model with PE (20.99%) and (27.33%) between predicted and observed value.

Hide Abstract

Packet Drop Attack Detection and Prevention Using Rank Base Data Routing in MANET

Rajan Patel1*,Sumaiya Vhora2 and Nimisha Patel1

View:    Abstract |  HTML Full Text |  PDF |  XML|

Packet drop (grayhole/blackhole) attack is occurs at a network layer to discard the packets in MANET. It is essential to detent and prevent this attack for improving performance of network. This article provides the packet drop attack detection and prevention using RBDR (Rank Based Data Routing) for AOMDV routing protocol. The fields of RBDR are generated with routing information and analysis behavior of network for detecting the malicious paths. The scheme is to identify the malicious paths for preventing the packet drop attack and also able to find the trusted multiple disjoint loop free routes for data delivery in MANET. The simulation is conducted in NS2 using AOMDV reactive routing protocol and analyze with packet loss delivery, average end-to-end delay and packet delivery ratio. The proposed technique can reduce the effect of packet drop attack.

Hide Abstract

Optimized Image Mosaicing with Moment Invariants and SIFT Features

Vikram Agrawal1*  and Dilipsinh Bheda2

View:    Abstract |  HTML Full Text |  PDF |  XML|

In the field of Image mosaicing, much research has been done to fulfil the two major challenges, time complexity and quality improvement. Proposed method is a pre-processing step before actual image stitching carried out.  The method aims to find out the overlapping regions in two images. Thus features can be extracted from these overlapping regions and not from the whole images, which result into reduction of computation time. For detecting overlapping portion, gradient based edge extraction method and invariant moments are used. In the deduced region, SIFT features are extraction to determine the matching features. The registration process carried out by RANSAC algorithm and final output mosaic will obtained by warping the images. An optimized approach to calculate the moment difference values is presented to improve time efficiency and quality.

Hide Abstract

Workload Consolidation using Task Scheduling Strategy Based on Genetic Algorithm in Cloud Computing

Ronak Vihol1*, Hiren Patel2 and Nimisha Patel1,3

View:    Abstract |  HTML Full Text |  PDF |  XML|

Offering “Computing as a utility” on pay per use plan, Cloud computing has emerged as a technology of ease and flexibility for thousands of users over last few years. Distribution of dynamic workload among available servers and efficient utilization of existing resources in datacenter is one of the major concerns in Cloud computing. The load balancing issue needs to take into consideration the utilization of servers, i.e. the resultant utilization should not exceed the preset upper limits to avoid service level agreement (SLA) violation and should not fall beneath stipulated lower limits to avoid keeping some servers in active use. Scheduling of workload is regarded as an optimization problem that considers many varying criterion such as dynamic environment, priority of incoming applications, their deadlines etc. to improve resource utilization and overall performance of Cloud computing. In this work, a Genetic Algorithm (GA) based novel load balancing mechanism is proposed. Though not done in this work, in future, we aim to compare performance of proposed algorithms with existing mechanisms such as first come first serve (FCFS), Round Robin (RR) and other search algorithms through simulations.

Hide Abstract

Improving E-Learning Support and Infrastructure in Different Districts of Jammu and Kashmir

Wasim Akram Zargar and Jagbir Ahlawat*

View:    Abstract |  HTML Full Text |  PDF |  XML|

This paper reports a study conducted in 2015 at the different institutions of different of Jammu and Kashmir aimed to obtain a much clearer picture about the use and knowledge of e-learning at the institutions so as to give new idea about development of e-learning (online courses) usage in institutions. Multiple sources of data were collected, including:  questionnaires and interviews with academics, students and administration. The information illustrate that e-learning (online courses) in institutions of Jammu and Kashmir is still largely in the “innovators” and “early adopters” stages. There lies a “chasm” ahead inhibiting moving further into the “mainstream” area. The analysis of the information revealed that how much the academics and students know about the e-learning (online courses) and how much they are implementing in their lectures/studies. The focus of the chapter is on how one can strengthen this alignment to be able to bridge the chasm. The study has been successful in eliciting institutions support for changes to the e-learning support system.

Hide Abstract

Convergence In Future Wireless Network Technology

Shaikh Abdul Azeem1*  and Satyendra Kumar sharma2

View:    Abstract |  HTML Full Text |  PDF |  XML|

The communications sector is undergoing significant changes, with the emergence of a number of platforms available to provide a different range of services. Some of these platforms are complementary to each other, while others are competitive, or can provide a valid substitute for some of the services provided. Up till now, the most important communications platform in most of the developing countries has been the public switched telecommunication network (PSTN) which provides access to all households and buildings. This universality in providing access has also meant that the network has generally been designated as one for universal service.

Hide Abstract

An insight into IPAddressing

Mamta Padole1, Pratik Kanani2 , Leena Raut1 , Dhyanvi Jhaveri1 and Manali Nagda1

View:    Abstract |  HTML Full Text |  PDF |  XML|

Thecurrent version of Internet Protocol (IPv4) has not been substantially changed in the past 25 years. IPv4  has proven to be robust and easily implemented. In the early stage, the deployment of IPv6 is prepared and begun on the IPv4-based network. In the intermediate stage, IPv4 and IPv6 coexist. In the later stage, IPv6 plays a leading role on the network and the IPv4 network is gradually withdrawing from the market. Meanwhile, researchers put forward many transition mechanisms for different network infrastructures and different evolution stages. In this paper, a detailed study is made on IPv4 along with its different smart saving techniques. Which help in delay of IPv4 to IPv6 shifting delays. Also different addressing schemes are discussed which remains unchanged in future. Along with that limitations of IPv4 is also focused so present IPv4 network infrastructure can be more secured till IPv6 realization. Further the need for IPv6 is discussed along with its header and address formats.

