International Journal of Engineering Research in Computer Science and Engineering:



ISSN:

2394-2320

Number of Papers:

318

Journal Site:



5G Wireless Mobile Network

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

MS. S. Pavithra | MS.J.Uma Sawmiya, MS.R.Bavani , MS.Smitha

Abstract

5th generation mobile network or simply 5G isthe forthcoming revolution ofwireless technology.It is beyond the thinking of normal human.With its ultra-high speed ,it changes the usability of a mobile phone.

6*6 Radom Color Grid Authentication (2 Step)

International Journal of Engineering Research in Computer Science and Engineering, Available online 4th August 2017

Sudershan M | Veena Potdar, Madhu B

Abstract

Security in the computer is largely supported by passwords for authentication process. Use of alphanumeric passwords is the most common Authentication method. This conventional authentication method has been shown to have significant drawbacks. To overcome the vulnerabilities of traditional methods, numerous graphical password authentication systems have been proposed. These graphical passwords are usually seen as complex and time consuming. Furthermore, the existing graphical passwords are susceptible to spyware and shoulder surfing attacks. In this paper we propose this novel graphical password scheme to abolish well known security threats like brute force attacks, dictionary attacks, phishing attacks and spyware attacks.

A Brief Review On The Application Of Swarm Intelligence To Web Information Retrieval

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Ramya C | Dr. Shreedhara K S

Abstract

Web Information Retrieval process has become one of the most focused research paradigms because of large quantity of growing web data as internet is ubiquitous. To this distributed, uncertain and volatile data, accurate and speed access is required. So there is a need to optimize the search process using some efficient approaches. For such novel approach a literature survey is presented on evolutionary bio-inspired Swarm Intelligence techniques to optimize search process in Web Information Retrieval Systems.

A Combination Technique of Multi-wavelets and Interpolation for Resolution Enhancement of Digital Images

International Journal of Engineering Research in Computer Science and Engineering, Available online 27th July 2017

Sreeletha S H | M Abdul Rahiman

Abstract

This paper explains the effect of various multi-wavelet interpolation methods on digital images to enhance the resolution of the images. A high resolution image is a major challenge for any image processing application, especially in defense and medical scenario. Here resolution enhancement technique is done in wavelet domain using multi-wavelets and interpolation methods. Visual perception of an image has to be improved by various enhancement techniques since the hardware image acquisition methods drops to a limit. Some spectral and spatial problems such as motion blur, pixilation and poor perception may still prevail in digital images which requires rectification before processing further. The Super Resolution images are generated by applying enhancement techniques on a set of noisy and blurred low resolution images . In this paper, some of the resolution enhancement techniques such as Discrete Wavelet Transform, Stationery Wavelet Transform and a combination of DWT and SWT with various interpolation techniques are experimented. The DWT-SWT with Bilinear interpolation method illustrates the improvement in the resolution factor of the image, thereby improving the visual perception of images

A Data Centric Access Control Solution with Role Based Expressiveness for Protecting User Data on Cloud

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th August 2017

Nisha Ranjan Sah | Tejashwini P, Veeresh S, Yathish,Mrs. Prema.

Abstract

Most current security solutions are based on perimeter security. However, Cloud computing breaks the organization perimeters. When data resides in the Cloud, they reside outside the organizational bounds. This leads users to a loss of control over their data and raises reasonable security concerns that slow down the adoption of Cloud computing. Is the Cloud service provider accessing the data? Is it legitimately applying the access control policy defined by the user? This paper presents a datacentric access control solution with enriched role-based expressiveness in which security is focused on protecting user data regardless the Cloud service provider that holds it. Novel identity-based and proxy re-encryption techniques are used to protect the authorization model. Data is encrypted and authorization rules are cryptographically protected to preserve user data against the service provider access or misbehavior. The authorization model provides high expressiveness with role hierarchy and resource hierarchy support. The solution takes advantage of the logic formalism provided by Semantic Web technologies, which enables advanced rule management like semantic conflict detection. A proof of concept implementation has been developed and a working prototypical deployment of the proposal has been integrated within Google services

A Data Centric Access Control Solution with Role Based Expressiveness for Protecting User Data on Cloud

International Journal of Engineering Research in Computer Science and Engineering, Available online 11th August 2017

Nisha Ranjan Sah | Tejashwini P, Veeresh S, Yathish, Mrs. Prema.

Abstract

Most current security solutions are based on perimeter security. However, Cloud computing breaks the organization perimeters. When data resides in the Cloud, they reside outside the organizational bounds. This leads users to a loss of control over their data and raises reasonable security concerns that slow down the adoption of Cloud computing. Is the Cloud service provider accessing the data? Is it legitimately applying the access control policy defined by the user? This paper presents a datacentric access control solution with enriched role-based expressiveness in which security is focused on protecting user data regardless the Cloud service provider that holds it. Novel identity-based and proxy re-encryption techniques are used to protect the authorization model. Data is encrypted and authorization rules are cryptographically protected to preserve user data against the service provider access or misbehavior. The authorization model provides high expressiveness with role hierarchy and resource hierarchy support. The solution takes advantage of the logic formalism provided by Semantic Web technologies, which enables advanced rule management like semantic conflict detection. A proof of concept implementation has been developed and a working prototypical deployment of the proposal has been integrated within Google service

A Detailed Study on Fundamentals Characteristics and Functional Operations of Manet

International Journal of Engineering Research in Computer Science and Engineering, Available online 22nd August 2017

Narayanasmy Rajendran | Dr. E.R.Naganathan

Abstract

A MANET is a collection of independent mobile nodes that communicates with each other through wireless medium. The MANET architecture is dynamic in nature, the nodes act as transmitter and receiver. The vehicular ad hoc network topology changes frequently due to the dynamic nature of the autonomous mobile nodes. MANET is exposed to multiple kinds of attacks due to its fundamental characteristics like no security mechanism, dynamic topology, no central control devices and open wireless medium. The impact of attacks affects the security, quality of service and the performance of MANET. MANET is the best alternative for developing countries where communications infrastructure doesn’t exist. To understand the how MANET is created, configured and controlled we need to understand the following area: MANET Architecture, Clustering Formation, Identification of Host and IP address auto configuration, Handover mechanisms on MANET, Routing on MANET, MANET file sharing, Different types of attacks and Security on MANET.

A Detailed Study on Security Threat Analysis in Wearable Devices

International Journal of Engineering Research in Computer Science and Engineering, Available online 5th August 2017

Srimanth DS | Sudhanva Krishna V, Vishwajith M V,Venkatesan S

Abstract

Wearable devices can be anything from small wrist-mounted systems to bulky backpack computers. Wearable device is a combination of devices typically a belt or backpack PC, head-mounted display, wireless hardware and some input devices. The fundamental principle of wearable device is to collect data ubiquitously and continuously, about the individual user and also their surroundings. This can pose many privacy challenges and are hindered by poor security. They are not mature yet in term of device security and privacy acceptance of the public. Low processing power of wearable device leads to developer’s inability to implement certain complicated security mechanisms and algorithms on the device. This paper analyzes various security issues and attacks on the user’s data

A Dual Band Microstrip Double Slot Antenna for Wi-Fi and WIMAX Applications

International Journal of Engineering Research in Computer Science and Engineering, Available online 30th June 2017

N.Parthiban | Dr. M. Mohamed Ismail

Abstract

In this paper a dual band microstrip slotted antenna is proposed. This antenna has a simpler structure than other antennas designed for realizing dual band characteristics. Simulation studies of the proposed structure are studied and analyzed using High Frequency Structure Simulator (HFSS) software. The design antennas are then fabricated and tested using Vector Network Analyzer. We obtained good results in testing. The radiating patch is placed on a FR-4 dielectric substrate ( =4.3, tan δ = 0.02) with conducting ground. The Co-axial feeding technique is used. In the Operating frequency range of 2.4-2.48 GHz, have a return loss of less than -10 dB for Wi-Fi applications. Operating frequency range of 2.66-2.77 GHz, 4.28-4.4 GHz and have a return loss of less than -10 dB for WIMAX applications.

A Flexible Approach of Mobile Cloud Computing and Big Data Analytics for Networked Healthcare Applications

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th June 2017

Hemalatha T | K Venkata Chalapathi

Abstract

Now a day’s Mobile devices were rapidly growing as indispensable part in our daily life, facilitating to do various useful tasks. Mobile cloud computing combines mobile with cloud computing to enlarge their capabilities, benefits and reduces their limitations, like battery life less memory and CPU power. Big data analyzing technologies facilitate extracting value from data consisting four Vs: volume, velocity, variety and veracity. This paper focuses networked healthcare as well as the task of mobile cloud computing and big data analytics in its enablement. The inspiration and development of applications over networked healthcare and systems were offered along with the adoption of healthcare cloud. A cloudlet based infrastructure of mobile cloud-computing to be utilized for healthcare. The methods, tools, and applications of big data analytics were focused. Experimental results are considered in the design of networked healthcare systems with big data as well as the technologies of mobile cloud-computing.

A Futuristic Approach for Towerless Mobile Networks Contributing to Digital India

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Jyothi Sulochana | K Hemavathi ,P Kalamani ,Lorate Shiny

Abstract

This project is an attempt to develop the mobile networks to have a wireless voice call happening without the help of the towers. Our main aim is to remove the towers in the communication process. The towers have been hazardous to many birds and animals. This project uses the Raspberry Pi boards with the inbuilt wi-fi on board. The Raspberry Pi with the wi-fi is used for the prototype, which would be used to develop a voice call application which would transfer the voice through the wifi communication. It is proposed to develop this technology to be able to access only till the distance of 30 meters which is the distance limit of the wi-fi communication. It would be possible to move this communication to be expanded by the use of the Wimax technology which would be able to communicate in the range of kilometers. This project uses two Raspberry Pi kits with Wi-fi inbuilt on it and would be able to communicate by developing the voice call application and would be able to use the audio jack on the kit. A hardware implementation would be developed and the results would be analyzed for performance.

A Honeypot based Attack Detection and Prevention System for Smart Cities Networks

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Rohit Kumar | Surbhi Khare, Deepa Kale

Abstract

In today’s world, technology is changing almost every second day. This rapidly changing technology offers lots of benefits but also put some great challenges. Smart city is a concept that merges various Information and Communication Technology (ICT) and Internet of Things(IoT) based service solutions, together. Thus, the concept of smart cities uses all possible technologies in the state-of-the-art form. Hence, there is a need to make sure that the no one could use our networks for their own benefits. Malicious users always wait for the perfect opportunities and attack on the most vulnerable part of the network. A strong defense mechanism is needed to defend against them, otherwise the concept of smart cities would only be a chaos. In this paper, we will explain the different types of possible attacks, analyze them and will propose a mechanism to defend against them, based on Honeypot based services.

A Literature Study on Selenium Webdriver 2.0

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Ms.R. Anitha | 

Abstract

Selenium is a open source automated testing suite for web applications across different web browsers and platforms. It is similar to HP Quick Test Pro but the Selenium focuses on automating web-based applications. The testing is done by using selenium is called selenium testing. This paper studies on selenium Webdriver 2.0 which uses mozilla firefox browser and how it is implemented by using Eclipse IDE. WebDriver calls the Web browser directly and all the test script is executed similarly to make the automation.

A Multi-Authority Access Control System in Cloud Computing Using Network Security

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th August 2017

Ms. Vibhute Shubhangi Prakash | Prof. Mr. Kale Navnath D.

Abstract

Data access control is an efficient way to provide the data security in the cloud.and Attribute-based Encryption (ABE) technique cryptographic conducting tool to guarantee data owners direct control on their data in public cloud storage. In this paper, from another point of view, system lead an edge multi-power CP-ABE access control plan for open distributed storage, named TMACS. In TMACS, exploiting (t; n) limit mystery sharing, When system verify to the user the TTP work like a SDN. Its having data controller that can evaluate the each request base on ad-hoc data table, if user is authenticated system can provide the access to specific user. Besides, by proficiently joining the customary multi-power plan with system, system build a half and half one, which fulfils the situation of traits originating from various powers and accomplishing security and framework level strength. The network security mechanism also fulfil with this approach, the system has evaluate on physical network environment with 2 to 4 physical devices and got satisfactory results than existing TMACS

A New Optimization Technique for Performance and Energy Preservation In Cloud

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Javed Hussain | Durgesh Kumar Mishra

Abstract

The rapid growth of the computational requirement need to develop effective and efficient technologies for serving better. In various research domains in computational cloud the security, resource utilization and energy preservation are the main area of research and development. In this paper we are going to discuss the capability of optimization algorithm for scheduling the resources and allocating the virtual machines for improving the performance and energy efficiency of the computational cloud. Therefore the detailed discussion on the required objectives and the solution formulation is provided. In further the simulation technique of the proposed model and their results are also reported for analysis. According to the gain performance and experimental observations the proposed technique is suitable for both the kinds of resource scheduling and optimization.

A Novel Approach For Image Security

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th August 2017

Jyoti T. G. Kankonkar | Nitesh Naik

Abstract

Image security is a major concern as the digital communication and digital data is growing rapidly. Image data is generated in loads every day. We need faster and robust mechanisms to secure the image data. Various fields such as military scopes, security firms, social network etc. need systems that can protect the images while communicating and data transfers. In this paper the proposed idea involves use of image encryption using chaotic approach with a combination of image stitching mechanism. This unique combination provides double layered protection to the images. In order to transfer an image, the image is first partitioned, encrypted and then transferred making it difficult for attackers to access the whole image. On the other end, the encrypted image is decrypted using a symmetric key generated using chaotic approach that uses logistic map function and linear feedback shift register which is followed by image stitching procedure..

A Novel Approach to Student Information Broadcasting via GSM Network

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Mr. Ankit Pande | Mr. ShubhamKakade ,Mr. Kushal V. Kothari, Mr. Akshit Wankhede , Dr.NitaThakre

Abstract

Broadcasting of Student information via GSM Network is a modern approach to send the academic information to the parents in regular manner. This will be helpful for parents to receive on demand service of information regarding daily progress of student like Attendance, exam forms, Examination marks, Event in college, Placement related Info, Fees information etc. As the information world is changing into digital, it is important to transform the information stored in colleges in traditional manner into digital manner. As the information stored into digital manner will be available at 24*7. GSM network is one of the low cost technologies which is helpful to broadcast the information stored in central database in rapidly.

A Proposal for Epidemic Prediction using Deep Learning

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Sagar Palao | Abhishek Shahasane,Siddhesh Dighe, Harsh Gupta,Anjali Yeole

Abstract

HealthCare has been a surging need in India. The inception of Smart India, Smart Villages has further emphasized the need of a Smart & Healthy India. However little reflection of such digitally empowered country has been seen in the field of healthcare. This has further increased the importance of the definition of ubiquity of information and computing technology in healthcare that demand constant surveillance and vigilance of healthcare to predict epidemic outbreak and biological attack. The paper’s primary focus is to analyze and determine the spread of diseases and epidemic in cities/villages. And using this analysis to predict where the next outbreak of epidemic will be. This prediction helps the health authorities to take necessary action in terms of assuring that sufficient resources are available to suffice the need and if possible stop the occurrence of such epidemic by taking necessary actions. To achieve this, we use deep neural network as the heart of our prediction. It receives its training from the past experiences of data which we have collected from hospitals and our spread network. Using this training with our dynamic data it makes predictions as well as adaptively learns from the real time data.

A Report on Business Intelligence The Role of Data Analysis and Data Mining in Contemporary Organizations and The Ethical Implications of Collecting, Storing and Using Data

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th August 2017

Mr. Richardson Lawrence | 

Abstract

Diabetic Retinopathy (DR) is an eye disease due to diabetes which causes visual loss. So it is rational to provide treatment for DR at first stages of disease. Hemorrhages are the first symptoms that signify person have diabetic retinopathy. Therefore, their recognition is very essential. In this paper image contrast is improved by pre-processing and then blood vessels are detected as the boundaries of hemorrhages are not differentiate when they are in contact with blood vessels.then classify the image on the basis texture feature such as area, standard deviation etc. finally normal, moderate or Severe DR is detected on the basis of texture feature

A Review of Digital Watermarking and Its Techniques

International Journal of Engineering Research in Computer Science and Engineering, Available online 16th August 2017

Anu | 

Abstract

This is agreed by one and all that today’s era is IT oriented and Internet has reached to every corner of our lives. Communicating over Internet or networks is a routine for us, this leads to the need of transmission security and safety of our confidential information which is being communicated. Digital Watermarking is a medium to assure integrity, piracy detection and knowing any kind of tempering done with the communicated data. It is also used for applications like owner’s authentication, copyright maintenance and monitoring broadcasts. In this paper we will review digital watermarking with its techniques, applications, classification and factors effecting watermarking

A Review on Comparative Study of Various Rating Systems

International Journal of Engineering Research in Computer Science and Engineering, Available online 21st July 2017

Dakhole Namita.G | Gadgil J.M

Abstract

Now a days building energy efficiency rating system have been developed worldwide to manage the energy consumption of existing buildings. There are various rating systems accepted in India like LEED, GRIHA and IGBC which have their various rating criteria and rating thresholds. These various certification programs are dedicated to the design sustainable buildings by incentivizing reductions in energy, water, and building materials consumption, while at the same time enhancing occupant health and overall community connectivity. The increasing population growth, demands for buildings, services and comfort, which results in an increasing energy demand. For this reason design of energy efficient buildings are the main objective of upcoming era. The rating systems mainly focuses on energy efficiency, the reduction of the use of resources, water and materials, as well as the reduction of impacts on human health and the environment during the building's lifecycle. In this research paper, various studies are discussed related to comparison of green ratings in various countries and the performance of green buildings. This shows that various rating systems emphasizes on different criteria according to their priorities whereas, criteria should be set according to the topographical and climatic conditions of particular place

A Robust Encryption and Searching System to Share Confidential Data onto the Cloud

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Mr. Thejas S | Dr. G. Raghavendra Rao

Abstract

as cloud computing provides storing and sharing records via a cloud service because of on demand resource access and elasticity. For secure record sharing requires encryption of records before outsourcing. Key management system is one of the important aspects of the system. For sharing large number of documents, each record needs to be encrypted using different keys. Since to decrypt these records requires all keys which is very different task. Hence this approach uses aggregated key system, which aggregates all the keys. Later at the time of decryption of all records it requires one aggregated key. Considering large number of records in the cloud. For the efficient access of these records, it is necessary to search for the records over encrypted file. For this purpose , required to build for the index file. Multi keyword entries searches for the relevance record by matching keywords with the index file

A Secure Deduplication Mechanism for Sensitive Data in Public Cloud Storage

International Journal of Engineering Research in Computer Science and Engineering, Available online 4th August 2017

Deepa P.B | Dr.Rudramurthy M.S

Abstract

nowadays, cloud-based services are gaining more importance in leveraging services for large scale storage and distribution. These provide cost effectiveness, time saving and efficient utilization of computing resources. Many enterprises have decided to envision a staged migration for their data to public cloud, for better management of backup data. As data progressively grows, the cloud storage systems continuously face challenges in saving storage capacity. Data Deduplication gives solution to such challenges. It is a data compression technique for eliminating the redundant data. Assuming that cloud service provider may not be trustworthy (i.e. is honest but curious). The security, bandwidth and latency are of top concerns for an enterprise to store sensitive data in the public cloud storage. Considering these security challenges, we propose and implement a client side deduplication scheme for securely storing enterprise sensitive data via the pubic cloud. Efficiently and reliably managing the huge number of convergent keys by the user is a critical issue. Hence we have built a system where each convergent key is secured and the same is outsourced to the cloud. To avoid the weakness of convergent encryption, double encryption is done. By following this method, we can save storage space and cost. It also reduces bandwidth and ensures better confidentiality towards unauthorized users.

A Secure Parallel Network File System using Protocols

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Digambar Waghole | Jabbar Tamboli, Shrutika Chintal , Supriya Vinode , VaishaliShinde

Abstract

We examine the issue of key foundation for secure numerous correspondences. The issue is enlivened by the multiplication of huge scale dispersed file frameworks supporting parallel access to numerous capacity gadgets. Our work concentrates on the present Internet standard for such file frameworks, i.e. parallel Network File System (pNFS), which makes utilization of Kerberos to establishparallelsessionkeys between clientsandstoragedevices. Our survey of the current Kerberos-based convention demonstrates that it has various impediments: (i) a metadata server encouraging key trade between the customers and the stockpiling gadgets has overwhelming workload that confines the adaptability of the convention; (ii) the convention does not give forward mystery; (iii) the metadata server creates itself all the session keys that are utilized between the customers and capacity gadgets, and this naturally prompts key escrow. In this paper, we propose a mixed bag of confirmed key trade conventions that are intended to address the above issues. We demonstrate that our conventions are fit for decreasing up to give or take 54% of the workload of the metadata server and simultaneously supporting forward mystery and escrow-freeness.

A Smart Automatic Mains Failure Panel with Diesel Generator Control and Wi-Fi

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Abhijith Mohanan. N | Kiranlal. C, Anju, G.R, Krupa Mariam, Jacob, Sharmila

Abstract

This paper focuses on the development of a smart Auto Mains Failure (AMF) panel meant for day to day electrical applications. AMF panel is unavoidable in industries, hospitals, educational industries etc. where generator is compulsory. It acts as the switching mechanism between the generator, load and the main power supply. It ensures consistent power supply to the load. An AMF panel, which can be controlled from a distance using Wi-Fi is presented here. The proposed system displays the generator parameters and indicates the type of fault in the supply mains and saves energy. The hardware model of the system is explained, which can be used for the validation of the results.

A Study in Knowledge Acquisition in AI Systems through Genetic Algorithms

International Journal of Engineering Research in Computer Science and Engineering, Available online 12th June 2017

Kumar Shekhar Singh | 

Abstract

Knowledge Base in an integral part of any AI system. Knowledge Acquisition refers to purposeful addition or refinements of knowledge structures to a knowledge Base. However knowledge acquisition is a complex and difficult task for AI researchers.Machine learning is the autonomous/mechanical procedure involving computers through which an AI. System itself enriches its knowledge Base.A useful taxonomy for machine learning is one that is based on the behavarioul strategy employed in the learning process. Some important conventional methods depending upon the degree of inference procedure are memorization, Analogy Inductive &Deductive inference.Attempts to develop machine learning systems began in 1950s. These design included self Adaptive system which modified their own structures in an attempt to produce an optional response to some input stimuli.Genetic Algorithms (GA) are based on population genetics. GAs learn through crossovers and mutations to provide optimum results. Higher performing knowledge structures can be mated (cross-over) to give birth to offsprings which possess many of their parent traits. Generations of structures are thus created until an acceptable level of performance has been reached. The following paper presents a study in different aspects of implementation of GAs for knowledge Acquisition in AI systems

A Survey of Recent Approaches for Detection of Alzheimers Disease

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Arpita Raut | Vipul Dalal

Abstract

Alzheimers is a progressive and irreversible neurological disease. It is the most common cause of dementia in people of the age group 65 years and above. Detection of Alzheimers disease in the early stage is very crucial as it can prevent serious damage to the patients brain. Many different methods have been proposed to detect Alzheimers disease. In this paper, we have surveyed different techniques and approaches for detection of Alzheimers disease.

A Survey of Routing Protocols in Mobile Ad Hoc Networks

International Journal of Engineering Research in Computer Science and Engineering, Available online 11th July 2017

Sahana T S | Sandhya A S, Pooja B N,Priya J, Mrs. Sheela Devi.M

Abstract

Mobile Ad Hoc Network (MANET) is collection of multi-hop wireless mobile nodes that communicate with each other without centralized control or established infrastructure. The wireless links in this network are highly error prone and can go down frequently due to mobility of nodes, interference and less infrastructure. Therefore, routing in MANET is a critical task due to highly dynamic environment. In recent years, several routing protocols have been proposed for mobile ad hoc networks and prominent among them are DSR, AODV and TORA. This research paper provides an overview of these protocols by presenting their characteristics, functionality, benefits and limitations and then makes their comparative analysis so to analyze their performance. The objective is to make observations about how the performance of these protocols can be improved.

A Survey on Artificial Intelligence In Internet of Things

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

S.Thyanesh Pandi | K.Niranjana, R.Vignesh, R.Abishek, J.Suriya Prabha

Abstract

IOT is the internetworking of things that collects and exchanges information from the environment. AI, on the other hand, is the engine or the brain that will enable analytics and decision making from the data collected by IoT. In other words, IoT collects the data and AI processes this data in order to make sense of it. The AI and IOT systems are working together in devices like fitness trackers and Google Home. AI can be used to make inferences about this data and summarize it before transmitting it to other devices. This would reduce the flood of data to a manageable level. This would enable the attachment of a larger number of devices to the network. This paper describes the advantages, applications, analysis and result of using Artificial Intelligence in Internet of Things.

A Survey on Electroencephalography (EEG)-Based Brain Computer Interface

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

K.Aparna | R.Chandana Priya

Abstract

In this paper the main objective is to develop a system which allows disabled people to communicate with other persons and helps to interact with external environment and also to establish a communication system which will translate the human intentions reflected by brain signals into analog speech signals those are audible via speakers. Brain–computer interface i.e., (BCI) is a new emerging area is mainly for the patients in the treatment bed. TheBrain Computer Interface will receive brain signals, analyze them, and then translate them into commands those are transfer to output devices which will carry out desired actions. Electroencephalography records the brain’s electrical activity, obtained by firing of neurons within the brain. If, we find out the difference in those low signal frequencies, those will yields to design a BCI. Based on variation in those frequencies, human thoughts can be recognized as a prototype mechanism.

A Survey on interactive multi-label segmentation using cellular automata

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th August 2017

Monika | 

Abstract

Image segmentation is the process of partitioning a digital image into multiple segments. The goal of segmentation is to change the representation of an image into more meaningful and easier to analyze format. There are various interactive approaches to segment the area of interest from the given image. In this paper a survey on various image segmentation techniques has been performed and the methods are classified and compared as per the techniques used. The results of the segmentations are also compared both quantitatively and qualitatively. This survey provide a base for the future research in field of image segmentation.

A Survey on Reversible Image Data Hiding with Contrast Enhancement

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

SK Taj Mahaboob | Shaik Baba Fakruddin

Abstract

The main aim of this paper is to explain different watermarking techniques. In this paper we will give an overview on different types of techniquesused for preparation ofreversible data hiding and explain the significant growth in reversible watermarking and increase of embedding payload in the host image withoutdistortion in many fields. The paper focus on comparative analysis of different watermarking techniques and explaining their significance briefly

A Survey On Secure Connectivity Techniques For Internet Of Things Environment

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Mr. Vikram Neerugatti | Dr. A. Rama Mohan Reddy

Abstract

Internet of things involves network of Nodes (sensors, Actuators, fog, cloud etc). Sensor node is a small in size, computing power and storage capacity is less. Due to this nature of Sensor the security module is not incorporated in it. So IoT Nodes has more scope for the Intruders, to attack the systems by using this weak connection of Nodes. Lot of research work has to do in this area, to establish a secure connectivity among various IoT nodes. While accomplishing the secure connectivity of things in IoT, need to consider all the security parameters like (confidentiality, authentication, integrity, etc.). The existing techniques/ Algorithms for secure connectivity of devices are not developed for nodes that which used in an IoT technology and not deal with all security parameters. This paper addressed the various existing secure connectivity techniques with advantages and disadvantages, that which is used to direct Research towards development of secure connectivity Techniques for IoT nodes.

A Survey on Security Features Based on Some Interactions and TheirRespective Co-Operation in Handheld Devices for Communication

International Journal of Engineering Research in Computer Science and Engineering, Available online 5th August 2017

Arogia Victor Paul M | Numan Shaikh, Sharon M, Anil Sagar T, S. Venkatesan

Abstract

Since from the last decade mobile communication and its usage have grown drastically, also it has become a serious business tool nowadays. Mobile devices are the major platform for the users to transfer and exchange a very huge and critical data for communication. Also most of the communications are based on handheld devices like smart phones, palmtops, tablets etc. These devices are variably used for applications like banking sector, personal digital assistance, remote login, m-commerce, e-commerce, internet access, entertainment and also medical usage. However due to usage of handheld devices rapidly, there might be a security issues which might restrict the usage of mobile devices. This article survey gives some basic glimpses about the security features such as authentication, authorization, privacy, confidentiality, and data securityin handheld devices and it briefs an idea on how to overcome various issues like threats and vulnerabilities that effect the human interactions and their cooperation using handheld devices, and also it provides various solutions to the mobile devices ensuring security.

A Survey on Security Issues in Cloud Computing

International Journal of Engineering Research in Computer Science and Engineering, Available online 30th June 2017

D.Divya | T.Lakshmi

Abstract

Cloud computing is a rising innovation worldview that moves ebb and flow mechanical and figuring ideas into utilitylike arrangements like power and water frameworks. Mists draw out an extensive variety of advantages including configurable registering assets, financial reserve funds, and administration adaptability. In any case, security and protection concerns are appeared to be the essential impediments to a wide selection of mists. The new ideas that mists present, for example, multi-tenure, asset sharing and outsourcing, make new difficulties to the security group. Tending to these difficulties requires, notwithstanding the capacity to develop and tune the safety efforts produced for customary processing frameworks, proposing new security strategies, models, and conventions to address the interesting cloud security challenges. In this work, we give a far reaching investigation of distributed computing security and protection concerns. We recognize cloud vulnerabilities, arrange known security dangers and assaults, and present the best in class practices to control the vulnerabilities, kill the dangers, and adjust the assaults. Moreover, we examine and distinguish the constraints of the present arrangements and give bits of knowledge without bounds security points of view. At long last, we give a cloud security system in which we exhibit the different lines of barrier and recognize the reliance levels among them. We recognize 28 cloud security dangers which we arrange into five classifications. We additionally introduce nine general cloud assaults alongside different assault episodes, and give viability examination of the proposed countermeasures

A Survey on Travel Based Application using Social Media

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Shanker Shalini | Dr.M.Sheerin Banu

Abstract

Big data provides analysis of large amount of dataset and accurate result can be obtained using this dataset analysis. When considering travel application many user opt for static travel planning without any now feature that incorporates in the application. Blindly they agree any travel plan thats been listed in the application. In this paper various analysis is done and survey is been done to make user friendly travel application so that user can specify their Point Of Interest (POI) and as such planning is done dynamically based on users location with the help of geo-tagging and collaborative filtering. We find here what are all recommendation system that can suitable to incur in the travel application with the help of geo-tagging and location based filtering. Thus to find user friendly travel based application this survey is done.

A Survey on Water Quality Analysis for Industrial Application under IOT Environment

International Journal of Engineering Research in Computer Science and Engineering, Available online 6th July 2017

P.Kalamani, | Divya R Krishnan, Meghana B.V, Mary Theresa M, Himadri Sengupta

Abstract

Internet of Things (IoT) is global network of “smart device” that can sense and interrelate with their environment using the internet for their communication and interaction with users and other systems. The traditional method of testing Turbidity, PH & Temperature is to collect samples manually and then send them to laboratory for analysis. However, it has been unable to meet the demands of water quality monitoring today. By manually monitoring the water quality is very time consuming as well as its complicated to get water parameter in real time. To overcome this a set of Monitoring of Turbidity, PH & Temperature of Water quality are going to be placed in the reservoir as the variations in these parameter will get to know the presence of pollutants. In this paper a new approach has been adopted to analyze the quality of the water under IoT environment. The proposed system contains data acquisitions node, controlling unit as ARM, base station and monitoring unit, where all these units are connected to each other .Data can be collected from various sensor and each sensors has its own way to read the data about physical phenomenon ,so necessity to write diverse code for each sensor for data collection procedures. Meanwhile to control and to do some pre-processing work MCU unit has been adopted, after data collection from various sensor such as its Temperature, Turbidity, PH, etc at base station is sent to display on monitoring node and also compared with standard values .By continually monitoring water quality people get awareness locality water condition so we can minimize its critical effect on human life ,filed, animals etc with high frequency.

A survey on Wireless Sensor Network Attacks And Defenses

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Pramod Nath | Pragya Rajput

Abstract

Wireless Sensor Networks (WSN) are combination of several thousand sensor nodes that have several capabilities such as to detect, to sense, to monitor, to process and to compute. WSN have many applications in real time scenarios such as in military, industries, health care and so on. WSN has infrastructure less structure, so the ability to cope with the node failure, fault tolerance and its security attack are the main concern. The sensor nodes are more vulnerable to security threats and attacks because of the harsh and hostile environment. Efficient implementation of different security protocols has huge impact to adverse the potential threat. The main aim of this paper is to present security issues and challenges faced by WSN. This paper explains attacks in WSN, its flaws and their countermeasures that can be used to handle the pitfall.

Aadhaar and Server based Electoral system

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Yugansh Garg | Sakshi Mishra

Abstract

This paper describes an advance Aadhaar and server based electoral system for Indian elections. The voting systems in an easier way that all voter can cast votes via biometric Aadhaar based authentication .It provides a higher security pre-casting which could reduce the chances of temperance as a simultaneous backup is created at State/Central level servers. In this system we renounce the use of traditional voter ID cards and election voter verification list. This method would help us to eliminate invalid votes, ends booth capturing and makes counting easier, faster and accurate

Agribot-“Future Farmer’s Friend"

International Journal of Engineering Research in Computer Science and Engineering, Available online 6th July 2017

P.Santhi Priya | Angel Prescilla Jean Pierre, Somdutta Bose, Dilli Babu.U, Indumathi.K

Abstract

This robotic vehicle is an agricultural machine of a considerable power and great soil clearing capacity. This multipurpose system gives an advance method to sow, plough, water and cut the crops with minimum man power and labour making it an efficient vehicle. The machine will cultivate the farm by considering particular rows and specific column at fixed distance depending on crop. Moreover the vehicle can be controlled through Bluetooth medium using an Android smart phone. The whole process calculation, processing, monitoring are designed with motors & sensor interfaced with microcontroller

Agrikart: A New Revolution Agriculture

International Journal of Engineering Research in Computer Science and Engineering, Available online 11th July 2017

Dr. B Shadaksharappa | Mr. Venkatesh Kumar M, Rajesh G,S Srijayanth, Mrs. Myneni Chandana, Chaithra R S

Abstract

The project is based upon Wireless Sensor Network and an android based interface. The advanced development in wireless sensor networks can be used in monitoring various parameters in agriculture. Due to uneven natural distribution of rain water, it is very difficult for the farmers to monitor and control the distribution of water to agricultural field as per the requirements of the crop. There is no ideal irrigation method for all weather conditions, soil structure and variety of crop cultures. The sensors are used to collect various data which is to be then analyzed. The android interface provides the farmer with a framework to communicate with experts and get immediate response. It also provides them detailed information about the governmental policies which they can make use of. The main motive of this idea is to provide the analyzed soil sample and the best suggestion on which crop will minimize the cost and maximize the profit. The application also gives specific weather predictions for the day/week. Details on agricultural loans with their interest rates are also shown in the android application interface. This project aims to reduce the stress and problems that adversely affect the farmers resulting in the loss of crops and human lives.

Algorithm for Protection of Key in Private Key Cryptography

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Neha Tyagi | Ashish Agarwal, Anurag Katiyar, Shubham Garg,Shudhanshu Yadav

Abstract

This paper is in reference with our previous paper entitled “Protection of Key in Private Key Cryptography” published by “International Journal of Advanced Research” in Feb 2017 edition... In this paper we have tried to devise an algorithm that would protect the key in transmission, as in the era of digitization, threats to information security instigate the concerned people to take proactive measures for communication between two communicating parties. Since our major focus is on the symmetric key cryptography, also called as private key cryptography, we have studied different techniques of securing a private key or shared key or secret key that are used to shield information in such systems. The different statistical data being published so far and recent phishing scam which plays with the information transfer by taking away the user’s identity highlights the need to make our security measures strong enough to counter such unwanted accesses. After looking into the functioning of widely accepted protocols and thinking of introducing a few changes to enhance their functionality, we here, are going to focus mainly on application of asymmetric key cryptographic algorithm named RSA algorithm. We have already referred to suggestions by means of several research papers being published so far related to our area of interest such as N-Prime RSA, magic rectangle, etc. We have tried to present a method taking one step ahead in the available sketch and without diminishing the basic essence of the algorithm. We also refer to some examples and its application as thought of in its modified form to further support our idea.

Algorithms for Underwater Video Enhancement

International Journal of Engineering Research in Computer Science and Engineering, Available online 14th July 2017

Ketan Awade | Tejashree Badve, Mohit Dhale, Prof. S. M. Kulkarni

Abstract

The paper describes the techniques for underwater images and videos enhancement. Initially the conventional approaches like wavelength compensation and image dehazing (WCID), dark channel prior method, contrast limited adaptive histogram equalization (CLAHE) have been studied and analysed. Analysis of all the three methods have highlighted the shortcomings of the individual methods. The fusion method is described in this paper which has exhibited comparatively better results for the enhancement of underwater images and videos. In the proposed method the inputs are taken from the degraded images, the colour correction and the contrast enhancement techniques are applied on the input image. The weighted maps are used for increasing the visibility of the degraded object due to absorption and scattering. The resultant output is characterized by lower noise, improved contrast and better exposed dark regions.

Amalgamation of Mind Wandering with Military and Defence

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Priyanka Tripathi | Tanu Varshney, Priyanka Chaudhary , Vimal Singh

Abstract

In this paper we are going to present, how to curb the affect of mind wandering during military training and in the field of defence. Basically, mind wandering software will check the ability to stay focused on the task and make t imely decisions. This paper also discuss about the different types of training that is provided to the soldiers and about the consequences of the mind wanderi ng pills.

An Approach for Managing Different Applications Using Centralized Load Balancer in Cloud

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Abhishek | Akash Kumar , Kunal Gautam, Suresh, Mrs Vani.K.A

Abstract

The data centers and end users are distributed across the globe in a large cloud environment. It is a tiresome situation for cloud data centers to serve huge requests coming from these end users. As a consequence, load balancing mechanism is used to distribute the loads efficiently and effectively among different nodes. To achieve high user contentment and high resource employment ratio, load balancers are used. In this paper we have used a central load balancer to balance the loads among different virtual machines in cloud data centers.

An Assimilated Face Recognition System With effective Gender Recognition Rate

International Journal of Engineering Research in Computer Science and Engineering, Available online 24th June 2017

K. Akhil Sreenivasulu | L. Guru Kumar, Dr. G. Harinatha Reddy

Abstract

Gender Recognition in Face Recognition System has prevalent applications in the fields of demographic data collection, video surveillance, security, retail advertising and marketing and it also plays a vital role on object recognition in robot research area, which has shown an intensive attention in the past few years.However, face recognition is still a challenging task since face images are easily confused by changes of the facial factors, such as illumination, pose, the different expressions, or glasses. The goal of this paper is to improve the effectiveness of gender recognition when there are affected(blurred) images in the dataset. We applied novel descriptor based COSFIRE filters to achieve the Gender Recognition[1] in the Face Recognition System. A COSFIRE filter is trainable, in that its selectivity is determined in an automatic configuration process that analyses a given prototype pattern of interest on FERET training set. Extensive experiments were conducted on the GENDER-FERET dataset which contains 474 training and 472 test samples and demonstrated robustness and effectiveness of the proposed model. It also outperforms an approach that relies on handcrafted features and an ensemble of classifiers

An Efficient and Reliable Diverse Keyword Ranked Search Scheme Over Ciphered Cloud Data

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th August 2017

Ms. Shruthi | Mehul Bhatt, Pushpa J, Sobin Baby, Akhil K. Manoj

Abstract

Due to the increasing popularity of cloud computing, more and more data owners are motivated to outsource their data to cloud servers for great convenience and reduced cost in data management. However, sensitive data should be encrypted before outsourcing for privacy requirements, which obsoletes data utilization like keyword-based document retrieval. In this paper, we present a secure multi-keyword ranked search scheme over encrypted cloud data, which simultaneously supports dynamic update operations like deletion and insertion of documents. Specifically, the vector space model and the widely-used TFxIDF model are combined in the index construction and query generation. We construct a special tree-based index structure and propose a “Greedy Depth-first Search” algorithm to provide efficient multi-keyword ranked search. The secure kNN algorithm is utilized to encrypt the index and query vectors, and meanwhile ensure accurate relevance score calculation between encrypted index and query vectors. In order to resist statistical attacks, phantom terms are added to the index vector for blinding search results. Due to the use of our special tree-based index structure, the proposed scheme can achieve sub-linear search time and deal with the deletion and insertion of documents flexibly.

An Efficient and Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud

International Journal of Engineering Research in Computer Science and Engineering, Available online 22nd August 2017

Nagesh S | A H Shanthakumara

Abstract

In cloud giving security, ensures for the sharing information record. Sadly, in view of0the continuous variation of the participation, allocation files while giving protection careful is so far a difficult issue, specially for an untrusted0cloud on account of the arrangement assault. In this exploration work, we propose an ensured information sharing course of action for dynamic individuals. Right off the bat, we propose a protected course for key appointment with no secured correspondence channels, and the clients can safely get their private keys from social event boss. Moreover, our course of action can complete fine-grained find the opportunity to control, any client in the party can utilize the source in the cloud and denied clients can't get to the cloud again after they are repudiated. Thirdly, we can shield the plan from intrigue strike, which proposes that deny clients can't get the exceptional information record paying little regard to the probability that they outline with the untrusted cloud. This course of action can accomplish fine practicality, which gathers past clients require not to revive their private keys for the circumstance either another client appreciates the social event or a client is denied from the party.

An Innovative High-Performance E-Governance of Its Citizens To The Services of The Center in Rajasthan State

International Journal of Engineering Research in Computer Science and Engineering, Available online 17th July 2017

Praveen Kumar Sharma | Vijay Singh Rathore

Abstract

The growth of the internet is due primarily to the interests of the private sector, but the Government is now one of the revolutions. Governments all over the world are taking important steps to make their services and on the Internet to provide information. A range of e- Government have taken the initiative to improve the efficiency and effectiveness of the Government's internal operations, communications and civil and transactions of individuals and organizations. The Government of the use of information and communications technology tools to have a significant impact on the development and growth of the country. The importance of the major e-management in the current system is to enable national success and leading countries in this era of the digital economy in the context of government, IT and communications resources, is a concept is called e-governance.The purpose of this paper is to explore the e-Government of Rajasthan is the largest of the National is India. It is a typical task is to explore the integration of e-Government of Rajasthan, still in this article is simply trying to representatives of every aspect of governance in the State of Rajasthan in summary form.

An Intelligent Appliance with Multimedia Capability

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th August 2017

Pooja.N | Ramya Sai.M,Rekha.P,Radha.S

Abstract

Smart refrigeration with the help of a smart fridge is a concept that finds its place in smart kitchens. The smart refrigerator is capable of sensing and monitoring its contents and is also able to remotely notify the user about scarce products via SMS (Short Message Service) and email using a GSM module. It also facilitates the purchase of scarce items by providing a link of the online website for purchase of that particular item. This assessment is done with the help of LDR and micro switches employed as pressure sensors (quantity management), odor sensor (quality management) and RFID (shelf life management). The overall food management is done based on coding done using Keil software for the same purpose.

An Intuitive Architecture for Next Generation Digital Personal Assistants

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th August 2017

Mehul Jain | Utkarsh Bhatia

Abstract

Current voice-based digital assistants despite their claims of being intelligent, lack abilities that a true personal assistant must possess like extendable skill set, dynamic adaptation and high context awareness. In this paper, we highlight some design and implementation requirements that must be met in order for the development of next generation digital personal assistants and propose a general architectural backbone that can be used to make headway for such personalized speechoperated assistive technology. In particular, we confer about issues of extensibility of the skill set used by the digital assistant, hypothesis generation and evaluation, extensive user adaptation, and redundant representations handling in the design. Further, we briefly discuss the research and development directions that are undertaken to tackle challenges put by such a system. We then consider a scenario and illustrate the data flow in our architecture.

An Investigation on Nearest Neighbor Search Techniques

International Journal of Engineering Research in Computer Science and Engineering, Available online 16th August 2017

Upinder Kaur | (Dr.) Pushpa R Suri

Abstract

The goal of Nearest Neighbour (NN) search is to find the objects in a dataset A that are closest to a query point q. Existing algorithms presume that the dataset is indexed by an R-tree and searching a query point q in a large volume of a dataset, is a tedious task that effects the quality and usefulness of the NNQ processing algorithms which determined by the time as well as space complexity. The simplest solution to the NNS problem is to compute the distance from the query point to every other point in the database. However, due to these complexities issue, the various research techniques have been proposed. It is a technique which has applications in various fields such as pattern recognition, moving object recognition etc. In this paper, a comprehensive analysis on data structures, processing techniques and variety of algorithms in this field is done along with different way to categorize the NNS techniques is presented. This different category such as weighted, additive, reductional, continuous, reverse, principal axis, which are analyzed and compared in this paper. Complexity of different data structures used in different NNS algorithms is also discussed.

An Investigation on Nearest Neighbor Search Techniques

International Journal of Engineering Research in Computer Science and Engineering, Available online 16th August 2017

Upinder Kaur | (Dr.) Pushpa R Suri

Abstract

The goal of Nearest Neighbour (NN) search is to find the objects in a dataset A that are closest to a query point q. Existing algorithms presume that the dataset is indexed by an R-tree and searching a query point q in a large volume of a dataset, is a tedious task that effects the quality and usefulness of the NNQ processing algorithms which determined by the time as well as space complexity. The simplest solution to the NNS problem is to compute the distance from the query point to every other point in the database. However, due to these complexities issue, the various research techniques have been proposed. It is a technique which has applications in various fields such as pattern recognition, moving object recognition etc. In this paper, a comprehensive analysis on data structures, processing techniques and variety of algorithms in this field is done along with different way to categorize the NNS techniques is presented. This different category such as weighted, additive, reductional, continuous, reverse, principal axis, which are analyzed and compared in this paper. Complexity of different data structures used in different NNS algorithms is also discussed.

Analysis of Classification Methods for Diagnosis of Pulmonary Nodules in CT Images

International Journal of Engineering Research in Computer Science and Engineering, Available online 12th June 2017

Capt. Dr. S.Santhosh Baboo | E.Iyyapparaj

Abstract

The main aim of this work is to propose a novel Computer-aided detection (CAD) system based on a Contextual clustering combined with region growing for assisting radiologists in early identification of lung cancer from computed tomography(CT) scans. Instead of using conventional thresholding approach, this proposed work uses Contextual Clustering which yields a more accurate segmentation of the lungs from the chest volume. Following segmentation GLCM features are extracted which are then classified using three different classifiers namely Random forest, SVM and k-NN.

Analysis of Data Using Hadoop and Mapreduce

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Bharti Kalra | Dr. Anuranjan Misra, Dr. D. K. Chauhan

Abstract

We are in the world of technology, where data is moving around all the time. This data is becoming bigdata when it comes in huge volume and data can be structured, unstructured or semi-structured. hadoop is the technology to analysis the big data. The objective of this paper is to analysis the data that is collected from the open source using the hadoop and mapreduce programming model.

Analysis of Priority Scheduling Algorithm on the Basis of FCFS & SJF for Similar Priority Jobs

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Chandra Shekar N | Karthik V

Abstract

Scheduling is one of the most important activities of the process manager which take decision to choose which of the process in the ready queue will be assigned to the CPU. There are different types of scheduling algorithms available for taking decision. One of them is Priority Scheduling Algorithm, which is based on the priority assigned to each process. In priority scheduling the Processes are executed on the basis of priority, the process having highest priority is executed first. In case of similar priority FCFS is used. In this paper, the priority scheduling algorithm is used in such a way that, in case of similar priority SJF algorithm is used instead of FCFS and average waiting time and average turnaround time is calculated. The comparative analysis is performed on the SJF based priority scheduling and FCFS based priority scheduling to compare the average waiting time and average turnaround time

Analysis of Priority Scheduling Algorithm on the Basis of FCFS & SJF for Similar Priority Jobs

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Chandra Shekar N | Karthik V

Abstract

Scheduling is one of the most important activities of the process manager which take decision to choose which of the process in the ready queue will be assigned to the CPU. There are different types of scheduling algorithms available for taking decision. One of them is Priority Scheduling Algorithm, which is based on the priority assigned to each process. In priority scheduling the Processes are executed on the basis of priority, the process having highest priority is executed first. In case of similar priority FCFS is used. In this paper, the priority scheduling algorithm is used in such a way that, in case of similar priority SJF algorithm is used instead of FCFS and average waiting time and average turnaround time is calculated. The comparative analysis is performed on the SJF based priority scheduling and FCFS based priority scheduling to compare the average waiting time and average turnaround time

Analyzing Internet DNS (SEC) Traffic with ?R? For Resolving Platform Optimization

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

J Uma Mahesh | Harekrishna Allu , N Chandrakanth

Abstract

This paper proposes to use data mining methods implemented via R in order to analyze the Domain Name System (DNS) traffic and to develop innovative techniques for balancing the DNS traffic according to Fully Qualified Domain Names (FQDN) rather than according to the Internet Protocol (IP) addresses. With DNS traffic doubling every year and the deployment of its secure extension DNSSEC, DNS resolving platforms require more and more CPU and memory resources. After characterizing the DNS(SEC) traffic thanks to reduction in dimension and clustering methods implemented with R functions and packages, we propose techniques to balance the DNS traffic among the DNS platform servers based on the FQDN. Several methods are considered to build the FQDN-based routing table: K- means clustering algorithm, mixed integer linear programming, and a heuristic scheme. These load balancing approaches are run, and evaluated with R on real DNS traffic data extracted from an operational network of an Internet Service Provider. They result in reducing the platform CPU resources by 30% with a difference of less than 2% CPU between the servers of a platform.

Analyzing Internet DNS (SEC) Traffic with ―R‖ For Resolving Platform Optimization

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Uma Mahesh | Harekrishna Allu ,N Chandrakanth

Abstract

This paper proposes to use data mining methods implemented via R in order to analyze the Domain Name System (DNS) traffic and to develop innovative techniques for balancing the DNS traffic according to Fully Qualified Domain Names (FQDN) rather than according to the Internet Protocol (IP) addresses. With DNS traffic doubling every year and the deployment of its secure extension DNSSEC, DNS resolving platforms require more and more CPU and memory resources. After characterizing the DNS(SEC) traffic thanks to reduction in dimension and clustering methods implemented with R functions and packages, we propose techniques to balance the DNS traffic among the DNS platform servers based on the FQDN. Several methods are considered to build the FQDN-based routing table: K- means clustering algorithm, mixed integer linear programming, and a heuristic scheme. These load balancing approaches are run, and evaluated with R on real DNS traffic data extracted from an operational network of an Internet Service Provider. They result in reducing the platform CPU resources by 30% with a difference of less than 2% CPU between the servers of a platform.

Analyzing tweets for Real-Time Event Detection and Development of Earthquake Reporting System

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th August 2017

Sumanth V | Aman A. Saxena, Jeevan B, P. Vinay, [Vageesha N. J.

Abstract

Twitter, a popular micro blogging service, has received much attention recently. An important characteristic of Twitter is its real-time nature. For example, when an earthquake occurs, people make many Twitter posts (tweets) related to the earthquake, which enables detection of earthquake occurrence promptly, simply by observing the tweets. As described in this paper, we investigate the real-time inter- action of events such as earthquakes, in Twitter, and pro- pose an algorithm to monitor tweets and to detect a target event. To detect a target event, we devise a classifier of tweets based on features such as the keywords in a tweet, the number of words, and their context. Subsequently, we produce a probabilistic spatiotemporal model for the tar- get event that can find the center and the trajectory of the event location. We consider each Twitter user as a sensor and apply Kalman filtering and particle filtering, which are widely used for location estimation in ubiquitous/pervasive computing. The particle filter works better than other com- pared methods in estimating the centers of earthquakes and the trajectories of typhoons. As an application, we construct an earthquake reporting system in Japan. Because of the numerous earthquakes and the large number of Twitter users throughout the country, we can detect an earth- quake by monitoring tweets with high probability (96% of earthquakes of Japan Meteorological Agency (JMA) seismic intensity scale 3 or more are detected). Our system detects earthquakes promptly and sends e-mails to registered users. Notification is delivered much faster than the announcements that are broadcast by the JMA.

Android Speech Recognition Based Voice Command Notice Board

International Journal of Engineering Research in Computer Science and Engineering, Available online 6th July 2017

Manikandan J | Sunaina K Bari, Dimple Prasad Hari, Suchithra P, Chaithra N C

Abstract

In this paper, the development of simple and low cost Android based wireless notice board is presented. The proposed system uses either Bluetooth or Wi -Fi based wireless serial data communication. For this purpose Android based application programs for Bluetooth and Wi-Fi communication between Android based personal digital assistant devices and remote wireless display board are used. At receiver end, a low cost microcontroller board (Arduino Uno) is programmed to receive and display messages in any of the above communication mode. Using the developed system, two different applications for displaying messages on a remote digital notice board and wireless person calling has been implemented. The developed system will therefore aims in wirelessly sharing the information with intended users and also helps in saving the time and the cost for paper and printing hardware.

Applications of Computational Linguistics to Language Studies: An Overview

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Sakthi Vel S. | 

Abstract

Computational Linguistics is the scientific study of human languages. It is one of the most relevant interdisciplinary field of Linguistics and Computer science. Intelligent Natural Language Processing (NLP) is based on the science called Computational Linguistics (CL). It is closely connected with General Linguistics and Applied Linguistics. Computational linguistics might be considered as a synonym of automatic processing of natural language, since the main task of computational linguistics is to construct computer programs to process Text/Speech in natural languages [4]. The paper attempts to provide an introductory view about computational linguistics and its various applications to language studies. The paper has three sections. The first section deals with introduction to computational linguistics, its major divisions (applied and theoretical) and some fundamental ideas about the topic. Second section deals with structure of computational linguistics -a tree diagram representation. The third section describes the various applications of computational linguistics in close association with language studies. Finally the paper summed up with conclusion and list of references.

Assessment of the purity of silk and its mixed fabric using image processing in textile showrooms

International Journal of Engineering Research in Computer Science and Engineering, Available online 22nd August 2017

Balaji.V | 

Abstract

In today’s world where there is a lot of interest towards fashionable and expensive clothing ,the quality and purity of the material is expected to be of high standards. Especially when it comes to silk clothing, people always are doubtful about the purity of the material, due to the high costs people invest on such clothing. In this paper we aim at determining the purity of silk clothing by using image processing algorithms .We basically take a microscopic image of the fabric and compare it with a dataset of pure silk fabric images and hence determine the percentage purity in mixed fabric clothing

Aushadh Nishtha: A Mobile Based Application to ensure Adherence to Medication in Chronic Non-Communicable Diseases

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Dr. Ankur Joshi | Manu Gupta, Dr.Soumitra Sethia

Abstract

Medication adherence is both vital and difficult to achieve in case of non –communicable diseases. The challenges arise because of the requirement of behavioural monitoring and continuous scrutiny of the process. This prerequisite to ensure adherence may be addressed by ICT through asynchronous communication via mobile based application. This manuscript describes the conceptual and operation framework of one of the adherence assurance application developed by the authors and investigates further the future prospects of such application.

Automated Tormenting Recognition in light of Semantic-Enhanced Marginalized Stacked Denoisng Auto-Encoder

International Journal of Engineering Research in Computer Science and Engineering, Available online 4th August 2017

Megha Rani Raigonda | Bhavani Namdar

Abstract

Social media now a day is a major communication bridge among peoples almost around the world which helps them to share their day to day activities to the one who is in contact with them in that network; hence it acts as an intermediary among them. As social media have many excellent features for better communication, it does have the many drawbacks which may hurt the intensions of the peoples sometimes due to some weird actions of the users on social media, such as teasing or posting something which hurts the user intensions by using bullying or tormenting words. The major criterion to deal this problem is learning robust representations of texts through text mining concepts in machine learning and NLP. So to prevent this kind of activities on social networks, we are proposing a technique named Semantic-Enhancement for Marginalized Denoising Auto- Encoder(smSDA), which is an extension of the admired machine learning technique Stacked Denoising Auto- Encoder (SDA).

Automatic Image Annotation-A Proposed Method

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th August 2017

Sayantani Ghosh | Prof. Samir Kumar Bandyopadhyay

Abstract

Medical images play a central role in patient diagnosis, therapy, surgical planning, medical reference, and medical training. With the advent of digital imaging modalities, as well as images digitized from conventional devices, collections of medical images are increasingly being held in digital form. It becomes increasingly expensive to manually annotate medical images. Consequently, automatic medical image annotation becomes important. This paper reviews annotation of medical records.

Automatic Soil Moisture Monitoring System

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Khushal G. Katara | Saket C. Joshi,Harsh L. Bhanushali,Bhavishek S. Panikar

Abstract

Irrigation part in farming has always been an important part for farmers. Manual attempts for the irrigation, such as water supply and keeping the records are quite tedious .In order to make it simple and connected to technology, Soil moisture can be detected by soil moisture sensor. This sensor can detect the moisture level of the soil. This can be done automatic with microcontroller, so that whenever moisture level of soil gets low or soil gets dry, Water can be supplied automatically. The android app will store the records and can control the sensor and water pump. This can cut the manual attempts regarding the irrigation and simplify the efforts for farming with technology. Connecting the irrigation with technology makes it to the “smart irrigation”.

“An automated brain tumour detection and severity analysis using ANN”

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th August 2017

Prof. Vrushali Borase | Prof. Gayatri Naik, Prof. Vaishali Londhe

Abstract

A Brain Cancer is very serious disease causing deaths of many individuals. The detection and classification system must be available so that it can be diagnosed at early stages. Cancer classification has been one of the most challenging tasks in clinical diagnosis. At present cancer classification is done mainly by looking through the cells’ morphological differences, which do not always give a clear distinction of cancer subtypes. Unfortunately, this may have a significant impact on the final outcome of whether a patient could be cured effectively or not. This paper deals with such a system which uses computer based procedures to detect tumour blocks and classify the type of tumour using Artificial Neural Network Algorithm for MRI images of different patients. Different image processing techniques such as image segmentation, image enhancement and feature extraction are used for detection of the brain tumour in the MRI images of the cancer affected patients. Detecting Brain tumour using Image Processing techniques involves four stages namely Image Pre-Processing, Image segmentation, Feature Extraction, and Classification. Image processing and neural network techniques are used to improve the performance of detecting and classifying brain tumour in MRI images. MRI scan images are taken for this project to process it.This work presents the artificial neural network approach. It is used to classify the type of tumor in MRI images. The whole system worked in two modes firstly Training/Learning mode and secondly Testing/Recognition mode finally gets a classified output. This paper gives an overview of image segmentation technique based on Particle Swarm Optimization (PSO). PSO is one of the latest and emerging digital image segmentation techniques inspired from the nature. After segmentation features are extracted and submitted to a kernel support vector machine (KSVM).

“Digibin”-a smart way of sorting solid waste

International Journal of Engineering Research in Computer Science and Engineering, Available online 11th July 2017

Dr. B Shadaksharappa | Mrs.V.K Shalini, Meenakshi Allagi,Pallavi V Naik,Bhavya C P, K Harshitha

Abstract

Waste Management is the pervasive problem. Nowadays and rising continuously with rise in urbanization. Waste is always the mixture of different types of material. The main goal of this project is to design and develop a sorting system that is portable and also sorts the waste automatically. It’s an eco-friendly automatic system. With the Proliferation of Internet of Things (IOT) Devices as Such as Smart phones and Sensors, this Project describes the effective management of solid waste using embedded system. The solar panel and H-bridge are used by the motor to make the system portable. The moving system stops when a non-living obstacle arrives and takes a turn. Otherwise gets the inputs from the waste dumped by the person which is detected by the sensor. The sensor sends a signal to micro-controller where it decides the type of waste (biodegradable and nonbiodegradable) and separates it automatically and moves forward. Here the IOT module is used to control and monitor the waste. The system consist of mobile app which receives a message when the dustbin is full (3kg) makes the system to alert and the information is sent to the authority who own the and it resend the meesge to the bin for automatic disposal to the dump site. It even includes database of wastage collection on the particular day.

“Hybrid technique of Image Encryption to Enhance Security”

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th August 2017

Kalyani D. Kadukar | Prof.R. Krishna

Abstract

The aim of this project is related to novel scheme for separable reversible data hiding in encrypted image is proposed, which consists of image encryption, data embedding and data-extraction/image-recovery ,3D chaos generation,3D histogram equalization, row rotation, column rotation and XOR operation phases. Additional message are embed into some cover media, such as military or medical images, in a reversible manner so that the original cover content can be perfectly restored after extraction of the hidden message is called reversible data hiding. Separable reversible data hiding, the name its self indicates that it is a separable reversible data technique .That is it is reversible data technique but which is separable. The separable means which is able to separate .The separation of activities i.e. extraction of original cover image and extraction of payload is done in this method. This separation requires some basic cause to occur. In separable data hiding key explained by Xinpeng Zhang the separation exists according to keys. Digital images has increased rapidly on the Internet. Security becomes increasingly important for many applications, confidential transmission, video surveillance, military and medical applications. The transmission of images is a daily routine and it is necessary to find an efficient way to transmit them over networks

“Implementation of file level and block level deduplication and detecting attacks in cloud environment.”

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th August 2017

Prof. Samita Mokal | Prof. Nilima Nikam, Prof. Vaishali Londhe

Abstract

In cloud computing, security and storage space management techniques are most important factors for improving the performance of cloud computing. Secure deduplication is a technique for eliminating duplicate copies of storage data, and provides security to them. To reduce storage space and upload bandwidth in cloud storage deduplication has been a well-known technique.. The basic idea in this paper is that we can eliminate duplicate copies of storage data and limit the damage of stolen data if we decrease the value of that stolen information to the attacker. This paper makes the first attempt to formally address the problem of achieving efficient and reliable key management in secure deduplication. we propose Sekey, User Behavior Profiling and Decoys technology. Sekey new construction in which users do not need to manage any keys on their own but instead securely distribute the convergent key shares across multiple servers for insider attacker. As a proof of concept, we implement Sekey using the Ramp secret sharing scheme and demonstrate that Sekey incurs limited overhead in realistic environments. User profiling and decoys, then, serve two purposes. First one is validating whether data access is authorized when abnormal information access is detected, and second one is that confusing the attacker with bogus information. We posit that the combination of these security features will provide unprecedented levels of security for the deduplication in insider and outsider attacker..

“Malicious Misbehavior Activity Detection Using Probabilistic Threat Propagation in Network Security”

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th August 2017

Tejaswini S. Akulwar | Associate Prof. P. S. Kulkarni

Abstract

A PTP approach in network security for misbehavior detection system present a method for detecting malicious misbehavior activity within networks. Along with the detection, it also blocks the malicious system within the network and adds it to Blacklist. Malicious node defined as a compromised machine within the network that performs the task provided by i.e. it does not forward the legitimate message to another node in the network or sends some other message to a neighbor node. This system is based on Probabilistic threat propagation. This scheme is used in graph analysis for community detection. The proposed system enhances the prior community detection work by propagating threat probabilities across graph nodes. To demonstrate Probabilistic Threat Propagation (PTP) considers the task of detecting malicious node in the network. Proposed System also shows the relationship between PTP and loopy belief propagation

“Security privacy preserving for content leaks”

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th August 2017

Shradha V. Raghorte | Dr . Rahila Sheikh

Abstract

The information leak of sensitive data on systems has a serious threat to organization data security. Statistics show that the improper encryption on files and communications due to human errors is one of the leading causes of information loss. So there a need tools to identify the exposure of sensitive data by monitoring the content in storage and transmission. However, detecting the exposure of sensitive data information is challenging due to data transformation in the content. Transformations result in highly unpredictable leak patterns. In this paper, it is utilize sequence alignment techniques used for detecting complex data-leak patterns. This algorithm is designed for detecting long and inexact sensitive data patterns. This detection is paired with a comparable sampling algorithm, which allows one to compare the similarity of two separately sampled sequences. The system achieves good detection accuracy in recognizing transformed leaks. It implement a parallelized version of our algorithms in graphics processing unit to achieves high analysis data. In the case of collective privacy preservation, organizations have to cope with some interesting conflicts. For instance, when personal information undergoes analysis processes that produce new facts about users' shopping patterns, hobbies, or preferences, these facts could be used in recommender systems to predict or affect their future shopping patterns. In general, this scenario is beneficial to both users and organizations. However, when organizations share data in a collaborative project, the goal is not only to protect personally identifiable information but also sensitive knowledge represented by some strategic patterns.

Big Data Analysis On Gene Mutation Detection For Bacterial Diseases

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Sharath Kumar S | Sanil A Jain,Veeresh Shenoy S, Vinith G,M Ravi Krishna

Abstract

Big data and analytics is a method of examining a lot of datasets to uncover hidden patterns, market trends, and other useful business information. In a human body, the gene will generate a significant amount of data; the real challenge here is to find, collect, analyze and manage information so that we can avoid the occurrence of the illness and be healthier. Nowadays many people are losing their lives because of bacterial diseases like MRSA, CRE, etc. So we are trying to collect the data sets of a particular disease and analyze it by detecting gene mutation, which helps people to find which gene is the actual cause of the particular disease. Here we will be finding which mutation is responsible for that drug resistance. This drug resistant gene will be found out in a large population. A mutation is the permanent change of the nucleotide sequence of an organism, genetic elements, virus or extrachromosomal DNA. Errors during DNA replication results in the mutation which further undergoes error-prone repair. Through genetic recombination, mutations can involve the duplication of vast sections of DNA

Big Data management in Manufacturing Industries for Internet of Things

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Sabitha M.S | Dr.S.Viayalakshmi ,R.M.Rathikaa Sre

Abstract

In the current scenario, enormous technology improvements are happening in the field of Network communication, cloud computing, Big Data and IoT. Information technology is bringing a new business paradigm by introducing Internet of Technology (IoT). Nowadays adoption of IoT and Cloud computing has become mandatory for the Modern enterprises. The biggest challenge in front of us is handling the IoT generated Big Data. Big Data provides an opportunity to find the insights from the machine generated data that converts the business environments into more agile and it answers the questions which were considered beyond our reach before. This paper focuses on the requirement of IoT and Big Data in the modern enterprises.

Big Data-An Emerging and Innovative Technology: Survey

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Keerthana R | Nandini N,Karthik N S, Divya L ,Mrs Sheela devi

Abstract

This paper is a review of the big data concept, its dimensions, its architecture comparison between the earlier concept and the latest, the storage possible i.e. the databases and origin of big data. The relational database, having rigid schema, has been prevailing since a long time but it is difficult to store the unstructured data in relational database. The unstructured data has mainly text nature or is in the form of logs. Here comes the concept of No SQL databases. Big Data is small data with large data size

Biological Wastewater Treatment Principles

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Ms.P.Sunitha | Prof.D.Usharani, Mr.K.Ravi Kishore, Ms.D.Sucharitha

Abstract

Natural receiving waters including rivers, streams, and tidal areas sustain a background population of microorganisms including bacteria, fungi, and algae. These organisms require energy for respiration and organic carbon food sources in order to synthesize new cells using the following general equation: In the above equation, the microbes occur naturally and consume organic food sources that are naturally present in the water. Some of the carbon matter in the food is biodegraded to release energy that drives the reaction. Energy is released through the biodegradation process by combining part of the organic food source's carbon compounds with oxygen. The by products of this reaction are additional microbial cells and carbon dioxide. Nutrients, primarily nitrogen and phosphorus, complete the reaction and are needed as part of the building blocks used to form new microbial cell tissue. In a clean water environment, the amounts of available organic food supplies are limited. This places a restriction on how fast the above reactions proceeds and also on how many microbes are able to grow. In general, the population of microbes in a clean water environment is restricted to a low background level by the limited amount of organic food that is present. While periodic fluctuations in the food supply may cause brief periods of population swings or declines, the number of microbes in the ecosystem will achieve an equilibrium condition over time that is based on the steady state amount of organic food present. If an artificial organic food supply is allowed to enter the ecosystem, the number of microbes that can be sustained will increase in response to the added food. If the amount of additional food is large, the population of microbes may increase exponentially and will continue to grow up to the point that the amount of food again becomes limiting for the elevated population. Raw sewage contains a high organic carbon content that provides an excellent supply of food for waterborne microbes. If raw sewage is discharged into receiving water, the bacteria population will become elevated in response to the new addition of food. This causes the above biodegradation reaction to proceed rapidly and, in the process, to create larger amounts of new microbes and carbon dioxide. This requires that more oxygen be available for use by the microbes. If sufficient extra food is added by the sewage discharge, the population of microorganisms and the resulting oxygen consumption may proceed so rapidly that all of the receiving water's oxygen is depleted.

Biometric security based on respiration

International Journal of Engineering Research in Computer Science and Engineering, Available online 22nd August 2017

Mr. Shiv Kumar | Dr. Arvind Kumar Sharma, Dr Anil Midda

Abstract

Validation is a major issue to any trust situated processing framework and furthermore a basic part in numerous security conventions. Performing confirmation is famously troublesome. After some customary techniques bio-measurements has been generally utilized and embraced as a promising confirmation strategy because of its favorable circumstances over some current strategies, especially, its imperviousness to misfortunes caused by robbery of passwords and savvy cards."Bio measurements" infers "life estimation" however the term related with the usage of exceptional physiological qualities to recognize a person. It's another approach to confirm validness. Bio-measurements uses natural qualities or behavioral elements to perceive a person. In genuine a Bio-measurements framework is an example ID framework that utilizations different examples, for example, iris designs, retina outline and natural qualities like fingerprints, facial geometry, voice acknowledgment and hand acknowledgment et cetera. Bio-metric acknowledgment framework gives probability to confirm one's personality just by deciding "who these individuals are" rather than "what these individuals have or might be recalled". The very actuality that makes it truly fascinating is that the different security codes like the security passwords and the PIN number could be exchanged among individuals yet the physical qualities can't be. As illustrations portable PCs have a unique finger impression sensor coordinated; banks are beginning to utilize bio-metric information too the attendances in some MNCs are likewise in view of bio-metric framework to maintain a strategic distance from unapproved individual's entrance. In any case, bio-measurements presents its own difficulties, for example, being basic once bargained. Be that as it may, the bio-metric security framework is one of the most secure security frameworks till the date. This paper introduces another sort of biometric security framework in light of human breath.

Biometric template protection techniques: A brief survey

International Journal of Engineering Research in Computer Science and Engineering, Available online 21st July 2017

Shilpa N L | Dr. R Aparna

Abstract

One of the natural and reliable solutions to user authentication problem is biometric recognition. Non universality, intra-class variation etc. are some problems in Unimodal biometric system. Therefore multimodal biometric systems are used to overcome these problems and to increase the level of security. The aim of this paper is to summarize the common attacks against biometric systems (fake biometrics, template modification etc.) and discuss techniques that can be used to counter them. The features that extracted from the biometric samples considered a critical part of biometric system which is called biometric template. Template security schemes are dependent on the overall performance parameters of the system and must be computationally hard to avoid modality reconstruction. This paper also summarizes different biometric template protection schemes (salting, visual cryptography etc.) and discusses their advantages and limitations

Brain Controlled Chess Based on Virtual Reality Control for Paralyzed Patients

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Sindhura Rao | Ashwini S,Kusuma Mohanchandra

Abstract

In this paper, we introduce a game in which the player plays chess by using a brain-computer interface (BCI). The BCI analyzes the steady-state visual evoked potential (SSVEP) responses recorded with electroencephalography (EEG) on the player’s scalp. The single three command control game is specifically designed around an SSVEP-BCI and validated in several EEG setups while using a neurosky headset. As a final step in the validation of the game, a random experiment on a broad audience was conducted with the Neurosky headset in a real-world setting.

Brain Tumor Detection using Image Segmentation

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Siddhi N. Nerurkar | 

Abstract

Image segmentation is a process of partitioning a digital image into N regions. In today’s world, Brain tumor detection using image segmentation is fundamental but challenging problem in field of computer vision and image processing due to the diverse image content, image noise, non-uniform object texture and other factors. Accurate detection of size and location of brain tumor plays a vital role in the diagnosis of brain tumor. There are many image segmentation methods available for medical image analysis but the Region based and Clustering techniques are efficient, fast and accurate. This paper presents the two efficient image segmentation algorithms i.e. K-means and region growing techniques for brain MRI images and compare the two algorithms and determine the best one.