Hide Abstract

Access Control and Encryption of Sensitive Data Using i-Se4GE Algorithm

Mamta Padole1 and Pratik Kanani2

View:    Abstract |  HTML Full Text |  PDF |  XML|

Encryption, itself doesn’t prevent interception, but denies the message content to the interceptor. For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. It is impossible to decrypt the message without possessing the key, but, for a well-designed encryption scheme, large computational resources and skills are required to decrypt it. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients, but not to unauthorized interceptors.

Data hiding is the skill of hiding messages in such a ways the only the sender and the receiver of the message knows that the message has been hidden. In the context of secured information transmission and reception, efficient techniques for data encryption and decryption are very much essential. In this paper, a message transfer application is developed which mainly focusses on secret message transfer between two parties. Used scheme not only focusses on text but also the encryption of images and videos. A unique algorithm i-Se4GE is used for the transfer of keys required for the encryption and decryption of messages. This algorithm makes use of a set of random numbers, timestamp of the two users, a set of public keys and dynamic keys. The algorithm uses a two-step authentication request-reply process which provides it a double layer security.

Hide Abstract

Optimal Allocation of Stratified Sampling Design Using Gradient Projection Method

M. A. Lone, S. A. Mir , Imran Khan and  M. S. Wani

View:    Abstract |  HTML Full Text |  PDF |  XML|

This article deals with the problem of finding an optimal allocation of sample sizes in stratified sampling design to minimize the cost function. In this paper the iterative procedure of Rosen’s Gradient projection method is used to solve the Non linear programming problem (NLPP), when a non integer solution is obtained after solving the NLPP then Branch and Bound method provides an integer solution.

Hide Abstract

Copy Move Image Forgery Detection Using SIFT

Priyanka R. Ruikarand Pravin S. Patil2

View:    Abstract |  HTML Full Text |  PDF |  XML|

In recent years the digital form of data allowing ease on to manipulation & storage due to progress in technology. But this progress in technology has lots of risks especially when it comes to the security of the digital data & files. Basically, image forgery means malfunctioning & playing with images or manipulating data fraudulently. In that case, some important data may get hidden in the original image. In particular, many organizations worry for digital forgery, because it is easier to create fake & fraudulent images without leaving any Tampering traces. A copy-move is a specific form of image forgery operation & it is considered one of the most difficult problems in that case for this a part of any image is copied & pa tested on another location of an image that may be a same or different image, to obfuscate undesirable objects in the scene. In this paper, the method is proposed which automatically detects & identifies the duplicated regions in the image. In that process first image segmentation takes place & by identifying the local characteristics of the images (points of interest) the duplication is detected using SIFT (Scale Invariant Feature Transform).

Hide Abstract

Detection of Powdery Mildew Disease of Beans in India : A Review

Kuldeep Singh1, Satish Kumar2 and Pawan Kaur3*

View:    Abstract |  HTML Full Text |  PDF |  XML|

Powdery mildew disease of beans in India causes major economic losses in agriculture. For sustainable agriculture detection and identification of diseases in plants is very important.  In this review, we are trying to identify the powdery mildew disease of beans crop by using some image processing and pattern recognition techniques and comparing with molecular and spectroscopic techniques. Early information on crop health and disease detection can facilitate the control of diseases through proper management strategies. The present review recognizes the need for developing a rapid, cost-effective, and reliable health monitoring techniques that would facilitate advancements in agriculture. These technologies include image processing and pattern recognition based plant disease detection methods

Hide Abstract

Formulation of A Prediction Index with the Help of WEKA Tool for Guiding the Stock Market Investors.

Aseema Dake Kulkarni1 and Ajit More2

View:    Abstract |  HTML Full Text |  PDF |  XML|

Prediction of stock prices using various computer programs is on rise. Popularly known in the field of finance as algorithmic trading, a radical transformation has taken place in the field of stock markets for decision making through automated decision making agents. Machine learning techniques can be applied for predicting stock prices. This paper attempts to study the various stock market forecasting processes available in the forecasting plugin of the WEKA tool. Twenty experiments have been conducted on twenty different stocks to analyse the prediction capacity of the tool.

Hide Abstract

Improving WLAN Quality of Services (Qos) Using Opnet

Ishwar Baidari1 , S. P. Sajjan2 and Ajeet Kumar Singh2

View:    Abstract |  HTML Full Text |  PDF |  XML|

Wireless local area networks (WLANs) are in a period of great expansion and there is a strong need for them to support multimedia applications. With the increasing demand and penetration of wireless services, users of wireless networks now expect Quality of Service (QoS) and performance comparable to what is available from fixed networks. Providing QoS requirements like good throughput and minimum access delay are challenging tasks with regard to 802.11 WLAN protocols and Medium Access Control (MAC) functions.
This research is done to study, the presently implemented schemes (the Point Coordination Function (PCF) of IEEE 802.11, the Enhanced Distributed Coordination Function (EDCF) of the proposed IEEE 802.11e extension to IEEE 802.11), solves these issues and what can be done to improve them further.  The metrics used were Throughput, Data Drop, Retransmission and Medium Access Delay, to analyze the performance of various MAC protocols in providing QoS to users of WLAN.
Two scenarios, with same Physical and MAC parameters, one implementing the DCF and other EDCF, were created in the network simulation tool (OPNET MODELER) to obtain the results. The results showed that the performance of EDCF was better in providing QoS for real-time interactive services (like video conferencing) as compared to DCF, because of its ability to differentiate and prioritize various services. Index Terms - Wireless local area networks (WLANs),