Brain Wave Monitoring By Using Open Source Tools

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

A. H. Pudale | Komal Chandiram Jeswani, Priyanka Omprakash Tapadiya, Sonali Madhukar Kadam, Rama Sambhaji Kambl

Abstract

People have no control over their mental state which may change depending on the circumstances. Therefore monitoring these changes is really important in case of a person suffering from depression, or mental disorder. We aim at developing an android application that will monitor the brain waves and provide an appropriate mental condition depending on the values of the waves obtained. We are developing an android application using android studio and interfacing it with arduino board and EEG sensors using bluetooth. Existing system makes use of this technique just for moving objects depending on the value of the waves. Also existing system monitors the mental condition by using facial expressions, heart rate, body temperature and gestures. There does not exists any application which will allow the users to see their mental condition not in the form of just graph but also actual condition after analysing these graph values. In our project we directly attach the sensors to the head so that we get correct brainwaves. So, that we can monitor and provide an appropriate graph and estimated result.

Captcha as a Graphical Password Authentication System (CaRP)

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Archi Gaikwad | Bijal Parekh, Medha Kona , Shweta Bramhane

Abstract

We face many security breaching issues for our desktop applications and online services. Many internet applications commonly use text based passwords for authentication. Text based passwords are prone to many attacks such as online guessing attacks , relay attacks ,shoulder surfing and are usually hard to remember. Graphical password proves to be a much better alternative to overcome these attacks. This paper introduces the use of Captcha as Graphical Password- CaRP to enhance the security at the time of login. CaRP is the combination of both graphical password and captcha technology. This system allows the user to select different visual login schemes. CaRP is one of the reasonable solutions that provides added security

Challenges and Issues in Big Data Era- A Survey

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Shony KM | Navaneeth Krishnan K,Daniel F Netto

Abstract

Big Data analytics have significant promises in this era of information explosion. Cloud computing, ecommerce , social networking etc. are enhancing importance of big data. However, there are a number of challenges that must be overcome to realize its true potential. Big Data analytic systems use cluster computing infrastructures that are more reliable and available as compare to traditional security analytics technologies. Big data absolutely has the potential to change the way governments, organizations, and academic institutions conduct business and make discoveries, and it is likely to change how everyone lives their day-to-day lives. This will constitute its future scope.

Characterisation of Jute, Areca and Glass Reinforced Polymer Composite

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Muhsin M P | Abee Narayan , Arjun Vijaykumar P,Aboobacker Siddiq KV,Channakeshava R

Abstract

Composite material market is exponentially growing and finding its application in almost every walks of life. Here we prepared three composites of different stacking sequences and fibre reinforcement for our experiment. We have used areca, jute and glass fibres for making a composite with epoxy as resin. Our composites had ten layers of fibre of different stacking sequence for every specimen. Hand layup technique was used for preparing the material. Compression moulding was done on the stacked laminates and the final product was measured to be 30x30x3 mm. the composite then was converted different specimens as per ASTM standards. The tensile and flexural test was done for every combination of specimen and in three different combinations jute+glassfibre reinforced matrix was found to have more tensile and flexural properties. Graphical results were obtained for the tests and analysed and final result was drafted.

Classification of Time Series Trajectories Based on Shape Features using SVM

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Gajanan S. Gawde | Jyoti D. Pawar

Abstract

Classification of time series trajectories is a non trivial problem and few researchers have contributed to this field. Time series trajectories such as Character trajectories, ECG trajectories, Stock Exchange Trajectories need to be classified accurately in order to improve the performance of system. The classification of time\ series trajectories is carried out using different techniques such as Neural networks, Support vector machines, Fourier Transforms and Bayesian Network. Most of the existing classification techniques work on simple features such as co-ordinates, distance, and velocity. These techniques are not able to consider shape features of trajectories and classify the test trajectories. Shape of the time series trajectory is an important feature and can be used in the classification method. A support vector machine is better classification technique compared to the existing techniques. In this paper, we have proposed our novel classification method to classify time series trajectories using SVM with shape as the feature vector for classification purpose. Thorough experimental study was carried out on proposed technique with different datasets. Experimental results shows that SVM technique is better compared to Neural Network, Fourier Transform, Bayesian Network. SVM with shape features is efficient compared to SVM without shape features. We have tested SVM with different kernel functions. Our experimental results show that RBF SVM with shape features method is efficient compared with Linear and Non Linear kernels.

Client Gender Prevision based on the E-commerce Information

International Journal of Engineering Research in Computer Science and Engineering, Available online 19th July 2017

Srinivasa R B.E | Deepika M

Abstract

The Demographic property of clients such as gender, age, and education gives important information for e-commerce service providers or specialists in merchandising and personalization of web applications. However, online clients often do not give this type of information due to privacy and security related reasons. In this we proposed a method for previsioning the gender of clients based o0n their catalogue viewing data on e-commerce systems, such as the date and time of access, list of categories and products viewed, etc. We use a machine learning techniques and investigate a number of characteristics derived from catalogue viewing information to prevision the gender of viewers. Experiments were carried out on the datasets. The results 81.2% on balanced accuracy shows that basic characteristics such as viewing time, products/categories characteristics used together with more advanced characteristics such as products/categories sequence and transfer characteristics effectively facilitate gender prevision of clients

Climate Responsive Smart Homes

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Ar.Rashmi Tijare | Ar.Nikhil Wasade

Abstract

Home Automation is a multidisciplinary. It involves almost all branches of science & engineering. While learning in the urban context of residential design it was realized that the standard of living in terms of quality has come down. Quality, not in terms of material and standard of living or technology, but in terms of the feature of space. Further exploring this topic lead to, the Automation of Building parts so as to suit climate of the region and act smartly according to climatic situation. The study further extends and develops a series of modifying and adaptive elements for residential spaces that are responsive to the climate, lifestyle and its effect.

Clock Power Optimizations in VLSI design at advanced technology nodes

International Journal of Engineering Research in Computer Science and Engineering, Available online 22nd August 2017

Penugonda Ravikumar | Devanga Ampabathini Susmitha

Abstract

Classification of time series data is one of the popular fields nowadays. Many algorithms exist to get accurate and faster result which speeds up the computation. Nowadays E-Commerce sites are providing many user convenient options like recommendations for the products that they are purchasing which are playing key role in attracting the users to visit their sites. All these are happening based on the classification of data. Home automation is one of the evolving technologies in which data storage is important. It will be convenient if we are able to compare test data with limited trained data by preserving accuracy. Some data such as national security, personal information, bank details must be very confidential which has to be stored very securely. These all comes under time series data and data such as images, weather reports, speeches, and satellites data can be converted into time series data. Classification of normal data can be done by normal methods like nearest neighbor but to classify Time Series data by taking all these above features into consideration is difficult because time series data has to convert into structured format and it has to be sort and compare according to time Some existing algorithms are quite good in classifying Time Series data by satisfying some of these features. There are many algorithms which can classify data of different types quite accurately. But all algorithms might not satisfy all factors. So based on type of data we have to choose appropriate algorithm.

Cloud Storage Based on Key-Value Store

International Journal of Engineering Research in Computer Science and Engineering, Available online 14th July 2017

Abhishek Pandhare,  | Mayur Patil, AkshayPandure,Yogesh Pawar

Abstract

Nowadays, cloud-based storage services are rapidly growing and becoming an emerging trend in data storage field. There are many problems when designing an efficient storage engine for cloud-based systems with some requirements such as big-file processing, lightweight meta-data, low latency, parallel I/O, deduplication, distributed, high scalability. Keyvalue stores played an important role and showed many advantages when solving those problems. This paper presents about Big File Cloud (BFC) with its algorithms and architecture to handle most of problems in a big-file cloud storage system based on key value store. It is done by proposing low-complicated, fixed-size meta-data design, which supports fast and highly-concurrent, distributed file I/O, several algorithms for resumable upload, download and simple data deduplication method for static data. This research applied the advantages of ZDB - an in-house key value store which was optimized with auto-increment integer keys for solving big-file storage problems efficiently. The results can be used for building scalable distributed data cloud storage that support big-file with size up to several terabytes

Cluster Based Data Centric Trust Management in VANET

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th August 2017

S.V.Saboji | Bhagyashree K.L

Abstract

Vehicular ad hoc networks (VANETs) require the potential to transform the way people travel through the construction, interoperable wireless communications network that comprises cars, buses, traffic indicators mobiles, and other devices. However, VANETs are susceptible to safety threats due to increasing requirement on communication computing and control technologies In this paper an challenges has been made for create new cluster model for efficient communication among the VANET nodes this paper emphases on data centric trust management system to provide consistent communication between the nodes prevents the malicious nodes, RSU aided scheme help to generate the trust values. Simulation shows the effectively analyze data provided in VANET and correctly establish trust on data.

Cluster Based Data Centric Trust Management in VANET

International Journal of Engineering Research in Computer Science and Engineering, Available online 11th August 2017

S.V.Saboji | Bhagyashree K.L

Abstract

Vehicular ad hoc networks (VANETs) require the potential to transform the way people travel through the construction, interoperable wireless communications network that comprises cars, buses, traffic indicators mobiles, and other devices. However, VANETs are susceptible to safety threats due to increasing requirement on communication computing and control technologies In this paper an challenges has been made for create new cluster model for efficient communication among the VANET nodes this paper emphases on data centric trust management system to provide consistent communication between the nodes prevents the malicious nodes, RSU aided scheme help to generate the trust values. Simulation shows the effectively analyze data provided in VANET and correctly establish trust on data.

Clustering of Labeled And Unlabeled Data By Integrating Pre And Post Clustering Approaches

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Mr.Asadi Srinivasulu | Dr.Ch.D.V.Subbarao,I. Muralikrishna

Abstract

Clustering is the process of organizing objects into groups whose members are similar in some way or differ significantly from other objects. There are two approaches viz., pre-clustering and post-clustering. Pre-clustering is an unsupervised learning that assigns labels to objects in unlabeled data. The important pre-clustering approaches that we have considered are Dark Block Extraction (DBE), Cluster Count Extraction (CCE) and Co-VAT (Visual Assessment of Cluster Tendency). The present work focuses on pre-clustering approach. The limitations of these pre-clustering algorithms are i) DBE can’t handle the large data ii) CCE suffers because of perplexing iii) Co-VAT works with only rectangular data. Our work proposes Extended Dark Block Extraction (EDBE), Extended Cluster Count Extraction (ECCE) and Extended co-VAT to overcome the above said limitations. The following five steps results after integrating pre and post clustering approaches. They are 1) Extracting a VAT image of an input dissimilarity matrix. 2) Performing image segmentation on the VAT image to obtain a binary image, followed by directional morphological filtering. 3) Applying a distance transform to the filtered binary image and smoothing the pixel values on the main diagonal axis of the image to form a smoothening signal. 4) Applying first-order derivative and fast fourier transformation on smoothened signal for detecting major peaks and valleys. 5) Now post-clustering approach i.e. k-means algorithm is applied to the major peaks and valleys in-order to obtain refined clusters. The proposed algorithms viz., EDBE, ECCE and Extended Co-VAT uses VAT as well as the combination of several image processing techniques are applied on various real world data sets like IRIS, WINE and Image Data sets. These extended approaches use Reordered Dissimilarity Image (RDI) that highlights potential clusters as a set of 'Dark blocks' along the diagonal of the image. The simulation results show that EDBE, ECCE, Extended co-VAT outperform DBE, CCE and co-VAT in terms of time-complexity and accuracy of labeled and unlabeled data.

Collective Activity Recognition Using Nave Bayes Classifiers

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Salini. S | Prof.V.S. Mahalle

Abstract

Collective activity recognizing is the action of collecting the individual persons activity and it is distinguished as an atomic activity in isolation. In this paper, our work is based on the object detection and object recognition (ie) tracking is done for a given input video frame. The collective activity computes the class-specific person to person interaction patterns. The multiinteraction response proposed a activity specific pattern for each interaction at the same time Naive bayes classifier is used to track the object and the tracked result is feed back into the recognition part to find category of an object and it is the final result.

Color and Texture Based Image Retrieval Based on Quadtree Segmentation Technique

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th August 2017

Shradha Naik | Prof. Umesh A. Bapat

Abstract

With the increasing demand for need of retrieval of images based on different aspects, properties, characteristics there has been tremendous research going on in the field of Content-based image retrieval (CBIR), also known as query by image content (QBIC). Content here is referred to visual features ie colour, texture, shape, spatial layout of an image which needs to be extracted. This paper proposes a novel approach wherein content based image retrieval is based on color and texture primarily implementing color histogram for color based and gabor filter for texture based retrieval. Colour histogram comprises of two colour models(RGB and HSV). For texture based, Frequency and orientation representations of Gabor filters are similar to those of the human visual system, and they have been found to be particularly appropriate for representing and discriminating texture well . Main aim of this paper is to implement a new technique that is quadtree segmentation on query and database images and then apply feature extraction ie color histogram on all images and match the query and database images using similarity criteria. Similarity metric used in this paper is Euclidean distance. Quad tree is a segmentation technique which divides image into homogeneous blocks. Hence the name Quadhistogram is a new revised technique to implement colour based retrieval under local colour histogram which divides the images into homogeneous blocks and then compute histogram of each block

Combating Mind Wandering in The Area of Academics

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Tanu Varshney | Priyanka Chaudhary, Priyanka Tripathi , Neha Tyagi

Abstract

This paper presents how the wandering mind is linked to the field of academics. We are also going to talk about how can we interpolate memory test in reducing mind wandering. We also mention here the strategies to train our brain. Here we devise the measures to combat mind wandering during studies i.e. Learning Mental Self-Regulation for improved concentration and arranging factors that you can immediately control your mind. Also we will focus on two applications that can be built to study mind wandering.

Combined Economic Load and Emission Dispatch using Cuckoo Search Algorithm

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

MCV Suresh | Dr. Shaik Rafi Kiran

Abstract

This paper presents an application of cuckoo search algorithm for multi-objective optimization problem in power system. Considering the environmental impacts that grow from the emissions produced by fossil-fuelled power plant, the economic dispatch that minimizes only the total fuel cost can no longer be considered as single objective. Application of cuckoo Search algorithm in this paper is based on mathematical modelling to solve economic, emission and combined economic and emissions dispatch problems by a single equivalent objective function. cuckoo search algorithm has been applied to two realistic systems at different load condition. Results obtained with proposed method are compared with other techniques presented in literature. Cuckoo Search algorithm is easy to implement and much superior to other algorithms in terms of accuracy and efficiency.

Comparative Analysis of Heart Disease Dataset using KNN and Decision Tree Classification

International Journal of Engineering Research in Computer Science and Engineering, Available online 12th August 2017

Bhavini Bhatia | Vamika Razdan

Abstract

There are huge amount of data in the medical industry which requires prediction and analysis so that right decisions can be made and help in proper analysis. As the data is large and the decision made by the doctor may not be accurate which may result in failure in some cases and can sometimes put someone's life at stake. Data mining in healthcare is an intelligent diagnostic tool. Heart disease is the leading cause of death in the world over the past 10 years.29.2% of deaths are due to Cardiovascular Diseases(CVD). Researchers have been using several data mining techniques to help healthcare professionals in the diagnosis of heart disease. Decision Tree is one of the successful data mining techniques used. However, most researchers have applied KNN . Number of experiments has been conducted to compare the performance of predictive data mining technique on the same dataset and the outcome reveals that Decision Tree outperforms other predictive methods like KNN, Neural Networks.This research paper intends to provide the knowledge that which data mining technique gives better accuracy and should be used in Heart Disease analysis.

Comparison of Keyword Search and Ranked keyword Search in Cloud Computing

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th August 2017

Kavya H | Prashanth Putta P, Chethan R, Divya D,Vani Saptasagar

Abstract

Cloud computing otherwise known as on demand computing. It provides the services over the internet. It has the provision of facilitating users to store and access their data in and from cloud server by sitting anywhere and on any device. Storing data in cloud server also opens up so many security threats as data is accessed over internet and client has no direct control over data once uploaded into cloud server. We first implement a basic idea for the Single Keyword Search Over Encrypted Data And then Multi-keyword Ranked. Search over Encrypted cloud data (MRSE) based on secure inner product computation and efficient similarity measure of coordinate matching, i.e., as many matches as possible, in order to capture the relevance of data documents to the search query, then we give two significantly improved MRSE schemes to achieve various stringent privacy requirements in two different threat models. Assignment of anonymous ID to the user to provide more security to the data on cloud server is done. To improve the search experience of the data search service, further extension of the two schemes to support more Search semantics is done.

Conjunctive catchword scan with Designated analyser and timing enabled proxy re-encryption method for e-health clouds

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th August 2017

Koustuba A | Lakshmi N,Leelavathi S, Salma Arifa Farzana, Ravindra Prasad S

Abstract

An electronic health (e-health) record framework is a novel requisition that will achieve incredible comfort in health awareness. The protections and security of the delicate data aid the major worries of the users, which will thwart further improvement and broadly reception of the frameworks. The searchable Encryption (SE) plan will be a innovation organization with fuse security protection moreover ideal operability capacities together, which plays a fundamental part in the e-health record framework. In this paper, we present a novel cryptographic primitive named as conjunctive Catchword scan with designated analyzer and timing enabled proxy re-encryption capacity, which is a sort of a time-dependent SE plan. It could empower patients to represent fractional entry privileges to others to perform search operation over their records within a restricted time period. The period of the time for the delegatee to search and decrypt the delegator’s encrypted documents could be regulated. Moreover, the delegatee could be naturally denied of access power after a specified time. It can be backing the conjunctive keywords search and Oppose keyword guessing strike. We define a system model and a security model for proposed plan to indicate that it is an effective plan demonstrated secure in the standard model.

Constant-size cipher text in Cloud computing”

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Mr. Kulkarni O.S | Miss. Jasud D.S,Miss. Gunde P.R,Mr.Chavan A.B,Mr. Patil R.M.

Abstract

Cloud computing refers to the practice of transitioning computer services such as computation or data storage to multiple redundant offsite locations available on the Internet, which allows application software to be operated using internetenabled devices. Clouds can be classified as public, private, and hybrid. Cloud computing and storage solutions provide users and enterprises with various capabilities to store and process their data in third-party data centers. It relies on sharing of resources to achieve coherence and economies of scale, similar to a utility (like the electricity grid) over a network. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. Since the cloud computing environment is distributed and un trusted, data owners have to encrypt outsourced data to enforce confidentiality. To achieve practicable access control of encrypted data in a un trusted environment is an urgent issue that needs to be solved. Attribute-Based Encryption (ABE) is a promising scheme suitable for access control in cloud storage systems. This system proposes a hierarchical attribute-based access control scheme with constant-size cipher text.

Context Aware Personalised Travel Sequence Recommendation using Data Mining

International Journal of Engineering Research in Computer Science and Engineering, Available online 22nd August 2017

Ashitha S | R.Karthika

Abstract

A tailored travel sequence proposal from mutually supportive travelogues and community-contributed photos has been implemented through the project. Topical Package Space containing delegate tags, the Distributions of Cost etc. is excavated to overpass the lexis breach connecting user voyage predilection and trek courses. Famed directions are positioned higher by identifying its analogy amongst User Package and Route Package. Subsequently apex titled routes is optimized with auxiliary approaches with catalogues on alike users online.

Copy- Move Forgery Detection Using Passive Technique

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

U. Neha | K. Priyadharshini, M.Priyanka, K.Kiruthika

Abstract

An extensive growth in digital technology has resulted in tampering of image. Image plays an important role in todays digital world. Powerful image editing tools has made it difficult to determine whether the image is authentic or forged. The main objective of this paper is to detect the forgery in which a part of the image is copied and pasted on to same image without the information of the original image. First, the forged image is segmented. With the help of SIFT features, key points are extracted. The matching process of these key points detects the copy move region.

Cost Effective Voice Controlled Home Automation Using IoT

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Abdul Aziz Md | K Harshasri, K Shanmukharao

Abstract

The Internet of Things is emerging technology as the third wave in the development of the internet. Internet of Things (IoT) is expected to have massive impact on consumer products, business, wider culture, but these are still early days. It has potential for very wide applicability to almost all verticals and aspects of business, industries, manufacturing, consumer goods, supply chains, etc. IoT as a whole is very broad area. This paper focuses specifically to design a voice controlled home automation system which makes operating electrical appliances in home through android application and set up the controlling actions in the mobile. The Bluetooth technology devices are used for home automation in a cost effective manner.

Crawler Bot

International Journal of Engineering Research in Computer Science and Engineering, Available online 6th July 2017

Pankaj kumar dubey | Kiran Kumar H, Dhanashekar K, Keerthi R, Shalini K.V

Abstract

Among the many justifications for using robotics, the most important is to shield people from working in dangerous environments and from handling hazardous materials. From dealing with chemicals that are explosive to handling radioactive substances. The main objective of this project is to minimize human causalities in tragedies. This robot is remotely controlled; self powered and has all the controls like normal car which are controlled by a microcontroller unit. A wireless camera has been installed on it, so that it can monitor surroundings remotely when required. An obstacle sensor is used protect the robot from collision.

Credit And Debit Card Transaction Survey Using Map Reduce In Hdfs And Implementing Syferlock To Prevent Fraudulent

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

R.Anbuvizhi | V.Balakumar

Abstract

Big Data is a term that has jumped overnight from its roots. It can be described as an innovative technique and technology to save, distribute, manage, visualize and analyze larger-sized data with extreme velocity and methods to manage unstructured and structure incapable amount of data. Nowadays fraud transactions in real time are increasing, so identifying large-scale patterns across many transactions or detecting anomalous behavior from an individual user can change the fraudulent in online transaction. Thus banks are turning to analytics to predict and prevent fraud in real times. In this project, proposed system deals with Credit and Debit card management to improve its scalability and efficiency in big data environment, it is implemented on (HDFS) Hadoop distributed file system. On the other hand, nowadays fraudulent and web attacker are increased to steel the password. In order to overcome those, proposed system implements SyferLock concept to add more security to Credit card transaction. The changes include a stronger user authentication tool, SyferLock that will require associates to follow a few new steps when logging into the network remotely. SyferLock patented, random number generation authentication solutions provide next generation One-Time Passwords/PINs (OTPs) for secure access to computers, networks and the Internet. SyferLock has engineered an enhanced authentication methodology and system using device-less OTPs that provides users with a simple, more secure way to access information leveraging their existing passwords. It uses a one-time password that expired once used. This added security strengthens the ability to protect the applications and systems.

Crop Field Analyzer

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Athawale Kiran M. | Shikhare Abhilash D., Dhotre Akash S. , Dhawale Sudarshan U

Abstract

A cloud-enabled mobile app plays an essential role in improving farming activities. This paper focuses on using cloud computing and the Wireless Sensors Network (WSNs) technology to enhance the application and its benefits to the field of agriculture. The paper focuses on the Cloud Database as well as Data Mining which gives details of past agriculture work records of farmers. The farmers who have inserted the system and installed the application on their Smartphones can register the application so that they can access as well as upload the data stored on the server and use the system efficiently. Temperature, Humidity and Soil moisture will be the various WSN's used. The main purpose of the sensors are to sense and measure the environmental parameters and data from the fields. The farmer will get the notifications of condition in his field by these sensors. When the water level in the field reduces, the farmer will get notification, so that he can power ON the motor through his Smartphone. The motor will get power OFF automatically when the sufficient water supply is provided in the farm up to the threshold or particular value. The main objective is to minimize the efforts and time of farmer and perform efficient and systematic farming to increase productivity.

Crowd Analysis using Computer Vision Techniques

International Journal of Engineering Research in Computer Science and Engineering, Available online 5th August 2017

Shivashree G | Dr Anuradha S G

Abstract

Crowd analysis involves the interpretation of data gained studying the natural movement of groups or objects. Crowd analysis presents a survey using computer vision techniques covering different aspects such as people tracking, crowd density estimation, event detection, validation, and simulation. It also has wide range of applications such as crowd management, public space design, virtual environment, visual surveillance and intelligent environment. The major challenge in crowd analysis is the generation of ground thruthed images or video sequences, which can be used either for training or validation purposes

Current Status: Comparative Analysis Of Optimization Techniques Used In Steganography Schemes

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Samadrita Guha | Dipti Kapoor Sarmah

Abstract

Steganography has been used immensely in various fields to maintain the confidentiality and integrity of messages transferred via the internet. The need to hide messages has increased with the increase of fraudulent activities in the cyber space. To diminish the number of such cyber crimes a number of optimized and advanced steganographic schemes have been invented by researchers. This paper presents a comparative analysis among the various optimization techniques that have been applied to steganography to achieve better results in terms of quality, capacity and security of stego objects. All the results compared in this paper have been obtained from the application of optimization techniques on gray-scale images and 2- Least Significant Bit (2- LSB) substitution method .Optimization techniques compared in this paper include Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO), Genetic Algorithm (GA) and also hybrid optimization techniques like PSO-GA, PSO-ACO, GA-ACO. This paper also mentions which optimization technique is best suited for spatial domain image steganography, frequency domain image steganography, watermarking and security against steganalysis techniques based on the studies of research work done previously. The limitations of each optimization technique are provided in this work to help researchers decide which technique to apply in a specific steganography scheme to obtain best results.

Cyberbullying Detection in light of Semantic Enhanced Marginalized Denoising Auto-Encoder

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th August 2017

Cyberbullying Detection in light of Semantic Enhanced Marginalized Denoising Auto-Encoder | Rashmi S Shetty, Sushmitha S Siddanagoudar, Vidyashree.G, Asha.N.

Abstract

As a symptom of progressively prevalent online networking, cyberbullying has developed as a difficult issue afflicting kids, youths and youthful grown-ups. Machine learning methods make programmed identification of harassing messages in web-based social networking conceivable, and this could develop a sound and safe web-based social networking condition. In this significant research region, one basic issue is vigorous and discriminative numerical portrayal learning of instant messages. In this paper, we propose another portrayal learning technique to handle this issue. Our strategy named Semantic-Enhanced Marginalized Denoising Auto-Encoder (smSDA) is produced through semantic expansion of the prominent profound learning model stacked denoising autoencoder. The semantic expansion comprises of semantic dropout commotion and sparsity requirements, where the semantic dropout clamor is outlined in light of area learning and the word inserting system. Our proposed strategy can misuse the concealed element structure of tormenting data and take in a hearty and discriminative portrayal of content. Far reaching investigates two open cyberbullying corpora (Twitter and MySpace) are directed, and the outcomes demonstrate that our proposed approaches outflank other standard content portrayal learning strategies.

Data Gathering and Route Optimization Protocol for Mobile Sink in Wireless Sensor Networks

International Journal of Engineering Research in Computer Science and Engineering, Available online 19th June 2017

B.Bhuvaneshwari | Dr.G.Anna Poorani, V.M.Priyadharshini

Abstract

Wireless sensor networks are the grouping of tiny sensor node collects the information by sensing activeness from the surroundings. The way the sinks are not move freely in the deployed space. The pre-calculated trajectories may not applicable. To avoid this constant sink location updating, by using mobile sinks rather than static for data collection is the proposed system. This project is focusing on moving patterns of the mobile sink to achieve optimized network performance, and also collecting a small area of sensed data in the network.

Data Mining on Privacy Protected Data using Naïve Bayes Algorithm

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Mr. Pankaj Jogi | Mr.Shubham Purankar, Ms. SamikshaPinge,Ms. Urvashi Ingale,Ms. Neha Mahalle,Prof.V.S. Mahalle

Abstract

Data mining has become an essential player in determining future business strategies. Data mining helps identifying patterns and trends from large amount of data, which can be used for reducing cost, increasing revenue and many more. With increased use of various data mining technologies and larger storage devices, amount of data collected and stored is significantly increased. This data contains personal information like credit card details, contact and residential information, etc. All these reasons have made it inevitable to concentrate on privacy of the data. In order to alleviate privacyconcerns, a number of techniques have recently been proposed to perform the data mining in privacy preserving way

Decentralized Trust Management and Trust Worthiness of Cloud Environments

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Qhubaib Syed | Syed Afzal Ahmed,Syed Abdul Haq

Abstract

Now days, cloud computing an ever green technology used by all segment of areas. To choose best cloud service providers trust is an important factor in growing cloud computing. The highly dynamic nature of cloud system services throws different challenges on privacy, security and availability. The communication between consumers and trust management system involves sensitive information that makes the privacy is an important factor. Protecting cloud services from malicious users is a difficult problem. During this paper we tend to planned a brand new approach Cloud Armor, a reputation-based trust management framework that has a collection of functionalities to deliver trust as a service (TaaS), which incorporates i) a completely unique protocol to prove the believability of trust feedbacks and preserve users’ privacy, ii) An adaptive and strong believability model for measure the believability of trust feedbacks to shield cloud services from malicious users and to check the trait of cloud services, and iii) an accessibility model to manage the provision of the redistributed implementation of the trust management service. The practicability and edges of our approach are valid by an example and experimental studies employing assortment of real-world trust feedbacks on cloud services

Deep Web and Dark Web

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Chandra Shekar N | Sugali Vijay, M Balachandra Reddy

Abstract

the Deep Web refers to any Internet content that, for various reasons, can’t be or isn’t indexed by search engines like Google. Which includes dynamic web pages, blocked sites (like those that ask you to answer a CAPTCHA to access), unlinked sites, private sites (like those that require login credentials), non HTML/-contextual/-scripted content, and limited-access networks

Design Analysis of Spoke Type BLDC Motor for Spinning Mill Application

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Shamphavi.S | Manimala.R , Prashanthi.R , Kurinjimalar.L

Abstract

To design a motor that would overcome the drawbacks of the conventional spinning motor and to evaluate the characteristics of the chosen motor with the help of software packages from Infolytica. The motor which is currently used is three phase Totally Enclosed Fan Cooled Squirrel Cage Induction Motor (TEFCSCIM).The motor employed in the spinning machine undergoes partial loads during most of its operating hours.It is noted that the motor efficiency and power factor are poor in the case of partial load. Heat, Sound and Slip of the motor are few factors to be considered for the change in design. The objective of this project is to design a Permanent Magnet Brushless Direct Current (PMBLDC) Motor which would eliminate the above complications. Initially the design has to be analytically arrived and the same has to be scrutinized through the software packages from Infolytica.Critical key parameters such as speed, average and cogging torque has to be accounted in the analysis. Generally, the cogging torque increases with increase in average torque and hence there is a need to modify the rotor parameters such that the former remains low for significant increase in the latter. The software analysis and comparison will be followed by the final design of the spinning motor. We concentrate mainly on the effects of temperature. Temperature is of main concern because more cool the motor is, more efficient it is.

Design and Development of RF energy sensing Circuit Using ADS software

International Journal of Engineering Research in Computer Science and Engineering, Available online 12th June 2017

V. Sai Kiran | P. Vinay Kumar,Yogesh Kumar Choukiker

Abstract

This article mainly focuses on study of RF energy Sensor circuit. We are surrounded with enormous Radio frequency signals, mostly varying in the range of 1 GHz to 3.5 GHz. An RF energy sensing Circuit has been designed, In Advanced Digital Simulation software, to detect the level of signal at a particular frequency and converting RF energy into voltage levels. In order to restrict our circuit to a particular frequency, we have designed a Helical Antenna as a receiver which can send RF power to designed circuit. This antenna is designed with particular dimensions such that it has minimum reflection coefficient at desired frequency, allowing only a particular frequency to reach RF sensing circuit.

Design and Developmentof Token Generate Toll for Future Phone Technologies

International Journal of Engineering Research in Computer Science and Engineering, Available online 5th August 2017

Shreekant | Salotagi,Shridevi Kembhavi,Zarinabegam K Mundargi

Abstract

“Design and Development of Token Generate Toll for future Phone Technologies” project summarizes the various key areas and technologies This Project gives a brief history about to Generate the Token resource files in different languages with respect to default language as US English from TMS sheet. The generic requirements for “Tool” that will be used in LG Android Platform for generation of Token resource files in XML format. It takes TMS sheet and UK English as a reference tokens and generates token resource files in XML format in more than 40 languages. This Project is implemented by using C++ Language on Qt Platform (Tool).. It also gives a good representation of the organizational and the interconnectivity (communication) of the various Languages between Country to country, Engineering and Services Departments. This project mainly deals with creating XML files for generating resources in different languages. Main window of this project contains GUI components like Progress bar, Token Table, Settings and Help Menu. GUI Window display supports horizontal and vertical scroll bars to view the contents. Token Table is the list of Input and output tokens displayed in the GUI display window. Settings menu shows the Tool version name and the Release Date. Help Menu shows the information about the tool components usage. Parses the XML files and extracts the tokens from the resource files. The extracted tokens will be stored in a buffer

Design of Sanitation System in a Village

International Journal of Engineering Research in Computer Science and Engineering, Available online 17th July 2017

Jyothi Sulochana | K Hemavathi ,P Kalamani ,Lorate Shiny

Abstract

This project is an attempt to develop the mobile networks to have a wireless voice call happening without the help of the towers. Our main aim is to remove the towers in the communication process. The towers have been hazardous to many birds and animals. This project uses the Raspberry Pi boards with the inbuilt wi-fi on board. The Raspberry Pi with the wi-fi is used for the prototype, which would be used to develop a voice call application which would transfer the voice through the wifi communication. It is proposed to develop this technology to be able to access only till the distance of 30 meters which is the distance limit of the wi-fi communication. It would be possible to move this communication to be expanded by the use of the Wimax technology which would be able to communicate in the range of kilometers. This project uses two Raspberry Pi kits with Wi-fi inbuilt on it and would be able to communicate by developing the voice call application and would be able to use the audio jack on the kit. A hardware implementation would be developed and the results would be analyzed for performance.

Detection and Diagnosis of Diseases in Cotton Leaf Using Knowledge Based Expert System

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Miss.Sonali Borikar | Miss.Pallavi Khedekar,Miss.Darshana Jangam, Miss.Pallavi Paratwar, Mr.Ketan Bodhe

Abstract

The economy of India is based on agriculture as it is the backbone of the rural livelihood security system. The cotton is mostly used by world and grown in more than 100 countries accounting for 40% than any other fiber of the world fiber market. As managing diseases in cotton crop is a challenging task and cotton crop production in India is important.This propose system focuses on maximizing the cotton crop production, this is the main purpose of this project. Sometimes farmers identify diseases by their experiences with the naked eyes and due to incorrect identification, there will be the possibility incorrect control measurement. By using this propose system farmers can identify cotton crop diseases in early stages & also they are known to the particular diseases of cotton crop. The system is specially proposed for the controlling the diseases in cotton plant. Here the system is consisting of the Knowledge Based Expert System and the inference engine. The inference engine applied logical rules to the knowledge base and obtain the result for detection of diseases.

Detection of Clone Attack in Wireless Sensor Networks

International Journal of Engineering Research in Computer Science and Engineering, Available online 12th June 2017

Vishakha Pawar | Seema Hanchate

Abstract

These Recent trends of wireless communication is Wireless sensor network,this is upcoming technology which has enabled the development of network with huge number of tiny, low power, multitasking sensor nodes. As WSN has broadcast approach, there is a need of security Wireless sensor networks (WSNs) are now used as supporting infrastructure in many applications. Secure communication in WSNs is very important because information sent through these networks can be easily captured or replaced or altered. Clone attack is node replication attack. An adversary can steal a node from the network and altered data from stolen node and can reprogram that node to create a clone of a stolen node. To protect network from clone attack is vital in WSN. The main objective of proposed clone detection protocol is to provide strong protection against clone attacks, high detection probability, low storage requirements with enhanced network lifetime by increasing energy efficiency with distributed detection mechanism.

Detection of Cross Site Scripting Attack and Malicious Obfuscated Javascript Code

International Journal of Engineering Research in Computer Science and Engineering, Available online 5th August 2017

Vrushali S. Bari | Prof. Nitin N. Patil

Abstract

JavaScript is a scripting language. On one hand, it allows developers to create client-side interfaces for web applications. On the other hand, the malicious JavaScript code infects the web user and web browser. In order to detect malicious activities, two methods viz. static and dynamic detection methods have been discussed in the literature. The dynamic analysis method has better capability in detecting malicious activities compared to the static detection method. In this paper, we present a method based on Support Vector Machine (SVM) that would identify the malicious JavaScript code at the beginning itself. In addition, our proposed method supports the analysis of obfuscated code and analyzes the system offline. Further, it analyzes the web pages and identifies the type of attack. However, our focus is on the Cross-Site Scripting (XSS) attack.

Detection of DOS Attacks through Evidence Collection using Dempster-Shafer Theory

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Shradha S. Ippakayal | Geetanjali S. Dhaygude, Vinaya P. Kalyanshetty, Prof. M.N.Ingole

Abstract

MANETs has been experiencing exponential growth in the past decade. Due to their vulnerability to various attack makes extremely prominent for its distributed and independent nature. Among these various DOS attacks black hole, grey hole, and co-operative black hole attack may collapse the network, and this may become a major threat in MANETs. Here we are using Dempster-Shafer evidence based theory to collect various evidences for various nodes in the network against black hole and grey hole attack. For detecting malicious node we used Direct Trust Value (DTV) to detect a single black hole attack. DTV is calculated for each node that exists in the network and then that value is compared against predetermined threshold, if the calculated value is less then predetermined threshold then the node is malicious node.