Hide Abstract

Analysis of the Effect of Cell Phone Radiation on The Human Brain Using Electroencephalogram

Humaira Nisar* and Hamara M. Awadh

View:    Abstract |  HTML Full Text |  PDF |  XML|

This paper aims to investigate the effect of cell phone radiation on human brain. It is known that the cell phone emits electromagnetic (EM) radiation which could be harmful to the human brain. In this research the electroencephalogram (EEG) signal has been acquired from 24 healthy subjects using a 16 channel EEG headset under different experimental conditions. The signal is decomposed into different brain rhythms using Daubechies Discrete Wavelet Transform up to 5th-level of the decomposition. Quantitative analysis has been carried out using two statistical parameters (Energy, Entropy) and Absolute Power. Special attention was focused on Temporal and Frontal lobes as these are near to the ear. Experimental results show higher values (for energy, entropy and absolute power) in the low-frequency bands (delta and theta) compared to the high frequency bands (alpha, beta and gamma) in both lobes. When the phone was placed 5cm away from the head there was less brain activation compared to when the cell phone was placed next to the ear/head on both sides. It was found that there was more effect on the right side compared to the left side from the cell phone’s radio waves. 

Hide Abstract

Testing of Multithreaded Code Under Deterministic and Predictable Environment

Mohammad Alghamdi2,Mohammed Alrifai2,Khalil Alsulbi2, Wadee Alhalabi2 and Moustafa Mahmoud Yousry*1Orcid

View:    Abstract |  HTML Full Text |  PDF |  XML|

This report focuses on the execution of multithreaded  programs and finding bugs and errors in those programs. Testing is done to determine if the code written  runs correctly or not. The report also covers comparison of traditional testing tools with  the new and efficient  systematic testing tool called CHESS. The repost explains in detail about  the testing technique of CHESS including  how it identifies and handles bugs in multithreaded programs. The various experiments performed using different outputs have also been discussed and their respective results have also been shown in order to determine the behavior of CHESS tool when it is provided random inputs. Using this input did not lead to non-deterministic test and the execution time increases exponentially.

Hide Abstract

An Introduction to Data Mining Applied to Health-Oriented Databases

M. A. de Jesus and Vania V. Estrela

View:    Abstract |  HTML Full Text |  PDF |  XML|

The application of data mining (DM) in healthcare is increasing. Healthcare organizations generate and collect large voluminous and heterogeneous information daily and DM helps to uncover some interesting patterns, which leads to the manual tasks elimination, easy data extraction directly from records, to save lives, to reduce the cost of medical services and to enable early detection of diseases.   These patterns can help healthcare specialists to make forecasts, put diagnoses, and set treatments for patients in health facilities. This work overviews DM methods and main issues. Three case studies illustrate DM in healthcare applications: (i) In-Vitro Fertilization; (ii) Content-Based Image Retrieval (CBIR); and (iii) Organ transplantation.

Hide Abstract

Discovering Spatio-temporal Patterns of Themes in Social Media

Tobore Igbe, Bolanle Ojokoh* and Olumide Adewale

View:    Abstract |  HTML Full Text |  PDF |  XML|

Social networking website creates new ways for engaging people belonging to different communities, moral and social values to communicate and share valuable knowledge, therefore creating a large amount of data. The importance of mining social media cannot be over emphasized, due to significant information that are revealed which can be applied in different areas. In this paper, a systematic approach for traversing the content of weblog, considering location and time (spatiotemporal) is proposed. The proposed model is capable of searching for subjects in social media using Boyer Moore Horspool (BMH) algorithm with respect to location and time. BMH is an efficient string searching algorithm, where the search is done in such a way that every character in the text needs not to be checked and some characters can be skipped without missing the subject occurrence.  Semantic analysis was carried out on the subject by computing the mean occurrence of the subject with the corresponding predicate and object from the total occurrence of the subject. Experiments were carried out on two datasets: the first category was crawled from twitter website from September to October 2014 and the second category was obtained from spinn3r data set made available through the International AAAI (Association for the Advancement of Artificial Intelligence) Conference on Web and Social Media (ICWSM). The results obtained from tracking some subjects such as Islam and Obama shows that the mean occurrence of the analysis of the subject successfully reveals the pattern of the subject over a period of time for a specific location. Evaluation of the system which is based on performance and functionality reveals that the model performs better than some baseline models. The proposed model is capable of revealing spatiotemporal pattern for a subject, and can be applied in any area where spatiotemporal factor is to be considered.

Hide Abstract

Load Balancing the Network Traffic in the Nth Mode of IP Tables

Anupama*1 and O. P. Gupta2

View:    Abstract |  HTML Full Text |  PDF |  XML|

In this paper, we present the network load balancing to optimize the network interfaces that are present in the cluster. We know, everything belongs to internet now a days. With the increase in the popularity of the web, network traffic increases and need for fast access to the internet is also on demand. For smooth services, redundancy of the servers is required. As a result, load balancing has become a very critical job. A single server is not able handle all the traffic which results into a server crash. Network is divided into different paths on which the transmission of packets is done. They are distributed on all the interfaces simultaneously. We investigate the performance of per-packet load balancing in different servers. Simulation results reveal that it is always beneficial to use load balancing and backup of other servers are always present in case of any failure in network.