Detection of Impurity in Liquids Using Electronic Sensor Based System with Infrared Camera and The Real Time Monitoring of Water Qualityin IoT Environment

International Journal of Engineering Research in Computer Science and Engineering, Available online 4th August 2017

Sanjana U Neralkatte | Nittayashree S, Roja K R, Shilpa K, Sushma G S

Abstract

This paper is based on new enhancement technique for infrared images which integrates the benefits of additive wavelet transformation and homomorphic image processing. The main motive behind this technique is to decompose the images into subbands in an additive fashion and the principle adopted to implement the same is using additive wavelet transform which produces the image as an addition of subbands of the same resolution. Drinking water varies from place to place, depending on the condition of the source water from which it is drawn and the treatment it receives, but it must meet EPA regulation. The traditional method of testing Turbidity, PH & Temperature is to collect samples manually and then send them to laboratory for analysis. However, it has been unable to meet the demands of water quality monitoring today. So a set of Monitoring of Turbidity, PH & Temperature of Water quality has been developed. The system consists of Turbidity, PH & Temperature sensor of water quality testing, single-chip microcontroller data acquisition module, information transmission module, monitoring center and other accessories. Turbidity, PH & Temperature of water are automatically detected under the control of single chip microcontroller all day. The single chip gets the data, and then processes and analyzes them. If the water quality is abnormal, the data will be sent to monitoring center and alert the public at the same time

Detection of Red Lesions For Diabetic Retinopathy In Telemedicine Context

International Journal of Engineering Research in Computer Science and Engineering, Available online 2nd August 2017

Kazi Syed Naseeruddin Mustafa | Prof.SushilKumar N. Holambe

Abstract

In this paper we present the Red Lesion Detection for diabetic retinopathy in telemedicine context. The method used in this in this paper is the process of morphological image flooding. The development of an automatic telemedicine system for computer-aided screening and grading of diabetic retinopathy depends on reliable detection of retinal lesions in fundus images Signs of DR include red lesions such as microaneurysms and intraretinal hemorrhages, and white lesions, such as exudates and cottonwool spots. This paper concerns only the red lesions, which are among the first unequivocal signs of DR. Therefore, their detection is critical for a prescreening system

Detection of Red Lesions For Diabetic Retinopathy In Telemedicine Context

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th August 2017

Kazi Syed Naseeruddin Mustafa | Prof.SushilKumar N. Holambe

Abstract

In this paper we present the Red Lesion Detection for diabetic retinopathy in telemedicine context. The method used in this in this paper is the process of morphological image flooding. The development of an automatic telemedicine system for computer-aided screening and grading of diabetic retinopathy depends on reliable detection of retinal lesions in fundus images Signs of DR include red lesions such as micro aneurysms and intraretinal hemorrhages, and white lesions, such as exudates and cottonwool spots. This paper concerns only the red lesions, which are among the first unequivocal signs of DR. Therefore, their detection is critical for a prescreening system

Developing a GIS Platform for Tourism marketing and promotion In Nigeria: Case Study Of Bauchi State

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Abubakar Siddiq Ango | Abdulsalam Waheed Abdulfatah, Idrissa Djibo

Abstract

Tourism has been noted to be one of the important sectors of the Nigerian economy. Tourism is a highly complex activity which requires tools that aid in an effective decision-making to come to terms with the competing economic, social and environmental demands of sustainable development. Geographic Information System (GIS) is one of such tools. GIS being an information system that is capable of answering questions about where facilities and resources are located represents enormous benefits to the tourism sector of any economy. The power of GIS lies not only in the ability to visualize spatial relationships, but also beyond the space to the holistic view of the world with its many interconnected components and complex relationships. The use of GIS technology could assist Bauchi State government as well as the Nigerian government with better planning of tourism infrastructure, location and dissemination of such infrastructure, production of better quality maps showing tourists sites abound in the country because of the dynamic capability of GIS tools to incorporate changes that occur over time to its database. A GIS database for tourism in Bauchi State was created using some selected roads, tourist attractions and facilities with the aid of base maps and GPS. This paper presents the significant role that GIS can play in tourism development in Bauchi State if a complete database for tourism in the State is designed and developed.

Development of Natural Language Interface to Voice Control Smart Environment

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

D.Sucharitha | Dr.M.Humera Khanam, K.Ravi kishore,G.Divya

Abstract

Development of smart home technology changed the human living conditions greatly. In smart home we can control and automate the lighting, heating, ventilation and air conditioning by voice. System can change the state of devices. For remote monitoring of devices we use Wi-Fi of IOT( Internet of Things).In this paper, we provide a natural language interface to control the smart devices, by speaking in the own language. It uses microphone to collect the speech signals and object recognition technology to locate the target object. Finally, SRM (Speech Recognition Module) can communicate with the central control program by socket.

Dictionary Learning Arrangement for Multi-Label Image Annotation

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th August 2017

Yogini B. Bhadane | Prof. Nitin N. Patil

Abstract

The passing keywords to images is of huge attention as it allows one to retrieve, directory and recognize big collections of image data. Various systems have been designed for image annotation that gives a realistic presentation on consistent datasets. Here, studied multi-label image annotation with dictionary learning methods. In multi-label image annotation, new (SLED) semantic label embedding dictionary demonstration used, which is solved the problem of annotation, under the softly supervised situation. Several of the consumers have the skill to produce and store images. Peoples did not spend their time for organizing and grouping their particular (private) image collections. So it's difficult for peoples to finding particular (exact) images. Image annotation contains a number of methods that goals to find the link between words and images. The multi-label image annotation system divided into two branches, i.e. the training branch and the testing branch. In training branch, datasets are divided into exclusive groups. In it, Fisher discrimination law used for the train the label of that image. Then co-occurrence labels would offer the context data of that image. This context data adds into the novel dictionary table. In the testing branch, use label propagation and reconstruction coefficient to get the score of each image labe

Digital Image Watermarking Using QR Code

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Sumedha Nishane | Prof. V. M. Umale

Abstract

In this science era with the development of technology and internet, the protection and authentication of data is essential. Watermarking techniques provide solution to this problem. QR code being so versatile because of its structural flexibility that it leads to so many diverse field for research such as increasing data capacity, security applications such as different kinds of watermarking . We have used QR code as cover image and as secret image to protect it from other users. This paper is representing a new watermarking technique with QR code to protect the secret image. In the method described here the image is first encrypted in random matrix, then it is invisibly watermarked in cover image and no information about the secret image and cover image is needed for extraction of secret image, so it more secure.

Digitalization of Medical Prescription and Localization of Healthcare Products

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

R. Ganesan | E. Kughan , R. Sanjay, S. Arun Karthikeyan

Abstract

This project enables the doctors to send prescription digitally to the patients who are not able to visit the doctor in person and also allows the patients to check the availability of medical products in nearby pharmacies. The conventional way practised by doctors is to write the prescription using pen and paper and also the patient may not know about the availability of these medical products in nearby pharmacies. The use of pen and paper for medical prescription is not encouraged because the prescription might get damaged, lost over duration of time and no further automations/computations cannot be done that limits the scope of pervasive healthcare system. During emergency situations, the patient might not get the prescribed medical products due to lack of availability in nearby pharmacies which lead to severe health issues. This project digitalizes the prescription given by the doctors and also guides the patients to the nearby pharmacies which contain the required quantity of medicines and other medical products. Due to this digitalization of medical prescription, the patients suffering from severe ailments might not strain themselves to consult the doctor in person. This project also enables the user to check for the availability of the required medical products in the nearby pharmacies using GPS and Google Maps implemented in Android platform. It uses an ranking algorithm to enhance the quantity of information which is fetched from the database and presented to the patient. The ranking also uses a credit-based system, which weightage to rating given in recent years. The uniqueness of the project is to design low cost pervasive healthcare inventory automation system.

Disease Inference System based on Health-Related Question Answer system

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Paresh Karande | Manoj Khairavkar, Vinayak Lokhande, Khemchand Mahajan , Rupali Umbare

Abstract

Health is one of the expanding subjects used for assessing health condition among patients who suffer from specific ailment or diseases. We aims to model the relationship between the Health variables using integrated model of inference system and linear regression. Linguistic data were collected by a guided interview and fed into the deep sparse inference system to yield Health indices. We next propose a novel significant learning plan to surmise the conceivable maladies given the inquiries of wellbeing seekers. The proposed plan is embodied two key parts. The main part mines the discriminant therapeutic marks from crude elements. The second esteems the crude components and their marks as info hubs in one layer and concealed hubs in the consequent layer, individually. In the interim, it takes in the between relations between these two layers by means of pre-preparing with pseudo-marked information. Taking after that, the shrouded hubs serve as crude components for the more unique mark mining. With incremental and option rehashing of these two segments, our plan manufactures a scantily joined profound construction modelling with three shrouded layers.

Disruptive Technologies

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Chandra Shekar N | K Anjali, A Pavithra

Abstract

the term "disruptive technology" as coined by Christensen (1997) refers to a new technology having lower cost and performance measured by traditional criteria, but having higher ancillary performance. Christensen finds that disruptive technologies may enter and expand emerging market niches, improving with time and ultimately attacking established products in their traditional markets. This conception, while useful, is also limiting in several important ways. By emphasizing only "attack from below" Christensen ignores other discontinuous patterns of change, which may be of equal or greater importance (Utterback, 1994; Acee, 2001). Further, the true importance of disruptive technology, even in Christensen's conception of it is not that it may displace established products. Rather, it is a powerful means for enlarging and broadening markets and providing new functionality. In Christensen's theory of disruptive technology the establishment of a new market segment acts to channel the new product to the leading edge of the market or the early adopters. Once the innovation reaches the early to late majority of users it begins to compete with the established product in its traditional market.

Disruptive Technologies

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Chandra Shekar N | K Anjali, A Pavithra

Abstract

the term "disruptive technology" as coined by Christensen (1997) refers to a new technology having lower cost and performance measured by traditional criteria, but having higher ancillary performance. Christensen finds that disruptive technologies may enter and expand emerging market niches, improving with time and ultimately attacking established products in their traditional markets. This conception, while useful, is also limiting in several important ways. By emphasizing only "attack from below" Christensen ignores other discontinuous patterns of change, which may be of equal or greater importance (Utterback, 1994; Acee, 2001). Further, the true importance of disruptive technology, even in Christensen's conception of it is not that it may displace established products. Rather, it is a powerful means for enlarging and broadening markets and providing new functionality. In Christensen's theory of disruptive technology the establishment of a new market segment acts to channel the new product to the leading edge of the market or the early adopters. Once the innovation reaches the early to late majority of users it begins to compete with the established product in its traditional market

Dustless Environment by Transportation Means

International Journal of Engineering Research in Computer Science and Engineering, Available online 11th July 2017

Gagana G E | Madhushree P, M Vanishree,Veena R,Mr. T K Pradeep Kumar

Abstract

This is an automated system which will be fitted in the Bus for cleaning the dust particle from environment.The proposed technique is intended to facilitate the user to clean the dust particle through vacuum cleaner. In this system Microcontroller is the main unit, which controls the whole process. We are going to use AVR family microcontroller (ATMEGA 8/ ATMEGA 16). Vacuum Cleaner is used for cleaning the dust particle from road, which is connected with microcontroller. There is a container for containing the dust particle. We are going to use IR sensor for detecting the quantity of dust particle in container. IR sensor will be fitted on the top of container. When the container will be filled with dust container, then the sensor will detect it and send information to microcontroller. The sensor will be connected with Microcontroller .There will be one alert system for giving alert when the sensor will detect the quantity of dust. There will be one manual switch, which will be used for opening and closing of the container. Motors will be fitted on the top of container for opening and closing container.solar panels are placed on roof of the bus for power supply

DWT & SVD Based Watermarking Scheme for Copyright Protection In Medical Images

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th August 2017

Ms. Shubhangi D. Mashalkar | Prof. S. S. Shirgan

Abstract

Watermarking is a popular method for copyright protection. This technique seems to be very popular and helpful for protecting the privacy of patients by doing watermarking procedure on medical images. In this watermarking scheme a text image is created which may vary from patient to patient and is embedded on the MRI images to generate a secure image which contain hidden patient data (not visible to naked eyes). Two methods are implemented for watermarking i.e. Discrete Wavelet Transform and Singular Value Decomposition. The PSNR (between original MRI image and generated secure image) and correlation (between patient text information and extracted watermark image) are calculated to check the robustness and capacity of the scheme.

Dynamic Secret Key Generation for Multi Data User in Cloud Computing

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th August 2017

Chethan R | Divya D, Kavya H, Prashanth,Vani Saptasagar

Abstract

CLOUD computing is a subversive technology that is changing the way IT hardware and software are designed and purchased. Cloud computing provides abundant benefits including easy access, decreased costs, quick deployment and flexible resource management, etc. It has become highly popular for data owners to outsource their data to public cloud servers while allowing data users to retrieve this data. For privacy concerns, a secure search over encrypted cloud data has motivated several research works under the single owner model. However, most cloud servers in practice do not just serve one owner; instead, they support multiple owners to share the benefits brought by cloud computing. In this paper, we propose Dynamic Secret key generation for multi user in cloud computing. To enable cloud servers to perform secure search without knowing the actual data of both keywords and trapdoors, we systematically construct a novel secure search protocol. To rank the search results and preserve the privacy of relevance scores between keywords and files, we propose a novel additive order and privacy preserving function family. To prevent the attackers from eavesdropping secret keys and pretending to be legal data users submitting searches, we propose a novel dynamic secret key generation protocol and a new data user authentication protocol

DYNAMIC SECURE SYSTEM FOR DETECTING AND ELIMINATING FRAUDULENCE IN CLOUD STORAGE

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Kalaivani A | Ranjith Kumar M , Sabarish M , Sai Kishore R

Abstract

When data is hosted by data owners and made available to clients, security challenges are faced. Thus, we need to audit the data to solve security challenges. Existing remote integrity checking methods can only serve for static archive data. Thus, cannot be applied to the auditing service since the data in the cloud can be dynamically updated. Hence, a dynamic System is desired to ensure that the data are correctly stored in the cloud. In this Paper, we create a monitoring tool that detects fraudulent using link analysis and checks for similar details among multiple databases will be created. As there is no interlinking between different banks database an individual can create many accounts with different identity proofs So that they can do malicious activities in the network. To avoid this we use link analysis for finding similarity link in the entire combined cloud stored database. It uses Joint Threshold Administrative Model (JTAM) for authenticating database storage and handles fault tolerance effectively using the monitoring tool

E-Bin for Waste Segregation

International Journal of Engineering Research in Computer Science and Engineering, Available online 11th July 2017

Reji Thomas | Sukanya B, Ishwarya Lakshmi S,Sushmitha K, Archana M

Abstract

An E-BIN is a cheap, easy to use solution for a segregation system at households, so that it can be sent directly for processing. It is designed to sort the refuse into metallic waste, wet waste and dry waste. This employs parallel resonant impedance sensing mechanism to identify metallic items, and capacitive sensors to distinguish between wet and dry waste. Experimental results show that the segregation of waste into metallic, wet and dry waste has been successfully implemented using the E-BIN. In recent times, garbage disposal has become a huge cause for concern in the world. A voluminous amount of waste that is generated is disposed by means which have an adverse effect on the environment. . In India, rag pickers play an important role in the recycling of urban solid waste. Dependency on the rag-pickers can be diminished if segregation takes place at the source level. Currently there is no system of segregation of dry, wet and metallic wastes at a household level. The purpose of this project is the realization of a compact, low cost and user friendly segregation system for urban households to streamline the waste management procesS

Economic Load Dispatch Problem With Valve - Point Effect using Cuckoo Search Algorithm

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

MCV Suresh | M Jyothsna Devi, K Prathibha

Abstract

This paper proposes application of cuckoo search algorithm for solving economic load dispatch problem. cuckoo search algorithm is based on aggressive reproduction strategy of fascinating birds, cuckoos. The proposed approach has been examined and tested with the numerical results of economic load dispatch problems with three and five generating units with valve point loading without considering prohibited operating zones and ramp rate limits. The results of the proposed cuckoo search algorithm are compared with that of other techniques such as lambda iteration, and ABC. For both the cases, the proposed algorithm outperforms the solution reported for the existing algorithms. In addition, the promising results show the robustness, fast convergence and efficiency of the proposed technique

Efficient Access and Revocation System for Dynamic Groups in the Cloud

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th August 2017

Dr.B R Prasad Babu | Kavya.H, Nimisha Antony,Sneha.P

Abstract

Benefited from cloud computing, users can achieve an effective and economical approach for data sharing among group members in the cloud with the characters of low maintenance and little management cost. Meanwhile, we must provide security guarantees for the sharing data files since they are outsourced. Unfortunately, because of the frequent change of the membership, sharing data while providing privacy-preserving is still a challenging issue, especially for an untrusted cloud due to the collusion attack. Moreover, for existing schemes, the security of key distribution is based on the secure communication channel, however, to have such channel is a strong assumption and is difficult for practice. In this paper, we propose a secure data sharing scheme for dynamic members. First, we propose a secure way for key distribution without any secure communication channels, and the users can securely obtain their private keys from group manager. Second, our scheme can achieve fine-grained access control, any user in the group can use the source in the cloud and revoked users cannot access the cloud again after they are revoked. Third, we can protect the scheme from collusion attack, which means that revoked users cannot get the original data file even if they conspire with the untrusted cloud. In our approach, by leveraging polynomial function, we can achieve a secure user revocation scheme. Finally, our scheme can achieve fine efficiency, which means previous users need not to update their private keys for the situation either a new user joins in the group or a user is revoked from the group.

Efficient Bandwidth and Space Utilization Using Object Based Deduplication on the Cloud

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Ms. Uzma madeeha |  Smt. Shabana sultana

Abstract

As cloud computing is mostly used domain now a days, keeping the cloud limitations in mind we try to efficiently utilize the cloud resources by applying basic optimization techniques. Since text data occupy very small space compared to images or multimedia files in general, we come up with some space optimizing and de-duplicating schemes. Instead of traditional techniques of block level de-duplication, we implement a technique where the images are divided into blocks and are given unique hash id and stored in ind ex table. Now instead of sending entire object onto cloud for comparison, we send only index table to check for duplicate entries and eliminate them. This way the bandwidth is very efficiently utilized compared to traditional schemes and also optimizes space utilized in cloud storage systems.

Efficient Video Watermarking and Image Data Encryption Technique

International Journal of Engineering Research in Computer Science and Engineering, Available online 14th July 2017

Priya Sonawane | Sujata Mane, Priya Barhalikar, Reshma Nazirkar,Prof. Aruna Verma

Abstract

Proposed technique is based on DWT, DCT FFT, and SVD. First video is converted into frames. Apply DWT on each frame that will convert it into four sub-band frequency ranges as LL, LH, HL, and HH. Apply again DWT on LL sub-band then it will divide as LL1, LH1, HL1, and HH1 sub band of LL band. After applying DWT at 2-level, apply SVD in LL1 Sub-band, DCT in LH1 and FFT in HH1 sub-band of LL band. Same process will be applied on watermark symbol/image. Embed both host frame and watermark image with some scaling factor ‘α’. For watermarked video arrange all the decomposed matrices using inverse technique. Watermarked video will be generated. To proof of ownership watermarking extraction process would be follow And for proofing robustness and security level of this watermarked technique watermarked video will be compared with original video And NCC, PSNR, BER value would be calculated

Eliminating Duplicate Data in Cloud Storage with Dynamic Ownership and Security

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th August 2017

Dhananjaya M K | Krishna Mohan Shah, Gaurav Bhusal, Kirti Lata,J Meghana Patel

Abstract

Ever increasing volume of back up data in cloud storage may be a vital challenge. There is a need of data management as back up windows are shrinking due to growth of information. So, to make data management scalable deduplication concept is used. It is a technique of keeping only one unique instance of data copy by detecting identical data copies and eliminating those so that it could improve storage utilization, system performance of storage system. There are different schemes introduced by people. This paper surveys these different deduplication approaches.

Emotion Analysis of Social Media Data

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Sonia Xylina Mashal | Kavita Asnan

Abstract

Emotion analysis in text is a trending field of research that is closely related to Sentiment analysis. With the increase of Internet connectivity, all the human interactions has moved to the social media platforms hence a lot of data can be tapped for research purposes. Emotion analysis is carried to study the writer’s state of mind. In this paper social media data is classified into five emotion categories (happy, sad, anger, fear and surprise) using supervised machine learning techniques(Naïve Bayes and Support Vector Machine).

Encryption Protocol for Securing MANET-L to S

International Journal of Engineering Research in Computer Science and Engineering, Available online 11th July 2017

P.N. Sharath sagar reddy | Manasa.S, Anitha A, Jhansi Rani, Sheela Devi,Sowmya.A.M

Abstract

Mobile ad hoc network are a kind of wireless ad hoc network that usually has a routable networking environment on top of a link layer ad hoc network. The technological growth in the field of wireless technologies provides communication between mobile users. Any invention is to say success, only if it is useful in a meaningful manner. Wireless technology is the one that will help an emergency needy like in any natural disaster, emergency rescue operations, military battle-field etc. With the advent of Mobile Ad-Hoc Networks, an immediate self-configuring network can be created. Being an open network, security is the main concern for MANETs. In such situations to protect the confidentiality of the message to be transmitted, cryptography is the one of the solution. The process of converting the original data into a secret form is known as cryptography. It hides the actual information and sends the encrypted message. At the destination end, the message can be recovered by using decryption. Here we are proposing a new encryption technique named as Letter-Shape Encryption. This method exchanges different shapes for letters in a message to be transmitted. This approach is safe against man in middle attacks.

Energy Saving Strategy in Cognitive Radio Networks

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

S.Swathy | Y.Vanmathi,G.Sindhiya, J. Daphney Joann

Abstract

In recent years, the development of intellectual, adaptive wireless devices termed cognitive radios, composed with the introduction of secondary spectrum licensing, has led to a new hypothesis in transportations: cognitive networks. Cognitive networks are wireless networks that consist of several types of users: often a primary user (the primary license-holder of a spectrum band) and secondary users (cognitive radios). These cognitive users employ their cognitive abilities to communicate without spoiling the primary users. The study of cognitive networks is comparatively new and many queries are yet to be responded. In this article we best part some of the recent information theoretic limits, models, and design of these auspicious networks.

Enhanced Active Feature Selection method for Object Tracking

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Sandeep G.S | Sunitha M R , Niranjan Murthy C

Abstract

The key idea of Adaptive tracking is how to train an online discriminative classifier which can well separate object from its local background. The classifier is incrementally updated using positive and negative samples extracted from the current frame around the detected object location. If the detection is less accurate thereby leading to visual drift. Recently, the multiple instances learning (MIL) based tracker has been proposed to solve these problems to some degree. It puts samples into the positive and negative bags, and then selects some features with an online boosting method via maximizing the bag likelihood function. Finally, the selected features are combined for classification. In MIL tracker, the features are selected by a likelihood function, which can be less informative to tell the target from complex background. Motivated by the active learning method, in this paper we propose an enhanced active feature selection approach which is able to select more informative features than MIL tracker by using the Fisher information criterion to measure the uncertainty of classification model. More specifically, we propose an online boosting feature selection approach via optimizing the Fisher information criterion, which can yield more robust and efficient real-time object tracking performance. Experimental evaluations on challenging sequences demonstrate the efficiency, accuracy and robustness of the proposed tracker in comparison with state-of-the-arts.

Enhanced Forensics Enabled Cloud through Secured Logging as a Service

International Journal of Engineering Research in Computer Science and Engineering, Available online 11th August 2017

Ms.D.Gomathi | Dr.B.Mukunthan

Abstract

The principle goal of this venture is to build up a secured logging as an administration in cloud engineering. So in the proposed strategy, security and safeguarding techniques are upgraded. The secured logging contains six noteworthy functionalities to guarantee more securities: Correctness, Confidentiality, information logs, Privacy, Preservation and VPS (Virtual intermediary server). The accuracy manages rightness information of the genuine history. Classification manages delicate data not showing amid seek. Information logs manages the information history for distinguishing fitting clients. Security conspire manages document connecting and information get to history. Safeguarding manages upgraded shading code. Lastly VPS manages the intermediary server for virtual information get to. The usage of the above given strategies are appeared in any condition, which manages enormous number of information with different clients. There are very little contrast amongst programmers and interlopers in the cloud design. Programmers are from different systems mean while interlopers are from same systems. Programmers can be kept away from and gatecrashers are can't be dodged. This is on account of gatecrashers may know about the system where they will interrupt. With the goal that secured logging as an administration is much imperative for all sort of cloud server condition so as to give appropriate login to approved client and triggers out the unapproved clients.

Enhanced Multi-Keyword Ranked Search Manipulations via Cloud Virtualization

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

S.Uma Maheswari | p.priya ponnusamy, dr.r.vidhyapriya

Abstract

The enhancement and the fame of cloud computing are increasing nowadays which is driving the data owners to keep their personal and professional data on public cloud servers With the help of data outsourcing the organizations can provide reliable and efficient services to their users. The other advantage of outsourcing the data over cloud servers is for high benefit and lesser cost in managing the data and the data can be accessed from anywhere and at any time. However, for privacy concerns, the data that are highly sensitive should be encrypted before outsourcing. Taking into consideration the huge amount of data users and files that are present in the cloud, it is important that multiple keywords should be allowed in the searching request and retrieve the files relevant to those keywords. There are some methods and solutions offered to provide privacy and security for the data over the cloud server. However, the data that are sensitive should be encrypted and stored before outsourcing. In this paper, a secure scheme called the enhanced multi-keyword ranked search is presented. In the proposed scheme the search takes place as content based search along with ranking. Based on the content, data is searched and retrieved and then the rank is applied. During searching, attacks might be done by SQL injection to dump the database contents by the unauthorized users or attackers. In this project SQL injection is not allowed. The SQL parameterization technique is used to prove that SQL injection is not possible

ESPY: A Work Monitoring Solution by Facility Mapping of Smart Cities

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Tejashree S. Dhengre | Rishika S. Dubey, Gopal R. Mishra,Swapnil M. Meshram

Abstract

As per the concept of Smart City to provide efficient urban mobility and affordable housing facility, a lot of construction work has begun at different geographical points to turn this concept into reality. Work monitoring of Construction Company by higher government authorities is necessary to get work done quickly, get daily updates and prevent corruption. For this work Construction Company has Site supervisors who provide weekly or monthly updates but process is manual and time consuming. Also, with lots of Construction going on, citizens face severe problems which requires immediate attention of officials. To have an easy interface between Site Supervisors and higher officials of government and also between common people and government we aim to create an Android Application named “eSPY” which will give facility to Site supervisors to daily report the work progress to authority online or offline along with necessary proofs such as geo-tagged image of work done that day, details of expenditure etc. Citizens can use the App to register complaints regarding construction work at any location causing problems. On the other end, a website will be provided to officials for receiving proper report in specific pre-determined format for saving time and quick action. Officials can view received geo-tagged image or can establish a real time video connection to quickly monitor work at various sites. For establishing the connection between Android application and website, WebRTC as technology is used which will provide easy connectivity, less data and efficient offline support

Evaluating Machine Learning Algorithm on Cross- Site Scripting (XSS) Security Vulnerabilities in Web Applications

International Journal of Engineering Research in Computer Science and Engineering, Available online 4th August 2017

Kishan Babu T D | Dr. Jayanna H S

Abstract

In this paper, the prediction and analysis of cross-site scripting (XSS) security vulnerabilities in web application’s source code is demonstrated. Cross-site scripting (XSS) is a security vulnerability that affects the web applications and it occurs due to improper or lack of sanitization of user inputs. There is no single solution that can effectively mitigate XSS attacks. More research is needed in the area of vulnerability removal from the source code of the applications before deployment. Security inspection and testing require experts in security who think like an attacker and locating vulnerable code locations is a challenging task. Alternatively, there are also vulnerability prediction approaches based on machine learning techniques which showed that static code attributes such as code complexity measures are cheap and useful predictors. The main focus is on prediction of XSS vulnerabilities and extracts the relevant features to classify vulnerable source code file from benign one. Attack prevention and vulnerability detection are the areas focused in this study

Exploring Big Data Analytics for Satellite Imagery Data Using Hadoop Technique

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th August 2017

Ch.Rajya Lakshmi | Dr.K.RammohanRao, Dr.R.RajeswaraRao

Abstract

Now a days Big Data has defined very large amount of data, it includes both structured and unstructured format. The structured data analyzing is very easy task but an unstructured data analyzing is very difficult that can be produced by an individuals (eg. Twitter data)it also gathered by sensors(eg. satellites, videos) which can range from giga bytes, tera bytes and peta bytes. Big Data entitles more and more data that can be analyzed through various analyzing techniques. If the right analytic method is applied to unstructured datasets we can easily analyze and classifying various patterns, But at the same time will consider efficiency and scale of Data. In the real world the major issue of Big Data is early warning predictions is the use of Satellite imagery and Radar Sensor data. In the Satellite imagery data could reach a million derived spatial objects such data querying ,managing and various image patterns classification is very difficult task. So a proper architecture should be proposed to gain knowledge about Big Data for analyzing various Satellite imagery patterns classifications with hadoop technology. In the proposed architecture differentiate various classification methods for various satellite imagery pattern classification methods and also proposing Google’s Map reduce C4.5 Algorithm for effective classification to increase performance of patterns classification and increasingly large volume of Data sets to results both time efficiency and scalabilty. This research is carrying based on NASA Satellite data and Twitter data and also in weather forecasting.

Exploring Big Data Analytics for Satellite Imagery Data Using Hadoop Technique

International Journal of Engineering Research in Computer Science and Engineering, Available online 11th August 2017

Ch.Rajya Lakshmi | Dr.K.RammohanRao,Dr.R.RajeswaraRao

Abstract

Now a days Big Data has defined very large amount of data, it includes both structured and unstructured format. The structured data analyzing is very easy task but an unstructured data analyzing is very difficult that can be produced by an individuals (eg. Twitter data)it also gathered by sensors(eg. satellites, videos) which can range from giga bytes, tera bytes and peta bytes. Big Data entitles more and more data that can be analyzed through various analyzing techniques. If the right analytic method is applied to unstructured datasets we can easily analyze and classifying various patterns, But at the same time will consider efficiency and scale of Data. In the real world the major issue of Big Data is early warning predictions is the use of Satellite imagery and Radar Sensor data. In the Satellite imagery data could reach a million derived spatial objects such data querying ,managing and various image patterns classification is very difficult task. So a proper architecture should be proposed to gain knowledge about Big Data for analyzing various Satellite imagery patterns classifications with hadoop technology. In the proposed architecture differentiate various classification methods for various satellite imagery pattern classification methods and also proposing Google’s Map reduce C4.5 Algorithm for effective classification to increase performance of patterns classification and increasingly large volume of Data sets to results both time efficiency and scalabilty. This research is carrying based on NASA Satellite data and Twitter data and also in weather forecasting.

Extending the functionality of Android Clipboard Manager

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Amol D. Gaikwad | Pratik R. Tambekar, Pankaj R. Hatwar,Swapnil R. Ramtekkar

Abstract

Clipboard is a software facility used for short-term data storage and/or data transfer between documents or applications, via Copy and Paste operations. The standard built in clipboard of android operating system store only one item at a time so that it provide speedy access to such content normally android clipboard has disadvantages firstly it store only one item at a time and secondly when you turn off system it clears memory. My goal is to eradicate the problems of standard clipboard of Android OS to developed such App that it contains buffer which is located on System Memory and it is permanent storage need not worry about lost of data. Whatever user copy data that copied is maintained or stored in their respective buffer. When I am going to perform paste operation it will populate all respective copied buffer data you have to just select the desired data that you want to paste it save user time and increase the efficiency.

Extraction Of Object In Multiviews Based On LDA Approach

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Geeravani | Dr. P.Mohanaiah

Abstract

Linear Discriminant Analysis (LDA) is most commonly used as dimensionality reduction technique in the pre-processing step for pattern-classification and machine learning applications. The goal is to project a dataset onto a lower-dimensional space with good class-separability in order avoid over fitting (―curse of dimensionality‖) and also reduce computational costs. Ronald A. Fisher formulated the Linear Discriminant in 1936, and it also has some practical uses as classifier. The original Linear discriminant was described for a 2-class problem, and it was then later generalized as ―multi-class Linear Discriminant Analysis‖ or ―Multiple Discriminant Analysis‖ by C. R. Rao in 1948 The general LDA approach is very similar to a Principal Component Analysis (for more information about the PCA, see the previous article, but in addition to finding the component axes that maximize the variance of our data (PCA), we are additionally interested in the axes that maximize the separation between multiple classes (LDA). So, in a nutshell, often the goal of an LDA is to project a feature space (a dataset n-dimensional samples) onto a smaller subspace kk (where k≤n−1k≤n−1) while maintaining the class-discriminatory information. In general, dimensionality reduction does not only help reducing computational costs for a given classification task, but it can also be helpful to avoid over fitting by minimizing the error in parameter estimation (―curse of dimensionality‖).

Extraction of Text from an Image and its Language Translation Using OCR

International Journal of Engineering Research in Computer Science and Engineering, Available online 14th July 2017

G.R.Hemalakshmi | M.Sakthimanimala, J.Salai Ani Muthu

Abstract

In our day to day life the people are facing many problems in understand the languages. For example, if the people move from one state to the other they don’t understand their language at that time this Mobile Application will help them. Existing system, having a separate application for each and every process like camera, Google translator and Optical Character Recognition(OCR) text scanner. But, people expect the application consists of all the three facilities together. So this proposed application provides a new idea to the people to translate the other language text into their known language. This application contains three steps. 1.Take a photo image of the unknown language text which you want to translate(either handwritten or printed material), 2.Tessaract is an open source Optical Character Recognition (OCR) technology, which is used to extract the text from the image then Google API and Bing API is used for translation of language. 3.The translated text is generated in PDF format.

Fault Tolerance Approach in Distributed Sensor Networks using Genetic Algorithm

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th August 2017

Anagha Nanoti | Prof. R. K. Krishna

Abstract

Nature has always been a great source of inspiration to all kind of researches so far. Genetic Algorithms (GA) were invented to mimic some of processes observed in natural evolution by John Holland in 1970s. GA simulates “survival of fittest” among individuals over consecutive generation for solving optimization problems. In this paper considering Fault tolerance as one of the important issues in Distributed Sensor Networks, the Genetic Algorithm has been proven to be the best. The Distributed Sensor Networks are interconnection of tiny, low cost, low-powered and multi-functional sensor nodes. However these DSNs (sensors) are highly prone to malicious attacks, faults due to energy depletion and sometimes due to link failure. When energy in some of the sensor nodes reduces or gets depleted the implementation of Genetic Algorithm have proven to be the masterpiece for development of healthier network than any other algorithms. As we know prevention is better than cure. This paper aims to prevent the sensor nodes from occurring failure. Thus the main objective of the current work is to generate energy efficient DSNs and a way towards fault tolerance.

Fault Tolerance Approach in Distributed Sensor Networks using Genetic Algorithm

International Journal of Engineering Research in Computer Science and Engineering, Available online 11th August 2017

Anagha Nanoti | Prof. R. K. Krishna

Abstract

Nature has always been a great source of inspiration to all kind of researches so far. Genetic Algorithms (GA) were invented to mimic some of processes observed in natural evolution by John Holland in 1970s. GA simulates “survival of fittest” among individuals over consecutive generation for solving optimization problems. In this paper considering Fault tolerance as one of the important issues in Distributed Sensor Networks, the Genetic Algorithm has been proven to be the best. The Distributed Sensor Networks are interconnection of tiny, low cost, low-powered and multi-functional sensor nodes. However these DSNs (sensors) are highly prone to malicious attacks, faults due to energy depletion and sometimes due to link failure. When energy in some of the sensor nodes reduces or gets depleted the implementation of Genetic Algorithm have proven to be the masterpiece for development of healthier network than any other algorithms. As we know prevention is better than cure. This paper aims to prevent the sensor nodes from occurring failure. Thus the main objective of the current work is to generate energy efficient DSNs and a way towards fault tolerance

Forest Monitoring System Using Wireless Sensor Network

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

G.Aaroma | B.Clinton David, S.T.Priyanka, P.T.Subasini

Abstract

The Wireless Sensor Network is used in the field of automation, home appliances and security. The proposed system enables the integrated use of Mercury Tilt Sensor, vibration sensor, temperature and humidity sensor, pressure sensor and CO gas sensor incorporated into trees for the sensing of events in the natural environment. The wireless RF module enables the communication between the cluster node, the node and the control centre. This helps monitoring and detection of tree theft and disasters like forest fire protecting the natural environment. This article presents the interface and network topology of the wireless sensor network and their advantages.

Future Aspects and Key Challenges of IoT

International Journal of Engineering Research in Computer Science and Engineering, Available online 11th July 2017

Bitan Paul | Manik Reshi, Manish Dixit, Drishant Sharma, Dr. B. Shadaksharappa

Abstract

Embedded industry ensures well laid and efficiently advanced days of transparency in the near future ahead. It’s the need as well as call of the hour that we initiate developing IOT configured products, so as to meet the customer needs. The count of people that IoT expects to connect is estimated to be around 28 billion ―things to the internet by 2020, having diverse gadgets that range from wearable devices like smart watches to automobiles, embedded appliances, and industrial equipments. Several IoT solutions that have been enlarged so far, functionalities of them and also the technology used. Thereby, we conclude the various challenges that need to be focused on to pave the way to betterment of solutions that will aid the society.

Fuzzy Opinion Mining for Product Recommender System

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Aarti Bandodker | 

Abstract

Over the last few years, opinions are voiced in the form of blogs, tweets, social media and review over the web. These opinions do matter, as, we always consider other persons view in our decision making process. Proposed fuzzy technique finds out how positively or negatively the masses have responded to the launched product, based on voiced opinions. Using a supervised rule based technique, fuzzy values are assigned to opinions, to know the measure of its positivity or negativity. Steps involve, first mining the opinion about the product from ecommerce sites. Then extraction of the opinion phrases as per pre-defined phrase patterns. Next, assigning of fuzzy weights to the opinion words using SentiWordNet and measuring the strength of opinion phrases. And, finally summarization of people’s views to yield product recommendation. Proposed fuzzy technique is an enhancement over the existing opinion mining techniques which does binary polarity determination.

Garbage Collection System Using IOT

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Samir Atkar | Abhishek Aryan, Pallavi Bhoyar,Ashiya Malak,Prof. S. K. Narad

Abstract

The method of connecting the objects or things through wireless connectivity, Internet called Internet of Things. Nowadays a variety of tasks are based on IOT. Cities in the world are becoming smarter by implementing the things around using IOT. This is a new trend in technology. One of the objectives of smart cities is keeping the environment clean and neat. This aim is not fulfilled without the garbage bin management system. Hence the paper “IOT Based Intelligent Bin for Smart Cities” has been developed. Bin management is one of the major applications of IOT. Here sensors are connected to the all the bins at different areas. It senses the level of garbage in bin. When it reaches threshold a message is sent via GSM to the concerned person to clean it as soon as possible.

Glide Player – An Ad-hoc Media & File Sharing

International Journal of Engineering Research in Computer Science and Engineering, Available online 6th July 2017

Dr. B. Shadaksharappa | Karan D’Souza, George VargheseM, Kshithija C. Reddy, Akshay C

Abstract

Seamless media sharing between individual mobile devices is not so easily achievable by current products. Most devices rely on having to share physical files with other devices wirelessly through file transferring applications. However, media is not always treated like most files. Media sharing is usually a temporary “for-the-moment” situation, where a user may need to play a file on another device easily and quickly, and after they separate, the file is no longer required to persist on the other user’s device. Our proposed idea is for an application that can make such temporary, local media sharing quick and accessible, abstracting away the process of setting up a network and having to send each physical file between devices for a session and then have to delete the files after the session is complete. In our proposed application, users can create and connect to a logical group that is understood by the application and set up within the application. Once this group session is initiated, each user can freely explore the media library of each other user in the group and play any media file they so choose. By this method, the file is transferred over to the receiving device on demand and cached. This method does not require an internet connection or a nearby access point as each device could act as a local hotspot. In addition to this functionality, each user has the freedom to customize their privacy, specifying exactly which media files can be visible to other users and which files shouldn’t be. Along with this, we also propose a mode of synchronous play which can be used by the group members to create one common queue of media that anyone can contribute to and that plays, seeks and skips at the exact same time on all devices if the users wish to experience media together, but without having to use a single common audio output; each user can just use their own device and audio output peripheral.

GOOGLE GLASS

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Bandla Gokul | Kajal

Abstract

Project Glass is a research and development program by Google to develop an augmented reality Head-Mounted Display (HMD). The intended purpose of Project Glass products would be the hands-free displaying of information currently available to most smart phone users, and allowing for interaction with the Internet via natural language voice commands. These glasses will have the combined features of virtual reality and augmented reality. Google glasses are basically wearable computers that will use the same Android software that powers Android smart phones and tablets.Google Glass is as futuristic a gadget we’ve seen in recent times. A useful technology for all kinds of people including handicapped/disabled.

Guaranteed Event Delivery For Publish/Subscribe Services

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Lajitha H | Ratheesh S

Abstract

The publish/subscribe(pub/sub) is a widespread communication paradigm, which has been paid more attention in distributed applications such as online gaming, social networking , business intelligence because it offers the time, space and synchronization decoupling properties. These applications are typically characterized by a large number of participants which are communicate by exchanging messages on a wide area network (WAN), such as the Internet. However, while this kind of paradigm fits the generic asynchrony and scalability requirements of large scale complex critical infrastructures (LCCIs), it completely or partially lacks the support of quality-of-service (QoS) guarantees. The maximum flow path is needed to achieve maximum data rate/ packet delivery for multicasting to several sinks. The proposed system uses a techniques network coding in a maximum flow network. And also uses a mechanism to choose gossip partners during the recovery phase of the protocol.

Health Care in Smart Cities: A Survey based on IoT data analytics

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th August 2017

Swapnaja Rajesh Hiray | Dr. Brahmaramba Ravi

Abstract

The global population continues to grow at a steady pace, and more people are moving to cities every single day. Concept of Smart City is not new, but application of data analytic techniques and improving performance of Smart city application needs focus. The first cut idea of Smart city is a city, where ICT( Information and Communication Technology) can be used to solve social problems . We can view the Smart city as an integrated living solution that links many life aspects such as power, transportation, buildings, public security and emergency solutions, city governance, waste and water management and healthcare in a smart and efficient manner to improve the quality of life for the citizens . Smart city applications basically involves pervasive and ubiquitous environment and Internet of Things can make it possible. This environment itself produces ‘BIG DATA’. Data analytics in healthcare system mainly carried out in two categories Clinical applications and Non clinical applications. In this paper we studied basically Smart city Healthcare applications and data analysis issues related to this. We have developed one prototype smart city application to conceptualize the problem. Outcome of this survey is to summarize methods used for smart healthcare data analysis and issues related to it.

Hemorrhages Detection in Retinal Color Fundus Image

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th August 2017

Priyanka kale | Prof. N. Janwe

Abstract

Diabetic Retinopathy (DR) is an eye disease due to diabetes which causes visual loss. So it is rational to provide treatment for DR at first stages of disease. Hemorrhages are the first symptoms that signify person have diabetic retinopathy. Therefore, their recognition is very essential. In this paper image contrast is improved by pre-processing and then blood vessels are detected as the boundaries of hemorrhages are not differentiate when they are in contact with blood vessels.then classify the image on the basis texture feature such as area, standard deviation etc. finally normal, moderate or Severe DR is detected on the basis of texture feature

Hiding Sensitive Association Rule Constructed from Table

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th August 2017

Ruchi . P. Kanekar | Professor Rachel Dhanaraj

Abstract

Data mining is a technique which is used by every fields and also gains lots of progress in organization. Data Mining secure the sensitive data in table by using data mining techniques. This paper proposes a methodology which hides the sensitive rules by using association rule hiding techniques so that they cannot be discovered through association rule mining algorithm but at the same time not losing the great benefit of association rule mining and try to hide more and more rules in tables. Data mining provides the opportunity to extract useful information from enormous amount of data.

High Resolutions of Medical Images using Enhancement Technique

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Prof.Karimella Vikram | Dr, K.Madhushdhan

Abstract

The objective of this paper is to estimate a high resolution medical image from a single noisy low resolution image with the help of given database ofhigh and low resolution image patch pairs. Initially a total variation (TV)method which helps in removing noise effectively while preserving edgeinformation is adopted. Further de-noising and super resolution is performedon every image patch. For each TV denoised low-resolution patch, its high-resolution version is estimated based on finding a nonnegative sparse linearrepresentation of the TV denoised patch over the low-resolution patches fromthe database, where the coefficients of the representation strongly depend onthe similarity between the TV denoised patch and the sample patches in thedatabase. The problem of finding the nonnegative sparse linear representationis modeled as a nonnegative quadratic programming problem. The proposedmethod is especially useful for the case of noise-corrupted and low-resolutionimage.

Honeypot-A Secure Network System

International Journal of Engineering Research in Computer Science and Engineering, Available online 14th July 2017

Akshay Kalbande | Abhishek Shinde, Mayur Patel, NishudhanJagtap,Prof Manisha Singh

Abstract

A honeypot is a decoy computer system for trapping hackers or tracking unconventional or new hacking methods. Generally as the number of users for a web service increases , the issues related to security arise too. So does the need arise to secure these systems for reliable and efficient working-One such tool is-Honeypot. As the flow of data increases, the probability of gaining access to confidential data is also high. So detecting vulnerability becomes a preliminary task in order to overcome such malicious activities. In this study, the simulated computers on network are been secured using Honeypot’s design and Framework which helps in many fields such as detection of worms, adversaries, illegitimate traffic, spread of spam email. The honeypots deployed on the network monitors the traffic for any anonymous users and track him to prevent further attacks.

Host-Based Intrusion Detection System Using Analytics

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

G.Yedukondalu | Dr.J.Anand Chandulal, Dr.M. Srinivasa Rao

Abstract

File signatures are computed to improve the efficiency and effectiveness of the Intrusion Detection System. File Signatures are generated using Hashing Method and Superimposed Coding technique. This paper discusses the techniques that works fast and efficiently in detecting the malicious users. DARPA data set is used to apply these techniques to find out the intruders through IDS. The performance of the similarity search algorithm is efficient since all the signatures are in the binary format and computations are done by low level logical operations[1]. Clustering and Similarity search techniques are applied to increase the efficiency of the Host-Based Intrusion Detection System

Hybrid Crypto-System Approach use in Secure Intrusion Detection System for MANET

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th August 2017

Mr. Ajit N. Gedam | Prof. M. P. Wankhade

Abstract

Recent emerging trends in the world, many firewalls and Crypto-System mechanism play a vital part in network security. However, many of them protection mechanisms are not adequate and effective. Therefore, the study of (intrusion detection system) IDS goes increasing to monitor the network that notices misbehavior or anomalies and notifies to other nodes in the network to avoid the nodes misbehaving. Authentication and encryption acts as first phase of defense while an IDS acts as a second phase of defense. In Mobile Ad hoc Networks (MANET), many schemes are existing for intrusion detection system. One of the intrusion detection system used in MANET is Enhanced Adaptive Acknowledgement (EAACK), which is based on acknowledgement packets for detection of malicious activities. This system increases the network overhead significantly relative to other system. So, in this paper we adopt the hybrid Crypto-System Approach to reduce the network overhead cause by using digital signature in EAACK. The system is termed as Hybrid Crypto-System as it gives an improved security than the fundamental approaches. The concept of Hybrid Crypto-System used which include AES and RSA algorithm. This system proves advanced malicious behavior detection rates and packet delivery factor is improved and enhance the security

Hybrid Crypto-System Approach use in Secure Intrusion Detection System for MANET

International Journal of Engineering Research in Computer Science and Engineering, Available online 11th August 2017

Mr. Ajit N. Gedam | Prof. M. P. Wankhade

Abstract

Recent emerging trends in the world, many firewalls and Crypto-System mechanism play a vital part in network security. However, many of them protection mechanisms are not adequate and effective. Therefore, the study of (intrusion detection system) IDS goes increasing to monitor the network that notices misbehavior or anomalies and notifies to other nodes in the network to avoid the nodes misbehaving. Authentication and encryption acts as first phase of defense while an IDS acts as a second phase of defense. In Mobile Ad hoc Networks (MANET), many schemes are existing for intrusion detection system. One of the intrusion detection system used in MANET is Enhanced Adaptive Acknowledgement (EAACK), which is based on acknowledgement packets for detection of malicious activities. This system increases the network overhead significantly relative to other system. So, in this paper we adopt the hybrid Crypto-System Approach to reduce the network overhead cause by using digital signature in EAACK. The system is termed as Hybrid Crypto-System as it gives an improved security than the fundamental approaches. The concept of Hybrid Crypto-System used which include AES and RSA algorithm. This system proves advanced malicious behavior detection rates and packet delivery factor is improved and enhance the security

Hypothetical Analysis about computational feasibility of Time Travel

International Journal of Engineering Research in Computer Science and Engineering, Available online 12th June 2017

Viplove Divyasheesh | Anil Pandey, Abhishek Dixit

Abstract

Time Travelling has always been considered a fantasy never fulfilled .There have been many assumptions regarding how to fold the fabric of space time to let light reach from point A to Point B without travelling the entire length, and this all has been seen from the scientific point of view . But no one has put forward an apt representation as to can us or can we not produce Time travel computationally? The feasibility of this problem is aptly and properly analyzed in this paper and we have tried t o reach a final consensus if time travel is computationally feasible at all or not?

Identification and Verification of Source Camera using DCT Filtering Technique

International Journal of Engineering Research in Computer Science and Engineering, Available online 16th August 2017

PrajwalaAnantharamu | Dr. Purohit Shrinivasacharya

Abstract

An enormous amount of images or videos are collected from laptops, mobiles, storage devices during the investigation by Police or intelligence agencies or digital forensic team. These collected images/videos to be analyzed to ascertain the source device that was used to capture these during the investigation. An every camera has its fingerprint in the form of Photo Response Non- Uniformity (PRNU) noise. Because it has universality and generality nature, it is unique and hence plays a very vital role in the source camera identification. PRNU is a sensor pattern noise which contains noise components, and other information hence many techniques have been proposed for the extraction of the PRNU. In this paper, a Discrete Cosine Transform (DCT) method is used for extracting the noise, and Weighted Averaging technique for PRNU estimation. Finally, the distance function is used for comparing g the difference between the Query image PRNU and the stored image PRNU. We conducted the experiments its results are verified against the different cameras, and it is giving 93% accuracy.

Image Operations in Encrypted Domains

International Journal of Engineering Research in Computer Science and Engineering, Available online 5th August 2017

Sanjana Prasad | Dr.H.S. Jayanna

Abstract

The advancement of cloud or distributed computing and a drastic increment in the size of the digital images are reasons to outsource the image into the cloud. Despite of the fact that this outsourcing has many advantages, guaranteeing data confidentiality and the security in the cloud is one of the fundamental concerns. The encryption schemes for images guarantee the confidentiality in the cloud, but this scheme doesn’t permit cloud data centers to perform operations over encrypted images. In this paper, this problem is addressed by proposing a modified Pailier cryptosystem based image scaling and cropping scheme for multiclient settings to scale and crop an image in the encrypted domain on cloud data centers.

Image Steganography Using Variable-Rate LSB Approach

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Hemshikha Joshi | Rahul Agarwal

Abstract

Steganography is the art of hiding facts where communication is taking place, by hiding information in another information. The purpose of Steganography is to maintain secret communication between two parties. Many different file format carrier can be used, but the digital image are the most popular bacause of their frequency on the internet. In this paper a new algorithm is described for hiding a secret image in the least significant bits of a cover image. Least Significant-Bit (LSB) based approach is most popular steganographic techniques in spatial domain due to its simplicity and hiding capacity. This method supports both type of images colour and gray scale image. How many LSB hides the secret information is decided by the exclusive-or (XOR) operation of a pixels neighbour. Here result is sensitive to the smothness of the neighbour pixel.

Impact of Social Networking Sites on Educational Institutes - A Case Study on RGUKT

International Journal of Engineering Research in Computer Science and Engineering, Available online 12th June 2017

Satyanandaram Nandigam | Dasari Narendra

Abstract

The usages of social networking sites in educational institutes are increasing rapidly. Although they are providing many reliable services which make our communication so simple, they are also doing more harm than good. This communication is not only changing how we communicate with others but also replacing the traditional methods of communication. Many people spend their time in social networking sites to communicate with others rather than a traditional way of communication. A survey conducted on 4000 students of Rajiv Gandhi University of Knowledge Technologies (RGUKT) had proved it.

Implementation and Analysis of pCell Data Center In Ethernet Technology

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Shreshtha Raizada | Srishti,Budhaditya Bhattacharyya

Abstract

In this paper we present the implementation of the idea behind the pCell data center that receives and execute multiple requests at a single time unlike the conventional technology which is 1:1. The pCell is a radio based technology which is said to be impossible to implement in laboratory environment. Thus we have collaborated the essence of the pCell technology to its ancestor Distributed Input Distributed Output (DIDO) to architect a data center for an Ethernet based network. The aim is to conclude that working principle of the pCell data center can be recreated in laboratory environment. First we describe the architecture and then we present the experimental results which conclude the working of the created data center.

Implementation Of Efficient Privacy Preserving Classification Techniques With Outsource Data

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Avinash Thube | Aniket Patil, Vinayak Shinde, Chetan Mohite

Abstract

Back-propagation Neural Network is one of the important machines learning technique for classification Accuracy of any machine learning technique is improved with volume of datasets. Recent developments in computer networks provide such environment that multiple users connect with each other. This scenario leads in development of machine learning technique with collaborative or joint participation of these multiple users. In collaborative learning multiple parties participate jointly in learning where data is shared by users may contain sensitive information such as corporate data, health care data and personal data. There are chances of data leakage by any corrupt party or intruders. Users are concern about privacy of their datasets due to this main hurdle in collaborative machine learning technique many users are not interested to participate. In this project we are giving solution to privacy of individual users data by converting data in the form of cipher texts where users can use these cipher texts directly in the learning process. A machine learning system working on cipher texts needs various computations. Recent development in cloud computing provides good computing environment where we are utilizing these computations. In this way a system will be developed with neural network machine learning technique working on cipher text and utilizing cloud computing services.

Implementing Cold-Start Product Recommendation System by using Micro blogging Information

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th August 2017

Marjana Khathima | Mr. Ravindra Prasad S

Abstract

Nowadays, it is possible to access many E-commerce websites by using users social network accounts like facebook, twitter etc. Users of social networks can able to post their newly purchased products in the microblogs, and can give links to the E-commerce web pages from where they are purchased. This paper presents a solution for cross-site cold start product recommendation. A major challenge for this problem is how to use the information taken from social networking sites for cold start product recommendation. This paper proposes, by using neural networks extract user features or user embeddings and product feature or product embeddings from the data collected from E-commerce websites. Then by using gradient boosting tree method on the social networking sites, collect user features and combine this with the user embeddings. Then by using matrix factorization method use these user embeddings for the cold start product recommendation.

Improve Performance of Crawler Using K-means Clustering

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th August 2017

Swati G. Bhoi | Prof. Ujwala M. Patil

Abstract

Nowadays the Internet is part of life because of any information is easily available on the Internet. It has a large size of information; hence the high efficiency and get relevant information are challenging issue due to the changing nature of the deep web. As crawler plays important role in such cases. So we proposed such crawler which provides efficient and extracts relevant information from web. The smart crawler contains two-phases as site locating and in-site exploring. We developed smart crawler using K-means clustering methods. Clustering makes a group of similar data items known as clusters. Here we describe K-means clustering techniques. The most famous clustering method is K-means methods which divide data items in K clusters and provide better result with high efficiency. Also we compare the result of existing system and smart crawler using Kmeans provide an efficient harvesting rate of deep websites within the least amount of time.

Improve the Efficiency of Real World Entity Set Using Progressive Methods

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th August 2017

Dipalee A. More | Prof. Nitin N. Patil

Abstract

Database contains very large data sets, where various duplicate records are present. The duplicate records occur when data entries are stored in a uniform manner in the database, resolving the structural heterogeneity problem. Maximum the gain of the overall process within time availability by reporting most results much earlier than traditional approaches. Detection of duplicate records is difficult to find and it takes more execution time. The authors described various techniques used to find duplicate records in the database but there are some issues in these techniques. To address this, Progressive Algorithms have been said, for that, which significantly increases the efficiency of finding duplicates, if the execution time is limited and improves the quality of records. The authors will combine base paper progressive approaches with scalable approaches for duplicate detection to deliver results even faster

Improve the Efficiency of Real World Entity Set Using Progressive Methods

International Journal of Engineering Research in Computer Science and Engineering, Available online 11th August 2017

Dipalee A. More | Prof. Nitin N. Patil

Abstract

Database contains very large data sets, where various duplicate records are present. The duplicate records occur when data entries are stored in a uniform manner in the database, resolving the structural heterogeneity problem. Maximum the gain of the overall process within time availability by reporting most results much earlier than traditional approaches. Detection of duplicate records is difficult to find and it takes more execution time. The authors described various techniques used to find duplicate records in the database but there are some issues in these techniques. To address this, Progressive Algorithms have been said, for that, which significantly increases the efficiency of finding duplicates, if the execution time is limited and improves the quality of records. The authors will combine base paper progressive approaches with scalable approaches for duplicate detection to deliver results even faster

Improved Method Text Feature Extraction for Detection of Phishing Website

International Journal of Engineering Research in Computer Science and Engineering, Available online 14th July 2017

Ganesh S.Gangthade | Shyam R. Gote, Sachin P. Khengte

Abstract

Phishing is a technique of gaining personal information of users from various web-sites. Sometimes it redirects the user to phish webpage to gain information of user like username, password, account and credit card details etc. Our main ambition here is to design system to provide safeguard to users against phishing attacks. Our work is mainly focuses on use of terms and URLs from web page to detect possible phishing patterns from web pages of phishing websites. Process initiates with pars-ing of web page to extract plain text terms and URLs. Further detected terms are fed to TF-IDF and URL weighting system to identify importance of each detected term. Later search engine lookup is carried out for most important terms which help to detect possible victim URLs for given input website. Finally WHOIS lookup is used to compare registration details of websites to correctly categorize website as phishing or legitimate one

Integration of Multi Bank Multi user in Single Card With user Behavior Monitoring using Hmm & Formula Verification

International Journal of Engineering Research in Computer Science and Engineering, Available online 30th June 2017

Jayakeerthi A N |  Pavithra R, Prithikka V, Mrs. M Kiruthiga Devi

Abstract

Usage of ATM cards for transaction has become very common, hence managing of multiple accounts becomes tedious. A solution to this issue is to integrate multi bank multi user in a single card along with user behavior monitoring. In this system Big Data, Business analytical and RFID like technology are integrated to provide solution to this most challenge oriented activity. The implementation involves developing an application for a Banking sector particularly for a Debit / ATM card section. RFID smart card is used as ATM Card for transaction, users can create account and get the card from the bank.They can access their cards with unique identity numbers accordingly. Users can include their family members’ accounts details in the same card and their behavior is monitored through HMM algorithm, verified using OTP and authenticated using formula based method. They can withdraw cash from their accounts after successful authentication of the corresponding PIN numbers and OTP along with formula based authentication

Integrative Detection of Open Drainage, Garbage & Drainage over Flow and Current Leakage Using Zigbee Technology

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Rathna Priya. K | Rajapandiyan. V, Ramprakash. G , Saravana Perumal. R , Shankara Narayanan. S

Abstract

Open sewage and a faulty overhead line falling on the ground during rainy season is a serious but unattended problem. This may cause death if people near that area fail to notice it. Garbage and drainage overflow cause growth of insects and bad odour which leads to the spread of diseases. This project aims for solving all of the above mentioned problems through the following solutions. Garbage and drainage system is monitored using wireless sensor network and if it is open or if it gets full, then alert signal is sent to the corresponding department about the same. Also, during rainy season, if overhead line gets cut and falls down in logging water, then using sensors in a water resistant setup, it is intimated to the EB department. Another module near the transformer receives this alert signal and send message to the department using GSM communication. Thus by proper monitoring and taking necessary control action, life can be saved from danger.

Intelligent Fire Extinguisher System

International Journal of Engineering Research in Computer Science and Engineering, Available online 11th July 2017

Ranjini J | Shreedevi O U, Shwetha K, V Lakshmi, Mrs. Sharon Roji Priya

Abstract

Fire accidents can take place more in areas like houses, industries, Movie theaters, shopping malls, hospitals, etc., which will lead to more loss in life along with properties. Generally waiting for a fire engine to extinguish fire, may be delayed which may increase the chance of loss in life. There are so many preventive mechanisms have been developed to prevent/reduce the fire accidents to some extent. But always automatic solution brings more accuracy to protect lives from fire accidents. Fire extinguishing system is an automated system, which is used for detection and removing of fire automatically without human being Effort. The System presents two type of facilities for fire detection. One is through Sensor technology and other one i s through broadcasting of Video in that particular place. All these together are split into various sub-modules for step-by-step development and implementation. Those include Sensors’ Module, broadcasting Module, IP based Communication (Through Wi-fi module), PC-based application.

Internet of Things Based Connected Vehicles in Smart Cities: Review and Research Challenges

International Journal of Engineering Research in Computer Science and Engineering, Available online 14th July 2017

Ankita A. Mahamune | Dr. Salim Y. Amdani, Vaibhav R. Pandit

Abstract

The Internet of Things (IoT) thinks a future in which digital and physical things or objects (e.g., smartphones, TVs, vehicles) can be connected by means of suitable information and communication technologies, to enable a range of applications and services. It is of great importance to recognize the networking problem behind developing IoT. Extensive research activities and numerous industrial initiatives have paved the way for the coming era of connected vehicles, as connected vehicles are the building blocks of emerging Internet of Vehicles (IoV).This paper explores the paradigm for vehicle-to-x connectivity (vehicle-to-sensor, vehicle-to- vehicle, vehicle-to-Internet, and vehicle-to-road infrastructure connectivities). Although there have been early stage studies in IoT based connected vehicles, some features can be added to it, to get the improved performance. Therefore, this paper addresses a complete view on wireless technologies and potential challenges providing vehicle-to-x connectivity. Hence, a literature review is presented along with the performance features that can be added to the existing IoT based Connected Vehicles solution. . This paper also proposes a generic IoT based Connected Vehicles solution that includes, - a secure object tracking, that ensures the visibility and traceability of a vehicle along the travel path to support the Internet of Vehicles (IoV), a new paradigm known as Social Internet of Things (SIoT), that can be used to set appropriate rules in the objects to select the right object, as these impact the performance of services developed on top of this social network and two algorithms that allocates available resources to the demanding vehicle services.

Intrusion Detection System in Wireless Sensor Networks- A Survey

International Journal of Engineering Research in Computer Science and Engineering, Available online 21st July 2017

Asha R N | Dr. Venkatesan S

Abstract

Wireless Sensor Networks (WSNs) are highly distributed networks of tiny, light-weight wireless nodes, placed in large numbers to monitor the environment or system. Monitoring the system involves the measurement of physical parameters such as temperature, pressure, relative humidity and co-operatively passing their data to the main node called sink. Intrusion Detection is one of the major and efficient method against attacks. Intrusion Detection Systems can act as a line of defence and it provides security primitives to prevent attacks. IDS uses misuse-based and anomaly-based detection techniques. This paper discuss different approaches of IDS

IoT Based Automated Wate Billing System (AWBS)

International Journal of Engineering Research in Computer Science and Engineering, Available online 14th July 2017

Bhavya P | ArunKumar S N,Abhinav Karan

Abstract

The purpose of this project is to present a product designed to assist with urban home water billing system in India. The project integrates a water flow rate sensor, designed to create a carefree solution to urban water metering and monitoring of the water usage using cloud, mobile communications and mobile application. Arduino, a rapid prototyping ATMEGA328Pbased microcontroller based platform is used to develop a prototype which measures the water flow rate through the household pipes and sends an SMS at the end of every month .In addition to that, detailed water usage with charts and graphs can be obtained from a cloud platform called “thingspeak” and another cloud platform called pushing box sends a notification to the user’s mobile. A mobile app is also designed to serve as a user interface helping to access the cloud and paying the bill through Bengaluru One Website.

IoT based Fuzzy System Management for HVAC in Medical Spaces

International Journal of Engineering Research in Computer Science and Engineering, Available online 14th July 2017

Kamran Sayeed | Kunal C J, Vidyashankara V, Bharath G C,JV Alamelu

Abstract

Today, renewable energy (RE) sources have become an increasingly important part of power generation, as the reserves of fossil fuels get closer to depletion. Among the available RE technologies (such as solar, rain, wind, tidal, geothermal), wind and solar energy sources are the most promising options, as they are omnipresent, freely available, and environment friendly. Due to increased demand for fossil fuels and their limited supply, “Green Energy” is an important concept in today’s world. However, there are few drawbacks associated with green energy since they are sporadic. As a result, energy management is utmost important to ensure maximum efficiency. The current work aims to develop a fuzzy logic system which obtains weather forecast information from the Internet, battery SOC, and based on set of rules, it determines the efficiency in which the system should run in order to obtain maximum efficiency. The fuzzy logic system provides several merits over classical control system, they are cost efficient, incorporate a wide range of operating conditions, and are more customizable in natural language terms. These systems can be easily incorporated in the hospital or in medical spaces. Further, based on predefined operating conditions for each economy level and the current room conditions, HVAC systems in hospitals are operated. The control information is sent from the Raspberry Pi to the Arduino Uno through ZigBee protocol. The room conditions data (i.e. temperature and humidity) is sent to ThingSpeak platform wherein it can be viewed in real-time and monitored. Laboratories in hospitals produce may produce fumes and harmful by-products, which have to be expelled out via an exhaust system. In addition to it in emergencies such as fires, proper ventilation for expelling smoke is essential. HVAC system is essential in hospitals and it is responsible for reducing the spread of air-borne diseases by providing proper ventilation and maintaining healthy atmosphere.

IoT Based Smart Inverter Using Raspberry Pi

International Journal of Engineering Research in Computer Science and Engineering, Available online 5th August 2017

Megha A Joshi | Kavyashree S

Abstract

In this paper we are proposing for smart inverter integrating with raspberry pi which makes smart home .In this work a bi-level (Supervisory-Local) PV based micro grid configuration is proposed for low power residential applications. In the supervisory level a long-term control scheme is assigned to define the set points for local controllers. The local level is mainly formed from a set of controllers which are basically responsible to control the power electronic interfaces and converters. Within the supervisory level a dynamic price scheduling framework with load and solar energy forecasting is implemented using time series-based regression technique. In the local level, adaptive double mode controllers are developed to realize intelligent inverters with smart grid-tied (GT) capabilities and smooth transition between GT and stand-alone modes

IoT based Smart Parking System: A Literature Review

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Achyutha Hosahalli | Rahul Hiware

Abstract

With number of vehicles increasing day by day and parking places not increasing proportionately, find ing parking areas with free parking slots has become time consuming and cumbersome. There have been many solutions to address this problem with each one adopting a different technology and methodology. This paper presents an overview of such different methodologies using Internet of Things which help people in having a better and smart parking system.

IoT Based Telemetry System for Biomedicine

International Journal of Engineering Research in Computer Science and Engineering, Available online 14th July 2017

Ojas Sonnis | Akshay Sunka,Rohit Singh, Mrs. Trupti Agarkar

Abstract

This project presents the latest invention in the field of electronics, a telemetric system based on Internet of Things (IoT) which can be used to track bed-ridden patients. It provides a device which can be used to monitor the patients health. Continuous observation of the patient thus becomes possible. In todays world of automation, biomedical aspect of engineering is fast picking up. Biomedical electronics has benefited greatly due to advancements in engineering. It has made doctors more efficient and brought fast pace to delivery of service. Doctors are hence aided by the patient monitoring systems for supervision of patients. This system also helps family members to keep upto- date with patient’s health. It would act as a virtual nurse by constantly updating information on cloud server. It provides information regarding Beats Per Minute (BPM) of the heart. Similar to systems used in hospital, this same system can be used by anyone, even those not under observation, to keep track of their vital signs with the use of sensors. In this project, if sensors output starts fluctuating above normal rate, then an emergency message would be sent to a doctors/family members phone. Also it constantly updates the same on a cloud platform.

IoT-Based Advanced Garbage Bin System

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Pushpak Jayale | Sahil Kalode, Amit Bhatti,Shubhank Bhatiya

Abstract

In many application fields such as home automation, industry automation and healthcare Wireless Sensor Network application have been developed to smartly solve management problems. In this paper, we are presenting a smart solution over the old garbage management system using IoT-enabled Technology. This is a dynamic solution which increases the productivity of the public garbage system. Our system consists of various sensors which make garbage management more reliable, scalable and efficient. An android application with user-friendly GUI is provided to the garbage collectors to get notified about garbage bin. Fire sensor, methane sensor and ultrasonic sensor make garbage bin a future of a smart city.

IoT-Based Secure Home Monitoring System

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th August 2017

Michelle S Henriques | Prof. Nagaraj K. Vernekar

Abstract

Internet of Things (IoT) allows objects such as sensors, appliances to be sensed and controlled remotely across a network. Smart Homes is one of the fastest growing fields of the IoT technology, comprising of applications such as home automation, monitoring, and security. As the information is highly critical, a home monitoring system has high security requirements. The security requirements are not limited to user authentication, but also to encrypted communication among devices as well as device authentication. The proposed idea in this paper is to add a layer of security to the concept of Home Monitoring, both at the user level and the device level. The communication between the sensors(devices) and the Home server is encrypted using a combination of Symmetric and Asymmetric cryptography. Symmetric cryptography is used for encryption of the sensor data using a random key and Asymmetric cryptography is used to encrypt the random key. A modified version of the Vigenere cipher is used for encryption of sensor data. The key used for encryption is generated at random using the timestamp. The random key is encrypted using RSA (Asymmetric cryptography) using the home server’s public key. This ensures that only the home server will be able to decrypt the key using its private key. At the user end, two-phase authentication will be used for user login. Any intrusions would be detected using honeywords (false passwords)

Iris Data Classification Using Fuzzy Clustering With Varying Parameters

International Journal of Engineering Research in Computer Science and Engineering, Available online 27th July 2017

Nisha Singh | 

Abstract

In the field of various real environment, there is problem of clubbing the data according to their behavior or working techniques. Fuzzy clustering can be used where any data belongs to more than one class or bucket formed anywhere. That means the decision to keep them in any bucket is done by applying some similarity measurements. According to this the data points of any data set can belong to more than one class, even having different membership function value to different class. Fuzzy clustering is comprising two very dissimilar data types as fuzzy data and usual (crisp) data. It is a kind of function working on probabilistic mode of evaluating the values. Where the whole process is done without training of values to that system is done. In this paper the data used is iris flower data based problems are used to be clustered with the proper usage of fuzzy clustering model.

ITBUZZ.CO A collaborative Academic Portal

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Dr D S Adane | Nayan Goenka, Sneha Virwani, Pooja Kulwal

Abstract

ITBUZZ.CO is an attempt to bridge the gap between academic and social life. ITBUZZ.CO thus is an academic social networking portal with an advanced and comprehensive feature list to compete some of the hit social networking websites of our age. ITBUZZ.CO is a secured online portal which grants access to only those personnel which are verified by the Department of IT, RCOEM. ITBUZZ.CO is a one stop communication channel for everyone in IT Department to share resources, knowledge have a healthy discussion for various topics, ,manage departmental activities, maintain personal profile and communicate freely through the website itself. ITBUZZ.CO is a portal which boasts a continuous, reliable and cross device network. ITBUZZ.CO has an extensive outreach to all the internet users through devices and platforms of their choice, may it be through desktops or laptops, mobile devices on Android, IOS or Windows phone/tablets.

Light weight Secured Protocol for Internet of Things (IOT) Data

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Ms. Divya T | Dr. Vidya Raj C

Abstract

The Internet of Things (IOT) is an ecosystem of connected physical objects that are accessible through the internet based on interoperable information and communication technology. In the secure communication areas, key exchange protocol is an important cryptographic technique. When two users would like to exchange a message, the transmitted message is encrypted by a session key. This session key is exchanged between two ends of the corresponding connection with the help of trusted third party protocol. This type of protocol protects message delivered between two authorized users. Even this inefficiency, unreliability, inflexibility problems of the existing protocols. Therefore, in this paper, secure multi key exchange protocol based on trusted third party is to provide users with a efficiency and secure protocol which employs Elliptic Curve Cryptography (ECC) and two dimensional operation. These protocols achieve fully mutual authentication between user and trusted server.