Hide Abstract

Application of Multi-Angle Imaging Spectro Radiometer in Agricultural in Middle Gujarat for Wheat Crop

H. K. AHIR and B. M. Mote

View:    Abstract |  HTML Full Text |  PDF |  XML|

The present analysis was carried out using the satellite image from the Multi-angle Imaging Spectro Radiometer (MISR) was acquired over Middle Gujarat on 9 and 18 February 2015. The MISR is one of the five instruments on board the EOS/ Terra spacecraft. The Rahaman-Pinty-Verstraete inversion and Forward semi-empirical three parameters leaf reflectance shape (rho0), the curve convexity (k) and the dominant forward scattering (Ɵ) model were used to simulate angular patterns of BRF for wheat on 18 February 2015. The potential of the RPV model to represent the BRF of leaves in the 400-1100 nm spectral range was investigated in this study. The results revealed that the variety of tests are shown in order to document and analyse software performance against simulated BRF fields by RPV anis view model as well as against actual MISR-derived satellite BRF was blue, green and red good match with each but mismatched with NIR and all MISR band blue, green and red and NIR for mature wheat.

Hide Abstract

Fdi (Foreign Direct Investment) in India ; the Major Monetary Source for Economic Development With Special Emphasis on Computer Sector

Bushra Sarwar

View:    Abstract |  HTML Full Text |  PDF |  XML|

Foreign direct investment (FDI) is an investment in a business by an investor from another country for which the foreign investor has control over the company purchased. The need for foreign capital for a developing country like India could arise on account of the following reasons reasons. Foreign capital is usually essential atleast as temporary measure during the period of development. Foreign capital  usually  brings with it with other scarce productive factors like technical know how. Domestic capital is inadequate for purpose of the economic growth and it is necessary to invite foreign capital as per the requirement. At many times, domestic capital and entrepreneurship may not flow into certain lines of production. Foreign capital can show the way for domestic capital. There can be potential savings in a developing economy like India but this may come forward only at a higher level of economic activity. Therefore it is necessary that foreign capital should help in speeding up economic activity in the initial phase of development.

Hide Abstract

Study and Analysis of Multilingual Handwritten Characters Recognition using SVM Classifier

Ujwal  Singh Vohra, ShriPrakash Dwivedi and  H. L. Mandoria

View:    Abstract |  HTML Full Text |  PDF |  XML|

Day by day the researchers are trying to make such characters recognition system  that can be able to detect the writing and languages of individuals, for this multilingual handwritten characters recognition is such system that playing a vital role for recognizing the characters written in different languages and in different styles. The research work presented in this thesis aims to do the study and analysis to recognize the multilingual handwritten characters with a high level of accuracy and for this purpose the classifier that we are using is support vector machine. Here in this work we have used the languages like Hindi and English and along with this we have taken special characters and numerals and tried to recognize them with our system.

Hide Abstract

Text Localization and Extraction From Still Images Using Fast Bounding Box Algorithm

Sonal Paliwal, Rajesh Shyam Singh and H. L. Mandoria

View:    Abstract |  HTML Full Text |  PDF |  XML|

Text Extraction and Localization from images is a very challenging task because of noise, blurriness and complex color background of the images. Digital Images are subjected to blurring due to many hardware limitations such as atmospheric disturbance, device noise and poor focus quality. In order to remove textual information from images it is necessary to remove blurriness and restore the image for the text extraction. Thus in this paper Fast Bounding Box algorithm is applied for localization and extraction of the text from images in an efficient manner by dividing the image into two halves and then find the dissimilar region i.e. text.

Hide Abstract

Identification of Abnormal Masses in Digital Mammogram Using Statistical Decision Making

Sangita Bhattacharjee1, Indra K Maitra2 and Samir K Bandyopadhyay1

View:    Abstract |  HTML Full Text |  PDF |  XML|

The increasing threat of breast cancer in developing countries may not only be handled by the existing medical setup as well as insufficient number of medical workforces. To handle the increasing volume of data produced by diagnostic imaging that can be efficiently managed by computer aided detection/diagnosis (CAD) to assist medical practitioners in image interpretation to detect structural abnormalities like tumour. Mammography has been proven to be the most reliable and cost-effective methodology for early breast tumor detection. In this paper, an abnormality detection methodology has been proposed alongwith preparation and pre-processing steps. The accuracy of CAD to detect abnormalities on medical image analysis depends on a robust segmentation algorithm. Here two types of segmentation mechanism have been implemented i.e. edge-based and region-based. Finally, a proposed statistical decision-making system is used to extract the abnormal region(s) based on intensity distribution. Applying the proposed method on CR and DR mammographic images produces the quantitative measures accuracy, sensitivity and specificity as 96%, 97.6% and 88.6% respectively which is comparable with other contemporary research works.

Hide Abstract

Analysis of Pattern Identification Using Graph Database for Fraud Detection

Navneet Kr. Kashyap*, B. K. Pandey and H. L. Mandoria

View:    Abstract |  HTML Full Text |  PDF |  XML|

Internet is the main tool for e-business. E-transaction is made faster by Internet. With the increase of e-transaction internet fraud or e-business fraud is increasing. Credit fraud in the banking sector is a growing concern. Few sort of card (debit/credit) fraud is decreasing by providing detection and prevention system from banks and government. But card-not-present fraud losses are increasing at higher rate because of online transaction as there is no chance to use Chip and PIN as well as card is not used face-to-face. Card-not-present fraud losses are growing in an un-protective and un-detective way. This paper seeks to investigate the current debate regarding the fraud in the banking sector and vulnerabilities in online banking and to study some possible remedial actions to detect and prevent credit fraud. The research also reveals lots of channels of fraud in online banking which are increasing day by day. These kinds of fraud are the main barriers for the e-business in the banking sector. This paper devised a new approach for fraud detection in these sector with help of graph database & by matching pattern of previous frauds.

Hide Abstract

Congestion Avoidance in Packet Networks using Network Simulator-3 (NS-3)

Guneet Kaur Walia, O. P. Gupta and Sunil Kumar*

View:    Abstract |  HTML Full Text |  PDF |  XML|

With the growth of internet, the user’s requirements in terms of scale, functionality of network and performance of internet also increases. It becomes very important to guarantee the efficiency, stability and performance of a given network as per the user’s requirements. There are many management techniques that need to be taken care of, so as to ensure network stability. These include queue management, queue scheduling, congestion control etc. But the most fundamental and foremost amongst these is congestion control, as it’s not possible to ensure Quality of Service (QoS) with a congested network. To avoid congestion, many algorithms are available; the most basic of them is Random Early Detection (RED). This paper implements RED and its enhancement Adaptive RED (ARED) in NS-3 simulator and comparative analysis of both the algorithms has been carried out.

Hide Abstract

Development of Online Student Course Registration System

Rattan Singh, Ravinder Singh, Harpreet Kaur and O. P. Gupta

View:    Abstract |  HTML Full Text |  PDF |  XML|

With the advent of Information Technology in the last decade, the major focus has shifted from manual systems to computerised systems. Various systems viz. railway reservation, hospital management etc. involving manual work have been automated efficiently. Student course registration process in colleges involve filling registration forms manually, getting it signed by respective subject teachers, and then getting the documents acknowledged from the concerned Advisors, College Deans and Accounts Officers respectively. Finally the registration forms are submitted in the Administrative Branch. As is evident, this process is very laborious and time consuming. An Online Student Course Registration System has been developed to simplify the current manual procedure.This system has been developed using PHP, jQuery, Apache and MySQL. The front-end is designed using PHP with excerpts of code written using jQuery and back-end is designed and managed through MySQL. This system software is more secured, user-friendly and less time-consuming.

Hide Abstract

Storage and Computation on Big Data: A Comparative study

CH Sravan Kumar, P. Buddha Reddy, K. Srinivas

View:    Abstract |  HTML Full Text |  PDF |  XML|

A huge data space includes set of interesting points; Skyline is an important operation in many applications to return a set of interesting points from a potentially huge data space [1].This survey paper highlights the characteristics of big data and their challenges. This paper also discusses the tools and techniques of big data.  The existing algorithms like SaLSa, SSPL are novel computation algorithms. SaLSa exploits the idea of presorting the input data so as to effectively limit the number of tuples to be read and compared [2].SSPL utilizes sorted positional index lists which require low space overhead to reduce I/O cost significantly [1].SSPL consists of two phases. In phase 1, SSPL computes scan depth of the involved sorted positional index lists. During retrieving the lists in a round-robin fashion, SSPL performs pruning on any candidate positional index to discard the candidate whose corresponding tuple is not skyline result. Phase 1 ends when there is a candidate positional index seen in all of the involved lists. In phase 2, SSPL exploits the obtained candidate positional indexes to get skyline results by a selective and sequential scan on the table [1].

Hide Abstract

A Study on Usage of E-Commerce Through Cell Phones by College Students

J. Tamizhkumaran.1, Ranjanmayee Sabar1, P. Manesh Kumar2 and P. Ramajayan3

View:    Abstract |  HTML Full Text |  PDF |  XML|

A study was conducted among the veterinary college students to ascertain the usage pattern of e-commerce in mobile application. A total of 120 students were interviewed personally with a semi structured interview schedule designed for the study. The study revealed that majority of the respondent (85 %) preferred android based phones, the main purpose for e-commerce usage through cell phones were used for recharging cell phones (78.3 %), booking tickets (53.3%), paying the bills (35%), online shopping (28.3%), money transfer (05.8%) and hotel booking (5%). The major e-commerce activity was carried out using debit/ ATM cards (80%), internet banking (35%) and mobile banking (11.6 %). The popular apps preferred by the respondents were Paytm (71.6%), Red Bus (44.1%), Book My show (43.3%), Ticket New (39.1%) and Irctc (32.5%). It is clear from the study that college students are interested in e-commerce usage through mobile applications and in coming years the trend of e-commerce usage will surely take a turn around.

Hide Abstract

Operational Monitoring System OMS with WSN (Wireless Sensor Network), RFID, GPS and CCTV in Agriculture

Rajesh Kadchha

View:    Abstract |  HTML Full Text |  PDF |  XML|

This manuscript proposes an agricultural environment monitoring server system for monitoring information concerning an outdoors agricultural production environment utilizing Wireless Sensor Network (WSN) technology. The proposed agricultural server collects environmental, agricultural land, seeds and soil information on the outdoors through WSN-based environmental and soil sensors, collects snaps information through CCTVs, area information      through RFID and collects location information using GPS modules.  This collected information is converted into data and saved in to a database through the agricultural server consisting of a sensor manager, which manages information gathered from the WSN sensors, an image information manager, which manages image information collected from CCTVs, RFID and a GPS manager, which processes location information of the agricultural server system, and provides it to producers. In addition, a solar cell-based power supply is implemented for the server system so that it could be used in agricultural environments with insufficient power infrastructure. This agricultural server could even monitor the environmental information on the outdoors, and it could be look forward that the use of such a system could participate to increasing crop yields and improving quality in the agricultural field by supporting the decision making of crop producers through analysis of the collected information.