Literature Surveyon Sensors

International Journal of Engineering Research in Computer Science and Engineering, Available online 4th August 2017

Aruna T M | Rajeswari R, Lavanya H V , Meghana B S

Abstract

As we all know that the sensors are the most important part of the embedded system and the robotics world. By using different types of sensors, we can minimize the logic circuits and also make the system more efficient to get output by taking less input. Therefore, here is detailed view of different types of sensors and their applications in the different fields

Location based secure way of receiving contacts and messages using smart phone application

International Journal of Engineering Research in Computer Science and Engineering, Available online 21st July 2017

Mohan Kumar T G | Yashashwini M,Seema C N, Savitha P, Vasantha H O

Abstract

As and when the mobile users are increasing in day by day the demands of video traffic over mobile networks keep on rising, so the wireless link capacity cannot satisfying the demands of mobile user due to the variation in the link status and many disruptions, it causes long time buffering to mobile user. To overcome from this a framework is proposed for the efficient utilization of wireless link capacity by the combination of Adaptive mobile video streaming [AMoV] and Efficient social video sharing [ESoV] techniques using cloud. In AMoV, there is a combination of adaptability and scalability features, So that it provides efficient utilization of bandwidth. Likewise ESoV provides efficient social video sharing by use of same combination of features. So that user experiences continuous flow of video streaming by avoid of buffering.

Low cost Integrated Communication Technologies for Controlling Home Appliances from Anywhere - An Outcome of IoT

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Satyanandaram Nandigam | Anil Kumar Reddy G, Dasari Narendra, Gousulu K

Abstract

Now a days entire world is moving towards the exiting new technology that is Internet of Things. Many of the organizations and industries are continuously trying to convert the theoretical aspects into practical implementations. But the implementations are very complicated and highly expensive. Automating home appliances remained like a dream for a common person. As a step towards low cost solutions for this problem we had implemented the central control system with the help of WiFi, Bluetooth and Internet technologies to provide remote access from smart phone or personal computer. The status of all switches is synchronized in centralized control system.

Meet-O-Mania (Meeting Scheduler)

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th August 2017

Mrs. S.R. Idate | Sinchita Deb, Pankhuri Srivastava, Vaibhav Singh,Shubham Mahajan

Abstract

In today’s fast moving world, scheduling meetings and making it a point to have everybody present for it has become a major workload. Majority of working professional in small enterprises, hospitals, schools or in metro cities don’t get enough time to schedule for a particular cause in a given time, let alone make sure every required person gets the message to attend the meetings. With Meet-O-Mania, this task just becomes a lot easier. Meet-O-Mania is an online application used on web server that will help in scheduling meetings on a departmental level. To use this, the user has to register into the application with their names, credentials and email ids. Then, the admin logs into the application with his email id , user name and password. The scheduler approaches the admin, or the admin himself schedules the required meeting with a specific agenda. The venue and the date is mentioned along with the person initiating the meeting. The scheduled meeting should not overlap with any other meeting. After the meeting is held, an audio tape of the same is recorded and uploaded, along with all the outcomes of the meeting. Any user can refer to them in future for assistance.

Methods of Identification of Leaders and Followers in Online Social Networks - A Survey

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Rajeshri Puranik | Sharad Pokley

Abstract

Now a day's Social Network has a great influence on our lives. Directed links in social media could represent anything from intimate friendships to common interests, or even a passion for breaking news or celebrity gossip. Such directed links determine the flow of information and hence indicate a user’s influence on others—a concept that is crucial in sociology and viral marketing. Identifying leaders and followers in online social networks is important for various applications in many domains such as advertisement, community health campaigns, administrative science, and even politics. Here we study the role of actors and a set of relations between actors i.e. leaders and followers, and there relations. For our study purpose we have selected two well-known popular SNS(Social Networking Sites) face book and twitter. Also discussed different methods, (LUCI Model, Leader Rank Approach, Binary Approach , Integrated Text Mining Model , Content based Metrics and Social Network Metrics Based Approach) for the identification of leaders and followers

Methods to Improve Genuine Ratings of Products in E-Commerce Sites

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

P.M.D.Ali Khan | K.Manoj Kumar

Abstract

Various customer surveys of item square measure as of now offered on the web. Customer surveys contain well off and profitable learning for both firms and clients. Nonetheless, the audits are frequently confused, bringing about challenges in information route and learning securing. This article proposes an item feature positioning structure, which naturally distinguishes the imperative parts of item from on-line customer surveys, going for raising the ease of use of the different audits. The imperative item angles square measure known bolstered 2 perceptions: 1) the key viewpoints square measure commonly remarked on by an outsized scope of shoppers and 2) customer conclusions on the essential perspectives enormously impact their general suppositions on the stock. Especially, given the purchaser audits of an item, we tend to first set up item angles by a shallow reliance program and check customer feelings on these viewpoints by means of a notion classifier. We tend to then build up a probabilistic feature positioning principle to induce the significance of aspects by in the meantime considering aspect recurrence and along these lines the impact of customer sentiments given to each angle over their general suppositions. The trial comes about on an audit corpus of twenty one stylish items in eight spaces exhibit the adequacy of the anticipated approach. Additionally, we have a tendency to apply item feature positioning to 2 certifiable applications, i.e., archive level assessment characterization and extractive survey account, and finish imperative execution upgrades, that show the limit of item aspect positioning in encouraging true applications.

Methods to Improve Genuine Ratings of Products in E-Commerce Sites

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

P.M.D.Ali Khan  | S.Mohammad Rafi, K.Manoj Kumar

Abstract

Various customer surveys of item square measure as of now offered on the web. Customer surveys contain well off and profitable learning for both firms and clients. Nonetheless, the audits are frequently confused, bringing about challenges in information route and learning securing. This article proposes an item feature positioning structure, which naturally distinguishes the imperative parts of item from on-line customer surveys, going for raising the ease of use of the different audits. The imperative item angles square measure known bolstered 2 perceptions: 1) the key viewpoints square measure commonly remarked on by an outsized scope of shoppers and 2) customer conclusions on the essential perspectives enormously impact their general suppositions on the stock. Especially, given the purchaser audits of an item, we tend to first set up item angles by a shallow reliance program and check customer feelings on these viewpoints by means of a notion classifier. We tend to then build up a probabilistic feature positioning principle to induce the significance of aspects by in the meantime considering aspect recurrence and along these lines the impact of customer sentiments given to each angle over their general suppositions. The trial comes about on an audit corpus of twenty one stylish items in eight spaces exhibit the adequacy of the anticipated approach. Additionally, we have a tendency to apply item feature positioning to 2 certifiable applications, i.e., archive level assessment characterization and extractive survey account, and finish imperative execution upgrades, that show the limit of item aspect positioning in encouraging true applications.

Misbehaving Node Detection using Secure Acknowledgement in MANET

International Journal of Engineering Research in Computer Science and Engineering, Available online 11th July 2017

Chandini K.C | Ganavi. N, Meghana K.M, Kalpana M.S, G.Manjula, Sowmya.A.M

Abstract

Mobile ad hoc networks (MANETs) can be defined as a collection of large number of mobile nodes. MANET is preferred in variety of applications such as military, disaster stuck areas, emergency recovery etc. MANET is vulnerable to various attacks due to its open medium and wide distribution of nodes. This itself emphasize the importance of security and need for an efficient system, for example intrusion detection system in MANET. The Misbehavior such as, delay or drop in data packets or acknowledgement packets, drop packets and modify routing information etc. are present. These Misbehavior need to be detected well in advance to keep network secure. In this paper we propose and implement, new IDS named as Secure Acknowledgement (ACK) System. The Secure ACK system is purely an acknowledgement based technique. The type of Misbehavior detected by proposed system is about delay in packet transmission. In this system, for every three consecutive nodes in the route, the third node is required to send back an acknowledgement packet to the first node in the group. Based on the non-receipt of ACK packet within predefine time to the first node in the group, it reports about Misbehavior activity in the network. As soon as the proposed system detects misbehaving node present in the network, it stops the further data transmission. So, the misbehaving node will not be able to damage network thereafter.

Mitigating denial of service attacks in search engines using OLSR Method

International Journal of Engineering Research in Computer Science and Engineering, Available online 21st August 2017

G.Geetha | Dr.B.Mukunthan PhD

Abstract

The web administrations are executed in any web search tool with a specific end goal to distinguish the blacklist connects in the sites. The issue meaning of this venture is to make the sites in the internet searcher in the real position. Essentially programmers will be encroach in to the source code of the web and include their own particular web connect into the higher earlier sites, this makes the lower earlier web to wager the higher earlier web in the brief time of the time with the goal that for the most part notice related sites are establishing in the best level of the sites. With a specific end goal to defeat the above given issue here we are presenting the ddos technique keeping in mind the end goal to recognize the blacklisted joins from the first sites. This can be executed in web servers; this is on account of web servers can be interrelated with a large portion of the web indexes. With the goal that the site administrator can have an individual login to discover the blacklisted connects in their own site. In included with the administrator can ready to erased the blacklisted site and can ready to recognize the IP address of the blacklisted zone. If there should arise an occurrence of consistent blacklisted from the any IP address implies that can be blocked for all time by the web administrator. So the by utilizing this strategy internet searcher will demonstrates the provoke comes about as indicated by the client characterized seek and in addition ad and advancement sites can be kept away from in major. So that by utilizing this technique the earlier hit recorded sites will brings about the best position of the web index. What's more, utilizing the IP address the blacklisting destinations will be blocked forever.

Mobile Applications In Context of Big Data A Survey

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

K Harshitha | N A Poojitha , Chaithra A , Bhavya C P , Mrs Sheela devi

Abstract

A large scale research initiative aimed at generating innovations around handheld devices based research as well as community based evaluation of related mobile applications. Big data refers to huge amount of digital information collected from multiple and different sources. Since a key point of big data is to access data from multiple and different domains, security will play a very important role in big data research and technology. Due to increase the challenges in mobile data or mobile data challenge (MDC), Big data is required for analysis and curation of mobile data. The rapid expansion of mobile technology has introduced a versatile global infrastructure that internally generate vast amount of data like user identification, location, device name and externally generate data related to mobile apps like number of mobile applications, number of downloaded applications, number of failure applications, number of popular applications etc. This paper presents a survey of the mobile applications (apps) in the context of Big data.

MongoDB vs MySQL

International Journal of Engineering Research in Computer Science and Engineering, Available online 15th July 2017

Mr. Parag S. Naik | Mr. Ashish Sambare, Mr. Nikesh Aote,Mr. Swapnil Dravyakar

Abstract

MongoDB is a free and open-source cross-platform document-oriented database program. Classified as a NoSQL database program, MongoDB uses JSON-like documents with schemas. MongoDB is an open-source document database that provides high performance, high availability, and automatic scaling. MongoDB obviates the need for an Object Relational Mapping (ORM) to facilitate development. MongoDB stores data in JSON-like documents that can vary in structure

Multiclass Sentiment Classification On Product Reviews

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th August 2017

Milan Gaonkar | Prof. Amit Patil

Abstract

Sentiment Analysis is an evolving field of research in text mining field. Nowadays, the opinions expressed through reviews are rising day by day on the web. It becomes practically unfeasible to analyze and extract opinions from such huge number of reviews manually. To overcome this problem an automated sentiment classification approach is needed. One aspect of study which is considered in this paper is to classify a given review tweet or paragraph whether it is of Positive[True-positive ,False-positive] or Negative[True-negative, False-negative] sentiment . In this paper a new approach is been proposed that uses lexicon database to assign each word in a text a value called score . The score is nothing but how a single word is affecting the whole sentence in which it is used. Every word in a sentence has its own strength and it tries to influence the overall semantic of the sentence. Higher the value of score of a word in the sentence, the more influential it is. The method proposed in this paper makes use of lexicon based approach as well as machine based learning. It uses AFINN lexicon database to assign score to words which is useful for sentiment classification and for testing and training the model the Support Vector Machine (SVM) and Naïve Bayes classifier (NB) machine learning algorithms are used

Multilevel Authentication System

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Nichita Silva Lobo | Beverly Rodrigues,Pavni Alluri,Prathibha Singh,Nicole Alvares

Abstract

Textual are the most simple to use and implement. They are the most common method used for authentication but are also vulnerable to spyware key, loggers, eves dropping and dictionary attacks. To address this problem and make the system more secure this paper proposes three different levels of authentication namely textual passwords, pair-based password and graphical password. Combining all the three level this paper focuses on providing the user with stronger security and a user friendly interface.

Network Data Collection and Analysis

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Er. Zainab Mirza | Pragya Mishra, Taher Shabbiri, Asmabee Khan

Abstract

In this paper, we try to implement Hadoop for storing and retrieving different parameters of network log data for analysis. This paper also consists of technologies such as shell script, Hive, PHP in accordance with other web technologies to get a better performance with Hadoop for managing Network traffic.

New Approach for Parallel Graph Computation Using Partition Aware Engine

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Prashant Patne | Vivek Takawale , Akash Tilak ,Chandan Tiwari

Abstract

Graph partition quality affects the whole working of parallel graph computation systems. The quality of a graph partition is calculated by the equity factor and edge cut ratio. A balanced graph partition with small edge cut ratio is generally preferred since it reduces the costly network conversation cost. However, according to an empirical study on Graph, the achievement over well partitioned graph might be even two times worse than simple random partitions. This is because these systems only enhance for the easy partition strategies and cannot efficiently handle the increasing workload of local message transmission when a high quality graph partition is used. In this paper, we propose a novel partition aware graph estimation engine named PAGE, which qualify a new message processor and a dynamic concurrency control model. The new message processor simultaneously processes local and remote messages in a unified way. The dynamic model adaptively adjusts the compatibility of the processor based on the online statistics. The experimental evaluation demonstrates the prestige of PAGE over the graph partitions with various qualities.

News Feed Recommendation & Diversification for Mobile User

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Miss.Vanita M.Gaikwad | Prof.Yogita S.Pagar

Abstract

A location-aware news feed (LANF) system generates news feeds for a mobile user supported their abstraction preference (i.e., their current location and future locations) and non-spatial preference (i.e., their interest). Existing LANF systems merely send the foremost relevant geo-tagged messages to their users. unfortunately, the key limitation of such associate existing approach is that, a news feed might contain messages related to identical location (i.e., point-of-interest) or identical class of locations (e.g., food, diversion or sport). We argue that diversity may be an important feature for location-aware news feeds as a result of it helps users discover new places and activities. In this paper, we propose News-Feed; a replacement LANF system allows a user to specify the minimum variety of message classes (h) for the messages in a very news feed. In News-Feed, our objective is to with efficiency schedule news feeds for a mobile user at their current and expected locations, such (i) every news feed contains messages happiness to a minimum of h completely different classes, and (ii) their total connectedness to the user is maximized. To attain this objective, we formulate the matter into 2 components, namely, a choice drawback and an improvement drawback. For the choice drawback, we offer a definite answer by modeling it as a most flow drawback and proving its correctness. The improvement drawback is resolved by our projected three-stage heuristic formula. we conduct a user study and experiments to estimating the performance of NewsFeed employing a real information set crawled from Experimental results show that our projected three-stage heuristic planning formula outperforms the brute-force optimum formula by a minimum of associate order of magnitude in terms of period of time and also the relative error incurred by the heuristic formula is below 125th. News-Feed with the placement prediction methodology effectively improves the connectedness, diversity, and potency of reports feeds.

News Feed Recommendation & Diversification for Mobile User

International Journal of Engineering Research in Computer Science and Engineering, Available online 14th July 2017

Miss.Vanita M.Gaikwad | Prof.Yogita S.Pagar

Abstract

A location-aware news feed (LANF) system generates news feeds for a mobile user supported their abstraction preference (i.e., their current location and future locations) and non-spatial preference (i.e., their interest). Existing LANF systems merely send the foremost relevant geo-tagged messages to their users. unfortunately, the key limitation of such associate existing approach is that, a news feed might contain messages related to identical location (i.e., point-of-interest) or identical class of locations (e.g., food, diversion or sport). We argue that diversity may be an important feature for location-aware news feeds as a result of it helps users discover new places and activities. In this paper, we propose News-Feed; a replacement LANF system allows a user to specify the minimum variety of message classes (h) for the messages in a very news feed. In News-Feed, our objective is to with efficiency schedule news feeds for a mobile user at their current and expected locations, such (i) every news feed contains messages happiness to a minimum of h completely different classes, and (ii) their total connectedness to the user is maximized. To attain this objective, we formulate the matter into 2 components, namely, a choice drawback and an improvement drawback. For the choice drawback, we offer a definite answer by modeling it as a most flow drawback and proving its correctness. The improvement drawback is resolved by our projected three-stage heuristic formula. we conduct a user study and experiments to estimating the performance of News-Feed employing a real information set crawled from Experimental results show that our projected three-stage heuristic planning formula outperforms the brute-force optimum formula by a minimum of associate order of magnitude in terms of period of time and also the relative error incurred by the heuristic formula is below 125th. News-Feed with the placement prediction methodology effectively improves the connectedness, diversity, and potency of reports feeds.

NLP based intelligent conversational agents to Internet of Things

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Ms.G.Divya | Dr.M.Humera Khanam, Mr.K.Ravi Kishore, Ms.D.Sucharitha

Abstract

Internet of Things is an emerging and significant technology shaping the future that connects things or physical devices with internet. It allows intersection of various technologies to make it more intelligent and efficient. In this paper we focus on integrating intelligent conversational agents or chat bots with IoT. Literature survey presents various features, underlying technologies, applications and challenges of IoT. Greater numbers of intelligent conversational agents are being adopted due to major progress in development of frame works and platforms. This paper explains specific integration of intelligent conversational agents in IoT. We analyzed loopholes of existing IoT systems and present ways to tackle them by incorporating intelligent conversational agents. Architecture has been proposed in this paper for implementing system platforms and frameworks for both commercial and open source. We have identified newer challenges that takes place in future and took forward directions with this integration, all of these directions have been addressed

Object Detection and Tracking for Computer- Vision Applications

International Journal of Engineering Research in Computer Science and Engineering, Available online 5th August 2017

Rojasvi G.M | Dr Anuradha S G

Abstract

Object tracking is to estimate locations of target in an image sequence, it is the most challenging aspect in the computer vision applications with difficulties that arise due to intrinsic, extrinsic factors like deformation, camera motion, motion blur. Object tracking plays vital role in human-computer interaction, surveillance, robotics and overcomes practical problems of disturbance and effective noise. Object detection is the task of identifying the physical movement of an object in a given region. It is challenging role to detect the shape of the object as dynamic scene changes accordingly

Online Auction with Encrypted Chat Facility For Bidders

International Journal of Engineering Research in Computer Science and Engineering, Available online 22nd August 2017

Ms.Vidhya.S | Mr.J.Alex Rozario,Mrs.Dhanya Krishnan

Abstract

The system of online auction with easier contact method via encrypted chat facility was developed supported by a heterogeneous bidding model to spot out the behavioural mode of bidders to ensure the completion of a truthful system meeting the criteria of incentive-Compatible, Online Cloud Auction. The realised modules through this project are solely relying on the online approach of placing bids for the resources on cloud to identify, sort and implement a schema which takes cares of the utmost doable exploitation of the reserves. Apart from the competence proportions of the available resource allocation, the straightforwardness of the completed realization was keenly ensured to meet the incentive-compatibility.

Online Exam Management System

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

M.Mani Mohan Reddy | Mahendhra Sahani, Dr.Lakshmi

Abstract

Online Exam Management System is an online examination system aimed to help the academicians to conduct and evaluate the exam in Quick and effective manner. The key objective of this system is to offer user friendly environment to students and mainly to the faculty by reducing the time for evaluation. The main concept of this work is to develop a software that provides a framework to conduct online exam for students on any theme. This software affords 3 levels of user the role and purpose of the user are given as follows: 1. Admin, who is the super admin of the project who accomplish all the components and has full accurse of the project. 2. Teacher, who is responsible for accretion the questions and answer, evaluation, generating report about the specific exam. 3. Student will be attending the exam 4. Full security will be provided regarding exam and about details of examination. Exam can be accompanied for huge number of students. Evaluation can be carried out in less time publishing results in accurate and easy manner. We puton all arithmetic metrics to engender report based on the pre- request of the user.

Online Examination System Based on Android Mobile

International Journal of Engineering Research in Computer Science and Engineering, Available online 14th July 2017

Shrikrushna S. Kure | Shriram S. Dhage,Sonu k. Pathare,Prof. Sayali shivarkar

Abstract

This Android application (stand alone too), where one can set the question for different technology i.e. Android, Java etc and one can register them self for test as a student, he can choose the choice of technology (Android, Java), and simultaneously he can get the exam result. After submit or End of the Test the form will be submitted and evaluated. Scores will be given to the user on his request. The question and answers can be text or pictures or audios or even videos. Initial plan is to develop a objective type text based question and answer. The main programming language is android/Java database as a sqlite3. Online Examination System is used for conducting online objective test, the test will be customized such that system will have automated checking of answers based on the user interaction. This project helps the faculties to create their own test based on the subject. This also helps the instruction to perform online quiz, test paper such that the academic performance of the students can be increased and can take the feedback from both students and parents. Exam System is very useful for Educational Institute to prepare an exam, safe the time that will take to check the paper and prepare mark sheets. It will help the Institute to testing of students and develop their skills. But the disadvantages for this system, it takes a lot of times when you prepare the exam at the first time for usage. And we are needs number of computers with the same number of students.

Online Food Orderring System

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Miss. Dake.S.R | Miss.Gajare.P.V, Miss.Kavathekar.S.S., Miss.Pawar.S.R, Prof. M.N.Jadhav

Abstract

The purpose of this project is to develop a computerized and mobilized food ordering system that can be used to revolutionize the traditional ordering system that currently implemented in majority of the food and beverage industry. The traditional system that using by most of the food and beverage industry is the traditional manual ordering system which means all works and procedures is recorded through manpower manual work and it consist of a huge amount of paper work that is not effective and efficiency. This cause the business to encounter trouble which regarding human error due to the huge amount of manpower manual work that operating in each business routine. Thus, this computerized and mobilized food ordering system is designed to assist the business routine in term of having better management as well as easier to handle daily business operation. This system is designed for small medium enterprise food and beverage industry. The chosen methodology for this project is throwaway prototyping methodology. This is because majority of the targeted user do not have the experience in using computerized system in food ordering procedure as they implement traditional ordering system previously. Therefore, this methodology enables developer to communicate with target user through using the prototyping, which can let target user to review, evaluate, visualize and learn about the system before the actual implementation of the final system. Furthermore, the system is a cross platform system which involve desktop based and mobile phone based which is in Android operating system. It is also the highlighted feature of the system which does not limited the ordering procedures to desktop based as portable and mobility is the current trend. Besides that, with this feature it also provide a degree of level of self service for targeted users’ consumers, as they canplace order themselves through using the mobile application.

Optimized Component Development Life Cycle for Optimal Component-Based Software Development

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Gaurav Kumar | 

Abstract

The traditional software development approaches are not optimal for developing the complex software system using the reusable software components as compared to the Component-based software development approaches, because traditional approach almost try to attempt to develop the system through scratch. That is why, component-based software development (CBSD) continues to be a key area of research in the systems development and software engineering fields as it focuses on the integration of pre-fabricated software components to build systems characterized by increased portability and flexibility. The main objective of CBSD is to build systems by assembling pre-existing software components. The existing CBSD life cycles have not discussed the optimal selection of components when there is unclear and ambiguous user requirement. Majority of the existing CBSD life cycles are based on two processes, one of which deals with the development life cycle of component for reuse and the other deals with the development life cycle of Component-Based system as whole. This paper discusses a single and an optimized component development life cycle which deals with the development of optimal Component-Based systems by selecting optimized components when there is unclear, ambiguous and more general user requirements and there is no specific user requirement and this proposed development life cycle performs testing both at component level and system level and that too by not having two separate life cycles.

Parallel Computing of Fractional Integral Operators

International Journal of Engineering Research in Computer Science and Engineering, Available online 14th August 2017

Sameer S. Chikane | Mukesh D. Patil, Vishwesh A. Vyawahare

Abstract

Fractional calculus a field dealing with mathematical analysis has its applications in various domains such as power transmission units, image processing, financial system design, automobiles and various control system. There are many advantages of fractional calculus in analytical world. But, the computational cost accompanied with it has prevented software implementations to achieve real-time performance for large and complex computations. This paper exhibits the parallel computing power of the Graphics Processing Unit (GPU) in the area of fractional-order integration. Numerical methods for implementing different fractional-order derivatives and integrations are available. By using MATLAB Parallel Computing Toolbox, GPU computational power can be easily accessed with minimum knowledge of GPU architecture and MATLAB code can be executed on the GPU. The fractional-order integration by Trapezoidal formula using NVIDIA GPU with support of MATLAB Parallel Computing Toolbox is implemented in order to achieve faster execution. Performance comparison of the algorithm for sequential implementation on CPU and parallel implementation on GPU is carried out. This new algorithm produces significant speedup in the computations of fractional-order integration and provide required result in much less time as compared to execution on CPU.

Part of Speech Tagging for Konkani Corpus

International Journal of Engineering Research in Computer Science and Engineering, Available online 30th June 2017

Meghana Mahesh Pai Kane | 

Abstract

The wide spectrum of languages are been used for communication around the world , utilization of world wide web for searching information requires computational linguistics because majority of the search engines uses bag of words that causes problem in extracting of the information due to use of Multi words . This has made to think beyond the boundaries about what kinds of query a human can submit and also its interpretation in forms of its annotation could be used to obtain good result. The essential st ep in the Natural Language Processing resides in obtaining the grammatical information of the words used in the input as per it appearance in the text .POS taggers for several other Indian languages have been developed but assumption of unavailability of the POS tagger for the Konkani language aims at developing the same. Further POS tagging to do manually is much tougher job due to huge content of data. This paper aims at part of speech tagging for Konkani corpus.

Phishing Websites Detection Based On Web Source Code And Url In The Webpage

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Aarthi.R | Keerthana.N.D

Abstract

Major security issues for banking and financial institutions are Phishing. Phishing is a webpage attack, it pretends a customer web services using tactics and mimics from unauthorized persons or organization. It is an illegitimate act to steals user personal information such as bank details, social security numbers and credit card details, by showcasing itself as a truthful object, in the public network. When users provide confidential information, they are not aware of the fact that the websites they are using are phishing websites. This paper presents a technique for detecting phishing website attacks and also spotting phishing websites by combines source code and URL in the webpage.

Plant identification system using leaf feature Plant

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th August 2017

Ms. Vinutha B T | Arvind Kumar, Chauhan Akash, Nithin M E, Prashanth G D

Abstract

From the beginning of earth survival the plant life begin. Plant affecting in flora and fauna. 70% of plant life found in ocean. Year passes revolutionary happen and human life came to survival. Due to that evolution happen in human life. Man started study on plant life. They got the outcome of their study that plants are being used as survival of human being. After that they started study more about plant and they get to know more about plant and there uses such as it can be used as medicine & etc. Human are totally depends on plant life on the daily bases. But the major occur that extinction of plant. Due to this, it effects on earth by increasing rate of pollution and Ozone layer is getting decreases and UV ray is radiating. Many research happened on plant and it terms as Botany. Here also, we are going to propose the system for identification of a leaf. We are going to extract the features of leaf such as perimeter, area, eccentricity, centroid & etc. It is difficult to recognize whether it is medicinal plant or not. But using a MATLAB it is easy to identify the leaf and their features. In this MATLAB we can capture a real time leaf image using a high pixel camera. After capturing a image it will go under different process. According to DATABASE the leaf id generates and provides its basics features.

Polarity based Analytics from Social Media to Mitigate Adverse Drug Reactions

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

S.Kavishree | Dr.P.Shanmugapriya,R.Saravanan

Abstract

In the recent years, social media have been emerged as major platforms for sharing information in the medical field, business, education etc. The existing system will generate a warning for adverse drugs reactions based on the negative comments from forums. The use of Latent Dirichlet Allocation modelling(LDA) in the existing system makes the data labelling process time-consuming and the polarity analysis is not done. But the proposed system uses Twitter to get the information and process on it. The information from the Twitter is extracted using Twitter API. Pre-processed tweets are stored in the database and those tweets are identified and classified whether it is based on drugs related tweets and diseases related tweets using Support Vector Machine classification(SVM). The user keywords can be predicted whether it is the best suggestion using polarity. Polarity detection is done by the keywords. Based on the number of positive tweets and the number of negative tweets it analyzes the best medicine. This system is very useful for the users to gain knowledge of the medicine

Portable Wi-Fi Calling And Interactive Voice Response System

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Ruchi W. Kasare | Pooja K. Muneshwar,Nikhil D. Tembhekar,Prof. V. P. Yadav,Prof. J. V. Shriral

Abstract

Implementation of a VoIP telephony system using an IP Telephony solution in the organization as IVR. A new technology VoIP or Internet Telephony means that your voice is carried over the IP network, otherwise known as the Internet. Voice which is an analog signal, is converted to digital data, which is then disassembled and transmitted through the Internet or Internet to be recovered back to an analog signal an the other using an IP Telephony solution which is an Linux base system. This service can be properly managed and deployed over a network with less stress and expenses. The system main server also has integrated in its other communication services such as voicemail, mobile calling on Wi-Fi network without using any cellular network connection and has many advance features.

Preserving Individual Seclusion In Social Media

International Journal of Engineering Research in Computer Science and Engineering, Available online 5th August 2017

Sneha Chinivar | Mr.Ramu.S

Abstract

Social media is a platform where re sharing of post is allowed. This may lead to privacy conflict between the involved users as the post is shared without considering the actual owner’s preference. In order to address this issue, here an algorithm is used to automatically detect and resolve the conflicts that occur between the negotiating users. Also tagging permissions are used here so that no user can be able to tag any other user without that user’s permission both in textual content and photo. Face recognition system has been used here to recognize the face uploaded by user and to get permission of the user of whom the photo is uploaded. Only if that particular person gave permission then the post will be posted, otherwise it won’t get posted. Here timing constraint is one more feature that is added so that up loader can set by how much time response should be received and what action to be taken if response is not received in that time constraint. Through this work an attempt has been done to preserve the privacy of individual users of social media

Preventing Obfuscated Malware via Differential Fault Analysis

International Journal of Engineering Research in Computer Science and Engineering, Available online 16th August 2017

Shubhangi.D.C | Amena Roohi

Abstract

The rapid growth of Smartphone sales has come hand in hand with a similar increase in the number and sophistication of malicious software targeting these platforms. Malware analysis is a thriving research area with a substantial amount of still unsolved problems. A major source of security problems is precisely the ability to incorporate third-party applications from available online markets. In the case of smart phones, the impressive growth both in malware and begin apps is making increasingly unaffordable any human driven analysis of potentially dangerous apps. Malware samples consists of hiding and obfuscating modules containing malicious functionality in places that static analysis tools overlook ALTERDROID, is a open source tool for detecting, through reverse engineering, obfuscated functionality in components distributed as parts of an app package. Such components are often part of a malicious app and are hidden outside its main code components, as code components may be subject to static analysis by market operators. The key idea in ALTERDROID consists of analyzing the behavioural differences between the original app and an altered version where a number of modifications. The Malware applications are shown in the screen, and then the user can uninstall the malicious application. The experimental results obtained by testing ALTERDROID over relevant apps and malware samples support the quality and viability of our proposal.

Privacy Ensured Contemplate With SVM and Role Based Classification with Collaborative Tagging

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

A Divya | S Madhu Sudhanan, M Poornima

Abstract

Tagging system is one of the most diffused and popular services available online. This system allows users to add free text labels generally referred as tags to the Internet resources for example web pages, images, video, music and even blogs. Web metadata have a potential to improve search, retrieval and to protect end user from possible harmful content. The Organization updates their Company portal with public sharing data along with Sensitive data. The query is processed based on the User Profile Analysis. In actual system provide taxonomy of tagging system and system web technologies help to specify labels and rate for that labels which assess the trustworthiness of resources to enforce web access personalization. To enhance the efficiency of tag suppression the privacy ensured skim with Support Vector Machine along with Privacy Enhancing Technology is implemented. SVM is used for extraction of data and obscure delicate data. PET is achieved by using the technique Tag Suppression which has the role of providing the privacy for information. Web user will search using a keyword. The keyword may be the location, feedback or cost to analyze the data. The authentication of the portal is done by the management. Management classified as two roles they are Department Head Role and Admin. Department Head Role is to update their part of portal and retrieve only the corresponding data. Final authentication and approval is done by the admin. Through the analysis efficiency guarantees of proposed scheme is achieved.

Privacy Preserving Association Rules Mining In Horizontally Distributed Databases

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Nikhil Puri | Swapnil Patke, Vishwajeet Godage, Yogesh Sherkar, Asst.prof.Sunil Kale

Abstract

This paper presents secure mining of association rules in horizontally distributed databases by proposing a protocol. This protocol is made up of the Fast Distributed Mining (FDM) algorithm which is consist of unsecured version of the Apriori algorithm. Our protocol made up of two novel secure multi-party algorithms one that calculates the unions of private subsets that each of the interacting players hold, and another that tests the inclusion of an element held by one player in a subset held by another. The main merit of our protocol is to provide privacy with respect to the protocol. It is also useful in terms of simplicity and is also significantly more efficient in terms of communication rounds, communication cost and computational cost.

Privacy Preserving on Fast Classification of Time Series Data

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Md Abdul Aziz | .K.Indu, O.Kavitha

Abstract

Now a days, data is growing rapidly in different fields like trade reports, social networks, hospital etc and all these data maintained in cloud. To extract the data from cloud, we can use data mining concepts. Classifying these data, the time series data has become a topic of great interest in data mining. In case only one person is dealing with the data there are many algorithms to classify. In this paper, we are classifying the data when it is with two or more persons and no one wants to share their data, even though we can do classification of the data securely. There are two basic data partitioning models, they are horizontal partitioning and vertical partitioning. We are proposing novel time series classification algorithm for classification of vertically partitioned data. Our approach is on distance based novel classification of the time series data. To classify securely we use the concept of secure multi-party computation protocols. By using secure multiparty computation protocols, we are proposing secure square root sum and secure sum protocols for classifying data securely. In these two approaches secure square root sum gives the best result.

Privacy Preserving Top-K Disease Names Retrieval Method for Clinical Decision Support System

International Journal of Engineering Research in Computer Science and Engineering, Available online 19th July 2017

Shruti B Karki | Mrs. Anitha K, Mrs. Nandini G

Abstract

Clinical Decision Support System, using the advanced Data Mining techniques help the clinicians to make proper decisions, has obtained a huge attention recently. One of the advantages of clinical decision support system include not only promoting diagnosis accuracy but also reducing diagnosis time. Even though the clinical decision support system is quite challenging, the twist of the system still faces many challenges including information security and privacy concerns. In this paper, we propose a new “Privacy Preserving Top-K Disease Names Retrieval Method for Clinical Decision Support System” that helps clinician complementary to diagnose the risk of patient’s disease in a privacy-preserving way. A new cryptographic tool called Additive Homomorphic Proxy Aggregation scheme is designed to protect the privacy of past patient’s historical data. The performance of the Proposed System is efficient in calculating the disease risk of the patients in the privacy preserving way

Private Cloud and Network Convergence

International Journal of Engineering Research in Computer Science and Engineering, Available online 11th August 2017

Shaikh Abdul Azeem | Dr. Satyendra Kumar Sharma

Abstract

Internet of Things (IoT) applications are considered to be a major source of big data obtained from a more connected dynamic and real life world and is evolving at a rapid pace. The realization of the IoT vision brings Information and Communication Technology (ICT) closer to many aspects of the real-world life instead of the virtual life through advanced theories, algorithms and applications. Technology of real-world IoT based on cloud computing has rapidly emerged as a novel industry and life pattern. In cloud computing environments that include mobile infrastructures, the most important and final goal is to provide users more secure and richer IoT services. Business problems that enterprises had been facing, such as storage, data security and maintenance costs, cloud is a solution for that. Variations of cloud are public cloud, private cloud. Both public and private cloud have their benefits and downsides, while sharing certain common features. It is possible to calculate the tangible and intangible benefits both forms of cloud offer, and upon analysis, enterprises can decide which type of cloud is more suitable for them. Network convergence provides an evolutionary path to data center modernization rather than being just another costly rip-and-replace solution. In this paper we discuss about private cloud, data centre and network convergence

Procreation of Hierarchical Routing Using AODV

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Shiva Mehta | Kamaljeet Mangat,Himanshu Jindal

Abstract

The Wireless Sensor Networks are used today to monitor hostile environments where the reach of human is not possible. For monitoring purposes in WSN, sensors are used that has capabilities of sensing, processing data and revelating the processed data to other sensors or surface station. To sense data in routing, data agglomeration and energy efficient protocols are designed for WSN as energy consumption is a serious issue in this network and thus after sensing data routing this data to destination is the main motive during the network. Hierarchical routing comes into existence that proves to be promising approach for point to point routing with a very small state of routing. Here in this paper, AODV routing is simulated for hierarchical routing in order to demonstrate its further use for realistic applications and WSNs setting. In this paper, the energy is very less consumed while having countable sets of sensors nearby for revelating data. At the end of the simulation, energy is saved and the connection with shortest distance comes out to be a lucrative result. In this paper, the state of art of AODV is presented by taking into deliberation of the topology changes during the energy depletion and node failure.