Hide Abstract

ICT tool – Development of Calculator for Design of Solar Dryer

Prakash R. Kolhe and Pradip P. Kolhe

View:    Abstract |  HTML Full Text |  PDF |  XML|

Henry David said “Men Have Become the Tools of Their Tools.” In this era all the developing technology begin from calculation influenced by the computer programming ICT-tool. Today energy is main problem, by utilizing sun light energy(solar energy) problem can be minimize. Sun drying is still the most common method used to preserve agricultural products in most tropical and subtropical countries. However, being unprotected from rain, wind-borne dirt and dust, infestation by insects, rodents and other animal, products may be seriously degraded to the extent that sometimes become inedible and the resulted loss of food quality in the dried products may have adverse economic effects on domestics and international markets. The conditions in tropical countries make the use of solar energy for drying food practically attractive and environmentally sound. Dryers have been developed and used to dry agricultural products in order to improve shelf life. Solar drying facilities are economical for small holders, especially under favourable meteorological conditions.

This paper discuss to design to calculate design of solar dryer. In this different parameters are determined i.e Moisture removed, Water activity, Equilibrium Relative humidity, Total Heat Needed, Enthalpy, Average Drying rate, Drying time, Collector area, Length of air vent, Velocity required. The calculator was developed using C language Version 3.0 Turbo c++ copyright (c)1990, 1992 by Borland International was developed.

Hide Abstract

Applications of Energy Aware Routing Protocols in WSN

G.Sumalatha1 and P. Anil Kumar2

View:    Abstract |  HTML Full Text |  PDF |  XML|

In this paper we have reviewed application of energy aware routing protocols like LEACH, LEACH-C, PEGASIS, BCDCP, ENPC-NPSO, ANPC etc In WSN sensors are randomly deployed in the sensor field which brings the coverage problem. Hence energy and coverage problem are very scarce resources for such sensor systems and has to be managed wisely in order to extend the life of the sensors and maximizing coverage for the duration of a particular mission. In past a lot of cluster based algorithm and techniques were used. In this paper we also find out all type of PSO based algorithm, their application and limitation over present techniques to overcome the problems of low energy and coverage of sensor range.

Hide Abstract

Constructing well-organized Wireless Sensor Networks with Low-level Identification

M.Rajesh1 and J. M Gnanasekar2

View:    Abstract |  HTML Full Text |  PDF |  XML|

In most distributed systems, naming of nodes for low-level communication leverages topological location (such as node addresses) and is independent of any application. In this paper, we investigate an emerging class of distributed systems where low-level communication does not rely on network topological location. Rather, low-level communication is based on attributes that are external to the network topology and relevant to the application. When combined with dense deployment of nodes, this kind of named data enables in-network processing for data aggregation, collaborative signal processing, and similar problems. These approaches are essential for emerging applications such as sensor networks where resources such as bandwidth and energy are limited. This paper is the first description of the software architecture that supports named data and in-network processing in an operational, multi-application sensor-network. We show that approaches such as in-network aggregation and nested queries can significantly affect network traffic. In one experiment aggregation reduces traffic by up to 42% and nested queries reduce loss rates by 30%. Although aggregation has been previously studied in simulation, this paper demonstrates nested queries as another form of in-network processing, and it presents the first evaluation of these approaches over an operational test bed.

Hide Abstract

Neuro-Fuzzy Based First Responder for Image Forgery Identification

Gaurav Kumar Singh Gaharwar1, 2, V. V. Nath3, Raina Gaharwar4

View:    Abstract |  HTML Full Text |  PDF |  XML|

Image forgery is always been sought after field of digital forensics, as it becomes very convenient now to edit/forge any image with many desktop based and online tools available. Also, to prove authenticity of any image in the court of law, there is a need of algorithm which can used to check forgery of any image, irrespective of its forgery type. Proposed model in the paper aims to provide neuro-fuzzy based algorithm which utilizes capabilities of best algorithms for each type and provides accurate result about the forgery in the image. It also provides analysis about type of forgery in the image along with the area forgered in the image.

Hide Abstract

Digital Image Watermarking – An Overview

H. B. Basanth Kumar 

View:    Abstract |  HTML Full Text |  PDF |  XML|

 Multimedia security is extremely significant concern for the internet technology because of the ease of the duplication, distribution and manipulation of the multimedia data. The digital watermarking is a field of information hiding which hide the crucial information in the original data for protection illegal duplication and distribution of multimedia data. The image watermarking techniques may divide on the basis of domain like spatial domain or transform domain or on the basis of wavelets. The spatial domain techniques directly work on the pixels and the frequency domain works on the transform coefficients of the image. This paper presents classification of watermarking, stages in watermarking, watermarking approaches and its applications.

Hide Abstract

Eigen Values Matrix for Recognition English Letters

Israa Mohammed Hassoon

View:    Abstract |  HTML Full Text |  PDF |  XML|

Reading skills or recognizability of letters and shapes are one of the human potential. The main objective in the design of any recognition system is to reduce the amount of data and get the perfect ratio of recognition. In this work ,eigen values matrix is used to recognize English letters .The process of recognize English letters (small letters , capital letters) in different sizes and different fonts that captured from scanner has been done by extracting topological features that study of qualitative properties of  letters , then topological features used to build eigenvalues matrix .

Hide Abstract

Graph Construction Based on Data Base of Movie Objects

Israa Hadi and Saad Taleb Hasson

View:    Abstract |  HTML Full Text |  PDF |  XML|

This paper aims to develop new techniques to construct a graph structure to represent
the relation between the objects in movie film. The main approach includes a mechanism for
many steps, first step is the Data Base Construction , which create a table consist record for
each frame, and each record contain entities such as area, Perimeter, and other parameters.
The second step is to calculate the number of features for any object in each frame depending
on the parameters in the data base. While the third step constructs a graph structure that
represent a base on the features of the objects.

Hide Abstract

New Method for Solving Data Centric Protocol SPIN

Fakhrosadat Fanian1 and Marjankuchaki Rafsanjani2

View:    Abstract |  HTML Full Text |  PDF |  XML|

Directed routing protocols, one of them is data centre protocol are the main proposed
methods in improving exploration quality of sensor networks. In these protocols, routing data
stored within networknodes locally. Therefore, there isn’t universal data about routes; one of
these protocols is sensor protocol for information via negotiation (SPIN), in this article it was
attempts to solve lack of receiving data by remote nodes from origin in case of non-request
from nearer nodes to origin in this protocol using clustering process. In the other hand, it was
attempt to prevent routing among origin and receiver nodes separately in this protocol that
cause waste of major parts of network resources and by delivering this algorithm led to improve
performance and efficacy and also increase life time of network and bearing of this protocol
against error because of rotating cluster heads roles.

Hide Abstract

Semantic Web: XML and RDF Roles

Fadi Al kalani

View:    Abstract |  HTML Full Text |  PDF |  XML|

This research paper presents an overview of the main concepts of the semantic web, and is aiming to present some ideas of developing the concept of semantic web using XML and RDF. In particular, the research reveals the positive impact of using RDF instead of XML through the concept of “Semantic Web”, with the knowledge that many of the researches demonstrated the preference of RDF for the many reasons including simplicity, abstract syntax, and providing a data model. In particular, our main goal is to define the appropriate elements to develop a semantic web using both XML and RDF. Our approach is achieved by developing a simulated web search engine to describe and emphasize the positive role of using RDF rather than XML in web search.

Hide Abstract

Hybrid Approach for Load Balancing in Cloud Computing

Vineet Richhariya, Ratnesh Dubey and Rozina Siddiqui

View:    Abstract |  HTML Full Text |  PDF |  XML|

Load balancing in the cloud computing environment has an important impact on the performance. Good load balancing makes cloud computing more efficient and improves user satisfaction. Load balancing with cloud computing provides a good  efficient  strategy to   several   inquiries  residing  inside  cloud computing environment set. complete  balancing must  acquire   straight into   accounts   two     tasks,  one   will be the  resource provisioning as well as  resource allocation  along with   will be   task  scheduling  throughout  distributed System. Round robin algorithm can be   via far  the   Easiest  algorithm  shown   to help  distribute  populate  among nodes. Because of this reason it is frequently the first preference when implementing a easy scheduler. One of the reasons for it being so simple is that the only information required is a list of nodes. The proposed algorithm eliminates the drawbacks of implementing a simple round robin architecture in cloud computing  by introducing a concept of assigning different time slices to individual processes depending on their are priorities.

Hide Abstract

Scheduling Strategies in Hadoop: A Survey

S Rashmi1 and  Anirban Basu2

View:    Abstract |  HTML Full Text |  PDF |  XML|

Hadoop-MapReduce is one of the dominant parallel data processing tool designed for large scale data-intensive cloud computing platforms. Hadoop Mapreduce framework requires a proficient mechanism to allocate and schedule computing resources   which makes it liable to accomplishthe desired preferences for the specific business application. In this paper, an analysis of a few scheduler improvement methods that improves the completion time of the job or the task  has been carried out  in order  to facilitate a judicious choice of the scheduler  based on the requirement and application expectations .

Hide Abstract

Advantages and Challeging in E Agriculture

Rajkumar M. Chauhan

View:    Abstract |  HTML Full Text |  PDF |  XML|

E-Agriculture focuse on the enhancement of agricultural and rural development through improved information and communication processes. More specifically, e-Agriculture involves the conceptualization, design, development, evaluation and application of innovative ways to use information and communication technologies (IT) in the rural domain, with a primary focus on agriculture. E-Agriculture is a relatively new term and we fully expect its scope to change and evolve as our understanding of the area grows. Indian Agriculture contributes to 18.6 per cent of India’s GDP, and approximately 59 per cent Indians derive their livelihood from the agricultural sector. Private sector initiatives like contract farming have commercialized the Indian agricultural sector. To enable Community members to exchange opinions, experiences, good practices and resources related to e-Agriculture, and to ensure that the knowledge created is effectively shared and used worldwide.But There is some advantages and drawback which reside in every technology.This paper gives some glims What the technologies give and take in area of agriculture.