Providing Voice Enabled Gadget Assistance To Inmates of Old Age Home Including Physically Disabled People

International Journal of Engineering Research in Computer Science and Engineering, Available online 4th August 2017

Akshatha P | Abhirami Balaraman,Dr.Rathna.G.N

Abstract

Speech recognition is one among the most recently developing field of research, at both industrial and scientific levels. In this paper we have developed a gadget assistance system for an old age home, where the operational commands for a TV was provided as inputs and tested for its performance. This system is configured for both online and offline speech recognition. The online speech recognition uses DNN algorithm, whereas the offline speech recognition uses HMM algorithm. This gadget is also used for automation of devices such as television with the help of a LIRC module. Various speech recognition modules for playing Music, Videos, Games and Television control were written and executed. Accuracy of speech recognition was observed.

Proxy Oriented Identity-Based Data Uploading and Remote Data Integrity Checking in Public Cloud

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

M. Damodhar | S.Poojitha

Abstract

Now a day’s a number of clients were liked to store their data in public cloud along with the fast development of cloud computing. Novel security problems need to be resolved in order to facilitate processing of data for numerous clients over public cloud. Whenever a client is limited to access PCS (Public Cloud Services), he will hand over its proxy for his data process later upload them. Furthermore, remote checking of data integrity is an important security problem in public cloud. It provides the customers for checking that whether their data that is outsourced are kept undamaged without the requirement of downloading entire data. From the security problems, we propose an enhanced proxy-oriented data uploading and a model for remote data integrity checking over identity-based public-key cryptography: proxy-oriented identity-based data uploading and remote data integrity checking on public cloud. We provide a formal definition, system model as well as a model for security. Later, a concrete P-IDURIC protocol is designed with the help of bilinear pairings. The projected P-IDURIC protocol provides enhanced security based on hardness of the computational Diffie–Hellman problem. Furthermore the protocol is efficient and flexible. Depends on the actual client’s authorization, the projected P-IDURIC protocol will realize delegated remote data integrity checking, private remote data integrity checking, and public remote data integrity checking

Public Water Supply Grid Monitoring To Avoid Tampering & Water Man Fraud using IOT

International Journal of Engineering Research in Computer Science and Engineering, Available online 6th July 2017

Dr.B.Shadaksharappa | M Lorate Shiny,Nirosha S V, Sunethra C, Sunitha N

Abstract

In urban areas the water supply to residence and commercial establishments are provided at a fixed flow rate. There are incidents of excess water drawn by certain customers/users i.e., water will be released unofficially which is considered as water theft. In this project it is proposed to develop an embedded based remote water monitoring and theft prevention system by taking the data of water supply at the consumer/user end. The overall objective of a distribution system is to deliver wholesome water to the consumer at particular area and in sufficient quantity and achieve continuity and maximum coverage at affordable cost. To attain this objective the organization has to evolve operating procedures to ensure that the system can be operated satisfactorily, function efficiently and continuously as far as possible at lowest cost.

Rapid Action System for Safety Purpose

International Journal of Engineering Research in Computer Science and Engineering, Available online 4th August 2017

Aadil Nawaz | Muhammed Arif Jalil

Abstract

With augment in the crime rates in major cities, government have various steps to check on the problem at hand .But is not that effective because of various reasons. One of the major reasons is being easy accessibility to the spot because of various geographical reasons. Another reason for delayed in the action against the crime. Keeping these short coming in mind we have devised a system that is capable of taking quick action against the crime. The system comprises of a control room, a unmanned vehicle (drone) and a smart watch. The system works when this watch send a danger signal to the control room along with its location, and the control takes a quick by sending the unmanned vehicle which will reach the given location .The drone is controlled and monitored by control room. The drone consists of a camera,a teaser gun, a tear gas bomb and accompanied by GPS and GSM .Once the drone reaches the spot it will send the live video to the control room and necessary action can be taken and if requires we can momentarily paralyze the suspect with help of teaser gun. Even if location changes the will follow the location. Through this system we can monitor the activities in and around the city.With effective implementation of this system we can bring down the crime rates and make our society a better place to live

Raster Format Mapping onto Adobe Reader for Visually Impaired

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Gururaj K S | 

Abstract

Texts are scripts provided by the language to convey information. The main idea of this paper is to provide a means for people with vision disabilities to listen to the text of an image by converting text into speech. This process uses text-to-speech, the generation of synthesized speech from text. Image containing the text is pre-processed that prepares the text for recognition. Text recognizer needs to localize the text in image accurately. Separation of text from each other is done by segmentation. Segmentation is followed by the extraction of character, resizing them and storing them in a PDF document. Frequency speech synthesizer provides the speech by performing natural language processing and digital signal processing of the text.

Real-time Facial Disorder Detection Using Internet of Things

International Journal of Engineering Research in Computer Science and Engineering, Available online 11th July 2017

K. Asha | Reshma M Gutagi, M.Lorate Shiny

Abstract

Today’s research emphasis are utilizing on the real-time facial disorders detection (RFDD) by using cameras at public places. These cameras analyse the infected faces and sending it over the WIFI which are becoming more common in the Internet of Things era of today. Recognizing facial disorders is subjective and presently performed by dermatologists. However, with progressive development in the IoT enabling technologies and image processing methodologies, it is now feasible to compute facial skin disorders utilizing digital photographs in real-time applications. In this paper, we put forward a new real-time method for abnormal facial regions recognition and segmentation over the IoT epitome.

Recommendation Engine in E-Commerce

International Journal of Engineering Research in Computer Science and Engineering, Available online 22nd June 2017

Shrinivas S Hegde | Soumya Lakshmi G, Vellaki Kiran Kumar, Neelu L, Pramodchakravarthy Patil

Abstract

Recommender systems areimportant for businesses because they can help companies offer product recommendations to customers. There are many acknowledged consumer-oriented recommender systems, particularly in e-commerce. A client-product matrix is built which matches company clients to internal company products. Pairing of clients and products is based on coclustering principles and reveals potential future purchases. Compared to other consumer-oriented recommendation systems, this approach takes into account the need for interpretability. The recipient of the generated recommendations are sales and marketing teams; hence, a detailed reasoning will be done in straightforward English that considers multiple aspects regarding why a client may be a suitable match for the particular offering.

Recommendation Engine in E-Commerce

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th August 2017

Shrinivas S Hegde | Soumya Lakshmi G, Vellaki Kiran Kumar,Neelu L, Pramodchakravarthy Patil

Abstract

Recommender systems are important for businesses because they can help companies offer product recommendations to customers. There are many acknowledged consumer-oriented recommender systems, particularly in e-commerce. A clientproduct matrix is built which matches company clients to internal company products. Pairing of clients and products is based on co-clustering principles and reveals potential future purchases. Compared to other consumer-oriented recommendation systems, this approach takes into account the need for interpretability. The recipient of the generated recommendations are sales and marketing teams; hence, a detailed reasoning will be done in straightforward English that considers multiple aspects regarding why a client may be a suitable match for the particular offering.

Recommendation On E-commerce based Structural Balance Theory over Big Rating Data

International Journal of Engineering Research in Computer Science and Engineering, Available online 4th August 2017

Ms. Nandini P | Ms. Pallavi R, Kanishka and Anirudh

Abstract

Recommending appropriate product items to the target user is becoming the key to ensure continuous success of Ecommerce. Today, many E-commerce systems adopt various recommendation techniques, e.g., Collaborative Filtering (abbreviated as CF)-based technique, to realize product item recommendation. Overall, the present CF recommendation can perform very well, if the target user owns similar friends (user-based CF), or the product items purchased and preferred by target user own one or more similar product items (item-based CF). While due to the sparsity of big rating data in E-commerce, similar friends and similar product items may be both absent from the user-product purchase network, which lead to a big challenge to recommend appropriate product items to the target user.

Redefining Smart Cities for a Sustainable Future

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Prof Rashmi Dande | 

Abstract

Every city has its own history, culture and identity. There is no doubt that we need to nurture, preserve and renew the urban fabric with changing times. However, there is also a need to build new cities. A city is an economy of agglomeration; it provides various advantages and opportunities. India’s economy is expanding rapidly. By 2030 it is expected to have grown by five times, During the same period, the country’s labour force is expected to grow by 270 million workers, with urban jobs accounting for 70% of that growth. Today, India is less than 30 per cent urban and the quality of life in its cities is chronically low. However, with 2/3rds of GDP already generated in India’s cities and rural to urban migration patterns accelerating, the country faces a critical challenge: managing this rapid urbanization in a way that enhances the livability of India’s urban spaces. The wave of urbanization that is sweeping across India represents one of the country's greatest opportunities as well as one of its most serious challenges. India struggles with a number of significant barriers that continue to hamper the development of urban infrastructure: complex leadership structures, land valuation challenges, capability gaps, and funding shortfalls are all part of the urban challenge that is effectively holding India back from a new round of dramatic economic growth. India also needs to address the current problems of developing good infrastructure, solid waste disposal, flood management, storm water and sewerage system etc. resulting in urban decay, traffic gridlock and there by a deteriorating quality of life for many of its citizens. With the mess that most Indian megacities are in, it is inevitable not only to drastically take steps to rehabilitate infrastructure in existing cities but build new cities to accommodate this burst in urban population. In many cases, if not all, retrofitting old cities with improved infrastructure and playing the 'catching-up' game is a more expensive and difficult-to-implement agenda. It is logical and quicker to build entire new smart cities from scratch instead. But is India and its inhabitants ready to accept these smart cities, do we have that infrastructure and technology that will help to work for these smart cities. The answers to all these questions are unknown. This research paper mainly focuses on these issues of smart cities and also raises a question whether India should opt for Smart cities or Sustainable cities

Reduced Instruction Set Computer Processor for Cryptographic application

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th August 2017

Vijayalaxmi P | Chandrakumar H S, Mohankumar B N

Abstract

Security is one of the most important features of industrial products. Cryptographic algorithms are mainly used for this purpose to obtain confidentiality and integrity of data in industry. One of the main concerns of researchers in designing cryptographic algorithms is efficiency in either soft- ware implementation or hardware implementation. However, the efficiency of some well-known algorithms is highly questionable. The main goal of this paper is to present a novel processor architecture called CIARP (stands for Crypto Instruction-Aware RISC Processor) being feasible for high speed implementation of low throughput cryptographic algorithms. CIARP has been designed based on a proposed instruction set named Crypto Specific Instruction Set (CSIS), that can speed up encryption and decryption processes of data.

Remote monitoring automatic irrigation system for home gardens using GSM

International Journal of Engineering Research in Computer Science and Engineering, Available online 5th August 2017

GNK Suresh Babu | Sarala D.V, Manjunatha S J, Srivatsa Shashikumar

Abstract

In this paper we present a prototype for automatic controlling and remote accessing of irrigation motor. Prototype includes sensor node, controller node and mobile phone. In sensor node, soil moisture sensor and wireless transceiver is integrated with ARM cortex microcontroller. In controller node, GSM module, wireless transceiver, keypad, LCD display and a motor is integrated with ARM7 microcontroller. The sensor node can be deployed in irrigation field for sensing soil moisture and the sensed data is sent to controller node. On receiving sensor value, the controller node checks it with required soil moisture value. When soil moisture in irrigation field is not up to the required level then the motor is switched on to irrigate associated agriculture field and alert message is send to registered mobile phone.The controller node has navigation keys to set the mode of operation and an LCD display to view sensor data. The prototype is tested by abstracting three pots containing soils with different moisture level as irrigation fields. Results show the proposed prototype is effective in automatic controlling and remote accessing of irrigation motor based on the feedback of soil moisture sensor and commands from mobile phone.

Resisting Shoulder Surfing Attacks Using Secured Graphical Pass Matrix Authentication Scheme

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th August 2017

Rashmi B.K | Manisha Singh, Mranali Gupta, Surya R, Sushmitha Narayan

Abstract

Authentication based on passwords is used largely in applications for computer security and privacy. However, human actions such as choosing bad passwords and inputting passwords in an insecure way are regarded as ”the weakest link” in the authentication chain. Rather than arbitrary alphanumeric strings, users tend to choose passwords either short or meaningful for easy memorization. With web applications and mobile apps piling up, people can access these applications anytime and anywhere with various devices. This evolution brings great convenience but also increases the probability of exposing passwords to shoulder surfingattacks. Attackers can observe directly or use external recording devices to collect users’ credentials. To overcome this problem, we proposed a novel authentication system PassMatrix, based on graphical passwords to resist shoulder surfing attacks. With a one-time valid login indicator and circulative horizontal and vertical bars covering the entire scope of pass-images, PassMatrix offers no hint for attackers to figure out or narrow down the password even they conduct multiple camera-based attacks. We also implemented a PassMatrix prototype on Android and carried out real user experiments to evaluate its memorability and usability. From the experimental result, the proposed system achieves better resistance to shoulder surfing attacks while maintaining usability.

Resolve the Classification Problem over Encrypted data Using K-Nearest Neighbour

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

C Deepika | S Deepak, Jestina Thomas, Akansha Singh

Abstract

Data mining is widely used in numerous areas such as banking, medicine, scientific research and various other government applications. Data Classification is most extensively used task in data mining applications. The rise of various issues in privacy has led to several solutions to this problem. However, with the increased fame of cloud computing, users can now outsource their data onto the cloud in an encrypted form, as well as perform the required mining tasks on the cloud. Since the data is in an encrypted form on the cloud, existing privacy-preserving classification techniques are not suitable. In this paper, we focus on a viable technique to perform data classification using k-NN classifier over the encrypted data and secure the confidentiality of data, privacy of the users input query and also hide the data access patterns. We also analyze the efficiency of the proposed protocol empirically.

Resource Requirements In Cloud

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Sudha Pelluri | Ramachandram Sirandas

Abstract

Resource providers on Cloud offer heterogeneous resources such as compute units and storage in Virtual Machine instances (VM). Cloud providers expect users to request for resources. In this process, overestimation of resources by cloud users lead to unused resources. The cumulative unutilized resources for each job of the user, amount to unnecessary expenditure for users and wasted resources for providers. Large scale data centers that provide reliable high performance computational and storage services for Cloud providers, face problems of increased energy consumption and CO2 emission as a consequence of huge resource wastage. Therefore, for environmental and financial reasons it is imperative to reduce unnecessary resource reservation. This can be done by using resource prediction technique that ensures resource allocation only as much as is necessary for the customer. Currently, there are no suitable prediction techniques for Cloud resource usage because of absence of pattern, trend and seasonality in users’ resource usage [2].The proposed prediction approach applies Enhanced Instance Based Learning and is tested using Google Cluster Trace Data [1] . The contribution of this work to existing body of work on cloud resource management by effective resource prediction approaches are discussed.

Reversible Data hiding by Reversible image Transformation Algorithm for Encrypted Images

International Journal of Engineering Research in Computer Science and Engineering, Available online 11th August 2017

Bharati S Pochal | Gayatri Prasanna

Abstract

The outsourcing data to the cloud is very important to defend privacy of the information and it will allow the cloud server to easily manage the information at the same time. And reversible data hiding in encrypted images (RDH-EI), it will attracts the more and more researchers interest and also we are introduced a framework for RDH-EI based on Reversible Image Transformation that is [RIT]. This one is the unique framework from all other frameworks, in which framework the cipher text may be attract the notation of the interested cloud. This framework permits the client to convert the original image content in to target image content with a similar size, and the transformed image seems like a target image and it is used as an encrypted image and it is outsourced to the cloud. For this the cloud server embeds the data in to encrypted image so easily, by using any RDH techniques for the plain text pictures. Like that we realized that client free scheme for RDH-EI, and this is data embedding process and it will be implemented by the cloud server is unrelated with the both encryption and decryption process, to embed the watermark in the encrypted image we need two RDH techniques, including unified embedding, scrambling scheme and traditional RDH scheme, it can assure different requirements on picture quality and huge embedding capacity.

Reversible Data Hiding using Context free Reversible Grammar

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th August 2017

Samiksha Velip | Dr. J. A. Laxminarayana

Abstract

With the popularity of outsourcing data to the cloud, it is vital to protect the privacy of data. Systems security becomes the first consideration to prevent illegal access as interest of information security has increased recently. Information hiding is one of the methods for secret communication, where the existence of the secret data is hidden. In this paper, we propose a novel framework for reversible data hiding scheme using context free grammar where additional data can be embedded in encrypted image in form of context free grammar

Review An Efficient Approch To The Green Computing For Load Balancing

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Ruchika Wankhede | A.H.Gade

Abstract

Cloud computing is an expanding area and most discussible in the field of research, industry and development today, which involves virtualization, distributed computing, internet, and software and web services. While a large body of work now a days has recently focused on reducing energy expenses of data center’s, there exists no prior work on investigating the trade-off between minimizing energy expenditure of data center’s and increase the processing speed for various Internet and cloud computing services that they may offer. This paper presents an approach for scheduling algorithms that can maintain the load balancing. In this research work we have developed power optimization algorithm which over comes the limitations of the previous algorithm & it helps in optimization of the energy consumption along with the operation of load balancing in data centre.We implements strategy known as Round Robin (RR) scheduling algorithms which will give better result than existing one.

Review on Black hole Attack Detection in Wireless MANET

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Kishor A. Dongarwar | Mr. Nitesh Ghodichor

Abstract

In wireless mobile ad-hoc network nodes are communicating with each other with the help of wireless link. In MANET (Mobile Ad-hoc Network) due the absence of centralize monitoring the network is vulnerable by various types of attacks. In this type of network a node establishes communication is on trust base. As due to their feature of open medium, dynamically changing topology of network, absence of central monitoring security is the significant challenge for these networks. In MANET an intermediate node involved for promoting a packet to the destination node, this intermediate node may act in malicious manner and drops all the packets instead of forwarding to an appropriate node. Such a malicious behavior of a node is called as black hole attack. In this paper we study one routing protocol i.e. Ad-hoc On-demand Distance Vector(AODV) protocol and analyze in detail one type of attack the “black hole” attack and discuss different solutions for the black hole problem in wireless mobile ad-hoc network.

Review over Probabilistic Routing Algorithm in MANET

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Dr. Vikash K Singh | Devendra Singh Kushwaha, Shaibya Singh, Sonal Sharma

Abstract

The nature of the universal computing has made it necessary to adopt wireless network as the interconnection method: it is not possible for the ubiquitous devices to get wired network link whenever and wherever they need to connect with other ubiquitous devices. The Mobile Ad Hoc Network is the wireless networks that have attracted most close attention from many researchers. A Mobile Ad hoc Network (MANET) is a system of wireless mobile nodes that dynamically self-organize in arbitrary and temporary network topologies. People and vehicles can thus be internetworked in areas without a preexisting communication infrastructure. In the mobile ad hoc network, nodes can directly communicate with all the other nodes within their radio ranges; whereas nodes that not in the direct communication range use intermediate nodes to communicate with each other. In these two situations, all the nodes that have participated in the communication automatically form a wireless network, therefore this kind of wireless network can be viewed as mobile ad hoc network. Network wide broadcasting in Mobile Ad Hoc Network provides important control and route establishment functionality for a number of unicast and multicast protocols. . Broadcasting in MANET poses more challenges than in wired networks due to node mobility and scarce system resources. Broadcasting is categorized into deterministic and probabilistic schemes .In this paper give a bird's eye view over probabilistic approach for routing ,besides the basic probability scheme also includes their recent advancements .This review paper identify which protocol gives better performance in terms of reach ability, saved rebroadcast and average latency in rebroadcasting a route request message.

Review Paper on Intelligent Toll Tax System for the Smart Cities

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Mr.K.D.Bodhe | Mr.A.S.Sambare, Mr.N.V.Aote, Mr.H.V.Taiwade,Ms. E.M.Choudhari

Abstract

Now a day’s with the rapidly growth in technologies and innovations, world moving towards digitalization. In smart cities traffic management issues is most important. For the smooth traffic management, the cashless concept should be implementing especially on toll tax offices. Most of the toll tax offices are now working manually. On National Highways, millions of vehicles are travelling in a day. Each vehicle required at least 5 minutes for the paying the toll tax, which causes unnecessary delay to reach at workstation, traffic jams, accidents etc. The manual process for paying toll tax is leading to the corruption also. In this review paper, by studying the different techniques for the toll tax ticketing in the world, we have an algorithm for the toll tax payment by using the Internet of Things. In conclusion we discussed the major drawbacks of current existing systems and its possible solutions also.

Revocable ID-Based Proxy Re-Encryption and Data Uploading With Remote Data Integrity Checking

International Journal of Engineering Research in Computer Science and Engineering, Available online 19th July 2017

Usharani J | Dr. Usha Sakthivel

Abstract

Many organizations have large amounts of data so, wants to store and process their data by using the remote cloud computing system. In public cloud, the clients store their massive data in the remote public cloud servers. Since the stored data is outside of the control of the clients, it entails the security risks in terms of confidentiality, integrity and availability of data and service. Remote data integrity checking is a primitive which can be used to convince the cloud clients that their data are kept intact. In some special cases, the data owner may be restricted to access the public cloud server, the data owner will delegate the task of data processing and uploading to the third party, for example the proxy. However, the major problem of cloud data storage is security. Therefore, cloud data storage need some mechanisms that should be able to specify storage correctness and integrity of data stored on a cloud. On the other side, the remote data integrity checking protocol must be efficient in order to make it suitable for capacity-limited end devices. Thus, based on revocable identity-based public cryptography and proxy public key cryptography, we will study RID-PREUIC protocol. Revocable ID-Based Proxy Re-Encryption and Data Uploading with Remote Data Integrity Checking is an attractive alternative for public key cryptography. RID-PREUIC eliminates the demands of public key infrastructure (PKI) and certificate administration in conventional public key settings. An RID-PREUIC consists of Client, Proxy, PCS (Public Cloud Server), End-user and a trusted third party (i.e. private key generator, PKG). The PKG is responsible to generate each user’s private key by using the associated ID information (e.g. e-mail address, name or social security number). Therefore, no certificate and PKI are required in the associated cryptographic mechanisms under RID-PREUIC

Role of 4G and 5G Network in Supporting the Connectivity Requirements of Internet of Things

International Journal of Engineering Research in Computer Science and Engineering, Available online 5th August 2017

Sparsha Shetty | Vishalakshi Prabhu H

Abstract

In this paper, we will provide an overview of 4G and 5G with respect to Internet of Things perspective. IoT is the talk of the 21st century and mobile broadband is the driving force behind it. Lot of research is going on around the globe through academic, industry, government and R&D organizations in realizing the IoT. At present, IoT is in semi conceptual stage and the practical deployment is facilitated only with the emerging 5G technology. In this paper, we have presented some of the latest developments, ideas and prototypes

Role of Information Communication Technology (ICT) in the Development of Smart City.

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Mr. Avinash P. Ingle | Mrs. Pallavi M. Chaudhari, Mrs.Archana V. Potanurwar

Abstract

By 2030, the world's population is projected to be 8.5 billion and increase to 9.7 billion by 2050 and 11.2 billion by 2100. Half of humanity today lives in cities. Many cities are experiencing exponential growth as people move from rural areas in search of better jobs and education. Consequently, cities' services and infrastructures are being stretched to their limits in terms of scalability, environment, and security as they adapt to support this population growth. Visionaries and planners are thus seeking a sustainable, post-carbon economy to improve energy efficiency and minimize carbon-emission levels. Along with cities' growth, innovative solutions are crucial for improving productivity (increasing operational efficiencies) and reducing.

Sanjeevani Drone

International Journal of Engineering Research in Computer Science and Engineering, Available online 11th July 2017

Raghavendra Rao.B | Amrutha.H.J, R.shambavi,Sasirekha.K, Senthuri.N

Abstract

Hexadrone also called as a hexarotor helicopter or hexacopter, is a multirotor helicopter that is lifted and propelled by six rotors. hexacopters are classified as rotorcraft. It is used for social cause, like flood such natural disasters. By using this drone we can easily distribute food, medicine, safety guards to the needy people. The maximum needy stuff that a drone can carry up to 2kgs. It has multidirectional navigation. Using GPS we can trap the drone through android app.This vehicle is highly capable to fly soon and reach any place in a very possible time. so using this we can control the hunger and can safe guard the people from some contagious diseases.This project is used to provide user friendly service in natural disaster emergency. This project have 2 modules. One will be placed in accessing unit and other will be placed on drone.Accessing unit will be having control to direct the drone to reach the respective area where help is needed,With the necessary information from management. Then the drone picks up the needy stuffs and moves towards needy people. The drone location will be tracked by using ARM, GPS and GSM module.ARM activates the GPS to read location of the place with respect to Latitude and Longitude. Then ARM sends that location information to concern person via GSM to track drone.We fix the camera on the drone to shoot the footage from the sky and that footage will be available as live streaming in the LCD.

Save Water, Save Earth Using Automated Agricultural Irrigation Method

International Journal of Engineering Research in Computer Science and Engineering, Available online 7th June 2017

Miss. Rashmi S Hiremath | Dr. S. R. Biradar

Abstract

Agricultural Irrigation is very essential for the production of crops. It is one of the important factors for the human to survive in his life. Irrigation is the method to plant the crops by water. Many methods of irrigation have been developed and arebeing practiced; but the selection of proper method of irrigation helps to improve the yield of the crops at an economical price thereby increasing the country’s economy and development. Automated Irrigation is a modern technique, which saves 95% of the water and improves the production of crop. This paper proposes the different methods of automated agricultural operations, pros and cons of different methods, comparison between the traditional methods and modernautomated irrigation methods.

Searching Comparatively Better Result From Agglomerative algorithm

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th August 2017

Dipalee Prakash More | Prof. Ujawala M Patil

Abstract

In this world the Internet has become very casual for searching, the user appears to use it every time, even they need to search keyword from any information query, search relevant word and a lot more. Also, people use search engine like Google, Bing when they are willing to search something, wants to use some relevant information or go to their synonyms. But searching for correct result requires more time and less execution speed even they produce multiple choices. So, this process is very confusing for users to decide one correct keyword amid the many results as a seek engine show overall results. For these reasons, the present paper centering on generally showing the final result and to show exact keyword. Intended to the agglomerative algorithmic approach is used which aim to generate exact keyword in less time and reducing computational cost. The agglomerative approach is very useful for knowing the best result from requiring query candidate.

Searching Comparatively Better Result From Agglomerative algorithm

International Journal of Engineering Research in Computer Science and Engineering, Available online 11th August 2017

Dipalee Prakash More | Prof. Ujawala M Patil

Abstract

In this world the Internet has become very casual for searching, the user appears to use it every time, even they need to search keyword from any information query, search relevant word and a lot more. Also, people use search engine like Google, Bing when they are willing to search something, wants to use some relevant information or go to their synonyms. But searching for correct result requires more time and less execution speed even they produce multiple choices. So, this process is very confusing for users to decide one correct keyword amid the many results as a seek engine show overall results. For these reasons, the present paper centering on generally showing the final result and to show exact keyword. Intended to the agglomerative algorithmic approach is used which aim to generate exact keyword in less time and reducing computational cost. The agglomerative approach is very useful for knowing the best result from requiring query candidate

Secure Sharing of Group Data in Public Clouds

International Journal of Engineering Research in Computer Science and Engineering, Available online 4th August 2017

Anusha C H | Dr.R.Aparna

Abstract

Cloud computing is a rapidly emerging technology that provides storage and computing services to the customers on demand. Due to loss of control over the data and computation, many security issues will arise in cloud computing environment. In case of data shared among group members, there exist certain additional security issues that need to be addressed. The main purpose of this paper is to provide data security and efficient key management in group shared data using multi-clouds, for storing the encrypted data in blocks. Secure Sharing of Group Data in Public Clouds counters security issues in group shared data by providing data confidentiality, integrity, backward and forward access control, using AES 256 bit encryption technique and efficient key management. The main key, which is used for encrypting the data, is not stored anywhere. But the key is divided into two parts, one part of the key is stored in the trusted server and the other part is sent to the user. Encrypted data is divided into blocks and stored in different clouds. Whenever the user requests for the data, he sends his key to the server. The server retrieves the data blocks stored in different clouds and combines it to get the encrypted data. The encrypted data is finally decrypted using the key generated by combining the key sent by the user and the key stored in the server for the corresponding user

Secure Transmission in MIMO Wiretap Channels Using General-Order Transmit Antenna Selection with outdated CSI

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Ms R Lavanya | Ms A Jayashree,Ms B Nivetha

Abstract

general-order transmit antenna selection to enhance the secrecy performance of multiple-input-multiple-output multieavesdropper channels with outdated channel state information (CSI) at the transmitter. To evaluate the effect of the outdated CSI on the secure transmission of the system, we investigate the secrecy performance for two practical scenarios, i.e., Scenarios I and II, where the eavesdropper's CSI is not available at the transmitter and is available at the transmitter, respectively. For Scenario I, we derive exact and asymptotic closed-form expressions for the secrecy outage probability in Nakagami-m fading channels. In addition, we also derive the probability of nonzero secrecy capacity and the ε-outage secrecy capacity, respectively. Simple asymptotic expressions for the secrecy outage probability reveal that the secrecy diversity order is reduced when the CSI is outdated at the transmitter, and it is independent of the number of antennas at each eavesdropper NE, the fading parameter of the eavesdropper's channel mE, and the number of eavesdroppers M. For Scenario II, we make a comprehensive analysis of the average secrecy capacity obtained by the system. Specifically, new closed-form expressions for the exact and asymptotic average secrecy capacity are derived, which are valid for general systems with an arbitrary number of antennas, number of eavesdroppers, and fading severity parameters. Resorting to these results, we also determine a high signal-to-noise ratio power offset to explicitly quantify the impact of the main channel and the eavesdropper's channel on the average secrecy capacity.

Secure voice based authentication for future IOT applications

International Journal of Engineering Research in Computer Science and Engineering, Available online 3rd July 2017

Mr.K.Ravi kishore | Dr.M.Humera Khanam, Ms.D.Sucharitha, Ms.G.Divya

Abstract

Internet of Things (IOT) is a network of all devices that can be accessed through the internet. Using existing network infrastructure, the devices can be remotely accessed and controlled, thus allowing a direct integration of computing systems with the physical world. It also reduces human involvement along with improving accuracy, efficiency and resulting in economic benefit. The IOT devices facilitate the day to day life of people. However, due to its heterogeneous and dynamic nature the IOT has an enormous threat to security and privacy in IOT environment the Authentication is one of the most challenging security requirement, where a user can directly access information from the devices, provided the mutual authentication between user and devices happens. A system that recognizes and authenticates the voice of a user by extracting the distinct features of their voice samples is usually termed as Voice recognition system. Converting the human voice into digital data can be carried out by Voice identification. The digitized audio samples then undergo feature excerption process to extract Mel Frequency Cepstral Coefficients (MFCC) features. These coefficients are subjected to feature matching through Dynamic Time Warping (DTW) to match with the patterns existing in the database for limited language words. In this paper we provide the IOT applications to the voice based authentication by providing a natural language processing interface. For better performance we can combine the digital and mathematical knowledge using MFCC and DTW to extract and match the features to improve the accuracy

Secured Multimedia Processing in Big data Using DataCloud and Mapreduce Algorithm

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Varnachithra.A | Sahishna Krishna R.G, Neethy C Nair, Navya Anna Moncy, Navin K.S

Abstract

Big Data is a data analysis methodology enabled by recent advances in technologies and architectures. The scalability issue of big data leads towards cloud computing which offers the promise of big data implementation to small and medium sized businesses. Our paper proposes Big Data processing in cloud through a programming paradigm known as MapReduce. We also propose a novel architecture for the future Internet based on information-centric networking which is called Community Oriented DataClouds where users under common interest are brought together into a community. As a sample application of the mentioned concept, we perform multimedia processing and storage in a private cloud. After data processing, clustering is done and encryption is performed on it. For data encryption and decryption we use blowfish algorithm that supports for all file formats. Integrating all the multimedia processing under a single application and storing it in DataClouds or cloud communities make this a different approach.

Secured Transfer of IoT Data Using Attribute Based Encryption

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Pradyoth Hegde | Dr. Yuvaraju B N

Abstract

In the present technologies It is considered as one of the key area of growth. IoT is growing its popularity and market everyday exponentially. Iota is spreading from small to large applications in all fields like Smart Cities, Smart Grids, and Smart Transportation. As the usability of the it is growing, security of the data has become one of the major areas of concern. In this project, we apply the attribute based encryption concept to encrypt the data. Also we make use of cloud technology to store the data. Here since we store the data in encrypted format, it is very difficult to understand the data. The key is stored in the key server and is given only to the authorized users. Thus this project ensures the security of the sensor data.

Securing And Ensuring Integrity of Steganographic Image using Cloud Computing

International Journal of Engineering Research in Computer Science and Engineering, Available online 4th August 2017

Pallavi R | Nandini P, Darshan kanbargi

Abstract

In cloud computing data storage is a significant issue because the entire data reside over a set of interconnected resource pools that enables the data to be accessed through virtual machines. It moves the application software’s and databases to the large data centers where the management of data is actually done. As the resource pools are situated over various corners of the world, the management of data and services may not be fully trustworthy. So, there are various issues that need to be addressed with respect to the Management of data, service of data, privacy of data, security of data etc. But the privacy and security of data is highly challenging. To ensure privacy and security of data-at- rest in cloud computing, we have proposed an effective and a novel approach to ensure data security in cloud computing by means of hiding data within images following is the concept of stenography. Even though after making using stenography mechanism we can achieve data security in cloud but we cannot assure integrity of stenographic file, which acts as a major drawback in cloud computing .To overcome this drawback we are proposing the data integrity technique to secure the data from vendor.

Security Based Pattern Classifiers

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Mr. Zaid Alam Khan | Mr. MD Azher, Mr. Kante Surya, Chandra Rao,Ms. Neelu l

Abstract

Security is usually defined as opposing oneself from harmful attacks. Security is a part of everyones life. People wants to be safe and secure all the time but one never knows when his/her system can be attacked by malicious intruders. However upgrading ones security at the highest level possible is a necessary task. Pattern classification systems are commonly used in adversarial applications, such as biometric authentication, network intrusion detection, and spam filtering. It is to be noted that in these three areas data can be purposely manipulated or modified by humans to undermine their operation. These scenarios are not considered by classical design methods. Pattern classification systems may exhibit vulnerabilities, and when exploited may severely affect performance. Extension of pattern classification theory and design methods to real time applications is thus a very relevant research direction which has not yet been pursued in a systematic way and proper way. This paper introduces one of the main open issues: establishing a security system as a real time application which can be used in several organisations such as hospitals, banking system, libraries etc. Reports shows that security evaluation can provide a more complete understanding of the classifiers behaviour and lead to better design choices.

Security Evaluation of Pattern Classifier against Phishing URL Detection

International Journal of Engineering Research in Computer Science and Engineering, Available online 14th July 2017

Miss J. N. Karnase | Dr. V. M. Thakare, Dr. S.S.Sherekar

Abstract

Pattern classification is a branch of machine learning that focuses on recognition of patterns and regularities in data. In adversarial applications like biometric authentication, spam filtering, network intrusion detection the pattern classification systems are used. Extending pattern classification theory and design methods to adversarial environment is thus a novel and very relevant research direction. Spam filtering to discriminate between a “legitimate” and a “malicious” pattern class. Intrusion analysis is the process of combing through IDS alerts and audit logs to identify real successful and attempted attacks. Phishing is a social engineering attack that exploits user’s ignorance during system processing has an impact on commercial and banking sectors. Numerous techniques are developed in the last years to detect phishing attacks such as authentication, security toolbars, blacklists, phishing emails, phishing websites, and URL analysis, In this paper, present phishing detection system using features extracted from URLs lexical only to meet two important goals which are wide scope of protection and applicability in a real-time system and calculate the probability of characters sequence in URLs using the N-gram model.