Hide Abstract

High Level Security Trust Zones for Private Clouds

R. Vinoth*, B. Guruprasath and B. N. Karthik

View:    Abstract |  HTML Full Text |  PDF |  XML|

The vulnerability of Cloud Computing Systems (CCSs) to Advanced Persistent Threats (APTs) is significant. So a cloud architecture reference model that incorporates a wide range of security controls and best practices, and a cloud security assessment model – Cloud-Trust – that estimates high level security metrics to quantify the degree of confidentiality and integrity offered by a CCS or cloud service provider (CSP) is used. Cloud-Trust is used to assess the security level of four multi-tenant IaaS cloud architectures equipped with alternative cloud security controls and to show the probability of CCS penetration (high value data compromise) is high if a minimal set of security controls are implemented. CCS penetration probability drops substantially if a cloud defense in depth security architecture is adopted that protects virtual machine (VM) images at rest, strengthens CSP and cloud tenant system administrator access controls, and which employs other network security controls to minimize cloud network surveillance and discovery of live VMs

Hide Abstract

Text Based Image Compression Using Hexadecimal Conversion

Hema Suresh Yaragunti1, and T. Bhaskara Reddy2

View:    Abstract |  HTML Full Text |  PDF |  XML|

Easy and less-time-consuming transmission of high quality digital images requires the compression-decompression technique to be as simple as possible and to be completely lossless. Keeping this demand into mind, we proposed the lossless image compression technique i.e Text Based Image Compression using Hexadecimal Conversion (TBICH).   The key idea is to increase redundancy of data presented in an image to get the better compression. We are concerned with lossless image compression in this paper .Our proposed technique is Text Based Image compression using Hexadecimal conversion (TBICH). Our approach works as follows: firstly an image is encoded and converts it into text file by using hexadecimal numbers and LZ77 text compression is applied on this encoded file to reduce size. While decompressing, decompress the encoded file and convert into image which is same as original image. The main objective of this proposed technique is to reduce the size of the image without loss and also to provide security.

Hide Abstract

The Moderating Effect of Knowledge Stocks Capability ‎ on the Relationship Between Business Process Reengineering Factors and Organizational Performance Services Firms

Osman Khalifa1, Siddig Balal Ibrahimand Abdel Hafiez Ali2

View:    Abstract |  HTML Full Text |  PDF |  XML|

The purpose of this study is to analyze the potential effect of knowledge stocks in the relationship of Business Process Reengineering and the organizational performance. Business Process Reengineering constructs are change management systems and culture, organizational change, top management commitment, information technology infrastructure, and management competence. To analyze this objective, this study reviews various literatures and developed a research model. To examine the research model, Data was collected through a hand-delivery method by sending questionnaires to 221 firms (Financial, Communication and Education). This study used purposive sampling proportionate to the numbers of the firms for sample selection. The findings showed that knowledge stocks moderated the relationship between Business Process Reengineering factors such as change management system and culture, organizational change, top management commitment and overall organizational performance of the firms. Furthermore, the result revealed that knowledge stocks moderated the relationship between management system and culture, organizational change, top management commitment and organizational performance. The outcome of this study provides interest insight to researchers for understanding on the effects of Business Process Reengineering and knowledge stocks on organizational performance

Hide Abstract

Context Driving Speed Limit Alert, Synchronized Monitoring System

Abedalhakeem T. E. Issa

View:    Abstract |  HTML Full Text |  PDF |  XML|

Safe people transportation and Commitment to the specific speed limits is a big challenge facing the individuals and governments any time anywhere. Roads and Traffic control lie at the heart of the modern civilization, the integration of Geographic Information System (GIS) and Global Positioning System (GPS) technologies together can be achieved by a variety of ways and their applications are numerous [1].

Supervision and Management transportation systems are too many, which can efficiently observe and control the vehicles location, speed, traffic congestion and delay and so. GIS and GPS technology attached with wireless communication that are essential to the system for determining the vehicle location and speed and from the data collected by GPS receiver and that stored in Databases we can derived a lot of useful information in observing and managing transport [4].

In this paper, we determining the vehicle Context Driving Speed Limit Alert (CDSLA), one of the possibilities of the system are to provide a warning alarm to the driver when exceeding the speed limit somewhere En routecontravention in that place, Record and save the average speed En route of its primary functions. The proposed system entirely based on the integration of GPS and GIS.

Techniques to handle the huge amount of data associated to digital road maps and data that received from the GPS belongs to the coordinates and speed, in order to trace the accurate position within a reasonable time is Became possible Techniques progression.

To reduce the size of the collected data and processed information by the system has been relying on a client/server technology, the idea is to use two integrated databases the first one for the spatial data processing and the second is for textual as an alternative database to store text coordinates and related information of the spatial data to eliminate the processing time of GIS data, and a cache method to improve the system performance [4].

Hide Abstract

A Comparison on Different Image Completion Methods

Merin Varghese, Sherin Chacko Thomas, S.Manimurugan

 

View:    Abstract |  HTML Full Text |  PDF |  XML|

Image inpainting and geometric rearrangements are closely linked and can be understood simultaneously with the use of algorithms and shift map. This paper also discusses the formulation and algorithm of inpainting by correspondence map with the clear cut notations and equations. The correspondence map is defined as linking each and every blank or missing pixel to the some pixels, where that pixel’s value is in the seed image. Here the algorithm is a descent for E(F). This paper also describes a new representation of geometric rearrangement of images using operations such as graph labelling as part of image editing, where the shift map represents the selected label for each output pixel. Pixel rearrangement, pixel saliency and removal, smoothness term for pixel pairs is described in detail.

Hide Abstract