Security Issues in Distributed Database System

International Journal of Engineering Research in Computer Science and Engineering, Available online 13th July 2017

Sangeetha Radhakrishnan | Dr.A.Akila

Abstract

Distributed database is a collection of databases that can be stored at different computer networks and can be access from different locations. For a distributed environment, development of a secured database is a critical issue. Nowadays, distributed database became more and more popular and hence the importance of ensuring security of database in distributed environment became more significant. In this paper, the features of the distributed database system and its security issues are mentioned. Security issue may compromise the access control and the integrity of the system. Some solution for security aspects like access control, reliability, integrity and confidentiality are also mentioned.

Selective Scheduling Algorithms of RTOS A Study of Task Based Scheduling

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Minal V. Domke | Nikita R. Hatwar,Nikita R. Hatwar, Priyanka V. Thakare

Abstract

In this paper, study of the classic real-time scheduling algorithms is done. Many papers have been published in the field of real-time scheduling. The problem of scheduling is studied from the viewpoint of the characteristics peculiar to the program functions that need guaranteed service. The quality of real-time scheduling algorithm has a direct impact on real-time system's working. After studied popular scheduling algorithms mainly EDF and RM for periodic tasks with hard deadlines tried to describe performance parameters use to compare the performances of the various algorithms. Observation is that the choice of a scheduling algorithm is important in designing a real-time system .Conclusion by discussing the results of the survey and suggests future research directions in the field of RTOS.

Self Destructing Data System For Distributed Object Based Active Storage Framework

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Mrs. Bharati A. Raut | Mr. Nitin S. Thakre,Mrs. Rupali A. Fulse

Abstract

With the development of Cloud computing and popularization of mobile Internet, Cloud services are becoming more and more important for people’s life. People are more or less requested to submit or post some personal private information to the Cloud by the Internet. When people do this, they subjectively hope service providers will provide security policy to protect their data from leaking, so other people will not invade their privacy. As people rely more and more on the Internet and Cloud technology, security of their privacy takes more and more risks. As all the concept and researches have been evolved on the self destructing data system on the cloud computing, this paper is all about the web site security. That means the same concept of self destructing data system is used and applied on the web site, as web site users are tremendously in large numbers than the cloud users.

Sentiment Analysis of movie Reviews using Twitter data

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Enimai V | Gokulavani S, Niveditha J P,Varshini R, Sheik Abdullah A

Abstract

Sentiment Analysis is the process of determining whether a piece of writing is positive, negative or neutral. It’s also known as opinion mining, deriving the opinion or attitude of a speaker .It is used to identify the mood emotional tone of the speaker. Sentiment analysis is extremely useful in social media monitoring as it allows us to gain the idea of the public. The problem is hard to find the motive of the sentence. The data source is twitter using twitter API. The techniques used are term frequency(TF), inverse document frequency(IDF) and Support vector machine(SVM) which is used to seperate the positive, negative and neutral.

Sentiment Analysis On Unstructured Data

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Apurva Joshi | Kalyani Birgade, Pallavi Petkar ,Mrunali Sathone

Abstract

An enormous growth of the WWW has been instrumental in spreading social networks. Due to many-fold increase in internet users taking to online reviews and opinions, the communication, sharing and collaboration through social networks have gained importance. The rapid growth in web-based activities has led to generation of huge amount of unstructured data which accounts for over 80% of the information. Exploiting big data alternatives in storing, processing, archiving and analyzing this data becomes increasingly necessary. Unstructured data refers to information that either does not have predefined data model or is not organized in a predefined manner. Unstructured data is being constantly generated via call center logs, emails, documents on the web, blogs, tweets, customer comments, customer reviews and so on. While the amount of data is increasing rapidly, the ability to summarize, understand and make sense of such data for making better decision remain challenging. So thus there is a need of sentiment analysis on unstructured data. In this paper we are describing what is sentiment analysis and methodology of analyzing on unstructured data .We have done analysis on various data sets from twitter , blogs and movielen.com site using r statistical language and output are visualized in the form of word cloud and histogram.We have created GUI’s for analysis of this datasets by which users can easily analyze the data.

Shape and Content Aware Image Retargeting

International Journal of Engineering Research in Computer Science and Engineering, Available online 16th August 2017

Sunanda Maheswaran | Prof L. Nanda Kumar

Abstract

Images need to be retargeted to different sizes and shapes including nonrectangular shapes. This paper proposes a retargeting algorithm that retargets images to a large family of nonrectangular shapes specified by the application. The main objective of this algorithm is preservation of the image content during transformation. This algorithm is based on removing segments of seams based on a cost function. This cost function is calculated by using the image and the target shapes as inputs. This removal reshapes the boundary of the image into nonrectangular shapes. This algorithm can retarget effectively to a large family of nonrectangular shapes known as bhv-convex shapes. This mechanism is efficient in computation and flexible to use

Simulation of Mitigating Node Isolation Attacks Using DCFM

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th August 2017

Shruthi H.K, | Poornima U.S, Dr. B.R. Prasad Babu

Abstract

This Paper is to prevent node isolation attack by reducing the severity of DOS (Denial of Service) attacks in Mobile Ad- Hoc Networks (MANET) which is using Optimized Link State Routing (OLSR) Protocol for packet transmission. The resulting protocols are more vulnerable to different kinds of attacks. Different solutions have been proposed for different types of attacks, however these solutions often Compromise routing efficiency or network overload. One of the major DOS attack against the Optimized Link State Routing protocol (OLSR) known as the node isolation attack. It occurs when topological knowledge of the network is exploited by an attacker and who is able to remove the victim from the rest of the network and subsequently deny communication services to the victim. In this project work, I have suggested a novel solution to reduce the severity of OLSR protocol from node isolation attack by using the same technique used by the attack itself. The proposed technique prevents more than 95 percent of attacks. The overhead required decreases as the network size increases until it is non-discernable.

Simulation of Special Mathematical Functions

International Journal of Engineering Research in Computer Science and Engineering, Available online 14th August 2017

Sangeeth Sadanand | Divya K. Shah, Vishwesh A. Vyawahare

Abstract

Fractional order system is extensively studied over past few decades. Many simulation and implementation studies have proved that the fractional-order (FO) systems are better than the conventional integer-order systems in terms closed-loop performance. Special mathematical function is unavoidable in most of the solution of fractional order calculus. Computation of these functions requires a large memory and computational resource. Real time calculation is required to speed up performance of a fractional order System. In this work an attempt to simulate the computation of Gamma function, Error function and Complementary error function using ModelSim is made. This work also presents computational error.

Smart ATM Security System

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Krushna Mantri | Alok Anshu, Abhishek Kr. Abhi , Nikhil R. Shimpi

Abstract

the idea of Designing and implementing a security based ATM theft project is born with the observation in our real life incidents happening in around us. This project deals with prevention of ATM theft robbery, so to overcome the drawback founded in exciting technology in our society. Whenever robbery occurs, vibration sensor is used, which senses vibration produced from ATM machine. Once the vibration is sensed the beep sound will occur from the buzzer. And also if ATM system got fire then fire sensor is used to sense the fire, once the fire sensor senses fire then Buzzer starts to beep. RTC is used to capture the robber occurrence time and send the robbery occurrence time with the message to the nearby police station and corresponding bank through GSM.

Smart Bus

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Bindhu.R | Hema.R , T.K Pradeep Kumar , Lorate Shiny

Abstract

This is an automated system which will be fitted in the Bus for cleaning the dust particle from environment.The proposed technique is intended to facilitate the user to clean the dust particle through vacuum cleaner. In this system Microcontroller is the main unit, which controls the whole process. We are going to use AVR family microcontroller (ATMEGA 8/ ATMEGA 16). Vacuum Cleaner is used for cleaning the dust particle from road, which is connected with microcontroller. There is a container for containing the dust particle. We are going to use IR sensor for detecting the quantity of dust particle in container. IR sensor will be fitted on the top of container. When the container will be filled with dust container, then the sensor will detect it and send information to microcontroller. The sensor will be connected with Microcontroller .There will be one alert system for giving alert when the sensor will detect the quantity of dust. There will be one manual switch, which will be used for opening and closing of the container. Motors will be fitted on the top of container for opening and closing container.solar panels are placed on roof of the bus for power supply

Smart Communication for Academic System : Using Android

International Journal of Engineering Research in Computer Science and Engineering, Available online 19th July 2017

Miss Sushmitha Raj  | Miss Swetha , Miss Trivedi ,Miss Triveni, Mrs. Nagaveni Biradar

Abstract

In this Smart era of technology, word Android has become buzzword everywhere. The Study is aimed at developing an android application for the smart communication between student and faculty in the educational institution. Application can play crucial role in managing the academic activities in the institution. It acts as knowledge management tool that helps the student and faculty of the institution; they can access it using the mobile phones anywhere and anytime. Each user of the application is provided with unique username and password to access. Three accesses are made from the admin side, student and faculty. Users can upload or download the information just in time. Application development is done by using integrated android and Web application. Proposed system in this study provides different functionalities such as attendance monitoring and report generation, delivery of course materials to the students timely, notifications, interface between student and faculty, timetable access etc., Thus, an application is the holistic and robust in developing a smart communication system

Smart Office Area Monitoring and Control Based on IoT

International Journal of Engineering Research in Computer Science and Engineering, Available online 14th July 2017

Prof.S.A.Shaikh | Aparna S. Kapare

Abstract

Internet-of-things (IoT) is the significant integration of electronic devices, vehicles, buildings, and other articles to collect, capture and exchange the data. The project proposes an effective system that can be implemented using IoT (Internet of Things) for controlling and monitoring of office and home electronics applications using World Wide Web. The smart office referred to as a wireless automation system that can be supposed to be implemented in existing office area environments, without making any changes in the infrastructure. The proposed system is designed to control and monitor electrical appliances using a smartphone via bluetooth as communication protocol and also raspberry pi as server system. The office monitoring system prototype includes a gateway with user interactions capabilities, this experiment demonstrates that the proposed gateway work efficiently by transmitting and receiving instructions from different protocols, a Graphical User Interface (GUI) allows user to interact with the ambient environment settings

Smart phone application for Hazard Reporting

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Shivani Rewatkar | Pooja Dube,Yugandhara Pannase, Divya Ghodmare,Akhil Suryawanshi

Abstract

Now a day’s Android plays an import role in our lives. A new area where mobile is useful for gathering hazardous locations, of public area, information as they are not readily accessible at any point. Thus, using cloud, we will try to make all the information related to the hazardous areas available on the Android Application to the various organization like Police, Municipal Corporation, News Papers, etc. during their investigation which would speed-up the entire process of tracking down the hazardous problems. A mobile application is made available to the common people in order to update the hazardous problems by capturing the image and the location of the area and is sent to the server and the responsible authority is informed. Then the respective authority is responsible for allocating the problems to their respective employees and then it is solved by these employees. The notification of the problem solving is sent to the mobile of the user and authorities. The System generates the ratings Negative and Positive to the work solved within days on basis of work solved between 3 days it will rate Positive or Negative. Using this system, we can keep records of the ratio of complaints registered and issues which are unsolved

Social Media Mining for Price Prediction of Stock Market Using Map Reduce Framework

International Journal of Engineering Research in Computer Science and Engineering, Available online 4th August 2017

Megha Rani Raigonda | Gangamma

Abstract

Big data may be an evolving expression that depicts large data sets that may be analyzed computationally to reveal patterns, especially relating to the behaviour and interaction of the human..At whatever voluminous add up of structured, semi structured and unstructured information that need those possibility with a chance to be mined to majority of the data in the stock market. The stock market price prediction is the one of the most difficult task because the price of the stock is changing instantaneously. In the traditional, the stock are only prices are predicting the based on the market sentiment, usually for the short-term periods for the small-caps. For the long term stocks, the statistical analysis methods are not beneficial. In our project work for the stock price prediction we are using the social media mining technology to evaluating the stocks of the market segment. We are using the big data analytic and the map reducing technique to predict the price of the stocks for long term for the user selling or buying the stocks in the best time.

Social Network Analysis

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

G Purushotham | E Teja

Abstract

Social Network Analysis is a fascinating multi-disciplinary endeavor that uses techniques from complex network analysis and graph theory to study the system of relations between a set of actors. Actors are discrete individuals, or collective social units. A social network is a finite set of actors and the relationships defined on them. Such networks are studied using metrics and techniques stemming from complex network analysis, typically involving estimating diameter, cores, groups, degree distribution of nodes, centrality measures (e.g., eigenval centrality, Google page-rank), clustering coefficient and navigability.

Solar Based E – Uniform for Soldiers

International Journal of Engineering Research in Computer Science and Engineering, Available online 11th July 2017

Potluri.Deepthi | Likitha B.A, Ambika V, Karthik P,Mrs. Myneni Chandana

Abstract

Solar based E-Uniform gives better protection to the soldiers who are working in extreme weather conditions. Solar Panels are used to power up the internal circuitry of the E-uniform. A 12 V DC lead acid rechargeable battery is used for storing the energy. We are using conventional battery charging unit also for giving supply to the circuitry. AT89S52 micro controller is the heart of the circuit as it controls all the functions. A voltage sampler is interfaced with the system using ADC 0808 to get the voltage generated from battery as a display on a 16X2 LCD. The project is operated in summer mode and winter mode. By selecting the mode of operation, we are operating the H-Bridge IC such that it can drive body heater/cooler. The heater/cooler in turn will help us to provide chilling or warming effect inside the uniform which helps the soldier to bear to any kind of external environment. The metal sensor will detect the metal like bomb and intimate the soldier with a buzzer indication. We are using Zigbee Technology for monitoring the uniform, and we are using emergency button for the security of soldiers.

Speech File Detection by a Rule Based System

International Journal of Engineering Research in Computer Science and Engineering, Available online 4th August 2017

Punnoose A K | Ravishanker M

Abstract

This paper discuss about detecting speech files in a real world speech recognition task. Detecting files with small background speech or noise, changes the overall behaviour of the Interactive Voice Response System. We experiment with neural networks trained to recognize phonemes, and outline a very simple yet effective approach to discriminate files that contains speech from that of noisy files. We use some popular publically available dataset, to validate our approach

Statistical Stemmer for Roman Konkani

International Journal of Engineering Research in Computer Science and Engineering, Available online 30th June 2017

V. Pugazhenthi | Sagar Naik, Neha Sawant, Raghavendra Gawas, Shradha Vaingankar, Snusha Shirodkar, Charitra Chandekar

Abstract

Information Retrieval (IR), Stemming, Clustering, Rule-based stemmer, Distance measure, Statistical Based Stemming, Morphology, Root word, Inflection, Hierarchical clustering.

Stock Conservation

International Journal of Engineering Research in Computer Science and Engineering, Available online 11th July 2017

Shubha N | Ramya N, Arshiya A,Venugopal, Dr .B. Shadaksharappa

Abstract

The main aim of our project is to avoid the paper work done by maintaining the stock details like purchase, distribution and deployment of laboratories in an organization. When we carry out these we get lot of manual work and time consuming processes therefore there will be delay in supplying resources requires in laboratories and the works in laboratories also get slow.Delay happens because each and very stock purchase has to undergo process of verification from higher authorities.Confusion happens even for tracing out the location of the stocks.

Stock Prediction Using Clustering And Regression Techniques

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Shalini Lotlikar | Megha Ainapurkar

Abstract

A stock market is the aggregation of buyers and sellers. A stock exchange is a place where, or an organization through which, individuals and organizations can trade stocks. In the financial market the decision on when buying or selling stocks is important in order to achieve profit. There are several techniques that can be used to help investors in order to make a decision for financial gain .The data set is taken from yahoo finance and preprocessing is performed on it. Clustering and regression are two techniques of data mining used here .For prediction of future stock price multiple regression technique is used which helps the buyers and sellers to choose their companies for stock.This paper has introduced the k means algorithm after which multiple regression is applied to predict the stock.

Survey on Approaches used for Image Quality Assessment

International Journal of Engineering Research in Computer Science and Engineering, Available online 5th August 2017

Ms. Savitri B. Patil | Dr. Shobha. R. Patilc

Abstract

One of important factor affecting the overall performance of biometric system is quality of biometric data. Poor quality of biometric sample mostly results in spurious or missing features, which increases the enrollment failure and degrade the overall performance of biometric systems. Finding the quality of an image is the fundamental problem in image and video processing. For quality assessment of an image various methods have been estimated. Quality of biometric sample can be defined in two ways: one is subjective and other is objective methods. In this paper survey on the image quality assessment techniques which are necessary to improve the performance of biometric system is presented.

Survey on Classification of Time Series Data

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Penugonda Ravikumar | Devanga Ampabathini Susmitha

Abstract

Classification of time series data is one of the popular fields nowadays. Many algorithms exist to get accurate and faster result which speeds up the computation. Nowadays E-Commerce sites are providing many user convenient options like recommendations for the products that they are purchasing which are playing key role in attracting the users to visit their sites. All these are happening based on the classification of data. Home automation is one of the evolving technologies in which data storage is important. It will be convenient if we are able to compare test data with limited trained data by preserving accuracy. Some data such as national security, personal information, bank details must be very confidential which has to be stored very securely. These all comes under time series data and data such as images, weather reports, speeches, and satellites data can be converted into time series data. Classification of normal data can be done by normal methods like nearest neighbor but to classify Time Series data by taking all these above features into consideration is difficult because time series data has to convert into structured format and it has to be sort and compare according to time Some existing algorithms are quite good in classifying Time Series data by satisfying some of these features. There are many algorithms which can classify data of different types quite accurately. But all algorithms might not satisfy all factors. So based on type of data we have to choose appropriate algorithm.

Survey on Metamorphic Testing For Overcoming Oracle Problem in Software Testing

International Journal of Engineering Research in Computer Science and Engineering, Available online 26th July 2017

B. Manaswini | Dr. A. Rama Mohan Reddy

Abstract

Software Engineering is a branch of computer Science which is used for delivering an efficient and reliable product based on the customer’s requirements. Software testing is one of the strategies for identifying the correctness of a program. The conflict arises when a bug is found even after completion of testing. This approach is known as Oracle Problem. A Metamorphic testing (MT) is one of the methods proposed by Chen in 1998 for making the Oracle problem less severe. This MT creates follow-up test cases and compares the output with the original output. If there is no error between the outputs then the test case is correct. If any fault exists between the outputs then a bug is identified and it shows that there is a fault in the given test case. This paper presents survey on metamorphic testing which is applied on various domains in computer science, related applications, and research challenges.

Survey on MRI Image Segmentation Techniques for Brain Tumor Detection

International Journal of Engineering Research in Computer Science and Engineering, Available online 12th June 2017

AmitojKaur | 

Abstract

This survey focuses on techniques available for MRI image segmentation for brain tumor detection using computer assisted image processing algorithms. The need of automated and or semi-automated tumor detection is highly regarded and required as the technology is progressing and the cases of brain tumors and edema are rising. The current technologies and available methods are reviewed in this paper.

Survey on Various Fingerprint Image Enhancement Technique

International Journal of Engineering Research in Computer Science and Engineering, Available online 21st July 2017

Mrs. Hemavati | Gayana K.R

Abstract

In the field of security, identification and verification of a person on the basis of biometric features has become known in our society. When biometric connected to a person body remarkably decreases the possibility of fraud. A biometric system basically is a pattern recognition system and to recognize the pattern or image .From various biometric techniques fingerprint technic is the best everyone is known to have unique fingerprint and these pattern doesn’t change throughout the life, for this reason only fingerprint biometric popularly used. The quality of image plays very important role in matching the two fingerprints but most of the fingerprint recognition result in the poor matching due to poor quality of image. In this paper various image enhancement methods or techniques will be discussed by which the image quality is enhanced and matching techniques are applied.

Synthesizing Face Video of a Target Subject

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Preetam S. Varude | Sujata S. Agrawal

Abstract

Synthesizing a face video of a target subject that nothing but the mimicry of the expressions of a source subject in the input video is facial expression retargeting in video. Facial expression retargeting has applications areas like dummy pictures. In retargeting problem, it uses the facial expression video of one subject as input to synthesize new facial expressions of another subject, therefore it is more reasonable to include the facial expression of different subjects in the training and test datasets. That is, two datasets should not contain the expressions of the same subject for the application. This paper includes required results of different facial expression retargeting techniques.

Test Case Selection Using Nature Inspired Algorithms

International Journal of Engineering Research in Computer Science and Engineering, Available online 11th July 2017

Hemalatha T | S Rohini, D Vivekananda Reddy

Abstract

In software development life cycle (SDLC), testing phase is the most important phase. Without testing we can’t give quality software or risk free software to the client. Software testing process typically consumes at least 50% of the total cost involved in software development. In regression testing there evolves the number of test cases. Due to some constraints, it is impractical to test all of them. Therefore to overcome this problem, testing is done using selected test cases to reduce the testing effort and get the desired result accurately. In this paper, the algorithms which are discussed imitate the processes running in nature. And due to this these process are named as “Nature Inspired Algorithms”. The algorithms inspired from human body and its working and the algorithms inspired from the working of groups of social agents like ants, bees, and insects are the two classes of solving such Problems. This emerging new era is highly unexplored young for the research. The Algorithm proposed here uses swarm based intelligence technique on Maximum coverage to select the best of breed test case to evaluate any errors in the development cycle therefore the BCO produce optimal no. of test cases solving optimization problem.

Test Case Selection Using Nature Inspired Algorithms

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th June 2017

Hemalatha T | S Rohini, D Vivekananda Reddy

Abstract

In software development life cycle (SDLC), testing phase is the most important phase. Without testing we can’t give quality software or risk free software to the client. Software testing process typically consumes at least 50% of the total cost involved in software development. In regression testing there evolves the number of test cases. Due to some constraints, it is impractical to test all of them. Therefore to overcome this problem, testing is done using selected test cases to reduce the testing effort and get the desired result accurately. In this paper, the algorithms which are discussed imitate the processes running in nature. And due to this these process are named as “Nature Inspired Algorithms”. The algorithms inspired from human body and its working and the algorithms inspired from the working of groups of social agents like ants, bees, and insects are the two classes of solving such Problems. This emerging new era is highly unexplored young for the research. The Algorithm proposed here uses swarm based intelligence technique on Maximum coverage to select the best of breed test case to evaluate any errors in the development cycle therefore the BCO produce optimal no. of test cases solving optimization problem.

Text Based Emotion Detection Techniques

International Journal of Engineering Research in Computer Science and Engineering, Available online 12th June 2017

Akshaya Chandorkar | Asha Bharambe

Abstract

Emotion can be expressed by different forms such as written text, speech or video. With the growth of social networking, textual data has proven to be the main tool of the interaction. Emotion Detection in text documents is essentially a content-based classification problem which has evolved from the domains like Natural Language Processing as well as Machine Learning. Computational analysis of emotions has been considered a challenging and interesting task. However, there are few prior works who work with textual input to analyse these emotions. This paper explains different techniques of emotion detection, challenges faced and various applications of emotion detection. Also, it presents the implementation of the system.

The Next evolution of the Internet... ?Internet of Things?

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Dr. Vikash K Singh | Devendra Singh Kushwaha, Shaibya Singh, Sonal Sharma

Abstract

In recent years, the term Internet of Things has spread rapidly were entering a new era of computing technology that many are calling the Internet of Things (IoT). Machine to machine, machine to infrastructure, machine to environment, the Internet of Everything, the Internet of Intelligent Things, intelligent systems call it what you want, but its happening, and its potential is huge. We see the IoT as billions of smart, connected things (a sort of universal global neural network in the cloud) that will encompass every aspect of our lives, and its foundation is the intelligence that embedded processing provides. The IoT is comprised of smart machines interacting and communicating with other machines, objects, environments and infrastructures. As a result, huge volumes of data are being generated, and that data is being processed into useful actions that can command and control things to make our lives much easier and saferand to reduce our impact on the environment. The creativity of this new era is boundless, with amazing potential to improve our lives. Now consider that IoT represents the next evolution of the Internet, taking a huge leap in its ability to gather, analyze, and distribute data that we can turn into information, knowledge, and, ultimately, wisdom. In this context, IoT becomes immensely important.

Theoretical Channel allocation for SDRs in Smart Grid neighbourhood area network

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th August 2017

Megha Gupta | 

Abstract

Smart Grid (SG) is an intelligent power supply system. It is a new emerging concept to increase the features of local grids. Till now local grids were only providing electricity; but now they will also take part in exchanging information. Data as well as power communication can take place between a Smart Home (SH) and Smart Grid (SG). Real time data can be sent from SH to SG through neighborhood area network (NAN). There can be different wireless medium for data transmission in NAN. Our wireless medium is based on Cognitive Radio (CR) technology which is also called as Intelligent Software Defined Radios (SDRs) network. Cognitive radio network works in unused spectrum that is the frequency available at the time of need. In this paper, we are presenting a theoretical channel selection method for SG neighborhood area network. Our work is novel in terms of single hop communication and SDRs, which have not been explored much. In SG, research focus is on wireless sensors network and multihop communication. But we are supporting direct communication between smart home and smart grid; that will increase delivery ratio and throughput and decrease end to end latency. In future, we will be providing simulation of this model and enhancing it for secure communication

Time Series Analysis through Smoothing Techniques For Short Term Load Forecasting

International Journal of Engineering Research in Computer Science and Engineering, Available online 24th July 2017

Mr. Sandeep Tiwari | Mr. Kamlesh Lahre,Mr. Rohit Miri

Abstract

The Short –term load forecast is Very Much Impotent for providing better cost effective risk management plans; A lot of researchers and academicians are engaged in the activity of developing tools and algorithms for load and price forecasting. This paper provides a highly accurate and efficient load forecasting tools based on time series analysis: smoothing techniques model. Results and discussions from real-world case studies based on the electricity markets of Maharashtra Electricity Board are presented which will help predict the short-term demand.

TMACS-A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage

International Journal of Engineering Research in Computer Science and Engineering, Available online 14th July 2017

Shivprasad S. Nardele | Amol S. vilegave,Abhijeet S.Thete

Abstract

Distributed computing is ascending as a prevalent data keen perspective to make sense of it customers data remotely set away in an online cloud server. Cloud organizations give unfathomable facilities for the customers to value the on demand cloud applications without considering the close-by system imperatives. In the midst of the data getting to different customers may be in a synergistic relationship and thusly data sharing gets the opportunity to be tremendous to achieve beneficial advantages.We propose a typical power based security saving affirmation tradition SAPA to address past security issue for cloud limit. In the SAPA shared get the opportunity to power is finished by obscure get the chance to ask organizing framework with security and assurance thoughts e.g. approval data lack of clarity customer insurance and forward security, property based get the chance to control is grasped to get it that the customer can simply get to its own specific data fields middle person re-encryption is associated by the cloud server to give data sharing among the various clients.In earlier figuring world there is on one and just power that manages for client or customer obstructions of this advancement is in case control gets down then security of that cloud in like manner deals

Trust based Novel Secure Data Sharing Policy Framework for Social Networking

International Journal of Engineering Research in Computer Science and Engineering, Available online 23rd June 2017

Varun M Deshpande | Dr Mydhili K. Nair

Abstract

The advent of social networking and e-commerce empowered by cloud computing has created a paradigm shift in how people around the world communicate and do business. Amount of data being generated and information being shared by users is growing exponentially each hour. People around the world, have openly embraced the era of information technology, and almost unknowingly, it has become part and parcel of their daily life. However, the multitude of facilities provided by companies such as Facebook, Google, Amazon come with few potential concerns. Digital privacy of users and data security are at top of this list. Each company publish their own data policy and hence user generated data driven advertisements need to be analyzed carefully and holistic privacy preserving regulations enforced. We highlight results obtained from an online survey conducted to get an end-user perspective to these concerns on their digital identity. A compulsive effort is required to setup open standards based policy framework to achieve privacy preserving social networking and secure opt out mechanism needs to be offered to the users who do not wish to share their personal details with 3 rd party. We describe a trust based novel secure data sharing framework for implementing open standards on data security and privacy. This would be one step towards providing trustable software solutions for secure cloud based services.

Vehicle Health Monitoring System Using CAN

International Journal of Engineering Research in Computer Science and Engineering, Available online 11th July 2017

Mrs.Sheeladevi M | Jeyadevan S, P Udaysree,Priyanka V J, Ranjitha S, Ranjitha V

Abstract

Due to multiple connections of data & electrical lines connected to microcontroller it becomes very complex to understand & troubleshoot it. It also restricts us long distance data transfer due to large number of lines. To minimize all these problems, we can use “CAN” protocol to connect these entire network.CAN (control area network) enable us to connect all the devices together using only two wires. Due to this, the numberof lines connected to microcontroller reduces greatly & circuitry becomes simple to understand & troubleshoot. UsingCAN protocol we have connected multiple microcontrollers & other devices to a common can bus like light sensor,temperature& ultrasonic sensor.

Vehicle Tracking System

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Meghana H M | Dr. M Siddappa

Abstract

An efficient vehicle tracking system is designedand implemented for tracking the movement of any equipped vehicle from any location at any time. The proposed system made good use of a popular technology. a Smartphone application. This will be easy to make and inexpensive compared to others. The designed in-vehicle device works using Global Positioning System (GPS) and Location Based Services (LBS) technology that is one of the most common ways for vehicle tracking. The device is embedded inside a vehicle whose position is to be determined and tracked in real-time. The vehicle tracking system uses the GPS module to get geographic coordinates at regular time intervals. The GSM/GPRS module is used to transmit and update the vehicle location to a database. A Smartphone application is also developed for continuously monitoring the vehicle location. The Google Maps API is used to display the vehicle on the map in the Smartphone application. Thus, users will be able to continuously monitor a moving vehicle on demand using the Smartphone application and determine the estimated distance and time for the vehicle to arrive at a given destination. In order to show the feasibility and effectiveness of the system, this paper presents experimental results of the vehicle tracking system and some experiences on practical implementations.Keyword-5G,super speed,WCSM.

Verifying search result correctness of frequently occured item set in Data mining for online Customers

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th August 2017

Dr. B R Prasad Babu | Saurabh Sharma, Haroon Ali, Nandini B J, Anusha S

Abstract

Cloud computing is popularizing the computing paradigm in which data is outsourced to a third-party service provider (server) for data mining. Outsourcing, however, raises a serious security issue: how can the client of weak computational power verify that the server returned correct mining result? In this paper, we focus on the specific task of frequent item set mining. We consider the server that is potentially untrusted and tries to escape from verification by using its prior knowledge of the outsourced data. We propose efficient probabilistic and deterministic verification approaches to check whether the server has returned correct and complete frequent item sets. Our probabilistic approach can catch incorrect results with high probability, while our deterministic approach measures the result correctness with 100% certainty. We also design efficient verification methods for both cases that the data and the mining setup are updated. We demonstrate the effectiveness and efficiency of our methods using an extensive set of empirical results on real datasets.

Video Enhancement in Video Surveillance System

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Saylee Betawar | Shubham Amale,Nikita Harode,Rakshat Jaiswal

Abstract

Digital video has become an integral part of everyday life. It is well -known that video enhancement as an active topic in computer vision has received much attention in recent years. The aim is to improve the visual appearance of the video or to provide a “better” transform representation for future automated video processing such as analysis, detection and segmentation. Moreover, it helps analyses background information that is essential to understand object behaviour without requiring expensive human visual inspection. Therefore, in this paper, we aim at a novel approach to an algorithm for video enhancement.

Video Mining using Query by Example

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Rosebud Valadares | 

Abstract

When technology advances and data explodes, development takes place. As the industry grasps every opportunity to shift its strategy towards satisfying the consumer, the consumer’s demand further increases. Today, people have advanced from using black and white text, to the more effective and appealing realm of multimedia. With this, the consumer demand has evolved from text-based retrieval to content-based retrieval. In this paper, Video Mining is carried out using content-based retrieval. The content-based Video Mining system aims to effectively retrieve videos using the Query by Example approach wherein search is made based on a query video. The system has two components – a video feature repository and a Match-Retrieve module. On accepting a query video, it is first segmented and its color, audio and meta-data features extracted. These features are used to perform the required video mining based on similarity to the contents of the video feature repository

Virtualization Concept and Live Virtual Machine Migration

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th August 2017

Divya Kapil | 

Abstract

Virtualization technology was invented to maximize the utilization of hardware resource by IBM in 1960s. Virtualization is the abstraction of the physical resources needed to complete a request and underlying hardware used to provide service. It splits up a physical machine into several virtual machines. A virtual machine can be defined as, “It is a software implementation of a computing environment in which an operating system or application can be installed and run. As hardware cost went down, the need for virtualization faded out. More recently, virtualization become important again to improve availability, security, cost reducing, reliability and flexibility. This paper describes Virtualization technology concept. And also a case study on live virtual machine migration is used to explain the points.

Virtualization Concept and Live Virtual Machine Migration

International Journal of Engineering Research in Computer Science and Engineering, Available online 11th August 2017

Divya Kapil | 

Abstract

Virtualization technology was invented to maximize the utilization of hardware resource by IBM in 1960s. Virtualization is the abstraction of the physical resources needed to complete a request and underlying hardware used to provide service. It splits up a physical machine into several virtual machines. A virtual machine can be defined as, “It is a software implementation of a computing environment in which an operating system or application can be installed and run. As hardware cost went down, the need for virtualization faded out. More recently, virtualization become important again to improve availability, security, cost reducing, reliability and flexibility. This paper describes Virtualization technology concept. And also a case study on live virtual machine migration is used to explain the points.

Wavelet based Compression of Hyper Spectral Image cube using Tensor Decomposition

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Varsha Ajith | D.K.Budhwant

Abstract

As the dimensionality of remotely sensed Hyper spectral images are increasing, compression is required to transmit and archive Hyper spectral data. In this paper, an adept method for Hyper spectral image compression is presented to effectively reduce the volume of Hyper spectral data. The objective of proposed method is to apply classical compression method where low frequency information is reserved and high frequency information is discarded, based on Discrete Wavelet Transform. The core idea of our proposed method is to apply tucker decomposition on the wavelet coefficient, exploit both the spectral and the spectral information in the images. Moreover, it also evaluates the compression ratios for biorthogonal wavelet family The obtained result shows better performance on Bior1.1 and Bior1.3 wavelets.

Web Document Clustering Algorithm and Similarity Measure

International Journal of Engineering Research in Computer Science and Engineering, Available online 14th July 2017

Ms.S.M.Durge | Mr.Y.M.Kurwade,Dr.V.M.Thakare

Abstract

The Clustering is an unsupervised method to divide data into disjoint subsets with high intra-cluster similarity and low inter-cluster similarity. Most of the approaches perform web documents clustering, i.e., they assign each object to precisely one of a set of clusters. Objects in one cluster are similar to each other. The similarity between objects is based on a measure of the distance between them.This works well when clustering the compact and well-separated groups of data, but in many situations, clusters are different at rerun. This proposed method usek-means++ algorithm,is capable of identifying problem by spreading the initial centers evenly and improves performance

Wormhole Attack Prevention and Detection Approaches in Mobile Ad hoc Networks: A Survey.

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Avinash Singh | Ram Singar Verma

Abstract

A wormhole assault is especially hurtful against steering in sensor systems where an assailant gets bundles at one area in the system, passages and afterward replays them at another remote area in the system. A wormhole assault can be effortlessly propelled by an aggressor without bargaining any sensor hubs. Since a large portion of the steering conventions don't have systems to shield the system against wormhole assaults, the course demand can be burrowed to the objective region by the aggressor through wormholes. Along these lines, the sensor hubs in the objective zone construct the course through the assailant. Afterward, the assailant can alter the information, messages, or specifically forward information messages to disturb the elements of the sensor arrange. In this work we show another approach to identify wormhole assaults in MANET. Our location is basic and productive. We require neither GPS gadget, nor clock synchronization which are the fundamental restrictions of the other existing arrangements. Also, our recognition can be effortlessly actualized convention or in any neighbor revelation convention for MANET. We don't present any new messages. Along these lines, the overhead of the arrangement is restricted to the additional data (timestamps) attached to the Hello messages.